This document provides an overview of UMTS W-CDMA (Universal Mobile Telecommunications System Wideband Code Division Multiple Access). It describes the basic architecture and channel structures of a 3G W-CDMA system. Key points include that W-CDMA uses CDMA technology with a chip rate of 3.84 Mcps and channel bandwidth of 4.4-5 MHz. It also discusses the various physical channels in the uplink and downlink, including dedicated channels, common channels, and how they are structured over timeslots and frames.
This presentation covers:
How evolution has happened from First Generation Mobile Communication Systems to present day 3G/UMTS/WCMDA systems
Brief introduction of each Generation: GSM - 2G, 2.5 G - GPRS, 2.75G - EDGE, 3G and then LTE/4G
This presentation covers:
1. Evolution of UMTS core network
2. Different 3GPP releases up gradation to UMTS architecture
3. UMTS Core network elements
4. Protocols used in UMTS core networks
5. MSC server and MGW
6. IMS architecture
This presentation covers:
How evolution has happened from First Generation Mobile Communication Systems to present day 3G/UMTS/WCMDA systems
Brief introduction of each Generation: GSM - 2G, 2.5 G - GPRS, 2.75G - EDGE, 3G and then LTE/4G
This presentation covers:
1. Evolution of UMTS core network
2. Different 3GPP releases up gradation to UMTS architecture
3. UMTS Core network elements
4. Protocols used in UMTS core networks
5. MSC server and MGW
6. IMS architecture
This presentation covers:
What is a Radio Resource Unit ?
Why do we need RRM ?
Need of RRM in WCDMA ?
RRM algorithms Objectives
Different RRM functions : Handover, Power control, Admission Control, Code Management
This presentation discusses about the WCDMA air Interface used in 3G i.e. UMTS. This Radio Interface has great capability on which Third Generation of Mobile Communication is built, with backward compatibility.
HITB Labs: Practical Attacks Against 3G/4G Telecommunication NetworksJim Geovedi
In 2010 a number of practical high-profile attacks against GSM has been discussed and demonstrated. Still it should be noted that those only work against GSM (2G) which has been standardised in the early 90s. It was followed by the 3G family of standards in 2000 which in turn are currently superseded (better: complemented) by yet another generation (4G). LTE (4G) which is expected to be "the next big thing in mobile telco business" has an all-IP network architecture that is much flatter than the earlier architectures' ones.
This presentation covers:
What is a Radio Resource Unit ?
Why do we need RRM ?
Need of RRM in WCDMA ?
RRM algorithms Objectives
Different RRM functions : Handover, Power control, Admission Control, Code Management
This presentation discusses about the WCDMA air Interface used in 3G i.e. UMTS. This Radio Interface has great capability on which Third Generation of Mobile Communication is built, with backward compatibility.
HITB Labs: Practical Attacks Against 3G/4G Telecommunication NetworksJim Geovedi
In 2010 a number of practical high-profile attacks against GSM has been discussed and demonstrated. Still it should be noted that those only work against GSM (2G) which has been standardised in the early 90s. It was followed by the 3G family of standards in 2000 which in turn are currently superseded (better: complemented) by yet another generation (4G). LTE (4G) which is expected to be "the next big thing in mobile telco business" has an all-IP network architecture that is much flatter than the earlier architectures' ones.
Transcript: Selling digital books in 2024: Insights from industry leaders - T...BookNet Canada
The publishing industry has been selling digital audiobooks and ebooks for over a decade and has found its groove. What’s changed? What has stayed the same? Where do we go from here? Join a group of leading sales peers from across the industry for a conversation about the lessons learned since the popularization of digital books, best practices, digital book supply chain management, and more.
Link to video recording: https://bnctechforum.ca/sessions/selling-digital-books-in-2024-insights-from-industry-leaders/
Presented by BookNet Canada on May 28, 2024, with support from the Department of Canadian Heritage.
UiPath Test Automation using UiPath Test Suite series, part 4DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 4. In this session, we will cover Test Manager overview along with SAP heatmap.
The UiPath Test Manager overview with SAP heatmap webinar offers a concise yet comprehensive exploration of the role of a Test Manager within SAP environments, coupled with the utilization of heatmaps for effective testing strategies.
Participants will gain insights into the responsibilities, challenges, and best practices associated with test management in SAP projects. Additionally, the webinar delves into the significance of heatmaps as a visual aid for identifying testing priorities, areas of risk, and resource allocation within SAP landscapes. Through this session, attendees can expect to enhance their understanding of test management principles while learning practical approaches to optimize testing processes in SAP environments using heatmap visualization techniques
What will you get from this session?
1. Insights into SAP testing best practices
2. Heatmap utilization for testing
3. Optimization of testing processes
4. Demo
Topics covered:
Execution from the test manager
Orchestrator execution result
Defect reporting
SAP heatmap example with demo
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...SOFTTECHHUB
The choice of an operating system plays a pivotal role in shaping our computing experience. For decades, Microsoft's Windows has dominated the market, offering a familiar and widely adopted platform for personal and professional use. However, as technological advancements continue to push the boundaries of innovation, alternative operating systems have emerged, challenging the status quo and offering users a fresh perspective on computing.
One such alternative that has garnered significant attention and acclaim is Nitrux Linux 3.5.0, a sleek, powerful, and user-friendly Linux distribution that promises to redefine the way we interact with our devices. With its focus on performance, security, and customization, Nitrux Linux presents a compelling case for those seeking to break free from the constraints of proprietary software and embrace the freedom and flexibility of open-source computing.
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
PHP Frameworks: I want to break free (IPC Berlin 2024)Ralf Eggert
In this presentation, we examine the challenges and limitations of relying too heavily on PHP frameworks in web development. We discuss the history of PHP and its frameworks to understand how this dependence has evolved. The focus will be on providing concrete tips and strategies to reduce reliance on these frameworks, based on real-world examples and practical considerations. The goal is to equip developers with the skills and knowledge to create more flexible and future-proof web applications. We'll explore the importance of maintaining autonomy in a rapidly changing tech landscape and how to make informed decisions in PHP development.
This talk is aimed at encouraging a more independent approach to using PHP frameworks, moving towards a more flexible and future-proof approach to PHP development.
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
The Art of the Pitch: WordPress Relationships and SalesLaura Byrne
Clients don’t know what they don’t know. What web solutions are right for them? How does WordPress come into the picture? How do you make sure you understand scope and timeline? What do you do if sometime changes?
All these questions and more will be explored as we talk about matching clients’ needs with what your agency offers without pulling teeth or pulling your hair out. Practical tips, and strategies for successful relationship building that leads to closing the deal.
Elevating Tactical DDD Patterns Through Object CalisthenicsDorra BARTAGUIZ
After immersing yourself in the blue book and its red counterpart, attending DDD-focused conferences, and applying tactical patterns, you're left with a crucial question: How do I ensure my design is effective? Tactical patterns within Domain-Driven Design (DDD) serve as guiding principles for creating clear and manageable domain models. However, achieving success with these patterns requires additional guidance. Interestingly, we've observed that a set of constraints initially designed for training purposes remarkably aligns with effective pattern implementation, offering a more ‘mechanical’ approach. Let's explore together how Object Calisthenics can elevate the design of your tactical DDD patterns, offering concrete help for those venturing into DDD for the first time!
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex ProofsAlex Pruden
This paper presents Reef, a system for generating publicly verifiable succinct non-interactive zero-knowledge proofs that a committed document matches or does not match a regular expression. We describe applications such as proving the strength of passwords, the provenance of email despite redactions, the validity of oblivious DNS queries, and the existence of mutations in DNA. Reef supports the Perl Compatible Regular Expression syntax, including wildcards, alternation, ranges, capture groups, Kleene star, negations, and lookarounds. Reef introduces a new type of automata, Skipping Alternating Finite Automata (SAFA), that skips irrelevant parts of a document when producing proofs without undermining soundness, and instantiates SAFA with a lookup argument. Our experimental evaluation confirms that Reef can generate proofs for documents with 32M characters; the proofs are small and cheap to verify (under a second).
Paper: https://eprint.iacr.org/2023/1886
In his public lecture, Christian Timmerer provides insights into the fascinating history of video streaming, starting from its humble beginnings before YouTube to the groundbreaking technologies that now dominate platforms like Netflix and ORF ON. Timmerer also presents provocative contributions of his own that have significantly influenced the industry. He concludes by looking at future challenges and invites the audience to join in a discussion.
Securing your Kubernetes cluster_ a step-by-step guide to success !KatiaHIMEUR1
Today, after several years of existence, an extremely active community and an ultra-dynamic ecosystem, Kubernetes has established itself as the de facto standard in container orchestration. Thanks to a wide range of managed services, it has never been so easy to set up a ready-to-use Kubernetes cluster.
However, this ease of use means that the subject of security in Kubernetes is often left for later, or even neglected. This exposes companies to significant risks.
In this talk, I'll show you step-by-step how to secure your Kubernetes cluster for greater peace of mind and reliability.
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...UiPathCommunity
💥 Speed, accuracy, and scaling – discover the superpowers of GenAI in action with UiPath Document Understanding and Communications Mining™:
See how to accelerate model training and optimize model performance with active learning
Learn about the latest enhancements to out-of-the-box document processing – with little to no training required
Get an exclusive demo of the new family of UiPath LLMs – GenAI models specialized for processing different types of documents and messages
This is a hands-on session specifically designed for automation developers and AI enthusiasts seeking to enhance their knowledge in leveraging the latest intelligent document processing capabilities offered by UiPath.
Speakers:
👨🏫 Andras Palfi, Senior Product Manager, UiPath
👩🏫 Lenka Dulovicova, Product Program Manager, UiPath
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
A tale of scale & speed: How the US Navy is enabling software delivery from l...sonjaschweigert1
Rapid and secure feature delivery is a goal across every application team and every branch of the DoD. The Navy’s DevSecOps platform, Party Barge, has achieved:
- Reduction in onboarding time from 5 weeks to 1 day
- Improved developer experience and productivity through actionable findings and reduction of false positives
- Maintenance of superior security standards and inherent policy enforcement with Authorization to Operate (ATO)
Development teams can ship efficiently and ensure applications are cyber ready for Navy Authorizing Officials (AOs). In this webinar, Sigma Defense and Anchore will give attendees a look behind the scenes and demo secure pipeline automation and security artifacts that speed up application ATO and time to production.
We will cover:
- How to remove silos in DevSecOps
- How to build efficient development pipeline roles and component templates
- How to deliver security artifacts that matter for ATO’s (SBOMs, vulnerability reports, and policy evidence)
- How to streamline operations with automated policy checks on container images
Climate Impact of Software Testing at Nordic Testing DaysKari Kakkonen
My slides at Nordic Testing Days 6.6.2024
Climate impact / sustainability of software testing discussed on the talk. ICT and testing must carry their part of global responsibility to help with the climat warming. We can minimize the carbon footprint but we can also have a carbon handprint, a positive impact on the climate. Quality characteristics can be added with sustainability, and then measured continuously. Test environments can be used less, and in smaller scale and on demand. Test techniques can be used in optimizing or minimizing number of tests. Test automation can be used to speed up testing.
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfPaige Cruz
Monitoring and observability aren’t traditionally found in software curriculums and many of us cobble this knowledge together from whatever vendor or ecosystem we were first introduced to and whatever is a part of your current company’s observability stack.
While the dev and ops silo continues to crumble….many organizations still relegate monitoring & observability as the purview of ops, infra and SRE teams. This is a mistake - achieving a highly observable system requires collaboration up and down the stack.
I, a former op, would like to extend an invitation to all application developers to join the observability party will share these foundational concepts to build on:
2. Contents
• Basic Architecture of 3G ( W-CDMA ) system
• How do CDMA systems work?
• Channel structures of W-CDMA system
• A simplified flow of radio access
4. UMTS and 3G wireless
• Staged roll-out with "vintages" releases:
– Release 3 ("1999") GPRS data services
• Multimedia messaging service (MMS) = SMS successor ~ MIME email
• RAN via evolved CDMA
– Release 4: March 2001
– Release 5: March-June 2002
– Release 6: June 2003 all-IP network
• Main new features (affecting packet services):
– All-IP transport in the Radio Access and Core Networks
– Enhancements of services and service management
– High-speed Downlink Packet Access (HSDPA)
• Introduces additional downlink channels:
• High-Speed Downlink Shared Channel (HS-DSCH)
• Shared Control Channels for HS-DSCH
5. UMTS Data Rates
macrocell 2 km 144 kb/s
microcell 1 km 384 kb/s
picocell 60 m 2 Mb/s
• Follow-on to GSM, but WCDMA physical layer
• New spectrum around 2 GHz
• Radio transmission modes:
– frequency division duplex (FDD): 2 x 60 MHz
– time division duplex (TDD): 15 + 20 MHz
• Chip rate 3.84 Mcps channel bandwidth 4.4 – 5 MHz
6. UMTS QoS Class
conversational voice, video conferencing low delay, strict
ordering
streaming video streaming modest delay,
strict ordering
interactive web browsing, games modest delay
background email download no delay
guarantees
8. UMTS Architecture
UTRAN Packet switched Core Network
UE IP
server
Applic. Application
TCP GGSN TCP
Radio Access Bearers
IP IP IP IP
RNC SGSN
Radio Bearers
PDCP PDCP Iu UP Iu UP
GTP-U GTP-U
RLC GTP-U GTP-U GPRS
Logical channels RLC
IP backbone
MAC MAC UDP UDP UDP/ UDP/
Transport channels TCP IP routing
TCP
Node B PHY
PHY IP IP IP IP IP IP
FP FP
AAL2/ AAL2/ AAL5/ AAL5/
PHY ATM ATM ATM ATM
Physical channels
Uu Iub Iu Gn Gn/Gp Gi
10. UMTS Gateway Architecture
Legacy Mobile
Signaling Networks
Multimedia
IP Networks
Roaming Signaling Mm
Gateway (R-SGW)
Mh Ms
HSS CSCF Gi
Cx Mg
Mr
Gi MRF
Media Gateway Transport Switching
Gi Control Function Gateway (T-SGW)
(MGCF)
SGSN GGSN
Mc (= H.248)
Media Gateway
Media Gateway Gi PSTN/Legacy/External
(MGW)
(MGW)
Alves
12. IM Sub System
Call State Control Function (CSCF)
Home
Application
Subscription Subscriber
Server Server
Location Function
Interrogating-CSCF Sh
• Accesspoint to domain SLF HSS AS
• Hides topology and configuration
Diameter Diameter ISC
UE Dx Cx Cx SIP
Gm Mw Mw
UA P-CSCF I-CSCF S-CSCF
(User Agent)
SIP SIP SIP
Visited Home
Domain Domain Serving-CSCF
Proxy-CSCF • Session control services
• Registration, AS usage, charging, etc
Jalava
14. Spread Spectrum
• “Spread” the radio signal over a wide frequency range by
modulating it with a code word unique to the radio
• Receiver’s correlator distinguishes signals by examining the
spectrum with a time synchronised duplicate of the spreading
code
• Power limited system
• Direct Sequence Spread Spectrum(DSSS)
– Carrier is modulated by a digital code in which code bit rate is much
larger than information bit rate.
• Frequency Hopping Spread Spectrum
– Carrier frequency is shifted in discrete increments in a pattern
generated by a code sequence.
15. Multiple Access
GUARD BANDS
FDMA
USER # 5
USER # 4
USER # 3
FREQUENCY
USER # 2
FREQUENCY
USER # 1
TIME
TIME
TDMA
GUARD BANDS CDMA
USER # 1
USER # 2
4
USER #
5
USER #
3
USER #
Pseudocodes
FREQUENCY
FREQUENCY Pseudocode N
Pseudocode N+1
Pseudocode N+2
TIME Time
16. Concept of channels in W-CDMA
• Single Carrier of 5 MHz
• Separate Carrier for Uplink & Downlink
• Chip rate of 3.84 Mcps
• Channelisation codes & Scrambling codes Identify various
channels
19. Protocol Architecture for UMTS
C Plane U Plane
Radio
APPLICATION DATA STREAM
PART
Network
Transport Network Layer
Control Plane
Transport Network Transport Network
User Plane User Plane
Transport
Network
layer
20. Protocol in Iub Interface
C Plane U Plane
Node B Various Frame
Application Part
Transport Network Protocols
NBAP C Plane
ALCAP
Q2630.1
Q2150.2
SSCF-UNI SSCF-UNI
SSCOP SSCOP
AAL5 AAL5 AAL2
ATM Layer
Physical Layer
21. Protocol in Iur Interface
C Plane U Plane
Radio Network
Subsystem
Application Part
Transport Network Iur Data Streams
RNSAP C Plane
ALCAP
Transport Network Transport Network
User Plane Q2630.1 User Plane
Q2150.1
SCCP
MTP3-B ITUN MTP3-B ITUN
SSCF-NNI SCTP SSCF-NNI SCTP
SSCOP UDP/IP SSCOP UDP/IP
AAL5 AAL5 AAL2
ATM Layer
Physical Layer
22. Protocol in Iu Interface CS
C Plane U Plane
Radio Access
Network
Application Part
Transport Network Iu Protocol Layer
RANAP C Plane
ALCAP
Transport Network Transport Network
User Plane Q2630.1 User Plane
Q2150.1
SCCP
MTP3-B MTP3-B
SSCF-NNI SSCF-NNI
SSCOP SSCOP
AAL5 AAL5 AAL2
ATM Layer
Physical Layer
23. Protocol in Iu Interface PS
C Plane U Plane
Radio Access
Network
Application Part
Transport Network Iu Protocol Layer
RANAP C Plane
SCCP GTP-U
MTP3-B ITUN UPD
SSCF-NNI SCTP
SSCOP UDP/IP IP
AAL5 AAL5
ATM Layer
Physical Layer
24. UMTS Control Plane Protocol for CS Service
MM/CM/
MM/CM/
SMS
SMS
RELAY
RANAP
RRC
RRC RANAP
RLC SCCP SCCP
RLC
MTP3-B / MTP3-B /
SSCOP
SSCOP
MAC MAC
AAL5 AAL5
L1 L1 ATM ATM
Uu UTRAN Iu
MS 3G-MSC/VLR
25. UMTS User Plane Protocol for CS Services
Trans-coding
CS
function
application
like coded
voice RELAY
25.415 25.415
RLC RLC
MAC MAC
AAL2 AAL2
L1 L1 ATM ATM
Uu UTRAN Iu
MS 3G-MSC/VLR
26. UMTS Control Plane Protocol for PS
GMM/SM
GMM/SM
/SMS
/SMS
RELAY
RANAP
RRC
RRC RANAP
RLC SCCP SCCP
RLC
SIGNALLING
SIGNALLING
BEARER BEARER
MAC MAC
AAL5 AAL5
L1 L1 ATM ATM
Uu Iu
MS UTRAN 3G-SGSN
27. UMTS User Plane Protocol for PS
APPLICATION
IP,PPP,X.25, IP,PPP,X.25
OSP RELAY RELAY ,OSP
PDCP GTP-U GTP-U GTP-U GTP-U
PDCP
RLC RLC UDP/ UDP/ UDP/ UDP/IP
IP IP IP
MAC MAC AAL5 AAL5 L2 L2
L1 L1 ATM ATM L1 LI
Uu Iu Gn
MS UTRAN 3G-SGSN GGSN
34. UTRA ( FDD ) or W-CDMA
• Basic Physical Resource code/frequency/phase
• There are two types of codes
– Channelisation
– Scrambling
• In IS-95 their equivalent are
– Walsh codes
– PN sequences
• The Physical channel is defined by a combination of
these basic physical resources
• There are hierarchical channel resources from radio
resource perspective
35. Types of Uplink Physical Channels
• Dedicated physical channels ( DPCH )
• Common physical channels
– Random Access Channel ( PRACH )
– Common Packet Channel ( PCPCH )
• Each physical channel has a associated
separate control channel
43. Downlink AICH
4096 chips 1024 chips
AI Empty
5120 CHIPS
AS AS AS
AS AS AS AS AS
Slot Slot Slot
Slot 0 Slot 2 Slot 4 Slot 6 Slot 8
AS AS 10 AS 12 AS 14
AS AS AS
Slot 3 Slot 5 Slot Slot
Slot 1 Slot 7 Slot 9
11 13
Two Frame 20ms
44. Downlink AP-AICH
4096 chips 1024 chips
API Empty
5120 CHIPS
AS AS AS
AS AS AS AS AS
Slot Slot Slot
Slot 0 Slot 2 Slot 4 Slot 6 Slot 8
AS AS 10 AS 12 AS 14
AS AS AS
Slot 3 Slot 5 Slot Slot
Slot 1 Slot 7 Slot 9
11 13
Two Frame 20ms
45. Downlink CD/CA-ICH
4096 chips 1024 chips
CDI/CAI Empty
5120 CHIPS
AS AS AS
AS AS AS AS AS
Slot Slot Slot
Slot 0 Slot 2 Slot 4 Slot 6 Slot 8
AS AS 10 AS 12 AS 14
AS AS AS
Slot 3 Slot 5 Slot Slot
Slot 1 Slot 7 Slot 9
11 13
Two Frame 20ms
46. Downlink CSICH
4096 chips 1024 chips
Tx Off SI
5120 CHIPS
AS AS AS
AS AS AS AS AS
Slot Slot Slot
Slot 0 Slot 2 Slot 4 Slot 6 Slot 8
AS AS 10 AS 12 AS 14
AS AS AS
Slot 3 Slot 5 Slot Slot
Slot 1 Slot 7 Slot 9
11 13
Two Frame 20ms
47. Downlink PICH
• There are certain number of Paging Indicator per frame
• The number of bits per Paging indicator depend upon the
number of Paging Indicators
• A UE is always associated to a Paging indicator
12 Bits
288 Bits used for Paging
Unused
300 Bits
Slot 4 Slot 8 Slot 12
Slot 0
Slot 1 Slot 9
Slot 2 Slot 3 Slot 5 Slot 13
Slot 6 Slot 1 0
Slot 7 Slot 11 Slot 14
Frame of 10ms
50. Mapping Between Transport & Physical Channels
TRANSPORT CHANNELS
BCH PCH RACH FACH DSCH DCH CPCH
P-CCPCH S-CCPCH PRACH PDSCH DPDCH PCPCH
PHYSICAL CHANNELS
Note : CPICH , SCH , DPCCH , AICH ,PICH don’t have
any transport channel associated with them .
57. Logical Channel Types
• Control Logical Channels
– Broadcast Control Channel ( BCCH )
– Paging Control Channel ( PCCH )
– Dedicated Control Channel ( DCCH )
– Common Control Channel ( CCCH )
– Shared Channel Control Channel ( SHCCH )
• Traffic Logical Channels
– Dedicated Traffic Channel ( DTCH )
– Common Traffic Channel ( CTCH )
58. Mapping Between Logical & Transport Channels
LOGICAL CHANNELS
BCCH PCCH CCCH DCCH DTCH CTCH
BCH PCH RACH FACH DSCH DCH CPCH
TRANSPORT CHANNELS
59. UTRAN MAC Architecture
BCCH CTCH MCCH MTCH
MAC Control MAC Control PCCH CCCH SHCCH MAC ControlMAC ControlDCCH DTCH DTCH
TDD only
MSCH MAC Control
MAC-es
MAC-d
Configuration Configuration
without MAC c/sh - with MAC c/sh
MAC-e MAC-hs Configuration MAC-c/sh/m
with MAC -c/sh
E-DCH HS- DSCH HS- DSCH
Iub PCH FACH FACH RACH USCH USCH DSCH DSCH Iur or local DCH DCH
TDD only TDD only
TDD only TDD only
Associated Downlink Associated Uplink Associated Downlink Associated Uplink
Signalling Signalling Signalling Signalling
61. Cell Search/Identification
• The Primary synchronization code is the same for
every cell in the system
• The Secondary synchronization code is a
sequence of 15 codes from a set of 16 codes
• Each cell is allocated one and only one primary
scrambling code
• Scrambling codes are divided into 64 code groups
; each code group having 8 primary scrambling
codes . Each primary scrambling code has
associated 15 secondary scrambling codes
62. W-CDMA Cell Setup
NODE-B RNC
RESOURCE STATUS INDICATION
CELL SETUP REQUEST
CELL SETUP RESPONSE
COMMON TRANSPORT CHANNEL SETUP
COMMON TRANSPORT CHANNEL SETUP RESPONSE
SYSTEM INFORMATION
63. Mobile States
CONNECTED STATES
CELL_URA
CELL_PCH
CELL_DCH
CELL_FACH
IDLE STATE
IDLE STATE IDLE STATE
64. RRC Connection Setup In Dedicated Mode
UE Node B Serving
Serving RNS RNC
1. CCCH : RRC Connection Request
RRC
RRC
Allocate RNTI
Select L1 and L2
parameters
2. Radio Link Setup Request
NBAP NBAP
Start RX
description
3. Radio Link Setup Response
NBAP NBAP
4. ALCAP Iub Data Transport Bearer Setup
5. NodeB-SRNC Data Transport Bearer Sync
Start TX
description
6. CCCH : RRC Connection Setup
RRC RRC
7. DCCH : RRC Connection Setup Complete
RRC RRC
65. Hand Off in CDMA
• Hard Handoff
• Softer Handoff
• Soft Handoff
66. Soft Handover
Antenna
s T P A
T P A Linear
s Comb.
s T P A
• Mobile moves towards edge of cell
• BS detects low power
• MS spreading code sent to candidate BS
• Signals from both BS combined by Rake Reciever
• All fingers correlate with rays from new site
• Old BS drops mobile spreading code