Vous êtes sur la page 1sur 65

Proprietary and Confidential

1: UMTS FundamentaIs 1: UMTS FundamentaIs


Version 3.1
West Region - UMTS RF Engineering
Proprietary and Confidential Slide 2
ModuIe 1: UMTS FundamentaIs ModuIe 1: UMTS FundamentaIs
ModuIe Overview ModuIe Overview
This moduIe provides training materiaI reIating to the key UMTS concepts as This moduIe provides training materiaI reIating to the key UMTS concepts as
is required for the practicaI optimization of a UMTS network. is required for the practicaI optimization of a UMTS network.
Multiple Access Fundamentals
System Overview
WCDMA Air nterface
Power Control
Handover
Radio Resource Management
Proprietary and Confidential
MuItipIe Access FundamentaIs MuItipIe Access FundamentaIs
Proprietary and Confidential Slide 4
FDMA FDMA - - Frequency Division MuItipIe Access Frequency Division MuItipIe Access
f
r
e
q
u
e
n
c
y
time
User 1
Channel
Bandwidth
User N
Proprietary and Confidential Slide 5
TDMA TDMA - - Time Division MuItipIe Access Time Division MuItipIe Access
f
r
e
q
u
e
n
c
y
time
User 1
User 1
Timeslot Period
Channel
Bandwidth
Proprietary and Confidential Slide 6
FDMA/TDMA FDMA/TDMA
f
r
e
q
u
e
n
c
y
time
Channel
Bandwidth
Timeslot Period Frame Period
User 1
User 1
Proprietary and Confidential Slide 7
DMA DMA - - ode Division MuItipIe Access ode Division MuItipIe Access
f
r
e
q
u
e
n
c
y
time
code
Proprietary and Confidential
WDMA System Overview WDMA System Overview
Proprietary and Confidential Slide 9
WDMA Network TopoIogy WDMA Network TopoIogy
u-CS
Sig
u-CS
Sig
ub ub
PSTN
IP Domain
(Wap, nternet, Streaming)
GGSN
3G
SGSN
WCDMA
Air nterface
Uu
u-PS u-PS
User Equipment (UE)
& USM
Node Bs RNC
2G Net
MS
MGW
u-CS
User
u-CS
User
Proprietary and Confidential
WDMA Air Interface Overview WDMA Air Interface Overview
Proprietary and Confidential Slide 11
Spectrum AIIocation Spectrum AIIocation - - AWS AWS
Proprietary and Confidential Slide 12
WDMA Air Interface WDMA Air Interface
Multiple Access Technology CDMA
Modulation QPSK / 16QAM
Carrier Spacing 5MHz on 200khz raster
Frame Length 10ms / 2ms
Slots per frame 15
Multiple Rates Multi-code / Variable Spreading Factor
Chip rate 3.84Mcps
Max Data Rate 14.4Mbps
Synchronous No
Handover Soft
Proprietary and Confidential Slide 13
ModuIation Schemes ModuIation Schemes
Uplink - BPSK
Downlink - QPSK or 16QAM
Proprietary and Confidential Slide 14
Spreading and Despreading Spreading and Despreading
dentica
l codes
Tx Bit Stream
P
f
Code Chip Stream
Spreading
P
f
Channel
Air nterface
Chip Stream
P
f
Code Chip Stream
Despreading
P
f
Rx Bit Stream
P
f
Proprietary and Confidential Slide 15
Spreading and Processing Gain Spreading and Processing Gain
Proprietary and Confidential Slide 16
WDMA Spreading odes WDMA Spreading odes
SF
4
SF
8
SF
16
SF
2
WCDMA used Orthogonal Variable Spreading Factor (OVSF) Codes to
spread user data in both the uplink and the downlink
The maximum spreading factor used in UMTS is 512
DL Speech uses SF=128
DL 384k used SF=8
Proprietary and Confidential Slide 17
WDMA ScrambIing odes WDMA ScrambIing odes
After spreading the bit stream is scrambled
n the uplink one SC per UE
n the downlink (typically) one SC per sector
Spreading Code
Spreading
User Bit Stream
Scrambling
Scrambling Code
TX Bit Stream
Proprietary and Confidential Slide 18
WDMA ode Summary WDMA ode Summary
Synchronisation odes hanneIisation odes ScrambIing odes, UL ScrambIing odes, DL
Type
Gold Codes, Primary
Synchronization Codes (PSC)
and Secondary Synchronization
Codes (SSC)
Orthogonal Variable Spreading
Factor (OVSF) codes,
sometimes called Walsh codes
Complex-Valued Gold Code
Segments (long) or Complex-
Valued S(2) Codes (short)
Complex-Valued Gold Code
Segments
Length 256 chips 4-512 chips 38400 chips /256 chips 38400 chips
Duration 66.67 s 1.04 s - 133.34 s 10 ms / 66.67 s 10 ms
Number of
codes
1 primary code / 16 secondary
codes
= spreading factor, 4 ... 256 UL,
4 ... 512 DL
16,777,216
512 primary / 15 secondary for
each primary code
Spreading No, does not change bandwidth Yes, increases bandwidth No, does not change bandwidth No, does not change bandwidth
Usage
To enable terminals to locate
and synchronise to the cells'
main control channels
UL: to separate physical data
and control data from same
terminal. DL: to separate
connection to different terminals
in a same cell
Separation of terminal Separation of sectors
Proprietary and Confidential Slide 19
Rake Receiver Rake Receiver
Rake receiver is able to track and actively combine multipath components
of the same signal, this process is called maximal ratio combining.
UE uses a rake receiver with 3 6 fingers
Node B uses rake receiver with 6 8 fingers
Proprietary and Confidential Slide 20
"A "A
Air Interface Air Interface
1. 1. What is the processing gain of a 384kbps bearer? What is the processing gain of a 384kbps bearer?
2. 2. What is the name of the interface between the RN and NodeB? What is the name of the interface between the RN and NodeB?
3. 3. Name 3 protocoI stacks used between the RN and other network Name 3 protocoI stacks used between the RN and other network
eIements? eIements?
4. 4. Does scrambIing have an effect on bandwidth? Does scrambIing have an effect on bandwidth?
5. 5. What are downIink channeIization codes used for? What are downIink channeIization codes used for?
6. 6. Why are downIink scrambIing codes restricted to 512? Why are downIink scrambIing codes restricted to 512?
7. 7. What is the difference between MaximaI Ratio ombining and Macro What is the difference between MaximaI Ratio ombining and Macro
Diversity combining? Diversity combining?
8. 8. BIah? BIah?
Proprietary and Confidential Slide 21
WDMA LogicaI hanneIs WDMA LogicaI hanneIs
Control Channels
B Broadcast Control Channel
P Paging Control Channel
Common Control Channel
D Dedicated Control Channel
Traffic Channels
DT Dedicated Traffic Channel
T Common Traffic Channel
Proprietary and Confidential Slide 22
WDMA Transport hanneIs WDMA Transport hanneIs
Common Channels
B Broadcast Channel
FA Forward Access Channel
P Paging Channel
RA Random Access Channel
P Common Packet Channel
Dedicated Channels
D Dedicated Channel
DS Downlink Shared Channel
Proprietary and Confidential Slide 23
WDMA PhysicaI hanneIs WDMA PhysicaI hanneIs
Common Control Channels
P-P Primary Common Control Physical Channels (DL)
S-P Secondary Common Control Physical Channels (DL)
P-S Primary Synchronisation Channel (DL)
S-S Secondary Synchronisation Channel (DL)
PI Common Pilot Channel (DL)
AI Acquisition ndicator Channel (DL)
PI Paging ndicator Channel (DL)
PDS Physical Downlink Shared Channel (DL)
PRA Physical Random Access Channel (UL)
PP Physical Common Packet Channel (UL)
AP-AI Access Preamble Acquisition ndicator Channel (DL)
Dedicated Channels
DPD Dedicated Physical Data Channel (DL & UL)
DP Dedicated Physical Control Channel (DL & UL)
Proprietary and Confidential Slide 24
DownIink hanneI Mapping DownIink hanneI Mapping
Proprietary and Confidential Slide 25
UpIink hanneI Mapping UpIink hanneI Mapping
Proprietary and Confidential Slide 26
"A "A
hanneIs hanneIs
1. 1. BIah? BIah?
2. 2. BIah? BIah?
3. 3. BIah? BIah?
4. 4. BIah? BIah?
5. 5. BIah? BIah?
6. 6. BIah? BIah?
7. 7. BIah? BIah?
8. 8. BIah? BIah?
Proprietary and Confidential
WDMA WDMA Air Interface Key oncepts Air Interface Key oncepts
Proprietary and Confidential Slide 28
PI PI - - PiIot / Beacon PiIot / Beacon
The Common Pilot ndication Channel (CPCH) is broadcast from every cell
t carries no information and can be thought of as a "beacon constantly
transmitting the Scrambling Code of the cell
t is this "beacon that is used by the phone for its cell measurements for
network acquisition and handover purposes (Ec, Ec/o).
PI
Proprietary and Confidential Slide 29
3G overage Measurements 3G overage Measurements
The majority of 3G coverage measurements are based upon measurements
of the CPCH
n 3G, coverage is defined by Ec and Eco
GoIden RuIe: If the UE can't see the PI the UE can't see the ceII.
Three key related measurements for 3G optimisation are
Ec - The Received Signal Level of a particular CPCH (dBm)
Io - The Total Received Power (dBm)
Ec/Io - The CPCH Quality (The ratio of the above two values)
Proprietary and Confidential Slide 30
TotaI Received Power TotaI Received Power II
oo
n a WCDMA network the User Equipment (UE) may receive signals from
many cells whether in handover or not
I
o
* The sum totaI of aII of these signaIs + any background noise (dBm)
Note: Sometimes o is referred to as No, RSS or SS
I
o
Proprietary and Confidential Slide 31
Received Power of a PI Received Power of a PI
#$! #$!
Using the properties of SCs the UE is able to extract the respective CPCH
levels from the sites received
#$!* The Received Power of a ParticuIar PI (dBm)
Note: Sometimes RSCP is referred to as Ec

.

.
Proprietary and Confidential Slide 32
The PI "uaIity ( The PI "uaIity (.Io .Io
From the previous two measures we can calculate a signal quality for each
CPCH (SC) received
.Io #$! - Io (dB)
Note: Sometimes Ec/o is referred to as Ec/No
#$!

#$!

Proprietary and Confidential Slide 33


ExampIe ExampIe
From the above three measurements we can calculate for each pilot the
RSCP level for that particular pilot
RSCP
1
= -80 - 5 = -85dBm
RSCP
2
= -80 - 10 = -90dBm

.
I
o
-5dB
.
I
o
-dB
Io-8dBm
Proprietary and Confidential Slide 34
Ec, Io and Ec/Io Measurement Ec, Io and Ec/Io Measurement
All commercial scanners and test UEs are capable of making Ec, o and Ec/o
measurements
t is these measurements that are used for coverage analysis and basic
optimisation
Proprietary and Confidential Slide 35
"A "A
overage Measurement overage Measurement
1. 1. BIah? BIah?
2. 2. BIah? BIah?
3. 3. BIah? BIah?
4. 4. BIah? BIah?
5. 5. BIah? BIah?
6. 6. BIah? BIah?
7. 7. BIah? BIah?
8. 8. BIah? BIah?
Proprietary and Confidential Slide 36
Power ontroI Power ontroI
Proprietary and Confidential Slide 37
Power ontroI Power ontroI
The near far probIem The near far probIem
n any CDMA network, the power of the BTS and UE must be tightly controlled
to avoid interference to other BTSs/UEs
Proprietary and Confidential Slide 38
Power ontroI Power ontroI
Types of Power ontroI Types of Power ontroI
Open Loop Power Control
Used to set the initial transmit power of the BTS/UE
Closed Loop Power Control
Used to control power of uplink/downlink DCHs
nner Loop (Or Fast Power Control) used to control TX Power (UL/DL)
Outer Loop (Or Slow Power Control) used to control SR Targets (UL/DL)
Proprietary and Confidential Slide 39
Open Loop Power ontroI Open Loop Power ontroI
Open Loop Power ontroI Open Loop Power ontroI
Open Loop Power Control Used to set the initial transmit power of the UE
UPLNK: Uses a measure of DL path loss to provide estimate uplink path loss
UPLNK: CPCH measurement by the UE along with the reported BTS Noise
Floor are used to determine the initial TX power of the UE
Preamble_nitial_power = CPCH_Tx_power CPCH_RSCP + UL_interference + UL_required_C
CPCH_Tx_power
UL_nterference
UL_required_C
CPCH_RSCP
Proprietary and Confidential Slide 40
Iosed Loop Power ontroI Iosed Loop Power ontroI
Iosed Loop Power ontroI Iosed Loop Power ontroI
Enables the BTS/UE to rapidly adjust their DCH TX powers to track the
changing channel conditions (path loss & interference) in order to maintain the
required SR at the receiving UE/BTS
Uses feedback (power control commands) in the opposite link to adjust Tx
power accordingly
ExampIe of ReaI Fast Fading - Dense Urban
Manchester
-105
-100
-95
-90
-85
-80
-75
-70
-65
-60
0 0.1 0.2 0.3 0.4
0.5 0.6 0.7 0.8 0.9 1
Time (secs)
Proprietary and Confidential Slide 41
Iosed Loop Power ontroI Iosed Loop Power ontroI
Iosed Loop Power ontroI Iosed Loop Power ontroI
Closed Loop Power Control Used to control power of uplink/downlink DCHs
Two components to Closed Loop Power control in WCDMA
nner Loop (Or Fast Power Control) used to control TX Power (UL/DL)
Outer Loop (Or Slow Power Control) used to control SR Targets (UL/DL)
u-CS u-CS
ub ub
u-PS u-PS
User Equipment (UE)
& USM
Node Bs RNC
Uu Uu
nner Loop
PC
nner Loop
PC
Outer Loop
PC
Outer Loop
PC
Proprietary and Confidential Slide 42
Iosed Loop Power ontroI Iosed Loop Power ontroI
Inner Loop Power ontroI (Fast Power ontroI) Inner Loop Power ontroI (Fast Power ontroI)
Transmit Power Control (TPC) commands (up/down) issued to UE (Uplink) and
BTS (Downlink) to maintain Target SR every time slot (1500 Hz)
Power control step size typically 1dB (Algorithm 1)
Below 30km/h 1.5KHz and 1dB is fast enough to track changes
Above 30km/h other schemes such as (Algorithm 2) maybe more suitable
User Equipment (UE)
& USM
Node Bs
Uu Uu
nner Loop
PC
nner Loop
PC
Required SR
DL
Required SR
UL
Proprietary and Confidential Slide 43
Iosed Loop Power ontroI Iosed Loop Power ontroI
Outer Loop Power ontroI Outer Loop Power ontroI
RNC compares uplink BLER with BLER target and sets SR
UL
accordingly
UE compares downlink BLER with BLER target and set SR
DL
accordingly
Frequency 10 to 100 Hz
Step size 0.1 to 1dB
ub ub
User Equipment (UE)
& USM Node Bs RNC
Uu Uu
Outer Loop
PC
Outer Loop
PC
Proprietary and Confidential Slide 44
"A "A
Power ontroI Power ontroI
1. 1. Why is it necessary to use power controI for WDMA? Why is it necessary to use power controI for WDMA?
2. 2. BIah? BIah?
3. 3. BIah? BIah?
4. 4. BIah? BIah?
5. 5. BIah? BIah?
6. 6. BIah? BIah?
7. 7. BIah? BIah?
8. 8. BIah? BIah?
Proprietary and Confidential Slide 45
WDMA andovers WDMA andovers
Proprietary and Confidential Slide 46
andovers in WDMA andovers in WDMA
Soft andover
ntra-system Handover
ard andover
nter-frequency Handover
nter-system Handover
Proprietary and Confidential Slide 47
Neighbour Lists Active Set Neighbour Lists Active Set
The Neighbor List The Neighbor List
n WCDMA like GSM each cell has to declare at list of valid neighbors
ntra-system neighbors (32 Max)
nter-frequency neighbors (32 Max)
nter-system neighbors (32 Max)
The Active Set The Active Set
The Active Set is defined as the list of cells the UE is connected to during
dedicated mode
Active set size = 1: UE Not in Soft Handover
Active set size > 1: UE in Soft Handover
Typically Active set size limited to 3
Proprietary and Confidential Slide 48
Softer handover occurs between sectors of the same site
Soft handover occurs between sectors of different sites
For both softer and soft handover UE Ec/o measurements are used to
determine whether a cell should be added or removed from the active set
Soft Softer andover Soft Softer andover
Proprietary and Confidential Slide 49
Soft andover Soft andover
Updating the Active Set Updating the Active Set

o
RSCP
1
RSCP
1
RSCP
3
RSCP
3
RSCP
4
RSCP
4
-60dBm -60dBm
-65dBm -65dBm
RSCP
2
RSCP
2 -70dBm -70dBm
-77dBm -77dBm
-83dBm -83dBm
- Addition Window event 1a
- Drop Window event 1b
- Replacement Window event 1c
Proprietary and Confidential Slide 50
Soft andover Soft andover - - Add Drop Add Drop
Ec/o
1
Ec/o
1
Ec/o
2
Ec/o
2
Addition
Window
Addition
Window
Drop
Window
Drop
Window
T
add
T
add
T
drop
T
drop
Proprietary and Confidential Slide 51
Soft andover Soft andover - - RepIace RepIace
Ec/o
1
Ec/o
1
Ec/o
3
Ec/o
3
Addition
Window
Addition
Window
Drop
Window
Drop
Window
T
add
T
add
T
add
T
add
T
replace
T
replace
Ec/o
2
Ec/o
2
Ec/o
4
Ec/o
4
Proprietary and Confidential Slide 52
andovers andovers - - Inter frequency O Inter frequency O
nter frequency handover occurs between two WCDMA carriers
This is a hard handover, CM required for UE's with single receiver
Used once operator deploys its second carrier, for microcell layer or capacity
purposes
Proprietary and Confidential Slide 53
Inter system O Inter system O
nter system handover occurs between 3G and other systems
CM required for UE's with a single receiver
Voice service is a hard handover and is transparent to the user
Data service is treated as a reselection not a hard handover and data
interruption results.
As with all handovers, accurate adjacencies are required, this is not only
important to ensure seamless customer experience when moving in and out
of 3G coverage but also to meet the mandated requirements for E911.
3G
2G
Proprietary and Confidential Slide 54
M M - - ompressed Mode ompressed Mode
Typical Dual Mode 3G/2G UEs utilize a single TRX
To detect potential F/S handover candidates the UE has to share the
receiver.
To create the time required to measure another frequency/frequencies without
disrupting the current service compressed mode is used.
During compressed mode the UE's spreading factor is halved and the
instantaneous transmit power is increased in the compressed frame in order
to keep the quality (BER, FER, etc.) unaffected by the resulting reduction in
processing gain.
This creates a "gap in which the RX can be retuned and F or S neighbors
scanned.
Proprietary and Confidential Slide 55
"A "A
andover andover
1. 1. BIah? BIah?
2. 2. BIah? BIah?
3. 3. BIah? BIah?
4. 4. BIah? BIah?
5. 5. BIah? BIah?
6. 6. BIah? BIah?
7. 7. BIah? BIah?
8. 8. BIah? BIah?
Proprietary and Confidential Slide 56
Radio Resource Management Radio Resource Management
Proprietary and Confidential Slide 57
Radio Resource Management Radio Resource Management
Overview of Radio Resource Management (RRM) Overview of Radio Resource Management (RRM)
Aim of RRM is to efficiently manage the Radio Resources of the WCDMA air
interface
Different vendors have implemented different RRM strategies and algorithms
Generally RRM functions can be group as follows
Admission Control
Load Control
Packet Scheduler
Resource Management
Power Control
Handover Control
Cell Based
Connection Based
Proprietary and Confidential Slide 58
Radio Resource Management Radio Resource Management
Admission ontroI Admission ontroI
Responsible for determining if the system (Air nterface, Code Tree, Channel
Elements, ub, RNC, u etc), can accept the call
Air nterface (Uplink Load, Downlink Load/Tx Power) ?
Code Tree Fragmentation ?
NodeB Processing Capacity ?
ub Capacity ?
RNC Capacity ?
May give priority to different types of calls
Typically voice/video take precedent
Considers reports from Load Control Entity to assist decisions
Proprietary and Confidential Slide 59
Radio Resource Management Radio Resource Management
Load ontroI Load ontroI
Responsible for ensuring cell does not go into overload condition
Constantly monitoring Uplink Rx power and Downlink Tx power
Preventative action taken to avoid overload condition
Load reports sent to Admission Control and Packet Scheduler
Proprietary and Confidential Slide 60
Radio Resource Management Radio Resource Management
Packet ScheduIe Packet ScheduIe
Responsible for maximizing throughput of cell/users
Considers reports from Load Control Entity to assist decisions
Should allocate the best bearer for the job
HSDPA / 384k / 128k / 64k / 32k / FACH etc.
Time
Load
Load Target
CS Load
Free Capacity for
PS or HSDPA
Proprietary and Confidential Slide 61
Radio Resource Management Radio Resource Management
Resource Manager Resource Manager
Responsible for ensuring efficient use of cells processing capacity
Code use
Channel element use
SF
4
SF
8
SF
16
384 user #1
128 user #1
384 user #2
Proprietary and Confidential Slide 62
Radio Resource Management Radio Resource Management
Power ontroI Power ontroI
As shown earlier power control is used to maintain the quality of the radio link
Minimizing the uplink and downlink transmission power maximizes system
capacity
u-CS u-CS
ub ub
u-PS u-PS
User Equipment (UE)
& USM
Node Bs RNC
Uu Uu
nner Loop
PC
nner Loop
PC
Outer Loop
PC
Outer Loop
PC
Proprietary and Confidential Slide 63
Radio Resource Management Radio Resource Management
andover ontroI andover ontroI
Responsible for maintaining radio links with UE during mobility
ntra-system handover
nter-system handover
Link Adaptation
3G
2G
3G 3G
Proprietary and Confidential Slide 64
"A "A
Radio Resource Management Radio Resource Management
1. 1. BIah? BIah?
2. 2. BIah? BIah?
3. 3. BIah? BIah?
4. 4. BIah? BIah?
5. 5. BIah? BIah?
6. 6. BIah? BIah?
7. 7. BIah? BIah?
8. 8. BIah? BIah?
Proprietary and Confidential Slide 65
Key WDMA oncepts Summary Key WDMA oncepts Summary
Key WDMA concepts covered Key WDMA concepts covered
AR NTERFACE OVERVEW
POWER CONTROL
Open
Closed (Fast/Slow)
HANDOVER
ntra-Frequency (Soft/Softer)
nter-Frequency (Other WCDMA carrier)
nter-System (3G->2G)
RADO RESOURCE MANAGEMENT
Admission Control
Load Control
Packet Scheduler
Resource Management
Handover Control
Power Control

Vous aimerez peut-être aussi