Académique Documents
Professionnel Documents
Culture Documents
Motorola and the Motorola logo are registered trademarks of Motorola Inc.
M-Cell™, Taskfinder™ and Intelligence Everywhere™ are trademarks of Motorola Inc.
All other brands and corporate names are trademarks of their respective owners.
CE Compliance
Email: csc.emea@motorola.com
Chapter 1: Introduction
Objectives . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1- 3
WCDMA Technology and Deployment Status . . . . . . . . . . . . . . . . . . . . . . . . . . . 1- 4
HSPA Standardization and Deployment Schedule. . . . . . . . . . . . . . . . . . . . . . . . . 1- 6
Radio Capability Evolution with HSPA . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1- 8
Higher Cell Capacity and Higher Spectral Efficiency . . . . . . . . . . . . . . . . . . . . . 1-10
WCDMA/HSPA Standardization and Background . . . . . . . . . . . . . . . . . . . . . . . . . 1-12
3rd Generation Partnership Project (3GPP) . . . . . . . . . . . . . . . . . . . . . . . . . . 1-12
Long Term Evolution (LTE) of the 3GPP Radio Technology . . . . . . . . . . . . . . . . . . . . 1-14
LTE Detailed Requirements . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-14
Chapter 6: MAC, RLC, BMC, PDCP and RRC Protocols and Procedures
Objectives . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6- 3
Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6- 4
Layer 2 Protocols. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6- 4
Layer 3 Protocols. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6- 4
Medium Access Control (MAC) Protocol . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6- 6
Transport Formats . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6- 8
Radio Link Control (RLC) Protocol . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6-10
Transparent Mode (TM) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6-10
Unacknowledged Mode (UM) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6-10
Acknowledged Mode (AM) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6-10
Packet Data Convergence Protocol (PDCP) . . . . . . . . . . . . . . . . . . . . . . . . . . . 6-12
Broadcast/Multicast Control (BMC) Protocol . . . . . . . . . . . . . . . . . . . . . . . . . . . 6-14
Radio Resource Control (RRC) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6-16
RRC Procedures . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6-18
Broadcast of System Information.. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6-18
Cell Selection/Re-selection . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6-20
UE State Transition Algorithm . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6-22
RRC connection establishment . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6-24
Establishment of signalling connections between the UE and the Core Network and direct
transfer of signalling messages. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6-24
Radio bearer establishment . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6-26
Measurement Procedures . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6-28
Chapter 1
Introduction
Objectives
On completion of this chapter the student should be able to:
• State the WCDMA Technology and Deployment Status
• State the HSxPA Standardization and Deployment Schedule
• Describe the Radio Capability Evolution with HSPA
• Describe the WCDMA/HSxPA Standardization and Background
• State how the HSxPA standard migrates towards LTE
S1
X2 E-UTRAN
eNB eNB
X2
X2
eNB
Note: K ey P oints:
MME = Mobility Management E ntity • 100mbps DL 50mbps UL
UP E = User P lane E ntity
• S hort control and us er plane latenc y
• G reater s pec tral efficiency
• UT R AN and G E R AN compatible
S1
X2 E-UTRAN
eNB eNB
X2
X2
eNB
Note: K ey P oints:
MME = Mobility Management E ntity • 100mbps DL 50mbps UL
UP E = User P lane E ntity
• S hort control and us er plane latenc y
• G reater s pec tral efficiency
• UT R AN and G E R AN compatible
Chapter 2
Network Architecture
Objectives
On completion of this chapter the student should be able to:
• Name and state the purpose of the UMTS Domains
• Describe the architecture of a UMTS network.
• Describe the purpose of the major network components.
• Describe the options for evolution to future releases.
UMTS Domains
Domain split
A basic architectural split is between the user equipment (terminals) and the infrastructure. This results
in two domains: the User Equipment Domain and the Infrastructure domain. User equipment is the
equipment used by the user to access UMTS services. User equipment has a radio interface to the
infrastructure. The infrastructure consists of the physical nodes which perform the various functions
required to terminate the radio interface and to support the telecommunication services requirements
of the users. The infrastructure is a shared resource that provides services to all authorised end
users within its coverage area. The reference point between the user equipment domain and the
infrastructure domain is termed the "Uu" reference point (UMTS radio interface).
USIM Domain
The USIM contains data and procedures which unambiguously and securely identify itself. These
functions are typically embedded in a standalone smart card. This device is associated to a given
user, and as such allows to identify this user regardless of the ME he uses.
Infrastructure Domain
The Infrastructure domain is further split into the Access Network Domain, which is characterized by
being in direct contact with the User Equipment and the Core Network Domain. This split is intended
to simplify/assist the process of de-coupling access related functionality from non-access related
functionality and is in line with the modular principle adopted for the UMTS. The Access Network
Domain comprises roughly the functions specific to the access technique, while the functions in the Core
network domain may potentially be used with information flows using any access technique. This split
allows for different approaches for the Core Network Domain, each approach specifying distinct types
of Core Networks which can be connected to the Access Network Domain, as well as different access
techniques, each type of Access Network connected to th Core Network Domain. The reference point
between the access network domain and the core network domain is termed the "lu" reference point.
UMTS Domains
Home
Network
Domain
[Zu]
Cu Uu Iu [Yu]
SIM
CARD
Serving Transit
Network Network
Domain Domain
UMTS Domains
Access Network Domain
The Access Network Domain consists of the physical entities which manage the resources of the
access network and provides the user with a mechanism to access the core network domain.
UMTS Domains
Home
Network
Domain
[Zu]
Cu Uu Iu [Yu]
SIM
CARD
Serving Transit
Network Network
Domain Domain
CS Domain
The CS domain refers to the set of all the CN entities offering "CS type of connection" for user
traffic as well as all the entities supporting the related signalling. A "CS type of connection" is a
connection for which dedicated network resources are allocated at the connection establishment
and released at the connection release. The entities specific to the CS domain are:
• MSC - The Mobile-services Switching Centre
• GMSC - Gateway Mobile Service Switching Centre
• VLR - Visitor Location Register
PS Domain
The PS domain refers to the set of all the CN entities offering "PS type of connection"
for user traffic as well as all the entities supporting the related signalling. A "PS type of
connection" transports the user information using autonomous concatenation of bits called
packets: each packet can be routed independently from the previous one. The entities
specific to the PS domain are the GPRS specific entities, i.e.
• SGSN - Serving GPRS Support Node
• GGSN - Gateway GPRS Support Node
HLR
PSTN PSTN Gr
D Gn
EIR
VLR G
F Gf
VLR
MSC E SGSN
Gs
MSC CN
IuCS IuPS Gb
A
BSS RNS IuPS IuCS RNS BSS
BSC RNC Iur RNC BSC
Abis lub lub Abis
Um MS Um
Uu
ME
SIM-ME I/f
Cu
SIM or USIM
HLR
PSTN PSTN Gr
D Gn
EIR
VLR G
F Gf
VLR
MSC E SGSN
Gs
MSC CN
IuCS IuPS Gb
A
BSS RNS IuPS IuCS RNS BSS
BSC RNC Iur RNC BSC
Abis lub lub Abis
Um MS Um
Uu
ME
SIM-ME I/f
Cu
SIM or USIM
CN-CS CN-PS
CN Domain
GMSC GGSN
HLR
VLR
AuC
MSC SGSN
OMC-U UTRAN
(UTRAN)
RNS RNS
RNC RNC
Iur
Iub Iub Iub Iub
Uu
User Equipment
CN-CS CN-PS
CN Domain
GMSC GGSN
HLR
VLR
AuC
MSC SGSN
OMC-U UTRAN
(UTRAN)
RNS RNS
RNC RNC
Iur
Iub Iub Iub Iub
Uu
User Equipment
UMTS Network R4
In R4 the separation of the switching and call control functions within the core network is commonly
referred to as a softswitch architecture. The call control component, i.e. the MSC server, is the
softswitch in this case. This separation of functions makes it easier to scale the network as
the traffic demand increases. If the network planners require more switching capacity they can
add MGWs; if they require more call control capacity they then add more MSC servers. This is
a clear distinction from the UMTS Release 99 and GSM networks, in which the call control and
switching functions are all carried out within the MSC and gateway MSC (GMSC).
MSC Server
This performs functions such as call control for mobile-originated and mobile-terminated calls, and
mobility management in terms of maintenance of the registry of mobiles within its area of control.
The MSC server integrates with the Visitor Location Register (VLR) component, which holds
location information as well as CAMEL (customized applications for mobile network enhanced
logic) data for subscribers. Functions carried out by the MSC server include:
• Controlling the registration of mobiles to provide mobility management;
• Providing authentication functions;
• Routing mobile-originated calls to their destination;
• Routing mobile-terminated calls by using paging to individual mobiles.
The MSC server terminates signalling from the mobile network over the Iu interface to the RNC. It also
controls the establishment of bearers across its core by the use of MGWs under its control.
UMTS Network R4
Network Management (NMS)
CN CS Domain
Um MSC Server
GERAN
HLR/VLR/EIR
Uu
UTRAN CN PS Domain
Um
PSTN/ISDN
GERAN
BTS BSC
CN PS Domain
SGSN GGSN
Uu ATM/IP IMS
UTRAN
HSS
NODEB RNC
IP Multimedia
UTRAN Functions
The following is a list of the functions performed by the UTRAN sub-systems. These
functions will be discussed in further detail in later chapters.
• Admission Control
• Congestion Control
• System information broadcasting
• Handover
• SRNS Relocation
Core Network
Iu Iu
RNS RNS
Iur
RNC RNC
· Admission Control
C-RNC Iu Iu C-RNC
lur
· Hand-Over Decisions
S-RNC
· No L2 Processing
S-RNC D-RNC
• Transport subsystem.
• Baseband subsystem.
• Control subsystem
• Antenna and feeder subsystem
Transport subsystem
It’s responsible for the termination of the IuB interface connecting the Horizon 3G-n to
RNC to exchange information and performs ATM switching
It is formed by two boards: NDTI (NodeB Digital Trunk Interface) and NAOI
(NodeB ATM Optical Interface)
Baseband subsystem
The baseband subsystem processes uplink and downlink signals at the physical
layer, and includes the following functions:
Figure 2-1
Transport Baseband RF
Subsystem Subsystem Subsystem
RNC Antenna
Control Subsystem
H3G-n macro
Control subsystem
The control subsystem provides the control of the entire Horizon 3G-n macro Indoor, provides the
system synchronization clock, alarm management, IuB signal termination, resource and configuration
management environment monitoring, and control the RET antennas system.
The control subsystem is formed by two boards: NMON (NodeB Monitor Unit) and
NMPT (NodeB Main Processing and Timing Unit).
• Antenna.
• Feeder.
• TMA ( Optional)
Figure 2-2
Duplexer
HDLP Rx1
TMA
Tx PA Tx
NMPT
NMON
Control
subsystem
· Speech Only
· Videophones
· Data Terminals
· Fax Terminals
· Multiband/Multimode Terminals
USER USER
APPLICATION APPLICATION
USER
EQUIPMENT TERMINAL TERMINAL
(UE) EQUIPMENT EQUIPMENT
TAF
USIM NT CORE
NETWORK
Tu
IC CARD Iu
RT UTRAN
MT
MOBILE
EQUIPMENT
TAF
The TAF provided the interaction between the TE and MT, via the R interface/reference
point. This may include the ability of the TE to control the MT by, for example, the use
of commands sets ( e.g. Modem AT control commands).
MT
The MT is the telecom service independent, but UMTS dependent portion of the UE which terminates
the radio transmissions to and from the network. Within the MT two further modules are defined.
The Radio Termination (RT) which is dependent upon the the radio access network. A
single RT will provide common functions for all services using the same radio access
technology. For UMTS the RT terminates the UTRAN physical layer (Uu interface) and also
encompasses the Access-Stratum layer 2 and layer three protocols.
The RT interfaces to the Network Termination (NT), at the Tu reference points. While the RT
is RAN dependent, the NT is CN dependent, and thus terminates, at the serving network, the
Non-access Stratum layer 3 protocols, for functions such as mobility management, call control, session
management, etc. To fulfil many of these functions, the NT must have access to information stored on
the USIM (e.g. security information), this is accessed via the interface at the Cu reference points.
USER USER
APPLICATION APPLICATION
USER
EQUIPMENT TERMINAL TERMINAL
(UE) EQUIPMENT EQUIPMENT
TAF
USIM NT CORE
NETWORK
Tu
IC CARD Iu
RT UTRAN
MT
MOBILE
EQUIPMENT
Network Services
Objectives
On completion of this chapter the student should be able to:
• Describe the UMTS service classifications
• Describe Quality of Service Architecture
• Describe the UMTS Security Architecture
End-to-end QoS
Security Functions
Service Creation Layer
End-to-end Services
CN Bearer
Radio Access Bearer Services Services
Conversational Class
The most well known use of this scheme is telephony speech (e.g. GSM). But with Internet and
multimedia a number of new applications will require this scheme, for example voice over IP and video
conferencing tools. Real time conversation is always performed between peers (or groups) of live
(human) end-users. This is the only scheme where the required characteristics are strictly given by
human perception. (e.g. The real time data flow is always aiming at a live (human) destination).
Streaming Class
This scheme is one of the newcomers in data communication, raising a number of new requirements in
both telecommunication and data communication systems. It is characterised by the fact that the time
relations (variation) between information entities (i.e. samples, packets) within a flow shall be preserved,
although it does not have any requirements on low transfer delay. The delay variation of the end-to-end
flow shall be limited, to preserve the time relation (variation) between information entities of the stream.
When the user is looking at (listening to) real time video (audio) the scheme of real time streams applies.
Interactive class
Interactive traffic is the other classical data communication scheme that on an overall level is
characterised by the request response pattern of the end-user. At the message destination there is an
entity expecting the message (response) within a certain time. Round trip delay time is therefore one
of the key attributes. Another characteristic is that the content of the packets shall be transparently
transferred (with low bit error rate). Examples are: web browsing, data base retrieval, server access.
Background Task
Background traffic is one of the classical data communication schemes that on an overall level
is characterised by that the destination is not expecting the data within a certain time. The
scheme is thus more or less delivery time insensitive. Another characteristic is that the content
of the packets shall be transparently transferred (with low bit error rate).
Examples are background delivery of E-mail notification, SMS, download of databases
and reception of measurement records.
Description of Terminology
In the sub sections below the terminology used in the slides is explained.
Traffic Type
The bearer requirements are that the following is provided:
• Guaranteed/constant bit rate;
• Non-guaranteed/dynamically variable bit rate;
• Real time dynamically variable bit rate with a minimum guaranteed bit rate.
• Real time and non real time services
Traffic Characteristics
Point-to-point services to be provided:
• Uni-directional — Service offered in one direction;
• Bi-directional — Service offered in both directions;
• Symmetric — The data rate is roughly the same uplink and downlink;
• Asymmetric — The data rate is more heavily weighted in one direction.
Uni-directional Point-to-Multipoint:
• Multicast — Thie end user is specified before the connection is established. Multicast
Broadcast Multimedia Service (MBMS) is an example of this:
• Broadcast — The messages are broadcast to to all UE”s and the end user is not
known before. Cell Broadcast is an example of this.
T rans parent Data S ervice 64 kbit/s , 56 kbit/s , 32 kbit/s , and 28.8 kbit/s
Non-trans parent Data S ervice 57.6 kbit/s , 28.8 kbit/s , and 14.4 kbit/s
B idirectional s ymmetric or as ymmetric 384 kbit/s , 256 kbit/s , 144 kbit/s , 128
background s ervice kbit/s , 64 kbit/s , 32 kbit/s , 16 kbit/s and
8 kbit/s
Home
(V) (III) (I) Stratum/
(I)
TE USIM HE Serving
Stratum
(II)
(I) (I)
SN
Transport
(I) Stratum
MT AN
Network authentication:
The property that the user corroborates that he is connected to a serving network that is authorised by
the users HE to provide him services; this includes the guarantee that this authorisation is recent.
Confidentiality
Cipher algorithm agreement: the property that the MS and the SN can securely
negotiate the algorithm that they shall use subsequently;
Cipher key agreement: the property that the MS and the SN agree on a cipher
key that they may use subsequently;
Confidentiality of user data: the property that user data cannot be
overheard on the radio access interface;
Confidentiality of signalling data: the property that signalling data cannot be
overheard on the radio access interface.
Data integrity
Integrity algorithm agreement: the property that the MS and the SN can securely negotiate
the integrity algorithm that they shall use subsequently;
Integrity key agreement: the property that the MS and the SN agree on an
integrity key that they may use subsequently;
Data integrity and origin authentication of signalling data: the property that the
receiving entity (MS or SN) is able to verify that signalling data has not been modified in
an unauthorised way since it was sent by the sending entity (SN or MS) and that the data
origin of the signalling data received is indeed the one claimed.
MS SN/VLR HE/HLR
Authentication request
Distribution Generate
authentication vectors vectors AV (1 . . . n)
from HE to SN Authentication data respons e
AV (1 . . . n)
Verify AUTN(i)
compute User authentication Authentication Key
RES(i)
Compare RES(i) and XRES(i)
Ciphering Algorithms
The ciphering algorithms used in UMTS are shown on the slide opposite. As can be seen a
lot of different algorithms are active in the UMTS system. Algorithms f1 to f5 are of the type
that are used to compute numbers for use in authentication procedures.
Two very important algorithms, f8 and f9 are also shown, they have the following functions.
F8
This algorithm will perform the ciphering function. The ciphering function is performed either in
the RLC sub-layer or in the MAC sub-layer according to the following rules:
• If a radio bearer is using a non-transparent RLC mode (AM or UM), ciphering
is performed in the RLC sub-layer.
• If a radio bearer is using the transparent RLC mode, ciphering is performed
in the MAC sub-layer (MAC-d entity).
Ciphering when applied is performed in the S-RNC and the ME and the context needed for
ciphering (CK, Count-C, etc.) is only known in S-RNC and the ME.
F9
Most of the control signalling information elements that are sent between the MS and the network
are considered sensitive and must be integrity protected. Therefore a message authentication
function has been developed to solve this problem. The MS will still go through the initial
RRC connection establishment sequence and perform the set-up security functions. After this
however some signalling messages will be encoded using the f9 algorithm. This will be the
case for all RRC, MM, CC, GMM and SM Messages. The MM procedure in the MS will be
the process responsible for starting the integrity protection procedure.
AK Anonymity Key
AKA Authentication and key agreement
AUTN Authentication Token
MAC The message authentication code included in AUTN, computed using f1
XRES Expected Response
Ciphering Algorithms
· K-Long-term secret key shared between the USIM and the AuC
Algorithms f1 -f5
Subsequently the following values are computed using the various algorithms (f1 - f5):
A message authentication code MAC = f1K(SQN || RAND || AMF) where f1 is
a message authentication function.
An expected response XRES = f2K (RAND) where f2 is a (possibly truncated)
message authentication function.
A cipher key CK = f3K (RAND) where f3 is a key generating function.
An integrity key IK = f4K (RAND) where f4 is a key generating function.
An anonymity key AK = f5K (RAND) where f5 is a key generating function.
AUTN and AV
Finally the authentication token (AUTN = SQN ⊕ AK || AMF || MAC) and the authentication Vector
(AV:=RAND||XRES||CK||IK||MAC) are constructed from the products of the algorithms.
Here, AK is an anonymity key used to conceal the sequence number as the latter may expose
the identity and location of the user. The concealment of the sequence number is to protect
against passive attacks only. If no concealment is needed then f5 ≡ 0 (AK = 0).
Generate SQN
Generate RAND
SQN RAND
AMF
K
f1 f2 f3 f4 f5
MAC XRES CK IK AK
Retrieval of SQN
Upon receipt of RAND and AUTN the USIM first computes the anonymity key AK = f5K (RAND)
and retrieves the sequence number SQN = (SQN ⊕ AK) ⊕ AK.
Computation of X-MAC
Next the USIM computes XMAC = f1K (SQN || RAND || AMF) and compares this with MAC which is
included in AUTN. If they are different, the user sends user authentication reject back to the VLR/SGSN
with an indication of the cause and the user abandons the procedure. In this case, VLR/SGSN
shall initiate an Authentication Failure Report procedure towards the HLR. VLR/SGSN may also
decide to initiate a new identification and authentication procedure towards the user.
Verification of SQN
Next the USIM verifies that the received sequence number SQN is in the correct range.
If the USIM considers the sequence number to be not in the correct range, it sends synchronisation
failure back to the VLR/SGSN including an appropriate parameter, and abandons the procedure.
If the sequence number is considered to be in the correct range however, the USIM computes RES =
f2K (RAND) and includes this parameter in a user authentication response back to the VLR/SGSN.
Computation of CK and IK
Finally the USIM computes the cipher key CK = f3K (RAND) and the integrity key IK = f4K (RAND).
USIM shall store original CK, IK until the next successful execution of AKA.
RAND AUTN
AK
SQN
K
(USIM)
f1 f2 f3 f4
XMAC RES CK IK
IK
The integrity key IK is 128 bits long. There may be one IK for CS connections (IKCS)
and one IK for PS connections (IKPS). IK is established during UMTS AKA as the
output of the integrity key derivation function f4.
FRESH
The network-side generated FRESH message is 32 bits long. There is one FRESH parameter
value per user. The input parameter FRESH protects the network against replay of signalling
messages by the user. At connection set-up the RNC generates a random value FRESH and
sends it to the user in the (RRC) security mode command. The value FRESH is subsequently
used by both the network and the user throughout the duration of a single connection. This
mechanism assures the network that the user is not replaying any old MAC-Is.
DIRECTION
The direction identifier DIRECTION is 1 bit long. The direction identifier is input to avoid the
use of identical set of input parameter values up-link and down-link messages. The value of the
DIRECTION is 0 for messages from UE to RNC and 1 for messages from RNC to UE.
MESSAGE
The signalling message itself with the radio bearer identity. The latter is appended in front
of the message. Note that the radio bearer identity is not transmitted with the message
but it is needed to avoid the circumstance where for different instances of message
authentication codes the same set of input parameters is used.
COUNT-I DIRECT
ION COUNT-I DIREC
TION
IK f9 IK f9
MAC-I XMAC-I
Sender Receiver
UE or RNC RNCor UE
The diagram opposite illustrates the use of the ciphering algorithm f8 to encrypt plaintext by
applying a keystream using a bit per bit binary addition of the plaintext and the ciphertext.
The plaintext may be recovered by generating the same keystream using the same input
parameters and applying a bit per bit binary addition with the ciphertext.
CK
The Cipher key CK is 128 bits long. There may be one CK for CS connections (CKCS)
and one CK for PS connections (CKPS). CK is established during UMTS AKA as the
output of the integrity key derivation function f3.
BEARER
The radio bearer identifier BEARER is 5 bits long.
There is one BEARER parameter per radio bearer associated with the same user and multiplexed
on a single 10ms physical layer frame. The radio bearer identifier is input to avoid the condition
where for different keystream an identical set of input parameter values is used.
DIRECTION
The direction identifier DIRECTION is 1 bit long. The direction identifier is input to avoid the
use of identical set of input parameter values up-link and down-link messages. The value of the
DIRECTION is 0 for messages from UE to RNC and 1 for messages from RNC to UE.
LENGTH
The length indicator LENGTH is 16 bits long. The length indicator determines the
length of the required keystream block. LENGTH shall affect only the length of the
KEYSTREAM BLOCK, not the actual bits in it.
CK f8 CK f8
KEYSTREAM KEYSTREAM
BLOCK BLOCK
PLAINTEXT CYPHERTE
XT
BLOCK BLOCK
Sender Receiver
UE or RNC RNCor UE
Chapter 4
W-CDMA Theory
Objectives
On completion of this chapter the student should be able to:
• Describe various options for multiple access schemes.
• State the Characteristics of UMTS W-CDMA.
• State why W-CDMA has been chosen for the UMTS multiple access scheme.
• Describe W-CDMA spreading and despreading procedures.
• Describe the use of orthagonal codes and the channelisation code tree.
• Describe the scrambling and summation process.
• Describe the effects of multi-path radio channels and the purpose of the RAKE receiver.
Power Time
FDMA
Power Frequency
Time
TDMA
Frequency
Codes Time
CDMA
Frequency
W-CDMA Characteristics
The vital statistics for our W-CDMA UMTS system is shown opposite. Don’t be confused
by the slots and frames, this is not a TDMA system, every user does share the same band.
The frames and slots are used for interleaving, power control.
The major points are:
FDD requires paired frequencies for up and down channels.
The chip rate of 3.84 Mcps provides a bandwidth of 5 MHz. A chip is the original
signal split or chipped by the spreading code.
The carrier spacing of 200 kHz is used to allow re-farming of GSM frequencies
which have been set at 200 kHz spacing.
The frame length is set at 10 ms. Each frame is split into 15 timeslots, each timeslot
contains user data, power control and signalling data.
The UMTS system does not require synchronisation due to the framing structure and
use of matched filters for the framing alignment.
The spreading factor is the ratio between the user data and the chip rate. As the user
data increases this factor will vary between 4 and 512. The spreading factor is a rough
indication of the number of users in the system.
The user data rates available in the FDD system is up to 384 Kbps.
W-CDMA Characteristics
Re-Use of Frequency
Mobile telephones and cell broadcast networks use cellular radio, a technique developed in
recent years to enable the use of mobile telephones. It would be impossible to provide each
phone with an individual radio frequency, so the idea of cellular radio evolved.
A region is divided into geographical areas called cells, varying in size depending on the number of
users in the area. In cities cells are small whereas in rural areas cells are much larger.
In GSM cells use a set of frequencies that are different from any neighbouring cell, but can
be the same as another cell as long as it is far enough away.
For UMTS, a frequency re-use of one, may be employed. This means that all cells within a given
geographical area, or even an entire network may use the same carrier frequency.
An alternate method of discriminating between neighbouring cells must therefore be found.
Re-Use of Frequency
2 5
4 7
2
1 6 4
6
5 3 1
7 2 5 3
4 7 2 5
6 4 7 2
1
3 1 6 4
5 3 1 6
7 2 5 33
4 7 2
1 6 4
3 1
Re-Use of Codes
Codes are used to uniquely identify a cell in the network. Frequency planning is more or less a thing of the
past but code planning will have to be implemented. Code planning will be much easier then frequency
planning since we have 512 Codes to play with, the code re-use pattern will thus be extremely large.
Codes can be reused when the separation between cells containing the same channel set is far
enough apart so that co-channel interference can be kept below acceptable levels. The number of
cells in a cluster is 512, which provides greater separation between co-channel cells than GSM.
Re-Use of Codes
1 10
5 2 11
7 4 4
30 6 17 19
31 28 15 12
29 7 16 18
1 27 4 22 20
26 14 6 21
25 13 23 39
32 2 5 38
34 33 24
36 37 40
35 41
GSM UMTS
Receiver
The modulated carrier is moved by the radio demodulator to the digital demodulator which
can be very complicated due to the large number of users.
Here the input is multiplied by the de-spreading codes to produce digital speech.
Single User Channel Multiple User Channel Multiple User Channel Output
Input
External Interference
0 t0
Spreading
The spreading operation is the multiplication of each user data bit with a "Spreading Code" , which
is a pre-defined bit pattern. To discriminate between User data "bits" and spreading code "bits", the
symbols in the spreading code are referred to as "Chips". The chip rate for UMTS is fixed at 3.84 Mcps.
After the spreading operation each "Bit" of the data signal is represented by a number of "chips".
The number of chips representing each bit is referred to as the Spreading Factor (SF) and is
given by dividing the chip rate by the source signal bit rate; in this example:
3.84
Mcs / 480 kbps = (SF=8)
The spreading operation has resulted in an increase of the "signalling rate of the user data, in this case
by a factor of 8, and corresponds to a widening of the "spectrum" occupied by the user data signal.
Due to this, CDMA systems are more generically referred to as "Spread Spectrum" systems.
The SF is also referred to as the Processing Gain (PG), which is expressed as a Decibel ratio and
describes the gain or amplitude increase that will be applied to the signal at the receiving station as a
result of the de-spreading operation. This concept is described in more detail later in this chapter
Spreading
Data 1
480 kB/s –1
Spreading
Code 1
3.84 Mcs –1
Spread 1
Data –1
De-spreading
De-spreading is performed at the receiving station (UE or Node B) by multiplying the chip rate,
spread user data signal by a chip rate spreading code. By using the same spreading code
as used at the transmitting station for the spreading operation, the multiplication of the two
chip rate signals will reproduce the original bit rate user data signal.
To aid accurate recovery of the user data, a Correlation Receiver is employed in most CDMA
systems. The correlation receiver integrates the product of the de-spreading process on a
chip-by-chip basis. In the upper diagram opposite, the example shown illustrated that for a perfectly
received de-spread signal, the correlation receiver output has effectively "Lifted" the amplitude
of the received signal by a factor of 8, a function of the processing gain.
De-spreading
Spread 1
Data –1
Spreading 1
Code –1
Correlation
RX
Integrator
O/P
Recovered 1
Data –1
Orthogonal Codes
Transmissions from a single source are separated by channelisation codes. The channelisation codes
of UTRA are based upon the Orthogonal Variable Spreading Factor (OVSF) technique.
There are a finite number of OVSF codes available, and some restrictions in their use.
OVSF codes are, as their name implies, orthogonal codes. Orthogonal codes possess good
cross correlation properties allowing easy discrimination between signals produced using correctly
selected codes. For OVSF the cross correlation between codes is zero, meaning interferer
signals between different codes is effectively "zero" after correlation.
Orthogonal Codes
Channelisation Code Tree
Cch, 8, 0
Cch, 4, 0 (1, 1, 1, 1, 1, 1, 1, 1)
(1, 1, 1,1) Cch, 8,1
Cch, 2, 0
(1, 1, 1, 1, -1, -1, -1, -1)
(1, 1) Cch, 8,2
Cch, 4, 1 (1, 1, -1, -1, 1, 1, -1, -1)
(1, 1, -1, -1) Cch, 8,3
Cch, 1, 0
(1, 1, -1, -1,- 1, -1, 1, 1)
(1) Cch, 8,4
Cch, 4, 2 (1, -1, 1,- 1, 1,-1, 1, -1)
Cch, 8,5
(1, -1, 1, -1)
Cch, 2, 1 (1, -1, 1, -1, -1, 1, -1, 1)
SF = 1 SF = 2 SF = 4 SF= 8
Spreading Code 1
for UE B -1
Spread Data 1
for UE B -1
Spread Code 1
for UE A -1
Correlation RX
Integrator O/P
at UE A
Recovered Data 1
at UE A -1
Processing Gain
Processing Gain can be defined as the Chip Rate divided by the bit rate. This gives a ratio
that can be converted to decibels by using the following formula.
PG = 10 x log SF
The gain that we get from the Processing Gain is an extremely important part of CDMA. It is in fact
because of this relationship that CDMA is so effective and is used even in space transmissions.
Processing gain will determine how much the received signal can be lifted out of the noise floor.
There is one simple rule to follow, the higher the SF the higher the processing gain will be, the
lower the SF the lower the processing gain. As we know, the SF is also inversely proportional to
the speed of the transmission. This means that the higher the speed of transmission the lower
the processing gain will be. Due to this relationship the power output must be increased for any
transmitter if the transmission rate is increased due to the loss in Processing Gain.
This will also mean that if the Frame Erasure Rate (FER) is increased on the
receiver side the power must be increased or the transmission rate must drop on
the transmitter side to meet the FER requirement.
Processing Gain
or
PG = 10 x log (SF)
Exercise 1 - Spreading
This Exercise demonstrates the Modulo-2 Addition, Spreading Factor usage, Code Lengths
and in general will give the student a feel for the Spreading Principle.
NOTES
____________________________________________________________________________________________
____________________________________________________________________________________________
____________________________________________________________________________________________
Exercise 1 - Spreading
Spreading
Data 1
-1
Spreading Code 1
-1
Spread Data 1
-1
De-spreading
Spreading Code 1
-1
De-spread Data 1
-1
Calculation Box
SF = 4 S/N = 5dB
PG = 4 (ratio) C/I = 5 dB - 6 dB
PG = 6 dB = -1 dB
Exercise 2 - Spreading/Despreading
To gain some experience in Spreading the student can complete the following exercise.
The student can complete the despreading part of the exercise and then calculate the
SF and PG. See if it matches with the answers provided.
Note the irregular structure in the answer.
NOTES
____________________________________________________________________________________________
____________________________________________________________________________________________
____________________________________________________________________________________________
Exercise 2 - Spreading/Despreading
Spreading
Data 1
-1
Spreading Code 1
-1
Spread Data 1
-1
De-spreading
Spreading Code 1
-1
De-spread Data 1
-1
Wrong 1
Spreading Code -1
De-spread Data 1
Wrong Code -1
Calculation Box
SF = 4 S/N = 5dB
PG = 4 (ratio) C/I = 5 dB - 6 dB
PG = 6 dB = -1 dB
Exercise 3 - Spreading/Despreading
In this exercise the student must complete the following:
1. Determine the SF used?
2. Do the spreading part of the exercise?
3. Do the despreading part of the exercise using the right code?
4. Do the despreading part of the exercise using the wrong code?
5. Complete the calculation?
NOTES
____________________________________________________________________________________________
____________________________________________________________________________________________
____________________________________________________________________________________________
Exercise 3 - Spreading/Despreading
Spreading
Data 1
-1
Spreading Code 1
-1
Spread Data 1
-1
De-spreading
Spreading Code 1
-1
De-spread Data 1
-1
Wrong 1
Spreading Code -1
De-spread Data 1
Wrong Code -1
Calculation Box
SF = S/N = 5dB
PG = C/I =
PG = = -1 dB
Scrambling
As previously described, OVSF spreading codes can be used to separate individual users on a
common RF carrier freq. However, because of the need to maintain orthogonality of codes, the number
of codes available is very limited (512 Downlink, 256 Uplink). These 512 code must be reused in every
cell, as such they do not become unique to a cell and users located at the boundaries of cells, would
receive transmissions using the same OVSF code, from more than one cell. For UMTS therefore,
OVSF codes are used only as channelisation codes, used identify individual physical channels. A
further coding, process, known as a "Scrambling" is performed, in order to discriminate between
the transmissions between different cells on the downlink and different UEs on the uplink.
Each physical channel is first individually spread to chip rate using a channelisation code (Cch sf,k) taken
from the OVSF code tree, resulting in an increase in bandwidth of the signal form "Bit Rate" to "Chip Rate"
The Sequence of chips produced by the channelisation process is then "Scrambled", using
a chip-to-chip multiplication with a complex-valued scrambling code (Csc). The code
chosen is used to identify the source of the signal. As scrambling is performed on top of
spreading, it has no further effect on the bandwidth of the signal.
Although the primary purpose of using a scrambling code is to identify all channels from a single
source, that single source may use more than scrambling code. For example, in the downlink, a cell
may transmit using one of 16 possible scrambling codes. After scrambling, all physical channels are
then combined, using complex addition, before being forwarded to the RF Modulator for transmission.
Scrambling
Channel x
Data
Cch SF,x Csc,x
Channel y
Data
Σ
Cch SF,x Csc, x
Channel z
Data
Cch SF,x Csc,x
CC SC
Separation of Data & Control Channels
Usage Uplink Separation of UEs
(from the same UE)
LC - 10ms=38400 Chips or
Length Uplink 4 - 256 Chips
SC = 66.7us = 256 Chips
Spread Data 1
Channel X Cch 8,1 -1
Spread Data 1
Channel Y Cch 8,2 -1
Spread Data 1
Channel Z Cch 8,3 -1
Scrambling 1
code -1
Channel X after 1
scrambling -1
Channel Y after 1
scrambling -1
Channel Z after 1
scrambling -1
+3
Complex added +2
scrambled codes +1
-1
-2
-3
Correlation
Output
Inter-symbol Interference
Inter-symbol interference occurs when the signal energy from more than one radio path, pertaining to a
single symbol (or chip in the case of W-CDMA), such that the energy from the various paths overlaps.
This results in the smearing of the signal, such that is hard to define where one chip starts and one chip
ends and the true value of the chips may be distorted. This problem can be resolved, providing the delay
between the two paths is greater than one chip period (0.26µs at 3.84 Mcs). This equates to a path
length difference of 78 m). Delays of 1 or 2 µs are typical in urban areas, with 20µs possible in hilly areas.
Signal Fade
In multi-path situations where path lengths are multiples of half a wavelength of the received frequency
(7cm at 2GHz), the signals on two (or more) paths will arrive in anti-phase to each other. This results
in cancellation of the signals, causing fast or Rayleigh fading. Such fading can result in signal level
drops in the order of 20 to 30dB, making the reception of error free data bits very difficult.
RF
Front End Matched Slot Wise
Circuitry Filter Accumulation
D0
t1 Cch sf,k
D1
t2
Cch sf,k
D2
t3
Cch sf,k
D3
Cch sf,k
Chapter 5
Objectives
On completion of this chapter the student should be able to:
• Describe the procedures performed by the Air Interface Physical Layer
• Describe the UMTS Channel Structure.
◦ Logical Channels
◦ Transport Channels
◦ Physical Channels
• Describe the Downlink and Uplink Flow Processes.
QPSK
The modulation scheme used in W-CDMA is quadrature phase shift keying (PSK) which
allows 2 bits to be sent per symbol (I and Q). The reason for using QPSK is that it is
fairly resilient to amplitude variations. The major problem with CDMA is that all users are
on the same frequency and thus interfering with each other.
QPSK
QPSK
Q
(0,1) (0,0)
(1,1) (1,0)
Structure of Transmission
The physical layer receives information, on a transport channel, as Transport Blocks (or Transport
Block sets) from Layer 2. This information will consist of User Plane or Control Plane streams.
In addition the physical layer will generate Layer 1 control information, used to maintain the radio
bearer between the UE and the UTRAN. This layer 1 control information must be transmitted
on the physical channel along with the transport channel information.
As previously discussed, even when FDD mode is in use, a radio frame/timeslot structure is
observed. (A 10 ms radio frame is divided into 15 timeslots). Though it is important to note
that any given radio bearer is able to use all timeslots in every radio frame.
Downlink Transmission
On the downlink each timeslot will contain transport channel information and Layer 1 control
information in time-multiplex. Each timeslot will contain fields supporting transport block information,
interspersed with Layer 1 control fields. The exact structure of the fields is dependent upon the
type of physical channel in use, and is described in detail later in this chapter.
Uplink Transmission
On the Uplink a time-multiplex structure is not practical as Discontinuous Transmission (DTX)
is frequently employed. The combination of DTX and Time-multiplex would result in a "Bursty"
transmission, which would generate audio band noise perceptible to the other party in a voice call.
To overcome this problem, the transport channel information and Layer 1 control information
are I/Q code multiplexed within each timeslot, allowing them to be transmitted in parallel.
This make the transmission of Layer 1 control information continuous and hence prevents
bursty transmission, even when DTX is applied.
Structure of Transmission
Channel Locations
The radio interface is the section of the network between the UE and the Network. This section of
the network is where the biggest limitation lies at the moment, it is the most vulnerable section and
therefore very complex methods have to be invented in order to transmit the required data at the high
speeds that is demanded of today’s networks. The radio interface is composed of Layers 1, 2 and 3.
The slide opposite shows the UTRA radio interface protocol architecture around the physical
layer (Layer 1). The physical layer interfaces with the Medium Access Control (MAC) sub-layer
of Layer 2 and the Radio Resource Control (RRC) Layer of Layer 3.
The physical layer offers different Transport channels to MAC. A transport channel is characterized
by how the information is transferred over the radio interface.
MAC offers different Logical channels to the Radio Link Control (RLC) sub-layer of Layer
2. The type of information transferred characterizes a logical channel.
Physical channels are defined in the physical layer. In FDD mode, physical channels are defined by a
specific carrier frequency, scrambling code, channelization code (optional), time start and stop (giving
duration) and, on the uplink, relative phase (0 or π/[Symbol_ps2]). In the TDD mode the physical
channels is also characterized by the timeslot. The physical layer is controlled by RRC.
Channel Locations
Layer 2 RLC
Logical Channels
Layer 2 MAC
Transport Channels
Physical Channels
UE
PTM
CCH
DCH
Transport
BCH PCH FACH RACH Channels
PDCH PCCH
Logical Channels
The MAC layer provides data transfer services on logical channels. A set of logical channel
types is defined for different kinds of data transfer services as offered by MAC. Each logical
channel type is defined by what type of information is transferred.
A general classification of logical channels is into two groups:
• Control Channels (for the transfer of control plane information).
• Traffic Channels (for the transfer of user plane information).
Control Channels
Broadcast Control Channel (BCCH)
A downlink channel for broadcasting system control information.
Traffic Channels
Dedicated Traffic Channel (DTCH)
A Dedicated Traffic Channel (DTCH) is a point-to-point channel, dedicated to one UE, for the
transfer of user information. A DTCH can exist in both uplink and downlink.
Logical Channels
Between MAC and RLC
U-RNTI PTM
Transport Channels
The physical layer offers information transfer services to MAC and higher layers. The
physical layer transport services are described by how and with what characteristics data
is transferred over the radio interface. An adequate term for this is ’Transport Channel’. A
general classification of transport channels is into two groups:
• Common transport channels (where there is a need for inband identification of
the UEs when particular UEs are addressed.
• Dedicated transport channels (where the UEs are identified by the physical channel, i.e. code
and frequency for FDD and code, time slot and frequency for TDD).
Transport Channels
Between the Physical Layer and MAC
CCH
Physical Channels
Common Physical Channels (CPCHs)
Physical Channels
PDCH PCCH
Channel Mapping
The diagram opposite summarises the mapping of logical channels onto transport
channels, and transport channels onto physical channels.
The DCHs are coded and multiplexed, as described later in this chapter, and the resulting data
stream is mapped sequentially (first-in-first-mapped) directly to the physical channel(s).
The mapping of BCH and FACH/PCH is equally straightforward, where the data stream after coding
and interleaving is mapped sequentially to the Primary and Secondary CCPCH respectively. Note
that the BCCH logical channel can be mapped to both BCH and FACH, so as to be available to idle
mode and connected mode UEs respectively. Also for the RACH, the coded and interleaved bits are
sequentially mapped to the physical channel, in this case the message part of the PRACH.
Physical signals
Physical signals are entities with the same basic on-air attributes as physical channels but do not
have transport channels or indicators mapped to them. Physical signals may be associated with
physical channels in order to support the function of physical channels. SCH, CPICH, and AICH
are classified as physical signals and hence are not shown on the diagram opposite.
Channel Mapping
Uplink Downlink
DCCH DCCH
CCCH PCCH BCCH CCCH CTCH
DTCH DTCH
Common Common
Paging Dedicated
Broadcast Control Traffic
Control Control Channel
Contro Channel Channel
Channel Dedicated
Channel
Traffic Channel
Primary
CCPCH
DPDCH
DPCCH
DPDCH
PRACH
DPCCH
Sec
CCPCH
Radio Frame
As previously outlined the basic unit of the air interface is the radio frame. A radio frame is defined as ’a
processing duration which consists of 15 timeslots’. The length of a radio frame corresponds to 38,400
chips." With a system chip rate of 3.84 Mcps being employed, a radio frame thus has a duration of 10 ms.
System Frame
Several physical layer procedures (e.g. Paging and Random Access) span more than a single
frame. To accommodate these procedures, a system frame is defined. The frame within the
system frame structure is identified by a System Frame Number (SFN), which is a 12 bit
binary number, thus a System Frame can consist of 4096 frames.
Timeslot
Each radio frame consists of 15 timeslots. A slot duration consists of fields containing bits.
The length of the slot always corresponds to 2560 chips. The time duration of a timeslot is
approximately 666 µs. The number of fields within each timeslot is dependent upon the physical
channel in use. Similarly the number of bits which can be accommodate by a timeslot is
dependent upon the spreading factor in use for that physical channel.
SLOT
Time Slot = 2560 chips
FRAME
TS0 TS1 TSn TS13 TS14
SYSTEM FRAME
Frame Frame Frame Frame
1 n 4094 4095
10ms
40.96 secs
256 chips
Primary
SCH acp acp acp acp acp
Secondary
SCH acsi,0 acsi,1 acsi,2 acsi,3 acsi,14
Antenna 1 A AA A A A A A A A A A A A A A A A A A A A
Antenna 2 -A -A A A -A -A A A -A -A A A -A -A A A -A -A A A -A -A
Frame#i Frame#i+1
Frame Boundary
Data
(Tx OFF)
18 bits
Tslot = 2560 chips, 20 bits
Tf = 10ms
Paging Occasion.
The Paging Occasion determines the frame number the UE becomes active in, during the DRX Cycle.
Paging Indicator.
The Paging Indicator is repeated multiple times per system frame. The UE calculates which
paging indicator to listen to using network-determined parameters.
The mobile listens to the system information messages to obtain the parameters required for receiving
paging indicators in the selected cell. It then performs a standard calculation using the cell parameters
and its IMSI. The result of this calculation is a single paging indicator during the DRX cycle time. In
other words the mobile must power up and listen to the calculated paging indicator (now know as
its paging occasion) between a repetition period of 80ms to 5.12s (DRX Cycle Period).
The diagram opposite illustrates the frame structure of the PICH.
Frame. 10s
Calculated Paging Occasion
UE is in DRX until this Paging Indicator
* If TFCI bits are not used, then DTX shall be used in TFCI field.
PRACH Pre-amble
Each preamble is of length 4096 chips and consists of 256 repetitions of a signature of
length 16 chips. There are a maximum of 16 available signatures
5120
chips
Data
Data
Ndatabits
Pilot TFCI
Control
Npilotbits NTFCIbits
Tslot = 2560 chips, 10*2kbits (k = 0..3)
AS # 14 AS # 0 AS # 1 AS # i AS # 14 AS # 0
20ms
PRACH
access slots Access slot set 1 Access slot set 2
10ms 10ms
K = 0.........7
Transmission
Power Physical Channel 1
Transmission
Power Physical Channel 2
Transmission
Power Physical Channel L
Tf = 10ms
K = 0........7
TrBk concatenation /
Code block segmentation
Channel coding
TrCH Multiplexing
2nd interleaving
Rate Matching
The rate matching operation in the uplink, is a much more dynamic process that may vary on a
frame-by-frame basis. The rate matching operation needs to take into account the the number of bits
coming from all transport channels. When the data rate of one service, the dynamic rate matching
adjusts the rates of the remaining service as well so that all symbols in the radio frame will be used.
For example if with two transport channels, one has a momentary zero rate, rate matching used repetition
to increase the symbol rate for the other service sufficiently so that all uplink channel symbols are used.
DTX
Because Uplink rate matching ensures that all unused transport channel bits are filled, there
is no requirement for DTX indication bits to be inserted in the uplink flow
TrBk concatenation /
Code block segmentation
Channel coding
1st interleaving
TrCH Multiplexing
CCTrCH
Physical channel
segmentation
2nd interleaving
Chapter 6
Objectives
• Describe the Radio Protocol Stack
• Describe the MAC layer
• Describe the RLC layer
• Describe the PDCP protocol
• Describe the BMC protocol
• Describe the RRC protocol and its common procedures
Introduction
In this chapter we are going to look at the layer 2 protocols in more detail after being introduced
to them in previous chapter in the shape of the MAC and RLC layers. The layer 3 protocols
are also going to be discussed and some of the more common procedures explored to
gain a better understanding of the essential functions of UMTS.
Layer 2 Protocols
Layer 2 offers services of information transmission to layer 3 in the form of Radio Bearers (RB) for
data services and Signalling Radio Bearers (SRB) for control information originated either in the
Radio Resource Control (RRC) protocol or in the Non Access Stratum (NAS). With respect to
the flow of control information, it goes through the RLC and MAC layers, while in the case of data
information, depending on the specific service, there exist two additional sub-layers, namely the Packet
Data Convergence Protocol (PDCP) and the Broadcast Multicast Control (BMC).
Layer 3 Protocols
With respect to layer 3, only the lowest sub-layer, denoted as Radio Resource Control
(RRC) terminates in the UTRAN control plane.
Each layer communicates with the same layer at the peer entity (e.g. the RRC layer at the UE
communicates with the RRC at the RNC), and this communication is defined by the specific protocol of
each layer. At the UTRAN side, the RLC and above radio protocols are located in the RNC. In turn,
with respect to the MAC protocol, some of its functionalities are located in the Node B and others
in the RNC. The layered structure is constructed upon the assumption that each layer provides
message transfer services to the upper layers. At one extreme network entity (e.g. UE or RNC),
a given layer receives Service Data Units (SDUs) containing the messages from its upper layer,
processes them adding the required headers and control elements and eventually delivers them in
the form of Protocol Data Units (PDUs) to its lower layer. Note that the PDU delivered by a given
layer corresponds to the SDU seen by its lower layer. At the lowest layer, the information is finally
transferred through the channels existing in the physical layer (i.e. the specific code sequences, time
slots and frequency bands). At the other extreme network entity (e.g. RNC or UE), the information
is received at the physical layer and delivered to the upper layers until reaching the destination
layer. Note that this transfer of information requires the definition of adequate interfaces between
adjacent layers specifying the path that information follows depending on its nature.
Layer 2 offers to the upper layers the service of information transmission between the UE and the
UTRAN by means of the Radio Bearers (RBs) and Signalling Radio Bearers (SRBs). The former
provide the transmission of user data while the latter are intended to transfer control information that
can be originated either in the RRC protocol or in upper layers. Whenever a service is provided to
a given UE (e.g. a voice service, a videoconference service, an interactive web browsing service,
etc.) it should be associated to a specific RB that specifies the configuration and the parameters
of the sub-layers in layer 2 and the physical layer depending on the characteristics of the service
being provided. The information flow associated to a RB or a SRB is mapped into different types
of channels depending on the position in the layered protocol architecture.
Introduction
BCH HS-DSCH HS-DSCH E-DCH BCH PCH FACH RACH RACH DCH DCH
Transport Formats
The combination of a MAC SDU and a MAC header is a MAC PDU, which corresponds to a TB
transferred to the physical layer through the corresponding transport channel. In each Transmission
Time Interval (TTI) the MAC layer selects a suitable Transport Format (TF) or a Transport Format
Combination (TFC), depending on the instantaneous source rate, the service characteristics and
the Transport Format Combination Set (TFCS). Each TF is related to a given instantaneous
bit rate. Once the selection is done, the MAC layer delivers a set of TBs to the physical layer,
denoted as the Transport Block Set (TBS). The transport blocks must be delivered in the same
order in which the corresponding MAC SDUs were delivered by the RLC layer.
Transport Block (TB):Transport Block (TB) is the basic unit MAC transfers to L1 for L1 processing. A
TB is equivalent to a MAC Protocol Data Unit (PDU). TB size indicates the number of bits in a TB
Transport Block Set (TBS):Transport Block Set (TBS) is a set of TBs MAC transfers
on a transport channel at one time to L1. A TBS is equivalent to a MAC PDU Set.
TBS size indicates the number of bits in a TBS.
Transport Format (TF):Transport Format (TF) is a format L1 applies for transferring a TBS
to MAC on a transport channel at a Transmission Time Interval (TTI). The TF consists
of two parts — a dynamic part and a semi-static part.
Transport Format Set (TFS):Transport Format Set (TFS) is a set of TFs. A TF represents a bit
rate. A TFS consisting of multiple TFs may have multi rates. For example, a fixed-rate DCH has
only a single TF. A variable-rate DCH has a TFS, with one TF for each rate.
Transport Format Combination (TFC):Transport Format Combination (TFC) is the combination of
currently valid TFs on all transport channels of a UE. It contains the TF from each transport channel.
Transport Format Combination Set (TFCS)Transport Format Combination Set
(TFCS) is a set of TFCs of a UE.
Transport Format Combination Indicator (TFCI):Transport Format Combination Indicator
(TFCI) is a label for a specific TFC within a TFCS.
Transport Format Identification (TFI)Transport Format Identification (TFI) is a label for a
specific TF within a TFS. is a label for a specific TF within a TFS.
0101010011110101001 (MAC PDU)
Physical Layer
Transport Formats
0101010011110101001 (MAC PDU)
Transport Transport
Channel (TrCH1) Channel (TrCH2)
168 bits 168 bits
TBS size is 336 bits
(TBS)
(TTI) = 10ms
(TTI) = 10ms
DPCCH DPDCH
Data
protocols IP PPP FTP etc
• Header
de/compres s ion
MAC
P HY S
P HYS
RRC Procedures
In this part of the course some of the more important RRC procedures will be discussed to allow
understanding of the signalling that must take place to allow UMTS to operate.
RRC Procedures
Non acces s
C ore Network S IB 1 s tratum s ys info +
UE timers and
counter
Iu
SB
C ell s ys tem info
i.e cell s election
S IB 3 and res election
R NC MIB
Iub E xample only info
BCH
S C C P C H and
NodeB S IB 5 P R AC H
information
RRC Procedures
Cell Selection/Re-selection
The goal of the cell selection procedures is to fast find a cell to camp on. To speed up
this process, at "power up" or when returning from "out of coverage", the UE shall start
with the stored information from previous network contacts. If the UE is unable to find
any of those cells the initial cell search will be initiated.
If it is not possible to find a cell from a valid PLMN the UE will choose a cell in a forbidden PLMN
and enter a "limited service state". In this state the UE regularly attempt to find a suitable cell
on a valid PLMN. If a better cell is found the UE has to read the system information for that cell.
The cell to camp on is chosen by the UE on link quality basis. However, the network can set cell
re-selection thresholds in order to take other criteria into account, such as, for example:
• available services;
• cell load;
• UE speed.
In CDMA, it is important to minimise the UE output power, and also to minimise the power consumption
in the UE. In order to achieve that, an ’Immediate Cell Evaluation Procedure’ at call set up can
ensure that the UE transmits with the best cell, while keeping the power consumption low.
Cell Re-selection
The cell reselection procedure is a procedure to check the best cell to camp on. The evaluation of
the measurements for this procedure is always active, in idle mode, after the cell selection procedure
has been completed and the first cell has been chosen. The goal of the procedure is to always
camp on a cell with good enough quality even if it is not the optimal cell all the time.
It is also possible to have a "time to trigger" and hysteresis criteria in the cell reselection to control the
number of cell reselections. The parameters needed for the cell reselection procedure (e.g., the
offset value and the hysteresis) are unique on a cell to neighbour cell relation basis. These have
therefore to be distributed, together with time to trigger value, in system information in the serving
cell. This implies that the UE does not need to read the system information in the neighbouring
cells before the cell reselection procedure finds a neighbouring cell with better quality.
RRC Procedures
go here whenever
a new PLMN
is selected
Stored
Initial
Information no suitable cell found
Cell Selection
Cell Selection
no suitable
cell found
suitable cell found suitable cell found
no
suitable
Cell Selection cell
suitable NAS found
when leaving cell found Camped
registration
connected normally
rejected
mode
leave suitable
return to idle mode cell selected
idle mode trigger
Connected
Mode Any Cell
(Emergency no acceptable cell found
Reselection
calls only)
RRC Procedures
UE State Transition Algorithm
After the RRC connection is set up, the RNC observes UE activity and uses the UE
state transition algorithm to transit the UE state.
Paging
This procedure is used to transmit paging information to selected UEs that are in idle mode or in
Cell_PCH and URA_PCH states. It makes use of the Paging Type 1 message. The reasons for a
paging message can be the establishment of a network originated call or session set-up, the request
to trigger a cell update procedure, the change to Cell_FACH state because of downlink packet data
activity, the request to start the release of an RRC connection and the request to read updated system
information in the broadcast channel. A similar procedure exists for paging mobiles in Cell_DCH and
Cell_FACH states, but in this case a Paging Type 2 message is sent through the DCCH.
RRC Procedures
UE State Transition and Status of the RRC Connection
UTRAN Connected Mode UTRAN Inter-RAT
Handover
GSM
URA_PCH Connected
Mode
CELL_PCH GSM Handover
Release RR
CELL_DCH Connection
(with HS-
DSCH) GPRS Packet
CELL_FACH Transfer Establish RR
Mode Connection
Cell
CELL_DCH Reselection
Release RRC Establish RRC Release of Initiation of
connection connection temporary temporary
Release RRC block flow block flow
Establish RRC
connection connection
Idle Mode
RRC Procedures
RRC connection establishment
UEs in idle mode that require the initiation of a signalling connection make use of the RRC connection
establishment procedure. The procedure starts with a RRC Connection Request message mapped
to the CCCH logical channel and transmitted through the RACH. The mobile identifies itself by
means of NAS identifiers like the IMSI or the TMSI and it includes the establishment cause. There
exist several causes including the registration, the establishment of originating calls for each of the
four possible service classes (conversational, streaming, interactive and background) or the transfer
of higher layer signalling. Upon receipt of this message, the network may either accept or reject the
request by means of a RRC Connection Setup or a RRC Connection Reject message, respectively,
which is mapped to the CCCH logical channel and the FACH transport channel. In the case of
acceptance, the RRC Connection Setup message includes the Radio Network Terminal Identifier
(RNTI) for the mobile and the indication about whether to pass to Cell_DCH or to Cell_FACH. It also
includes the characterisation of the allocated dedicated radio channel in terms of code sequence
and TFCS in both the uplink and downlink direction, when the user is moved to the Cell_DCH. In
any case, the mobile terminal is now in connected mode and there is a DCCH logical channel
allocated to it that includes SRB#1, SRB#2, SRB#3 and optionally SRB#4. The procedure completes
when the mobile sends the RRC Connection Setup Complete message through DCCH and either
DCH or RACH transport channel, thus acknowledging the correct reception and configuration
of the allocated channel. Only one RRC connection may exist for a given mobile.
Establishment of signalling connections between the UE and the Core Network and
direct transfer of signalling messages.
These procedures are intended to establish and release NAS signalling connections between the
terminal and the different core network domains (i.e. CS and PS domains). This allows the direct
transfer of signalling messages between the upper layer entities of mobiles that have previously
established a RRC connection. The term ‘direct transfer’ refers to the transmission of signalling NAS
messages through the RRC layer either in the uplink or in the downlink direction.
The establishment of the signalling connection is done by means of the Initial Direct Transfer
procedure, which is initiated by the NAS of the UE. In this case, the RRC layer of the UE sends an
Initial Direct Transfer message to the peer entity at the SRNC that includes the message denoted as
Initial UE Message (which belongs to the RANAP protocol defined between RNC and CN and that
contains a NAS message) and some information about the core network domain (i.e. CS or PS) to
which the NAS message should be delivered. Once the signalling connection has been established
with the Initial Direct Transfer message, subsequent NAS messages corresponding to this connection
are transmitted with the Uplink Direct Transfer and Downlink Direct Transfer messages between
RRC entities. Some examples of NAS messages that can be exchanged could be, for example,
a CM Service Request in order to start a call, a MM Location Updating Request, etc.
RRC Procedures
UE S R NC CN
RRC Message (Logical Channel) RANAP Message
Signalling
Initial Direct Transfer (DCCH) Initial UE Message
connection
establishment
(UE-CN)
RRC Procedures
Radio bearer establishment
The radio bearer establishment is a procedure initiated by the upper layers of the network side in
order to request the allocation of radio resources to a mobile terminal that previously has established
a RRC connection. The establishment of a RRC connection involves the establishment of different
SRBs by means of the allocation of the required radio resources to allow the transfer of signalling
messages between the UE and the network. At a given instant during the RRC connection, the
upper layer signalling messages exchanged by the UE and the Core Network may request the
initiation of a user service belonging to a certain service class and with different requirements (e.g.
a circuit switched call by means of a CC Setup message or a packet transfer by means of a SM
Activate PDP Context Request). This user service requires the extension of the radio resource
allocation to the corresponding user taking into consideration the service requirements. Then, after
the acceptance of the new service by the admission control, the RRC of the SRNC will receive from
the core network (i.e. from the MSC for CS services or from the SGSN for PS services) the order to
allocate the corresponding radio resources to the terminal. This will initiate the establishment of a radio
bearer through the corresponding RRC procedure, which starts with the transmission of a Radio
Bearer Setup message from the RRC at the SRNC to the peer entity at the UE side. This message
includes all the parameters to configure the RLC/MAC/PHY layers according to the transport and
physical channels that are being assigned for both the uplink and downlink direction (e.g. transport
channel type, code sequence, TFCS, RLC mode, etc.). Note that depending on the service nature
(i.e. CS or PS) and the specific service requirements, this procedure may or may not involve the
establishment of a dedicated channel. Similarly, and in the case when previous physical dedicated
channels are already allocated to the user, the procedure may involve the modification of the physical
channel characteristics. When the transport and physical channels allocated in the radio bearer
are successfully established, the RRC at the UE side will issue a Radio Bearer Setup Complete
message. In the case of failure, it will issue a Radio Bearer Setup Failure message.
RRC Procedures
UE S R NC CN
RRC Message (Logical Channel) RANAP Message
Signalling
Initial Direct Transfer (DCCH) Initial UE Message
connection
establishment
(UE-CN)
RRC Procedures
Measurement Procedures
These procedures allow the mobile terminals to provide the network with different measurement
reports that will be used by the radio resource management strategies to take the appropriate
decisions that maintain the required QoS for the accepted mobiles.
The network configures the measurements that should be provided by the mobile terminal by indicating
the objects to be measured (i.e. the cells, the transport channels and the physical channels), the
criteria to be used (i.e. periodic reporting or event-triggered reporting when certain events are
detected at the UE) and the RLC mode to be used (i.e. acknowledged or unacknowledged). This
configuration is done by means of the Measurement Control message. Measurements are required
only by terminals in Cell_DCH and Cell_FACH states, although in some cases such as traffic
volume monitoring, terminals in Cell_PCH may also send measurement reports.
The Measurement Reports provided by the terminals include several types of measurements,
which are classified into the following groups:
• Intra-frequency measurements - These correspond to downlink physical channels in the cells with
the same frequency as the cells from the Active Set. The measured cells belong to the Monitored
Set, which is broadcast in the cell where the mobile is allocated. These measurements include:
◦ Ec/No of the primary CPICH channel, which is equivalent to the ratio between the power
of the pilot channel and the total received power at the antenna connector.
◦ Downlink path loss — which can be measured as the difference between the transmitted
and the received CPICH power. The transmitted CPICH power is broadcast by the network.
◦ Downlink Received Signal Code Power (RSCP) for the primary CPICH, corresponding
to the power measured at the code of the primary CPICH.
RRC Procedures
Neighbour Cells
Iu Inter-frequency measurements
UE internal measurements
• UE transmission power
• UE received RSSI
NodeB
Quality measurements
• transport block error rate
Chapter 7
Objectives
On completion of this chapter the student should be able to:
• Describe basic Radio Resource and Mobility Management functions.
• Describe handover control
• Describe compressed mode
• Describe macro diversity
• Describe SRNS relocation
• Describe power control
• Describe DCCC
• Describe load control
)
oS
(Q
Co
ice
ve
Power Control
rv
ra
Se
g
e
of
ty
Handover Control
ali
Qu
Capacity
Handover Control
The handover function in UTRAN manages the mobility of the UE and the radio interface. It is based on
radio measurements and cell topology and it is used to maintain the Quality of Service requested by
the Core Network regardless of UE mobility. The RNC supports the following handover types:
• Intra-frequency soft, softer and hard handover,
• Inter-frequency hard handover
• Inter-RAT hard handover in both CS and PS domains.
In addition, the procedures may be intra-RNC or inter-RNC and may require
the performance of SRNS relocation.
The decision on what handover type needs to be performed depends on a number of conditions
and parameters that are presented in the following sections. In general, soft/softer handover has
higher priority than intra-frequency hard handover and inter-frequency and inter-RAT HHO only occurs
in border cells that have inter-frequency or inter-RAT neighbouring cells set accordingly.
Three different handover causes are supported in the RNC:
• Handover due to poor radio link quality
• Handover due to radio interface overload
• Operator forced handover.
Handover Control
Measurement Control
The handover algorithm also controls the measurement reporting performed by the UE
in CELL_DCH state for handover purposes. The MEASUREMENT CONTROL message
is used to set up and modify the way measurements are taken by the UE. The contents
and frequency of the MEASUREMENT REPORT messages from the UE depends on the
measurement type, the UE state and its measurement capability.
The list of cells that the UE must monitor is divided into three different categories.
• Active Set: Group of UTRAN cells which the UE has a radio link established to, i.e. it
is in soft/softer handover with. The Active Set contains only UTRAN cells that operate
on the same UMTS frequency. In USR3.0 the maximum number of cells in the Active
Set is fixed to 3. This is a hard coded parameter in USR3.0.
• Monitored Set: Cells that are not currently in the Active Set, but the UE is monitoring for
handover according to a neighbour list assigned by UTRAN (stored as CELL_INFO_LIST
in the UE). The Monitored Set may contain UTRAN and GSM cells and the UTRAN cells
may be under different UMTS frequencies. The maximum number of cells to measure in
USR3.0 is: 32 intra-frequency, 32 inter-frequency and 32 inter-RAT cells.
• Detected Set: Cells that are not included in the neighbour list to monitor but are detected by the
UE on its own. The UE only reports detected UTRAN cells that are under the same frequency
as the active cells and only when in CELL_DCH state. The purpose is to provide information
to the network operator for manually updating the neighbour cell list of cells.
Measurement Control
Monitored
Set
Monitored Monitored
Set Set
Monitored Active Detected
Set Set Set
Active Monitored
Set Set
Monitored Active Detected
Set Set Set
Monitored Monitored
Set Set
Detected Monitored Detected
Set Set Set
Intra-frequency Handover
Algorithm Description
The figure opposite shows the scenario where a mobile moves from one cell to another. It can be
seen that in CDMA there is blur zone where the mobile can be connected to both cells, maximizing
the quality of service. This is often referred to as Soft or Softer Handover.
The handover control function for soft handover is responsible of the following tasks.
• Determining whether a soft handover is necessary.
• Receiving intra-frequency measurement reports from UEs (intra-frequency measurement
results and information about intra-frequency events that triggered the measurement report),
which may refer to Node Bs under the same or different RNCs.
• Deciding whether to add any of these reported cells to the active set or drop any of the
cells from the active set (adding or deleting the radio links)
• When radio links are added, splitting/combining or splitting/selection functions in the appropriate
network elements are also instructed to begin diversity processing with the new radio link.
Intra-frequency Event Driven Reporting
Intra-frequency Handover
• The UE has a radio connection with cell A
Cell B
Intra-frequency Handover
Intra-frequency Hard Handover
Although soft/softer handover is the preferred procedure to handle RRC connection mobility,
there are times when only a hard handover can be performed. The hard handover procedure
removes all the RL(s) in the active set and establishes new RL(s). An intra-frequency hard
handover is only performed when one of the following conditions apply.
• There is no Iur interface between the source and target RNC.
• The UE is using a PS RAB at a bit rate above a preset threshold.
Intra-frequency Handover
Cell A
Cell B
• A hard handover occurs when the UE has to release the old radio
links before it establishes a radio connection with a new cell
f1 f2
Algorithm Overview
In order to offer worldwide coverage, the handover from UTRAN to GSM is a key feature, especially
during early deployment stages where islands of UMTS coverage are envisaged. The procedure
is initiated from UTRAN with a RRC message HANDOVER FROM UTRAN COMMAND. Then the
UE must establish the connection to GSM and release all UMTS radio resources.
When the UE works in CELL_DCH state, the UMTS GSM handover is the procedure during which the
WCDMA RAN initiates handover (for CS services) or cell reselection (for PS services) to the GSM.
Based on triggering causes, UMTS to GSM handover includes:
• UMTS to GSM coverage-based handover. The coverage of UMTS s usually discontinuous
at the very beginning of the network rollout. On the border, if the signal quality of
UMTS rather than GSM is poor and if all services of the UE are supported by GSM,
UMTS to GSM coverage-based handover is triggered.
• UMTS to GSM load-based handover. If the load of UMTS rather than GSM is heavy and all
services of the UE are supported by GSM, UMTS GSM load-based handover is triggered.
• UMTS GSM service-based handover. Based on layered services, traffic of different classes
is handed over to different systems. For example, when an Adaptive Multi Rate (AMR)
speech service is requested, this call could be handed over to GSM.
• UMTS to GSM coverage-based handover. The CPICH Ec/N0 or CPICH RSCP of the UMTS
cell to which the UE connects is lower than the corresponding threshold. In addition, there is
a GSM cell whose GSM carrier RSSI is higher than the preset threshold.
• UMTS to GSM load-based handover. The load of the UMTS cell to which
the UE connects is higher than the threshold.
• UMTS to GSM service-based handover. When a service is established, the Core
Network (CN) requests a handover of the service to GSM.
UMTS GSM
Service Capability
For combined services, the RNC selects the Required 2G Capability parameter
required by the RAB that has the highest priority.
UE Capability
With the UE CAPABILITY INFORMATION, the RNC decides whether to start inter-RAT measurement.
Iu
CN RNC
UE Capabilities
Indoor Coverage
Pico Cell
Outdoor dead area coverage
Speed Estimation
The speed estimation on each hierarchy of an HCS cell falls into one of the following types:
• Fast speed
• Normal speed
• Slow speed
According to the number of changes of the best cell within a given time unit, the speed estimation
algorithm estimates the moving speed of the UEs. See details as follows:
• If the number of changes of best cell for a UE is above the fast-speed threshold,
this UE is calculated to be in fast speed;
• If the number of changes of best cell for a UE is below the slow-speed threshold,
this UE is calculated to be in slow speed;
• If the number of changes of best cell for a UE is between fast-speed threshold and
slow-speed threshold, this UE is calculated to be in normal speed.
◦ BSIC confirmation
Depending on whether the UE needs to perform FDD measurements only, GSM measurements only
or both, the RNC activates the appropriate gap patterns. For FDD operation only, a single “FDD
measurement” gap is activated. For GSM operation only, three simultaneous gap patterns are activated
(RSSI, BSIC_ID, and BSIC_confirmation). For combined FDD and GSM operation, three simultaneous
gap patterns are used (RSSI, BSIC_ID and FDD measurement). The BSIC re-confirmation gap pattern
is not used when the UE needs to measure simultaneously inter-frequency and inter-RAT neighbours
in order to decrease the impact of compressed mode operation on quality and performance.
The compressed mode procedure is initiated by the CRNC by sending a RADIO LINK
RECONFIGURATION PREPARE message to the Node B with a modification of the
Transmission Gap Pattern Sequence Code Information radio link parameters. On the other
hand, deactivation is achieved via the COMPRESS MODE COMMAND.
FDD
Measurement
Gap activated
UMTS
UMTS Source Combined
Interfreq Cell
Cell
RSSI
BSIC_ID
FDD Measurement
RSSI
BSIC_ID
BSIC_re-confirm
10ms
GSM Cell
Macro Diversity
Macrodiversity provides an improved error correction capability through the use of combining/splitting
at the RNC and Node B. Communications will be sent via the Iur interface from the RNC in the
D-RNS to the RNC in the S-RNS and on to the Iu to the core network.
This function controls the duplication/ replication of information streams to receive/ transmit the same
information through multiple physical channels from/ towards a single mobile terminal.
This function also controls the combining of information streams generated by a single source (diversity
link), but conveyed via several parallel physical channels (diversity sub-links). Macrodiversity control
should interact with channel coding control in order to reduce the BER when combining the different
information streams. In some cases, depending on physical network configuration, there may be
several entities that combine the different information streams, i.e. there may be combining/splitting
at the S-RNC, D-RNC or Node B level. This function is located in the UTRAN.
Macro Diversity
UTRAN
lu
Iur Iur
RNC RNC RNC
SRNS Relocation
SRNS Relocation Overview
The Serving RNS (SRNS) manages the connection between the UE and the UTRAN and
can be relocated. The SRNS relocation is of three types:
• Static relocation (UE not involved)
• Relocation due to hard handover (UE involved)
• Relocation due to cell or URA update (UE involved)
If no Iur interface exists, the relocation can be triggered only by the hard handover or cell/URA update.
Purposes
The main benefits of SRNS relocation are as follows:
When the Iur interface is involved
Relocating the SRNC to the DRNC can avoid data forwarding on the Iur interface. Thus it can reduce
the bandwidth occupied by the Iur interface and the transmission delay of user plane. When the
SRNC and the DRNC become independent of each other, the data of cell radio resource management
algorithms cannot be transmitted over the Iur interface. Thus the algorithms cannot be optimized. This
problem can be solved by initiating the static relocation to relocate the SRNC to the CRNC.
When the Iur interface is not involved
SRNS relocation can ensure communications not interrupted when the UE moves
to the coverage area of another RNC.
Static Relocation
When the Iur interface exists, the UE may use the radio resources of one RNC
and connects to the CN through another RNC.
After SRNS relocation, the Iur resources for the UE are released. The target RNC not only
provides radio resources for the UE but also connects the UE to the CN.
The purposes of the static SRNS relocation are as follows:
• To reduce the bandwidth occupied by the Iur interface
• To reduce the transmission delay of user plane
• To get the parameters of cell-level algorithms to optimize the performance
SRNS Relocation
SRNS Relocation
Relocation Due to Hard Handover
The relocation happens when the UE is in CELL_DCH state and moves from one RNC to
another RNC with no Iur interface connecting the two RNCs.
SRNS Relocation
Power Control
The power control mechanism is an essential part of cellular systems using the spread spectrum
technique of medium access. There are important functions of power control.
First, is to support high system capacity, which is basically achieved in CDMA-based systems
by reducing the level of adverse interference. The major contribution to system interference
level, in uplink and downlink direction respectively, comes from simultaneous RF signal
transmissions by many UEs and adjacent Node Bs on the same frequency.
The second function of power control procedures is to preserve required radio communication
quality regardless of dynamic changes in the propagation environment resulting from the
mobility of UEs, the changing number of active users in the system, and the ever propagation
characteristics of and radio channel. The quality may be defined here as low delay and
error-free transmission of digitised user data through radio channel.
One of the ways to obtain, at the same time, large system capacity and high service quality is
to keep UE and Node B RF signals transmission power at the lowest possible level and adjust
it dynamically upon variations of propagation conditions. The more accurate are UE and Node
B power control mechanisms to follow real dynamic structure of RF environment, the higher
system capacity and service quality performance may be achieved.
The goal of power control in WCDMA system is thus dynamic interference control,
rather than wide coverage area support.
The UE and UTRAN power control procedures use different sources of feedback information on temporal
propagation channel condition in the process of adjusting their transmitted signals power levels.
Power Control
Power Control Concept
Directed Retry
The Directed Retry Decision (DRD) algorithm includes three components:
Directed Retry
UE RNC CN
RRC Retry
RRC CONNECTION SETUP Decision Algorithm
(Containing (New) Cell Information)
RAB Retry
Decision Algorithm
RANAP RAB ASSIGNMENT RESPONSE
Rate Re-allocation
Upsize and downsize the data rate of the Best Effort (BE) services, (i.e. interactive
and background) in the CELL_DCH RRC state.
Dynamically adjust the uplink and downlink bandwidth of the Dedicated Channel (DCH)
according to the traffic volume which reflects the state of data transmission.
Dynamically adjust the bandwidth of the Dedicated Channel (DCH) according to
the quality of radio link due to coverage.
Dynamically adjust the bandwidth of the Dedicated Channel (DCH) according to the load congestion.
This part of the algorithm works in conjunction with the load control mechanism.
UE State Transition
Switch the UE state to the CELL_FACH and CELL_PCH/URA_PCH state when the
UE inactivity is detected, and back to CELL_DCH state when the UE activity is
detected because there is data to be transmitted.
Measurements
The traffic volume measurement executed by UEs are used in the uplink bandwidth re-allocation
process and the UE state transition to improve the resource utilization.
The downlink Transmitted Code Power (TCP) measurements executed by NodeBs are
used in the downlink rate re-allocation to keep the link stability.
The Traffic Volume Measurements (TVMs) executed by RNC are used in the downlink bandwidth
re-allocation process and the UE state transition to improve the resource utilization.
Purpose
The DCCC is to improve the performance of the network resource utilization and to keep
the link stability. This is done in three keys ways as listed below:
• In the downlink and uplink, the DCCC re-allocates the bandwidth based on the traffic
volume measurement. In this way, the DCCC algorithm makes efficient use of the resource
such as the OVSF code resources, the Channel Element (CE) resources of the NodeB
and the transmission resources on the Iub and the Iur interfaces.
• In the downlink, the DCCC downgrades the data rate if the link quality deteriorates,
in order to prevent the call drop.
• The state of the UE can transit from CELL_DCH to CELL_FACH, or from CELL_FACH
to CELL_PCH/URA_PCH. In the state of CELL_FACH or the CELL_PCH/URA_PCH,
the resources of the network and the UE battery can be saved.
Rate Re-allocation
• Control of BE services
• Adjust DCH rate based on
data throughput
RNC
• Adjust DCH rate based on
UL TVM link quality
taken in
• Adjust DCH rate based on
UE
congestion
NodeB
UE State Transition
Switch the UE state based on
DL TVM DL TCP Taken activity
taken in the in NodeB
RNC
Load Control
The WCDMA system is a self interference system. With the load of the system increasing,
the interference rises. If the interference is high enough, it affects the coverage and QoS
of established services. Therefore, capacity, coverage and Quality of Service (QoS) of
the WCDMA system are mutually affected. The purpose of load control is to maximize
system capacity while ensuring the coverage and QoS.
In different phases of UE access as shown in the diagram below, different load
control algorithms are used as follows:
• Before UE access: Potential User Control (PUC) and Cell Breathing
• During UE access: Call Admission Control (CAC) and Intelligent Access Control (IAC)
• After UE access: Load Reshuffling (LDR), and Overload Control (OLC).
In addition, functional load control algorithms vary according to the load levels of
the cell, as shown in the slide opposite.
Load Control
time
Load control is PUC starts: to enable UEs in idle mode to camp on cells with light load
unneeded Cell breathing starts: to switch loads of hot spot cells to othe r cells
LDR starts: to check and release initial congestion in cells
Chapter 8
HSDPA Overview
Objectives
On completion of this chapter the Student will be able to:
• Describe the important changes and characteristics of HSDPA
• State the new channels of HSDPA and how they operate in principle
• Describe the extended UTRAN protocol stack with HSDPA
• State the advantages and disadvantages of HSDPA and future enhancements
Feature Study
The HSDPA feature in 3GPP Release 5 is the result of a study carried out in the Release 4
time frame. This study considered a number of techniques in order to provide instantaneous
high speed data in the downlink. Some of the considerations and goals taken into
account in the evaluation of the different techniques were:
• To focus on the streaming, interactive and background services: services which
require a constant and/high throughput or low error rate.
• To prioritise urban environments and then indoor deployments (but not limited to
these environments and supporting full mobility).
• To enable compatibility with advanced antenna and receiver techniques: transmit and
receive diversity methods are used and might be enhanced
• To take into account User Equipment processing time and memory requirements:
UE’s limitations are taken into account by the network
• To minimize changes on existing techniques and architecture: modest changes
to NodeB hardware and UTRAN software
HSDPA Targets
Higher Data Rates for Streaming-, Interactive- and Background Services
HSDPA is a feature based on a downlink shared channel that allows user net-data rates of up to
10 Mbit/s. It is designed to support services that require instantaneous high rates in the downlink
and lower rates on the uplink. This feature also decreases the level of retransmissions (at the
radio link and hence higher layers), in turn allowing the reduction of delivery time. Examples of
end-user services targeted by HSDPA are internet browsing and video on demand.
HSDPA Targets
HSDPA Characteristics
High Speed Downlink Packet Access comes with certain characteristics which
distinguishes it clearly from Rel. ’99 UTRAN.
Modulation Types
QPSK is already known from Rel. ’99 UTRAN. Besides QPSK, HSDPA incorporates the
16-QAM modulation to increase the peak data rates for users served under favorable radio
conditions. Support for QPSK is mandatory, though the support for 16-QAM is optional for the
network and UE. 16-QAM (Quadrature Amplitude Modulation) was newly introduced in Rel .5
with HSDPA. It is a so called higher order modulation which basically doubles the data rate in
good radio conditions. Thus it increases the spectrum efficiency of WCDMA.
Hybrid ARQ
HARQ functionality combines retransmission with the original transmissions. There a two
different ways for HARQ to operate. Either identical retransmission of the data block are sent
or retransmission are not identical and differ in data and parity bits compared to the original
transmission. The first method is known as chase combining and, the latter as incremental
redundancy . HARQ operates on an N-channel Stop and Wait principle.
HSDPA Characteristics
QPSK
Each symbol corresponds to 2 consecutive input bits. The four symbols are represented
by different phase shifts in the I/Q plane.
16–QAM
Each symbol corresponds to four consecutive input bits. Thus the data rate can be doubled with
16-QAM compared to QPSK. The 16 symbols are represented in the I/Q plane by different phase
shifts and amplitudes. In 16-QAM modulation the symbol value is determined by phase and
amplitude. Compared to that, in QPSK the phase is only modulated and variation in amplitude
have only minor influence on the decision space in the I/Q diagram. However with 16-QAM the
decision space is heavily influenced by amplitude variations, thus higher constraints are put on
the transmitter linearity. Note, a more accurate phase estimate is necessary with 16-QAM since
constellation points have smaller differences in phase domain compared to QPSK.
Note: The number of constellation points in the I/Q-diagram can be calculated with 2m,
where m represents the number of bits or chips per modulation symbol. QPSK modulation
has four constellation points in the I/Q-diagram: 2^m = 4 ⇔ m = 2. 16-QAM modulation
has 16 constellation points in the I/Q-diagram: 2^m = 16 ⇔ m = 4
HSDPA – Rel. 5
In HSDPA the spreading factor for the user plane is fixed to ‘16’. Thus up to 15 physical
channels can be allocated at maximum per UE.
⇒ QPSK:
⇒ The downlink slot format # 0 allows for 320 bits/slot and per physical channel.
This results in 960 bits/ 2 ms subframe.
⇒ The maximum physical data rate considering 15 spreading codes @ sf16 is: 7.2 Mbit/s.
16-QAM
⇒ The downlink slot format #1 allows for 640 bits/slot and per physical channel.
This results in 1920 bits/ 2 ms subframe.
⇒ The maximum physical data rate considering 15 spreading codes @ sf16 is: 14.4 Mbit/s.
Downlink
2 bits/symbol x [3.84 Mcps / (4 chips/symbol)] x (3 OVSF's) = 5.76 Mbits/S
Uplink
1 bits/symbol x [3.84 Mcps / (4 chips/symbol)] x (6 OVSF's) = 5.76 Mbits/S
HSDPA Rel. 5
QPSK
2 bits/symbol x [3.84 Mcps / (16 chips/symbol)] x (15 OVSF's) = 7.2 Mbits/S
16-QAM
4 bits/symbol x [3.84 Mcps / (16 chips/symbol)] x (15 OVSF's) = 14.4 Mbits/S
Transport Channel:
HS-DSCH (High Speed Downlink Shared Channel)
The HS-DSCH is the actual transport resource carrying the packet data of the user applications.
As it also follows the shortened TTI of 2 ms, it allows for short round trip delay in the
operation between NodeB and UE. The 2 ms TTI is short when compared to 10, 20, 40 or
80 ms TTI’s supported by Rel. ’99 and Rel. 4 transport channels. HS-DSCH describes the
physical layer processing by MAC-hs of a HSDPA transport block.
⇒ Dynamic part: TB size = TBS size {1 to 200 000 bits with 8 bit granularity}; modulation
scheme {QPSK, 16-QAM}; redundancy / constellation version {1 … 8}.
⇒ Static part: TTI {2 ms for FDD}; type of channel coding {turbo coding}; mother
code rate {1/3}, CRC size {24 bits}
⇒ No semi-static attributes are defined for HS-DSCH.
Physical Channels
High Speed Shared Control Channel (HS-SCCH)
The HS-SCCH has a fixed spreading factor of value ‘128’ and is configured only in the downlink
direction. It also adopts the shortened TTI of 2 ms. In theory, up to 127 HS-SCCH’s can be configured
in a cell. However, the UE is required only to be able to listen to up to four HS-SCCH in parallel.
The HS-SCCH allows the efficient sharing of one or more HS-PDSCH’s among different users.
Nevertheless every UE needs to be informed on the DCCH via RRC messages about the specific
HS-SCCH-set that it shall monitor in order to receive data via the HS-PDSCH’s.
Uplink Dedicated Control Channel Associated with HS-DSCH Transmission (Uplink HS-DPCCH).
The HS-DPCCH has a fixed spreading factor of value ‘256’ and is only configured in uplink direction.
The HS-DPCCH also follows the shortened TTI of 2 ms. Its purpose is to provide feedback
information about the downlink receive quality and whether the packet data received by the UE
are error-free or need to be retransmitted. Thus the NodeB is quickly notified of unsuccessful
transmissions and/or changing radio conditions in downlink direction.
Transport
Channels
Physical
Channels
Beamforming
Beamforming makes use of adaptive antennas and can therefore provide a better C/I to UEs in
the downlink. At the same time beamforming allows re-use of scarce downlink channelization
codes as the individual UEs are separated in space and possibly through different downlink
scrambling codes, thus making use of secondary scrambling codes. The signals toward different
UEs from the same cell are typically transmitted under the same primary scrambling code and
separated by means of orthogonal channelization codes. However, some of the beams may be
transmitted under a secondary scrambling code with its associated channelization code tree, thereby
increasing the resources in the cell. Note that the loss of the reduced orthogonality between
primary and secondary scrambling code can be partly mitigated in the case of beamforming by
splitting the cell into multiple scrambling code regions, so the spatial isolation between beams
using different scrambling codes helps to compensate the lack of orthogonality.
Transmit Diversity
The downlink capacity could be improved by using receive antenna diversity in the UE. However for
small and cheap mobiles it is not feasible to use two antennas and receiver chains. Therefore, the
WCDMA standard already supports the use of base station transmit diversity in Rel. ’99. There are
two modes: open loop (TSTD and STTD) and closed loop mode (mode1 with phase adjustment only
and mode 2 with phase and amplitude adjustment). The open loop mode simply transmits the coded
information from two antennas, but on the diversity antenna the bits are time reversed and complex
conjugated. The STTD method provides two kinds of diversity. The physical separation of the antennas
provides space diversity and the time difference derived from a bit-reversing process provides for time
diversity, thus the decoding in the receiver becomes more reliable. The closed loop mode can only be
applied to the downlink channel, if there is an associated uplink channel. Thus this mode can only be
used with dedicated channels (DPCH, PDSCH or HS-PDSCH with an associated uplink DPCCH).
MIMO
With MIMO (Multiple Input Multiple Output) at the transmitter, x independent data streams are transmitted
out of the x antennas on the same frequency band. At the receiver, each antenna receives all of the
transmitted sub-streams superimposed, not separately. If multipath scattering is sufficient, these x data
streams have different spatial signatures to each of the e.g. p receive antennas and they are separable,
the signals arrive with different phases. When a transmitter has x antennas and the receiver has p
antennas, the link speed increases linearly with min (x,p) given the same power and bandwidth budget.
Chapter 9
HSUPA Overview
Chapter Objectives
• Describe the key technologies used in HSUPA
• Describe the RAN architecture impacts
• Describe the HSUPA transport and physical channels
• Describe the different TTIs available for HSUPA
Introduction
After the first release of HSDPA in 3GPP R5 in mid 2002 work started on the High Speed
Uplink Packet Access (HSUPA) and over the course of the next 3 years the concept
materialized into the specifications and was realized in 3GPP R6.
Key Technologies
The new uplink transport channel Enhanced DCH (E-DCH) brings some of the same features to the
uplink as the HSDPA with its new transport channel HS-DSCH to the downlink. The E-DCH supports
fast NodeB based scheduling,fast physical layer HARQ with incremental redundancy and at USR7
a shorter 2ms TTI. E-DCH is not a shared channel like HSDPA, but it is in fact a dedicated channel
and can therefore support technologies like fast power control, variable SFand soft handovers.
Uplink Scheduling
The uplink scheduling mechanism is of central importance for HSUPA. The uplink scheduler is
located in the Node B close to the air interface in a similar way as HSDPA.
Task of the uplink scheduler is to control the uplink resources the UEs in the cell are using. The
scheduler therefore grants maximum allowed transmit power ratios to each UE. This effectively
limits the transport block size the UE can select and thus the uplink data rate.
The scheduling mechanism is based on absolute and relative grants. The absolute grants are used to
initialize the scheduling process and provide absolute transmit power ratios to the UE, whereas the
relative grants are used for incremental up- or downgrades of the allowed transmit power.
Note that one UE has to evaluate scheduling commands possibly from different radio links.
This is due to the fact that uplink macro diversity is used in HSUPA.
Introduction
20 Users Per Cell 60 Users Per Cell
USR 6 USR 7
1.44 Mbps Per User 5.76 Mbps Per User
Iub
Iu
CN RNC
NodeB
• Variable SF
• HARQ
• BTS Based Scheduling
• Fast Power Control
• Soft Handover
• TTI Length of 2 (USR7) and 10ms
CN
Node B (of serving radio link set): Node B (of non-serving radio link set):
• Scheduling: absolute/relative grants; • Scheduling: absolute/relative grants;
• HARQ: Soft-combining, generation of • HARQ: Soft-combining, generation of
ACK/NACK ACK/NACK
HSUPA Channels
As said before, HSUPA is a new uplink transport channel, E-DCH, which supports enhanced
features to those of the uplink transport channels of R99. Uplink transport channel processing
for E-DCH is similar to the processing of the uplink DCH with two exceptions. There can be only
one E-DCH transport channel in the UE, unlike DCHs that are multiplexed together to a Single
Coded Composite Transport Channel (CCTrCH) of DCH type. Nevertheless, the MAC layer can
multiplex multiple parallel services to the single E-DCH. The other significant difference is HARQ
support for the E-DCH which is provided in the transport channel processing chain.
After transport channel processing, the E-DCH maps to one or multiple parallel new dedicated physical
data channels – E-DPDCHs – for physical layer transmission. This is completely parallel to uplink DCH
processing chain and physical channels, so both E-DCH and DCH can coexist in the same UE with the
restriction that the maximum DCH data rate is 64 kbps when the E-DCH is configured.
Using E-DPDCH transmissions a simultaneous and parallel control channel is sent a separate
code channel – E-DPCCH. This E-DPCCH transmits all the necessary information about the
E-DPDCH that is needed in order to know how to receive the data channel.
In the downlink, 3 new channels are introduced for control purposes:
• E-AGCH: E-DCH Absolute Grant Channel carrying absolute grants;
• E-RGCH: E-DCH Relative Grant Channel carrying relative grants;
• E-HICH: E-DCH Hybrid ARQ Indicator Channel carrying ACK/NACK.
E-AGCH is only transmitted from the serving cell. E-RGCH and E-HICH are transmitted from radio
links that are part of the serving radio link set and from non-serving radio links.
Note that HSUPA channels are added on top of uplink / downlink dedicated channels. Each
UE therefore additionally carries an uplink and downlink Dedicated Physical Channel (DPCH).
In the downlink, a Fractional Dedicated Channel (F-DPCH) can be used alternatively. The
F-DPCH has been introduced in 3GPP release 6 in order to optimize the downlink channelization
code usage. With this concept, several UEs can share one downlink channelization code of SF
256. For this purpose, the F-DPCH uses a new slot format only containing the Transmit Power
Control (TPC) bits. Unlike the regular downlink DPCH slot formats, no pilot or data fields are
present. By assigning a UE specific timing offset, it is possible to multiplex up to 10 UEs onto
one channelization code for FDPCH. The F-DPCH is available in USR7.
HSUPA Channels
Node B with
Node B with
serving E-
non-serving
DCH radio
E-DCH radio
link set
link E-DCH Dedicated Physical E-DCH Dedicated Physical
Data Channel – Uplink data Data Channel – Uplink data
A single E-DCH transport channel processing chain always gets one transport block to process for
transmission in one TTI, because – for the DCH – a set of transport blocks for each configured
DCH will be delivered to the processing chain. In the slide opposite the differences between the
elements of transport channel processing chains for the E-DCH and DCH are illustrated:
• CRC attachment for the E-DCH always attaches a 24-bit CRC to the transport
block received fromthe MAC layer. In comparison, the CRC length for the DCH is
configurable and can be 0, 8, 12, 16, or 24 bits.
• Code block segmentation for the E-DCH splits its input into equal size code blocks so that the
length of the block does not exceed 5114 bits. For the DCH the same block first concatenates the
transport block set to a single block of data before splitting. Also the size of the maximum code block
with the DCH depends on the coding in use (5114 for turbo-coding and 504 for convolutional coding).
• Channel coding for the E-DCH is always turbo-coding with a code rate of 1/3. DCH channel coding
may be either convolutional coding with code rates 1/2 or 1/3 or turbocoding with a code rate of 1/3.
• Physical layer HARQ funtionality/rate matching for the E-DCH matches the channel
codes output bits to the available physical channel bits and produces the different
redundancy versions needed for incremental redundancy HARQ.
• Physical channel segmentation for the E-DCH distributes the channel bits among the
multiple E-DPDCHs if more than one E-DPDCH is needed. The functionality is also the
same in the corresponding block in the DCH processing chain.
• Interleaving and physical channel mapping for the E-DCH, as well as for the
DCH, interleaves the bits in the radio frame and maps the bits to be transmitted
to their final positions in the physical channel.
The E-DPDCH is time aligned with the uplink Dedicated Physical Control Channel (DPCCH).
All the cells in the same Node B are assumed to receive uplink E-DPDCH transmission in cooperation
and, thus, even if there are multiple cells in the Node B participating in a softer handover the TTI
reception either succeeds or fails only once, not separately in all the cells. Due to this all E-HICHs
transmitted from the Node B containing the serving E-DCH cell transmit both ACKs and NACKs,
effectively enabling the UE to combine the radio links for more reliable ACK/NACK detection.
E-HICH and E-RGCH channel structures are exactly the same and are shown opposite. Each delivers
1 bit of information in three slots. In the case of a 10-ms TTI the three slots are repeated four
times resulting in an 8-ms-long message. The exception is the E-RGCH transmitted from cells not
belonging to the serving E-DCH radio link set. That channel always – regardless of the E-DCH TTI
– transmits a 10-ms-long message (i.e., the three slots are always repeated five times).
The E-HICH/E-RGCH basic building block is a 40-bit-long orthogonal sequence which allows the
orthogonal multiplexing of 40 bits in one slot on a single spreading factor 128-code channel. The same
E-HICH/E-RGCH bit is repeated three times over three slots, but uses a different signature in each of
the three slots following a deterministic code hopping pattern. This is because different signature pairs
have different isolations in a real radio environment and, thus, the effect is averaged this way.
E-HICHs and E-RGCHs utilize 40-bit-long orthogonal sequences for multiplexing multiple E-HICHs
and E-RGCHs (40 in total) to a single downlink code channel of spreading factor 128.
One cell can use multiple channelization codes to exceed the limit of 40 signatures (e.g., 20
E-HICHs and 20 E-RGCHs in a code) with the constraint that the E-HICH and E-RGCH intended
for the same UE must be transmitted with the same channelization code.
l
ntro
H Co
C
E-D A
DP
H/HS NodeB
DC
H
/DC
- DCH
E
Chapter 10
Objectives
On completion of this chapter the student should be able to:
• Describe the General Protocol Model for UMTS.
• Describe the Interface specific protocol structure for the following interfaces:
◦ luCS
◦ luPS
◦ lub
◦ lu r
IuCS
Iub
NodeB MSCu
E1 ATM SDH
ATM
SDH ATM
IP
E1 IP
RAN
Uu FE IP
RNC
Iub
NodeB IuPS
SGSN
Access Stratum
The Access Stratum (AS) is a functional entity that encompasses radio protocols between
the UE and the UTRAN and, terrestrial interface (Iu) protocols between the UTRAN and the
Core Network (CN). These protocols all terminate within the UTRAN.
Non-Access Stratum
The Non-access Stratum (NAS) includes CN protocols that form a direct connection
between the UE and the CN itself. The NAS is transparent to the UTRAN and thus
these protocols do not terminate in the UTRAN.
The NAS protocols encompass functions such as; Mobility Management (MM), Call Control
(CC), Short Message Services (SMS) and Suplementary Services (SS) associated with
the circuit switched CN and, GPRS Mobility Management (GMM), Session Managment
(SM) and GPRS SMS assocoiated with the packet switched CN.
The NAS tries to remain independent of the underlying radio technology. Thus the NAS protocols can
remain unchanged regardless of the Radio Access Network (RAN) that carries them.
Access Stratum
Radio Radio Iu Iu
Protocols Protocols Protocols Protocols
Uu-Interface Iu-Interface
Horizontal Layers
The General protocol stack only consists of two layers, the Transport Network Layer and the Radio
Network Layer. From the bottom, the Physical layer (Part of the Transport Network Layer) will provide
the physical medium for transmission. Above the Physical layer is the Transport layer (Part of the
Transport Network Layer) which contains the transport protocols. These protocols are not defined
within the UMTS specifications. The Transport Network Protocol proposed for UMTS is ATM. The top
layer is called the Radio Network layer, this is the layer responsible for all UTRAN related tasks.
The tasks performed on Radio Network Layer are transparent to Transport Network Layer.
Vertical Planes
Control Plane
The Control plane only exists on L3 of the Horizontal planes and is responsible for all UMTS specific
signalling. The protocols used for the control plane are the RANAP protocol for the Iu interface, the
RNSAP protocol for the Iur interface and the NBAP protocol for the Iub interface. These are all
termed Application protocols and will be used for tasks like setting up bearers to the UE. Operation
& Maintenance actions will always set up the signalling Bearers for the Application protocol.
User Plane
This plane is being used for transfer of all kinds of information e.g. multimedia, e-mail, speech
etc. The User Plane consists of the Data Stream that will be transported on the Data Bearer.
Each data stream is identified and characterised by one or more frame protocols.
Transport
ALCAP(S)
Network
Layer
Physical Layer
NOTE On the Iu-CS, a single SAAL NNI link can share the transport of
both RANAP and ALCAP signalling.
ATM
Physical Layer
Transport
User Plane Control Plane User Plane
Network
Layer
A B C
SCCP GTP-U
MTP3-B UDP
IP
SAAL NNI
AAL Type 5
ATM ATM
Physical Layer Physical Layer
RACH FP
HSDSCH FP
FACH FP
PCH FP
DCH FP
Network
Layer NBAP
Transport
Transport Network Transport
Network User Control Plane Network User
Plane Plane
ALCAP
Transport
Network SAAL SCTP SAAL UDP
Layer
AAL5 IP AAL5 AAL2 IP
Data Link Data Link
ATM Layer ATM ATM Layer
Physical Layer
ATM
Physical Layer
Chapter 11
Objectives
On completion of this chapter the student should be able to:
• State the transport mechanisms used for the UMTS transport network.
• Describe the basic principles of ATM.
• Describe the use of PDH and SDH bearers for UMTS.
IuCS
Iub
NodeB MSCu
E1 ATM SDH
ATM
SDH ATM
IP
E1 IP
RAN
Uu FE IP
RNC
Iub
NodeB IuPS
SGSN
ATM Principles
ATM is used to transfer different types of information with different rates over one or more
common links with a high bit rate. This properties makes ATM an extremely useful system
when it comes to wideband or broadband data transfer.
ATM is a cell-switching and multiplexing technology that combines the benefits of circuit
switching (guaranteed capacity and constant transmission delay) with those of packet switching
(flexibility and efficiency for intermittent traffic). It provides scalable bandwidth from a few
Mbps to many Gbps. Because of its asynchronous nature, ATM is more efficient than
synchronous technologies, such as Time-Division Multiplexing (TDM).
With TDM, each user is assigned to a time slot, and no other station can send in that time slot. If a
station has much data to send, it can send only when its time slot comes up, even if all other time slots
are empty. However, if a station has nothing to transmit when its time slot comes up, the time slot is
sent empty and is wasted. Because ATM is asynchronous, time slots are available on demand with
information identifying the source of the transmission contained in the header of each ATM cell.
ATM Principles
Fixed Bit Stream
Discontinues
Bit Stream
Plane Function
User plane Transfers user data such as protocol data and voice data
Control plane Transfers signaling control data such as connection setup signaling
and connection release signaling
Management plane Transfers the OM data of the network. The management plane
is divided into layer management part and plane management
part that manage the data at each layer and the inter-layer data
respectively.
Plane Management
Layer Management
Higher Layer
ATM Layer
Physical Layer
ATM Layer
ATM switching is a fast packet switching technology. In ATM switching, each packet
that consists of 53 bytes is called a cell. Based on the physical layer, the ATM layer
communicates with the peer layer through ATM cells.
ATM Layer
ATM Path
ATM ATM
END VP Switch VC Switch END
SYSTEM SYSTEM
Endpoint
of VPC
VP Switch VP Switch
AAL1
AAL1, a connection-oriented service, is suitable for handling Constant Bit Rate (CBR) sources ,
such as voice and videoconferencing. ATM transports CBR traffic using circuit-emulation services.
AAL1 requires timing synchronization between the source and the destination. For this reason,
AAL1 depends on a medium, such as SONET, that supports clocking.
AAL2
Another traffic type has timing requirements like CBR but tends to be bursty in nature. This is called
Variable Bit Rate (VBR) traffic. This typically includes services characterized as packetized voice or
video that do not have a constant data transmission speed but that do have requirements similar to
constant bit rate services. AAL2 is suitable for VBR traffic. The AAL2 process uses 44 bytes of the
cell payload for user data and reserves 4 bytes of the payload to support the AAL2 processes.
VBR traffic is characterized as either real-time (VBR-RT) or as non-real-time (VBR-NRT).
AAL2 supports both types of VBR traffic.
AAL3/4
AAL3/4 supports both connection-oriented and connectionless data. It was designed for network
service providers and is closely aligned with Switched Multimegabit Data Service (SMDS).
AAL3/4 is used to transmit SMDS packets over an ATM network.
AAL5
AAL5 is the primary AAL for data and supports both connection-oriented and connectionless data.
It is used to transfer most non-SMDS data, such as classical IP over ATM and LAN Emulation
(LANE). AAL5 also is known as the Simple and Efficient Adaptation Layer (SEAL).
Connection Connection
Connection Rate
Orientated Less
Guaranteed bandwidth Y Y Y N
Applicable to realtime
Y Y N N
communication
Applicable to burst
N N Y Y
communication
Feedback on congestion N N N N
ATM QoS
ATM supports QoS guarantees comprising traffic contract, traffic shaping, and traffic policing.
A traffic contract specifies an envelope that describes the intended data flow. This envelope specifies
values for peak bandwidth, average sustained bandwidth, and burst size, among others. When an ATM
end system connects to an ATM network, it enters a contract with the network, based on QoS parameters.
Traffic shaping is the use of queues to constrain data bursts, limit peak data rate, and smooth jitters
so that traffic will fit within the promised envelope. ATM devices are responsible for adhering to the
contract by means of traffic shaping. ATM switches can use traffic policing to enforce the contract. The
switch can measure the actual traffic flow and compare it against the agreed-upon traffic envelope. If
the switch finds that traffic is outside of the agreed-upon parameters, it can set the Cell Loss Priority
(CLP) bit of the offending cells. Setting the CLP bit makes the cell discard eligible, which means
that any switch handling the cell is allowed to drop the cell during periods of congestion.
ATM QoS
Parameter Abbreviations Meaning
Sustainable cell rate SCR Long-term average cell transmission rate (cell/s)
E1/T1 Architecture
Logical Links
We have seen some of the mediums over which the data is transmitted, now let us consider
the format of the data that is carried over these mediums.
In GSM all the data is in digital form, and the path that the data takes is called a logical link. The format of
the data is dependent on where in the system the data is and what sort of data needs to be transferred.
E1
In the European GSM system the basic building block of data that gets carried around the
network is based around the multiplexed 2.048 Mbit/s frame.
This frame contains 32 channels of 64 Kbit/s. 30 are used for user information. Channel 0 is
reserved for timing and synchronisation and channel 16 is used for signalling.
E1 also specifies the sampling rate, frequency bandwidth, bits per sample, time slots per frame,
output bit rate, encoding law and the dedicated signalling and synchronisation channels.
T1
T1 is the American version of E1.
There are significant differences in the make up of the TDM frame.
T1 uses 24 time slots per frame, with 24 PCM channels per frame. The output bit rate is 1.544 Mbit/s
and the signalling used in the frame is only used once every 6th frame, instead of every frame in E1.
E1/T1 Architecture
E1
Frequency Range 300 - 3400Hz
Sample Rate 8000Hz
Bits per Sample 8
Time Slots per Frame 32
Output Bit Rate 2.048 Mbps
Encoding Law A LAW
Signalling Capabilities TS0 Sync
TS16 Signalling
T1/DS1
Frequency 300 - 3400Hz
Sampling Rate 8000Hz
Bits per Sample 8
Bits per Frame 193
PCM Channels per Frame 24
Output Bit Rate 1.544 Mbps
Encoding Law μ Law
Signalling Capabilities 1st bit in frame - Sync
1 bit in timeslots 6 and 12
E1 Link Multiplexing
The standard E1 and T1 streams can be further multiplexed to put more
channels over one transmission path.
E1 Link Multiplexing
E1 Series Hierarchies
E1 E2 E3 E4 E5
2.048 Mb/s 8.448 Mb/s 34.368 Mb/s 139.264 Mb/s 564.992 Mb/s
30 TCH
x4
120 TCH
x4
480 TCH
x4 1,920 TCH
7,680 TCH
x4
Physical Link #1
PHY PHY
Single ATM CellStream Original ATM Cell
from ATM Layer Stream to ATM Layer
Physical Link #2
PHY PHY
IMA Frames
IMA Frame 2 IMA Frame 1 IMA Frame 0
ATM ATM ATM F ICP2 F F ATM F ICP1 ATM F ATM F ICP0 Link 0
F ICP2 ATM F F ATM ICP1 ATM ATM ATM ATM ICP0 ATM F F Link 1
F ATM ATM ICP2 F ATM F ATM ICP1 ATM ATM F ATM ICP0 ATM Link 2
Time
ICP1 ICP Cell in Frame # 1 F Filler Cell ATM ATM Layer Cell
Network Simplification
Synchronous transmission equipment eliminates the multiplexer mountain, leading to lower equipment
and maintenance costs, and improved service provisioning. The diagram shows how 2Mbps channels
can be dropped and inserted from a Synchronous Transfer Module, Type 1 (STM-1) by means
of remote commands at a network management station. The flexibility of SDH transmission is
attractive to carriers because it offers the potential of generating new revenues.
Survivability
SDH includes overheads for end-to-end monitoring and maintenance of transmission equipment;
the network management station can immediately identify the failure of links and equipment.
Furthermore, as shown in the diagram, an SDH network can be constructed with a self-healing
ring architecture that automatically reroutes traffic until the faulty segment is repaired; there will be
no disruption of service to the end user, allowing carriers to guarantee service levels.
Software Control
SDH also includes overheads for management channels; these are used for performance
monitoring, equipment configuration, resource management, network security, inventory
management, network planning and network design. Since all of these management
operations can be performed remotely, SDH offers the possibility of centralised network
management and provisioning, with associated cost savings.
Bandwidth on Demand
The flexibility of SDH allows carriers to allocate network capacity dynamically in that users will be able to
subscribe at very short notice to large bandwidth services e.g. video-conferencing. This feature opens
up the possibility of providing new services e.g. high-speed LAN interconnection and High Definition TV.
12 63 155Mbps 155Mb/s
Principles of SDH
Although a full description of SDH is beyond the scope of this course, this
section will cover the main principles.
The diagram shows the SDH multiplex structure, indicating how an STM is formed from various PDH
traffic rates. The following terms are used in the diagram, and further explained below:
• C - Container
• VC - Virtual Container
• TU - Tributary Units
• TUG - Tributary Unit Group
• AU - Administrative Unit
• AUG - Administrative Unit Group
• STM - Synchronous Transfer Module
The following table lists the container size suffices used when referring to equivalent
PDH traffic rates within SDH signals:
Principles of SDH
SDH Multiplex Structure
x1
STM-N AUG AU-4 VC-4 C-4 140 Mbit/s
x3
x1
x3 TUG-3 TU-3 VC-3
x7
AU-3 VC-3 C-3 45 Mbit/ s
34 Mbit/ s
x7 x1
TUG-2 TU-2 VC-2 C-2 6 Mbit/ s
x3
Daisy Chaining
From USR 2.0 it will be possible to configure Node B’s in a daisy chain. All types
of daisy chain are supported with the exception of closed loop. Up to 3 Node B’s
(4 including hub node B) can be daisy chained.
Circuit Emulation
From USR 2.0 the node B has the ability to terminate an ATM AAL1 connection and generate
a circuit data stream for use by another piece of network equipment connected to the Node
B. Using circuit emulation, the E1 connections are routed first through the UMTS base station
where it uses its ATM data, and converts the ATM AAL1 data to circuit data. The resulting
circuit data is sent out another E1 connection to the attached network equipment. This is
likely to be a BTS as operators move from GSM to UMTS.
OMC
STM-1 ATM Switch
Ethernet
MSCu
RNC
STM-1
SDH Ring
(STM-1/STM-4/STM-16)
Node B
Node B
E1, IMA
ATM Switch
E1, IMA
ATM Mux
STM-1 SGSN
E1, IMA STM-1
E1, IMA
Node B RNC
Node B BTS
Circuit Emulation
Node B
Introduction to IP RAN
With the IP transport technology, the IP RAN feature enables IP transport on the Iub interface.
The IP RAN feature is implemented to:
• Provide enough transmission bandwidth for high speed data services such as HSDPA
• Greatly reduce OPEX for transport and operation and maintenance
• Provide more flexible networking for the operator to reduce network deployment costs
The IP RAN feature yields the following benefits:
• Fully utilizing rich IP network resources.
Mainstream data communication networks are based on IP transport. They have multiple
access modes and large-scale deployment. The IP RAN feature enables the operator to
fully utilize the existing IP network resources for Iub networking.
• Economical IP network construction.
While facing the competition from the ATM network, the more economical IP
network is preferred by a number of vendors.
• Following the trend in network migration to protect the operator’s investment.
The IP transport technology is taking the lead in the data communication field,
and will dominate this field in the future.
The IP RAN can be configured in three different ways:
• TDM network
• Data network
• Hybrid transport network
TDM Network
In TDM networking mode, the RNC and NodeBs support IP over PPP over E1, which can be
based on PDH/SDH or Multiple Spanning Tree Protocol (MSTP).
Benefits: ensures security and QoS. Line clock signals can be extracted.
Restrictions: relatively high costs of E1 leasing
Introduction to IP RAN
NodeB
RNC
TDM Networking
NodeB IP over PPP over E1
Introduction to IP RAN
Data Network
The data network can be any of the following three types:
• Layer 2 network, for example, metropolitan area Ethernet
• Layer 3 network
• MSTP network
The data network can be accessed through FE or E1.
A common IP network has the following benefits and restrictions:
• Benefits: good availability and relatively low costs of leasing
• Restrictions: low security without QoS assurance. The requirements for
realtime services cannot be satisfied.
An IP network with assured QoS or a private network has the following benefits and restrictions:
• Benefits: high security and assured QoS
• Restrictions: relatively high costs.
Introduction to IP RAN
NodeB
Router Router
Router Router
RNC
Data Networking
NodeB IP accessed via FE
or E1
Introduction to IP RAN
Hybrid Transport Network
Hybrid transport enables services of different QoSs to be transported in different paths:
• The speech service with high QoS requirements is carried on the private
network such as PDH and SDH
• Data services with low QoS requirements are carried on the data network such as Ethernet.
The hybrid transport network has the following benefits and restrictions:
• Benefits: flexible to meet different requirements
• Restrictions: complicated management.
The relation between the transmission on the Iub interface and the
transmission technologies is as follows:
• Control plane on the Iub interface:
◦ To reduce signaling delay and connection time, data on the control plane for
the Iub interface is carried on the private network.
• User plane on the Iub interface:
◦ Realtime services are carried by private networks whereas non-realtime
services are carried by Ethernet.
The IP hybrid transport technology for the Iub interface has the following characteristics:
• The two paths from the RNC to the NodeB can connect to two transport networks
with different QoS requirements either:
◦ Through different ports, or
◦ Through the same port that connects to the external data equipment according
to Differentiated Services Code Point (DSCP)
• When the bandwidth of the low QoS network is restricted, low QoS services can be carried on the
high QoS network. When the bandwidth of the high QoS network is limited, the RNC reduces
the rate of the low QoS services that are carried on high QoS network, or the RNC rejects the
access of high QoS services if no low QoS services are carried on the high QoS network.
• The mapping between types of services and transmission modes is configurable.
The default mapping is as follows:
◦ The interactive service and the background service in the PS domain has low QoS
requirements. The two types of services are carried on the high QoS network only
when the bandwidth of the low QoS network is restricted.
◦ Other services have high QoS requirements such as Iub data on the
control plane, RRC signaling, CS services, common channel data of cells, PS
conversational service, and PS streaming service.
Introduction to IP RAN
TDM Networking
High QoS
NodeB
Router Router
Router Router
RNC
Data Networking
NodeB Low QoS
IP Address Structure
In the IP network, the IP address should be assigned to the hosts. If you connect a computer to the
Internet, you need to apply for an IP address from the Internet Service Provider (ISP).
The length of the IP address is 32 bits. The IP address consists of the following two parts:
• Network number (net-id): The first bits are called class segments (class bits) that
is used to identify the class of an IP address.
• Host number (host-id): identifies different hosts in the same network.
IP addresses are categorized into five classes, as shown in the diagram opposite. You
can identify an IP address class by its first bits.
The IP addresses of classes A, B, and C are most commonly used. IP addresses of class
D are used for multicasting. IP addresses of class E are reserved.
Network Available
Address Range Description
Type Range
A 0.0.0.0 1.0.0.0
127.255.255.255 126.0.0.0 • An all-zero host number means that the IP
address is the network address for network
routing.
SCTP Endpoint
The SCTP endpoint is the logical transmitter or receiver of SCTP packets.
The SCTP endpoint on a multi-homing host can be either a group of valid destination
transport addresses for data transmission to the peer host, or a group of valid originating
transport addresses for transmitting SCTP packets.
All the transport addresses used by an SCTP endpoint must use the same port number but can use
multiple IP addresses. The transport address used by an SCTP endpoint at a time must be unique.
A transport address is defined by the network layer address, transport layer protocols, and port number.
When the SCTP protocol works on the IP transport layer, the transport address is defined by the IP
address and SCTP port number. Then, the SCTP protocol acts as the transport layer protocol.
SCTP Association
SCTP association is the mapping between two SCTP endpoints. It involves two SCTP endpoints and
protocol status data. The protocol status data includes verification tag and transport sequence number.
SCTP association is uniquely identified by the transport address of the SCTP endpoint that uses the
SCTP association. There is a maximum of one SCTP association between two SCTP endpoints.
The SCTP message consists of the common header and the chunks the diagram on
the next page shows the SCTP message structure. Multiple chunks can be bundled
and transmitted in one datagrams to save bandwidth.
Layer 2 Switching
Fundamentally a layer 2 device is a switch with physical ports. The main benefit of Layer 2
switching is to make efficient use of network bandwidth. The first switches in fact sent traffic
arriving on all input ports to all the output ports without any processing. As the networks become
more complex it can be that, two or more ports on the same switch are connected to the same
LAN. This means that packets arriving at the switch leave on multiple ports onto the same LAN,
hence duplicate packets are created which will lead to congestion in the network.
Layer 2 switching eliminates looping traffic by defining a Spanning Tree and uses a Spanning Tree
Protocol to configure the spanning tree. The Spanning Tree Protocol identifies ports that are connected
to the same LAN and configures the switch to send any given packet out only on one port that is
connected to a given LAN. However the Spanning Tree Protocol keeps a track of these secondary
ports and allows traffic to be passed if the primary port goes OOS for any reason.
Layer 3 Switching
A layer 2 device is a switch that communicates using frames at layer 1 over physical ports. Whereas a
Layer 3 device is a router that communicates with packets. and a packet is encapsulated inside of
a frame. A router has interfaces for connection into the network medium i.e. Ethernet.
The Ethernet frame contains a source layer 2 MAC address and a destination layer 2 MAC address.
The IP packet contains a source layer 3 IP address and a destination layer 3 IP address. The router
maintains a routing table of network paths it has discovered. The router will examine the layer 3 IP
destination address of the packet. It will examine the routing table and determine if a path exists.
VLANs
VLAN processing is an extension to the concept of Layer 2 switching. The VLAN adds a four byte
tag field between the data link layer header (i.e. Ethernet) and the network layer (i.e. IP). This tag
contains among other things a VLAN Identifier (VID) and associated user priority field.
VLAN switches look for this tag and make a switching decision based on the tag
information that determines which port(s) to send the incoming packet out on. The
VLAN protocol defines three types of traffic:
• Untagged
• Priority Tagged
• VLAN Tagged.
Untagged packets are packets without any VLAN tag. Priority tagged packets are packets
with a VLAN tag, but a VID of zero (the NULL VID) and a valid priority field within the VLAN
tag. VLAN tagged packets contain a VLAN tag with a valid VID field (non-zero). VLAN-aware
switches must be able to classify and forward packets of all three types in order to work
with legacy equipment as well as other VLAN-aware equipment.
Incoming packets may be untagged, priority tagged, or VLAN tagged. Depending on how the
switch is configured, an untagged packet may leave priority-or- VLAN-tagged. Incoming VLAN
tagged packets may leave untagged or even tagged with a different VID.
There are also multiple ways of configuring what constitutes a VLAN. The VLAN specifications define a
port-based approach where each port is a member of a particular VLAN. All traffic coming or going on
this port would be a member of the configured VLAN. There is also a MAC-based approach to VLAN
processing where membership on a VLAN is defined by the source MAC address of a remote host.
R R
NodeB
RNC
Chapter 12
Annexe A
Objectives
On completion of this chapter the student should be able to:
• Describe selected UMTS Signalling Flow procedures.
1. Paging
RANAP RANAP
1. Paging
RANAP RANAP
Serving
UE CN
RNC
1. Paging
RANAP RANAP
Allocate RNTI
Select L1 and L2
parameters
Start Rx
6. Uplink Synchronisation
DCH DCH
Start Rx
RA Update
This example shows location registration when changing Routing Area including change of
3G SGSN when the UE is in MM idle state towards the 3G SGSN.
The illustrated transfer of MM signalling to/from the UE uses an established RRC connection. This
RRC connection can have been established beforehand due to ongoing inter-working between UE and
3G-MSC/VLR or be established only for this location registration procedure towards the 3G-SGSN. For
each indicated MM message sent in this case to/from UE, the CN discriminator indicates 3G-SGSN.
The following procedure will take place to perform the RA update:
1. The RRC connection is established, if not already done. The UE sends the initial message
Routing Area Update Request (old P-TMSI, old RAI, etc.) to the new 3G-SGSN. The old P-TMSI
and the old RAI are assigned data in UMTS. The SRNS transfers the message to the 3G-SGSN.
The sending of this message to 3G-SGSN will also imply establishment of a signalling connection
between SRNS and 3G-SGSN for the concerned UE. The UTRAN shall add the RAC and the
LAC of the cell where the message was received before passing the message to the SGSN.
2. The new 3G-SGSN send an SGSN Context Request (old P-TMSI, old RAI) to the old
3G-SGSN to get the IMSI for the UE. (The old RAI received from UE is used to derive
the old 3G-SGSN identity/address.) The old 3G-SGSN responds with SGSN Context
Response (e.g. IMSI, PDP context information and Authentication triplets).
3. Security functions may be executed.
4. The new 3G-SGSN informs the HLR of the change of 3G-SGSN by sending Update
GPRS Location (IMSI, SGSN number, SGSN address) to the HLR.
5. The HLR cancels the context in the old 3G-SGSN by sending Cancel Location (IMSI). The
old 3G-SGSN removes the context and acknowledges with Cancel Location Ack.
6. The HLR sends Insert Subscriber Data (IMSI, subscription data) to the new 3G-SGSN.
The new 3G-SGSN acknowledges with Insert Subscriber Data Ack.
7. The HLR acknowledges the Update GPRS Location by sending Update GPRS
Location Acknowledge to the new 3G-SGSN.
8. The new 3G-SGSN validates the UE’s presence in the new RA. If due to regional, national
or international restrictions the UE is not allowed to attach in the RA or if subscription
checking fails, then the new 3G-SGSN rejects the Routing Area Update Request with
an appropriate cause. If all checks are successful, then the new 3G-SGSN responds to
the UE with Routing Area Update Accept (new P-TMSI, new RAI, etc.).
9. The UE acknowledges the new P-TMSI with Routing Area Update Complete.
10. When the location registration procedure is finished, the 3G-SGSN may release the signalling
connection towards the SRNS for the concerned UE. The SRNS will then release the RRC
connection if there is no signalling connection between 3G-MSC/VLR and SRNS for the UE.
RA Update
New Old
UE SRNS HLR
3G_SGSN 3G_SGSN
1. RRC connection
establishment
1. RRC update required (old RAI, old P-TMSI)
2. SGSN Context Required (old P-TMSI, old RAI)
2. SGSN Context Resp. (IMSI, Auth.triplets)
3. Security Functions
4. Update GPRS Location
5. Cancel Location
5. Cancel Location Ack
6. Insert Subscriber Data
6. Insert Subscriber Data Ack
9. RA update complete
10. Release
10. RRC connection release
SRNC Relocation
This example shows SRNS relocation when the source RNC and target RNC
are connected to different 3G-MSC.
The procedure is as follows:
1. The UTRAN makes the decision to perform the Serving RNC relocation procedure,
including the decision of onto which RNC (Target RNC) the Serving RNC functionality
is to be relocated. The source SRNC sends SRNC Relocation required messages
to the MSC. This message includes parameters such as target RNC identifier and an
information field that shall be passed transparently to the target RNC.
2. Upon reception of SRNC Relocation required message the Anchor MSC prepares itself for the
switch and determines from the received information that the SRNC relocation will (in this case)
involve another MSC. The Anchor MSC will then send a Prepare SRNC Relocation Request to
the applicable non-anchor MSC, including the information received from the Source RNC.
3. The non-anchor MSC will send a SRNC Relocation Request message to the target RNC.
This message includes information for building up the SRNC context, transparently sent
from Source RNC (UE ID, No of connected CN nodes, UE capability information), and
directives for setting up Iu user plane transport bearers. When Iu user plane transport
bearers have been established, and target RNC has completed its preparation phase,
SRNC Relocation Proceeding 1 message is sent to the non-anchor MSC.
4. The Prepare SRNC Relocation Response that is sent from non-anchor MSC to Anchor MSC will
contain the "SRNC Relocation Proceeding 1 received" command from the target RNC.
5. When the "SRNC Relocation Proceeding 1" command has been received in the Anchor
MSC, the user plane transport bearers has been allocated between the target RNC and
Anchor MSC and the Anchor MSC is ready for the SRNC move. Then the Anchor MSC
indicates the completion of preparation phase at the CN side for the SRNC relocation by
sending the SRNC relocation proceeding 2 message to the Source RNC.
6. When the source RNC has received the "SRNC Relocation Proceeding 2" message, the
source RNC sends a SRNC Relocation Commit message to the target RNC. The target
RNC executes switch for all bearers at the earliest suitable time instance.
7. Immediately after a successful switch at RNC, the target RNC (=SRNC) sends "SRNC Relocation
Complete" message to the non-anchor MSC. This message is included by the non-anchor MSC
in the "Complete SRNC relocation message" that is sent to the anchor MSC. Upon reception of
this message, the Anchor-MSC switches from the old Iu transport bearers to the new ones.
8. After a successful switch at the Anchor MSC, a release indication is sent towards the Source
RNC. This will imply release of all UTRAN resources that were related to this UE.
9. When the target RNC is acting as SRNC, it will send New MM System Information
to the UE indicating e.g. relevant Routing Area and Location Area. Additional RRC
information may then also be sent to the UE, e.g. new RNTI identity.
SRNC Relocation
Source Target Anchor Non-anchor
UE HLR
RNC RNC MSC MSC
8. Release
Chapter 13
Glossary
A Interface - AUTO
C - CW
CEND End of charge point. The time at which the calling, or called, party
stops charging by the termination of the call or by an equivalent
procedure invoked by the network or by failure of the radio path.
CEPT Conférence des administrations Européennes des Postes et
Telecommunications.
CERM Circuit Error Rate Monitor. Identifies when discontinuity is
detected in a circuit. An alarm is generated and sent to the
OMC-R when the error count exceeds an operator specified
threshold. The alarm identifies the RCI or CIC and the path
where the error is detected.
CF Conversion Facility.
CF Call Forwarding. A feature available to the mobile telephone
user whereby, after initiation of the feature by an authorised
subscriber, calls dialled to the mobile telephone of an authorised
subscriber will automatically be routed to the desired number.
See also CFC and CFU.
CF Control Function. CF performs the SGSN mobility management
functions and OA&M functions for the GSN module.
CFB Call Forwarding on mobile subscriber Busy supplementary
service. Service automatically redirects incoming calls for phone
busy situations.
CFC Call Forwarding Conditional supplementary service. Service
automatically redirects incoming calls for busy, no reply, or not
reachable situations. See also CFB, CFNRc, and CFNRy.
CFM Configuration Fault Management RSS process.
D Interface - DYNET
E - EXEC
E See Erlang.
E1 Also known as CEPT1. The 2.048 Mbit/s rate used by European
CEPT carrier to transmit 30 64 kbit/s digital channels for voice
or data calls, plus a 64 kbit/s signalling channel and a 64 kbit/s
channel for framing and maintenance.
E Interface Interface between MSC and MSC.
EA External Alarm. See EAS. Typical external alarms are: Door
open, High humidity, Low humidity, Fire, Intruder.
EAS External Alarm System. The EAS is responsible for the monitoring
of all customer-defined environmental alarms at a site. The
customer defines the alarm string and the severity of the alarms
based on the individual requirements of the site. Indications are
provided when the alarms are set or cleared.
Eb/No Energy per Bit/Noise floor, where Eb is the signal energy per bit
and No is the noise energy per hertz of noise bandwidth.
EBCG Elementary Basic Service Group.
EC Echo Canceller. Performs echo suppression for all voice circuits.
If cancellation does not take place, the PLMN subscriber hears
the voice signal as an echo, due to the total round-trip delay
introduced by the GSM system (typically 180 ms).
ECB Provides echo cancelling for telephone trunks for 30 channels
(EC).
H Interface - Hyperframe
k - KW
k kilo (103).
k Windows size.
K Constraint length of the convolutional code.
KAIO Kernel Asynchronous Input/Output. Part of the OMC-R
relational database management system.
kb, kbit kilo-bit.
kbit/s, kbps kilo-bits per second.
kbyte kilobyte. 210 bytes = 1024 bytes
Kc Ciphering key. A sequence of symbols that controls the
operation of encipherment and decipherment.
kHz kilo-Hertz.
Ki Individual subscriber authentication Key. Part of the
authentication process of the AUC.
L1 - LV
M Mandatory.
M Mega (106).
M3UA MTP-3 User Adaptation Layer ( RFC 3332 / 3GPP 29.202
(Annex A))
M-Cell Motorola Cell.
M&TS Maintenance and TroubleShooting. Functional area of Network
Management software which (1) collects and displays alarms,
(2) collects and displays Software/Hardware errors, and (3)
activates test diagnostics at the NEs (OMC).
MA Mobile Allocation. The radio frequency channels allocated to
an MS for use in its frequency hopping sequence.
MAC Medium Access Control. MAC includes the functions related
to the management of the common transmission resources.
These include the packet data physical channels and their
radio link connections. Two Medium Access Control modes are
supported in GSR5, dynamic allocation and fixed allocation.
(UMTS  3GTS 25.321) (E)GPRS  3GTS 04.60 / 3GTS
44.060)
MACN Mobile Allocation Channel Number. See also MA.
Macrocell A cell in which the base station antenna is generally mounted
away from buildings or above rooftop level.
MAF Mobile Additional Function.
MAH Mobile Access Hunting supplementary service. An automatic
service which searches for the first available mobile user out of
a defined group.
MAI Mobile Allocation Index.
MAIDT Mean Accumulated Intrinsic Down Time.
MAINT MAINTenance.
MAIO Mobile Allocation Index Offset. The offset of the mobile hopping
sequence from the reference hopping sequence of the cell.
MAP Mobile Application Part (part of SS7 standard). The
inter-networking signalling between MSCs and LRs and EIRs.
MAPP Mobile Application Part Processor.
MASF Minimum Available Spreading Factor
Max [X, Y] The value shall be the maximum of X or Y, which ever is bigger
MB, Mbyte Megabyte. 220 bytes = 1,048,576 bytes = 1024 kilobytes.
Mbit/s Megabits per second.
MBZ Must Be Zero
MCAP Motorola Cellular Advanced Processor. The MCAP Bus is the
inter-GPROC communications channel in a BSC. Each card
cage in a BSC needs at least one GPROC designated as an
MCAP Server.
NACK - nW
O - Overlap
O Optional.
OA Outgoing Access supplementary service. An arrangement
which allows a member of a CUG to place calls outside the
CUG.
OA&M Operation, Administration, & Management.
PA - PXPDN
R - RXU
S7- SYSGEN
S7 See SS7.
S/W SoftWare.
SABM Set Asynchronous Balanced Mode. A message which
establishes the signalling link over the air interface.
SABME SABM Extended.
SABP Service Area Broadcast Protocol ( 3GTS 25.419)
T -TxBPF
T Timer.
T Transparent.
T Type only.
U - UUS
V - VTX host
V Value only.
VA Viterbi Algorithm (used in channel equalizers). An algorithm to
compute the optimal (most likely) state sequence in a model
given a sequence of observed outputs.
VAD Voice Activity Detection. A process used to identify presence or
absence of speech data bits. VAD is used with DTX.
VAP Videotex Access Point.
VBS Voice Broadcast Service. VBS allows the distribution of speech
(or other signals which can be transmitted via the speech
codec), generated by a service subscriber, into a predefined
geographical area to all or a group of service subscribers
located in this area.
VC See Virtual Circuit.
VCI Virtual Circuit Identifier ( ATM)
VCO Voltage Controlled Oscillator. An oscillator whose clock
frequency is determined by the magnitude of the voltage
presented at its input. The frequency changes when the
voltage changes.
VCXO Voltage Controlled Crystal Oscillator.
VDU Visual Display Unit. A device used for the real-time temporary
display of computer output data. Monitor.
VGCS Voice Group Call Service.
VHE Virtual Home Environment ( 3GTS 22.121, 3GTS 23.127)
W - WWW
X - X Window
ZC