Vous êtes sur la page 1sur 60

WCDMA Radio Interface Physical Layer

Huawei Technologies Co., Ltd.


All rights reserved

WCDMA Radio Interface Physical Layer

Confidentiality level: Customer

Revision Record
Date
28-02-2007

Version

Change description
Author
Victor Toledo

1A

Mexico Training Center

Confidential information of Huawei.

Page 2/60

WCDMA Radio Interface Physical Layer

Confidentiality level: Customer

Table of Contents
1

Physical layer Overview..........................................................................................................9


Protocol structure for radio interface ...............................................................................10
Spreading technology......................................................................................................14
Channelization Codes .....................................................................................................15
Scrambling codes ............................................................................................................16
Physical layer key technology .............................................................................................19
Logical channels..............................................................................................................19
Transport channels ..........................................................................................................21
Physical channel ..............................................................................................................22
Cell broadcast channels...................................................................................................25
Paging channels...............................................................................................................29
Random access channels ................................................................................................32
Dedicated channels..........................................................................................................35
High speed downlink shared channels ............................................................................37
Channel mapping .............................................................................................................40
Physical layer processing procedure..................................................................................41
Coding and multiplexing technology ...............................................................................41
Spreading technology......................................................................................................47
Modulation technology .....................................................................................................50
Physical layer procedures ....................................................................................................51
Cell search procedure .....................................................................................................51
Channel timing relationship .............................................................................................52
Random access procedure .............................................................................................53
Transmit Diversity Mode...................................................................................................55
Transmit Diversity-STDD .................................................................................................56
Transmit Diversity TSTD ..................................................................................................57
Closed Loop Mode ...........................................................................................................58

Mexico Training Center

Confidential information of Huawei.

Page 3/60

WCDMA Radio Interface Physical Layer

Mexico Training Center

Confidential information of Huawei.

Confidentiality level: Customer

Page 4/60

WCDMA Radio Interface Physical Layer

Confidentiality level: Customer

Foreword
The physical layer offers data transport services to higher layers.
The access to these services is through the use of transport channels via the MAC
sub-layer.
The physical layer is expected to perform the following functions in order to provide
the data transport service, for example Modulation and spreading/demodulation and
despreading, Inner - loop power control etc.

Mexico Training Center

Confidential information of Huawei.

Page 5/60

WCDMA Radio Interface Physical Layer

Mexico Training Center

Confidential information of Huawei.

Confidentiality level: Customer

Page 6/60

WCDMA Radio Interface Physical Layer

Confidentiality level: Customer

Objectives
Upon completion of this course, you will be able to:

Understand radio interface protocol Architecture.

Understand key technology of UMTS physical layer.

Understand UMTS physical layer procedures.

Mexico Training Center

Confidential information of Huawei.

Page 7/60

WCDMA Radio Interface Physical Layer

Confidentiality level: Customer

References

 TS 25.104 UTRA (BS) FDD Radio Transmission and Reception


 TS 25.201 Physical layer-general description
 TS 25.211 Physical channels and mapping of transport channels onto physical
channels (FDD)
 TS 25.212 Multiplexing and channel coding (FDD)
 TS 25.213 Spreading and modulation (FDD)
 TS 25.214 Physical layer procedures (FDD)
 TS 25.308 UTRA High Speed Downlink Packet Access (HSDPA); Overall
description; Stage 2
 TR 25.877 High Speed Downlink Packet Acces (HSDPA) - Iub/Iur Protocol
Aspects
 TR 25.858 Physical layer aspects of UTRA High Speed Downlink Packet Access

Mexico Training Center

Confidential information of Huawei.

Page 8/60

WCDMA Radio Interface Physical Layer

Confidentiality level: Customer

Physical Layer Overview


Core Network
Iu

Iu

RNS

RNS
Iur
RNC
Iub
Node B

RNC
Iub
Node B

Iub
Node B

Iub
Node B

Figure 1.- UTRAN Protocol structure.

UTRAN:UMTS Terrestrial Radio Access Network.


The UTRAN consists of a set of Radio Network Subsystems connected to the Core Network
through the Iu.
A RNS consists of a Radio Network Controller and one or more Node Bs. A Node B is
connected to the RNC through the Iub interface.
Inside the UTRAN, the RNCs of the Radio Network Subsystems can be interconnected
together through the Iur. Iu(s) and Iur are logical interfaces. Iur can be conveyed over direct
physical connection between RNCs or virtual networks using any suitable transport network.

Mexico Training Center

Confidential information of Huawei.

Page 9/60

WCDMA Radio Interface Physical Layer

Confidentiality level: Customer

Protocol Structure for radio interface

Figure 2.- Radio Interface Protocol structure.

The radio interface (Uu) is layered into three protocol layers:


 the physical layer (L1)
 the data link layer (L2)
 the network layer (L3).
The layer 1 supports all functions required for the transmission of bit streams on the physical
medium. It is also in charge of measurements function consisting in indicating to higher layers,
for example, Frame Error Rate (FER), Signal to Interference Ratio (SIR), interference power,
transmit power. It is basically composed of a layer 1 management entity, a transport channel
entity, and a physical channel entity.
The layer 2 protocol is responsible for providing functions such as mapping, ciphering,
retransmission and segmentation. It is made of four sublayers: MAC (Medium Access Control),
RLC (Radio Link Control), PDCP (Packet Data Convergence Protocol) and BMC
(Broadcast/Multicast Control).
The layer 3 is split into 2 parts: the access stratum and the non access stratum. The access
stratum part is made of RRC (Radio Resource Control) entity and duplication avoidance entity.
The non access stratum part is made of CC, MM parts.

Mexico Training Center

Confidential information of Huawei.

Page 10/60

WCDMA Radio Interface Physical Layer

Confidentiality level: Customer

Not shown on the figure are connections between RRC and all the other protocol layers
(RLC, MAC, PDCP, BMC and L1), which provide local inter-layer control services.
The protocol layers are located in the UE and the peer entities are in the node B or the RNC.
Many functions are managed by the RRC layer. Here is the list of the most important:
 Establishment, re-establishment, maintenance and release of an RRC
connection between the UE and UTRAN: it includes an optional cell re-selection, an
admission control, and a layer 2 signaling link establishment. When a RNC is in charge of a
specific connection towards a UE, it acts as the Serving RNC.
 Establishment, reconfiguration and release of Radio Bearers: a number of
Radio Bearers can be established for a UE at the same time. These bearers are configured
depending on the requested QoS. The RNC is also in charge of ensuring that the
requested QoS can be met.
 Assignment, reconfiguration and release of radio resources for the RRC
connection: it handles the assignment of radio resources (e.g. codes, shared channels).
RRC communicates with the UE to indicate new resources allocation when handovers are
managed.
 Paging/Notification: it broadcasts paging information from network to UEs.
 Broadcasting of information provided by the non-access stratum (Core
Network) or access Stratum. This corresponds to system information regularly repeated.
 UE measurement reporting and control of the reporting: RRC indicates what
to measure, when and how to report.
 Outer loop power control: controls setting of the target values.
 Control of ciphering: provides procedures for setting of ciphering.

The RRC layer is defined in the 25.331 specification from 3GPP.


The RLCs main function is the transfer of data from either the user or the control plane over
the Radio interface. Two different transfer modes are used: transparent and non-transparent. In
non-transparent mode, 2 sub-modes are used: acknowledged or unacknowledged.

RLC provides services to upper layers:



Data transfer (transparent, acknowledged and unacknowledged modes),

QoS setting: the retransmission protocol (for AM only) shall be configurable by
layer 3 to provide different QoS.

Notification of unrecoverable errors: RLC notifies the upper layers of errors
that cannot be resolved by RLC.

Mexico Training Center

Confidential information of Huawei.

Page 11/60

WCDMA Radio Interface Physical Layer

Confidentiality level: Customer

The RLC functions are:



mapping between higher layer PDUs and logical channels,

ciphering: prevents unauthorized acquisition of data; performed in RLC layer for
non-transparent RLC mode,

segmentation/reassembly: this function performs segmentation/reassembly of
variable-length higher layer PDUs into/from smaller RLC Payload Units. The RLC size is
adjustable to the actual set of transport formats (decided when service is established).
Concatenation and padding may also be used,

error correction: done by retransmission (acknowledged data transfer mode
only),

flow control: allows the RLC receiver to control the rate at which the peer RLC
transmitting entity may send information.

MAC services include:



Data transfer: service providing unacknowledged transfer of MAC SDUs
between peer MAC entities.

Reallocation of radio resources and MAC parameters: reconfiguration of MAC
functions such as change of identity of UE. Requested by the RRC layer.

Reporting of measurements: local measurements such as traffic volume and
quality indication are reported to the RRC layer.
The functions accomplished by the MAC sublayer are listed above.
explanation for some of them:

Heres a quick


Priority handling between the data flows of one UE: since UMTS is
multimedia, a user may activate several services at the same time, having possibly different
profiles (priority, QoS parameters...). Priority handling consists in setting the right transport
format for a high bit rate service and for a low bit rate service.

Priority handling between UEs: use for efficient spectrum resources utilization
for bursty transfers on common and shared channels.

Ciphering: to prevent unauthorized acquisition of data. Performed in the MAC
layer for transparent RLC mode.

Access Service Class (ACS) selection for RACH transmission: the RACH
resources are divided between different ACSs in order to provide different priorities on a
random access procedure.

PDCP
UMTS supports several network layer protocols providing protocol transparency for the
users of the service.
Using these protocols (and new ones) shall be possible without any changes to UTRAN
protocols. In order to perform this requirement, the PDCP layer has been introduced. Then,
functions related to transfer of packets from higher layers shall be carried out in a transparent
way by the UTRAN network entities.
PDCP shall also be responsible for implementing different kinds of optimization methods.
The currently known methods are standardized IETF (Internet Engineering Task Force) header
compression algorithms.

Mexico Training Center

Confidential information of Huawei.

Page 12/60

WCDMA Radio Interface Physical Layer

Confidentiality level: Customer

Algorithm types and their parameters are negotiated by RRC and indicated to PDCP.
Header compression and decompression are specific for each network layer protocol type.
In order to know which compression method is used, an identifier (PID: Packet Identifier) is
inserted. Compression algorithms exist for TCP/IP, RTP/UDP/IP,
Another function of PDCP is to provide numbering of PDUs. This is done if lossless SRNS
relocation is required.
To accomplish this function, each PDCP-SDUs (UL and DL) is buffered and numbered.
Numbering is done after header compression. SDUs are kept until information of successful
transmission of PDCP-PDU has been received from RLC. PDCP sequence number ranges from
0 to 65,535.

BMC (broadcast/multicast control protocol)


The main functions of BMC protocol are:
Storage of cell broadcast message. the BMC in RNC stores the cell broadcast message
received over the CBC-RNC interface for scheduled transmission.
Traffic volume monitoring and radio resource request for CBS. On the UTRAN side, the
BMC calculates the required transmission rate for the cell broadcast service based on the
messages received over the CBC-RNC interface, and requests appropriate .CTCH/FACH
resources from from RRC
Scheduling of BMC message. The BMC receives scheduling information together with
each cell broadcast message over the CBC-RNC interface. Based on this scheduling information,
on the UTRAN side the BMC generates schedule message and schedules BMC message
sequences accordingly. On the UE side, the BMC evaluates the schedule messages and
indicates scheduling parameters to RRC, which are used by RRC to configure the lower layers
for CBS discontinuous reception.
Transmission of BMC message to UE. The function transmits the BMC messages
according to the schedule
Delivery of cell broadcast messages to the upper layer. This UE function delivers the
received non-corrupted cell broadcast messages to the upper layer
The layer 1 (physical layer) is used to transmit information under the form of electrical
signals corresponding to bits, between the network and the mobile user. This information can be
voice, circuit or packet data, and network signaling.
The UMTS layer 1 offers data transport services to higher layers. The access to these
services is through the use of transport channels via the MAC sublayer.
These services are provided by radio links which are established by signaling procedures.
These links are managed by the layer 1 management entity. One radio link is made of one or
several transport channels, and one physical channel.

Mexico Training Center

Confidential information of Huawei.

Page 13/60

WCDMA Radio Interface Physical Layer

Confidentiality level: Customer

The UMTS layer 1 is divided into two sublayers: the transport and the physical sublayers.
All the processing (channel coding, interleaving, etc.) is done by the transport sublayer in order
to provide different services and their associated QoS. The physical sublayer is responsible for
the modulation, which corresponds to the association of bits (coming from the transport sublayer)
to electrical signals that can be carried over the air interface. The spreading operation is also
done by the physical sublayer. These sublayers are well described in chapters 6 and 7.
These two parts of layer 1 are controlled by the layer 1 management (L1M) entity. It is
made of several units located in every equipment, which exchange information through the use
of control channels.

Spreading Technology

Spreading consists of 2 steps


Channelization operation which transforms data symbols into chips. Thus
increasing the bandwidth of the signal, The number of chips per data symbol is called the
Spreading Factor SF .The operation is done by multiplying with OVSF code.

Scrambling operation is applied to the spreading signal .

Figure 3.- Spreading and scrambling

Spreading is applied to the physical channels. It consists of two operations. The first is the
channelization operation, which transforms every data symbol into a number of chips, thus
increasing the bandwidth of the signal. The number of chips per data symbol is called the
Spreading Factor (SF). The second operation is the scrambling operation, where a scrambling
code is applied to the spread signal.

Mexico Training Center

Confidential information of Huawei.

Page 14/60

WCDMA Radio Interface Physical Layer

Confidentiality level: Customer

Channelization codes
 OVSF code is used as channelization code
 The channelization codes are uniquely described as Cch,SF,k, where SF is the
spreading factor of the code and k is the code number, 0 k SF-1.

Figure 4.- Walsh codes.


The channelization codes are Orthogonal Variable Spreading Factor (OVSF) codes.
They are used to preserve orthogonality between different physical channels. They also
increase the clock rate to 3.84 Mcps. The OVSF codes are defined using a code tree.
In the code tree, the channelization codes are individually described by Cch,SF,k, where SF
is the Spreading Factor of the code and k the code number, 0 k SF-1.
A channelization sequence modulates one users bit. Because the chip rate is constant, the
different lengths of codes enable to have different user data rates. Low SFs are reserved for
high rate services while high SFs are for low rate services.
The length of an OVSF code is an even number of chips and the number of codes (for one
SF) is equal to the number of chips and to the SF value.
The generated codes within the same layer constitute a set of orthogonal codes.
Furthermore, any two codes of different layers are orthogonal except when one of the two codes
is a mother code of the other. For example C4,3 is not orthogonal with C1,0 and C2,1, but is
orthogonal with C2,0.
Each Sector of each Base Station transmits W-CDMA Downlink Traffic Channels with up to
512 code channels.

Mexico Training Center

Confidential information of Huawei.

Page 15/60

WCDMA Radio Interface Physical Layer

Confidentiality level: Customer

Code tree repacking may be used to optimize the number of available codes in downlink.
Exercise: Find code Cch,8,3 and code Cch,16,15.
OVSF shortage
Scrambling enables neighboring cells to use the same channelization codes. This allows the
system to use a maximum of 512 OVSF codes in each cell. Notice that the use of an OVSF code
forbids the use of the other codes in its branch. This reduces considerably the number of
available codes especially for high rate services. This may lead to an OVSF shortage. In such a
case, secondary scrambling codes may be allocated to the cells and enable the reuse of the
same OVSF in the same cell.

Scrambling Codes
 Scrambling code

GOLD sequence.

 Scrambling code period : 10ms ,or 38400 chips.


 The code used for scrambling of the uplink DPCCH/DPDCH may be of either
long or short type, There are 224 long and 224 short uplink scrambling codes. Uplink
scrambling codes are assigned by higher layers.
 For downlink physical channels, a total of 218-1 = 262,143 scrambling codes can
be generated. scrambling codes k = 0, 1, , 8191 are used.
Uplink scrambling code
All the physical channels in the uplink are scrambled. In uplink, the scrambling code can be
described as either long or short, depending on the way it was constructed. The scrambling code
is always applied to one 10 ms frame. Different scrambling codes will be allocated to different
mobiles.
In UMTS, Gold codes were chosen for their very low peak cross-correlation.

Mexico Training Center

Confidential information of Huawei.

Page 16/60

WCDMA Radio Interface Physical Layer

Confidentiality level: Customer

Primary Scrambling Codes

Figure 5.- Primary Scrambling Codes.

Downlink link scrambling code


The scrambling codes used in downlink are constructed very much like the long uplink
scrambling codes. They are created with two 18-cell shift registers.
218-1 = 262,143 different scrambling codes can be formed using this method. However, not
all of them are used. The downlink scrambling codes are divided into 512 sets, of one primary
scrambling code and 15 secondary scrambling codes each.
The primary scrambling codes are scrambling codes n=16*i where i=0511. The 15
secondary scrambling codes associated to one primary scrambling code are n=16*i + k, where
k=115. For now 8192 scrambling codes have been defined.

Mexico Training Center

Confidential information of Huawei.

Page 17/60

WCDMA Radio Interface Physical Layer

Confidentiality level: Customer

Primary Scrambling code group

Figure 6.- Primary Scrambling code groups.


There is a total of 512 primary codes. They are further divided into 64 primary scrambling
code groups of 8 primary scrambling codes each. Each cell is allocated one and only one
primary scrambling code. The group of the primary scrambling code is found by the mobiles of
the cell using the SCH, while the specific primary scrambling code used is given by the CPICH.
The primary CCPCH and the primary CPICH channels are always scrambled with the primary
scrambling code of the cell, while other channels can be scrambled by either the primary or the
secondary scrambling code.

Mexico Training Center

Confidential information of Huawei.

Page 18/60

WCDMA Radio Interface Physical Layer

Confidentiality level: Customer

Physical layer key technology


Physical Channel Structure and Functions
In terms of protocol layer, the WCDMA radio interface has three channels: Physical
channel, transport channel and logical channel.
Logical channel: Carrying user services directly. According to the types of the carried
services, it is divided into two types: Control channel and service channel. Each logical channel
type is defined by <what type of information > is transferred.
Transport channel: It is the interface of radio interface layer 2 and physical layer, and is
the service provided for MAC layer by the physical layer. According to whether the information
transported is dedicated information for a user or common information for all users, it is divided
into dedicated channel and common channel. Each transport channel is described by <how >
and with <what characteristics > data is transmitted over the radio interface.
Physical channel: It is the ultimate embodiment of all kinds of information when they are
transmitted on radio interfaces. Each kind of channel which uses dedicated carrier frequency,
code (spreading code and scramble) and carrier phase (I or Q) can be regarded as a dedicated
channel. A physical channel provide the real transmission resource, being in charge of the
association between bits and physical symbols (electrical signals). It corresponds, in UMTS, to a
frequency, a specific set of codes and phase.
As a conclusion:
Physical Channel = information container
Transport Channel = characteristics of transmission
Logical Channel = specification of the information global content

Logical Channel

Figure 7.- Logical Channel

Mexico Training Center

Confidential information of Huawei.

Page 19/60

WCDMA Radio Interface Physical Layer

Confidentiality level: Customer

As in GSM, UMTS uses the concept of logical channels.


A logical channel is characterized by the type of information that is transferred.
For example, some channels are used to transfer dedicated information, some for transfer of
general control information, etc..
As in GSM, logical channels can be divided into two groups: control channels for control
plane information and traffic channel for user plane information.
The traffic channels are:
 Dedicated Traffic CHannel (DTCH): a point-to-point bi-directional channel, that
transmits dedicated user information between a UE and the network. That information can be
speech, circuit switched data or packet switched data. The payload bits on this channel come
from a higher layer application (the AMR codec for example). Control bits can be added by the
RLC (protocol information) in case of a non transparent transfer. The MAC sublayer will also add
a header to the RLC PDU.
 Common Traffic CHannel (CTCH): a point-to-multipoint downlink channel for transfer
of dedicated user information for all or a group of specified UEs. This channel is used to
broadcast BMC messages. These messages can either be cell broadcast data from higher
layers or schedule messages for support of Discontinuous Reception (DRX) of cell broadcast
data at the UE. Cell broadcast messages are services offered by the operator, like indication of
weather, traffic, location or rate information.
The control channels are:
 Broadcast Control CHannel (BCCH): a downlink channel that broadcasts all system
information types (except type 14 that is only used in TDD). For example, system information
type 3 gives the cell identity.UEs decode system information on the BCH except when in
cell_DCH mode. In that case, they can decode system information type 10 on the FACH and
other important signaling is sent on a DCCH.
 Paging Control CHannel (PCCH): a downlink channel that transfers paging information.
It is used to reach a UE (or several UEs) in idle mode or in connected mode (cell_PCH or
URA_PCH state). The paging type 1 message is sent on the PCCH. When a UE receives a
page on the PCCH in connected mode, it shall enter cell_FACH state and make a cell update
procedure.
 Dedicated Control CHannel (DCCH): a point-to-point bi-directional channel that
transmits dedicated control information between a UE and the network. This channel is used for
dedicated signaling after a RRC connection has been done. For example, it is used for interfrequency handover procedure, for dedicated paging, for the active set update procedure and for
the control and report of measurements.
 Common Control CHannel (CCCH): a bi-directional channel for transmitting control
information between network and UEs. It is used to send messages related to RRC connection,
cell update and URA update. This channel is a bit like the DCCH, but will be used when the UE
has not yet been identified by the network (or by the new cell). For example, it is used to send
the RRC connection request message, which is the first message sent by the UE to get into
connected mode. The network will respond on the same channel, and will send him its
temporary identities (cell and UTRAN identities). After these initial messages, the DCCH will be
used.

Mexico Training Center

Confidential information of Huawei.

Page 20/60

WCDMA Radio Interface Physical Layer

Confidentiality level: Customer

Transport Channel

Figure 8.- Transport Channel.


In order to carry logical channels, several transport channels are defined. They are:
 Broadcast CHannel (BCH): a downlink channel used for broadcast of system
information into the entire cell.
 Paging CHannel (PCH): a downlink channel used for broadcast of control information
into the entire cell, such as paging.
 Random Access CHannel (RACH): a contention based uplink channel used for initial
access or for transmission of relatively small amounts of data (non real-time dedicated control
or traffic data).
 Forward Access CHannel (FACH): a common downlink channel used for dedicated
signaling (answer to a RACH typically), or for transmission of relatively small amounts of data.
 Dedicated CHannel (DCH): a channel dedicated to one UE used in uplink or downlink.

Mexico Training Center

Confidential information of Huawei.

Page 21/60

WCDMA Radio Interface Physical Layer

Confidentiality level: Customer

Physical Channel
A physical channel is defined by a specific carrier frequency, code (scrambling code,
spreading code) and relative phase.
In UMTS system, the different code (scrambling code or spreading code) can distinguish
the channels.
Most channels consist of radio frames and time slots, and each radio frame consists of 15
time slots.
Two types of physical channel:UL and DL

Figure 9.- Physical Channel


Now we will begin to discuss the physical channel.
Physical channel is the most important and complex channel. A physical channel is defined
by a specific carrier frequency, code and relative phase. In CDMA system, the different code
(scrambling code or spreading code) can distinguish the channel. Most channels consist of radio
frames and time slots, and each radio frame consists of 15 time slots. There are two types of
physical channel: UL and DL. Lets look at the uplink physical channel first.

Mexico Training Center

Confidential information of Huawei.

Page 22/60

WCDMA Radio Interface Physical Layer

Confidentiality level: Customer

Downlink Physical Channel

Figure 10.- Downlink Physical Channels.


The different physical channels are:

Synchronization CHannel (SCH): used for cell search procedure. There is the
primary and the secondary SCHs. Downlink.

Common Control Physical CHannel (CCPCH): used to carry common control
information such as the scrambling code used in DL (there is a primary CCPCH and additional
secondary CCPCH). Downlink.

Common Pilot CHannels (P-CPICH and S-CPICH): used for coherent detection
of common channels. They indicate the phase reference. Downlink.

Dedicated Physical Data CHannel (DPDCH): used to carry dedicated data
coming from layer 2 and above (coming from DCH). Uplink and Downlink.

Dedicated Physical Control CHannel (DPCCH): used to carry dedicated control
information generated in layer 1 (such as pilot, TPC and TFCI bits). Uplink and Downlink.

Page Indicator CHannel (PICH): carries indication to inform the UE that paging
information is available on the S-CCPCH. Downlink.

Acquisition Indicator CHannel (AICH): it is used to inform a UE that the network
has received its access request. Downlink.

High Speed Packet Downlink Shared CHannel (HS-PDSCH) : it is used to carry
subscribers BE service data (mapping on HSDPA) coming from layer 2.Downlink

High Speed Shared Control Channel (HS-SCCH): it is used to carry control
message to HS-PDSCH such as modulation scheme, UE ID etc. Downlink.

Mexico Training Center

Confidential information of Huawei.

Page 23/60

WCDMA Radio Interface Physical Layer

Confidentiality level: Customer

Uplink Physical Channel

Uplink Dedicated Physical Channel

Uplink Dedicated Physical Data Channel


(Uplink DPDCH)
Uplink Dedicated Physical Control
Channel (Uplink DPCCH)
High-Speed Dedicated Physical Channel
(HS-DPCCH)

Uplink Physical
Channel

Uplink Common Physical Channel

 Physical Random Access Channel


(PRACH)

Figure 11.- Uplink Physical Channels.


The different physical channels are:

Dedicated Physical Data Channel (DPDCH): used to carry dedicated data coming
from layer 2 and above (coming from DCH). Uplink and Downlink.

Dedicated Physical Control Channel (DPCCH): used to carry dedicated control
information generated in layer 1 (such as pilot, TPC and TFCI bits). Uplink and Downlink.

Physical Random Access Channel (PRACH): used to carry random access
information when a UE wants to access the network. Uplink.

High Speed Dedicated Physical Control Channel (HS-DPCCH): it is used to carry
feedback message to HS-PDSCH such CQI, ACK/NACK. Uplink.

Mexico Training Center

Confidential information of Huawei.

Page 24/60

WCDMA Radio Interface Physical Layer

Confidentiality level: Customer

Figure 12.- Functions of physical channels.

Cell Broadcast Channels


Common Pilot Channel (CPICH)
The Common Pilot Channel (CPICH) is a pure physical control channel broadcasted over
the entire cell. It is not linked to any transport channel. It consists of a sequence of known bits
that are transmitted in parallel with the primary and secondary CCPCH.
The CPICH is used by the mobile to determine which of the 8 possible primary scrambling
codes is used by the cell, and to provide the phase reference for common channels.
Finding the primary scrambling code is done during the cell search procedure through a
symbol-by-symbol correlation with all the codes within the code group. After the primary
scrambling code has been identified, the UE can decode system information on the P-CCPCH.
There are two types of common pilot channels, the primary and secondary CPICH. The use
of the S-CPICH is optional.
l Primary Common Pilot Channel (P-CPICH)
The Primary Common Pilot Channel (P-CPICH) has the following characteristics:
- The same channelization code always used.
- Primary scrambles used.
- Only one CPICH in each cell.
- Broadcasting in the whole cell.

Mexico Training Center

Confidential information of Huawei.

Page 25/60

WCDMA Radio Interface Physical Layer

Confidentiality level: Customer

The P-CPICH is the phase reference for the SCH, P-CCPCH, AICH and PICH. It is
broadcasted over the entire cell. The channelization code used to spread the
P-CPICH is
always Cch,256,0 (all ones). Thus, the P-CPICH is a fixed rate channel. Also, it is always
scrambled with the primary scrambling code of the cell. Figure 13 shows the structure of the
CPICH.






Common Pilot Channel (CPICH)


Carries pre-defined sequence.
Fixed rate 30Kbps SF=256
Primary CPICH:

Uses the fixed channel code--Cch, 256,0


Scrambled by the primary scrambling code
Only one CPICH per cell
Broadcast over the entire cell
The P-CPICH is a phase reference for SCH, Primary CCPCH, AICH,
PICH. By default, it is also a phase reference for downlink DPCH.
Pre-defined symbol sequence
Tslot = 2560 chips , 20

Slot #0

Slot #1

Slot # i

Slot

1 radio frame: Tr = 10 ms

Figure 13.- Primary Common Control Physical Channel structure.


If it is used, the S-CPICH provides the phase reference for the secondary CCPCH and the
downlink DPCH. It is transmitted over the entire cell or only over a part of the cell. It is spread
by an arbitrary channelization code of SF=256, and scrambled with the primary or with a
secondary scrambling code.
Il Secondary Common Pilot Channel (S-CPICH)
The Secondary Common Pilot Channel (S-CPICH) has the following characteristics:
- Any channelization code with SF = 256 can be used
- Primary or auxiliary scrambles may be used
- Zero, one or more secondary CPICHs may exist in every cell
- Transmission allowed in the whole or part of the cell
- The secondary CPICH may be the reference for the secondary CCPCH and downlink
DPCH. In this case, the high-layer signaling will notify the UE.

Mexico Training Center

Confidential information of Huawei.

Page 26/60

WCDMA Radio Interface Physical Layer

Confidentiality level: Customer

Primary Common Control Physical Channel (P-CCPCH)

The Primary Common Control Physical Channel (P-CCPCH) is a fixed rate (30 kbps,
SF=256) downlink physical channel used to carry the BCH transport channel. It is broadcasted
continuously over the entire cell like the P-CPICH.







Fixed rate , fixed OVSF code 30kbps Cch,256,1


Carry BCH transport channel
The PCCPCH is not transmitted during the first 256 chips of each time slot.
Only data part
STTD transmit diversity may be used

Figure 14.- Primary Common Control Physical Channel.


The figure 14 shows the frame structure of the P-CCPCH. The frame structure is special
because it does not contain any layer 1 control bits. The only bits transmitted during a P-CCPCH
slot are data bits from the BCH transport channel. It is important to note that the P-CCPCH is
not transmitted during the first 256 chips of the slot. In fact, another physical channel (SCH) is
transmitted during that period of time. Thus, the SCH and the P-CCPCH are time multiplexed on
every time slot.
Channelization code Cch,256,1 is always used to spread the P-CCPCH. Also, it is
always scrambled by the primary scrambling code of the cell.
The P-CCPCH only has one fix predefined transport format combination.

Mexico Training Center

Confidential information of Huawei.

Page 27/60

WCDMA Radio Interface Physical Layer

Confidentiality level: Customer

Synchronization Channel (SCH)


When a UE is turned on, the first thing it does is to scan the UMTS spectrum to find a UMTS
cell. After that, it has to find the primary scrambling code used by that cell in order to be able to
decode the BCCH (for system information). This is done with the help of the Synchronization
Channel.
The SCH is a pure downlink physical channel broadcasted over the entire cell. It is
transmitted unscrambled during the first 256 chips of each time slot, in time multiplex with the PCCPCH. It is the only channel that is not spread over the entire radio frame. The SCH provides
the primary scrambling code group (one out of 64 groups), as well as the radio frame and time
slot synchronization.
The SCH consists of two sub-channels, the primary and secondary SCH. These subchannels are sent in parallel using code division during the first 256 chips of each time slot.
Primary Synchronization Channel
The P-SCH is repeated at the beginning of each time slot. The same code is used by all the
cells and enables the mobiles to detect the existence of the UMTS cell and to synchronize itself
on the time slot boundaries. This is normally done with a single matched filter or any similar
device. The slot timing of the cell is obtained by detecting peaks in the matched filter output.
Figure 15 shows the structure of the PSCH.

Figure 15.- Primary Synchronization Channel.


This is the first step of the cell search procedure. The second step is done using the
secondary synchronization channel.
Each cell of a node B has its own SCH timing, so that there is no overlapping.

Mexico Training Center

Confidential information of Huawei.

Page 28/60

WCDMA Radio Interface Physical Layer

Confidentiality level: Customer

Secondary Synchronization Channel


The S-SCH also consists of a code: the Secondary Synchronization Code (SSC) that
indicates which of the 64 scrambling code groups the cells downlink scrambling code belongs to.
16 different SSCs are defined. Each SSC is a 256 chip long sequence.

Figure 16.- Secondary Common Control Physical Channel.

There is one specific SSC transmitted in each time slot, giving us a sequence of 15 SSCs.
There are a total of 64 different sequences of 15 SSCs, corresponding to the 64 primary
scrambling code groups. These 64 sequences are constructed so that one sequence is different
from any other one, and different from any rotated version of any sequence. The UE correlates
the received signal with the 16 SSCs and identifies the maximum correlation value.
The S-SCH provides the information required to find the frame boundaries and the downlink
scrambling code group (one out of 64 groups). The scrambling code (one out of 8) can be
determined afterwards by decoding the P-CPICH. The mobile will then be able to decode the
BCH.

Mexico Training Center

Confidential information of Huawei.

Page 29/60

WCDMA Radio Interface Physical Layer

Confidentiality level: Customer

Paging Channels

Secondary Common Control Physical Channel

 Carry FACH and PCH.


 Two kinds of SCCPCH: with or without
TFCI. UTRAN decides if a TFCI should
be transmitted, UE must support TFCI.
 Possible rates are the same as that of
downlink DPCH

 SF =256 - 4.
 FACH and PCH can be mapped to the
same or separate SCCPCHs. If
mapped to the same S-CCPCH, they
can be mapped to the same fame.

Figure 17. - Structure of the Secondary Common Control Physical Channel.


The Secondary Common Control Physical Channel (S-CCPCH) is used to carry the FACH
and PCH transport channels. Unlike the P-CCPCH, it is not broadcasted continuously. It is only
transmitted when there is a PCH or FACH information to transmit. At the mobile side, the mobile
only decodes the S-CCPCH when it expects a useful message on the PCH or FACH.
A UE will expect a message on the PCH after indication from the PICH (page indicator
channel), and it will expect a message on the FACH after it has transmitted something on the
RACH.
The FACH and the PCH can be mapped on the same or on separate S-CCPCHs. If they are
mapped on the same S-CCPCH, TFCI bits have to be sent to support multiple transport formats
The figure above shows the frame structure of the S-CCPCH. There are 18 different slot
formats determining the exact number of data, pilot and TFCI bits. The data bits correspond to
the PCH and/or FACH bits coming from the transport sublayer. Pilot bit are typically used when
beamforming techniques are used.
The SF ranges from 4 to 256. The channelization code is assigned by the RRC layer as is
the scrambling code, and they are fixed during the communication. They are sent on the BCCH
so that every UE can decode the channel.
As said before, FACH can be used to carry user data. The difference with the dedicated
channel is that it cannot use fast power control, nor softhandover. The advantage is that it is a
fast access channel.

Mexico Training Center

Confidential information of Huawei.

Page 30/60

WCDMA Radio Interface Physical Layer

Confidentiality level: Customer

Paging Indicator Channel







PICH is a fixed-rate(SF=256) physical channel used to carry the Paging Indicators (PI).
PICH is always associated with an S-CCPCH to which a PCH transport channel is
mapped.
Frame structure of PICH one frame of length 10ms consists of 300 bits of which 288
bits are used to carry paging indicators and the remaining 12 bits are not defined.
N paging indicators {PI0, , PIN-1} in each PICH frame, N=18, 36, 72, or 144.
If a paging indicator in a certain frame is set to 1, it indicates that UEs associated with
this paging indicator should read the corresponding frame of the associated S-CCPCH.

Figure 17.- Paging Indicator Channel structure.

The Page Indicator Channel (PICH) is a fixed rate (SF=256) physical channel used by the
node B to inform a UE (or a group of UEs) that a paging information will soon be transmitted on
the PCH. Thus, the mobile only decodes the S-CCPCH when it is informed to do so by the PICH.
This enables to do other processing and to save the mobiles battery.
The PICH carries Paging Indicators (PI), which are user specific and calculated by higher
layers. It is always associated with the S-CCPCH to which the PCH is mapped.
The frame structure of the PICH is illustrated above in figure 17. It is 10 ms long, and always
contains 300 bits (SF=256). 288 of these bits are used to carry paging indicators, while the
remaining 12 are not formally part of the PICH and shall not be transmitted. That part of the
frame (last 12 bits) is reserved for possible future use.
In order not to waste radio resources, several PIs are multiplexed in time on the PICH.
Depending on the configuration of the cell, 18, 36, 72 or 144 paging indicators can be
multiplexed on one PICH radio frame. Thus, the number of bits reserved for each PI depends of
the number of PIs per radio frame. For example, if there is 72 PIs in one radio frame, there will
be 4 (288/72) consecutive bits for each PI. These bits are all identical. If the PI in a certain
frame is 1, it is an indication that the UE associated with that PI should read the corresponding
frame of the S-CCPCH.

Mexico Training Center

Confidential information of Huawei.

Page 31/60

WCDMA Radio Interface Physical Layer

Confidentiality level: Customer

Random Access Channels


Physical Random Access Channel

The random-access transmission data consists of two parts:

 One or several preambleseach preamble is of

length 4096chips and


consists of 256 repetitions of a signature whose length is 16 chips 16
available signatures totally

 10 or 20ms message part.


 Which signature is available and the length of message part are determined
by higher layer.

The Physical Random Access Channel (PRACH) is used by the UE to access the network
and to carry small data packets. It carries the RACH transport channel. The PRACH is an open
loop power control channel, with contention resolution mechanisms (ALOHA approach) to enable
a random access from several users.
The PRACH is composed of two different parts: the preamble part and the message part
that carries the RACH message. The preamble is an identifier which consists of 256 repetitions
of a 16 chip long signature (total of 4096 chips). There are 16 possible signatures which
correspond to the 16 OVSF codes of SF=16. Basically, the UE randomly selects one of the 16
possible preambles and transmits it at increasing power until it gets a response from the network
(on the AICH). That preamble is scrambled before being sent. That is a sign that the power level
is high enough and that the UE is authorized to transmit, which it will do after acknowledgment
from the network. If the UE doesnt get a response from the network, it has to select a new
signature to transmit. The message part is 10 or 20 ms long (split into 15 or 30 time slots) and is
made of the RACH data and the layer 1 control information.

Figure 18.- The PRACH transmission structure.

The PRACH transmission is based on the access frame structure. The access frame is
access of 15 access slots and lasts 20 ms (2 radio frames).
To avoid too many collisions and to limit interference, a UE must wait at least 3 or 4 access
slots between two consecutive preambles.
Mexico Training Center

Confidential information of Huawei.

Page 32/60

WCDMA Radio Interface Physical Layer

Confidentiality level: Customer

The PRACH resources (access slots and preamble signatures) can be divided between
different Access Service Classes (ASC) in order to provide different priorities of RACH usage.
The ASC number ranges from 0 (highest priority) to 7 (lowest priority).

Figure 19.- PRACH Access timeslot structure.


The data and control bits of the message part are processed in parallel. The SF of the
data part can be 32, 64, 128 or 256 while the SF of the control part is always 256. The
control part consists of 8 pilot bits for channel estimation and 2 TFCI bits to indicate the
transport format of the RACH (transport channel), for a total of 10 bits per slot.
The OVSF codes to use (one for RACH data and one for control) depend on the
signature that was used fo the preamble (for signatures s=0 to s=15: OVSFcontrol=
Cch,256,m, where m=16s + 15; OVSFdata= Cch,SF,m, where m=SF*s/16.

Figure 20.- PRACH message structure.

Mexico Training Center

Confidential information of Huawei.

Page 33/60

WCDMA Radio Interface Physical Layer

Confidentiality level: Customer

Acquisition Indicator Channel (AICH)





Frame structure of AICH two frames, 20 ms consists of a repeated sequence of 15


consecutive AS, each of length 20 symbols(5120 chips). Each time slot consists of two
parts an Acquisition-Indicator(AI) and a part of duration 1024chips with no transmission.
Acquisition-Indicator AI have 16 kinds of Signature.
CPICH is the phase reference of AICH.

Figure 21.- Acquisition Indicator Channel structure.

The Acquisition Indicator Channel (AICH) is a common downlink channel used to control the
uplink random accesses. It carries the Acquisition Indicators (AI), each corresponding to a
signature on the PRACH (uplink). When the node B receives the random access from a mobile,
it sends back the signature of the mobile to grant its access. If the node B receives multiple
signatures, it can sent all these signatures back by adding the together. At reception, the UE can
apply its signature to check if the node B sent an acknowledgement (taking advantage of the
orthogonality of the signatures).
The AICH consists of a burst of data transmitted regularly every access slot frame. One
access slot frame is formed of 15 access slots, and lasts 2 radio frames (20 ms). Each access
slot consists of two parts, an acquisition indicator part of 32 real-valued symbols and a long part
during which nothing is transmitted to avoid overlapping due to propagation delays.
s (with values 0, +1 and -1, corresponding to the answer from the network to a specific user)
and the 32 chip long sequence <bs,j> is given by a predefined table. There are 16 sequences
<bs,j>, each corresponding to one PRACH signatures. A maximum of 16 AIs can be sent in
each access slot. The user can multiply the received multi-level signal by the signature it used to
know if its access was granted.
The SF used is always 256 and the OVSF code used by the cell is indicated in system
information type 5.

Mexico Training Center

Confidential information of Huawei.

Page 34/60

WCDMA Radio Interface Physical Layer

Confidentiality level: Customer

Dedicated Channels
Uplink Dedicated Physical Channels (DPDCH & DPCCH)









DPDCH and DPCCH are I/Q code multiplexed within each radio frame.
DPDCH carries data generated at Layer 2 and higher layer.
DPCCH carries control information generated at Layer 1.
Each frame is 10ms and consists of 15 time slots, each time slot consists of 2560 chips.
The spreading factor of DPDCH is from 4 to 256.
The spreading factor of DPDCH and DPCCH can be different in the same Layer 1
connection.
Each DPCCH time slot consists of Pilot, TFCI FBI TPC.

Now look at the feature of uplink dedicated physical channel.


Pilot is used to help demodulate.
TFCI: transport format combination indicator.
FBI: Used for the FBTD. (Feedback TX diversity).
TPC: used to transport power control command.
Dedicated channels are established between one UE and the network to carry user
dedicated data and control.
There are two kinds of uplink dedicated physical channels, the Dedicated Physical Data
Channel (DPDCH) and the Dedicated Physical Control Channel (DPCCH). The DPDCH is
used to carry the DCH transport channel. The DPCCH is used to carry the physical sublayer
control bits.
There can be up to 6 uplink DPDCHs, but only one DPCCH is associated to these DPDCHs
on each radio link. More than one DPDCH is used for data rates above
960 ksps (maximum
capacity of one DPDCH). Thus, the maximum channel bit rate for one UE is 960 * 6 = 5.76 Msps
in uplink, which can correspond to a user bit rate of 2.048 Mbps.

Figure 22.- Frame structure of uplink DPDCH/DPCCH.

Mexico Training Center

Confidential information of Huawei.

Page 35/60

WCDMA Radio Interface Physical Layer

Confidentiality level: Customer

Downlink Dedicated Physical Channels (DPDCH & DPCCH)






DCH consists of dedicated data and control information.


Control information includes Pilot TPC TFCI(optional).

The spreading factor of DCH can be from 512 to 4,and can be changed during
connection.
DPDCH and DPCCH is time multiplexed.

Downlink physical channels are used to carry user specific information like speech, data or
signaling, as well as layer 1 control bits. Like it was mentioned before, the payload from the
DPDCH and the control bits from the DPCCH are time multiplexed on every time slot. The figure
above shows how these two channels are multiplexed. There is only one DPCCH in downlink.

Figure 23.- Frame structure of downlink DPCH.


We have known that the uplink DPDCH and DPCCH are I/Q code multiplexed. But the
downlink DPDCH and DPCCH is time multiplexed. This is main difference. The chips of one slot
are also 2560. Because the SF of downlink DPCH can be 512, so the k can be 7.
Downlink physical channels are used to carry user specific information like speech, data or
signaling, as well as layer 1 control bits. Like it was mentioned before, the payload from the
DPDCH and the control bits from the DPCCH are time multiplexed on every time slot. The figure
above shows how these two channels are multiplexed. There is only one DPCCH in downlink.
Basically, there are two types of downlink DPCH. They are distinguished by the use or non
use of the TFCI field. TFCI bits are not used for fixed rate services or when the TFC doesnt
change.
The parameter k in the figure above determines the total number of bits per time slot. It is
related to the SF, which ranges from 4 to 512.

Mexico Training Center

Confidential information of Huawei.

Page 36/60

WCDMA Radio Interface Physical Layer

Confidentiality level: Customer

High Speed Downlink Shared Channels


High Speed Physical Downlink Shared Channel




Bear service data and layer2 overhead bits mapped from the transport channel.
SF=16, can be configured several channels to increase data service.

Figure 24.- Structure of High-Speed Physical Downlink Shared Channel (HS-PDSCH).


HS-PDSCH is a downlink physical channel that carries user data and layer2 overhead bits
mapped from the transport channel: HS-DSCH.
The user data and layer2 overhead bits from HS-DSCH is mapped onto one or several HSPDSCH and transferred in 2 ms subframe using one or several channelization code with fixed
SF=16.

Mexico Training Center

Confidential information of Huawei.

Page 37/60

WCDMA Radio Interface Physical Layer

Confidentiality level: Customer

High Speed Shared Control Channel HS-SCCH




Carries physical layer signalling to a single UE ,such as modulation scheme (1


bit) ,channelization code set (7 bit), transport Block size (6bit),HARQ process number
(3bit), redundancy version (3bit), new data indicator (1bit), Ue identity (16bit).
HS-SCCH is a fixed rate (60 kbps, SF=128) downlink physical channel used to carry
downlink signalling related to HS-DSCH transmission.

Figure 25.- High-Speed Shared Control Channel (HS-SCCH).

HS-SCCH uses a SF=128 and has q time structure based on a sub-frame of length 2 ms,i.e.
the same length as the HS-DSCH TTI. The timing of HS-SCCH starts two slot prior to the start
of the HS-PDSCH subframe.
The following information is carried on the HS-SCCH (7 items)
1. Modulation scheme (1bit) QPSK or 16QAM
2. Channelization Code Set (7bits)
3. Transport Size ( 6bits)
4. HARQ process number (3bits)
5. Redundancy version (3bits)
6. New Data Indicator (1bit)
7. UE identity (16 bits)
In each 2 ms interval corresponding to one HS-DSCH TTI , one HS-SCCH carries physicallayer signalling to a single UE. As there should be a possibility for HS-DSCH transmission to
multiple users in parallel (code multiplex), multiplex HS-SCCH may be needed in a cell. The
specification allows for up to four HS-SCCHs as seen from a UE point of view .i.e. UE must be
able to decode four HS-SCCH.

Mexico Training Center

Confidential information of Huawei.

Page 38/60

WCDMA Radio Interface Physical Layer

Confidentiality level: Customer

High-Speed Dedicated Physical Control Channel (HS DPCCH)




HS-DPCCH carries information to acknowledge downlink transport blocks and feedback


information to the system for scheduling and link adaptation of transport block.

 CQI and ACK/NACK


Physical Channel ,Uplink, SF=256,power control.

Figure 26.- High-Speed Dedicated Physical Control Channel (HS-DPCCH).


The uplink HS-DSCH related physical layer signaling consists of:
1. Acknowledgements for HARQ.
2. Channel Quality Indicator (CQI).
As the HS-SCCH uses SF=256, there are a total of 30 channel bits per 2 ms sub frame (3
time slot). The HS-DPCCH information is divided in such a way that the HARQ
acknowledgement is transmitted in the first slot of the subframe while the channel quality
indication is transmitted in the rest slot.

Mexico Training Center

Confidential information of Huawei.

Page 39/60

WCDMA Radio Interface Physical Layer

Confidentiality level: Customer

Channel Mapping
Mapping between Channels

Figure 27.- Mapping of the logical, transport and Physical channels.


This page indicates how the mapping can be done between logical, transport and physical
channels. Not all physical channels are represented because not all physical channels
correspond to a transport channel.
The mapping between logical channels and transport channels is done by the MAC sublayer.
Different connections can be made between logical and transport channels:
 BCCH is connected to BCH and may also be connected to FACH;
 DTCH can be connected to either RACH and FACH, to RACH and DSCH, to
DCH and DSCH, to a DCH or a CPCH;
 CTCH is connected to FACH;
 DCCH can be connected to either RACH and FACH, to RACH and DSCH, to
DCH and DSCH, to a DCH or a CPCH;
 PCCH is connected to PCH;
 CCCH is connected to RACH and FACH.
These connections depend on the type of information on the logical channels.

Mexico Training Center

Confidential information of Huawei.

Page 40/60

WCDMA Radio Interface Physical Layer

Confidentiality level: Customer

Physical layer processing procedure


Coding and multiplexing technology

CRC of TB





Error detection is provided on transport blocks through a Cyclic Redundancy Check


(CRC).
CRC size is informed by higher layer signal

 08121624(optional).

If no TB is input, no CRC bits should be attached. If TB are input with TB SIZE=0,


CRC bits shall be also added, but all CRC are zero.

Error detection is provided on transport blocks through a Cyclic Redundancy Check (CRC).
The size of the CRC is 24, 16, 12, 8 or 0 bits and it is signalled from higher layers what CRC size
that should be used for each TrCH.
TB Concatenation and Code Block Segmentation
 All transport blocks in a TTI are serially concatenated.
 The maximum size of the code blocks depends on whether convolutional coding or turbo
coding is used for the TrCH.

Convolutional code: if TBS SIZE>504, segmented to multiple code block of the
same size.

Turbo code: if TBS SIZE>5114, segmented to multiple code block of the same
size.

No coding: no segmentation.

If codes cannot be segmented evenly, fill in 0 bits at the beginning of the first
code block.

If the code block length of Turbo code<40, fill in 0 bits at the beginning to keep
the code length constantly as 40.
All transport blocks in a TTI are serially concatenated. If the number of bits in a TTI is larger
than Z, the maximum size of a code block in question, then code block segmentation is
performed after the concatenation of the transport blocks. The maximum size of the code blocks
depends on whether convolutional coding or turbo coding is used for the TrCH.
convolutional coding: Z = 504;
Turbo coding: Z = 5114.

Mexico Training Center

Confidential information of Huawei.

Page 41/60

WCDMA Radio Interface Physical Layer

Confidentiality level: Customer

Channel Coding
 The following channel coding schemes can be applied to TrCHs:
 Convolutional coding, coding rates 1/3 and 1/2 are defined.
 Turbo coding, The coding rate of Turbo coder is 1/3.
 No coding.
 Usage of coding

 BCH PCH and RACH1/2 Convolutional coding.


 DCH and FACH1/2or1/3 Convolutional coding ,1/3Turbo coding, no
coding.
The following channel coding schemes can be applied to TrCHs:
-

Convolutional coding;
Turbo coding.

Usage of coding scheme and coding rate for the different types of TrCH is shown in above
slide.
Multiplexing of TrCH
 Every 10 ms, one radio frame from each TrCH is delivered to the TrCH
multiplexing. These radio frames are serially multiplexed into a coded composite
transport channel (CCTrCH).
 The format of CCTrCH is indicated by TFCI.
 TrCH can have different TTI before multiplexing.
 2 types of CCTrCH: Common and dedicated.
 Common CCTrCH should be multiplexed by common TrCH;
 Dedicated CCTrCH should be multiplexed by dedicated TrCH.
 There is only one CCTrCH in uplink and one or several CCTrCH in downlink for
one user.

Mexico Training Center

Confidential information of Huawei.

Page 42/60

WCDMA Radio Interface Physical Layer

Confidentiality level: Customer

Figure 28.- Example of coding and multiplexing.


Transport block TrCh#1
CRC attachment

TrCh#2

81

TrCh#3

103

60

CRC

Tail bit attachment

81

12

103
Tail

Convolutional
coding R=1/3, 1/2

93

60
Tail

103

Rate matching

303

333

1st interleaving

303+NRM1

333 +NRM2

Radio frame
segmentation

303 +NRM1

Tail
60

136

136 +NRM3

333 +NRM2

#1a

#1b

#2a

NRF1

NRF1

NRF2

#2b
NRF2

136 +NRM3

#3a

#3b

NRF3

NRF3

NRF1 = (303 +NRM1)/2


NRF2 = (333+ NRM2)/2
NRF3 = (136+ NRM3)/2

To TrCh Multiplexing

Figure 29. - Example of coding and multiplexing.

Mexico Training Center

Confidential information of Huawei.

Page 43/60

WCDMA Radio Interface Physical Layer

Confidentiality level: Customer

Transport block
148

CRC attachment

CRC
148

TrBk concatination

16 bits

B TrBks (B =0,1)

164*B

Tail bit attachment

Tail
164*B

Convolutional
coding R=1/3

8*B

516*B

Rate matching
Insertion of DTX
indication*

(516+NRM)*B

1st interleaving

(516+NRM)*B+NDI

Radio frame
segmentation

(516+NRM)*B+NDI

#1

#2

#3

#4

[ (129+NRM)*B+NDI]/ [ (129+NRM)*B+NDI]/ [ (129+NRM)*B+NDI]/ [ (129+NRM)*B+NDI]/


4
4
4
4

To TrCh Multiplexing
* Insertion of DTX indication is used only if the position of the TrCHs in the radio frame is fixed.

Figure 30. - Example of coding and multiplexing (3.4 Kbps).


12.2 kbps data
#1a

#2a

#1b

12.2 kbps data

#2b

#1c

#2c

#1a

#2a

#1b

3.4 kbps data

#2b

#1c

#2c

#1

#2

#3

#4

TrCH
multiplexing
#1a

#1b

#1c

#1

#2a

#2b

#2c

#2

#1a

#1b

#1c

#3

#2a

#2b

#2c

#4

2nd interleaving

Physical channel
mapping

30 ksps DPCH

510
1

slot

510
15

CFN=4N

slot

510
15

CFN=4N+1

slot

510
15

CFN=4N+2

slot

15

CFN=4N+3
Pilot symbol

TPC

Figure 31. - Example of coding and multiplexing

Mexico Training Center

Confidential information of Huawei.

Page 44/60

WCDMA Radio Interface Physical Layer

Confidentiality level: Customer

Rate Matching
 Rate matching means that bits on a transport channel are repeated or punctured.
 The number of bits on a transport channel can vary between different transmission time
intervals (TTI). In the downlink the transmission is interrupted if the number of bits is lower than
maximum. When the number of bits between different transmission time intervals in uplink is
changed, bits are repeated or punctured to ensure that the total bit rate after TrCH multiplexing is
identical to the total channel bit rate of the allocated dedicated physical channels.
Rate matching means that bits on a transport channel are repeated or punctured. The
objective of rate matching is to Balance the multiplexing of Eb/I0 of each TrcH mapped to the
same CCTrCH, to Match channel(uplink) and to Avoid multi-code transmission. Rate matching
has two types: dynamic matching and static matching.
Interleaving

 Function reduce the influence of fast fading.

 Two kinds of interleaving 1st interleaving and 2nd interleaving.


 The length of 1st interleaving is TTI of TrCH, 1st interleaving is a inter-frame
interleaving.
 The length of 2nd interleaving is a physical frame , 2nd interleaving is a intra-frame
interleaving.
Radio Frame Segmentation
 When the transmission time interval (TTI) is longer than 10 ms, the input bit
sequence is segmented and mapped onto consecutive Fi radio frames.
 Following radio frame size equalisation in the UL the input bit sequence length is
guaranteed to be an integer multiple of Fi.
 Following rate matching in the DL the input bit sequence length is guaranteed to
be an integer multiple of Fi.
 Fi: Number of radio frames in the transmission time interval of TrCH i.
Insertion of discontinuous transmission (DTX) indication bits
 In the downlink, DTX is used to fill up the radio frame with bits.
 DTX indication bits only indicate when the transmission should be turned off, they
are not transmitted.
 1st insertion of DTX indication bits
 This step of inserting DTX indication bits is used only if the positions of
the TrCHs in the radio frame are fixed.
 2nd insertion of DTX indication bits
 The DTX indication bits inserted in this step shall be placed at the end of
the radio frame.

Mexico Training Center

Confidential information of Huawei.

Page 45/60

WCDMA Radio Interface Physical Layer

Confidentiality level: Customer

Physical Channel Segmentation and Mapping

 When multiple physical channels are used, one CCTrCH radio frame can be
divided into multiple physical frames multicode transmission.
 Each physical channel of multicode transmission must have the same SF.
 DPCCH and DPDCH of uplink physical channel is code multiplexed.
 DPCCH and DPDCH of downlink physical channel is time multiplexed.
 Uplink physical channel must be fully filled except when cpmpressed mode is
used.
 In downlink, the PhCHs do not need to be completely filled with bits that are
transmitted over the air. Values correspond to DTX indicators, which are mapped to the
DPCCH/DPDCH fields but are not transmitted over the air.

Figure 32.- Transport channel multiplexing structure for downlink.

Mexico Training Center

Confidential information of Huawei.

Page 46/60

WCDMA Radio Interface Physical Layer

Confidentiality level: Customer

Spreading Technology
Uplink DPCCH/DPDCH Spreading
 The DPCCH is always spread by code cc = Cch, 256,0.
 When only 1 DPDCH exists,(Cd,1 = Cch,SF,k ) k=SF/4.
 The code used for scrambling of the uplink DPCCH/DPDCH may be of either
long or short type.

Figure 33.- Uplink DPCCH/DPDCH Spreading.


The figure above illustrates the principle of the uplink spreading of DPDCH and DPCCH.
First each channel is spread by an OVSF code. As it was mentioned before, channelization
codes are only used to spread the information in uplink.
The channelization code used for DPCCH is always Cch,256,0 (all ones). If only one
DPDCH is used, it is spread by code Cch,SF,k , where k is linked to SF by k=SF/4. When more
than one DPDCH is used, they will all have a SF equal to 4. DPDCHn is spread by code cd,n =
Cch,4,k , where k=1 for n {1,2} , k=3 for n {3,4} , and k=2 for n {5,6}. Thus, the same
channelization code can be used by two different DPDCHs in uplink. After channelization, the
chip rate is equal to 3.84 Mcps.
After channelization, the spread signals are weighted by a gain factor (c for DPCCH and d
for all DPDCHs). These gain factors are quantized into 4 bits, giving values between 0 and 1.
There is at least one of the values c and d that is equal to 1. These gain factors may vary for
each TFC, and are either signaled or computed.
Then, the streams of chips are summed up giving a multilevel signal. After this addition, the
real-valued chips on the I and Q branches are summed up and treated like a complex-valued
stream of chips. This stream is scrambled by a complex-valued scrambling code. For DPDCH
and DPCCH, a unique scrambling code of 38,400 chips (corresponding to one radio frame) is
used. That code can be either of long or short type.
Finally, the complex chips are I and Q multiplexed and sent over the air interface. The result
of all this is a BPSK modulation, which gives us 1 bit per symbol. We will study that part in the
next section.

Mexico Training Center

Confidential information of Huawei.

Page 47/60

WCDMA Radio Interface Physical Layer

Confidentiality level: Customer

There can be up to 6 uplink DPDCHs, but only one DPCCH is associated to these DPDCHs
on each radio link. More than one DPDCH is used for data rates above
960 ksps (maximum
capacity of one DPDCH). Thus, the maximum channel bit rate for one UE is 960 * 6 = 5.76 Mbps
in uplink, which can correspond to a user bit rate of 2.048 Mbps.
Uplink PRACH Spreading

 Message part is shown in the following figure

the value of gain factors is the

same with DPDCH/DPCCH.

cd

d
Sr-msg,n

PRACH message
data part

PRACH message
control part

I+jQ

cc

Figure 34.- Uplink PRACH Spreading.

This is the PRACH spreading figure. The value of gain factors is the same with
DPDCH/DPCCH
The preamble signature s, 0 s 15, points to one of the 16 nodes in the code-tree that
corresponds to channelization codes of length 16. The sub-tree below the specified node is used
for spreading of the message part. The control part is spread with the channelization code cc of
spreading factor 256 in the lowest branch of the sub-tree, i.e. cc = Cch,256,m where m = 16 s +
15. The data part uses any of the channelization codes from spreading factor 32 to 256 in the
upper-most branch of the sub-tree. To be exact, the data part is spread by channelization code
cd = Cch,SF,m and SF is the spreading factor used for the data part and m = SF s/16.

The scrambling code used for the PRACH message part is 10 ms long, and there are 8192
different PRACH scrambling codes defined.

Mexico Training Center

Confidential information of Huawei.

Page 48/60

WCDMA Radio Interface Physical Layer

Confidentiality level: Customer

Downlink Spreading
 Downlink physical channel except SCH is first serial-to-parallel converted , spread by the
spreading code, and then scrambled by a complex-valued scrambling code.
 The beginning chip of the scrambling code is aligned with the frame boundary of PCCPCH.
 Each channel have different gain factor.
I

Data of
physical
channel
except
SCH

Sdl,n
S

I+jQ

Cch,SF,m
Q

Figure 35.- Downlink Spreading.


Each pair of two consecutive real-valued symbols is first serial-to-parallel converted and
mapped to an I and Q branch. The mapping is such that even and odd numbered symbols are
mapped to the I and Q branch respectively.
The I and Q branches are then both spread to the chip rate by the same real-valued
channelization code Cch,SF,m. The channelization code sequence shall be aligned in time with
the symbol boundary. The sequences of real-valued chips on the I and Q branch are then treated
as a single complex-valued sequence of chips.

Different physical
channel come from point S

G1

G2

P-SCH

GP

S-SCH
GS

Figure 36.- Downlink Spreading.


Each complex-valued spread channel, corresponding to point S in the Figure, is separately
weighted by a weight factor Gi. The complex-valued P-SCH and S-SCH, are separately weighted
by weight factors Gp and Gs. All downlink physical channels are then combined using complex
addition.

Mexico Training Center

Confidential information of Huawei.

Page 49/60

WCDMA Radio Interface Physical Layer

Confidentiality level: Customer

Modulation Technology
Uplink Modulation
 The chip rate is 3.84Mbps.
 In the uplink, the complex-valued chip sequence generated by the spreading
process is QPSK modulated.
cos(t)

Complexvalued
sequence
after
spreading

Split
real &
imag
parts

Re{S}

Pulse
shaping

Im{S}

Pulse
shaping
-sin(t)

Figure 36. - Uplink modulator.


The complex-valued sequence S after spreading is split into real part and imaginary part.
Then the real part is multiplied by cos(wt) after pulse shaping. The imaginary part is multiplied by
sin (wt) after shaping.
Downlink Modulation
 The chip rate is 3.84Mbps.
 In the downlink, the complex-valued chip sequence generated by the spreading
process is QPSK modulated.

cos(t)

Complexvalued
sequence
after
spreading

Split
real &
imag
parts

Re{S}

Pulse
shaping

Im{S}

Pulse
shaping
-sin(t)

Figure 37.- Downlink modulation.


The complex-valued sequence S after spreading is split into real part and imaginary part.
Then the real part is multiplied by cos(wt) after pulse shaping. The imaginary part is multiplied by
sin(wt) after shaping.

Mexico Training Center

Confidential information of Huawei.

Page 50/60

WCDMA Radio Interface Physical Layer

Confidentiality level: Customer

Physical Layer Procedures


Synchronization ProcedureCell Search

Figure 38.- Cell search procedure.


The purpose of the Cell Search Procedure is to give the UE the possibility of finding a cell
and of determining the downlink scrambling code and frame synchronization of that cell. This is
typically performed in 3 steps:

 PSCH (Slot synchronization): The UE uses the SCHs primary synchronization code to
acquire slot synchronization to a cell. The primary synchronization code is used by the UE to
detect the existence of a cell and to synchronize the mobile on the TS boundaries. This is
typically done with a single filter (or any similar device) matched to the primary synchronization
code which is common to all cells. The slot timing of the cell can be obtained by detecting
peaks in the matched filter output.
 SSCH (Frame synchronization and code-group identification): The secondary
synchronization codes provide the information required to find the frame boundaries and the
group number. Each group number corresponds to a unique set of 8 primary scrambling codes.
The frame boundary and the group number are provided indirectly by selecting a suite of 15
secondary codes. 16 secondary codes have been defined C1, C2, .C16. 64 possible suites
have been defined, each suite corresponds to one of the 64 groups. Each suite of secondary
codes is composed of 15 secondary codes (chosen in the set of 16), each of which will be
transmitted in one time slot. When the received codes matches one of the possible suites, the
UE has both determined the frame boundary and the group number.
 CPICH (Scrambling-code identification): The UE determines the exact primary
scrambling code used by the found cell. The primary scrambling code is typically identified
through symbol-by-symbol correlation over the CPICH with all the codes within the code group
identified in the second step. After the primary scrambling code has been identified, the Primary
CCPCH can be detected and the system- and cell specific BCH information can be read.

Mexico Training Center

Confidential information of Huawei.

Page 51/60

WCDMA Radio Interface Physical Layer

Confidentiality level: Customer

Synchronization Procedure Channel Timing Relationship

Figure 39.- Channel timing relationship.


This page shows the transmission timing of the various downlink channels. The 256 chips
gap in the beginning of each of the PCCPCH slots is to accommodate the transmission of the
SCH. The SCH is always transmitted from the base station and is transmitted at the same timing
reference as the CPICH. The SCCPCH is only transmitted when there is data available.
Therefore ,it has its own transmission timing. The timing offset is a multiple of 256 chips. The
PICH has a fixed time offset time offset with respect to the SCCPCH to be able to tell UE that
there is paging coming on the PCH mapped onto the SCCPCH.

Mexico Training Center

Confidential information of Huawei.

Page 52/60

WCDMA Radio Interface Physical Layer

Confidentiality level: Customer

Random Access Procedure

Figure 40.- The random access procedure.


Physical random access procedure

 1. Derive the available uplink access slots, in the next full access slot set, for the set of
available RACH sub-channels within the given ASC. Randomly select one access slot among the
ones previously determined. If there is no access slot available in the selected set, randomly
select one uplink access slot corresponding to the set of available RACH sub-channels within the
given ASC from the next access slot set. The random function shall be such that each of the
allowed selections is chosen with equal probability.
 2. Randomly select a signature from the set of available signatures within the given ASC.
 3. Set the Preamble Retransmission Counter to Preamble_ Retrans_ Max.
 4. Set the parameter Commanded Preamble Power to Preamble_Initial_Power.
 5. Transmit a preamble using the selected uplink access slot, signature, and preamble
transmission power.
 6. If no positive or negative acquisition indicator (AI +1 nor 1) corresponding to the
selected signature is detected in the downlink access slot corresponding to the selected uplink
access slot:

A: Select the next available access slot in the set of available RACH sub-channels
within the given ASC;


B: select a signature;

Mexico Training Center

Confidential information of Huawei.

Page 53/60

WCDMA Radio Interface Physical Layer

Confidentiality level: Customer

C: Increase the Commanded Preamble Power;


D: Decrease the Preamble Retransmission Counter by one. If the
Preamble
Retransmission Counter > 0 then repeat from step 6. Otherwise exit the physical random access
procedure.
 7. If a negative acquisition indicator corresponding to the selected signature is detected
in the downlink access slot corresponding to the selected uplink access slot, exit the physical
random access procedure Signature.
 8. If a positive acquisition indicator corresponding to the selected signature is detected,
Transmit the random access message three or four uplink access slots after the uplink access
slot of the last transmitted preamble.
 9. Exit the physical random access procedure.

Mexico Training Center

Confidential information of Huawei.

Page 54/60

WCDMA Radio Interface Physical Layer

Confidentiality level: Customer

Transmit diversity Mode


Application of Tx diversity modes on downlink physical channel

Figure 41. - Transmit diversity modes.


Transmitter-antenna diversity can be used to generate multipath diversity in places where it
would not otherwise exist. Multipath diversity is a useful phenomenon, especially if it can be
controlled. It can protect the UE against fading and shadowing. TX diversity is designed for
downlink usage.Transmitter diversity needs two antennas, which would be an expensive solution
for the UEs.
The UTRA specifications divide the transmitter diversity modes into two categories: (1)
open-loop mode and (2) closed-loop mode. In the open-loop mode no feedback information from
the UE to the Node B is available. Thus the UTRAN has to determine by itself the appropriate
parameters for the TX diversity. In the closed-loop mode the UE sends feedback information up
to the Node B in order to optimize the transmissions from the diversity antennas.
Thus it is quite natural that the open-loop mode is used for the common channels, as they
typically do not provide an uplink return channel for the feedback information. Even if there was a
feedback channel, the Node B cannot really optimize its common channel transmissions
according to measurements made by one particular UE. Common channels are common for
everyone; what is good for one UE may be bad for another. The closed-loop mode is used for
dedicated physical channels, as they have an existing uplink channel for feedback information.
Note that shared channels can also employ closed loop power control, as they are allocated for
only one user at a time, and they also have a return channel in the uplink.There are two specified
methods to achieve the transmission diversity in the open-loop mode and two methods in closedloop mode.

Mexico Training Center

Confidential information of Huawei.

Page 55/60

WCDMA Radio Interface Physical Layer

Confidentiality level: Customer

Transmit Diversity-STTD
 Space time block coding based transmit antenna diversity(STTD
 4 consecutive bits b0, b1, b2, b3 using STTD coding.

Figure 42.- Transmit Diversity STDD.


The TX diversity methods in the open-loop mode are:
(1) space time-block coding-based transmit-antenna diversity (STTD).
(2) time-switched transmit diversity (TSTD).
In STTD the data to be transmitted is divided between two transmission antennas at the
base station site and transmitted simultaneously. The channel-coded data is processed in blocks
of four bits. The bits are time reversed and complex conjugated, as shown in figure 42. The
STTD method, in fact, provides two brands of diversity. The physical separation of the antennas
provides the space diversity, and the time difference derived from the bit-reversing process
provides the time diversity.
These features together make the decoding process in the receiver more reliable. In addition
to data signals, pilot signals are also transmitted via both antennas. The normal pilot is sent via
the first antenna and the diversity pilot via the second antenna. The symbol sequence for the
second pilot is given in the two pilot sequences are orthogonal, which enables the receiving UE
to extract the phase information for both antennas.
The STTD encoding is optional in the UTRAN, but its support is mandatory for the UEs
receiver.

Mexico Training Center

Confidential information of Huawei.

Page 56/60

WCDMA Radio Interface Physical Layer

Confidentiality level: Customer

Transmit Diversity-TSTD
Time switching transmit diversity (TSTD) is used only on SCH channel.

Figure 43.- Transmit Diversity TSTD.

Time-switched transmit diversity (TSTD) can be applied to the SCH. Just as with STTD, the
support of TSTD is optional in the UTRAN, but mandatory in the UE. The principle of TSTD is to
transmit the synchronization channels via the two base station antennas in turn. In evennumbered time slots the SCHs are transmitted via antenna 1, and in odd-numbered slots via
antenna 2. This is depicted in above Figure. Note that SCH channels only use the first 256 chips
of each time slot (i.e., one-tenth of each slot).

Mexico Training Center

Confidential information of Huawei.

Page 57/60

WCDMA Radio Interface Physical Layer

Confidentiality level: Customer

Closed Loop Mode

Figure 44.- Closed loop Mode.


The closed-loop-mode transmit diversity can only be applied to the downlink channel if there
is an associated uplink channel. Thus this mode can only be used with dedicated channels The
chief operating principle of the closed loop mode is that the UE can control the transmit diversity
in the base station by sending adjustment commands in FBI bits on the uplink DPCCH. This is
depicted in next slide .The UE uses the base stations common pilot channels to estimate the
channels separately. Based on this estimation, it generates the adjustment information and
sends it to the UTRAN to maximize the UEs received power.
There are actually two modes in the closed-loop method. In mode 1 only the phase can be
adjusted; in mode 2 the amplitude is adjustable as well as the phase. Each uplink time slot has
one FBI bit for closed-loop-diversity control. In mode 1 each bit forms a separate adjustment
command, but in mode 2 four bits are needed to compose a command.

 Closed loop mode transmit diversity



Used in DPCH and PDSCH.

Channel coding, interleaving and spreading are done as in non-diversity mode. The
spread complex valued signal is fed to both TX antenna branches, and weighted with antenna
specific weight factors w1 and w2.

The weight factors are determined by the UE, and signalled to the UTRAN access
point (=cell transceiver) using the D-bits of the FBI field of uplink DPCCH.

The calculation of weight factor is the key point of closed loop Tx diversity.there are
two modes with different calculation methods of weight factor

1 mode 1 uses phase adjustment the dedicated pilot symbols of two antennas are
different(orthogonal).

2 mode 2 uses phase/amplitude adjustment the dedicated pilot symbols of two


antennas are the same.

Mexico Training Center

Confidential information of Huawei.

Page 58/60

WCDMA Radio Interface Physical Layer

Mexico Training Center

Confidential information of Huawei.

Confidentiality level: Customer

Page 59/60

WCDMA Radio Interface Physical Layer

Confidentiality level: Customer

Mexico Training Center

Confidential information of Huawei.

Page 60/60

Vous aimerez peut-être aussi