Vous êtes sur la page 1sur 124

PPT Series for Technology Principle

WCDMA Wireless Principle and Key Technology

Name :
E-mail :
WCDMA Product Planning Dept.
ZTE Marketing System

2007 ZTE Corporation

Modification records

Edition

Date

Writer/Modifier

V3.00

2007-04

Shen junjie

V3.10

2007-08-17

Wang xing / Huang yan

Approver

Remark

Update

Agenda

WCDMA System Overview

WCDMA Wireless Principle

WCDMA Key Technology

Evolution of Cellular Mobile Communication System


First
First
Generation
Generation
(80s)
(80s)
Analog
Analog

AMPS

Others

TDMA
IS-136
PDC

Market
Driven

Broadband Service

CDMA
IS95

Voice Service

Market
Driven

Digital Technology

NMT

GSM
Analog Technology

TACS

Third
Third
Generation
Generation
(2000)
(2000)
Wideband
Wideband
Multimedia
Multimedia

Second
Second
Generation
Generation
(90s)
(90s)
Digital
Digital

UMTS
WCDMA
CDMA
2000
TDSCDMA

Background of 3G

Essential impetus: a wider range and

higher data rate of services, higher


spectrum efficiency

The
network
Thenetwork
supported
by
supportedby
IMT-2000
called
IMT-2000isiscalled
3G.
3G.

Improve the compatibility between

different networks
The international standardIMT-2000

comes forth as the requirement

Target of IMT-2000

Uniform frequency, uniform standard, seamless

coverage

High efficient utilization of spectrum

High quality, high security

Easy evolution to 2G

Provide various new services

Wireless Interface Technologies of IMT-2000

16 candidate tech., including 10 land mobile tech., 6 satellite tech.

Land mobile tech includes 8 FDD, 5 TDD

Dominating ground tech:

W-CDMA (Including 5 similar Tech. such as USA W-CDMA and WIMS,


which are merged as WP-CDMA)

CDMA2000 (Including 2 similar Tech.)

UWC-136

TD-SCDMA submitted by China

Wireless Interface Standards of IMT-2000

WCDMA

TD-SCDMA

IMT-DS
CDMA DS

IMT-TD
CDMA TDD

UMTS FDD

UMTS TDD

CDMA 2000

UWC-136

E-DECT

IMT-MC
CDMA MC

IMT-SC
IMT-2000
TDMA SC

IMT-FT
IMT-2000
FDMA/TDM
A

IS-136

DECT

3G Technology Evolution

WCDMA
CN based on MAP

3G

CDMA2000
CN based on ANSI41

Standard

TD-SCDMA
CN based on MAP

CDMA
CDMAis
is the
the Mainstream
Mainstream Technology
Technology of
of 3G
3G

3G Standard and Beyond 3G Evolution

TD-SCDMA
TD-SCDMA
R4

2005
2005
WCDMA
R4

CDMA
1X

HSDPA
Phase1
R5

HSUPA
Phase1
HSDPA
Phase2
R6

EV-DO A
BCMCS

EV-DO 0

TD-SCDMA
TD-SCDMA
Enhanced
Enhanced

R5/6
HSUPA
Phase2
MBMS

AIE
Phase 2

3GPP2
3GPP2 4G
4G

WiMAX
WiMAX
802.16e
802.16e

802.16d
802.16d

2005

3GPP
3GPP 4G
4G

FDD/TDD
FDD/TDD

AIE
Phase1
NDO

WiMAX
WiMAX

2004

LTE
LTE

2006

2007

2008

After 2009

10

WCDMA Standard Evolution


Study on Interoperability of

IMS and PLMN/PSTN/ISDN


Circuit Switch Network
MBMS
Study on Frame Structure
Introduce IMS Domain
Introduce HSDPA for Radio Interface

Introduce Iu Interface Control and Bearer


Separation
MAX. Speed: 2Mbps

R6

R5

Commercial Release

2001.6+ following CR

R4

R99

2000.3

2001.3

2002.6

Time for function frozen

11

Characteristics of WCDMA

Bidirectional fast closed-loop power control


Bidirectional coherent demodulation by pilots
Transmitter and receiver diversity
High chip rate(3.84Mcps
Channel coding tech with high gain
Unnecessary for GPS synchronization among base

stations
Multiple switching technology
Multiple transport rate
Advanced radio resource management algorithm

12

WCDMA Entire IP Network Evolution


R99

R4
OMC Billing
Server
HLR

MMS
C

GMLC

GMSC MSC SGSN GGSN


CS

PS

MSC
server

RNS

R99
R99 CN
CN smoothly
smoothly evolves
evolves from
from
GSM/GPRS
network
GSM/GPRS network

SCP

GMLC

OMC Billing
Server
HLR

MMS
C

GMLC

GMSC
server

CS

GMGW MGW SGSN GGSN


GMGW MGW SGSN GGSN
CS

BSS

OMC Billing
Server
HLR

MMS
C
SCP

SCP

R5

BSS

CS

PS

PS

RNS

R4
R4 CN
CN separate
separate the
the Control
Control Plane
Plane
from
from Bearer
Bearer Plane
Plane in
in CS
CS Domain
Domain

BSS

RNS

R5
R5 CN
CN Introduces
Introduces
IMS
IMS
RAN
RAN Adopts
Adopts IP
IP

WCDMA Entire IP Network Evolution coincide with the


development tendency of the next generation network
13

Comparison of the Three 3G Technologies (I)


WCDMA

CDMA2000

5M

1.25/5/10/15/20 MHz

Chip rate

3.84M

N*1.2288Mcps N=1,3,6,9,12

Spreading way

DS-CDMA

DS-CDMA & MC-CDMA

Duplex mode

FDD/TDD

FDD

Frame size

10ms

20ms general data and control channel

Carrier spacing

5ms basic and designated control channel)


Channel coding

Convolutional codes Turbo codes

Convolutional codes Turbo codes

Interleave

Intra-cutting inter-cutting

Intra-cutting

Scrambling

Walsh+Gold sequence

Walsh+M sequence

Modulation mode

QPSK/BPSK

QPSK/BPSK

Power control

Open-loop and fast closed-loop 1.5KHz

Open-loop and fast closed-loop 800Hz

Synchronization/Asynchronous

synchronization

Base station
synchronization

14

Comparison of the Three 3G Technologies (II)


WCDMA-TDD

TD-SCDMA

Carrier spacing

5M

1.6M

Chip rate

3.84M

1.28M

Spreading way

DS-CDMA, SF=1,2,4,8,16

DS-CDMA, SF=1,2,4,8,16

Duplex mode

TDD

TDD

Modulation mode

QPSK/BPSK

QPSK

Number of timeslot

15

Capacity

16

Channel number each carrier

56

48

Capacity

220.8kbps

281.6kbps

Rate of one carrier

3.31Mbps

1.971Mbps

Spectrum Utilization

0.662Mbps/MHz

1.232Mbps

channel number each timeslot

(rate of one timeslot)

15

Agenda

WCDMA System Overview

WCDMA Wireless Principle

The Basic Principles of Wireless


Communication

WCDMA Wireless Technology

WCDMA Key Technology

The Basic Principles of


Wireless Communication
Radio Propagation Characteristics
Multi Access
Spreading Technology
Channel Coding
Interleave Technology
Diversity Technology

17

Characteristic of Radio Propagation


Electromagnetic propagation: direct radiation reflection diffraction and

scattering
Signal attenuation:

Path loss Loss of electromagnetic waves in large scope of the spread


reflects the trend of the received signal in the spreading

Slow fading Loss because of being blocked by the building and hill in the
propagation path

Fast fading Electromagnetic signals rapidly decline in a few dozens


wavelength ranges

Description of Fast fading distribution

Rayleigh distribution non line-of sight transmission

Rician distribution line-of sight transmission

18

Characteristics of Radio Propagation

Interference

dithering
0

delay

Sending signal

Accepting signal

fading
0dB

2 3

Sending signal

Accepting signal

Sending signal

-25dB

Accepting signal

Sending signal

Accepting signal

Frequency
Frequencyoff-set
off-setcaused
causedby
bythe
themovement
movementof
ofmobile
mobile

that
thatis
isDoppler
Dopplereffect
effect

19

Multi-Path Effects

sending signal

strength

receiving signal
0

time

20

The Basic Principles of


Wireless Communication
Radio Propagation Characteristics
Multi Access
Spreading Technology
Channel Coding
Interleave Technology
Diversity Technology

21

Multiple Access

Frequency
Frequency division
division multiple
multiple
access
access technology
technology

FDMA

Channels
Channelsin
indifferent
differentfrequency
frequencyare
are
allocated
to
different
users,
e.g.
allocated to different users, e.g.
TACS
TACS
AMPS
AMPS

Power

Time
Time division
division multiple
multiple access
access
technology
technology

TDMA

channels
channelsin
indifferent
differenttime
timeare
areallocated
allocatedto
to
different
users,
e.g.
GSM

DAMPS

different users, e.g. GSM DAMPS

Code
Code division
division multiple
multiple access
access
technology
technology
Users
Usersdistinguished
distinguishedby
byscramble
scramblecode,
code,e.g.
e.g.
CDMA
CDMA

Tim
e

eq
Fr

y
nc
e
u

Power
Tim
e

Fre

cy
en
u
q

CDMA
Power
Tim
e

y
nc
e
u
eq
Fr

22

The Basic Principles of


Wireless Communication
Radio Propagation Characteristics
Multi Access
Spreading Technology
Channel Coding
Interleave Technology
Diversity Technology

23

Principle of Spreading Frequency

A technology of transmission technology after spreading

frequency of signal.
Theoretical Basis: Shannon theory C=Wlog2(1+S/N)

Wideband
Signal

Slow
Information
Sent

Slow
Information
Recovered

TX

Fast
Spreading
Sequence

RX

Fast
Spreading
Sequence

24

Sketch Map of Spreading

Sf

Sf
signal

signal
f0

f0

Before spreading

After spreading

Sf

Sf

White noise

signal
White noise

signal
f0

Before despreading

signal

interference

f0

After despreading

White noise

25

Spreading Mode

Direct sequence spread DS SS


Base band data is spreaded by multiplication of pseudo-noise sequence and
base-band pulse, the pseudo-noise sequence generated by the pseudo-noise
generator
BER subject to Multiple Access Interference and near-far effect
Power control can overcome the near-far effect, but it is limited by power
detection accuracy
WCDMA uses DS-SS

Frequency hopping spread FH-SS

Data is transmitted in the random channel by the carrier frequency hopping


Before FH again, data is transmitted using traditional narrowband modulation
No near-far effect

26

Characteristics of Spreading Communication

High anti-multi-path- interference capability


Anti-sudden-pulse
High security
Lower transmitting power
Easy to implement large-capacity Multiple Access Communication
Occupy band wide
Complex realization

27

The Basic Principles of


Wireless Communication
Radio Propagation Characteristics
Multi Access
Spreading Technology
Channel Coding
Interleave Technology
Diversity Technology

28

Purpose of Channel Coding


purpose:

By adding redundant information in the original data stream, receivers


can detect and correct the error signal, and improve data transmission
rates.

No correct coding: BER<10 ~ 10


-1

-2

Convolutional coding BER<10-3

Turbo coding

BER<10-6

Can not satisfy


the communication
Can satisfy the
speech communication
Can satisfy the
data communication

29

Principle of Channel Coding

Channel coding

Error-correcting ability obtains by adding redundancy in the original


data

Convolutional coding and Turbo coding 1/2 1/3 are widely


applied.

Increase redundancy and transmission time

Suitable to correct few non-continuous errors

30

The Basic Principles of


Wireless Communication
Radio Propagation Characteristics
Multi Access
Spreading Technology
Channel Coding
Interleave Technology
Diversity Technology

31

Principle of Interleave Technology


advantage

Interleave is to change the sequence of data to random the unexpected


errors

Advance the correcting validity

disadvantage

Increase the processing delay

Especially, Several independent random errors may intertwined for the


unexpected error .

e.g.
x1 x6 x11 x16 x21

Data input
A = (x1 x2 x3 x4 x5 x25)

x2 x7

x22

x3 x8

x23

x4 x9

x24

x5 x10

x25

Data output
A= (x1 x6 x11 x16 x25)

32

The Basic Principles of


Wireless Communication
Radio Propagation Characteristics
Multi Access
Spreading Technology
Channel Coding
Interleave Technology
Diversity Technology

33

Concept of Diversity Technology


Double meanings scattered transmission, concentrative

process.

Achieved by using and finding the independent multi-access

signals in the wireless communication environment .

If the signals in one path decay seriously, but in other independent

path are still strong.

advantage

Easy to achieve relatively stable signal

Achieve the diversity gain

Improve SNR

34

Diversity Categories

Space diversity

Also called antenna diversity, if the distance between the antennae is greater
than half of the wavelength, the signals from different antenna are not related.

Time diversity

The signal repeats over Channel Coherent time interval, so that the environment
is independent.

Frequency diversity

The signal repeats in the different frequencies.

Polarization Diversity

Signal reflects in the different direction, since the reflection coefficients of


different polarization directions are not the same, the signals in different
polarization direction is not related

35

Agenda

WCDMA System Overview

WCDMA Wireless Principle A

The Basic Principles of Wireless


Communication

WCDMA Wireless Technology

WCDMA Key Technology

WCDMA Wireless Technology


Spreading Technology of WCDMA
Channel Coding of WCDMA
Interleave Technology of WCDMA
Diversity Technology of WCDMA

37

Spreading of WCDMA

Chip after
Spreadin
g

Data bit

OVSF Code

Scramble Code

Symbol
Symbol rate
rate SF
SF == 3.84Mcps
3.84Mcps
WCDMA
WCDMA
SF
SF of
of uplink
uplink channeliezd
channeliezd code
code
4~256
4~256
SF
SF of
of downlink
downlink channelized
channelized code:4~512
code:4~512
OVSF:
OVSF: Orthogonal
Orthogonal Variable
Variable Spreading
Spreading Factor
Factor

38

Spreading, Scrambling and modulation of WCDMA


Downlink physical channel spreading and modulation

serial
DL physical channel 1
parallel
transfer

I+jQ

Sdl,n

Cch,SF,m
G1

j
DL physical channel 2 serial
parallel
transfer

I+jQ

Sdl,n

Cch,SF,m

G2

S-SCH

Gp
Gp

Re(T)
T

P-SCH

Real part
and
Imaginary part
separate Im(T)

cos(wt)
Pulse
shaping

Pulse
shaping

-sin(wt)

39

Spreading, Scrambling and modulation of WCDMA


Uplink physical channel spreading and modulation
DPDCH1

Cd,1

DPDCH3

Cd,3

Cd,5

DPDCH5

cc

I+jQ

DPDCH2

Cd,2

DPDCH4

Cd,4

Cd,6

Cc

DPDCH6
DPCCH

cc

Q
j

Re(S)

Sdpch,n

Real part
and
Imaginary part
separate Im(S)

cos(wt)
Pulse
shaping
Pulse
shaping

-sin(wt)

40

Despreading of WCDMA

Method of despreading

Input signal

Output after despreading

Ts
(*)dt
0

When T=Ts, judge


integral
Local PN code

41

Sketch map of Spreading and Despreading of WCDMA

Symbol

Data =
010010

1
-1
Chip

Spreading code =
1 -1 -1 1 -1 1 1 -1
( SF = 8 )

Spreading

1
-1

Spread signal
= Data code

Despreading
Spreading code
Data =
Spread signal
code

1
-1

1
-1
1
-1

42

Spreading Gain

Spreading definition and processing gain

Processing gain: PG=Wc/R

Wc: chip rate

R: signal rate

PG=10lg(Wc/R), dB units

Despreading by receiver will be able to resume the original signal

More spreading of multiples, higher the processing gain, stronger anti-

jamming

43

WCDMA Wireless Technology


Spreading Technology of WCDMA
Channel Coding of WCDMA
Interleave Technology of WCDMA
Diversity Technology of WCDMA

44

Convolutional Code

Mainly used in the voice channel and control signal channel


Coding rate is 1/2 1/3

Input

D
Output 0
G0 = 557 (octal)
Output 1
G1 = 663 (octal)
Output 2
G2 = 711 (octal)

Rate 1/3 convolutional coder

45

Characteristics of Convolutional code

Easy decode
Short delay
Generally use the Viterbi Algorithm
Channel bit error rate is 10 3 magnitude
Suitable to realtime service

e.g. speech and video service.

46

Turbo Code
Used in Data service channel
Code Rate is 1/3
Can be implemented in the transmission for large block and long delay

services
Turbo coding structure is based on two or more weak error control code

combinations. The information bits are interleaved in the two Encoder, and
generate two information flow. At last, this information can be multiplexed
and punctured

input

Encoder 1

Interleaver

Multiplex

Decoding needs cycle iterative calculation

output

Encoder 2
47

Characteristics of Turbo Codes

Complex decoding

Use the LOG-MAP arithmetic

Channel bit error rate is 10 6 magnitude

Very suitable to non-realtime package service which is BER

sensitive & delay insensitive , e.g. WWW, FTP, E_mail , multimedia


transmission .

48

WCDMA Wireless Technology


Spreading Technology of WCDMA
Channel Coding of WCDMA
Interleave Technology of WCDMA
Diversity Technology of WCDMA

49

Interleave Technology of WCDMA

Intra-frame interleave

Bits transform in the internal frame

Inter-frame interleave

Data transform among the frames

Intra-Turbo codes interleave

Complex nesting of intra-frame and inter-frame interleave

50

WCDMA Wireless Technology


Spreading Technology of WCDMA
Channel Coding of WCDMA
Interleave Technology of WCDMA
Diversity Technology of WCDMA

51

Diversity Technology of WCDMA

Open-loop transmit diversity

Use space-time coding , fire from two antenna, comprehensively utilize


the time and space diversity

Closed-loop transmit diversity

Feedback from the receiver controls the parameters of the transmitting


antenna, it is the time diversity with feedback technology.

Interleave

A implied time diversity

RAKE receive technology

A implied time diversity. The multi-access signal used by RAKE is


considered the signal sent by transmitter several times.

52

Agenda

WCDMA System Overview

WCDMA Wireless Principle A

WCDMA Key Technology

WCDMA Capacity Feature

Radio Resource Management

WCDMA Key Technology

Capacity of WCDMA

UL c
apac
ity in
limit terferenc
ed
e
DL c
apac
ity p
ow e
r lim
it

ed

54

Power Rise

Power rising occurs because of the Multiple Access Interference

(MAI) resulting from the non-orthogonal code channels.


WCDMA network

Code channel transmit


Channel power
Promised channel quality
Channel power rise
Power climb
Collapse over the range
Interference outside the cell

Meeting Room
talk with dialects
voice tone
listen clearly
voice tone rise
voice climb
can not listen for each other
Noise outside the room

55

Power Rise

56

WCDMA Capacity Feature

WCDMA capacity feature

WCDMA capacity is Soft Capacity

The Concept of Soft Capacity

Inter-convertibility between system capacity and communication


quality

Different service has different capacity

Different proportion of services has different capacity for mixed


services

57

Soft Capacity

Different
service has
different
capacity

Different service
combination and
proportion has
different capacity

Trade
Trade off
off between
between System
System capacity
capacity and
and service
service quality
quality

58

Crucial Factors for WCDMA Capacity

ty
ali
Qu

Co
ve
r ag
e

Capacity

All
All the
the WCDMA
WCDMAtechnologies
technologies adopted
adopted is
is try
try to
to achieve
achieve
the
the most
most optimal
optimal balance
balance of
of the
the three
three factors
factors
59

Factors Affecting WCDMA Capacity


Factors
Power Control
Handover Control

Impact on WCDMA capacity

Category

Reducing interference, saving power and Increasing capacity


Impacting the capacity through applying different proportion and algorithm of soft
handover

Admission Control

Admitting a connection base on the load and the admission threshold of planned
capacity

Radio Resource
Management RRM

Load Control
Monitoring system load and adjusting the ongoing services to avoid overload
OVSF Code
The Allocation of codes impacts the maximum number of simultaneous connections.
RAKE Receiver

The advanced receiving and baseband processing technology is introduced to


overcome the fast fading

Smart Antenna

Reducing interference, saving power and expanding coverage through tracking the
user with beam forming antenna array.

MUD

Key Technology

Reducing the Multi-Access Interference (MAI).

Service Class and


Combination

The class and combination of services impact the capacity directly

Service Attribute

Wireless environment such as interferences, UE position and mobility etc. can influent

Wireless Propagation

the cell capacity

Environment

Wireless Environment

60

Agenda

WCDMA System Overview

WCDMA Wireless Principle A

WCDMA Key Technology

WCDMA Capacity Feature

Radio Resource Management

WCDMA Key Technology

Radio Resource Management


Power Control
Handover Control
Compressed Mode
Admission Control
Load Control

Code Allocation Spreading

62

Power Control

CDMA is not a new technology


Power control is a key technology of CDMA system
Power control is the key path for launching the large scale CDMA

commercial network

CDMA
CDMAis
is aa typical
typical self-interference
self-interference system,
system, thus
thus the
the chief
chief
principle
principle is
is that
that any
any potential
potential surplus
surplus transmitted
transmitted power
power for
for
service
service must
must be
be controlled.
controlled.

63

Near-Far Effect

Power

Power

Each
Each terminal
terminal is
is an
an
interference
interference source
source to
to the
the
others.
others. The
The Near-far
Near-far effect
effect
will
will impact
impact the
the capacity
capacity
tremendously
tremendously

Power
Power control
control will
will reduce
reduce
the
the cross
cross interference
interference
significantly
significantly and
and improve
improve
the
the total
total capacity
capacity

64

Multi-Access Interference

WCDMA is a self-interference system

Cause: Spectrum sharing; lacking of idealized self-correlated and


cross-correlated spread codes.

Phenomenon: Power Rising

Output

Frequency

Time
Codes
Synchronization
Time
Multi-Access Interference Sketch Map
65

Purpose of Power Control

Downlink Power Control


Cell transmitted power

Report power control bit (TPC)

Uplink Power Control


UE transmitted signal

Power control command (TPC)

Overcome near-far effect and compensate signal fading


Reduce multi-access interference and guarantee cell capacity
Extend battery life

66

Category of Power Control


Open
OpenLoop
Loop
Measure
Measurethe
thechannel
channelinterference
interferencecondition
conditionand
andadjust
adjustthe
theinitial
initial
transmitted
transmittedpower
power
Close
CloseLoop
Loop
Inner
InnerLoop
Loop
Measure
Measurethe
theSIR
SIR(Signaling
(Signalingto
toInterference
InterferenceRatio),
Ratio),compare
comparewith
withthe
the
target
targetSIR
SIRvalue,
value,and
andthen
thensend
sendpower
powercontrol
controlinstruction
instructionto
toUE.
UE.
The
Thefrequency
frequencyof
ofCDMA
CDMAclose
closeloop
looppower
powercontrol
controlisis1500Hz.
1500Hz.
IfIfmeasured
measuredSIR>target
SIR>targetSIR,
SIR,decrease
decreasethe
theUE
UEtransmitted
transmitted
power.
power.
IfIfmeasured
measuredSIR
SIR<target
<targetSIR,
SIR,increase
increasethe
theUE
UEtransmitted
transmitted
power.
power.
Close
CloseLoop
Loop
Outer
OuterLoop
Loop
Measure
Measurethe
theBLER
BLER(Block
(BlockError
ErrorRate),
Rate),and
andadjust
adjustthe
thetarget
targetSIR.
SIR.
67

Open Loop Power Control

General principals of open loop power control

Open loop power control is applied to estimate the initial transmitted


code power (TCP) for a new radio link.

The downlink Open Loop Power Control is using P-CPICH signal which
is measured by UE to estimate the initial TCP and the following factors
will also be considered, such as service QoS and data rate, Eb/No
requirements of establishing service, current downlink total
Transmitted Power and interference from neighbor cell etc..

68

Close Loop Inner Loop Power Control

Measure receiving SIR and


compare to target SIR

1500Hz
1500Hz

Inner loop

TPC instruction
Set SIRtar

NodeB
Try
Try to
to get
get the
the equal
equal receiving
receiving
Eb
Eb (Energy
(Energy per
per bit)
bit) of
of each
each
UE
UE at
at Node
Node B
B

UE
Each
Each radio
radio link
link has
has
its
its own
own control
control
circle
circle

69

Close Loop Inner Loop Power Control

General principals of inner loop power control

The receiver compares the SIR value of received signal with target SIR, and then
sends back TPC instruction. According to the instruction, the sender will decide
to increase/decrease the transmitted power, The adjusted
rang=TPC_cmdTPC_STEP_SIZE

Inner loop power control is required for the following channels

DPCH, PDSCH, PCPCH

Inner loop power control is not required for the following channels

P-CPICH(S-CPICH), P-CCPCH(S-CCPCH), PRACH etc..

70

Close Loop Outer Loop Power Control

Measure
Measure BLER
BLER
of
of TRCH
TRCH

Get
Get data
data flow
flow
with
with stable
stable BLER
BLER

Measure receiving
BLER and compare to
target BLER

Measure receiving SIR


and
compare to target SIR

Inner loop

Outer Loop
Set BLERtar

TPC instruction

Set SIRtar
10-100Hz

RNC

NodeB

UE

71

Close Loop Open Loop Power Control


General principals of open loop power control

The algorithm is implemented as following: Employ the inner loop power control to keep SIR close
to target SIR; Measure the quality of service, e.g. through CRCI report, and tune the target SIR with
pre-defined step; Therefore keep the call in good quality event in changing wireless propagation
environment.

Input parameters include target BLER, CRC indicator and SIR Error, output parameter is SIR Target.

Open loop power control algorithm is implemented in two ways: FER period report triggered; FER
event report triggered.

The uplink open loop power control algorithm is executed in the RNC while the downlink one is
executed in the UE.

72

Radio Resource Management


Power Control
Handover Control
Compressed Mode
Admission Control
Load Control

Code Allocation Spreading

73

Purpose of Handover Control

When UE is moving from the coverage area of one site to another


site, or the quality of service is declined by external interference
during a call, the call must be handed over to an idle channel for
sustaining the service. Handover is a key technology for mobile
networking

74

Handover Types

Soft Handover

Intra-Node B soft handover (Softer Handover)

Inter-Node B soft handover

Inter-RNC soft handover (involving Iur interface)

Hard Handover

Inter-frequency hard handover

Intra-frequency hard handover (forced hard handover)

Inter-RAT hard handover (between different Radio Access Technology,


e.g. WCDMA and GSM)

Inter-mode handover (e.g. between FDD and TDD)

75

Handover Demonstration

Hard
Handover

Soft
Handover

76

Soft Handover/Softer Handover

C
A

C
A

B
C

C
A

C
A

C
A

77

WCDMA General Handover Procedures

Measurement Control

UTRAN demands the UE to start measurement through issuing a measurement


control message.

Handover decision

UTRAN makes the decision based on the measurement reports from UE. The
implementation of handover decision is various for different vendors. It impacts
on the system performance critically.

Handover execution

UTRAN and UE execute different handover procedure according to the handover


command .

78

Handover Flows
(A) RNC sends
measurement control
message to UE (Measurement
Control)
(B) UE starts measurement
task with the parameters
included in the message,
and reports measurement
results Measurement
Report
(C) RNC stores the
measurement results
according to frequencies and
cells
(D) RNC Estimates the
quality of each carrier
(including intra-frequency
and inter-frequency)

Current
carrier has
good quality

(E) Quality
Decision
Other carrier has
good quality

(F) maintain
the active set
and monitored
set

(G) Allocate
resource in target
cell of the virtual
active set, prepare
to execute handover

Other
system
has good
quality

(H) Allocate
resource in target
cell, prepare to
execute handover

I If handover is required, RNC sends


handover command with target cell to UE

79

General Procedure of Handover Control (I)

Measuring

The measurement objects are decided by RNC. Usually, either


Ec/N0 or RSCP (Received Signal Code Power) of P-CPICH channel
is used for handover decision.
ZTE RNC adopts Ec/N0 measurement, because Ec/N0 embodies
both the received signal strength and the interference. The relation
of Ec/N0 and RSCP is shown as follows:
Ec/N0 RSCP/RSSI
In the above equation RSSI Received Signal Strength
Indicator is measured within the bandwidth of associated
channels

80

General Procedure of Handover Control (II)

Filtering

The measurement results should be filtered before being


reported. Measurement filtering can be regarded as a low pass
filtering procedure.
The following equation is applied for filtering

Fn=(1-a)Fn-1 a*Mn
Variants definition
Fn filtered measurement result
Fn-1 last filtered measurement result
Mn latest Ec/I0 or RSCP measurement result received from physical
layer;
a = 1/2(k/2), k means the Filter coefficient, which is included in the
Measurement Control message. It is decided by the UTRAN.
F0 is initialized by the first measurement result M1.

81

General Procedure of Handover Control (III)

Reporting

Period report triggered handover


Base on the filtered measurement result
Event report triggered handover
Base on the event
Measurement result filtered in
Soft
Handover
Hard
Handover

Period

UE
Event decided in RNC
Handover decided in RNC

Event

Measurement result filtered in UE


Event decided in UE
Handover decided in RNC
82

General Procedure of Handover Control (IV)

Handover algorithm

All the handover algorithms including soft handover, hard handover


and so on are implemented on the event decision made from
measurement report.

Events defined in 3GPP specifications

Intra-frequency events 1A~1F

Inter-frequency events 2A~2F

Inter-RAT events 3A~3D

83

Concepts Related to Handover

Active Set: A set of cells that have established radio links with a certain

mobile station. User information is sent from all these cells.

Monitored Set: A set of cells that are not in the active set but are monitored

according to the list of adjacent cells assigned by the UTRAN.

Detected Set: A set of cells that are neither in the active set nor in the

monitor set

84

An Example of Handover Procedure

Pilot
Ec/Io

Pilot Ec/Io of cell 1

Pilot Ec/Io of cell 2

Pilot Ec/Io of cell 3


Connect to cell1

time
Event 1A
Event 1C
Event 1B
add cell2 replace cell1 with cell 3 remove cell3

85

RNS Relocation

Core Network

Core Network

Iu
Service
RNS

Iu
Target
RNS

Iur

Target
RNS

Service
RNS

RNS
Radio Network Sub-system

RNS relocation can :

Reduce the Iur traffic significantly

Enhance the system adaptability

86

Hard Handover

Hard handover measurement is much more complex for UE than

soft handover measurement.

Inter-frequency hard handover requires UE to measure the signal

of other frequency.

WCDMA employs compressed mode technology to support inter-

frequency measurement.

87

Radio Resource Management


Power Control
Handover Control
Compressed Mode
Admission Control
Load Control

Code Allocation Spreading

88

Purpose of Compressed Mode

In order to support inter-frequency and inter-RAT handover, UE is

required to perform inter-frequency and Inter-RAT measurement


periodically.
The UE with one transceiver does not have the opportunity to

perform inter-frequency measurement during the service period


(especially the voice call) , because the transceiver is busy in
transmitting and receiving the signals all the time.
Compressed mode can provide idle slot based transmission time

window, which can be used for inter-frequency measurement, for


the UEs in connected state, e.g. CELL_DCH.

89

Compressed Mode

10ms

1 frame10ms

Transmit gapsMaximum 7 slots = 4.7ms

Compressed Mode Transmission Diagram

90

Generation of Compressed Mode Frame

Puncturing

Lower the symbol rate of physical channel when processing the rate
matching procedure

SF halving

Employ half SF, e.g. employ SF64 to replace SF128

High layer scheduling

Decrease the bit rate from up layer

91

Radio Resource Management


Power Control
Handover Control
Compressed Mode
Admission Control
Load Control

Code Allocation Spreading

92

Admission Control

The admission control is employed to admit the access of

incoming call. Its general principal is based on the availability and


utilization of the system resources.
If the system has enough resources such as load margin, code,

and channel element etc. the admission control will accept the call
and allocate resources to it.

93

Purpose of Admission Control

The admission control should implement admission or rejection

for the new users, new RAB and new RL (for example handover)
according to the current resource situation. The admission control
will sustain the system stability firstly and try the best to satisfy
the new calling service QoS request, such as service rate, quality
(SIR or BER), and delay etc., basing on the radio measurement.

94

Admission Control in Uplink

Itotal_old+I >Ithreshold
Access
Threshold

Interference capacity
Service priority
Reserved capacity for
handover

The forecasted interference including the delta


interference brought by the incoming service is
calculated by the admission algorithm, and its
result depends on the QoS and transmission
propagation environment

Iown-cell
The current RTWP (Received
Total Wide Power) value of cell,
which is reported by Node B

Iother-cell
~
N0

95

Admission Control in Uplink

Different ultimate user numbers


Different interference threshold under different ultimate user

number conditions
Different ultimate throughputs

Ultimate Situation for different service rate


96

Admission Control in Downlink

Ptotal_old+P>=Pthreshold
Access
Threshold

Max TCP of cell


Service priority
Reserved capacity for
handover

The forecasted TCP value including delta


power required for the incoming service is
calculated by the admission algorithm, and its
result depends on the QoS and transmission
propagation environment.
The current TCP value of cell, which
is reported by Node B
Transmitted Carrier Power*Pmax
97

Admission Control in Downlink

Red low speed service


Blue high speed service

The
The above
above figure
figure illustrates
illustrates the
the relation
relation between
between ultimate
ultimate user
user
number
number corresponds
corresponds to
to different
different service
service rate
rate and
and distance
distance
under
under equidistant
equidistant distribution
distribution condition
condition
98

Admission Control Analysis

The service can be either one-direction or bi-direction type. For bi-

direction service, it is admitted only after both uplink and downlink


are admitted.
Admission control is the only access entry for the incoming

services, its strategy will directly effect the cell capacity and
stability, e.g. call loss rate, call drop rate.

99

Radio Resource Management


Power Control
Handover Control
Compressed Mode
Admission Control
Load Control

Code Allocation Spreading

100

Purpose of Load Control

The speed and


position changing of
UE may worsen the
wireless environment.

Increasing of
transmitted power
will increase the
system load

The purpose of load control is to keep the


system load under a pre-planned threshold
through decreasing the load in several ways,
therefore to improve the system stability.

Load control

101

Load Control Flows

Start

Light load

Decision

Over load

Normal load
1. Handover in and
access are allowed
2. Transmitted code
power (TCP) increasing
is allowed
3. RAB service rate
upgrade is allowed

1. Handover in
and access are
allowed
2. TCP
increasing is
allowed

1. Handover in and access


are forbidden
2. TCP increasing is
forbidden
3. RAB service rate degrade
4. Handover out
5. Release call

102

Load Control in Uplink

Triggers

RTWP (Received Total Wind-band Power) value from measurement report


exceeds the uplink overload threshold;

Admission control triggers when rejecting the high priority services access due
to insufficient load capacity in uplink.

Methods for decreasing load

Decrease the target Eb/N0 of service in uplink;

Decrease the rate of none real time data service;

Handover to GSM system;

Decrease the rate of real time service, e.g. voice call;

Release calls.

Methods for increasing load

Increase the service rate.

103

Load Control in Downlink

Triggers

Methods for decreasing load

TCP (Transmitted Carrier Power) value from measurement report exceeds the
downlink overload threshold;
Admission control triggers when denying the high priority services access due
to insufficient load capacity in downlink.

Decrease the downlink target Eb/N0 of service in downlink;


Decrease the rate of none real time data service;
Handover out to coverage-shared light loaded carrier;
Handover out to GSM system;
Decrease the rage of real time service, e.g. voice call;
Release calls.

Methods for increasing load

Increase the service rate.

104

Cell Breathing

Cell breathing is
one of the means
for load control
The
The purpose
purpose of
of cell
cell breathing
breathing is
is to
to share
share the
the load
load of
of hothotspot
spot cell
cell with
with the
the light
light loaded
loaded neighbor
neighbor cells,
cells, therefore
therefore to
to
improve
improve the
the utilization
utilization of
of system
system capacity.
capacity.

105

Radio Resource Management


Power Control
Handover Control
Compressed Mode
Admission Control
Load Control

Code Allocation Spreading

106

Purpose of Code Resource Planning

WCDMA system adopts primary scrambling code to distinguish the cells

and channel code to distinguish physical channels in downlink, and adopts


scrambling code to distinguish users in uplink. The OVSF (Orthogonal
Variable Spreading Factor) code tree is a sparse resource and only one tree
can be used in each cell. In order to make full use of the capacity, and
support as many connections as possible, it is important to plan and
control the usage of channel code resource.
Although the uplink scrambling codes are sufficient, the RNC should plan

to use the codes for avoiding allocating same code to different users in
inter-RNC handover scenario.

107

Code Resource Planning

Code types in WCDMA system

Uplink Scrambling Code

Uplink Channel Code

Downlink Scrambling Code

Downlink Channel Code

The uplink scrambling code and downlink scrambling code can be planned easily,

and uplink channel code does not need planning, therefore, only the downlink channel
code is planned with certain algorithm in RNC.
Each cell has one primary scrambling code, which correlates with a channel code

tree. The downlink channel code tree is a typical binary tree with each layer
corresponds to a certain SF ranging from SF4 to SF512.

108

Generation of Channel Code

Cch,4,0 =(1,1,1,1)
Cch,2,0 = (1,1)
Cch,4,1 = (1,1,-1,-1)
Cch,1,0 = (1)
Cch,4,2 = (1,-1,1,-1)
Cch,2,1 = (1,-1)
Cch,4,3 = (1,-1,-1,1)
SF = 1

SF = 2

SF = 4

109

OVSF Code Tree

110

Channel Code Characters


Code allocation restriction

The code to be allocated must fulfill the condition that its ancestor
nodes including from father node to root node and offspring nodes in
the sub tree are not allocated;

Code allocation side effect

The allocated node will block its ancestor nodes and offspring nodes,
thus the blocked nodes will not be available for allocation until being
unblocked .

SF=8
SF=16

SF=32

111

Strategy of Channel Code Allocation

Full utilization

Low Complexity

The fewer the blocked codes, the higher the code tree utilization rate.

Short code first.

Allocate codes for common channels and physical shared channels prior
to dedicated channels.

Guarantee the code allocation for common physical channels.

Apply certain optimized strategy to allocate codes for downlink dedicated


physical channels.

112

An Example of Code Allocation

SF = 4
SF = 8
SF = 16
SF = 32
0

16

17

18

19

20

21

22

23

24

10

11

12

13

14

15

25

26

27

28

29

30

31

SF = 4

Choose one
code from
three
candidates

SF = 8
SF = 16
SF = 32

Red circles represent the codes that have been allocated


Green circles represent the codes that are blocked by the allocated offspring codes
Blue circles represent the codes that are blocked by the allocated ancestor codes;
Black circles represent the codes that are to be allocated;

113

Agenda

WCDMA System Overview

WCDMA Wireless Principle A

WCDMA Key Technology

WCDMA Capacity Feature

Radio Resource Management

WCDMA Key Technology

WCDMA Key Technology


RAKE Receiver
Multi-User Detection (MUD)

115

RAKE Receiver
The multi-path signals contain some useful energy , therefore the

CDMA receiver can combine these energy of multi-path signals to


improve the received signal to noise ratio.
RAKE receiver adopts several correlation detectors to receive the

multi-path signals, and then combines the received signal energy.

d1

d2
d3

RAKE
RAKE Receiver
Receiver can
can effectively
effectively overcome
overcome the
the multi-path
multi-path
interference,
interference, consequently
consequently improve
improve the
the receiving
receiving performance.
performance.
116

RAKE Receiver

Single path
receiving circuit
Single path
receiving circuit

Receiver

Combiner

Combined
Signal

Single path
receiving circuit

Calculate signal
strength and
delay

Multi-path search
engine

s(t)

s(t)

t
117

WCDMA Key Technology


RAKE Receiver
Multi-User Detection (MUD)

118

Multi-User Detection

WCDMA telecommunication system can provide communication

environment for simultaneous multi-user access. The research result


indicates that multi-access interference and channel noise have different
statistical characters.
Multi-access interference has the estimable and reproducible features.
The purpose of MUD is to reduce the multi-access interference till 0 through

collecting the useful information of all users and adopting certain signal
processing method.

119

Multi-User Detection Technology

The CDMA receiver is based on the principal of RAKE receiving, and the interference

from other users is treated as noise.


The capacity of RAKE receiving based CDMA system is interference limited.

The true optimal receiver adopts join-detection technology to detect all the received

signals, and removes the interference from other users.


Multi-User Detection (MUD), also named as Join-detection or Interference-

elimination can reduce the multi-access interference, thereby improve the capacity.
MUD can eliminate the near-far effect.

The near optimal MUD receiver and interference eliminated receiver are actually

applied instead of the true optimal MUD receiver because of the implementation
complexity.

120

True Optimal Multi-User Detection

The true optimal detection consists of K matched filters and one

Viterbi algorithm implementation.


The complexity has an exponents relation to the user number.

Synchronize

Matched Filter 1
r(t)

Synchronize

Matched Filter 2

Z1 i

Z2 i

Synchronize

Matched Filter k

Zk i

b1 i

Viterbi
Algorithm
Implementation

b2 i

bk i

121

Linear De-correlation Detection

De-correlation detection transforms the multi-access interference,

which is generated in multi-user environment, into an equivalent


transmission response matrix i.e. the channel codes correlation
matrix R
The complexity has an exponents relation to the user number.

Bit Decision

Matched Filter 1
r(t)

Matched Filter 2

Matched Filter k

Linear
Transform
ation
R1

Bit Decision

Bit Decision

b1

b2

bk

122

Summary

WCDMA Wireless Technology


Spreading
Channel Coding (Convolutional Coding, Turbo coding)
Interleaving
Diversity

WCDMA Radio Resource Management RRM)

Power Control
Handover Control
Admission Control
Load Control
Code Allocation

WCDMA Key Technology

RAKE Receiver
MUD

123

2007 ZTE Corporation

Vous aimerez peut-être aussi