Académique Documents
Professionnel Documents
Culture Documents
.
.
Proprietary and Confidential Slide 32
The PI "uaIity ( The PI "uaIity (.Io .Io
From the previous two measures we can calculate a signal quality for each
CPCH (SC) received
.Io #$! - Io (dB)
Note: Sometimes Ec/o is referred to as Ec/No
#$!
#$!
.
I
o
-5dB
.
I
o
-dB
Io-8dBm
Proprietary and Confidential Slide 34
Ec, Io and Ec/Io Measurement Ec, Io and Ec/Io Measurement
All commercial scanners and test UEs are capable of making Ec, o and Ec/o
measurements
t is these measurements that are used for coverage analysis and basic
optimisation
Proprietary and Confidential Slide 35
"A "A
overage Measurement overage Measurement
1. 1. BIah? BIah?
2. 2. BIah? BIah?
3. 3. BIah? BIah?
4. 4. BIah? BIah?
5. 5. BIah? BIah?
6. 6. BIah? BIah?
7. 7. BIah? BIah?
8. 8. BIah? BIah?
Proprietary and Confidential Slide 36
Power ontroI Power ontroI
Proprietary and Confidential Slide 37
Power ontroI Power ontroI
The near far probIem The near far probIem
n any CDMA network, the power of the BTS and UE must be tightly controlled
to avoid interference to other BTSs/UEs
Proprietary and Confidential Slide 38
Power ontroI Power ontroI
Types of Power ontroI Types of Power ontroI
Open Loop Power Control
Used to set the initial transmit power of the BTS/UE
Closed Loop Power Control
Used to control power of uplink/downlink DCHs
nner Loop (Or Fast Power Control) used to control TX Power (UL/DL)
Outer Loop (Or Slow Power Control) used to control SR Targets (UL/DL)
Proprietary and Confidential Slide 39
Open Loop Power ontroI Open Loop Power ontroI
Open Loop Power ontroI Open Loop Power ontroI
Open Loop Power Control Used to set the initial transmit power of the UE
UPLNK: Uses a measure of DL path loss to provide estimate uplink path loss
UPLNK: CPCH measurement by the UE along with the reported BTS Noise
Floor are used to determine the initial TX power of the UE
Preamble_nitial_power = CPCH_Tx_power CPCH_RSCP + UL_interference + UL_required_C
CPCH_Tx_power
UL_nterference
UL_required_C
CPCH_RSCP
Proprietary and Confidential Slide 40
Iosed Loop Power ontroI Iosed Loop Power ontroI
Iosed Loop Power ontroI Iosed Loop Power ontroI
Enables the BTS/UE to rapidly adjust their DCH TX powers to track the
changing channel conditions (path loss & interference) in order to maintain the
required SR at the receiving UE/BTS
Uses feedback (power control commands) in the opposite link to adjust Tx
power accordingly
ExampIe of ReaI Fast Fading - Dense Urban
Manchester
-105
-100
-95
-90
-85
-80
-75
-70
-65
-60
0 0.1 0.2 0.3 0.4
0.5 0.6 0.7 0.8 0.9 1
Time (secs)
Proprietary and Confidential Slide 41
Iosed Loop Power ontroI Iosed Loop Power ontroI
Iosed Loop Power ontroI Iosed Loop Power ontroI
Closed Loop Power Control Used to control power of uplink/downlink DCHs
Two components to Closed Loop Power control in WCDMA
nner Loop (Or Fast Power Control) used to control TX Power (UL/DL)
Outer Loop (Or Slow Power Control) used to control SR Targets (UL/DL)
u-CS u-CS
ub ub
u-PS u-PS
User Equipment (UE)
& USM
Node Bs RNC
Uu Uu
nner Loop
PC
nner Loop
PC
Outer Loop
PC
Outer Loop
PC
Proprietary and Confidential Slide 42
Iosed Loop Power ontroI Iosed Loop Power ontroI
Inner Loop Power ontroI (Fast Power ontroI) Inner Loop Power ontroI (Fast Power ontroI)
Transmit Power Control (TPC) commands (up/down) issued to UE (Uplink) and
BTS (Downlink) to maintain Target SR every time slot (1500 Hz)
Power control step size typically 1dB (Algorithm 1)
Below 30km/h 1.5KHz and 1dB is fast enough to track changes
Above 30km/h other schemes such as (Algorithm 2) maybe more suitable
User Equipment (UE)
& USM
Node Bs
Uu Uu
nner Loop
PC
nner Loop
PC
Required SR
DL
Required SR
UL
Proprietary and Confidential Slide 43
Iosed Loop Power ontroI Iosed Loop Power ontroI
Outer Loop Power ontroI Outer Loop Power ontroI
RNC compares uplink BLER with BLER target and sets SR
UL
accordingly
UE compares downlink BLER with BLER target and set SR
DL
accordingly
Frequency 10 to 100 Hz
Step size 0.1 to 1dB
ub ub
User Equipment (UE)
& USM Node Bs RNC
Uu Uu
Outer Loop
PC
Outer Loop
PC
Proprietary and Confidential Slide 44
"A "A
Power ontroI Power ontroI
1. 1. Why is it necessary to use power controI for WDMA? Why is it necessary to use power controI for WDMA?
2. 2. BIah? BIah?
3. 3. BIah? BIah?
4. 4. BIah? BIah?
5. 5. BIah? BIah?
6. 6. BIah? BIah?
7. 7. BIah? BIah?
8. 8. BIah? BIah?
Proprietary and Confidential Slide 45
WDMA andovers WDMA andovers
Proprietary and Confidential Slide 46
andovers in WDMA andovers in WDMA
Soft andover
ntra-system Handover
ard andover
nter-frequency Handover
nter-system Handover
Proprietary and Confidential Slide 47
Neighbour Lists Active Set Neighbour Lists Active Set
The Neighbor List The Neighbor List
n WCDMA like GSM each cell has to declare at list of valid neighbors
ntra-system neighbors (32 Max)
nter-frequency neighbors (32 Max)
nter-system neighbors (32 Max)
The Active Set The Active Set
The Active Set is defined as the list of cells the UE is connected to during
dedicated mode
Active set size = 1: UE Not in Soft Handover
Active set size > 1: UE in Soft Handover
Typically Active set size limited to 3
Proprietary and Confidential Slide 48
Softer handover occurs between sectors of the same site
Soft handover occurs between sectors of different sites
For both softer and soft handover UE Ec/o measurements are used to
determine whether a cell should be added or removed from the active set
Soft Softer andover Soft Softer andover
Proprietary and Confidential Slide 49
Soft andover Soft andover
Updating the Active Set Updating the Active Set
o
RSCP
1
RSCP
1
RSCP
3
RSCP
3
RSCP
4
RSCP
4
-60dBm -60dBm
-65dBm -65dBm
RSCP
2
RSCP
2 -70dBm -70dBm
-77dBm -77dBm
-83dBm -83dBm
- Addition Window event 1a
- Drop Window event 1b
- Replacement Window event 1c
Proprietary and Confidential Slide 50
Soft andover Soft andover - - Add Drop Add Drop
Ec/o
1
Ec/o
1
Ec/o
2
Ec/o
2
Addition
Window
Addition
Window
Drop
Window
Drop
Window
T
add
T
add
T
drop
T
drop
Proprietary and Confidential Slide 51
Soft andover Soft andover - - RepIace RepIace
Ec/o
1
Ec/o
1
Ec/o
3
Ec/o
3
Addition
Window
Addition
Window
Drop
Window
Drop
Window
T
add
T
add
T
add
T
add
T
replace
T
replace
Ec/o
2
Ec/o
2
Ec/o
4
Ec/o
4
Proprietary and Confidential Slide 52
andovers andovers - - Inter frequency O Inter frequency O
nter frequency handover occurs between two WCDMA carriers
This is a hard handover, CM required for UE's with single receiver
Used once operator deploys its second carrier, for microcell layer or capacity
purposes
Proprietary and Confidential Slide 53
Inter system O Inter system O
nter system handover occurs between 3G and other systems
CM required for UE's with a single receiver
Voice service is a hard handover and is transparent to the user
Data service is treated as a reselection not a hard handover and data
interruption results.
As with all handovers, accurate adjacencies are required, this is not only
important to ensure seamless customer experience when moving in and out
of 3G coverage but also to meet the mandated requirements for E911.
3G
2G
Proprietary and Confidential Slide 54
M M - - ompressed Mode ompressed Mode
Typical Dual Mode 3G/2G UEs utilize a single TRX
To detect potential F/S handover candidates the UE has to share the
receiver.
To create the time required to measure another frequency/frequencies without
disrupting the current service compressed mode is used.
During compressed mode the UE's spreading factor is halved and the
instantaneous transmit power is increased in the compressed frame in order
to keep the quality (BER, FER, etc.) unaffected by the resulting reduction in
processing gain.
This creates a "gap in which the RX can be retuned and F or S neighbors
scanned.
Proprietary and Confidential Slide 55
"A "A
andover andover
1. 1. BIah? BIah?
2. 2. BIah? BIah?
3. 3. BIah? BIah?
4. 4. BIah? BIah?
5. 5. BIah? BIah?
6. 6. BIah? BIah?
7. 7. BIah? BIah?
8. 8. BIah? BIah?
Proprietary and Confidential Slide 56
Radio Resource Management Radio Resource Management
Proprietary and Confidential Slide 57
Radio Resource Management Radio Resource Management
Overview of Radio Resource Management (RRM) Overview of Radio Resource Management (RRM)
Aim of RRM is to efficiently manage the Radio Resources of the WCDMA air
interface
Different vendors have implemented different RRM strategies and algorithms
Generally RRM functions can be group as follows
Admission Control
Load Control
Packet Scheduler
Resource Management
Power Control
Handover Control
Cell Based
Connection Based
Proprietary and Confidential Slide 58
Radio Resource Management Radio Resource Management
Admission ontroI Admission ontroI
Responsible for determining if the system (Air nterface, Code Tree, Channel
Elements, ub, RNC, u etc), can accept the call
Air nterface (Uplink Load, Downlink Load/Tx Power) ?
Code Tree Fragmentation ?
NodeB Processing Capacity ?
ub Capacity ?
RNC Capacity ?
May give priority to different types of calls
Typically voice/video take precedent
Considers reports from Load Control Entity to assist decisions
Proprietary and Confidential Slide 59
Radio Resource Management Radio Resource Management
Load ontroI Load ontroI
Responsible for ensuring cell does not go into overload condition
Constantly monitoring Uplink Rx power and Downlink Tx power
Preventative action taken to avoid overload condition
Load reports sent to Admission Control and Packet Scheduler
Proprietary and Confidential Slide 60
Radio Resource Management Radio Resource Management
Packet ScheduIe Packet ScheduIe
Responsible for maximizing throughput of cell/users
Considers reports from Load Control Entity to assist decisions
Should allocate the best bearer for the job
HSDPA / 384k / 128k / 64k / 32k / FACH etc.
Time
Load
Load Target
CS Load
Free Capacity for
PS or HSDPA
Proprietary and Confidential Slide 61
Radio Resource Management Radio Resource Management
Resource Manager Resource Manager
Responsible for ensuring efficient use of cells processing capacity
Code use
Channel element use
SF
4
SF
8
SF
16
384 user #1
128 user #1
384 user #2
Proprietary and Confidential Slide 62
Radio Resource Management Radio Resource Management
Power ontroI Power ontroI
As shown earlier power control is used to maintain the quality of the radio link
Minimizing the uplink and downlink transmission power maximizes system
capacity
u-CS u-CS
ub ub
u-PS u-PS
User Equipment (UE)
& USM
Node Bs RNC
Uu Uu
nner Loop
PC
nner Loop
PC
Outer Loop
PC
Outer Loop
PC
Proprietary and Confidential Slide 63
Radio Resource Management Radio Resource Management
andover ontroI andover ontroI
Responsible for maintaining radio links with UE during mobility
ntra-system handover
nter-system handover
Link Adaptation
3G
2G
3G 3G
Proprietary and Confidential Slide 64
"A "A
Radio Resource Management Radio Resource Management
1. 1. BIah? BIah?
2. 2. BIah? BIah?
3. 3. BIah? BIah?
4. 4. BIah? BIah?
5. 5. BIah? BIah?
6. 6. BIah? BIah?
7. 7. BIah? BIah?
8. 8. BIah? BIah?
Proprietary and Confidential Slide 65
Key WDMA oncepts Summary Key WDMA oncepts Summary
Key WDMA concepts covered Key WDMA concepts covered
AR NTERFACE OVERVEW
POWER CONTROL
Open
Closed (Fast/Slow)
HANDOVER
ntra-Frequency (Soft/Softer)
nter-Frequency (Other WCDMA carrier)
nter-System (3G->2G)
RADO RESOURCE MANAGEMENT
Admission Control
Load Control
Packet Scheduler
Resource Management
Handover Control
Power Control