3rd Generation Mobile Communication Systems

Published on June 2016 | Categories: Documents | Downloads: 55 | Comments: 0 | Views: 509
of 200
Download PDF   Embed   Report

Comments

Content

Dr.-Ing. Wolfgang Granzow

Mobilkommunikationssysteme der 3. Generation (Mobile Kommunikationssysteme II)

3rd Generation Mobile Communications Systems (Mobile Communications Systems II)

Skriptum zur Vorlesung (SS 2000) Lehrstuhl für Nachrichtentechnik II (LNT II) Friedrich-Alexander-Universität Erlangen-Nürnberg

Dr.-Ing. Wolfgang Granzow Ericsson Eurolab Deutschland
Research Mobile Communications Nordostpark 12, 90411 Nürnberg (Visitor address: Gebertstr. 9) Tel.: Fax: +49 911 5217-308 +49-911-5217 961

Mobil: +49 172 826 10 65 Email: [email protected]

3rd Generation Mobile Communication Systems

Page 0-3

Version 1.12 01.08.2000

Objective
The objective of this lecture is provision of a detailed understanding of the functions of digital cellular communications systems and incorporated processes. A main part of the lecture is dedicated to explanation of the basic elements of a communication system (e.g. coding, spreading and modulation, spectral shaping, synchronization, correlation receivers) employed in third generation cellular systems and analysis of its characteristics. Furthermore, a basic understanding of the fundamental signalling processes between mobile stations and the elements of the network infrastructure is provided. The lecture is oriented along the future third-generation terrestrial mobile communication standards which belong to the so-called family of International Mobile Telecommunications2000 (IMT-2000) standards. In specific, these systems are referred to as Universal Mobile Telecommunications System (UMTS), cdma2000, and radio transmission technology Universal Wireless Communications 136 (UWC-136). The lecture is intended for students of the higher semesters 8+. Knowledge of „Nachrichtenübertragung I und II“ is mandatory. This lecture builds upon „Systeme der mobilen Kommunikation (I) “.

3rd Generation Mobile Communication Systems

Page 0-4

Version 1.12 01.08.2000

Contents Objective .......................................................................................................................................0-3 1 Introduction...........................................................................................................................1-1 1.1 The cellular concept..........................................................................................................1-1 1.2 Historical development of mobile communication systems .............................................1-2 1.2.1 First-generation systems............................................................................................1-2 1.2.2 Second-generation systems .......................................................................................1-2 1.2.3 Third-generation systems ..........................................................................................1-3 1.3 Overview on IMT-2000 radio access technologies...........................................................1-6 1.4 UMTS specification series..............................................................................................1-11 2 UMTS Architecture ..............................................................................................................2-1 2.1 Services and Service Architecture ....................................................................................2-1 2.1.1 Definitions and categorization of services ................................................................2-1 2.1.2 Teleservices and supplementary services .................................................................2-2 2.1.3 Bearer services ..........................................................................................................2-5 2.1.4 QoS Architecture.......................................................................................................2-5 2.2 Network Architecture........................................................................................................2-6 2.2.1 Review of the GSM Network architecture................................................................2-6 2.2.2 UMTS network architecture......................................................................................2-8 2.3 General principles in protocol design .............................................................................2-10 2.4 UTRAN Transport Protocol Architecture.......................................................................2-13 2.4.1 General protocol structure.......................................................................................2-13 2.4.2 Iu Protocol Architecture..........................................................................................2-14 2.4.3 Iur and Iub interfaces ..............................................................................................2-16 2.4.4 ATM Adaptation layer ............................................................................................2-16 2.4.5 ATM layer...............................................................................................................2-17 2.4.6 Physical layer of ATM networks ............................................................................2-17 2.5 Radio Interface Protocol Architecture ............................................................................2-18 3 Spread spectrum technologies...............................................................................................3-1 3.1 Elements of direct-sequence spread spectrum systems.....................................................3-1 3.2 Spreading codes ................................................................................................................3-9 3.2.1 Correlation functions ..............................................................................................3-10 3.2.2 Specific spreading codes.........................................................................................3-12 3.3 Options for Spreading and Scrambling...........................................................................3-21 3.4 Receiver techniques ........................................................................................................3-23 3.5 Power control ..................................................................................................................3-28 4 Multi-user and cellular aspects .............................................................................................4-1

3rd Generation Mobile Communication Systems

Page 0-5

Version 1.12 01.08.2000

4.1 Principles of multi-user access technologies applied in UMTS ......................................4-1 4.2 Interference characteristics and impact on cell planning..................................................4-4 4.2.1 Interference situation on the Uplink..........................................................................4-4 4.2.2 Interference situation on the Downlink.....................................................................4-6 4.3 Link budget .......................................................................................................................4-8 4.4 Handover .........................................................................................................................4-12 4.5 System capacity and spectral efficiency .........................................................................4-15 4.5.1 Simple spectrum efficiency calculation for a single-cell system............................4-16 4.5.2 Simple spectrum efficiency calculation for a cellular CDMA system....................4-18 4.5.3 More exact calculation of CDMA spectrum efficiency..........................................4-19 4.5.4 Calculation of spectrum efficiency for TDMA.......................................................4-20 4.5.5 Comparison of CDMA and TDMA spectrum efficiency........................................4-21 4.6 Multi-user receivers ........................................................................................................4-21 5 Diversity techniques..............................................................................................................5-1 5.1 Receive antenna diversity .................................................................................................5-2 5.2 Multipath diversity............................................................................................................5-3 5.3 Macro diversity .................................................................................................................5-4 5.4 Site selection diversity transmit power control.................................................................5-4 5.5 Transmit antenna diversity................................................................................................5-5 5.5.1 Space Time Transmit Diversity ................................................................................5-5 5.5.2 Closed loop (feedback) transmit diversity ................................................................5-6 6 Services and functions of the protocol layers .......................................................................6-1 6.1 General aspects .................................................................................................................6-1 6.2 Call Control (CC)..............................................................................................................6-1 6.3 Mobility Management (MM) ............................................................................................6-2 6.4 Radio Resource Control (RRC) ........................................................................................6-4 6.5 Broadcast/Multicast Protocol (BMC) ...............................................................................6-4 6.6 Packet Data Convergence Protocol (PDCP) .....................................................................6-4 6.7 Radio Link Control (RLC) ................................................................................................6-5 6.8 Medium Access Control (MAC).......................................................................................6-7 6.9 Physical Layer (PHY, L1).................................................................................................6-9 6.10 6.11 Fundamental processes and procedures in cellular systems .......................................6-12 Security aspects (authentication, integrity protection, ciphering) ..............................6-13 Authentication.....................................................................................................6-13 Integrity protection..............................................................................................6-19 Ciphering.............................................................................................................6-19

6.11.1 6.11.2 6.11.3 7

Idle mode procedures of the mobile station ..........................................................................7-1

3rd Generation Mobile Communication Systems

Page 0-6

Version 1.12 01.08.2000

7.1 Idle mode...........................................................................................................................7-1 7.2 Modulation/Spreading on the downlink (FDD) ................................................................7-2 7.3 The Common Pilot Channel..............................................................................................7-3 7.4 The Synchronisation Channels .........................................................................................7-4 7.5 Broadcast Channel and Primary Common Control Physical Channel..............................7-5 7.6 The Paging Channel and Paging Indication Channel.......................................................7-7 7.7 Mobility control in Idle mode ........................................................................................7-10 8 Initial access of the mobile station to the network................................................................8-1 8.1 General ..............................................................................................................................8-1 8.2 Physical Random Access Procedure .................................................................................8-2 8.3 MAC random access procedure ........................................................................................8-7 8.4 Usage of the RACH for other purposes ............................................................................8-9 8.5 The Forward Access Channel ...........................................................................................8-9 8.6 UE states in Connected Mode.........................................................................................8-10 9 Establishment of user-specific control and traffic channels ...............................................9-1 9.1 General ..............................................................................................................................9-1 9.2 Principles of transport channel handling on Layer 1 ........................................................9-2 9.3 Format of Downlink Dedicated Physical Channels ..........................................................9-3 9.4 Format of Uplink Dedicated Physical Channels ...............................................................9-6 9.5 Coding, Rate Adaptation, Multiplexing............................................................................9-8 9.6 Modulation and spreading...............................................................................................9-14 9.7 Compressed transmission mode......................................................................................9-18 10 Support of packet-switched services...................................................................................10-1 10.1 10.2 10.3 10.4 10.5 10.6 10.7 10.8 10.9 11.1 11.2 12.1 General network and protocol architecture aspects ....................................................10-1 Common Packet Channel CPCH.................................................................................10-4 Downlink Shared Channel (DSCH) ............................................................................10-8 Packet transmission on RACH/FACH ......................................................................10-11 Packet transmission on CPCH/FACH.......................................................................10-12 Packet transmission on dedicated channels DCH/DCH ...........................................10-12 Packet transmission on dedicated and shared channels ............................................10-14 Transport channel switching .....................................................................................10-14 Dynamic Resource allocation control .......................................................................10-16 Speech transmission using the Adaptive Multirate (AMR) Codec.............................11-1 Data transmission for real-time data services .............................................................11-4 Initial deployment of UMTS.......................................................................................12-1

11 Support of circuit-switched services ..................................................................................11-1

12 Deployment and future development of IMT-2000/UMTS................................................12-1

3rd Generation Mobile Communication Systems

Page 0-7

Version 1.12 01.08.2000

12.2

Service development ...................................................................................................12-2 Virtual Home Environment (VHE).....................................................................12-3 Customized Applications for Mobile Network Enhanced Logic (CAMEL): .....12-4 Mobile Station Application Execution Environment (MExE)............................12-5 SIM/USIM Application Toolkit (SAT/USAT) ...................................................12-6

12.2.1 12.2.2 12.2.3 12.2.4 12.3 Annex A

Further development of UMTS...................................................................................12-6

Definitions....................................................................................................................................A-1 Abbreviations ...............................................................................................................................A-4

3rd Generation Mobile Communication Systems

Page 1-1

Version 1.12 01.08.2000

1 Introduction
1.1 The cellular concept
Mobile (radio) communication is understood as exchange of information between two or more users of which at least one user equipment is not located at a fixed position and may be moving around. In cellular systems, radio communication takes place between a mobile station (MS) and a fixed station which is referred to as radio base station (RBS). Normally, in a cellular system, there is no direct communication between two mobile stations (there may be however extensions to cellular systems which allow also direct communication between MSs). The geographic area in which a mobile station is able to exchange radio signals with a radio base station is called a (radio) cell. A cellular system consists of set of (possibly overlapping) cells where each cell is served by one radio base station. At one (antenna) site (“Standort”) several radio base stations may be co-located. By using sector antennas it is possible to establish several cells from a single site (see Figure 1). The transmission direction from an MS to a RBS is denoted as uplink (sometimes also referred to as reverse link). The transmission direction from an RBS to an MS is denoted as downlink (sometimes also referred to as forward link).

downlink uplink

Omni-directional RBS antennas

120-degree sector RBS antennas

Figure 1: Cellular radio communication systems

3rd Generation Mobile Communication Systems

Page 1-2

Version 1.12 01.08.2000

1.2 Historical development of mobile communication systems
1.2.1 First-generation systems
The first mobile cellular radio systems are based on analog transmission technology (at later stage employing digital signalling) and were designed for support of telephone speech service. 1946 1979 1981 1983 1985 First mobile telephone service in the USA introduced by AT&T (single-cell, manual operation) Pre-commercial operation of Advanced Mobile Phone System (AMPS) in US, MCS-L1 introduced in Japan by NTT (AMPS based, 25 kHz channels) Commercial operation of NMT450 (Saudi Arabia and Sweden) First commercial operation of AMPS (Chicago) System C450 in commercial operation in Germany TACS system (AMPS based) in commercial operation in UK

1.2.2

Second-generation systems

With the second-generation systems digital radio technology was introduced. Initially designed for circuit switched services such as telephone speech and low rate data. Further evolutions of second generation systems also support packet transmission with low-to-medium peak bit rate, e.g. General Packet Radio Service as supplement to GSM circuit switched services. 1982 1988 1992 1993 1994 1994 1995 1995 GSM development started by “Group Speciale Mobile” ETSI formed in Europe MCS-L2 introduced in Japan (12.5 kHz channels) All major European operators start commercial operation of GSM networks First DSC1800 system in commercial operation in UK Commercial operation of D-AMPS (IS-54) in US started Commercial operation of PDC in Japan started by NTT Commercial operation of N-CDMA system (IS-95) in Hong Kong/Korea PCS1900 (D-AMPS in 1900 MHz band, IS-136)

3rd Generation Mobile Communication Systems

Page 1-3

Version 1.12 01.08.2000

1.2.3

Third-generation systems

The future third-generation systems shall be distinguished from the second generation primarily in terms of the services offered to the users. Third-generation systems shall provide high-speed transmission rates and more efficient support of packet services. Spectrum-efficient high-speed data transmission has become feasible due to the advances in digital technology, both with respect to signal processing algorithms and integrated circuit technology. Discussion of a potential successor system for GSM started in ETSI and other standard developing organizations already in the late 1980, even before any second-generation system was in commercial operation. The ETSI-term for the future system was Universal Mobile Telecommunications System (UMTS). Simultaneously, the International Telecommunication (ITU) also started discussions on a potential future mobile system initially referred to as Future Public Land Mobile System (FPLMTS) and started to specify a set of system requirements. Due to the huge world-wide success of GSM, the interest among European network operators and manufacturers to consider a completely new system was rather low until to the mid 1990s. Only after the ITU has taken the initiative to formulate a concrete roadmap towards a new mobile system to be deployed in the early 2000s, the specification activities for UMTS in ETSI were ramped up in 1995. Some pressure on ITU to speed-up 3G activities mainly came from Japanese operators and manufacturers, when it was predicted that the Japanese 2G-system PDC will soon reach its capacity limits. In contrast to the GSM community, in Japan there was only very little interest in a further evolution of PDC due to its small share of the international market. The ITU term for the future 3G system was later changed to IMT-2000, International Telecommunications System for the 2000s. As part of the roadmap, a deadline for submission of proposals for IMT-2000 by the regional standardization development organizations was agreed to be in July 1998. In Europe, research studies on candidate radio technologies for 3G systems started around 1989 with funding by the Commission of European Communities (CEC) in the RACE Mobile project line. From 1991 – 1995 two CEC funded research projects called Code Division Testbed (CODIT) and Advanced Time Division Multiple Access (ATDMA) were carried out by the major European telecom manufacturers and network operators. The CODIT and ATDMA projects investigated the suitability of wideband Code Division Multiple Access (CDMA) and Time Division Multiple Access (TDMA) based radio access technology for 3G systems. This work was later continued in the FRAMES (Future Radio Wideband Multiple Access System) project and became the basis of the further ETSI UMTS work until decisions were taken in 1998. In January 1998 ETSI selected two radio transmission technologies (from originally 4 different proposals) for UMTS terrestrial radio access (UTRA), referred to as UTRA FDD and UTRA TDD, which were submitted to ITU as candidates for IMT-2000. The terrestrial radio transmission technologies proposed to ITU in July 1998 are listed in Table 1. The proposals included a number of different Wideband CDMA (WCDMA) based radio access technologies, from ETSI, TTC/ARIB (Japan), TTA (Korea), ANSI T1 (USA) and TIA (USA), which can be grouped into two types. The one type of proposals requires synchronized base stations and is building up on the IS-95 2G radio transmission technology. The other group of concepts does not rely on base station synchronization (there are however also cases were it is also needed). By the end of 1998 two specification development projects were founded by the regional standardization organizations, 3GPP (3rd Generation Partnership Project) and 3GPP2. The goal of

3rd Generation Mobile Communication Systems

Page 1-4

Version 1.12 01.08.2000

both 3GPP and 3GPP2 was to merge a number of the W-CDMA based proposals into a single one, see Table 1. 3GPP2 was concerned with the IS-95 based systems. The split of standardization activities into two camps was partly caused by a dispute on Intellectual Property Rights (IPR) on W-CDMA technology between various telecom manufacturers. After these IPR issues were resolved in mid 1999, the members of 3GPP and 3GPP2 agreed on a harmonized global IMT-2000 CDMA proposal. This agreement then paved the way for a harmonized overall concept of a ITU IMT-2000 family of 3G systems as shown in Figure 2. The IMT-2000 family of 3G systems includes • Three types of Core Network technology: • • • • • • • • • GSM based (using Mobile Application Part (MAP) protocols on top of SS7 protocols for signalling) ANSI-41 based (IS-634 protocols for signalling) Internet Protocol based (in future, to be specified) UTRA FDD (W-CDMA) UTRA TDD (W-CDMA combined with TDMA) cdma2000-MC (N-CDMA with multiple carriers on downlink, W-CDMA uplink) UWC-136 (TDMA, TDD and FDD modes) DECT (TDMA, TDD); an extension to today’s DECT technology to enable the support of 3G services in wireless phones

Five types of Radio Access Network technologies

3rd Generation Mobile Communication Systems

Page 1-5

Version 1.12 01.08.2000

Table 1: Terrestrial radio transmission technologies proposed to ITU July 1998 Proposal UTRA W-CDMA CDMA II WIMS W-CDMA Description UMTS Terrestrial Radio Access Wideband-CDMA Asynchronous WCDMA Wireless Multimedia and Messaging services W-CDMA North-American Wideband CDMA Time-Division synchronous CDMA Wideband CDMA based on IS-95 Multiband synchronous DSCDMA Universal Wireless Communications based on IS-136 (Extended) Digital Enhanced Cordless Telecommunications Universal Wireless Communications Committee, TIA TR 45.3 (USA) ETSI-DECT (Europe) Source ETSI-SMG (Europe) TTC/ARIB (Japan) TTA (Korea) TIA TR 46.1 (USA) Merged by 3GPP “UTRA”

NA W-CDMA TD-SCDMA cdma2000 CDMA I

ANSI T1P1 (USA) CATT (China) TIA TR 45.5 (USA) Merged by 3GPP2 “cdma2000”

UWC-136

DECT

3rd Generation Mobile Communication Systems

Page 1-6

Version 1.12 01.08.2000

IMT-2000 Core Network Technologies ITU-T

Network-to-Network Interfaces (3G Inter Family Roaming) GSM (MAP) UMTS ANSI-41 (IS-634) Future IP-based Networks

Flexible connection between radio access and core networks

(Direct Spread) IMT-2000 Radio Access Technologies UTRA FDD (WCDMA) ITU-R

IMT-DS

(Time Code)

IMT-TC

(Multi Carrier)

IMT-MC

(Single Carrier)

IMT-SC

(Freq. Time)

IMT-FT DECT
ETSI

UTRA TDD (TD-CDMA)
3GPP

cdma2000
3GPP2

UWC-136 (EDGE)
UWCC/ETSI

3GPP

Figure 2: ITU IMT-2000 family of 3G systems

1.3 Overview on IMT-2000 radio access technologies
The frequency bands allocated for initial operation of IMT-2000/UMTS systems is shown in Figure 3. In Europe there is one paired frequency band in the range 1920 –1980 MHz and 2110 – 2170 MHz to be used for UTRA FDD and there are two unpaired bands from 1900 –1920 MHz and 2010 – 2025 MHz intended for operation of UTRA TDD. In the USA 3G systems shall initially be operated in the PCS band which is already partly used for 2G systems. MSS refers to spectrum reserved for 3G mobile satellite systems (1980 - 2010 MHz and 2170 – 2200 MHz). The PCS band in the USA was already divided into chunks of 5 MHz and mostly sold in form of 2×5 MHz paired band to PSC network operators before any 3G systems were proposed. This situation in the USA has imposed the requirement that it must be possible to operate a 3G system within a 2 × 5 MHz paired frequency band. Operation of the 3G system must even be possible when a different standard possibly working at a different power level is installed in the immediate neighboring bands without any additional guard band between these neighboring bands The UMTS band in Europe is therefore divided into twelve 5 MHz paired frequency slots, suitable for UTRA FDD, and four plus three 5 MHz unpaired frequency slots suitable for UTRA TDD mode. In Germany the UMTS spectrum will be auctioned starting in July 2000. One operator is allowed to acquire at least two, at most three paired bands. Therefore there will be initially between 4 and 6 UMTS operators in Germany. Those operators who will receive a license for the paired band in the first round of the auction, are permitted to participate in a second round where the unpaired band will be auctioned. In May 2000 further frequency bands for UMTS/IMT-2000 was identified by the ITU World Radio Conference (WRC-2000). These bands (more than 160 MHz additional spectrum) shall ensure future extension of UMTS. Todays estimations expect world wide 2 Billion mobile

3rd Generation Mobile Communication Systems

Page 1-7

Version 1.12 01.08.2000

subscribers in the year 2010. At that time it is expected that 3G systems will carry about 66% of the mobile radio traffic.
MSS Reg.2

ITU-R Rec.

IMT-2000

MSS

IMT-2000

MSS Reg.2

MSS

DECT

UMTS TDD

UMTS

Europe

GSM 1800

UMTS

MSS

UMTS

MSS

uplink

downlink
IMT-2000 MSS

Japan

PHS

IMT-2000 MSS

uplink

downlink
MSS MSS

USA
1800 1850

PCS 1900 1950

2000

2050

2100

2150

2200

2250

Frequency in MHz

Figure 3: Spectrum assigned to operation of 3G systems

Figure 4 – Figure 7 show the main characteristics of UTRA FDD, UTRA TDD, cdma2000-MC and UWC-136. Details of these radio transmission technologies will be described in later sections. The main time and spectral characteristics of the UTRA FDD mode are shown in Figure 4. The time signal structured into radio frames of 10 ms duration. A frame is divided into 15 time slots. These time slots are only used to organize the data in form of a periodic structure. For instance the bits in the beginning of a slot may have a special meaning. In FDD mode each time slot can be used continuously by one user, i.e. the slots are not used for time division multiple access. The signals from different users are distinguished by using different spreading codes, i.e. the Code division Multiple Access (CDMA) method is employed (see Sec. 4.1). An important characteristic of the FDD mode is that each base station and each user can transmit its signals independent of the timing of transmissions of other base stations and users. No global base station synchronization required. A radio frame is divided into 38400 chip intervals. This results in a chip rate of 3.84 Mcps. In a frame 15×10×2k bits can be transmitted in every slot, where k is an integer. This signal fits into a 5 MHz band. Different bands are used to operate uplink and downlink. At a carrier spacing of 5 MHz it is possible to operate adjacent frequency channels at a different power level to establish different layers of cells with different size, e.g. micro-cell layer with low transmit power, and macro-cell layer at high power level. Macro-cells have a cell radius in the order of 2 – 20 km, micro-cells in the order of a few hundred meters to about 2 km, and even smaller cells are referred to as pico-cells (normally used in indoor systems). Details of the UTRA FDD mode will be presented in other sections.

3rd Generation Mobile Communication Systems

Page 1-8

Version 1.12 01.08.2000

1 radio frame, 10 ms, 150 * 2k bits, 38400 chips (3.84 Mcps) Slot 1 Slot 2 Slot i Slot 15
time

Uplink
Macrocell layer Microcell layer

Downlink
frequency

5 MHz

5 MHz Duplex distance, e.g. 190 MHz

5 MHz

5 MHz

Figure 4: Main characteristics of UTRA FDD The main time and spectral characteristics of the UTRA TDD mode are shown in Figure 5. As in FDD, the time signal is structured into radio frames of 10 ms duration, and a frame is divided into 15 time slots. However in UTRA TDD each time slot can be allocated to a different user, i.e. there is time division multiple access (TDMA) applied (see Sec. 4.1). In addition, the slot structure is used to distinguish between transmission directions. Any slot in a frame can either be used in the uplink or in the downlink direction. Figure 5 shows one specific configuration example where only a single switching point between uplink and downlink direction is used. In every frame the same uplink/downlink switching is applied. A radio frame is as in FDD nominally divided into 38400 chip intervals. This results in the same chip rate of 3.84 Mcps as in FDD. However, due to the time division multiple access scheme, every user must ensure that his transmit signal arrives at the base station without overlapping into a slot allocated to another user and/or for the downlink direction, since this may create excessive interference. This means that the effective transmission time that can be utilized in each slot is by some guard space smaller than the nominal length of the time slot. In TDD a guard space of 96 chip intervals is used. Each user needs to control the timing of transmissions such that the signal burst arrives within his slot boundaries at the base station. Such a method that compensates the transmission delay is referred to as timing advance. In the TDD mode in each time slot also code division multiple access (CDMA) is employed, i.e. TDD employs a hybrid TDMA/CDMA radio access technology. The maximum spreading factor is 16 chips per symbol and up to 16 different CDMA channels can then be established in each TDMA slot. For synchronization purposes each signal burst includes a special training chip sequence in the middle referred to as midamble. There are midambles of different lengths defined which can be used for adaptation to different transmission environments. The number of information bits that can be transmitted per burst depends on the length of the midamble and the employed spreading factor. When TDD is employed in adjacent cells, the switching points between uplink and downlink transmissions need to be synchronized between different base stations. Otherwise too much interference would be created at cell boundaries to operate such a system reliably. This means that the clocks in base stations which control the slot structure must be synchronized with each other, i.e. base station synchronization is required in UTRA TDD based cellular systems. Details of the UTRA TDD mode will be presented in other sections.

3rd Generation Mobile Communication Systems

Page 1-9

Version 1.12 01.08.2000

1 radio frame, 10 ms,15×2560 chips, 38400 chips (3.84 Mcps) Uplink Slot 1 Slot 2 Slot i
time

Downlink
Microcell layer

Slot i+1
Picocell layer frequency

Slot 15

time

5 MHz

5 MHz

Figure 5: Main characteristics of UTRA TDD Figure 6 illustrates the time and spectral characteristics of the cdma-2000-MC mode of IMT2000. This scheme is an extension of the narrowband CDMA system IS-95 standardized in the USA. The term “MC” refers to multi-carrier. It means that on the downlink three carriers of the IS-95 system can be combined to be used for data transmission to one mobile. In the uplink it is possible to perform direct spreading onto a chip rate of 3.6864 Mcps which is three times the chip rate of the IS-95 system (i.e. 3 × 1.2288 Mcps). On the downlink the multi-carrier principle is employed because there are orthogonal codes employed. It would not be possible to employ direct spreading onto 3.6864 Mcps while maintaining orthogonality between the wideband and narrowband signals after modulation into the frequency band. On the uplink, orthogonality is not intended anyway between different user signal (due to the involved high complexity). Therefore it is possible to mix narrowband carriers with wideband carriers in one band without compromising performance. The time structure in cdma-2000-MC is on the downlink identical with the one used for IS-95. A radio frame is divided into time slots of 1.25 ms duration. From eight time slots a radio frame of 10 ms length can be built. It is however also possible to define 5 and 20 ms time intervals as frame length, with 4 and 16 slots, respectively. In the wideband mode on the uplink simply three times the chip rate is employed on the same frame and slot structure, enabling three times higher rate at the same spreading factor as in the narrowband mode. The slot structure is not used for TDMA. However due to the spreading code generation mechanism specified for this system all base stations require a common clock. Therefore cdma2000-MC requires tight (chip-level) synchronization between all base stations. This is done by using the Global Positioning System (GPS) time as reference.

3rd Generation Mobile Communication Systems

Page 1-10

Version 1.12 01.08.2000

1 radio frame, 10 ms, uplink: 36864 chips (3.6864 Mcps) downlink: 12288 chips (1.2288 Mcps) Slot 1 Slot 2 Slot i Slot 8
time

Uplink
Macrocell layer Microcell layer (or other operator)

Downlink
frequency

1.25 MHz

3.75 MHz

5 MHz Duplex distance, e.g. 80 MHz

3.75 MHz

5 MHz

Figure 6: Main characteristics of cdma-2000-MC Figure 7 shows time format and spectral characteristics of UWC-136 which is also part of the IMT-2000 family of 3G standards. UWC-136 is an evolution of the IS-136 standard, the PCS band variant of the US TDMA (D-AMPS) standard. Note that IS-136 is a narrowband TDMA system that uses 30 kHz carriers and 3 TDMA slots per carrier. UWC-136 extends IS-136 with three new modes: • • • TDMA/FDD mode with 200 kHz channel bandwidth which is equivalent with GSM-EDGE (“Enhanced Data Rate for GSM Evolution”), TDMA/FDD mode with 1.6 MHz channel bandwidth (paired spectrum), TDMA/TDD mode with 1.6 MHz channel bandwidth (unpaired spectrum).

In the 200 kHz mode the same slot structure as in GSM is employed, i.e. 4.615 ms TDMA frames divided into 8 slots. Higher-level modulation schemes are used for support of higher bit rates, i.e. 16QAM as in GSM-EDGE. Furthermore one user may combine up to all eight slots for his own transmissions. Link adaptation techniques for the maximization of user transmission speed are employed, i.e. switching between modulation schemes in dependence of the momentary channel conditions. The 1.6 MHz mode employs 64 slots per frame which yields with the same modulation schemes to 8 times the bandwidth of the 200 Hz mode. This mode is primarily intended for indoor systems and to support very high rates up to 2 Mbps. There is also a TDD variant of the 64 slot/1.6 MHz scheme where the slots are divided between uplink and downlink transmission directions. In a given 5 MHz frequency band three 1.6 MHz channels could be established, enabling deployment of a system with frequency reuse 3.

3rd Generation Mobile Communication Systems

Page 1-11

Version 1.12 01.08.2000

1 TDMA frame, 4.615 ms, outdoor mode: N = 8 slots (200 KHz) indoor mode: N = 64 slots (1.6 MHz)
time

Slot 1 Slot 2 FDD Uplink

Slot i TDD band

Slot i+1

Slot N FDD Downlink

frequency 200 kHz carriers 1.6 MHz

5 MHz

5 MHz

5 MHz

FDD duplex distance, e.g. 80 MHz

Figure 7: Main characteristics of UWC-136

1.4 UMTS specification series
The 3GPP UMTS Technical Specifications (TS) and Technical Reports (TR) are numbered with a 2+3 digits number. The first two digits refer to a series number (21 … 33), which is separated from the other part by a dot. For instance, TS 21.101 is a 21-series UMTS specification. TS 21.101 provides the overall list of 3GPP specifications and explains the systematic of document numbering as partly recapped below. Note: Specifications and Reports are version numbered Version x.y.z. The specifications and reports of UMTS Release 1999 have a major version number 3 (e.g. 3.x.y). Release 1999 Technical Specifications and Technical Reports were functionally frozen in December 1999. Corrective changes however will be introduced into the Release 1999 version 3.x.y specifications throughout the year 2000. 21-series: Requirements specifications These specifications are often transient and contain requirements leading to other specifications. They may become obsolete when technical solutions have been fully specified; they could then, e.g., be replaced by reports describing the performance of the system, they could be deleted without replacement or be kept for historical reasons but turned into background material. When found necessary and appropriate, the transient or permanent nature of a requirement specification may be expressed in its scope. 22-series: Service aspects Specifications in this series specify services, service features, building blocks or platforms for services (a service feature or service building block may provide certain generic functionality for the composition of a service, including the control by the user; a platform may comprise a single or more network elements, e.g. UIM, mobile terminal, auxiliary system to the core network etc.);

3rd Generation Mobile Communication Systems

Page 1-12

Version 1.12 01.08.2000

stage 1 specifications that are felt appropriate belong to this series; reports defining services which can be realized by generic building blocks etc. also belong to this series. 23-series: Technical realization This series mainly contains stage 2 specifications (or specifications of a similar nature describing interworking over several interfaces, the behaviour in unexceptional cases, etc.). 24-series: Signalling protocols (UE - CN network) This series contains the detailed and bit-exact stage 3 specifications of protocols between MS/UE and the Core Network. 25-series: UTRA aspects 25.100-series: UTRA radio performance aspects 25.200-series: UTRA radio aspects, (physical) layer 1 25.300-series: UTRA radio interface architecture, layer 2 and layer 3 (RRC) aspects 25.400-series: UTRA network aspects, transport interfaces in UTRAN (Iub, Iur and Iu) 26-series: Codecs (speech, video, etc.) This series defines speech codecs and other codecs (video etc.). 27-series: Data This series defines the functions necessary to support data applications. 28-series Reserved for future use. 29-series: Signalling protocols (NSS) This series contains the detailed and bit-exact stage 3 specifications of protocols within the Core Network. 30-series: Programme management This series contains the 3GPP 3rd Generation Mobile System, project plans / project work programme and stand-alone documents for major work items. 31-series: UIM This series specifies the User Identity Module (UIM) and the interfaces between UIM and other entities. 32-series: Operation and maintenance This series defines the application of TMN for the 3GPP 3rd Generation Mobile System and other functions for operation, administration and maintenance of a 3rd Generation Mobile System network. 33-series: Security aspects This series contains specifications of security functions. 34-series: Test specifications This series contains test specifications. 35-series: Algorithms This series contains the specifications of encryption algorithms for confidentiality and authentication, etc. These specifications are not available to the public.

3rd Generation Mobile Communication Systems

Page 1-13

Version 1.12 01.08.2000

References
[1.1] [1.2] [1.3] [1.4] Wolfgang Koch, “Grundlagen der Mobilkommunikation”, Skript zur Vorlesung WS 99/00 J. Meurling, R. Jeans, “The mobile phone book”, published by CommunicationsWeek International for Ericsson Radio Systems AB, 1994, ISBN 0 9524031 0 2. A.D. Kucar, “Mobile Radio: An Overview”, IEEE Communications Magazine”, Nov. 1991, pp.72-85. 3GPP TS 21.101, “3rd Generation mobile system Release 1999 Specifications”, March 2000.

3rd Generation Mobile Communication Systems

Page 2-1

Version 1.12 01.08.2000

2 UMTS Architecture
2.1 Services and Service Architecture
2.1.1 Definitions and categorization of services
In telecommunications terminology, the term “basic telecommunication service” is used to generally refer to the functions offered by a network operator to its customers. Basic telecommunication services are divided into two broad categories, Bearer services and Teleservices which are defined as follows. Bearer services: the telecommunication services providing the capability of transmission of signals between access points. Teleservices: telecommunication services providing the complete capability, including terminal equipment functions, for communication between users according to protocols established by agreement between network operators. The communication link between the access points for bearer services may consist of PLMN, one or more transit networks and a terminating network. The various networks between the two access points typically use different means for bearer control. Figure 1 illustrates these definitions. In cellular telecommunications systems, the mobile equipment of a user, e.g. a mobile phone, is often denoted as Mobile Station (MS). This term is also used in GSM terminology. In UMTS terminology the term User Equipment (UE) is used instead of Mobile Station. A UE is functionally divided into a Mobile termination (MT), a Terminal Adaptation Function (TAF), and a Terminal equipment (TE). This functional split allows to regard a certain part of the UE as functionally equivalent to a TE connected to the terminating network (e.g. an ordinary telephone), whereas the MT part includes all PLMN dependent functions (i.e. the radio interface protocols, see Sec. 0) needed to make telecommunication services accessible to mobile users.
Teleservices Bearer services possible transit network Terminating network

TE

TAF UE

MT

PLMN

TE

UE: User Equipment MT: Mobile Termination TE: Terminal Equipment TAF: Teminal Adaption Function PLMN: Public Land Mobile Network

Figure 8: Relation between Teleservices and Bearer services [22.105]

3rd Generation Mobile Communication Systems

Page 2-2

Version 1.12 01.08.2000

Physically a UE is comprised of Mobile Equipment (ME) and a Universal Subscriber Identity Module (USIM). USIM refers to an UMTS Integrated Circuit Card (UICC) with application software and subscriber data on it. In the simplest case, a UE is a UMTS mobile phone with a USIM inserted. A UE can also be a mobile phone (with USIM) connected to e.g. a notebook computer. In this case the notebook can be regarded as the terminal equipment. The mobile phone includes the mobile termination. The interface between mobile phone and the notebook together with necessary software comprise the TAF. The terminal equipment includes the actual Application (which refers here to all protocol layers above the Network layer, see Sec. 2.3). The notion of teleservice therefore is closely related to the end-to-end applications. In contrast, bearer services are plain data transmission services, which however may be also be categorized according to their capability to support special classes of end-to-end services or applications.

2.1.2

Teleservices and supplementary services

A basic requirement defined for UMTS is that it needs to support all GSM teleservices, e.g. speech, emergency call and short message service (SMS). Below, the most important teleservices and supplementary services are listed and described briefly. A number of these services are already provided in GSM and will be also provided by UMTS. Note that the discussion on services and service categorization is still ongoing in the standardization bodies. Some of the services defined below may be regarded as outdated already today since they can easily be implemented based on Internet technology. All internet services such as email, file transfer, Web browsing, Voice over IP, etc. of course will also be supported by UMTS although some of them are not clearly visible below. 2.1.2.1 Telephony

Speech: Telephone speech service will in UMTS be supported by employing the Adaptive MultiRate (AMR) speech codec. This Codec is compatible with the speech codecs presently used in GSM systems and it will also be introduced in GSM in the near future. It shall operate with no discernible loss of speech on handover between the GSM access network and the UTRAN. Emergency Call: UMTS Release ‘99 shall support an emergency call teleservice. This is just a special case of normal speech service. It requires to work even without USIM included in the UE. Teleconferencing: Teleconferencing provides the ability for several parties to be engaged in a speech communication. This service can be established with ordinary telephone service in combination with supplementary service, allowing the user to establish multiparty calls. Voice-band-data: Support of modems supporting user rates of 14.4 kbps or more. 2.1.2.2 Sound and Videotelephony

Wideband-speech: Speech service or radio sound at 0 –7 kHz bandwidth (future UMTS release) High-Quality Audio: Audio service with Compact Disk quality (future UMTS release) Video telephone: Ability for two-way speech and image communications. Video Conference: Ability for multi-party speech and image communications. Video Surveillance/Monitoring: Provides the transmission of image and sound in one direction.

3rd Generation Mobile Communication Systems

Page 2-3

Version 1.12 01.08.2000

2.1.2.3

Teleaction services:

Telemetrie services: Services for e.g. remote control, remote terminal, credit authorisation requiring low bit rate per transaction but possibly fast response time. 2.1.2.4 Message handling services Short Message Service: A means for sending messages of limited size to and from mobile terminals which makes use of a Service Center which acts as store and forward center for short messages (supported by GSM and UMTS release 99). Voice Mail: Voice mail enables calling users to record a voice message against the called user’s identity under a variety of conditions (e.g. called user busy, not answering, not reachable) (supported by GSM and UMTS release 99). Electronic mail: In their simplest form electronic mail service provide the ability to transfer textual messages between users via a variety of intervening networks. Electronic mail systems may also provide format conversion enabling text and data to be converted from one format into another, including media conversion, e.g. mail send as text but received as voice. 2.1.2.5 Facsimile service Store-and-Forward telefax: A service, where a file or message transfer program is used to transfer text or images from a mobile terminal to a store and forward unit for subsequent delivery to the facsimile machine in the PSTN/ISDN. The user (or the user's PC) may receive notification of successful delivery of the fax. Fax messages from PSTN/ISDN to mobile terminals are stored in a store-and-forward unit (service center). The user retrieves the fax message with a file or message transfer program from the store-and-forward unit. The mobile terminal may be notified that a fax message is available. Note that this service also belongs to the category of message handling services (supported by GSM and UMTS release 99). End-to-End telefax: A fax service using an end-to-end fax session between a PSTN/ISDN fax machine and a mobile terminal. This service shall work end-to-end such that a sender on the PSTN is aware of whether or not the fax has succeeded, and such that a mobile sender is aware of whether or not the fax has succeeded. From the user perspective the end-to-end fax service must look and feel like a T.30 based fax service. The end-to-end service may work with ordinary T.30 based fax machines at the mobile end using a mobile fax adapter with a modem that terminates the analogue 2-wire connection from the fax machine (supported by GSM and UMTS release 99). 2.1.2.6 Broadcast Services

(Message) Cell Broadcast Service (CBS): Provides transmission of a message to all users within a specified geographic area which have a subscription to this service. Multicast service: A data broadcast service for a specified group of users within a specified geographic area. 2.1.2.7 Supplementary Services:

Supplementary services modify or supplement a basic telecommunication service. Consequently, it cannot be offered to a customer as a standalone service. It must be offered together with or in association with a basic telecommunication service. UMTS will support GSM Release '99 supplementary services and many further extensions. Below, some examples of supplementary services are listed:

3rd Generation Mobile Communication Systems

Page 2-4

Version 1.12 01.08.2000

- call barring, - call forwarding, - call hold, - conference calling, - incall modification (dialling), - handling of closed user groups, - credit card calling. 2.1.2.8 Multimedia Services

UMTS shall support multimedia services and provide the necessary capabilities. Multimedia services combine two or more media components (e.g. voice, audio, data, video, pictures) within one call. A multimedia service may involve several parties and connections (different parties may provide different media components) and therefore flexibility is required in order to add and delete both resources and parties. Multimedia services are typically classified as interactive or distribution services. Interactive services are typically subdivided into conversational, messaging and retrieval services: Conversational services: are real time (no store and forward), usually bi-directional where low end to end delays (< 100 ms) and a high degree of synchronisation between media components (implying low delay variation) are required. Video telephony and video conferencing are typical conversational services". Messaging services: offer user to user communication via store and forward units (mailbox or message handling devices). Messaging services might typically provide combined voice and text, audio and high resolution images. Retrieval services: enable a user to retrieve information stored in one or many information center. The start at which an information sequence is sent by an information center to the user is under control of the user. Each information center accessed may provide a different media component, e.g. high resolution images, audio and general archival information. Distribution services are typically subdivided into those providing user presentation control and those without user presentation control. Distribution services without user control: are broadcast services where information is supplied by a central source and where the user can access the flow of information without any ability to control the start or order of presentation e.g. television or audio broadcast services. Distribution services with user control: are broadcast services where information is broadcast as a repetitive sequence and the ability to access sequence numbering allocated to frames of information enables the user (or the user’s terminal) to control the start and order of presentation of information. 3GPP specifications shall support single media services (e.g. telephony) and multimedia services (e.g. video telephony). All calls shall have potential to become multimedia calls and there shall be no need to signal, in advance, any requirement for any number of multimedia components. However, it shall be possible to reserve resources in advance to enable all required media components to be available.

3rd Generation Mobile Communication Systems

Page 2-5

Version 1.12 01.08.2000

2.1.3

Bearer services

Circuit switched data: Circuit switched data services and "real time" data services shall be provided for interworking with the PSTN/ISDN so that the user is unaware of the access network used (UMTS and GSM access network or handover between access networks). Both transparent (constant delay) and non-transparent (zero error with flow control) services shall be supported. These data services shall operate with minimum loss of data on handover between the GSM access network and the UTRAN. Packet switched data: Packet switched data services shall be provided for interworking with packet networks such as IP-networks and LANs. The standard shall provide mechanisms which ensure the continuity of packet based services upon handover e.g. between GSM and UMTS.

2.1.4

QoS Architecture

Network Services are considered end-to-end, from a Terminal Equipment (TE) to another TE. An End-to-End Service may have a certain Quality of Service (QoS) which is provided for the user of a network service. It is the user that decides whether he is satisfied with the provided QoS or not. To realise a certain network QoS a Bearer Service with clearly defined characteristics and functionality is to be set up from the source to the destination of a service. A bearer service includes all aspects to enable the provision of a contracted QoS. These aspects are among others the control signalling, user plane transport and QoS management functionality. A UMTS bearer service layered architecture is depicted in Figure 9. The following QoS classes are currently defined (also denoted as traffic classes):
-

Conversational class, Streaming class,

- Interactive class, and - Background class. The main distinguishing factor between these classes is how delay sensitive the traffic is (background class least sensitive to delay). Quality of service is defined by a set of parameters (QoS parameters) that is specified for a bearer service. These parameters include (among others): Traffic class Maximum bit rate Guaranteed bit rate Delivery order Data unit size Data unit error ratio Transfer delay Traffic handling priority.

It is regarded as a main feature of 3G systems that QoS parameters can be negotiated between the network that provides the respective bearer services (e.g. UTRAN) and the service requester (e.g Core Network).

3rd Generation Mobile Communication Systems

Page 2-6

Version 1.12 01.08.2000

UMTS TE MT UTRAN CN Iu EDGE NODE CN Gateway TE

End-to-End Service

TE/MT Local Bearer Service

UMTS Bearer Service

External Bearer Service

Radio Access Bearer Service

CN Bearer Service

Radio Bearer Service

Iu Bearer Service

Backbone Bearer Service

UTRA FDD/TDD Service

Physical Bearer Service

Figure 9: UMTS Quality of Service Architecture

2.2 Network Architecture
2.2.1 Review of the GSM Network architecture
A GSM network (infrastructure domain) as shown in Figure 10, is divided into two domains, the Core Network (CN) domain and the Radio Access Network (RAN) domain. The CN is further divided into two domains, the Circuit Switched (CS) Core Network domain and the Packet Switched (PS) Core Network Domain. This has mainly historical reasons, since GSM was initially designed for support of CS domain services. Support of PS domain services was added in a later phase of GSM development (GSM phase 2+). It is denoted as General Packet Radio Service (GPRS) and currently being included by the network operators into their GSM systems.

3rd Generation Mobile Communication Systems

Page 2-7

Version 1.12 01.08.2000

N-ISDN/ PSTN

Packet switched networks (IP, X.25) GMSC GGSN GPRS backbone (IP)

Core Network Domain
MSC/ VLR

MSC/ VLR

GSM backbone

HLR

A Radio Access Network Domain BSC BTS BTS GSM BSS

Gb

SGSN

BSC BTS

BTS

Figure 10: Today’s GSM System Architecture The CS domain GSM Core Network consists of a number of network nodes referred to as Mobile Services Switching Centres (MSCs) which are inter-connected by circuit switched transmission lines, referred to as GSM backbone, today using Synchronous Transfer Mode (STM) technology for data transmission. A GSM backbone can be an independent network of transmission lines and Transit Switches, or it can be based completely or partly on leased lines of the public narrowband ISDN (N-ISDN) network. There are two types of mobile services switches, ordinary MSCs and Gateway MSCs (GMSCs). A GMSC is distinguished from an (ordinary) MSC by providing some additional functions needed to setup calls between GSM and external networks. For instance when a call is set up from an external network to GSM, the call is first routed to a GMSC without knowledge of the whereabouts of the mobile user. The GMSC then fetches the user-specific location information from a register (called Home Location Register, HLR) and routes the call to an MSC that can provide the service to the mobile user through a Radio Access Network. A HLR includes a record of all subscriber information relevant to the provision of telecommunication services. Typically a HLR is a standalone computer without switching capabilities, able to manage the data of hundreds of thousands of users/subscribers. A second data base function, called Visitors Location Register (VLR), contains the data of users within the serving area of an MSC, including the present location of the user on a more precise level than it is stored in the HLR. The PS domain GSM Core Network consists of Serving GPRS Support Nodes (SGSNs) and Gateway GPRS Support Nodes (GGSNs). SGSNs and GGSNs are connected through an Internet Protocol (IP) based backbone network. GGSNs provide the connectivity with external packet switched Networks, e.g. Internet and X.25-protocol based packet data networks. Signalling System No. 7 (SS7) protocols are used for exchange of control information between MSCs/GMSCs and HLR.

3rd Generation Mobile Communication Systems

Page 2-8

Version 1.12 01.08.2000

The GSM Radio Access Network consists of several Base Station Subsystems (BSS). A BSS consists of a Base Station Controller (BSC), which is connected to one specific MSC through an open (standardized) interface referred to as A-Interface, and a number of Base Transceiver Stations (BTSs, sometimes in short also referred to as Base Stations, BS, or Radio Base Stations, RBS). A BTS is the node that provides radio service for a single specified (radio) cell. If GPRS is supported, a BSC is also connected to a SGSN through the Gb-Interface.

2.2.2

UMTS network architecture

The strategy of introduction of UMTS services is to integrate UMTS Terrestrial Radio Access Networks (UTRAN) into existing GSM systems as illustrated in Figure 11. Initially UMTS services will likely be established in certain hot-spot areas like cities, airports, etc. UTRAN will be connected to the GSM core network domain through an open interface, denoted as Iu interface. Services which are already supported by GSM, can be provided by existing MSCs or GSNs, while newly introduced UMTS services will require upgraded Core Network Nodes (3G-MSCs, 3G-GSNs). The UMTS Iu interface employs Adaptive Transfer Mode (ATM) technology for data transport which enables efficient data transport of both circuit switched and packet switched services (see Sec. 2.4), whereas in todays GSM networks Synchronous Transfer Mode (STM) is applied. STM refers to classical circuit switched based transport networks as used today in ISDN.

N-ISDN/ PSTN

Packet switched networks (IP, X.25)

Core Network Domain

3GMSC

PLMN backbone

GSN

MSC

HLR

STM

ATM

Radio Access Network Domain

A
STM
GSM BSS

Gb

Iu
ATM
UTRAN (WCDMA)

User Equipment Domain

Figure 11: UMTS Architecture (first step of migration with GSM systems) The architecture of an UTRAN is shown in Figure 12. It consists of one or several Radio Network Systems (RNS) which corresponds to a BSS in GSM radio access networks. An RNS is comprised of a Radio Network Controller (RNC) which controls several Node B. The term Node B refers to a site where several radio base stations are co-located, with each such radio base station serving one cell. A Node Bs is connected to an RNC via the Iub Interface. There is also an interface between RNCs, referred to as Iur Interface. Such an interface does not exist in GSM access networks. In GSM, there is only a small amount of communication between different RNS entities needed which is handled through the Core Network but which requires radio access network dependent functions in the Core Network domain. As illustrated in Figure 12 a User

3rd Generation Mobile Communication Systems

Page 2-9

Version 1.12 01.08.2000

Equipment (UE) can simultaneously be served by multiple cells, i.e. it can be connected with multiple Node Bs. If a UE is connected to Node Bs of different RNS, the Iur interface is needed to exchange the data with the Serving RNC (S-RNC) which at a given time provides the connection with the Core Network via the Iu interface. As the Iu interface, ATM technology is employed also on the Iur and Iub interfaces (see Sec. 2.4).

Core Network Iu UTRAN RNS RNC Iur Iub Node B Iub Node B Iub Node B Iub Node B RNS RNC Iu

Uu

Figure 12: UTRAN architecture

3rd Generation Mobile Communication Systems

Page 2-10

Version 1.12 01.08.2000

2.3 General principles in protocol design
To reduce design complexity, most networks are organized as a series of layers (corresponding to different levels), where each layer is built upon the one below it. The purpose of each layer is to offer services to the higher layer, while hiding any details on how actually the service is implemented. Layer n on one network node performs conversation with layer n on another network node (referred to as peer-to-peer communication). The rules and conventions used in this conversation are denoted as a layer n protocol. A protocol is an agreement between communicating parties on how communication is to proceed. There is a recommendation by the International Standards Organization (ISO) on principles how to establish different layers. This recommendation is known as ISO-Open Systems Interconnection (OSI) Reference Model. This model defines 7 layers: • Layer 1: physical layer (lowest layer) Transmission of data over the physical medium, synchronization, forward error correction, modulation Layer 2: data link layer Setup of connections between network nodes, physical medium access control, flow control, error detection, retransmission Layer 3: network layer Setup of connections, routing of data trough the network; example: Internet Protocol (IP) Layer 4: transport layer End-to-end data transport, ensuring e.g. in-sequence delivery, error detection, end-to-end retransmission; example: Transmission Control Protocol (TCP) Layer 5: session layer Data transport with enhanced services, e.g. resume of data transfer after loss of a connection Layer 6: presentation layer Allows to introduce some encoding/decoding of application data Layer 7: application layer (highest layer) For example source encoder for speech application



• •

• • •

In most telecommunications systems layers 5 and 6 are not existent. They are regarded as part of the application layer. Layer 4 is usually only present in packet-switched networks such as the Internet. Figure 12 shows the ISO-OSI protocol stack. A layer n offers for instance data transport services to the higher layer, the served data unit is referred to as Service Data Unit (SDU). For instance layer 2 provides the capability to transfer L2-SDUs (= L3-PDUs) to its peer entity (layer 2 in another network node). The actual data units exchanged between protocols are referred to as Protocol Data Units (PDUs). A PDU consists of protocol control information included in a protocol header, and payload taken from the SDU. A PDU payload may contain one or more SDUs (concatenation of SDUs) or only a part of an SDU (segmentation of SDUs).

3rd Generation Mobile Communication Systems

Page 2-11

Version 1.12 01.08.2000

Layer 7 6 Application Application protocol Presentation protocol Presentation Session protocol Presentation Application

5

Session

Session

4

Transport protocol Transport
L3 SDU

Transport Network protocol
L3 SDU

3
L2 SDU

Network

L3 PDU

Network
L2 SDU

2
L1 SDU

Data link Physical

Data link protocol
L2 PDU

Data link
L1 SDU

1

Physical protocol
bits

Physical

Figure 13: ISO OSI reference model

Peer-to-peer communication
The data units exchanged in peer-to-peer communication between protocol layers are often broadly classified into two types: • • Data PDUs: consisting of protocol control information and payload, where the payload can be all or part of an SDU, Control PDUs: only including protocol control information, not containing payload from SDU.

An example is shown in Figure 14. An SDU, i.e. the data unit received from upper layer is segmented into smaller units which becomes the payload of a PDU of the considered protocol. The other part of the PDU, here a header that precedes the payload, is the protocol control information. The header for instance could include a sequence number that would allow to order the PDUs in the right sequence, i.e. to re-assemble the SDU at the receiver. In addition there may be control PDUs needed which do not include any payload data from the SDU, which are multiplexed into the stream of data PDUs and which can be identified at the receiver by some PDU type identifier field which is in the protocol control information. The PDUs become on the next protocol layer SDUs of this layer. At the receiving side of the protocol, the lower layer aims to deliver the units as they were received from the upper layer at the transmitting side, which however is sometimes not possible due to transmission errors. Based on its control information, the protocol must be able to cope with such error situations, without knowing any details of the processes and functions performed in the lower layers.

3rd Generation Mobile Communication Systems

Page 2-12

Version 1.12 01.08.2000

Ln-SDU

header payload Control PDUs Ln-PDU

Multiplexer

Data PDU Control PDU

Figure 14: Example of protocol operations and terminology

Layer-to-layer communication
Communication between adjacent layers (e.g. within one node) is specified in terms of service primitives. Communication between peer protocol entities is specified in terms of the handling of SDUs and PDUs by the respective protocol. There are four types of primitives: request, indication, response and confirmation, see Figure 13. A request primitive is used to request a certain service from the lower layer, for example data transport service. At the receiving side, the transmitted data is indicated to the peer entity with a indication primitive. The upper layer may reply to the transmitting side that data has arrived by using a response primitive. This may trigger a confirmation to the upper layer at the transmitting side that the data transfer has been completed successfully using a confirmation primitive.

3rd Generation Mobile Communication Systems

Page 2-13

Version 1.12 01.08.2000

transmitter

receiver

Upper layer

Confirmation

Request

Indication

Response

Lower layer

Figure 15: Interlayer communication by means of service primitives

Control- and User-planes
In connection-oriented transmission systems, protocols are often divided into two planes, a control plane and a user plane. The control plane protocols are responsible for handling and transfer of network-internal control information including connection setup. The user plane protocols are responsible for processing and transfer of the actual user application data, e.g. speech or video data, file transfer data, etc.

2.4 UTRAN Transport Protocol Architecture
2.4.1 General protocol structure
The UTRAN transport protocols employ a common architecture on all three terrestrial interfaces Iu, Iur and Iub. The protocol architecture is divided vertically into two protocol layers, Radio Network Layer and Transport Network Layer. The protocol architecture is divided horizontally into three planes, Control plane handling control data of the radio interface protocols, User plane handling the user data, and a Transport Network Control plane. All UTRAN related issues are visible only in the Radio Network Layer. The Control plane includes the Application Protocols, i.e. RANAP (on Iu, Radio Access Network Application Part), RNSAP (on Iur, Radio Network System Application Part) or NBAP (on Iub, Node B Application Part). The User plane includes the Data Stream(s) and the Data Bearer(s) for the Data Stream(s) characterised by one or more User plane (UP) frame protocols specified for each interface, i.e. Iu, Iur and Iub.

3rd Generation Mobile Communication Systems

Page 2-14

Version 1.12 01.08.2000

The Transport Network Layer represents standard transport technology that has been selected to be used for UTRAN, but without any UTRAN specific requirements. The Transport Network Control plane includes the Access Link Control Application Protocol(s) (ALCAP) needed to control (setup, release, etc.) the transport bearers. From the Transport Network perspective both, the signalling bearers and the data bearers of the radio network are seen as User-plane bearers (see Sec. 2.3). ALCAP is the transport network resource control protocol where the C-plane signalling originates and is processed which is needed to manage the transport network.
Radio Network Layer Control Plane Application Protocol User Plane Data Stream(s)

Transport Network Layer

Transport Network User Plane

Transport Network Control Plane

Transport Network User Plane

ALCAP(s) Signalling Bearer(s) Signalling Bearer(s) Data Bearer(s)

Physical Layer

Figure 16: Architecture of the UTRAN transport protocols on Iu, Iur, and Iub

2.4.2

Iu Protocol Architecture

The Iu interface is presently divided into two parts, one for connection to circuit-switched domain Core Networks (CS-CN domain), one for connection to packet-switched Core Networks (PS-CN domain), shown in Figure 17 and Figure 18, respectively. The Transport Network control plane is identical in both domains while the protocols stacks in Control plane and User plane differ. For the reader interested in details of the below mentioned protocols, references can be found in [2.3, 2.8]. The circuit-switched CN domain C-plane protocols are based on the Signalling System No 7 (SS7) network protocols, based on Signalling Connection Control Part (SCCP) and Message Transfer Part (MTP3-B). These protocols are also used in ISDN networks for building up SS7 signalling networks. SCCP provides connectionless service, connection oriented service, separation of the connections on per mobile basis on the connection oriented link, and establishment of a connection oriented link to each mobile. MTP3-B provides message routing, discrimination and distribution, and signalling link management functions. The signalling data is carried over an ATM network. The protocol layers SSCF-NNI (ServiceSpecific Coordination function, Network-Node Interface), SSCOP (Service Specific Connection

3rd Generation Mobile Communication Systems

Page 2-15

Version 1.12 01.08.2000

Oriented Protocol, ITU Rec. Q.2110), and AAL5 (ATM Adaptation Layer Type 5) form a socalled Signalling ATM Adaptation Layer (SAAL). The Signalling ATM adaptation layer performs the adaptation of the higher layer signalling protocols (here SCCP and MTP3-B) to the fixed size payload of the “ATM cells”, i.e. the service data units of the ATM layer. The circuit-switched CN domain U-plane uses AAL2 (ATM Adaptation Layer Type 2, see Sec. 2.4.4).
Radio Network Layer

Control Plane RANAP

User Plane Iu UP Protocol Layer

Transport Network Layer

Transport Network User Plane

Transport Network Control Plane
Q.2630.1

Transport Network User Plane

SCCP MTP3-B SSCF-NNI SSCOP AAL5

Q.2150.1 MTP3-B SSCF-NNI SSCOP AAL5 AAL2

ATM Physical Layer

Figure 17: Iu protocol architecture for CS-CN domain For the packet-switched CN domain C-plane protocols the UMTS specification allows operators to select between two alternatives for transport of SCCP messages. The first alternative is basically the same protocol stack as used in circuit-switched domain, based on MTP3-B and SAAL. The second alternative is based on the Internet Protocol (IP) technology (“IP over ATM”). SCTP refers to the Simple Control Transmission Protocol [16] developed by the Sigtran working group of the IETF for the purpose of transporting various signalling protocols over IP networks. M3UA refers to the SCCP adaptation layer "SS7 MTP3 – User Adaptation Layer " [17] also developed by the Sigtran working group of the IETF. The packet-switched CN domain U-plane employs IP over ATM using GTP-U (GPRS Tunneling Protocol – User part) for encapsulating IP addresses included in the user data. The UDP (User Datagram Protocol) provides a connectionless IP service. For the transport between CN and UTRAN new IP addresses are included by the IP layer. The IP packets are then transported over AAL5/ATM. The operator can chose between IP routing or ATM-Virtual Circuit switching for choosing appropriate paths between the network nodes.

3rd Generation Mobile Communication Systems

Page 2-16

Version 1.12 01.08.2000

Radio Network Layer

Control Plane RANAP

User Plane Iu UP Protocol Layer

Transport Network Layer

Transport Network User Plane
SCCP M3UA MTP3-B SCTP SSCF-NNI SSCF-NNI SSCOP AAL5 IP

Transport Network Control Plane

Transport Network User Plane

GTP-U UDP IP AAL5

ATM Physical Layer

ATM Physical Layer

Figure 18: Iu protocol architecture for PS-CN domain

2.4.3

Iur and Iub interfaces

The Iur and Iub protocol stacks are very similar to the Iu interface on the transport network layer. On Iub SAAL-UNI (User-Network Interface) instead of SAAL-NNI (Network node interface) as on Iu and Iur is employed. The Radio Network layer protocols (RANAP, RNSAP and NBAB in control plane, and Iu, Iur, Iub User Plane (UP) frame protocols) however have to fulfill rather different functions and are rather different from each other.

2.4.4

ATM Adaptation layer

The AAL protocols can be divided into two sublayers, the common part convergence sublayer (CPCS) and segmentation and reassembly (SAR) sublayer. The CPCS can on principle serve any data block length. The SAR sublayer performs segmentation such that the SAR PDU fits into the payload of 48 bytes of an ATM cell. There are several types of AAL protocols which are distinguished according their capabilities to provide adaptation functions for different classes of services: • AAL1: adaptation for Constant Bit Rate (CBR) Services (1 byte header, 47 bytes payload SAR PDU)

3rd Generation Mobile Communication Systems

Page 2-17

Version 1.12 01.08.2000

• • •

AAL2: adaptation for Variable Bit Rate (VBR) Services AAL3/4: adaptation for services sensitive to data loss but delay insensitive, error detection on SAR sublayer (4 bytes header/trailer, 44 bytes payload SAR PDU) AAL5: similar as AAL3/4 but with somewhat more efficient split of protocol control information between CPCS and SAR sublayer, error detection on CPCS.

For UMTS AAL2 according to ITU Rec. I.363.2 and AAL 5 according to ITU rec. I.363.5 are employed.

2.4.5

ATM layer

An ATM cell [2.6] consists of 48 bytes payload and a 5 byte header which is added by the ATM layer in the transmitting direction, removed in the receiving direction. The ATM layer performs switching and routing of ATM cells within the ATM network based on routing addresses included in the ATM cell header (Virtual Path Identifier (VPI) and Virtual Channel Identifier (VCI)), and it performs the necessary address translations. Flow control based on QoS requirements is performed based on the Cell Loss Priority (CLP) bit in the header. The management of different ATM cell types (distinction between several types of control and data PDUs) is supported with the Payload Type Identifier (PTI) in the header. There is also an 8 bit CRC code included in the cell header.

2.4.6

Physical layer of ATM networks

The ATM layer is completely independent on the physical layer of the ATM network. The physical layer transmission can use Plesiochronous Digital Hierarchy (PDH) technology as defined in ITU Recommendation G.703 and G.804 (often referred to as “PCM-hierarchy”, offering e.g. 2.048 Megabit transmission services based on 64 kbps channels). Alternatively Synchronous Digital Hierarchy (SDH) technology (ITU Recs. G.707, G.708, G.709, offering 155 and 622 Mbps preferably on optical fibers) can be employed. There are a number of other physical transmission technologies such as e.g. SONET (Synchronous Optical Network).

3rd Generation Mobile Communication Systems

Page 2-18

Version 1.12 01.08.2000

2.5 Radio Interface Protocol Architecture
The radio interface protocol architecture is shown in Figure 19. The overall architecture, protocol services and functions are specified in TS 25.301 [2.4]. The radio interface is layered into three protocol layers: the physical layer (L1), the data link layer (L2), network layer (L3).

Layer 2 is split into following sublayers: Medium Access Control (MAC), Radio Link Control (RLC), Packet Data Convergence Protocol (PDCP), Broadcast/Multicast Control (BMC), and Link Access Control (LAC). Layer 3 is split into Radio Resource Control (RRC), Mobility Management (MM) and Call Control (CC) sublayers. Layer 3 and RLC are divided into Control (C-) and User (U-) planes. PDCP and BMC exist in the U-plane only. There is however no difference between RLC protocol entities in the U- and Cplanes. MAC and PHY cannot be separated between U- and C- planes. The upper C-plane L3 sublayers CC and MM belong to the Core Network. RRC belongs to UTRAN, i.e. the Iu interface that connects RNCs of the UTRAN with the Core Network nodes, e.g. MSC and SGSN, connects RRC with CC/MM. In the U-plane, there are no L3 radio protocols. The LAC is a L2 protocol which belongs to the Core Network. It exists as a part of the General Packet Radio Service (GPRS) only in the packet switched Core Network domain. Service Access Points (SAP) for peer-to-peer communication are marked with circles at the interface between sublayers. The SAP between MAC and the physical layer provides the transport channels. The SAPs between RLC and the MAC sublayer provide the logical channels. The SAPs above L2 (i.e. in the C plane above RLC, in the U-plane above RLC, BMC, or PDCP) provide the radio bearers. Radio bearers in the C plane are denoted as signaling radio bearers. Within the UTRAN there exist interfaces between RRC and each lower layer protocol, BMC, PDCP, RLC, MAC, and L1. Through this interface (Control SAPs) RRC controls the configuration of the lower layers. There are primarily two kinds of signalling messages transported over the radio interface - RRC generated signalling messages and so-called Non-Access Stratum (NAS) messages generated in the higher layers (i.e. CC and MM). On establishment of the signalling connection between the peer RRC entities three or four signalling radio bearers may be set up. Two of these bearers are set up for transport of RRC generated signalling messages - one for transferring messages through an unacknowledged mode RLC entity and the other for transferring messages through an acknowledged mode RLC entity. One signalling radio bearer is set up for transferring NAS messages set to "high priority" by the higher layers. An optional signalling radio bearer may be set up for transferring NAS messages set to "low priority" by the higher layers. Subsequent to the establishment of the signalling connection a further signalling radio bearer may be set up for transferring RRC generated signalling messages using transparent mode RLC. Details of the services provided by each radio interface protocol layer to the respective upper layer, and the necessary functions are described in Section 6. On a general level, the functions are described below.

3rd Generation Mobile Communication Systems

Page 2-19

Version 1.12 01.08.2000

C-plane signalling

U-plane information

Call Control, Mobility Management L3 Radio Resource Control

L2

Link Access Control

Iu Interface

Radio Bearers

TR

UM

AM

Broadcast Multicast Packet Data Control Convergence Protocol
UM AM

TR

L2

Radio Link Control (RLC)
Logical Channels
BCCH PCCH CCCH DCCH DCCH CTCH DTCH DTCH

Medium Access Control (MAC)
Transport Channels

BCH PCH RACH

CPCH

FACH

DCH

L1

Physical layer (PHY) (Physical channels L1-internal)

Figure 19: Architecture of the radio interface protocol

The Call Control protocol (CC) provides call management functions, such as setup, maintenance, release of so-called signaling connections between the Core Network and a mobile (UE). Through CC all signalling between a mobile and external networks is handled. The Mobility Management (MM) is responsible for mobility management on radio access network level (RNS level). It manages user-specific data bases needed to establish the optimal connection between the Core Network and the Radio Access Network nodes. Also tasks like Mobile system selection (PLMN selection, whether e.g. GSM or UMTS shall be used, operator selection etc.) and authentication (i.e. verification of subscriber data) are handled by MM. MM however does not know in which cell a user is located. The radio resource control protocol (RRC) provides mobility management on cell level, and radio resource management (admission control, handover control). RRC handles all signaling between UE and UTRAN. Signalling between UE and Core Network is transparently passed through RRC and at the network side routed to the correct UE. RRC also is responsible for local configuration of lower layers. The Broadcast and Multicast control protocol (BMC), at the network side, manages the distribution of messages received from the Cell Broadcast Center to the desired cells. It generates scheduling information which enables BMC at the UE side to control Discontinuous Reception (DRX), such that the UE can read only those messages it has subscribed to.

3rd Generation Mobile Communication Systems

Page 2-20

Version 1.12 01.08.2000

The Packet Data Convergence Protocol (PDCP) main function is TCP/IP header compression, i.e. it removes all redundant information from TCP/IP headers which does not need to be sent repeatedly over the radio interface. The Radio Link Control (RLC) protocol performs at the transmitting side segmentation of higher layer protocol data units into smaller blocks suitable for radio transmission. At the receiving side it re-assembles the small blocks back into the higher layer units. There are three modes of RLC transmission, transparent (TR, sometimes also denoted TM), unacknowledged (UM) and acknowledged (AM) transmission. In Transparent mode, RLC only provides segmentation and reassembly functions. There is no additional information (no RLC header) added to the higher layer data. In unacknowledged mode an RLC header is added which contains e.g. sequence numbers which is used for sequence number check. In acknowledged mode there is bi-directional control information exchanged between peer RLC entities in order to confirm that the data has been received correctly. In case of transmission errors, retransmission is initiated. In acknowledged mode, RLC provides selective retransmission functions. In acknowledged and unacknowledged mode data encryption (ciphering) is performed on RLC) The Medium Access Control protocol (MAC) controls the usage of the transport channels which are provided by the physical layer. The data received on the logical channel from RLC can be multiplexed and is then mapped onto transport channels. With the multiplexing and mapping functions, MAC performs priority control. MAC also executes switching of transport channels (switching between common and dedicated transport channels) for efficient packet data transmission. For logical channels used by transparent mode RLC, ciphering is performed on MAC. The physical layer provides data transport services on transport channels. Transport channels are individually encoded. Several transport channels can be multiplexed together before they are mapped onto physical channels. The following functions are performed physical layer: CRC addition and check, encoding and decoding, rate matching (between transport channel rate(s) and physical channel data rates by means of puncturing and bit repetition), spreading and despreading, modulation and demodulation, inner loop (closed loop) power control, and others.

References
[2.1] [2.2] [2.3] [2.4] [2.5] [2.6] [2.7] [2.8] 3GPP TS 25.101, “Service Aspects; Service Principles”, Ver. 3.9.0, March 2000. M. Mouly, M-B. Pautet, “The GSM System for Mobile Communications”, published by the authors, 1992, ISBN 2-9507190-0-7. 3GPP TS 25.401, “UTRAN Overall Description”, Ver. 3.2.0, March 2000. 3GPP TS 25.301, “Radio Interface Protocol Architecture”, Ver. 3.4.0, March 2000. A. S. Tannenbaum, “Computer Networks”, Prentice Hall, 3rd Ed. 1996. M. de Prycker, “Asynchronous Transfer Mode, Solutions for Broadband ISDN”, Prentice Hall, 3rd Ed. 1995. J. D. Spragins, “Telecommunications Protocols and Design”, Addison-Wesley, 1994. 3GPP TS 25.412, “UTRAN Iu Interface Signalling Transport”, Ver. 3.3.0, March 2000.

3rd Generation Mobile Communication Systems

Page 3-1

Version 1.12 01.08.2000

3 Spread spectrum technologies
There are a number of different approaches of spread spectrum modulation: • • • • • direct-sequence (DS) spreading (“phase hopping”) frequency hopping (FH) time hopping (TH) chirp modulation hybrid schemes (combinations of above)

Direct-sequence spreading and frequency hopping are the most important schemes applied in civil multi-user communication systems. See e.g. [3.1, 3.2] for an introduction into FH technology A special form of form FH is applied in GSM (slow frequency hopping). This lecture focuses on direct-sequence spreading.

3.1 Elements of direct-sequence spread spectrum systems
Figure 20 shows a basic direct-sequence spread spectrum communication system.
Spreading Code Generator Rc c(n) Bit-level Rs Spreading modulator modulator s(n) DS-SS modulator

Rb Data Source b(n) Channel encoder

Rbe

Rc Pulse shaping u(n)

Rsampl Freq. Upconversion x(n) Radio transmission channel xHF(t)

be(n)

Sync Rbe Channel decoder Detector Deˆ s(n) spreader v(n) Rs Rsampl

Rb Data sink

Pulse-shape Matched filter

Rsampl Downconversion y(n)

yHF(t)

ˆ b(n)

ˆ be (n) DS-SS demodulator
Spreading Code Generator

Figure 20: Basic Spread spectrum communication system

3rd Generation Mobile Communication Systems

Page 3-2

Version 1.12 01.08.2000

The system consists of the following elements:

Data source
The data source generates the information to be transmitted through the system. Here we assume that the data source generates a stream of binary symbols (i.e. bits) b(n) ∈ {0, 1} at a bit rate Rb = 1/Tb, where Tb is the bit transmission time interval.

Channel encoder
The channel encoder introduces, in a controlled manner, redundancy into the sequence of information symbols, which is used to overcome effects of power variation, noise and interference on the transmission channel. The amount of redundancy is measured in terms of a ratio n/k, which means that for a sequence of k information symbols at the input of the channel encoder, a code word consisting of n output symbols is produced, i.e. (n-k) redundancy bits are added. The reciprocal of this ratio, k/n, is referred to as code rate. When, in a continuous data stream, a sequence of k information bits of length Tb each is mapped to a sequence of n encoded bits, the duration of an encoded bit is Tbe = Tb k/n. This yields to a bit rate of Rbe = Rb n/k, which is by the redundancy ratio larger than the information bit rate. The encoder may use Cyclic Redundancy Check (CRC) codes for error detection, and Forward Error Correcting (FEC) codes, such as block codes, convolutional codes and turbo codes. The schemes employed in UMTS will be presented and discussed in a later section.

Direct-sequence spread spectrum modulator
Note that here and in the following we employ the term modulation for only the baseband processing part of a complete modulator. The DS-SS (baseband) modulator can be thought of being divided into two parts, a bit-level modulator and a spread spectrum modulator (“spreader”). The (baseband) bit-level modulator simply maps the encoded bits onto the signal constellation points of the modulator. We restrict our attention to binary and quaternary Phase Shift Keying (PSK) modulation, BPSK and QPSK. In BPSK, an encoded bit be is mapped to a modulation symbol s equal to –1 or +1 for be = 1 or for be = 0, respectively. In QPSK two successive bits are first mapped into M = 4-ary symbols m ∈ {0, 1, 2, 3}(preferably with Gray code mapping). Then m is mapped to a modulation symbol s = exp(2πm/M), see Figure 21. BPSK QPSK Im Im

j (01) 1 Re (00) -j (10)
Figure 21: Signal space diagram for BPSK and QPSK

-1 (1)

1 Re (0)

-1 (11)

3rd Generation Mobile Communication Systems

Page 3-3

Version 1.12 01.08.2000

Note that the symbol rate Rs at the output of the bit-level modulator is equal to Rbe/log2(M), i.e. Rs = Rbe for BPSK, and Rs = Rbe/2 for QPSK. The spreading modulator consists of a sample-and-hold function (= upsampling and repetition) and a multiplier, see Figure 22. A symbol s is upsampled from 1 sample into G samples per symbol interval. Upsampling increases the rate to Rc = RsG = 1/Tc, where the new sampling interval Tc is referred to as chip interval and Rc is referred to as chip rate. The upsampled sequence is then multiplied with a spreading code c(n), which in the simplest case is a random (pseudo-noise, PN) sequence of ±1 at chip rate. Since the signal bandwidth (after pulse shaping) is proportional to the rate, the bandwidth of the output sequence is by the spreading factor G larger than that of the input sequence s(n). Note: there are other equivalent structures of DS-SS modulator that provide essentially the output (equivalent or identical).
c(n) G= 4

Ts s(n)

Tc Sample-and -hold u(n)

Figure 22: Principle of spreading

Spreading code generator
The spreading code generator generates the sequence c(n) ∈ {0, 1} employed in the spreader (and also in the despreader). Spreading codes are described in more detail in the next section.

3rd Generation Mobile Communication Systems

Page 3-4

Version 1.12 01.08.2000

Pulse shaping filter
The pulse shaping filter provides the actual modulation waveform, performs spectral shaping including band-limitation. In most applications root-raised cosine (rrc-) filters are applied. Pulse shaping is in most practical implementations performed with digital filters operating at a 4 or 8 times higher sampling rate than the chip rate. Figure shows the impulse response h(n) and the frequency response H(j Ω)2 of an approximated rrc-filter with roll-off factor α= 0.22, as used in UMTS. The approximation is done at 4 samples per chip interval Tc using a filter with 51 coefficients (rectangular weighting function).

1.2

0 -10 -20

1

0.8 20*log10(|H(f)|/|H(0)|) -6 -4 -2 0 n = 4 t/Tc 2 4 6 8

-30 -40 -50 -60 -70

0.6 h(n)

0.4

0.2

0

-80 -90 -100

-0.2 -8

0

1

2

3

4 f (MHz)

5

6

7

8

Figure 23: Impulse response h(n) and normalized frequency response |H(f)| (in dB)

Frequency up-conversion
The frequency up-conversion shifts the baseband signal into the desired transmission band. This block shall also contain the digital-to-analog conversion, several analog mixer and filter steps, and power amplification as the last function in the chain, before the signal is fed into the transmit antenna. The halfband filters perform upsampling and interpolation by a factor of 2. The Numerically Controlled Oscillator (NCO) provides a complex sinusoid exp(2πn f IF1/fs) used to shift the complex baseband signal up or down onto a first Intermediate Frequency (IF) f IF1. This operation is used to shift the signal into a desired frequency slot. The second halfband filter is an I-Q modulating filter. It performs upsampling and interpolation by another factor of 2 and also complex-to-real conversion by multiplication of the inphase and quadrature components with cos(nπ/4) and sin(nπ/4), i.e. sequences 1, 0, -1, 0, 1, … and 0, -1, 0, 1, 0,… respectively. Then the summation needed to build the real output signal R(n) = I(n) cos 2πn/4 - Q(t) sin 2πn/4 is reduced to a simple multiplexing operation when it is obtained at 4 times the sampling rate of the halfband filter input signal.

3rd Generation Mobile Communication Systems

Page 3-5

Version 1.12 01.08.2000

Halfband Filter ↑2 Complex Multiplier Halfband Filter ↑2

I(n) Halfband Filter ↑2 Q(n)

R(n) DAC Anti-Alias LP Filter Mixers & Filters Power Amplifier

Numerically Controlled Oscillator

Master Clock

Figure 24: Frequency up-converter with digital conversion into 1st IF and DAC on 1st IF

Transmission channel
The transmission channel describes the physical effects of radio wave propagation including the effects of the environment on the signal. The transmission channel is characterized by the following features: • Distance attenuation: reduction of power dependent on distance between transmit and receive antenna, also denoted as path loss. For free space propagation, the signal power is attenuated proportional with the square of distance, ∼ d2. In typical terrestrial mobile radio , distance attenuation is proportional to ∼ d4. Slow shadow fading: due to obstructions caused by buildings, trees, etc. on the radio path, the received signal power experiences some rather slow variations when either receive or the transmit antenna is moving. Such variations are referred to as shadow fading or shortly shadowing. In radio channel models, shadowing is modeled as a Gaussian distributed random variable added to the reference receive power in the logarithmic domain (i.e. when power is represented in dBm units). Multipath: due to reflections at hills or large, far-away buildings, the radio signal can reach the receiver on several rather different propagation paths with significantly different effective distance between transmitter and receiver. This causes that the received signal becomes a superposition of several versions of the transmitter signal with significantly different delay. Fast fading and Doppler: Due to movement of transmitter and/or receiver and/or near-by reflectors (e.g. other vehicles) the received signal becomes a superposition of several versions of the transmit signal at different signal phase. This may cause relatively fast amplitude variations (depending on speed of the moving objects and relative to shadow effects) of the received signal. In a baseband representation of a radio channel, these amplitude variations are usually modeled with a Rayleigh distributed [3.2] amplitude factor. The magnitude of a complex zero-mean Gaussian distributed random variable is Rayleigh distributed. In a baseband Rayleigh fading channel model this effect is modeled with a complex Gaussian distributed factor a(t) = ar(t) + j ai(t) on the transmit signal x(t), i.e. the faded signal is represented as a(t) x(t). Therefore the term multiplicative fading is often used to describe this effect. The fading process a(t) has correlations in time which depend on the speed of the moving objects. The statistics of these correlations are described by the Doppler spectrum.







3rd Generation Mobile Communication Systems

Page 3-6

Version 1.12 01.08.2000



Interference: In cellular system there may be other users transmitting simultaneously in the same frequency band, or in an adjacent frequency bands with power leaking into the given band. Interference is modeled as additive disturbance to a given signal. Thermal noise: There is another additive disturbance in the received signal which is due to wideband thermal noise of the receiver front end. Although this effect is not actually caused by the radio wave propagation channel it is usually modeled as part of the transmission channel. The thermal noise power density is a natural constant which amounts to –174 dBm/Hz and which is increased by the receiver signal amplifier. The amount of power increase is described by the receiver noise figure F. The noise figure is typically between 3 and 6 dB (depending on implementation expense). For instance, in a spread spectrum frequency band of 5 MHz (67 dB) and F = 5 dB the noise power amounts to (–174 +67+5) dBm = –102 dBm.



A transmission channel that models the above mentioned effects is shown in Figure 25. Note that distance attenuation and shadowing variables cL(t) and cS(t) are real functions while the fast fading variables ai(t) are complex.

Shadowing cS(t) distance attenuation cL(t)

τ1
Delay

a1(t)

×
a1(t)

Interference I(t) Thermal noise η(t) Σ

τ1

×

×

Delay

×
. . .
a1(t)

+

+

τ1
Delay

×

Figure 25: Transmission channel model Note: For details of radio channel characteristics see [3.1, 3.4].

Frequency down-conversion
This block provides the inverse operation to frequency up-conversion. The received signal is amplified, filtered, mixed down to the baseband and Analog-to-Digital converted.

Pulse-shape matched filter
This is the matched filter with respect to the chip transmission pulse shape. For symmetrical filters the pulse-shape matched filter is identical with the pulse-shaping filter. Thus in case of using a root-raised cosine filter, the combination of the two filters results in a raised cosine filter. Pulse shape matched filtering maximizes the signal-to-noise (and interference) ratio of the

3rd Generation Mobile Communication Systems

Page 3-7

Version 1.12 01.08.2000

received signal with respect to the transmission bandwidth. Due to the raised cosine characteristic of the matched pulse shape (i.e. zeros at chip intervals) also interchip interference is minimized with respect to the optimal sampling instants. As pulse shaping, the pulse-shape matched filter must be operated at a sampling rate typically 4 or 8 times the chip rate. This allows to optimize the sampling instants to a fraction of 1/4 or 1/8 chip intervals.

Direct-sequence spread spectrum demodulator
The DS-SS demodulator shall provide estimations of the data carried on the received signal. This is on principle done in two steps inversely to the transmitter modulation operation. In the first step the received signal is despread using a despreader. The despreader is supplied with the same spreading code c(n) as used in the spreader. A synchronization unit is employed for estimation of the delay of the transmission channel. In case of multipath, actually the delay for each individual transmission path needs to be estimated. Based on exact knowledge of the path delay (with the resolution given by the sampling frequency, i.e. 1/4 or 1/8 of the chip interval) the despreader is capable to adjust the received signal in time such that it is synchronized with its own spreading code generator. Despreading is performed by correlating the received signal with the locally generated spreading code. This means the time-adjusted, pulse-shape matched-filtered signal v(n‘) is multiplied with the conjugated complex spreading code c*(n) and integrated over the G chips comprising one modulation symbol interval:

ˆ s (n) = ∑ c ∗ (n)v(n ′)
n =1

G

The correlation is performed at chip interval level, not at sampling interval level. For this purpose the signal v(n) is downsampled from sampling rate Rsampl to chip rate Rc after time adjustment. Note that the above correlation operation can also be interpreted as an optimum matched filtering with respect to the spreading code. In case of multipath, an individual correlator is needed for each multipath component in the received signal. In each such correlator, despreading is performed with a different version of the signal v(n‘) with respect to the time synchronization instant. The individual decorrelation results are then combined at the output. Such a multipath receiver is referred to as Rake receiver. When PSK modulation on bit level is applied, as assumed here, phase-coherent demodulation needs to be performed. This means that before a modulation symbol can be detected from the despread signal, a phase shift caused by the transmission channel needs to be corrected. This requires a channel estimation scheme which, in the single-path case, must be capable to estimate the channel phase. In the multipath case, in addition to the phases for each individual path, also the attenuation (channel amplitudes) would be useful. When both amplitudes and phases are available, this enables to perform maximum ratio combining (see further below). Reliable estimation of the complex channel coefficients requires a special transmitter signal referred to as pilot signal (see further below). The despread signal is multiplied with the estimated conjugated complex channel coefficient. In the final step then the modulation symbol can be detected in the detector e.g. by computing the minimum distance between the received and all possible signal constellation points according to the modulation scheme. For BPSK, detection basically results in thresholding the real part of the despreader output. For QPSK minimum distance detection can be applied. Alternatively, thresholding on both real and

3rd Generation Mobile Communication Systems

Page 3-8

Version 1.12 01.08.2000

imaginary parts can be applied when the signal constellation points are first rotated such that they lie onto the axes of the complex plane.

Coherent Rake finger

pilot

h*(n) Filter
QPSK detect.

Sum
buffer Integrate &Dump Demux
Delay

Path delays Searcher & Tracker

C*scrambl C*ch
Code generator

Figure 26: Structure of a coherent Rake receiver with maximum ratio combining Channel decoder The output of the DS-SS-Demodulator is a stream of estimated encoded bits, usually combined with reliability information. The reliability information, also referred to as soft-decision information, is measure of probability on correctness of the detected bit. It enables application of soft-decision decoding, which is more efficient than hard-decision decoding. Data Sink The data sink is the destination of the output of the channel decoder, a bit stream of estimations of the transmitted information b(n). The channel decoder may also provide reliability information together with each estimated bit (soft-output decoder). This information may be useful for some applications. Simple example of waveforms in a BPSK-based spread-spectrum communication system Figure 27 and Figure 28 show example waveforms occurring in a simple BPSK-based spread spectrum transmitter and receiver.

3rd Generation Mobile Communication Systems

Page 3-9

Version 1.12 01.08.2000

1 0 -1

2PSK

0 1 0 -1 0

10

20

30

40

50

60

70

80

90

10

20

30

40

50

60

70

80

90

×
0.6 0.4 0.2 0 -0.2 -20 -10 0 10 20

1 0 -1 0 1 10 20 30 40 50 60 70 80 90

Pulse shaping filter

0 -1 1 0 -1

Figure 27: Example of a BPSK based spread spectrum transmitter
4 2 0

Pulse shaping filter Timing parameter Delay

-2 -4 0 4 2 0 -2 -4 0 10 20 30 40 50 60 70 80 90 1 0 -1 10 20 30 40 50 60 70 80 90

×
Integrate & Dump Complex channel coefficient

0 4 2 0 -2 -4 0 1

10

20

30

40

50

60

70

80

90

×
Decision

5

10

15

20

0 -1

Figure 28: Example of a BPSK based spread spectrum receiver

3.2 Spreading codes
Spreading code generators as applied in DS-SS modems generate periodic sequences. One period of the sequence is often referred to as spreading code. The period (number of chips) is referred to as length L of the code. Spreading schemes can broadly be classified into two categories:

3rd Generation Mobile Communication Systems

Page 3-10

Version 1.12 01.08.2000



Short code spreading: The length L of the employed code is equal to one modulation symbol, i.e. L = G. Sometimes one also speaks of short code spreading when the code length corresponds to a few modulation symbol intervals, i.e. L = KG, where K is a small positive integer.



Long code spreading: The length L of the employed code is much larger than a symbol interval, L >> G.

In case of BPSK bit-level modulation, the output of a spreader employing a short spreading code L = G is simply a sequence of repetitions of the code with either the original sign (polarity) of chips or with inverted sign, depending on whether the data symbol is +1 or –1. When a long spreading code is employed, essentially every data symbol is spread with a different portion of length G of the long code. Spreading codes can be designed in order to derive some special characteristics which can be especially useful in CDMA systems. Schemes using short code spreading can utilize these characteristics, while schemes with long code spreading normally cannot, as will be explained further below.

3.2.1

Correlation functions

In a CDMA system, the autocorrelation and crosscorrelation functions of spreading codes are very important characteristics. We distinguish between the following autocorrelation functions of a code c(n): Aperiodic autocorrelation function One period of the code c(n) is surrounded by zeros:
L − k −1 n =0

R Ac (k ) =

∑ c ( n )c ( n + k )

c(n) k c(n)

Even periodic autocorrelation function One period of the code c(n) is periodically repeated to form cp(n):

REc (k ) = ∑ c(n)c p (n + k ) = R Ac (k ) + R Ac ( L − k )
n =0

L −1

c(n) k

c(n) c(n)

c(n)

Odd periodic autocorrelation function One period of the code is periodically repeated to form c-p(n) with every other period signinverted:

3rd Generation Mobile Communication Systems

Page 3-11

Version 1.12 01.08.2000

ROc (k ) = ∑ c(n)c − p (n + k ) = R Ac (k ) − R Ac ( L − k )
n =0

L −1

-c(n) k

c(n) c(n)

-c(n)

We distinguish between the following crosscorrelation functions of two codes c1(n) and c2(n): Aperiodic crosscorrelation function One period of the codes c1(n) and c2(n) shall be surrounded by zeros:
L − k −1 n =0

C Ac (k ) =

∑ c ( n) c
1

2

(n + k ), k = 0,..., L − 1 .

c2(n) k

c1(n)

Even periodic crosscorrelation function One period of the code c2(n) is periodically repeated to form c2p(n):

C Ec (k ) = ∑ c1 (n)c 2 p (n + k ), k = − L + 1,..., L − 1 ,
n =0

L −1

= C Ac (k ) + C Ac (− L + k ) + C Ac ( L + k ) .

c2(n) k

c2(n) c1(n)

c2(n)

Odd periodic crosscorrelation function One period of the code c2(n) is periodically repeated to form c-2p(n) with every other period signinverted: One period of the code is periodically repeated to form:

C Oc (k ) = ∑ c1 (n)c − 2 p (n + k ), k = − L + 1,..., L − 1 ,
n =0

L −1

= C Ac (k ) − C Ac (− L + k ) − C Ac ( L + k ) .

-c2(n) k

c2(n) c1(n)

-c2(n)

3rd Generation Mobile Communication Systems

Page 3-12

Version 1.12 01.08.2000

3.2.2

Specific spreading codes

Spreading codes are often cyclic codes that can be produced with linear feedback shift registers (LFSR). Cyclic codes are a subset of the class of linear codes that satisfy the cyclic shift property: If C = ( c0 c1 … cn-2 cn-1 ) is a code word of a cyclic code than (cn-1 c0 c1 … cn-2) is a also a code word, i.e. all cyclic shifts of C are also code words.

cyclic code 1 1 0 0 1 0 0 0 1 1 0 0 1 0
Cyclic codes are conveniently described in a polynomial representation. Note that for the polynomial representation {0, 1}-symbols are used to represent the binary symbols of the code. With each code word C, a polynomial C(D) = c0 + c1 D + … cn-2 Dn-2 + cn-1 Dn-1 is associated. D is the Delay operator. An LFSR with n delay taps is shown in Figure 29. Note that all additions are performed as modulo-2 operations and the factors ak are either 0 or 1. The output sequence is denoted with cj.

cj a1 D cj

+ ×
D cj-1 a2

+ ×
cj-2 an-2

+ ×
an-1 D

+ ×
cj-n+1 an = 1 D cj-n

Figure 29: Linear feedback shift register with n delay taps The output sequence cj is recursively generated according to

c j = a1c j −1 + a 2 c j − 2 + ... + a n c j − n = ∑ a k c j − k
k =1

n

The generating function associated with cj is define Assumed that the output sequence is periodic with period L, i.e. cj = cj+N the generating function can be rewritten as

G ( D) = ∑ D jL c0 + c1 D + c 2 D 2 + ... + c L −1 D L −1
j =0



(

)

=

c0 + c1 D + c 2 D 2 + ... + c L −1 D L −1 1+ DL

3rd Generation Mobile Communication Systems

Page 3-13

Version 1.12 01.08.2000

After some steps we get from above

G ( D) =

∑a
k =1

n

k

D k c −k D −k + c − k +1 D − k +1 + ... + c −1 D −1 1 + ∑ ak D k
k =1 n

(

)

=

g ( D) f ( D)

Note that the numerator g(x) is dependent on the initial state of the LFSR. The denominator f(D) depends on the LFSR connection coefficients ak only. The function f(D) is called characteristic polynomial of degree n (a0, a1 = 1). A simple example of an LFSR generated sequence is shown in Figure 31. The LFSR memory is n = 3, and f(D) = 1 +D2+D3. As can be seen, after 7 cycles the initial filter state (1 0 0) is again reached and the generated sequence cj repeats itself, i.e. the period of the sequence equals L = 7. Note that the LFSR state vector runs through all possible 23 – 1 bit combinations except for the all-zero vector (0 0 0). Therefore L = 23 – 1 = 7 is the maximal length of the sequence period that can be generated by an LFSR with memory n = 3. Maximal-length sequences (m-sequences) Sequences with the property L = 2n – 1, as in above example, are referred to as maximal-length or m-sequences. • An LFSR generates an m-sequence with the maximal period L = 2n – 1 if the characteristic polynomial f(D) is a primitive polynomial of degree n (a necessary but not sufficient condition is that f(D) is irreducible, f(D) ≠ f1(D) f2(D) ). A sufficient condition that f(D) is a primitive polynomial is that its roots α0, α1, … αn-1 in the Galois Field GF(2n) are distinct. Then α is denoted primitive element in GF(2n).



One can show that the number N(n) of primitive polynomials of degree n is equal to

N ( n) =

2 n − 1 k Pi − 1 , ∏ n i =1 Pi
k

where Pi, i= 1,…,k is the prime decomposition of 2n – 1,

2 n − 1 = ∏ Pi ni , where ni is an integer.
i =1

Maximal-length sequences have the following properties. We represent the properties in terms of the ±1 representation of the sequence (i.e. the binary zero is mapped to +1, the binary one is mapped to –1 as in BPSK). Balance property: Symbol 1 appears only one more often than –1 Run-length probability: Half the runs of +1 and –1 have length 1, 1/4 have length 2, 1/8 have length 3, and 1/2k have length k. Shift-and-multiply property: If two versions of one m-sequence with different phase (shift) are multiplied with each other, another phase of the same m-sequence results (shift-and-add property in case of 0/1 representation)

3rd Generation Mobile Communication Systems

Page 3-14

Version 1.12 01.08.2000

Even periodic autocorrelation property: The even autocorrelation function has only two values, REc (0) = L and REc (k) = –1 for k = 1,…L-1 (otherwise REc (k) is periodic with period L).

L

L


-1
Figure 30: Even periodic autocorrelation function of an M-sequence

Odd periodic autocorrelation property and even/odd crosscorrelation of two different msequences: Has no good features which would be useful in spread-spectrum systems (like arbitrary random codes).

3rd Generation Mobile Communication Systems

Page 3-15

Version 1.12 01.08.2000

cj a0=1 a1=0 D c-1=1 j 0 1 2 3 4 5 6 7 8 cj 0 1 1 1 0 0 1 0 … cj-1 1 0 1 1 1 0 0 1 …

+
a2=1 D c-2=0 cj-2 0 1 0 1 1 1 0 0 … D c-3=0 cj-3 0 0 1 0 1 1 1 0 … a3=1

Figure 31: Example of m-sequence generation with period L= 7 Gold codes Gold codes represent the modulo-2 sum of two „preferred pairs“ of m-sequences (in 0/1 representation). Given an m-sequence cj of length L, one can construct another m-sequence cj* of length L by decimating cj by a factor of q, which means that every qth sample of cj is taken to form the sequence cj*. Two m-sequences cj and cj* are called a preferred pair when either • or, • q is odd, and q = 2(n+2)/2 + 1 for even n ≠ 0 mod 4 (i.e. n ≠ 4, 8, 12,…). Modulo-2 addition of the two m-sequences results in a Gold sequence of the same period L = 2n – 1. An example of a Gold code generator is shown in Figure 32 where n = 18. The shown Gold code generator is applied in UMTS on the downlink for generation of scrambling codes. There are 218 – 1 different initial settings of one of the two LFSRs possible. With each setting a different Gold code is generated (different settings of the other LFSR initial states result in different phases of the same Gold code). The 2n – 1 different Gold codes plus the two m-sequences form a Gold code family with specific properties in terms of their even periodic auto- and crosscorrelation functions. q is odd, and q = 2(n+1)/2 + 1 for odd n,

3rd Generation Mobile Communication Systems

Page 3-16

Version 1.12 01.08.2000

For every Gold code the even periodic autocorrelation function fulfils the property

max REc (k ) < q ,
1≤ k < L

and it takes only three values {-t(n), -1, t(n)-2} for k ≠ L, where
n +1  1 + 2 2 , for odd n . t ( n) =  n+ 2 1 + 2 n , for even n 

For every pair c1, c2 of Gold codes in one family the even crosscorrelation function fulfils the property

max C Ec (k ) < q ,
k

and it takes the same three values as the autocorrelation function {-t(n), -1, t(n)-2} for all k. It should be noted that the odd periodic autocorrelation and crosscorrelation functions of Gold codes do not fulfil the above useful properties. In terms of the odd periodic autocorrelation and crosscorrelation functions, Gold codes behave not better than random codes (see below).

17 16 15

14 13

12 11 10

9

8

7

6

5

4

3

2

1

0

I Q
17 16 15 14 13 12 11 10 9 8 7 6 5 4 3 2 1 0

Figure 32: Gold code generator used in UMTS on the downlink Kasami codes Kasami codes are sequences with very small crosscorrelation. There exist two types of Kasami codes (or Kasami sequences) which are referred to as the “small” and the “large” families. Small family of Kasami Codes The small family of Kasami codes is generated from m-sequences, similarly as Gold sequences. Firstly, an m-sequence c1 of length L = 2n – 1 is generated. This m-sequence is decimated by q, where q = 2n/2 + 1.

3rd Generation Mobile Communication Systems

Page 3-17

Version 1.12 01.08.2000

The decimation parameter is not necessarily co-prime (“teilerfremd”) to L. The decimated sequence c1* is again itself an m-sequence, however with shorter period L* = 2n/2 – 1. Modulo-2 addition of the periodically repeated sequence c1* with c1 results in a Kasami code. By modulo-2 addition of the periodically repeated cyclic shifts of c1* with c1 the other Kasami codes of the small family are derived. The original m-sequence and the L* sequences derived by addition define a set of L* + 1 = 2n/2 Kasami codes. Example: We consider an m-sequence (n=4, L=15), c1 = (1, 1, 1, 1, 0, 1, 0, 1, 1, 0, 0, 1, 0, 0, 0). Decimation with q = 5 results in the sequence (1, 1, 0), which periodically repeated results in c1* = (1, 1, 0, 1, 1, 0, 1, 1, 0, 1, 1, 0, 1, 1, 0). The modulo-2 sum results in c2 = c1 + c1* = (0, 0, 1, 0, 1, 1, 1, 0, 1, 1, 1, 1, 1, 1, 0). Using the cyclic shifts of the decimated sequence (i.e. (1, 0, 1) and (0, 1, 1) ) yields to c3 = c1 + Dc1* = (0, 1, 0, 0, 0, 0, 1, 1, 0, 1, 0, 0, 1, 0, 1), c4 = c1 + D2c1* = (1, 0, 0, 1, 1, 0, 0, 0, 0, 0, 1, 0, 0, 1, 1). ci, i = 1,…,4 are the Kasami codes of length 15. The small family of Kasami codes has the following properties:

C Ec (k ), R Ec (k ≠ 0) ∈ − 2 n / 2 − 1, − 1, 2 n / 2 − 1 ,

{

}

max C Ec (k ) ≤ 2 n / 2 + 1 ≈ 2 n / 2 ≈ L .
k

Note that for the above example the even periodic autocorrelation and crosscorrelation takes the values {-5, -1, 3}, whereas for Gold codes it would take values {-9, -1, 7}. Large family of Kasami Codes The large family of Kasami codes is comprised of the small family and some additional Gold codes. The large family is defined for even n. The small family is generated as described above. In addition, with a second decimation parameter, q = 2(n+2)/2 + 1, another m-sequence c1** is generated . Modulo-2 addition of the initial m-sequence with all cyclic shifts of c1** generates the Gold sequences included in the large family of Kasami codes. The number of codes in the large family is 23n/2 for (n mod 4) = 0, or 23n/2 + 2n/2 for (n mod 4) = 2. The crosscorrelation and autocorrelation of the large family of Kasami codes takes values

C Ec (k ), R Ec (k ≠ 0) ∈ − 1, − 1 ± 2 n / 2 , − 1 ± (2 n / 2 + 1) ,
and is therefore only slightly worse than for the small family, but still better than for Gold codes. Noncyclic spreading codes Random PN codes A simple code that can be used in spread spectrum systems is a statistically independent random sequence of +1 and –1 (where both +1 and –1 occur with 50 % probability. Random codes are often used in systems that employ long code spreading, i.e. then every symbol is essentially spread with different random code. In practical systems, frequently very long m-sequences or Gold codes are employed (with periods that correspond to many hours or even days) which are continuously running through.

{

}

3rd Generation Mobile Communication Systems

Page 3-18

Version 1.12 01.08.2000

The samples of the even and odd autocorrelation functions REc(k), ROc(k), for k ≠ 0 and the even and odd crosscorrelation functions CEc(k), COc(k), between any such two random codes have the shape of a binomial distribution,
L  L p ( y ) = ∑   p k (1 − p ) L −k δ ( y − k ) , where p = 0.5,   k =0  k 

which however is scaled by a factor of two and shifted on the x-axis, due to the +1/-1 representation of the sequence:

p ( x) = p ( y ), where x = 2k − L .
An example probability distribution for L = 16 is shown in Figure 33. Note that the mean equals µ= 0 and the variance is σ2 = L. Also shown in the Figure with dashed line is a Normal pdf N(µ = 0 , σ2 = L) which approximates the binomial distribution (note that the Normal pdf is scaled with a factor of ∆x = 2, in order to match the discrete distribution). In a multiuser system where random, statistically independent codes are employed for each user, the probability distribution of the correlation samples is of major importance for the interference Due to the approximate normal distribution of the correlation samples of random codes it is possible to model multiuser interference by simple additive white Gaussian noise (AWGN) without any significant error.

0.2

0.2 probability P(x)

0.1

0.1

0.0

0

-15

-10

-5

0 x

5

10

15

Figure 33: Discrete distribution of correlation samples of a random code (L=16) and its approximation (dashed line) by a normal distribution N(0, sqrt(L))

3rd Generation Mobile Communication Systems

Page 3-19

Version 1.12 01.08.2000

Hadamard codes In systems where several codes are employed simultaneously and where synchronization between these codes can be maintained, it is a desired feature to have zero-crosscorrelation at the synchronization instant. Two codes c1 and c2 are orthogonal when their inner product is zero,

Rc (0) = ∑ c1 (n)c 2 (n) = 0 .
n =0

L −1

The orthogonality feature can be utilized when all the differently spread signals are used by one transmitter. This is for example the case on a CDMA uplink, when one user employs several codes simultaneously, or on a CDMA downlink where one radio base station transmits several signals synchronously to several users. A frequently used orthogonal code is the Hadamard code, which is obtained by selecting the code words from a Hadamard matrix. A Hadamard matrix is an L × L matrix (L an even integer) of +1 and –1, with the property that any row differs from any other row in L/2 positions. For L = 2 the Hadamard matrix is

1 1  H2 =  1 − 1 .   
If we denote the complement with

 − 1 − 1 H2 =  −1 1  ,   
we can generate the Hadamard matrix H2n according to the relation

H H 2n =  n H  n

Hn  . Hn  

By repeated application of the above equation we can generate Hadamard codes with block length L = 2m. Hadamard codes are non-cyclic codes, which are linear for L = 2m. Other block length are however also possible. Note that any two Hadamard codes are orthogonal. „Orthogonal Gold codes“ By extending a Gold code of length L = 2n – 1 with another chip it is possible to generate a code of length L = 2n. Gold codes have the interesting property that when extended with a –1 chip, the codes of a Gold code family become a set of orthogonal codes. We consider the following example. A Gold code of length L = 7 can be generated with the two 3-tap m-sequence generators f1(D) = 1 +D2+D3 and f2(D) = 1 +D+D3. Note that f1(D) and f2(D) define a preferred pair of m-sequences where the latter results from the first by decimation with q = 5 (n = 3). For generation of seven Gold codes ci, we initialize the second shift register with fixed state (1 0 0) and the first with all states (0 0 1) to (1 1 1) for i = 1,…,7. As Gold code c8 we add the m-sequence obtained for f2(D). The following matrix G shows these 8 Gold codes as row vectors. The 8th column of the matrix is extended with –1:

3rd Generation Mobile Communication Systems

Page 3-20

Version 1.12 01.08.2000

+1   −1  −1  +1 * = +1  −1   −1 +1 

−1 −1 −1 +1 +1 +1 +1 −1

+1 +1 −1 −1 +1 +1 −1 −1

−1 +1 +1 +1 +1 −1 −1 −1

−1 −1 +1 −1 +1 +1 −1 +1

+1 −1 +1 +1 −1 +1 −1 −1

−1 +1 −1 +1 −1 +1 −1 +1

− 1  − 1 − 1  − 1 − 1  − 1  − 1 − 1 

The Matrix G fulfils the orthogonality property G×G‘ = LE, where E is the 8×8 unity matrix and the scalar L = 8 is the length of the extended Gold code. Note that the extended orthogonal set of codes do not fulfil the Gold code properties as discussed above. For example the resulting codes are non-cyclic. Nevertheless the name „orthogonal Gold codes“ has been introduced for this code family. Orthogonal Variable Spreading factor (OVSF) codes OVSF codes are codes that maintain orthogonality even for different spreading factors. This property can be fulfilled for spreading factors G = m⋅2k, k = 0, 1, 2…, m an integer > 1, when the spreading code is generated according to the above rule of Hadamard code generation starting with an orthogonal set of codes X of length m, where X can be any set of orthogonal codes, e.g. Hadamard codes or orthogonal Gold codes.

X X 2n =  n X  n

Xn   Xn  

Figure 34 shows the of OVSF channelization code numbering scheme as used in UMTS. For each spreading factor SF = G there exist G codes numbered 0,…,G-1. From each node in the code tree there are 2 branches. On the upper branch, the code from the previous node is repeated twice, i.e. cch,2G,n = (cch,G,m cch,G,m), n even. On the lower branch the code from the previous node is repeated with change of the sign, i.e. cch,2G,n = (cch,G,m -cch,G,m), n odd. The generated OVSF codes are Hadamard codes but differently ordered than resulting from above generation law of Hadamard codes.

3rd Generation Mobile Communication Systems

Page 3-21

Version 1.12 01.08.2000
C ch,16 ,0

C ch,8 ,0 = (1 ,1 ,1 ,1 ,1 ,1 ,1 ,1 ) C ch,4,0 = (1 ,1 ,1 ,1 ) C ch,8 ,1 = (1 ,1 ,1 ,1 ,-1 ,-1 ,-1 ,-1 ) C ch,2 ,0 = (1 ,1 ) C ch,8 ,2 = (1 ,1 ,-1 ,-1 ,1 ,1 ,-1 ,-1 ) C ch,4 ,1 = (1 ,1 ,-1 ,-1 ) C ch,1,0 = (1 ) C ch,8 ,3 = (1 ,1 ,-1 ,-1 ,-1 ,-1 ,1 ,1 ) C ch,8,4 = (1 ,-1 ,1 ,-1 ,1 ,-1 ,1 ,-1 ) C ch,4,2 = (1 ,-1 ,1 ,-1 ) C ch,8,5 = (1 ,-1 ,1 ,-1 ,-1 ,1 ,-1 ,1 ) C ch,2,1 = (1 ,-1 ) C ch,8,6 = (1 ,-1 ,-1 ,1 ,1 ,-1 ,-1 ,1 ) C ch,4 ,3 = (1 ,-1 ,-1 ,1 ) C ch,8,6 = (1 ,-1 ,-1 ,1 ,-1 ,1 ,1 ,-1 )

C ch,16 ,1

. . .

C ch,16 ,15 SF = 1 SF = 2 SF = 4 SF = 8 SF = 16

Figure 34: OVSF code tree employed in UMTS

3.3 Options for Spreading and Scrambling
Depending on whether BPSK or QPSK is applied on bit level, and whether spreading is performed with a real or a complex spreading code there are a number of principal options for implementing a spread spectrum modulator, see Figure 35. There is no obvious difference in performance between the various schemes in a single-user environment. For fixed data rate at the bit level modulator input and fixed chip rate, the symbol spreading factor for QPSK (number of chips per modulation symbol) is twice as large as for BPSK (where a symbol corresponds to a bit). In a multi-user environment QPSK on bit-level and/or complex spreading provides slightly preferable interference characteristics due to better averaging with respect to carrier phase offsets between interferer and desired signal. Differences may exist especially in terms of amplitude variations of the baseband signal (complex envelope) which is measured as the so-called peak-to-average ratio. A low peak-toaverage ratio decreases the linearity requirements of power amplifiers.

3rd Generation Mobile Communication Systems

Page 3-22

Version 1.12 01.08.2000

real spreading code c

±1 (a) BPSK ±1

cos 2π fct
Pulse shaping

×
cI

±1

×
cos 2π fct

±1

×
(b) BPSK ±1

±1

Pulse shaping

× ×
sin 2π fct cos 2π fct

complex spreading code cI + j cQ

×
±j
jcQ cI

±j

Pulse shaping

±1 ±1 (c) QPSK ±j
(c1) complex spreading code c = cI + j cQ (c2) real spreading code c = cI = cQ (c3) 2 real spreading codes cI ≠ cQ

× ×
±1
cQ

±1

Pulse shaping

× ×
sin 2π fct

Pulse shaping

Figure 35: Options for modulation and spreading

In CDMA systems, it is often the case that one transmitter needs to transmit several channels simultaneously. In this case the spreading procedure should be divided into two steps. In the first step the various channels are spread using a code that allows separation of the channels with the least possible amount of interference. In this step usually orthogonal spreading codes are employed since in this case orthogonality between the various channels is maintained at least for a single-path channel. In a multipath environment however, the orthogonality is to some extent lost, some multipath interference has to be taken into account. In the second step of the spreading

3rd Generation Mobile Communication Systems

Page 3-23

Version 1.12 01.08.2000

procedure, the combined signal of all simultaneous channels is “scrambled” by multiplication with another spreading code which is referred to as scrambling code. The scrambling code allows to separate the different transmitter signals against each other. These two steps are illustrated in Figure 36. channelization code cch1

Channel 1

×
cch2

scrambling code cscr

Channel 2

×
. . .
cchK

Σ

×

Pulse shaping

Channel K

×

Figure 36: Principle of channelization coding and scrambling Note that the scrambling operation does not increase the rate further. It is performed at chip rate which is already given after channelization coding. The channelization coding is performed with short spreading codes equal to a modulation symbol length. For scrambling usually long codes are employed. Note that several variations of the scheme in Figure 36 arise depending on whether the various channels deliver real or complex symbols (BPSK or QPSK), whether real or complex channelization codes and real or complex scrambling codes are employed. Those variants which are specified for UMTS will be discussed in later sections in detail. The orthogonality feature can be utilized when all the differently spread signals are used by one transmitter. This is for example the case on a CDMA uplink, when one user employs several codes simultaneously, or on a CDMA downlink where one radio base station transmits several signals synchronously to several users.

3.4 Receiver techniques
Pilot channels PSK modulation systems require coherent (i.e. phase aligned) demodulation. Coherent demodulation requires an estimation of the complex channel amplitudes. For this purpose a signal is required where the modulation is known to the receiver. Such a signal is referred to as pilot. In CDMA systems a pilot can be a separate CDMA channel using a different spreading code than the actual data channel. Alternatively it is possible to time-multiplex pilot symbols (with bit level modulation known to the receiver, e.g. all “1”) into the stream of information data.

3rd Generation Mobile Communication Systems

Page 3-24

Version 1.12 01.08.2000

When differential encoding is applied prior to bit level modulation (differential PSK) noncoherent (differential) demodulation can be applied which does not require estimation of the complex channel coefficients and thus no pilot channel. Synchronisation, channel estimation A receiver requires several steps of synchronization with respect to the received signal to be able to demodulate the information carried on the signal. Both a base station and a mobile station transceiver include a unit which generates a master clock from which all required harmonic signals used in the analog processing parts as well as all digital clocks are derived. For generation of clocks with very high frequency stability Oven Controlled Crystal Oscillators (OCXO) are used which are not suitable for integration into mobile phones. Among others this is one reason why in a mobile system always a base station signal is used as reference for synchronization, i.e. the mobile stations has to synchronize its master clock with regard to a reference signal transmitted by the base station. The steps performed by the mobile station are frequency synchronization and time synchronization. Time synchronization can be further divided into different levels, namely chip synchronization, symbol and bit synchronization, frame synchronization, multi-frame synchronization. In UMTS frequency and chip synchronization need to be performed simultaneously in the mobile station as there is no separate signal which could be used for frequency synchronization. Note that for example in GSM there exists on the downlink a Frequency Correction Channel (FCCH) that carries a pure harmonic signal which is used for frequency synchronization before symbol synchronization is performed. Frequency and chip synchronization in UMTS are performed on the so-called Common Pilot Channel (CPICH) with help of a synchronization channel (SCH). Frequency and chip synchronization could be done iteratively, requires rather good initial reference frequency. Here only baseband processing considered. Chip synchronization is performed on baseband signal with a matched filter (matched to some spreading code), estimation channel paths.

ˆ Channel estimation, i.e. measurement of the complex channel coefficient αe jϕ measuring instantaneous amplitudes and phases of the baseband signal for each received path.
ˆ

Demodulation and despreading For each propagation path an individual receiver is needed (referred to as branch, finger, arm of so called Rake receiver, each finger is time-synchronized to a different propagation path. Despreader performs inverse operations matched to the transmitter, details depend on how the modulator/spreader is implemented. Rake combiners When the received signal is despread/demodulated on several different paths, a combiner is needed to combine the various outputs before the actual information is detected. This combination can be done in several ways:

3rd Generation Mobile Communication Systems

Page 3-25

Version 1.12 01.08.2000

Selection combining: the “best” signal is used for detection, the other(s) are ignored, e.g. the one with the instantaneously highest power is selected. Equal gain combining: The signals are added without explicit weighting but with implicit or explicit phase estimation, applies for example for differential PSK (DPSK). Square-law combining: Orthogonal modulation with non-coherent detection (Proakis p. 784) Maximum ratio combining: the signals are phase-coherent added and weighted with a factor proportional to signal strength, such that the overall signal-to-noise ratio of the combined signal is maximized. This is the optimal combiner (assumed that channel attenuations and phase shifts are known perfectly). Whether coherent or non-coherent demodulation provides better results depends on vehicle speed (max Doppler) as channel estimation becomes less accurate when the channel changes fast. Performance measures for single-user spread-spectrum receivers We consider now the performance of spread-spectrum transmission on the AWGN channel, as illustrated in Figure 37. We use a short-hand notation, and denote an information symbol with b, the spreading code with c(n), the amplitude weight of the transmit signal w, and the additive noise with η(t). The index n shall number the G chips over one symbol interval, where G is the symbol spreading factor. The transmit signal before pulse shaping can then be expressed,

s ( n) = b ⋅ w ⋅ c ( n ) .
We assume an ideal root-raised cosine pulse shaping filter h(t), where the time index t shall indicate that pulse shaping needs to be performed at higher rate than chip rate (D/A and A/D conversion could actually be regarded as part of the pulse shaping and pulse-shape matched filters, respectively, which means that it becomes a continuous-time filter). Note that the energy per transmitted chip, Ec, can be expressed as,

E c = w 2 ∫ h 2 (t )dt = w 2 ,
−∞



as we assume that the filter coefficients are normalized such that the filter does not change signal energy. Due to linearity of the channel and filtering, we can exchange pulse-shape matched filter and AWGN channel. Then the concatenation of the two filters with impulse-response h(t) can be replaced by the raised-cosine filter hRC(t) = h(t)∗h(-t), which sampled at the t = nTc is equal to the delta-impulse function,

 1, for n = 0, hRC (nTc ) = δ (n) =  0, elsewhere,
which of course assumes that the sampling phase is chosen optimally. Using above we can express the received signal as

r ( n ) = s ( n ) + η ( n) = b ⋅ w ⋅ c ( n ) + η ( n) ,
where η(n) represents samples of band-limited Gaussian noise with bandwidth Rc = 1/Tc and 2 variance σ N which is equal to the noise spectral density N0 in the continuous-time domain.

3rd Generation Mobile Communication Systems

Page 3-26

Version 1.12 01.08.2000

b c(n) w

s(n)

Pulse Shaping Filter

AWGN

η(t)

Pulse-Shape Matched Filter

r(n)

Correlator

u

c*(n)

Figure 37: Basic spread spectrum transmission on AWGN The above equations can now be applied to all four cases given in Figure 35. We first consider the case of BPSK, where b ∈ {±1}, and real spreading c(n) ∈ {±1}. The correlation in the receiver results in

u = r (n), c(n) = s (n) + η (n), c(n) = b ⋅ w ⋅ c(n), c(n) + η (n), c(n) ,
where x, y shall denote the inner product of sequences of length G samples, i.e.

u = b ⋅ w ⋅ ∑ c 2 ( n ) + ∑ η ( n )c ( n ) = b ⋅ w ⋅ G + ∑ η ( n )c ( n )
n=0 n =0 n=0

G −1

G −1

G −1

Multiplication of the noise with c(n) does not change its distribution. The summation of the noise 2 yields a Gaussian distribution with variance Gσ N . The decision variable u can therefore be expressed by two conditional Gaussian pdfs, as illustrated in Figure 38.

p(u b = −1)

p(u b = 1)

-wG

Pb

wG

Figure 38: Representation of decision variable by two conditional pdfs

ˆ ˆ With the decision rule b = 1 for u > 0 and b = -1 for u < 0, the bit error probability Pb (which for BPSK is equal to the symbol error probability Ps) is given by the red area in Figure 38, which can be calculated as
2  w2G 2     = 0.5 erfc w G  . Ps = 0.5 erfc 2 2  σ NG   σN     
2 Using w 2 = E c , σ N = N 0 and the obvious relation that the symbol energy, Es, is G times the chip energy, we obtain

 Ec G   Es   = 0.5 erfc . Ps = 0.5 erfc  N   N  0  0   

3rd Generation Mobile Communication Systems

Page 3-27

Version 1.12 01.08.2000

Note that the same result holds for BPSK without any spreading, i.e. whether spreading is applied or not does not have any impact on performance. This result can be generalized for the other cases shown in Figure 35, (ii) real symbols b ∈ {±1}, complex spreading c(n) ∈ {±1±j}, (iii) complex symbols b ∈ {±1±j}, real spreading c(n) ∈ {±1}, and (iv) complex symbols {±1±j}, complex spreading c(n) ∈ {±1±j}. Exercise: Calculate the decision variables and symbol error probability for above cases. Note that the signal amplitudes must be scaled with 1 / 2 for complex signals compared to the real case discussed above. When other modulation schemes are employed in a spread-spectrum system, e.g. differential PSK, or orthogonal modulation, the same principle result would be obtained, i.e. spreading has no impact on performance for AWGN. An illustrative interpretation of spread-spectrum transmission is given in Figure 39. Before spreading, a signal has symbol rate Rs and energy Es. If transmitted at narrow bandwidth B = Rs, a signal-to-noise ratio (SNR) Es/N0 would occur, on both the channel and in the soft-decision variable of a narrowband receiver. With spreading, using a spreading factor G = Tc/Ts, the spread bandwidth becomes B = Rs G = Rc. The signal can now be transmitted on the AWGN channel at an SNR of Ec/N0. At the receiver, after despreading, the SNR in the decision variable is increased by the spreading gain G compared to the SNR on the channel and becomes again the same value as if narrowband transmission had been used. If we denote the SNR on the channel with S/N, where S refers to signal power and N refers to noise power in the transmission bandwidth, we can express the relationships as follows:

E R E R E 1 S = c c = s s = s . N N 0 Rc N 0 Rc N 0 G
Note that S = Ec Rc= Es Rs corresponds to the blue areas in Figure 39. It means that the same signal power leads to the same performance for both narrowband and spread-spectrum transmission. However, with spread-spectrum transmission the power spectral density can be by the spreading gain G lower. For example it can possibly be even lower than the noise floor N0. This is one feature of spread-spectrum communications which is often exploited in military communication systems. An advantage of spread-spectrum-transmission that is utilized in mobile radio is the much better capability of the wideband signal to resolve multipath of the channel. This capability is exploited in terms of a diversity gain. Note that to be able to resolve multiple propagation paths, the bandwidth of the transmit signal must be significantly larger that coherence bandwidth of the channel, which is approximately the inverse of the channel delay spread. A signal bandwidth of B =Rc basically allows to resolve one path per chip interval.

3rd Generation Mobile Communication Systems

Page 3-28

Version 1.12 01.08.2000

power spectral density Ec B=1/Tc

N0

frequency

spreading Es

power spectral density

despreading

N0

Rs =1/Ts

frequency

Figure 39: Illustration of spreading and despreading

3.5 Power control
In CDMA systems an accurate power control is essential especially on the uplink (explanation is given in Sec. 4.2) to combat distance attenuation and shadowing, as well as fast fading. In a single-user environment and on the downlink power control is not that cruicial, but also has the merit of transmit power saving and interference reduction. The principle of uplink and downlink power control as applied in UMTS is shown in Figure 40. The power control schemes is comprised by two loops: • • a fast inner loop that aims to control the power towards a given target, a slow outer loop that aims to adjust the power target based on a measure of quality, e.g. Block Error Rate (BLER).

3rd Generation Mobile Communication Systems

Page 3-29

Version 1.12 01.08.2000

±∆ dB

Meas.

target

Received TPC commands

Received TPC commands

target

Meas.

±∆ dB

UE

NODE B

Figure 40: Principle of inner and outer loop power control of UL and DL tx power

References
[3.1] [3.2] [3.3] [3.4] Wolfgang Koch, “Grundlagen der Mobilkommunikation”, Skript zur Vorlesung WS 99/00 J. G. Proakis, “Digital Communications”, McGraw-Hill, 3rd edition, 1995. E.H. Dinan, B. Jabbari, “Spreading codes for direct sequence CDMA and wideband CDMA cellular networks”, IEEE Communications Magazine, Sept. 1998, pp. 48-54. W.C.Y. Lee, “Mobile Communications Design Fundamentals”, Wiley, 2nd edition, 1993.

3rd Generation Mobile Communication Systems

Page 4-1

Version 1.12 01.08.2000

4 Multi-user and cellular aspects
4.1 Principles of multi-user access technologies applied in UMTS
Cellular systems need to provide means that several users can communicate simultaneously without creating too much interference between the various signals. The overall available radio resource in terms of spectrum, time and power needs to be divided into different channels which can be assigned to different users, allowing several simultaneous transmissions of information signals and the possibility to separate the various signals at the receiver. There are three fundamental schemes of providing access to multiple users, which are described as follows. Frequency Division Multiple Access (FDMA) In FDMA, an available spectrum B is divided into N frequency slots. Each frequency slot defines a different channel which can be assigned to a different user, see Figure 41. In FDMA the various channels can be seen as orthogonal, since normally there is only very small leakage of power from adjacent channels due to some guard space between adjacent spectra. In FDMA based cellular systems neighboring cells cannot use the same frequencies. Here a frequency reuse scheme must be applied which re-assigns the frequencies used in one cell to somewhat distant cells. The distance between such co-channel cells determines the amount of interference.

power/Hz

signal spectrum

Frequency slot n

n+1

n+2

n+3 frequency

Figure 41: Principle of FDMA

Time Division Multiple Access (TDMA) In TDMA, the time axis is divided into time frames of a fixed duration. Each frame is further divided into M time slots. Each time slot, which occurs periodically in each frame, defines a different channel which can be assigned to a different user, see Figure 42. The time frames are referred to as TDMA frames. In each time slot a user can transmit a signal burst, such that the slot boundaries are not exceeded. In TDMA systems the slot structure is defined be the base station. On the uplink, the user needs to take the transmission delay into account in order to ensure that the signal burst arrives at the base station with the correct timing within a time slot. The timing adjustment is referred to as timing advance.

3rd Generation Mobile Communication Systems

Page 4-2

Version 1.12 01.08.2000

power

TDMA frame

signal burst

time slot 1

2

3

M=4

1

2

3

4 time

Figure 42: Principle of TDMA

Code Division Multiple Access (CDMA) In CDMA, the users are allowed to transmit at the same time in the same frequency band. Different channels are established by employing different spreading codes in the transmitters. Despreading in the CDMA receivers allows to separate the various signals. Figure 43 illustrates the CDMA principle. The various user signals cannot be distinguished in the time or frequency domain. If there a K simultaneous transmissions the power (and power density) increases accordingly.
time power/Hz

frequency

Figure 43: Principle of CDMA

In most practical systems hybrid access schemes are applied, e.g. a combination of FDMA and TDMA, FDMA and CDMA, or a combination of all three schemes. The UTRA FDD mode can be interpreted as combination of CDMA and FDMA. The UTRA TDD mode is a combination of TDMA/CDMA and FDMA. Besides FDMA, TDMA, and CDMA there is a fourth access technology, which is needed for the initial access of a user to the radio system. At initial access, the user contacts the mobile network for the first time e.g. in order to obtain from the network the parameters of the FDMA, TDMA and CDMA channels (among others e.g. frequency, time slot, and/or code) that shall be used for the further communication. Random Access (RA) Random access is usually combined with one of the above principle access schemes. The main difference is that at initial access it is not possible to prevent that several users start to access the system simultaneously using the same frequency, time slot or code. This may cause a collision of random access signals. A random access channel is therefore referred to as a contention based channel.

3rd Generation Mobile Communication Systems

Page 4-3

Version 1.12 01.08.2000

The simplest random access scheme is referred to as ALOHA (due to its inventors affiliation with the University of Hawaii where this scheme was first used to implement a wireless Local Area Network). In ALOHA based access any user can transmit an access signal at any time. Whenever two signal bursts (“packets”) overlap with each other, there may be a collision which may destroy both packets such that they need to be retransmitted. The performance of random access channels is often described in terms of throughput efficiency (throughput vs. normalized load). The throughput S is defined as the probability of successful transmissions. The load G is defined as the packet arrival intensity λ times the (normalized) length of a packet, where it is assumed that the data packets are generated according to a Poisson point distribution with parameter λ,

P ( n = k ) = e − λt 0

(λt 0 )k
k!

The throughput SA of an ALOHA system can be derived as

S A = Ge −2G .
If ALOHA is combined with time division, a scheme called slotted ALOHA results. In slotted ALOHA, start of a transmission is allowed only at certain time slot boundaries. Slotted ALOHA achieves a higher throughput,

S SA = Ge − G .
Duplex techniques Duplex techniques are used to separate the transmission direction, i.e. signals in uplink direction from signals in downlink direction. In practice there are only two different duplex schemes, Frequency Division Duplex (FDD) and Time Division Duplex (TDD). In FDD, uplink and downlink transmission employ different frequency bands. Consequently FDD systems require a paired frequency band allocation. In TDD a common frequency band is used. The signals are separated by using different time slot(s) in uplink and downlink directions. Naturally, TDD systems are often combined with TDMA access schemes. The fact that transmission and reception never occurs simultaneously in TDD has some implementation advantages. In FDD CDMA there is a diplexer needed in a mobile to separate transmission directions at the antenna. A Diplexer must cope in the transmit direction with the high transmit power and provide in the receive direction a very high isolation such that the transmitter does not interfere the low-power receive signal. In TDD a simple switch can be used. Due to this advantage also in FDD TDMA systems it is often avoided to employ simultaneous transmission and reception, for instance in GSM.

3rd Generation Mobile Communication Systems

Page 4-4

Version 1.12 01.08.2000

4.2 Interference characteristics and impact on cell planning
4.2.1 Interference situation on the Uplink
Figure 44 illustrates the interference situation on the uplink of a CDMA system. Cells and users are numbered. In all cells the same frequency is used. On the uplink, the receiver is at a fixed location, the interferers are distributed throughout the cellular system and may be moving. We consider the interference situation in cell 0. The base station in cell 0 receives signals with powers S0k, k=0,…,K from the users of its own served cell. Furthermore signals from users served in other cells are received. The received power of these external cell users are denoted as Inm, where n = 1,…,N shall denote cell numbers and m = 0,…,MN shall denote the users served in cell n. We now consider the signal with power S00 as the desired signal, and regard all power received from other users as interference. Obviously, we can distinguish between to types of Interference: • • Intra-cellular interference, due to signals with powers S1k, k=1,…,K, Inter-cellular interference, due to signals with powers Inm, n = 1,…,N, m = 0,…,MN.

We now first consider the intra-cellular interference. On the CDMA uplink, it would be very difficult to synchronize in a cell all user transmissions, by means of timing advance, such that all codes from all users would arrive at a defined time instant, such that for example orthogonality properties of the codes could be exploited. In all present CDMA system, on the uplink asynchronous transmission is employed. If we further assume that codes with random correlation properties are used as discussed in Section 3.2.2 (Figure 33), the bit-level modulation on the interfering signals does not have any impact on the interference characteristics. In simplified form (we assume here that the carriers of each interferer are phase-synchronous with the desired signal, and the chip intervals are also synchronized) and, we can write the received signal as

r (n) = ∑ s 0 k (n) + η (n) = b00 ⋅ S 00 ⋅ c 00 (n) + ∑ S 0 k ⋅ c0 k (n) + η (n) .
k =0 k =1
∗ Correlation with the conjugated spreading code c00 ( n) of the desired signal s 0 k (n) results in the decision variable

K

K

∗ ∗ ∗ ∗ u (n) = r (n), c00 (n) = b00 ⋅ S 00 ⋅ c00 (n), c00 (n) + ∑ S 0 k ⋅ c0 k (n), c00 (n) + η (n), c 00 (n) k =1

K

The scaled inner products

S 0 k c0 k (n), c (n) characterize the intra-cellular interference. As

∗ 00

we know from Figure 33, in a statistical sense, these cross-correlation samples behave like Gaussian noise with variance S0k G. The total signal-to-noise ratio in the decision variable can be expressed as

E s 00 S 00 = G= ′ N0 N

S 00 Nη + ∑ S 0k
k =1 K

G=

S 00 N 0 Rc + ∑ Ec 0 k Rc
k =1 K

Rc = Rs

E s 00 N 0 + ∑ Ec0k
k =1 K

3rd Generation Mobile Communication Systems

Page 4-5

Version 1.12 01.08.2000

cell 3 S00 S01 UE 01 I01 I10 UE 00 cell 5 UE 10 cell 6 cell 0 I00 S10 cell 1 cell 2

cell 4

Figure 44: Interference situation on CDMA uplink Note that if the powers S0k of the interfering signals would be very different from S00 due to shadowing and distance attenuation, the signal-to-noise ratio could become very bad even for only a single interferer, if it cannot be compensated by the gain. Especially on the CDMA uplink therefore a power control is very important in order to achieve a reasonable capacity (i.e. number of users that can transmit simultaneously). The power control shall ensure that all signals are received at a power level or signal-to-noise ratio that provides just the desired error rate requirement. This means that in a system where all users would transmit at the same bit rate and have the same error requirement, the same received power S0k = S, k = 0,…,K, would need to be adjusted by means of power control. Above relation then simplifies to

Es Rc Es S S S 1 = G= G= = = . ′ N0 N Nη + K ⋅ S N 0 Rc + KE c Rc Rs N 0 + KE c N 0 / E s + K / G
Note that in a TDMA and FDMA system intra-cellular interference does not exist. It is actually a big drawback of CDMA systems which needs to be compensated by some other means. We now consider also the inter-cell interference on the uplink. All users in other cells than the one that serves the desired user, are power controlled in relation to their own serving base station. This means that the interference powers Imn, n = 1,…,N, m = 0,…,MN experienced in the desired cell n = 0 are impacted by shadowing and distance attenuation, and thus each are characterized by strong variations. If we assume that all cells are equally loaded with K+1 users (i.e. MN = K) , we can include intra-cellular interference into the above equation as follows:

Es S S 1 = G= G= , ′ N0 N N η + K ⋅ S + I inter N 0 / E s + K / G + I inter /( S ⋅ G )
where the intra-cellular interference power can be expressed as a sum of all its components

I inter = ∑ ∑ I mn .
n =1 m = 0

N

K

Note that an important assumption made above is that intra-cellular interference can be modeled as an additional AWGN source with a power equal to the average power of the sum of all inter-

3rd Generation Mobile Communication Systems

Page 4-6

Version 1.12 01.08.2000

cell interferers. Due to the possibly large variations of each single component of Iinter this model may not always be appropriate. If the number of interferers is very large however one can prove that the model is acceptable. It should be noted, that in a TDMA system this assumption would not be appropriate since here the main interference usually is received from just a single user in the closest co-channel cell. The desired interference –averaging effect similar as in a CDMA system can however be achieved also with TDMA by introducing frequency-hopping. In the above expression of Es/N0, the intra-cell interference Iinter is normalized to the receive power S which is assumed as the fixed target level of power control in all cells. In Sec. 4.5 it will be shown that the term Iinter/S depends on channel conditions such distance attenuation and path loss and that it is independent of S.

4.2.2

Interference situation on the Downlink

Figure 45 illustrates the interference situation on the downlink of a CDMA system. On the downlink, the interferers are at a fixed location, the receiver can be located anywhere in a cell and may be moving. From its own serving base station a user in cell 0 (denoted as UE 00 in the figure) receives a signal which includes the desired signal with power S00 as well as the signals dedicated to other users of that cell S0k, k = 1,…,K. In a real system there are furthermore some common channels transmitted by a base station. We ignore common signals for the moment. The signals from the base station of the own cell of a desired user may cause intra-cellular interference. The power received at the desired user from all other base stations in the system, denoted as In, n = 1,…,N causes inter-cellular interference.

I3 I4 cell 4 I5 S00 S0k I1 I6 UE 00 cell 5 cell 6

cell 3 I2 S01 cell 0 UE 01 cell 1 cell 2

Figure 45: Interference situation on CDMA downlink A base station transmits all channels chip and phase synchronously. Therefore the components of the base station signal also arrive chip-and phase aligned among each other at the mobile station. All components underly the same disturbance due to the channel, i.e. they are e.g. equally attenuated (due to pathloss and shadowing), affected by a complex fading coefficient (causing further attenuation and phase rotation) and possibly affected by channel delay spread (due to multipath transmission). If we consider first only attenuation and additive noise of the channel, the signal received at UE 00 can be written as

3rd Generation Mobile Communication Systems

Page 4-7

Version 1.12 01.08.2000

r (n) = ∑ s 0 k (n) + η (n) = b00 ⋅ S 00 ⋅ c 00 (n) + ∑ b0 k ⋅ S 0 k ⋅ c0 k (n) + η (n) ,
k =0 k =1

K

K

where for simplicity we assume that all user signals employ the same spreading factor G. In this case the transmit power may be set equal for all channels, which means that the received power of all components would also be equal, i.e. S = S0k, k = 0,…,K. If we perform correlation at the ∗ receiver with the conjugated spreading code c00 ( n) of the desired signal s 0 k (n) , and assumed
∗ that orthogonal codes are employed, c0 k (n), c00 (n) = 0 , for k = 1,…,K, the decision variable

is only affected by thermal noise, not by intra-cellular interference. In case of multipath, however, the orthogonality is lost to some degree, which depends on the multipath profile. We can conclude that on the downlink, in contrast to the uplink, no power control is required to combat intra-cellular interference. However, in a real system, the power of each signal needs to be adjusted such that each user receives its desired signal at a sufficient signal-to-noise ratio, taking into account that each user may be located at a different position within the cell and experience especially its individual attenuation factor. These attenuations must in practice be compensated with respective transmit power weight factors w in the base station. Figure 46 shows a possible model of CDMA downlink transmission. As there is a limit for the maximum total power of the base station the weights must be chosen such that the condition

∑w
k =0

K

2 k

≤1

is fulfilled.

b0 cch 0 w0 b1

.c . ch 1 .
bK cch K

Σ w1 cscr wK

s

Pulse Shaping Filter Static Multipath Channel

inter-cellular interference

cch 0 cscr
AWGN

u(n)

RAKE receiver for ch 0

r

Pulse-Shape Matched Filter

Figure 46: Model of downlink transmission in a CDMA system

3rd Generation Mobile Communication Systems

Page 4-8

Version 1.12 01.08.2000

4.3 Link budget
Objective of link budget analysis is an estimation of the cell radius for which a desired coverage with signal power is achieved. Coverage is defined in terms of the probability that the received power exceeds a certain threshold at the cell boundary (and thus anywhere within the cell area). We use following notation: • • • • • • • Srx received power Srxreq required signal power to achieve acceptable performance Fr = Prob {Srx > Srxreq}, coverage probability at the cell boundary for cell radius r Stx effective transmit power level (taking into account maximum output power and all losses, i.e. reflection loss, cable losses) Gtx gain of transmit antenna Grx gain of receive antenna Lp propagation loss, depending on cell radius, wave length λ, antenna heights, hb and hm, of the base and mobile station respectively, the environment etc.

From transmit power, antenna gains and path loss (assumed as constant), the received power can be calculated as

S rx = S tx Gtx Grx / L p .
The product of transmit power and transmit antenna gain Stx Gtx is referred to as EIRP (effective isotropic radiated power), i.e. the power in the main direction relative to an isotropic antenna (Hertzian dipol). The receive antenna gain Grx comprises a gain of directivity in receive direction due to higher effective area (relative to an isotropic receive antenna when given in dBi units). We assume a propagation exponent n (e.g. n = 4), then Lp ∝ rn and log-normal distributed shadowing with standard deviation σ (e.g. σ = 8 dB), then Lp ∝ 10ζ/10, where ζ is the shadowing variable in the logarithmic domain (i.e. power in dB). Then the propagation loss can be modeled as log-normally distributed random variable

L p = C (r )10 ς / 10 ,
and the mean path loss in dB can be expressed as

E 10 log10 L p = L p (dB) = 10 log10 C (r ) ,
where C(r) is a path loss function in the linear domain, which depends on radius r, propagation exponent n, and other factors (see below). The coverage probability can be expressed in terms of a shadowing margin ∆Sm = S rx - Srxreq by which the mean received power S rx should be larger than Srxreq, in order to reach this threshold with the desired probability Fr,

[

]

 − ∆S m  Fr = 0.5 erfc . σ 2 
Above yields Fr = 0.95 for ∆Sm= 13 dB and σ = 8 dB.

3rd Generation Mobile Communication Systems

Page 4-9

Version 1.12 01.08.2000

Commonly used path loss models have been proposed by e.g. Egli and Hata. The Egli path loss model for propagation exponent n = 4 is

L p (dB) = 40 log r (km) − 20 log(hb hm ) + 20 log f MHz / 40 + 120 ,
which results for fMHz = 2300, hm = 2 m and hb = 36 m in

L p (dB) = 40 log r (km) + 118 .
Path loss calculation is illustrated in Figure 47, where all parameters should be interpreted in dB units. StxPA is the maximum transmit power delivered by the amplifier of the transmitter. At both transmitter and receiver some power losses might occur between antenna foot-point and amplifiers due to attenuation on cables and reflections, referred to as Ltx and Lrx. From StxPA reduced by Ltx and increased by the transmit antenna gain Gtx results in the transmitter EIRP. From the transmitter EIRP, increased by receive antenna gain Grx, reduced by losses Lrx, we get the average receiver power S rx by subtracting the assumed average path loss L p . Using the relation S/N = (Es/N0)/G, we can compute the required receive power Srx req for a given desired Es/N0 and spreading gain G, for noise power N = -102 dBm which results from N0 = -174 dBm/Hz, bandwidth 67 dB (5 MHz), and an assumed receiver noise Figure of 5 dB. If we then chose as target mean power S rx = ∆Sm + Srx req it is ensured that Srx is with probability Fr larger than Srx req . After the maximum average path loss is determined the cell radius r (km) can be computed from e.g the above path loss model.

3rd Generation Mobile Communication Systems

Page 4-10

Version 1.12 01.08.2000

Tx EIRP StxPA Stx Ltx Gtx

Grx

Lrx

Cable & Connector losses (receiver)

0 dbm

N

Es / N 0 102 dbm G

Lp

S rx

∆S m

S rxreq

Figure 47: Illustration of path loss calculation for link budget As an example we consider following parameters for a typical uplink scenario: For (Es/N0) = 3 dB and G = 21 dB (128), with above assumptions for the noise power, we obtain Srx req = -120 dBm. This gives S rx = -107 dBm for ∆Sm= 13 dB. Assuming StxPA = 36 dBm (4 Watt), Ltx = 0.5 dB, Gtx = 2 dB, Grx = 10 dB, Lrx = 2.5 dB, and S rx = -107 dBm from above, we obtain L p = 152 dB. From this a cell radius r = 1034/40 = 7.08 km can be derived. The blue curve in Figure 47 illustrates an example of path loss variation around its mean L p . The red area indicates when pathloss is larger than L p + ∆Sm which means that Srx < Srx req , i.e. “outage” from the targeted requirement. The “outage probability” is equal to the complement of coverage probability, 1 – Fr.

3rd Generation Mobile Communication Systems

Page 4-11

Version 1.12 01.08.2000

Note that for a chosen probability Fr on the cell boundary, it follows that the probability Fa that satisfactory power is provided to all users within the overall cell area is higher, Fa > Fr. Fr can be interpreted as the coverage probability in a small ring of width dr of a circle-shaped cell, i.e. in an area 2π r dr, see Figure 48. The cell-area related coverage probability Fa can be obtained by integrating 2π r Fr dr over the radius and scaling with the cell area πR2.

Fa =

2 rFr (r )dr R2 ∫ 0

R

Fa is a function of the normalized shadow margin ∆Sm/σ, and the ratio σ/n (see [3.1]).

R dr r

Figure 48: Area with coverage probability Fr on cell radius r When power control is employed in the transmitter to compensate shadow variations it is only possible to reduce the transmit power Stx such that the actual received power Srx is not larger than Srxreq. At the cell boundary it is not possible to compensate that Srx becomes with probability 1-Fr smaller than Srxreq when the cell radius is determined for maximum transmit power, as in the case considered here. In the above case of link budget analysis we have only considered service for a single user with regard to thermal noise. If there is also interference present, the thermal noise power N needs to be replaced by the total noise-and-interference power N’ = N + I. Very obviously in this case the maximum cell size reduces compared to the pure thermal noise condition. It depends on the load in the cell, since the interference level changes with load. If a system of several cells is considered, we need to distinguish between intra-cellular and intercellular interference due to possibly different characteristics especially since inter-cell interference is not power controlled with respect to the desired signal.

3rd Generation Mobile Communication Systems

Page 4-12

Version 1.12 01.08.2000

4.4 Handover
Handover (also referred to as handoff) is a procedure where a user’s connection is transferred from one radio channel to another. Generally we can distinguish between intra-cell handover and inter-cell handover. Intra-cell handover refers to the case where a radio channel within the same cell is changed. Inter-cell handover refers to the case where the change of radio channel is combined with a change of the serving cell. In the literature very often the latter case is meant when using the term handover. Here we will also use the term handover equivalent with inter-cell handover, unless it is explicitly mentioned otherwise. There are following categories of handover: • Hard Handover Hard handover is a category of handover procedures where all the old radio links in the UE are removed before the new radio links are established. Hard handover can be seamless or non-seamless. Seamless hard handover means that the handover is not perceptible to the user. Whether it is perceptible or not depends on the time that passes between removal of the old and activation of the new radio links. In practice a handover that requires a change of the carrier frequency, i.e. inter-frequency handover, is always performed as hard handover. Note that the term radio link refers to the logical association of all physical channels between a UE and a base station providing service in one cell. Soft Handover Soft handover is a category of handover procedures where the radio links are added and removed in such manner that the UE always keeps at least one radio link to the UTRAN. Soft handover is performed by means of macro diversity. Macro diversity refers to the condition that several radio links are active at the same time. In practice, soft handover can be applied when cells are changed which are operated on the same frequency. Note however that such an intra-frequency handover is not always performed as soft handover on some channels even Softer handover Softer handover is a special case of soft handover where the radio links that are added and removed belong to the same Node B (i.e. the site of co-located base stations from which several sector-cells are served. In softer handover, macro diversity with maximum ratio combining can be performed in the Node B, whereas generally in soft handover on the downlink, macro diversity with selection combining is applied.





For UMTS the following types of handover are specified: • • • • • • • • Handover 3G -3G (i.e. between UMTS and other 3G systems) FDD soft/softer handover FDD inter-frequency hard handover FDD/TDD handover TDD/FDD handover TDD/TDD handover Handover 3G - 2G (e.g. handover to GSM) Handover 2G - 3G (e.g. handover from GSM).

3rd Generation Mobile Communication Systems

Page 4-13

Version 1.12 01.08.2000

Note that a change of UTRA transmission mode (FDD or TDD) implies a change of cell. The most obvious cause for performing a handover is that due to its movement a user can be served in another cell more efficiently (e.g. less power emission, less interference). It may however also be performed for other reasons such as e.g. system load control. An example of soft handover is shown in Figure 49. With regard to soft handover, the term "Active Set" is defined as the set of Node-Bs the UE is simultaneously connected to (i.e., the UTRA cells currently assigning a downlink DPCH to the UE constitute the active set). The soft handover procedure is composed of a number of individual functions such as measurements, filtering of measurements, reporting of measurement results (from UE to network), soft handover algorithm, execution of handover.

The measurements of the monitored cells filtered in a suitable way trigger the reporting events that constitute the basic input of the Soft Handover Algorithm. The definition of ‘Active Set’, ‘Monitored set’, as well as the description of all reporting events are given in TS 25.331. Based on the measurements of the set of cells monitored, the Soft Handover function evaluates if any Node-B should be added to (Radio Link Addition), removed from (Radio Link Removal), or replaced in (Combined Radio Link Addition and Removal) the Active Set; performing than what is known as "Active Set Update" procedure. Example of a Soft Handover Algorithm A describing example of a Soft Handover Algorithm presented in this section which exploits reporting events 1A, 1B, and 1C described in TS 25.331 It also exploits the Hysteresis mechanism and the Time to Trigger mechanism described in TS 25.331. Any of the measurements quantities listed in TS 25.331 can be considered. The soft handover algorithm shown in Figure 49 requires following parameters: - AS_Th: Threshold for macro diversity (reporting range) - AS_Th_Hyst: Hysteresis for the above threshold - AS_Rep_Hyst: Replacement Hysteresis - ∆T: Time to Trigger - AS_Max_Size: Maximum size of Active Set.

3rd Generation Mobile Communication Systems

Page 4-14

Version 1.12 01.08.2000

∆T
Measurement Quantity CPICH 1

∆T

∆T

As_Th + As_Th_Hyst

AS_Th – AS_Th_Hyst

As_Rep_Hyst

CPICH 2

CPICH 3

Time Event 1A ⇒ Add Cell 2 Event 1C ⇒ Replace Cell 1 with Cell 3 Event 1B ⇒ Remove Cell 3

Cell 1 Connected

Figure 49: Example of Soft Handover Algorithm The soft handover algorithm illustrated in Figure 49 works as follows: If Meas_Sign is below (Best_Ss - As_Th - As_Th_Hyst) for a period of ∆T remove worst cell in the Active Set. If Meas_Sign is greater than (Best_Ss - As_Th + As_Th_Hyst) for a period of ∆T and the Active Set is not full add Best cell outside the Active Set in the Active Set. If Active Set is full and Best_Cand_Ss is greater than (Worst_Old_Ss + As_Rep_Hyst) for a period of ∆T add Best cell outside Active Set and Remove Worst cell in the Active Set. Best_Ss :the best measured cell present in the Active Set; Worst_Old_Ss: the worst measured cell present in the Active Set; Best_Cand_Set: the best measured cell present in the monitored set . Meas_Sign :the measured and filtered quantity.

Where: -

Soft Handover Execution A soft handover is executed by means of the following procedures described in TS 25.331: Radio Link Addition (FDD soft-add) Radio Link Removal (FDD soft-drop)

3rd Generation Mobile Communication Systems

Page 4-15

Version 1.12 01.08.2000

-

Combined Radio Link Addition and Removal

The serving cell(s) (the cells in the active set) are expected to have knowledge of the service used by the UE. The new cell decided to be added to the active set shall be informed that a new connection is desired, and it needs to have the following minimum information forwarded from the RNC: Connection parameters, such as coding schemes, number of parallel code channels etc. parameters which form the set of parameters describing the different transport channel configurations in use both uplink and downlink. The UE Identifier and uplink scrambling code The relative timing information of the new cell, in respect to the timing, the UE is experiencing from the existing connections (as measured by the UE at its location). Based on this, the new Node-B can determine what should be the timing of the transmission initiated in respect to the timing of the common channels (CPICH) of the new cell. What channelisation code(s) are used for that transmission (channelisation codes from different cells are not required to be the same as anyway different scrambling codes are employed on each radio link).

-

As a response the UE needs to know via the existing connections: -

Handoff gain or loss with regard to link budget analysis: Distance controlled HO: due to slightly smaller cell area than circle Power controlled HO: higher probability that at least from one BS in a multicell system sufficient power received, in practice gain reduced by loss due to hysteresis and delay

4.5 System capacity and spectral efficiency
System capacity and spectral efficiency are measures how efficient an available spectrum is utilized for mobile communications. System capacity and spectral efficiency are defined very similarly. The main difference is that spectral efficiency is normalized to a unit of bandwidth, i.e. spectrum efficiency is equal to “capacity per MHz”. There are several definitions of spectral (or spectrum) efficiency in the literature, and terms are sometimes not used consistently. We will use the following definitions: • • Cell capacity: Maximum number of users, which can be served simultaneously normalized to 1 MHz of bandwidth (“number of channels per cell per MHz”). Traffic capacity: Maximum traffic per cell per MHz, calculated with the Erlang-B formula from the cell capacity (where cell capacity is the number of offered channels in the Erlang-B formula) for a given blocking probability. Information capacity: Maximum total data rate that can be served per cell and MHz bandwidth (“kbps per cell per MHz”). This measure is especially well suited to measure capacity when a mix of channels with different rates are served by the system. In case all channels have the same fixed rate, information capacity is equal to cell capacity multiplied with the channel bit rate.



System capacity is sometimes also defined in terms of traffic or channels per unit area (e.g. per square-kilometer).

3rd Generation Mobile Communication Systems

Page 4-16

Version 1.12 01.08.2000

The basis of spectral efficiency calculations is a measure of quality of service (QoS) which needs to be satisfied by all or at least a certain fraction of users under maximum load conditions. Usually the so-called equivalent signal to noise ratio Eb/N0’ per information bit (sometimes also referred to as signal to interference and noise ratio) is used as measure of service quality. This signal to noise ratio shall be equal to or better than a given threshold needed to achieve a desired tolerable bit error rate Pbreq after channel decoding. In this case the QoS criterion is fulfilled and the user is served satisfactorily. Note that the Eb/N0’ per information bit is related to the Es/N0’ per symbol defined in Sec. 4.2.1 as follows,

E s = Ebe log 2 M =

k Eb log 2 M n

Es S k Eb = G= log 2 M , ′ ′ N0 N n N0
where M is the level of the modulation (M = 2 for BPSK, M = 4 for QPSK) and k/n is the code rate.

4.5.1

Simple spectrum efficiency calculation for a single-cell system

A very simple evaluation of the capacity of a single cell system employs the formula (see Sec. 4.2.1)

Es S S 1 = G= G= , ′ N0 N Nη + K ⋅ S N 0 / Es + K / G
and determines the maximum number of interfering users Kmax such that Eb/N0’ ≥ Eb/N0’(Pbreq) is met. Expressing Es by Eb in above equation yields

Eb S n = G = ′ N 0 N k log 2 M

1 1 = , K log 2 M K N 0 / Eb + N 0 / Eb + Gb G⋅n/k

where in the rightmost expression we have introduced the overall bandwidth extensions factor Gb which expresses the factor of spreading of a bit before encoding into the bandwidth of the chips after spread-spectrum modulation:

Gb =

G⋅n/k . log 2 M

Gb is equal to the symbol spreading factor G times the inverse code rate n/k and divided by the number of encoded bits per modulation symbol. The inverse code rate can be interpreted as spreading factor due to encoding. The term 1/log2 M is the bandwidth saving factor of higher level modulation. G refers to the spreading factor involved in replacing a modulated symbol with a spreading sequence (this operation can be interpreted as a form of repetition encoding and is therefore sometimes referred to as “dumb” spreading, since there is no extra coding gain achieved at the receiver). Using above we can calculate Kmax from

3rd Generation Mobile Communication Systems

Page 4-17

Version 1.12 01.08.2000

Eb E ≥ b ( Pbreq ) = ′ ′ N0 N0

1 N 0 / Eb + K max Gb

by resolving the equation to Kmax for a given Eb/N0’(Pbreq). Remember that the above relations assume ideal power control of all users in the cell, i.e. all signals are received at the same power level S. This has the effect that calculation of Kmax appears to be independent of absolute power levels. The signal power could be chosen such that the thermal noise, i.e. N0 /Eb, does not impact the capacity result significantly. However the larger S is chosen, the smaller is the potential cell size, see Sec. 4.3. The choice of S determines the Eb/N0 to be used in above formula for calculation of Kmax. If it is chosen large relative to Kmax/Gb, it can be neglected and we obtain Kmax ≈ Gb/(Eb/N0’(Pbreq)) = G/(Es/N0’(Pbreq)), for Eb/N0 >> Kmax/Gb. The term K/Gb is sometimes denoted as normalized load of the cell. Example: We consider a BPSK system (M = 2) with rate 1/3 convolutional coding. We assume that for specific channel conditions Eb/N0’(Pbreq) = 5 dB. Then Es/N0’(Pbreq) = (5 – 4.78) dB = 0.22 dB need to be achieved. The result is Kmax ≈ G⋅10-0.022 = G/1.05 = Gb⋅10-0.5 = 0.3175 Gb. If e.g. G = 128 we obtain Kmax ≈ 121, i.e. together with the desired user in total 122 users can be served in the cell. Figure 50 illustrates Eb/N0’ versus normalized load K/Gb graphically, for two cases, Eb/N0 → ∞ (as used in the above example) and Eb/N0 = 10 dB. Note that both Eb/N0’ and normalized load are represented in the logarithmic domain. It can be seen that with Eb/N0 = 10 dB the maximum normalized load Kmax/Gb is already significantly smaller than in the case where thermal noise was neglected.
20

15

Eb/N0 → ∞ Eb/N0 = 10 dB

Eb/N0’ (dB)

10

5

Eb/N0’(Pbreq)
0

-5 -3 10

10

-2

10

-1

10

0

K/Gb

Kmax/Gb

Figure 50: Signal-to-interference and noise ratio (per bit) versus normalized load

3rd Generation Mobile Communication Systems

Page 4-18

Version 1.12 01.08.2000

From Figure it also becomes obvious that Kmax increases when Eb/N0’(Pbreq) can be made smaller due to gains in signal processing. For instance with increasing the degree of diversity, possibly the desired Pbreq is already achieved at lower Eb/N0’, see Sec. 5.

4.5.2

Simple spectrum efficiency calculation for a cellular CDMA system

A simple evaluation of the capacity of a cellular CDMA system employs the formula from Sec. 4.2.1

Es S S 1 = G= G= , ′ N0 N N η + K ⋅ S + I inter N 0 / E s + K / G + I inter /( S ⋅ G )
where the intra-cellular interference power is expressed as sum of all its components

I inter = ∑ ∑ I mn .
n =1 m = 0

N

K

We can express S, the power received at the base station in cell n from UE mn, and Imn , the interference power received in cell 0 due to UE mn, using the relations given in Sec. 4.3. We express the path loss as a function of the distance d between transmitter and receiver

L p = C (d )10 ς / 10 = C ⋅ d p ⋅ 10 ς / 10 ,
where C is some constant which is assumed the same on all transmission links (includes carrier frequency, antenna heights etc.). Then we can write (see Figure 51):
− S = S rx , mn = S tx , mn G tx G rx C ⋅ d mnp ⋅ 10 − ς mn / 10

p I mn = S tx , mn Gtx Grx C ⋅ d 0−,mn ⋅ 10

−ς 0 , mn / 10

.

The transmit power Stx,mn is power controlled such that path loss and shadowing are compensated. Inserting the first equation into the second yields

 d  (ς −ς ) / 10 I mn d p ⋅ 10ς mn /10 = pmn =  mn  10 mn 0 ,mn , ς / 10 d  S d 0,mn ⋅ 10 0 ,mn  0,mn 
i.e. the ratio of interference and desired power depends only on the (inverse) ratio of distances between interferer and the interfering and desired base stations propagation exponent p and the difference of the Gaussian distributed shadowing processes ζ with standard deviation σ. In a simple estimation of spectrum efficiency we just model the inter-cell interference as an amount of power proportional to the intra-cell interference K/G,

p

Es 1 = ′ N 0 N 0 / E s + K / G + βK / G
with a proportionality factor β , which is derived from geometrical considerations while the shadowing variable is not taken into account. In this approach Imn is computed as the areaintegral of d mn / d 0,mn

(

)

p

for each hexagonal cell An, and the result is summed over all n cells that

surround cell 0 with the desired user:

3rd Generation Mobile Communication Systems

Page 4-19

Version 1.12 01.08.2000

N K I I K + 1 N  d mn   dA βK = inter = ∑ ∑ mn = ∑  S Ahex n =1 ∫∫  d 0, mn  n =1 m = 0 S An  

p

Here Ahex refers to the area of a hexagon with unit (outer) cell radius, Ahex = 3 3 / 2 . Above results in β ≈ 0.4 for p = 4, i.e. the inter-cell interference amounts to about 40 % of the intra-cell interference.

S00 = S Imn d0,mn, ζ0,mn UE 00 cell 0 dmn, ζmn Smn = S

cell m UE mn

Figure 51: Illustration of Interference calculation

4.5.3

More exact calculation of CDMA spectrum efficiency

The more exact evaluation of capacity uses a statistical approach where the deviation of inter-cell power due to shadowing is taken into account. Then the inter-cell interference becomes a random variable, and consequently also Es/N0’. The maximum number of users per cell can be calculated from imposing a condition on Es/N0’, such that it is with a desired probability Ps larger than the threshold for satisfactory performance in terms of bit error rate. This probability is referred to as service probability Ps,
’ ’ Ps = Prob{Pb ≤ Pbreq } = Prob E s / N 0 ≥ E s / N 0 ( Pbreq ) . ’ ’ Po = Prob{Pb > Pbreq } = Prob E s / N 0 < E s / N 0 ( Pbreq )

{

}

The complement of service probability,

{

}

is denoted as outage probability. One possibility to calculate spectrum efficiency would be to apply Monte-Carlo-Simulation methods, where many snapshots of interference situations are simulated. For each such snapshot K users per cell are distributed in a cellular system, with random locations and spatially uniform distribution. For each user random shadowing variables ζ are taken from a Gaussian distribution Then a value of Es/N0’ can be computed for each such snapshot. Repeating this many times we can derive a probability distribution of Es/N0’ and check whether the service probability condition is fulfilled. The largest number of users Kmax, for which the service probability condition is met defines the capacity of the system. The distribution of intercell-interference is a sum of many with d mn / d 0,mn

(

)

p

weigthed log-

normal distributed random variables. When Kmax is large it is obvious that due the sum of these random variables becomes normal distributed to the central limit theorem. Using the assumption

3rd Generation Mobile Communication Systems

Page 4-20

Version 1.12 01.08.2000

of normally distributed Iinter it is sufficient to calculate its mean and variance. The result can be found in [4.4]. An important feature of CDMA systems is that transmission activity can very easily be taken into account for increasing the capacity. For example speech activity in normal conversations is in the order of 50% in each direction, which means that only in 50 % of the time a speech signal needs to be transmitted, whereas during the other time the channel could be switched off completely or only some background noise would need to be transmitted at a very low rate. If we assume that the channel is switched off during voice activity then the intra-cell interference becomes

I intra = ∑ χ k ⋅ S
k =1

K

where χk refers to the transmission activity process of user k,

1, with probability χk =  0, with probability 1and α is the transmission activity factor (e.g. 0.5). With the assumption of transmission activity, Iintra becomes a binomial distributed random variable. The mean of the inter-cell interference is reduced by the factor α.. Also the variance of inter-cell interference becomes smaller. Note that when inter-cell interference is normal distributed and intra-cell interference is binomial distributed, the total interference (i.e. the sum) becomes the convolution of the two distributions.

4.5.4

Calculation of spectrum efficiency for TDMA

In a TDMA system the most important parameter that effects spectrum efficiency is the frequency reuse factor, also referred to as cell cluster size, which is the number of cells that require different frequencies. Figure 52 illustrates the frequency reuse principle for a cell cluster size of Cf = 7. In this example one ring of cells around any given cell uses different frequency channels. The interference between cells with the same frequency (e.g. the red “co-channel” cells in Figure 52) is determined by the frequency reuse distance D, i.e. the distance between the centers of two co-channel cells. D and Cf are related to each other by the equation

Cf =

(D / r )2 ,
3

where r is the outer radius of a hexagonal cell. In a fully loaded TDMA system there is a single user in each co-channel cell, creating interference in one considered cell. There is no intra-cell interference in a TDMA system. Spectrum efficiency for TDMA can be calculated similar as described in above section 4.5.3 for CDMA, by first calculating the distribution function of interference for different frequency reuse distance D and then selecting a cluster size Cf that satisfies the service probability condition. Then spectrum efficiency of TDMA (in terms of users/cell/MHz) can be calculated as

eTDMA =

M ⋅B/b M , = B ⋅C f b ⋅C f

where b is the bandwidth of one frequency channel, B is the total available bandwidth of the TDMA system, and M the number of slots per TDMA frame. Note that at least a bandwidth of B = b⋅Cf is required to establish the TDMA system. The term B/b is the actual number of

3rd Generation Mobile Communication Systems

Page 4-21

Version 1.12 01.08.2000

available frequency channels. For instance in GSM with M = 8 TDMA slots, b= 200 KHz (B = 25 or 35 MHz), we obtain a spectrum efficiency of eTDMA = 4.4 channels/MHz/cell for Cf = 9. If it would be possible to establish a cluster size of Cf = 9, spectrum efficiency would increase to eTDMA = 5.7 channels/MHz/cell.

f1 f1 f1 f1 f1 f7 f6 f5 f1 f3 f4 f1 f1 f1 f2 f1 f1 D

Figure 52: Illustration of a frequency reuse pattern 7 It is not possible to establish regular frequency reuse pattern for any integer Cf which allow to cover the whole area. The condition Cf = i2 + ij + j2 (i, j integers) must be fulfilled in order to result in a regular cell pattern (e.g. Cf = 1, 3, 4, 7, 9, 12,…).

4.5.5

Comparison of CDMA and TDMA spectrum efficiency

As there is normally only a single interferer in each TDMA co-channel cell there is not as much averaging of interference powers as in CDMA. This results in that interference in TDMA is very close to a pure log-normal distribution (due to the shadowing model) which is characterized by a very long tail with rather large probability density. In contrast, in CDMA the averaging of many interferers results in an overall interference power distribution which is well approximated by a Gaussian distribution which has low tail probability. This interference averaging effect of CDMA is referred to as interferer diversity. In TDMA interferer diversity can also be achieved when slow frequency hopping is applied (i.e. change of the carrier frequency from one TDMA frame to the next according to some predefined hopping pattern). Without frequency hopping TDMA has significantly worse spectrum efficiency than CDMA. However, when frequency hopping is applied, the advantage of CDMA vanishes more and more. Still CDMA has the advantage of being much more with regard to cell planning as in every cell the same frequency is used. It is therefore much easier in CDMA systems to increase the number of served users by introducing new base station sites. In TDMA the entire frequency reuse plan may need to be revised when a new site needs to be introduced.

4.6 Multi-user receivers
Multi-user receivers aim to reduce interference from other users in the decision variables of one particular desired user or for all users as a whole.

3rd Generation Mobile Communication Systems

Page 4-22

Version 1.12 01.08.2000

Using the simple capacity formula of a single cell system, multi-user detection aims to reduce the intracellular interference by a factor α < 1. Sometimes multi-user detection is also applied to combat intercell interference.

Eb E ≥ b ( Pbreq ) = ′ ′ N0 N0

1 N 0 / Eb + K max α Gb

There are two groups of multi-user detection schemes, joint multi-user detection and interference cancellation schemes. In a joint multi-user detection scheme the transmitted bits of several users (e.g. of all users within one cell) are estimated in a one-shot procedure for all users. A simple example is the linear multiuser detector which simply aims to decorrelate the received signal by multiplication of the received signal with the inverse correlation matrix. In interference cancellation schemes signals are detected in a multi-stage approach. In the first step e.g. the strongest signal is detected and regenerated at the receiver. Then the regenerated detected signal is subtracted from the received signal in order to cancel interference. In the next step another signal can be detected on the interference-cancelled signal of the previous step.

[4.1] [4.2] [4.3] [4.4]

Wolfgang Koch, “Grundlagen der Mobilkommunikation”, Skript zur Vorlesung WS 99/00 J. G. Proakis, “Digital Communications”, McGraw-Hill, 3rd edition, 1995. 3GPP TS 25.922, “Radio Resource Management Strategies”, V3.0.0, Dec. 1999. K.S. Gilhousen, I.M. Jacobs, R. Padovani, A.J. Viterbi, L.A.Weaver, C.E. Wheatly, “On the Capacity of a Cellular CDMA system”, IEEE Transactions on Vehicular Technology, vol. 40, pp. 303 – 312, May 1991.

3rd Generation Mobile Communication Systems

Page 5-1

Version 1.12 01.08.2000

5

Diversity techniques

Diversity techniques are means that provide a receiver with several replicas of the same information carrying signal which are affected by disturbances on the transmission channel in a statistically independent manner. The gain of diversity is due to the fact that channel errors on fading channels occur when the channel attenuation is very large (i.e. when the channel is in a “deep fade”). With diversity techniques the probability that all replicas of the signal are simultaneously in a fade can be reduced considerably. Diversity techniques have become one of the most important concepts in mobile communications to improve transmission conditions and increase spectral efficiency of cellular systems. In mobile communications it is in certain conditions possible to exploit diversity by utilizing the natural characteristics of the radio channel. An example of such “natural” diversity is a multipath channel exploited with a Rake receiver. Diversity can also be achieved by using a special transmitter and receiver setups as described below. It is possible to calculate the bit error probability Pb somewhat idealized diversity conditions theoretically [5.1, 5.2]. Figure shows the raw (before FEC decoding) bit error probability for different degrees of diversity for (coherently demodulated) PSK. The assumptions made here are completely independent transmissions on each diversity path (i.e. no interference between paths), equal distribution of power on the L paths (i.e. the power per path amounts to S/L), statistically independent Rayleigh fading of each path, constant channel attenuation/phase over one single symbol and ideal channel estimation and maximum ratio combining at the receiver. As can be seen from the curves, for high degree of diversity, the performance is limited by the bite error probability of the AWGN channel.
10
0

10

-1

10

-2

10

-3

L=1

10

-4

L=2
10
-5

10

-6

L=4
AWGN L→∞
0 5 10 15 20 25 30 35 40

10

-7

Figure 53: Raw bit error probability for PSK with diversity degree L

3rd Generation Mobile Communication Systems

Page 5-2

Version 1.12 01.08.2000

Figure 54 illustrates that in addition to the concept of multipath diversity another form of diversity exists which is referred to as time diversity. Multipath diversity exploits the independence of fading amplitudes between the various paths visible in the channel multipath profile. The variation of complex channel amplitudes on several paths can also be interpreted as frequency selective fading in the frequency domain. With this interpretation multipath diversity is equivalent to exploitation of frequency diversity. Time diversity can be exploited in combination with coding. Coding can be interpreted as a mapping of one user data bit into a sequence of several coded bits. In Figure 54 the three yellow bits may be interpreted as the three encoded output bits resulting from a rate 1/3 convolutional code for one input data bit. Distribution of these bits over a time interval which is considerably larger than the period of fades in time, i.e. Tinterl >> 1/fDmax, where fDmax is the maximum Doppler frequency. Similarly as symbols in the Rake received for different paths with different power are combined, bits with different signal-to-noise ratio (i.e. soft decision value) are combined in the metric calculations in the decoder, which results in a diversity gain. Note that interleaving can be utilized even for a single-path channel (“flat” (frequency-nonselective) fading). It should however also be noted that time and frequency diversity cannot be exploited independently. For example if multipath diversity of high degree is already utilized the additional gain of interleaving is only very low.

Multipath profile |h|2 delay Rx signal power

time bitstream
Figure 54: Multipath (frequency) and time diversity Other forms of diversity: polarization diversity, directional (angular) diversity

5.1 Receive antenna diversity
Receive antenna diversity can be seen as a special case of multipath diversity. A signal transmitted from one antenna is received by two or more antennas which are spaced apart from each other by a few 100λ, where λ is the carrier wavelength. Due to the spatial separation of the receive antennas the signals are affected by independent fading. Receive antenna diversity is a standard diversity scheme applied on the uplink. Because of the relative large separation of the antennas it is rarely utilized in mobile stations. Note that in addition to the actual diversity gain, antenna diversity achieves an additional gain due to increased total received power, i.e. with two antennas a 3 dB power gain is achieved. A base station receiver can be implemented such that Rake fingers can be assigned (split) dynamically to the two antenna signals. The combination is performed as usual by the Rake receiver.

3rd Generation Mobile Communication Systems

Page 5-3

Version 1.12 01.08.2000

Figure 55: Illustration of base station receive antenna diversity

5.2 Multipath diversity
Multipath diversity refers to the receiver technique that is capable to resolve the various propagation paths of a multipath channel and achieve a gain from combining the separately despread signals, using a Rake receiver, see Figure 56. Spread-spectrum-transmission has a much better capability to resolve multipath of the channel. To be able to resolve multiple propagation paths, the bandwidth of the transmit signal must be significantly larger that coherence bandwidth of the channel, which is approximately the inverse of the channel delay spread. A signal bandwidth of B =Rc basically allows to resolve one path per chip interval. Note however that the larger the bandwidth i.e. the more paths are resolvable, the receiver requires more demodulation fingers. If propagation paths exist that carry a significant amount of energy but which cannot be demodulated due to insufficient processing resources, this may result in significant performance loss. Due to the autocorrelation characteristics of the spreading codes, every propagation path causes some interference in all other paths (“inter-path interference”). This effect should be combated by capturing as much desired signal energy as possible.

Channel profile seen by BS receiver:

power

delay

Figure 56: Illustration of multipath diversity

3rd Generation Mobile Communication Systems

Page 5-4

Version 1.12 01.08.2000

5.3 Macro diversity
Macro diversity refers to case where a UE simultaneously is connected with several base stations, see Figure 57. Each connection with a base station is referred to as a radio link. Note that on the downlink macro diversity is a form of transmit antenna diversity. The combining of the signals is performed in the Rake of the UE using maximum ratio combining. To enable this kind of operation it is necessary that the various downlink signals are time synchronized with each other such that they arrive within a certain time window at the UE, which is monitored by the UE receiver for propagation paths. On the uplink, macro diversity is a form of receive antenna diversity. In case that the signals are received from base stations at different sites (as in Figure 57), the received signals are demodulated and decoded individually in each base station and then routed to an RNC, where then the “best” signal is selected according to quality measurements (selection combining). On the uplink the UE transmits only one signal with one scrambling code. On the downlink the mobile station receives the signals from each base station on a different scrambling code and a possibly different channelization code, i.e. paths received from different base stations must be despread with different codes. Combining is only possible for the same signals, i.e. for identical bits. However since inner loop power control is performed individually in each base station, the power control commands (TPC bits on the downlink DPCCH) may differ on each radio link in the downlink. These bits therefore must be excluded from combination in the UE and must be detected individually. Execution of the power control command can be performed by a majority decision.

Figure 57: Illustration of macro diversity

5.4 Site selection diversity transmit power control
Site selection transmit diversity (SSDT) is a special form of downlink macro diversity where instead of transmitting several radio links simultaneously, only one link which is identified by the UE as the best one, is selected for transmission. The non-selected sites basically set the transmit power for that channel to zero. The cell site selection information is transmitted as physical layer information using the FBI bits on the uplink DPCCH. In order that SSDT can be performed fast, it is necessary that all base stations must have the signal available for transmission as in normal macro diversity. SSDT is specified as an optional feature in UMTS (see TS 25.214).

3rd Generation Mobile Communication Systems

Page 5-5

Version 1.12 01.08.2000

5.5 Transmit antenna diversity
Transmit antenna diversity refers to the case where a signal is transmitted from two spatially separated antennas. Currently two types of transmit antenna diversity are specified for UMTS on the downlink, • • space time transmit diversity (STTD) feedback transmit diversity

5.5.1

Space Time Transmit Diversity

Figure 58 illustrates the principle of STTD. It is basically two differently encoded signals which are transmitted from two different base station antennas. The two signals are received by the UE on the same propagation paths but with uncorrelated fading. In order to not create undesired interference it is desirable that the two signals are orthogonal to each other.

Figure 58: Illustration of space time transmit diversity Due to the limited availability of orthogonal spreading codes at the base station, however, the two signals are spread with the same code. Before spreading is performed, however, an orthogonal block encoding scheme as shown in Figure 59 is applied to the data after channel coding and interleaving, prior to spreading. The receiver demodulates on each path the sum of the two block encoded bits. Due to the orthogonality of the code over a sequence of 4 bits (i.e. 2 QPSK symbols) it is possible to separate the two components and perform optimum combining of the symbols. A necessary assumption however is that the channel is time invariant over an interval corresponding to the two QPSK symbols. In short-hand matrix notation the combined received signal r = (r0, r1)’ can be expressed by the transmitted symbol s = (s0, s1)’ and the channel coefficients h = (h0, h1)’ as follows:

r0 = s 0 h0 − s1∗ h1
∗ r1 = s1 h0 + s 0 h1

 r0   s 0  = r  s  1  1

∗ − s1  h0    ∗ s 0  h1   

For known pilot symbols s, this equation can be inverted to obtain the channel coefficients:

3rd Generation Mobile Communication Systems

Page 5-6

Version 1.12 01.08.2000

 h0   s 0  = h  s  1  1

− s1∗   ∗ s0  

−1

 r0    r   1

Taking the complex conjugate of the first line in the initial matrix equation yields,
∗ ∗ r0∗ = s 0 h0 − s1 h1∗ ∗ r1 = s1 h0 + s 0 h1

∗  r0∗   h0  = r  h  1  1

∗ − h1∗  s 0    h0  s1   

which can be resolved to the transmitted symbols for known channel matrix
∗ ∗  s 0   h0  = s  h  1  1

− h1∗   h0  

−1

 r0∗   . r   1

Above equation shows that the transmitted symbols s = (s0, s1)’ can be retrieved from the received signal without interference from the one antenna signal into the other. Assuming that the channel coefficients h0, h1 of the two diversity antenna signals fade independently it is furthermore obvious that a maximum-ratio combining gain is achieved.

s0

s1
Antenna 1 h0

b0 b1 b2 b3 b0 b1 b2 b3

-s1*

s0*

Channel bits

-b2 b3 b0 -b1 Antenna 2 h1

STTD encoded channel bits for antenna 1 and antenna 2.
Figure 59: Block coding scheme for STTD in UMTS

5.5.2

Closed loop (feedback) transmit diversity

The general transmitter structure to support closed loop transmit diversity for DPCH transmission is shown in figure 6. Channel coding, interleaving and spreading are done as in nondiversity mode. The spread complex valued signal is fed to both TX antenna branches, and weighted with antenna specific weight factors w1 and w2. The weight factors are complex valued signals (i.e., wi = ai + jbi ), in general. There are two closed loop modes specified. In closed loop mode 1 the weight factors correspond to phase adjustments. In closed loop mode 2 the weight factors correspond to phase and amplitude adjustments. The weights are determined by the UE, and signalled to the base station using the D-field of the feedback information (FBI) bits of uplink DPCCH.

3rd Generation Mobile Communication Systems

Page 5-7

Version 1.12 01.08.2000

For the closed loop mode 1 different (orthogonal) dedicated pilots symbols in the DPCCH are sent on the 2 different antennas. For closed loop mode 2 the same dedicated pilot symbols in the DPCCH are sent on both antennas. The parameters of the two modes are given in the table below, where NFBD refers to the number of feedback information bits per slot, NW to the feedback command length in slots, Npo to number of amplitude bits per signalling word, and Nph to number of phase bits per signalling word.
Closed loop mode 1 2 NFBD NW Update rate 1500 Hz 1500 Hz Feedback bit rate 1500 bps 1500 bps Npo Nph Constellation rotation π/2 N/A

1 1

1 4

0 1

1 3

In the UE the feedback information is computed such that the UE received power is maximized. For details of the algorithm see TS 25.214.
CPICH1 Ant1

w1 Spread/scramble



Tx

DPCCH DPDCH

DPCH

Ant2


w2 CPICH2 Rx w1 w2 Rx

Tx

Weight Generation

Determine FBI message from Uplink DPCCH

Figure 60: Closed loop transmit diversity scheme in UMTS

3rd Generation Mobile Communication Systems

Page 5-8

Version 1.12 01.08.2000

References
[5.1] [5.2] J. G. Proakis, “Digital Communications”, McGraw-Hill, 3rd edition, 1995. Peter Schramm, “Modulationsverfahren für CDMA-Mobilkommunikationssysteme unter Berücksichtigung von Kanalcodierung und Kanalschätzung”, Dissertation Universität Erlangen-Nürnberg, 1996. Wolfgang Koch, “Grundlagen der Mobilkommunikation”, Skript zur Vorlesung WS 99/00 3GPP TS 25.211, “Physical channels and mapping of transport channels onto physical channels (FDD)”, V3.2.0, March 2000. 3GPP TS 25.214, “Physical layer procedures (FDD)”, V3.2.0, March 2000.

[5.3] [5.4] [5.5]

3rd Generation Mobile Communication Systems

Page 6-1

Version 1.12 01.08.2000

6

Services and functions of the protocol layers

6.1 General aspects
On a general level, the radio interface protocols are defined in terms of the services they provide to the upper layer at so-called Service Access Points (SAPs). The most obvious service that each layer always provides is a data transport service with certain defined characteristics. In order to fulfil the services each protocol must provide certain functions. These functions can be grouped into functional blocks and by connecting these functional blocks, a functional model can be derived. In the specifications such models have only informative character, i.e. it shall only support the overall understanding of the modes of operation. The models shall not imply any restrictions on implementation. What needs to be very clearly specified however is the information and formats of data exchanged on the real physical interfaces, which is the air interface, i.e. the exact format of data transmitted over the antenna, as well as on the terrestrial transport interfaces Iu, Iur and Iub in the network. In the UE there are basically only physical interfaces between Mobile Termination and between external devices such as an external PC, the USIM card etc. There is therefore much more freedom for terminal manufacturers in implementing the interaction between protocol layers compared to infrastructure manufacturers. Each radio interface protocol specification generally includes parts on • • • • • • • List of Services provided to upper layer List of Functions Functional model Layer-to-layer communication (formal definition of interaction between layers) Peer-to-peer communication (specification of the data formats transmitted over the air) Elementary procedures (the actions performed by a protocol entity when some command, i.e. primitive is received). Handling of error cases (defining the actions when something which is abnormal or unforeseen happens).

6.2 Call Control (CC)
The Call Control protocol (CC) provides call management functions, such as setup, maintenance, release of so-called signaling connections between the Core Network and a mobile (UE). Through CC all signalling between a mobile and external networks is handled. The Call Control service class consists of the following services (provided to higher layer) Mobile originated and Mobile terminated call establishment for normal calls; Mobile originated call establishment for emergency calls; call maintaining; call termination; call related Supplementary Services Support.

3rd Generation Mobile Communication Systems

Page 6-2

Version 1.12 01.08.2000

The elementary CC procedures may be grouped into the following classes: call establishment procedures; call clearing procedures; call information phase procedures; miscellaneous procedures.

For packet data, call control functions are handled by the GPRS Session management (SM). The main function of the session management is to support Packet Data Protocol (PDP) context handling of the user terminal. The SM comprises procedures for identified PDP context activation, deactivation and modification. SM procedures for identified access can only be performed if a GMM context has been established between the MS and the network. If no GMM context has been established, the MM sublayer has to initiate the establishment of a GMM context by use of the GMM procedures. After GMM context establishment, SM uses services offered by GMM. Ongoing SM procedures are suspended during GMM procedure execution.

6.3 Mobility Management (MM)
The Mobility Management (MM) is responsible for mobility management on radio access network level (RNS level). It manages user-specific data bases needed to establish the optimal connection between the Core Network and the Radio Access Network nodes. Also tasks like Mobile system selection (PLMN selection, whether e.g. GSM or UMTS shall be used, operator selection etc.) and authentication (i.e. verification of subscriber data) are handled by MM. MM however does not know in which cell a user is located. PS domain: MM, CS domain GMM, see TS 24.007 and TS 24.008. Depending on how they can be initiated, three types of MM procedures can be distinguished:
1) MM common procedures: A MM common procedure can always be initiated whilst a RR connection exists. The procedures belonging to this type are: Initiated by the network: TMSI reallocation procedure; authentication procedure; identification procedure; MM information procedure; abort procedure. However, abort procedure is used only if an MM connection is being established or has already been established i.e. not during MM specific procedures or during IMSI detach procedure, see section 4.3.5. Initiated by the mobile station:

3rd Generation Mobile Communication Systems

Page 6-3

Version 1.12 01.08.2000

-

IMSI detach procedure (with the exceptions specified in section 4.3.4).

2) MM specific procedures: A MM specific procedure can only be initiated if no other MM specific procedure is running or no MM connection exists. The procedures belonging to this type are: normal location updating procedure; periodic updating procedure; IMSI attach procedure.

3) MM connection management procedures:

These procedures are used to establish, maintain and release a MM connection between the mobile station and the network, over which an entity of the upper CM layer can exchange information with its peer. A MM connection establishment can only be performed if no MM specific procedure is running. More than one MM connection may be active at the same time. Depending on how they can be initiated, two types of GMM procedures can be distinguished:
1) GMM common procedures: Initiated by the network when a GMM context has been established: P-TMSI (re-) allocation; GPRS authentication and ciphering; GPRS identification; GPRS information.

2) GMM specific procedures: Initiated by the network and used to detach the IMSI in the network for GPRS services and/or non-GPRS services and to release a GMM context: GPRS detach.

Initiated by the MS and used to attach or detach the IMSI in the network for GPRS services and/or non-GPRS services and to establish or release a GMM context: GPRS attach and combined GPRS attach; GPRS detach and combined GPRS detach.

Initiated by the MS when a GMM context has been established: normal routing area updating and combined routing area updating; periodic routing area updating.

In UMTS, initiated by the MS and used to establish a secure connection to the network and/or to request the resource reservation for sending data: Service Request

3rd Generation Mobile Communication Systems

Page 6-4

Version 1.12 01.08.2000

6.4 Radio Resource Control (RRC)
The radio resource control protocol (RRC) provides mobility management on cell level, and radio resource management (admission control, handover control). RRC handles all signaling between UE and UTRAN. Signalling between UE and Core Network is transparently passed through RRC and at the network side routed to the correct UE. RRC also is responsible for configuration of the lower layers (L1 and L2) in both UE and in the network.

6.5 Broadcast/Multicast Protocol (BMC)
The Broadcast and Multicast control protocol (BMC), at the network side, manages the distribution of messages received from the Cell Broadcast Center to the desired cells. It generates scheduling information which enables BMC at the UE side to control Discontinuous Reception (DRX), such that the UE can read only those messages it has subscribed to.

6.6 Packet Data Convergence Protocol (PDCP)
The Packet Data Convergence Protocol (PDCP) main function is TCP/IP or UDP/IP header compression, i.e. it removes all redundant information from the headers which does not need to be sent repeatedly over the radio interface. Currently there is just a single compression algorithm specified for the PDCP, the IETF RFC 2507 compression algorithm [6.10]. Further algorithms will be added in future UMTS releases. The RFC 2507 compression algorithm can compress TCP/IP and UDP/IP headers (at least 40 bytes in IPv4) down to 4-7 bytes. There are three modes of PDCP data transfer operation defined: • Transparent data transfer In this mode PDCP does not add itself any header to the IP packets received from upper layer. • Data transfer without sequence numbering In this mode PDCP adds 1 byte PDCP header to each compressed IP packet, which includes information on the selected header compression algorithm. • Data transfer with sequence numbering In this mode PDCP adds 3 bytes PDCP header to each compressed IP packet, which includes information on the selected header compression algorithm and a 16 bit PDCP PDU sequence number. The sequence number is needed to perform relocation of the serving RNC (SRNC) with no loss of data (“loss-less SRNS relocation”). SRNS relocation refers to a change of the physical interface between an RNC and a Core Network node (i.e. SGSN in case of packet transmission).

3rd Generation Mobile Communication Systems

Page 6-5

Version 1.12 01.08.2000

6.7 Radio Link Control (RLC)
The Radio Link Control (RLC) protocol performs at the transmitting side segmentation of higher layer protocol data units into smaller blocks suitable for radio transmission. At the receiving side it re-assembles the small blocks back into the higher layer units. There are three modes of RLC transmission, transparent (TR, sometimes also denoted TM), unacknowledged (UM) and acknowledged (AM) transmission. In Transparent mode, RLC only provides segmentation and reassembly functions. There is no additional information (no RLC header) added to the higher layer data. The operation of RLC in transparent mode is illustrated in Figure 61.

Tr-SAP

Radio Interface

Tr-SAP

Transm. Tr-Entity Segmentation

Receiving Tr-Entity Reassembly

Transmission buffer

Receiver buffer

BCCH/PCCH/SCCH CCCH/DTCH/SHCCH

BCCH/PCCH/SCCH CCCH/DTCH/SHCCH

Figure 61: Operation of RLC in transparent mode In unacknowledged mode an RLC header is added which contains e.g. sequence numbers which is used for sequence number check. In acknowledged mode there is bi-directional control information exchanged between peer RLC entities in order to confirm that the data has been received correctly. In case of transmission errors, retransmission is initiated. In acknowledged mode, RLC provides selective retransmission functions. In acknowledged and unacknowledged mode data encryption (ciphering) is performed on RLC. The operation of RLC in unacknowledged mode is illustrated in Figure 61. The header added to UM data PDU has a length of one, two or three bytes. The one-byte header only includes a sequence number. In the two and three byte headers a length indicator is included in addition. The length indicator (7 bits in 2-byte, 15 bits in the 3-byte header) is used only when the last segment of an SDU is transmitted. It indicates that the end of an SDU occurs in the PDU, and it informs about the number of valid payload bytes which have been included. When the last segment of an SDU does not fill the payload field completely the PDU is appended with padding bytes.

3rd Generation Mobile Communication Systems

Page 6-6

Version 1.12 01.08.2000

UM-SAP

Radio Interface

UM-SAP

Segmentation & Concatenation

Transm. UM-Entity

Receiver UM-Entity

Reassembly

Ciphering

Deciphering

Add RLC header

Remove RLC header Receiver buffer

Transmission buffer

CCCH/DCCH/ DTCH/SHCCH CTCH

CCCH/DCCH/D TCH/ SHCCH CTCH

Figure 62: Operation of RLC in unacknowledged mode The operation of RLC in acknowledged mode is illustrated in Figure 63. The figure shows only one side of an AM RLC entity. The peer entity at the other end of the RLC connection has the identical structure. In acknowledged mode selective retransmission is applied. The transmitter sends a number of RLC data PDUs from its transmission buffer. After the receiver has received a number of PDUs it sends a status report to the transmitting side, which indicates whether the previous PDUs have been received correctly or not. PDUs that were received erroneously, are selectively retransmitted by the sender. In addition the transmitting side has the possibility to perform polling, i.e. to request for status reports from the receiving side explicitly. This can be done by setting of a poll bit in the header of an AM data PDU. The header of an AM data PDU has a length of 2, 3 or 4 bytes depending whether a length indicator is included, and depending on the length of the length indicator (7 or 15 bits) in case it is included. Status report can be transmitted with a Status control PDU. The status report can also be included into a Data PDU which is send into the opposite direction (in case there is bi-directional transfer of higher layer data). Inclusion of a control PDU into a data PDU is referred to as “piggybacking”. The RLC protocol specified for UMTS has a large number of parameters which can be used to control the retransmission operation. The specification allows several different mechanisms which can be used for triggering status reporting and polling, and to trigger prevention of status reporting and polling. The choice of parameters and employed control mechanisms allows to adapt the RLC to various traffic and transmission channel characteristics.

3rd Generation Mobile Communication Systems

Page 6-7

Version 1.12 01.08.2000

In AM mode, it is possible to employ either just a single or two logical channels for transmission. Since the transport block size on a transport channel must be fixed, control and data PDUs must have the same length when transmitted on a single logical channel. In this case control PDUs usually require padding (i.e. inclusion of dummy data) to achieve the same size as a data PDU. This can become quite inefficient. When two logical channels are employed, one for data PDUs, one for control PDUs, different PDU sizes can be used and padding is avoided.
AM-SAP

AM-Entity Segmentation/Concatenation RLC Control Unit Ciphering Add RLC header Piggybacked status Retransmission buffer & mangement

Reassembly Deciphering Remove RLC header & Extract Piggybacked information

Received acknowledgements

MUX

Transmission buffer

Acknowledgements

Receiver buffer & Retransmission management

Set fields in RLC Header (e.g. set poll bits). Optionally replace PAD with piggybacked information.

Demux/Routing

Transmitting Side

Receiving Side

DCCH/ DTCH

DCCH/ DTCH

DCCH/ DTCH

DCCH/ DTCH

DCCH/ DTCH

DCCH/ DTCH

Figure 63: Operation of RLC in acknowledged mode

6.8 Medium Access Control (MAC)
The Medium Access Control protocol (MAC) controls the usage of the transport channels which are provided by the physical layer. The data received on the logical channel from RLC can be multiplexed on MAC and is then mapped onto transport channels. Together with the multiplexing and mapping functions, MAC performs priority control. MAC also executes switching of transport channels (switching between common and dedicated transport channels) for efficient

3rd Generation Mobile Communication Systems

Page 6-8

Version 1.12 01.08.2000

packet data transmission. For logical channels used by transparent mode RLC, ciphering is performed on MAC. Logical channels are defined as information streams dedicated to the transfer of a specific type of information over the radio interface. Logical channels are classified into Control channels (for transfer of control information) and Traffic channels (for transfer of user plane information). The following logical channels are currently defined in UMTS: • Control Channels • Broadcast Control Channel (BCCH, DL) Paging Control Channel (PCCH, DL) Common Control Channel (CCCH, DL & UL) Dedicated Control Channel (DCCH, DL & UL) Shared Channel Control Channel (SHCCH, TDD DL & UL) Dedicated Traffic Channel (DTCH, DL & UL) Common Traffic Channel (CTCH, DL)

Traffic Channels

The MAC is modeled by three different protocol entities: MAC-b, handling the Broadcast Control Channel and mapping to the Broadcast Channel MAC-c/sh, handling the mapping of logical channels to common and shared transport channels MAC-d, handling dedicated logical channels

BCCH

Mac Control

PCCH BCCH CCCH CTCH SHCCH
( TDD only )

MAC Control DCCH DTCH

DTCH

MAC-d

MAC-b

MAC-c/sh

BCH

PCH

FACH FACH RACH CPCH USCH USCH DSCH DSCH
( FDD only ) ( TDD only ) ( TDD only )

DCH

DCH

Figure 64: Model of MAC at the UE side

3rd Generation Mobile Communication Systems

Page 6-9

Version 1.12 01.08.2000

From the RLC MAC receives RLC PDUs on the logical channels. These RLC PDUs (Protocol Data Units) are on MAC denoted as MAC SDU (Service Data Units). On some logical channels MAC adds a MAC header to a MAC SDU. MAC header and MAC SDU together form the MAC PDU, see Figure. A MAC PDU is also denoted as a Transport Block (TB).
MAC header TCTF C/T
UE-ID type

UE-ID

MAC SDU

Logical Channel ID TCTF C/T UE-ID Target channel type field Control/Traffic channel identifier User Equipment Identifier

Figure 65: Format of a MAC PDU (also referred to as Transport Block)

6.9 Physical Layer (PHY, L1)
The physical layer provides data transport services on transport channels. Transport channels are individually encoded. Several transport channels can be multiplexed together before they are mapped onto physical channels. The following functions are performed physical layer: CRC addition and check, encoding and decoding, rate matching (between transport channel rate(s) and physical channel data rates by means of puncturing and bit repetition), spreading and despreading, modulation and demodulation, inner loop (closed loop) power control, and others. Transport channels are distinguished from each other by how and with what characteristics data is transferred over the radio interface. There are two categories of Transport channels, common and dedicated Transport Channels. The following transport channels are currently defined in UMTS: • Common Transport Channels: • • • • • • • • • Broadcast Channel (BCH, DL) Paging Channel (PCH, DL) Random Access Channel (RACH, UL) Common Packet Channel (CPCH, UL FDD) Forward Access Channel (FACH, DL) Downlink Shared Channel (DSCH, DL) Uplink Shared Channel (USCH, TDD UL) Dedicated Channel (DCH, DL & UL)

Dedicated Transport Channels:

3rd Generation Mobile Communication Systems

Page 6-10

Version 1.12 01.08.2000

With each transport channel a set of Transport Formats (TFs) is associated. A TF constitutes of two parts – one dynamic part and one semi-static part. Attributes of the dynamic part are: • • • • • • Transport Block Size (number of bits per Transport Block); Transport Block Set Size (number of bits per Transport Block set); Transmission Time Interval (optional dynamic attribute for TDD only); Transmission Time Interval (mandatory for FDD, optional for the dynamic part of TDD nonreal-time radio bearers); size of CRC. error protection scheme to apply: type of error protection: turbo code, convolutional code or no channel coding; coding rate; static rate matching parameter;

Attributes of the semi-static part are:

puncturing limit (FDD: for uplink only).

The dynamic part of a Transport Format can change from one TTI to another. The semi-static part can only be changed by re-definition of transport formats and indication of this change from the network to the UE with a configuration message from RRC. Then RRC also needs to reconfigure the lower layers for the redefined transport formats of a transport channel. In the following example, the Transmission Time Interval is seen as a semi-static part.
EXAMPLE: Dynamic part: {320 bits, 640 bits}, Semi-static part: {10ms TTI, convolutional coding only, static rate matching parameter = 1 (no puncturing, no repetition)}.

Physical channels define a part of the physical resources available for transmission of data over the air. The physical channels occur internally on L1 and are not “visible” to higher layers. Different physical channels are identified in terms of a carrier frequency number, a spreading code number (channelization and scrambling code), on the FDD uplink also phase indicator (I/Q multiplexing), and in TDD time slot number. The following types of physical channels are defined: • Dedicated physical channels • • DPDCH (Dedicated Physical Data Channel) Carries data generated at Layer 2 and above DPCCH (Dedicated Physical Control Channel) Carries data generated at Layer 1 (pilot bits, TPC commands, and optional transport format information) DPCDCH/DPCCH multiplexing: • DL: time multiplex • UL: Code/IQ multiplex Primary Common Control physical Channel (PCCPCH), used for BCH





Downlink common and shared physical channels •

3rd Generation Mobile Communication Systems

Page 6-11

Version 1.12 01.08.2000

• • • • • • • • • • • • • •

Secondary Common Control physical Channel (SCCPCH), used for FACH and PCH Physical Downlink Shared Channel (PDSCH), used for DSCH Common Pilot Channel (CPICH) Synchronization Channel (SCH) Physical Random Access Channel (PRACH) Physical Common Packet Channel (PCPCH) Paging Indicator Channel (PICH), used in conjunction with PCH Acquisition Indicator Channel, used in conjunction with RACH Access-Preamble Indicator Channel (AP-AICH), used in conjunction with CPCH Collision-Detection Indicator Channel (CD-ICH), used in conjunction with CPCH Channel-Assignment Indicator Channel (CA-ICH), used in conjunction with CPCH CPCH Status Indicator Channel (CSICH), used in conjunction with CPCH

Uplink common control physical channels

Downlink Indication channels (auxiliary channels)

Figure 66 defines which transport channels are mapped to physical channels on the physical layer.
Transport Channels DCH Physical Channels Dedicated Physical Data Channel (DPDCH) Dedicated Physical Control Channel (DPCCH) RACH CPCH Physical Random Access Channel (PRACH) Physical Common Packet Channel (PCPCH) Synchronisation Channel (SCH) Common Pilot Channel (CPICH) BCH FACH PCH DSCH Physical Downlink Shared Channel (PDSCH) Acquisition Indicator Channel (AICH) Access Preamble Acquisition Indicator Channel (AP-AICH) Paging Indicator Channel (PICH) CPCH Status Indicator Channel (CSICH) Collision-Detection/Channel-Assignment Indicator Channel (CD/CA-ICH) Channel-Assignment Indication Channel (CA-ICH) Primary Common Control Physical Channel (P-CCPCH) Secondary Common Control Physical Channel (S-CCPCH)

Figure 66: Mapping between Transport Channels and Physical Channels

3rd Generation Mobile Communication Systems

Page 6-12

Version 1.12 01.08.2000

6.10 Fundamental processes and procedures in cellular systems
The actions that are performed by the UEs and the network can be grouped into a number of fundamental procedures. Often these procedures require the exchange of some specific information between the UE and the network. Therefore most of the procedures can be structured with regard to the information (messages) exchanged between UE and the network, and with regard to the protocol layers on which the messages are exchanged between peer entities. Some of the most important procedures will be discussed in more detail in the following sections. UE procedures in Idle mode (see Sec. 7): • cell search, • cell selection/reselection • initial access (RRC connection establishment, transition to connected mode) • registration to CN CC and MM procedures (see Sec. 6.2 and 6.3) • call establishment • call clearing • authentication • location updating RRC Connection Management Procedures: • • • • • • • • • • • • Broadcast of system information (on the broadcast channel BCCH/BCH) Paging (on the Paging channel PCCH/PCH) RRC connection establishment (on RACH and FACH) RRC connection release RRC connection re-establishment Transmission of UE capability information UE capability enquiry Initial Direct transfer Downlink Direct transfer Uplink Direct transfer UE dedicated paging Security mode control Signalling connection release procedure

RRC connection mobility procedures: • • Cell update URA update

3rd Generation Mobile Communication Systems

Page 6-13

Version 1.12 01.08.2000

• • • • • • •

RNTI reallocation Active set update in soft handover Hard handover Inter-system handover to UTRAN Inter-system handover from UTRAN Inter-system cell reselection to UTRAN Inter-system cell reselection from UTRAN

Measurement procedures: • • Measurement control Measurement reporting

General RRC procedures • • • • • • • • • Selection of initial UE identity Open loop power control Physical channel establishment Detection of out of service area Radio link failure handling Open loop power control Detection of in service area Integrity protection Measurement occasion calculation

Physical layer procedures: • • • Synchronization procedures Inner loop power control (L1 procedure) Closed-loop transmit diversity control

6.11 Security aspects (authentication, integrity protection, ciphering)
The following addresses only some selected security features included in UMTS. See TS 33.102 for a comprehensive description of the security architecture.

6.11.1 Authentication
Authentication is defined as “a property by which the correct identity of an entity or party is established with a required assurance. The party being authenticated could be a user, subscriber, home environment or serving network” (TS 21.905). A simple form of authentication is a password or a Personal Identity Number (PIN) code. Such a simple scheme of course is not suitable for authentication between UE and network entities as a

3rd Generation Mobile Communication Systems

Page 6-14

Version 1.12 01.08.2000

PIN code can easily be eavesdropped (a PIN code is only applied for user-to-USIM authentication when a UE is taken in operation). The authentication between a user and the network is performed between the USIM card and the Visitors Location Register (VLR) of the Serving Network (SN). Authentication may require exchange of data between a VLR and an Authentication Center (AuC) which is a functional part of the Home Location Register (HLR), see Figure 67. The authentication method is composed of a challenge/response protocol identical to the GSM subscriber authentication and key establishment protocol combined with a sequence numberbased one-pass protocol for network authentication derived from the ISO standard ISO/IEC 9798-4. MSC/VLR in the serving network sends an Authentication Data Request to the HLR/AuC. The AuC generates an Authentication Vector AV and sends it with an Authentication Data Response to MSC/VLR, where AV is stored. The Authentication Vector consists of 5 parameters: random number RAND (“Random Challenge”), Expected Response XRES, Authentication Token AUTN, Cipher Key CK Integrity Key IK

The VLR sends the parameters RAND and AUTN with a User Authentication Request to the UE. In USIM the Authentication Token AUTN is verified and a response RES is generated. RES is sent via an Authentication Response to MSC/VLR. Then authentication is performed by comparing the UE response RES with the expected response XRES. The purpose of the Authentication and key establishment procedure is to authenticate the user and establish a new pair of cipher and integrity keys between the VLR/SGSN and the USIM. During the authentication, the USIM verifies the freshness of the authentication vector that is used.

3rd Generation Mobile Communication Systems

Page 6-15

Version 1.12 01.08.2000

Mobile Equipment

MSC/VLR/ SGSN

HLR/AuC

USIM

User Equipment

UTRAN

Serving Network (SN)

Home Environment

Authentication Data Request Authentication Data Response AV

User authentication request RAND || AUTN User authentication response RES User authentication reject CAUSE

Figure 67: Architecture and messages for authentication and key agreement

The mechanism for authentication and key agreement applied in UMTS requires the following cryptographic functions: Random challenge (RAND) generating function f0 f0 is a pseudo-random number generating function: f0(internal state) Å RAND (128 bits) Network authentication function f1 f1 is a message authentication code (MAC) function: f1(K; SQN, RAND, AMF) Å MAC-A (or XMAC-A) It shall be computationally infeasible to derive K from knowledge of RAND, SQN, AMF and MAC-A (or XMAC-A). K is a 128-bits subscriber authentication key, a long term secret key stored in the USIM and the AuC. SQN is a 48 bit-sequence number. The AuC should include a fresh sequence number in each authentication token. The verification of the freshness of the sequence number by the USIM constitutes to entity authentication of the network to the user. AMF is the 16-bits authentication management field. The use of AMF is not standardised. Example uses of the AMF are provided in annex F of TS 33.102. MAC-A is the message authentication code used for authentication of the network to the user. The length of MAC-A is 64 bits. MAC-A authenticates the data integrity and the data origin of

3rd Generation Mobile Communication Systems

Page 6-16

Version 1.12 01.08.2000

RAND, SQN and AMF. The verification of MAC-A by the USIM constitutes to entity authentication of the network to the user. MAC-S is the message authentication code used to provide data origin authentication for the synchronisation failure information sent by the USIM to the AuC. The length of MAC-S is 64 bits. MAC-S authenticates the data integrity and the data origin of RAND, SQN and AMF. MAC-S is generated by the USIM and verified by the AuC. Re-synchronisation message authentication function f1* f1*(K; SQN, RAND, AMF) Å MAC-S (or XMAC-S) f1 is a MAC function. It shall be computationally infeasible to derive K from knowledge of RAND, SQN, AMF and MAC-S (or XMAC-S). User authentication function f2 f2(K; RAND) Å RES (or XRES) f2 is a MAC function. It shall be computationally infeasible to derive K from knowledge of RAND and RES (or XRES). RES is the user response. The maximum length of RES and XRES is 128 bits and the minimum is 32 bits. RES and XRES constitute to entity authentication of the user to the network. Cipher key (CK) derivation function f3 f3(K; RAND) Å CK f3 is a key derivation function. It shall be computationally infeasible to derive K from knowledge of RAND and CK. The length of CK is 128 bits. In case the effective key length should need to be made smaller than 128 bits, the most significant bits of CK shall carry the effective key information, whereas the remaining, least significant bits shall be set zero. Integrity key (IK) derivation function f4 f4 is a key derivation function f4(K; RAND) Å IK. It shall be computationally infeasible to derive K from knowledge of RAND and IK. The length of IK is 128 bits (as CK). Anonymity key (AK) derivation function f5 f5 is a key derivation function f5(K; RAND) Å AK. It shall be computationally infeasible to derive K from knowledge of RAND and AK. The length of AK is 48 bits. It equals the length of SQN. The functions f1—f5 and f1* shall be designed so that they can be implemented on an IC card equipped with a 8-bit microprocessor running at 3.25 MHz with 8 kbyte ROM and 300byte RAM and produce AK, XMAC-A, RES, CK and IK in less than 500 ms execution time. In the descriptions below, the symbol || refers to concatenation, ⊕ refers to exclusive or. The generation of the Authentication Vector using above listed cryptographic functions is shown in Figure 68.

3rd Generation Mobile Communication Systems

Page 6-17

Version 1.12 01.08.2000

Generate SQN Generate RAND SQN AMF K

RAND

f1

f2

f3

f4

f5

MAC

XRES

CK

IK

AK

AUTN := SQN ⊕ AK || AMF || MAC AV := RAND || XRES || CK || IK || AUTN

Figure 68: Generation of Authentication Vector in HLR/AuC Upon receipt of the random challenge RAND and an authentication token for network authentication AUTN with the User Authentication Request, the user proceeds as shown in Figure 69. The USIM first computes the anonymity key AK = f5(K;RAND) and retrieves the sequence number SQN = (SQN ⊕ AK) ⊕ AK. Next the USIM computes XMAC = f1(K; SQN || RAND || AMF) and compares this with MAC which is included in AUTN. If they are different, the user sends User Authentication Reject back to the VLR/SGSN with an indication of the cause and the user abandons the procedure. In this case, VLR/SGSN shall initiate an Authentication Failure Report procedure towards the HLR. VLR/SGSN may also decide to initiate a new identification and authentication procedure towards the user. Next the USIM verifies that the received sequence number SQN is in the correct range. If the USIM considers the sequence number to be not in the correct range, it sends Synchronisation Failure back to the VLR/SGSN including an appropriate parameter, and abandons the procedure. The Synchronisation Failure message contains the parameter AUTS = Conc(SQNMS ) || MAC-S. Conc(SQNMS) = SQNMS ⊕ f5(K; MAC-S || 0...0) is the concealed value of the counter SEQMS in the MS, and MAC-S = f1*(K; SEQMS || RAND || AMF) where RAND is the random value received in the current user authentication request. f1* is a message authentication code (MAC) function with the property that no valuable information can be inferred from the function values of f1* about those of f1, ... , f5 and vice versa.

3rd Generation Mobile Communication Systems

Page 6-18

Version 1.12 01.08.2000

RAND SQN ⊕ AK ⊕ SQN K

AUTN

f5 AK

AMF

MAC

f1

f2

f3

f4

XMAC

RES

CK

IK

Verify MAC = XMAC Verify that SQN is in the correct range

Figure 69: User authentication function in the USIM The AMF used to calculate MAC-S assumes a dummy value of all zeros so that it does not need to be transmitted in the clear in the re-synch message. The construction of the parameter AUTS is shown in Figure 70.
SQNMS K RAND AMF f1* f5 xor

MACS

AK

SQNMS ⊕ AK

AUTS = SQNMS ⊕ AK || MACS

Figure 70: Construction of the parameter AUTS If the sequence number is considered to be in the correct range, the USIM computes RES = f2(K;RAND) and includes this parameter in a User Authentication Response back to the VLR/SGSN. Finally the USIM computes the cipher key CK = f3(K; RAND) and the integrity key IK = f4(K; RAND). USIM stores CK and IK until the next successful execution of Authentication and key agreement.

3rd Generation Mobile Communication Systems

Page 6-19

Version 1.12 01.08.2000

Upon receipt of User Authentication Response the VLR/SGSN compares RES with the expected response XRES from the selected authentication vector. If XRES equals RES then the authentication of the user has passed. The VLR/SGSN also selects the appropriate cipher key CK and integrity key IK from the selected authentication vector. If XRES and RES are different, VLR/SGSN shall initiate an Authentication Failure Report procedure towards the HLR. VLR/SGSN may also decide to initiate a new identification and authentication procedure towards the user.

6.11.2 Integrity protection
Integrity protection refers to comparing a Message Authentication Code MAC-I included in an RRC message with the expected Code XMAC-I derived from applying the respective security algorithm in either the UE or in the network. Figure 71 illustrates the use of the integrity algorithm f9 to authenticate the data integrity of a signalling message.
COUNT-I DIRECTION FRESH COUNT-I DIRECTION FRESH

MESSAGE

MESSAGE

IK

f9

IK

f9

MAC -I Sender UE or RNC

XMAC -I Receiver RNC or UE

Figure 71: Derivation of MAC-I (or XMAC-I) on a signalling message The input parameters to the algorithm are the Integrity Key (IK), the integrity sequence number (COUNT-I, a 32 bits number), a random value generated by the network side (FRESH, a 32-bits random number transmitted with RRC Security Message from RNC to the UE), the direction bit DIRECTION and the signalling data MESSAGE. Based on these input parameters the user computes message authentication code for data integrity MAC-I using the integrity algorithm f9. The MAC-I is then appended to the message when sent over the radio access link. The receiver computes XMAC-I on the message received in the same way as the sender computed MAC-I on the message sent and verifies the data integrity of the message by comparing it to the received MAC-I.

6.11.3 Ciphering
Ciphering (encryption) is a mechanism for data confidentiality of both user data and signalling data. It requires a cryptographic function referred to as “UMTS encryption algorithm f8”. Ciphering is performed by RLC if it is operated in acknowledged or unacknowledged mode. For transparent mode RLC, ciphering is performed on MAC. When ciphering is performed in the RLC sub-layer, it performs the encryption/decryption of the ciphering unit of an RLC PDU, based on XOR combining with a mask obtained as an output of

3rd Generation Mobile Communication Systems

Page 6-20

Version 1.12 01.08.2000

the ciphering algorithm. For UM RLC, the ciphering unit is defined as the UMD PDU minus the first octet. The first octet comprises the sequence number used as LSB of the COUNT-C parameter. For AM RLC, the ciphering unit is defined as the AMD PDU minus the two first octets. These two octets comprise the sequence number used as LSB of the COUNT-C parameter. When ciphering is performed in the MAC sub-layer, it performs the encryption/decryption of a MAC SDU (RLC PDU), based on XOR operation with a mask obtained as an output of the UMTS encryption algorithm f8, see Figure 72.
COUNT-C DIRECTION LENGTH COUNT-C DIRECTION LENGTH

BEARER

BEARER

CK

f8

CK

f8

KEYSTREAM BLOCK (mask)

KEYSTREAM BLOCK (mask)

Unciphered MAC SDU or RLC PDU (data part) Sender UE or RNC

Ciphered MAC SDU or RLC PDU (data part) Receiver RNC or UE

De-ciphered MAC SDU or RLC PDU (data part)

Figure 72: Ciphering algorithm and parameters COUNT-C The parameter COUNT-C shall be at least 32 bits long. It is composed of a ’long’ sequence number called Hyper Frame Number HFN, and a ’short’ sequence number, which depends on the ciphering mode, as described below. There is one ciphering sequence per logical channel using AM or UM mode plus one for all logical channels using the transparent mode (and mapped onto DCH). The Hyper Frame Number (HFN) is initialised by the UE and signalled to the SRNC before ciphering is started. It is used as initial value for each ciphering sequence, and it is then incremented independently in each ciphering sequence, at each cycle of the ’short’ sequence number. When a new RAB / logical channel is created during a RRC connection, the highest HFN value currently in use is incremented, and used as initial value for the ciphering sequence of this new logical channel. The highest HFN value used during a RRC connection (by any ciphering sequence) is stored in the USIM, and the UE initialises the new HFN for the next session with a higher number than the stored one. If no HFN value is available in USIM, the UE randomly selects a HFN value. Depending on the requirements (e.g. how many successive RRC Connections can use the same ciphering key), it may be sufficient to use only the most significant bits of HFN in the re-

3rd Generation Mobile Communication Systems

Page 6-21

Version 1.12 01.08.2000

initialisation (and set LSBs implicitly to zero). This may be necessary at least if the HFN value needs to be included in the RRC Connection Request message. The ’short’ sequence number is: For RLC TR on DCH, the CFN of the UEFN is used and is independently maintained in UE MAC and SRNC MAC-d. The ciphering sequence number is identical to the UEFN. For RLC UM and AM modes, the RLC sequence number is used, and is directly available in each RLC PDU at the receiver side (it is not ciphered). The HFN is incremented at each RLC SN cycle.

The figure below presents some examples of the different COUNT-C parameters, assuming various sizes for the ’short’ sequence numbers. This proposal permits to exchange a unique HFN and also to use a unique CSN size, which should permit to reduce the implementation complexity of the ciphering function. In this example, the HFN is 25 bits long, and only the 24 or 20 MSB are used for the CSN in the RLC modes TR or AM, respectively.
RLC TM MAC-d DCH HFN (24 bits) CFN (8 bits)

RLC UM

HFN (25 bits)

RLC SN (7 bits)

RLC AM

HFN (20 bits)

RLC SN (12 bits)

Figure 29: Example of ciphering sequence number for all possible configurations

Ciphering key, CK CK is established between the UE and SRNC during the authentication phase. In the two-key solution, the CS-domain bearers are ciphered with the most recent cipher key agreed between the user and the 3G-MSC (CK-CS). The PS-domain bearers are ciphered with the most recent cipher key agreed between the user and the 3G-SGSN (CK-PS). The signalling link is ciphered with the most recent cipher key established between the user and the network, i.e., the youngest of CK-CS and CK-PS. To ensure performing the right ciphering function at the RLC and MAC layers, three conditions must be met: Each logical traffic channel can only transfer the information either from CS-domain or PSdomain, but not from both. RRC maps a given Radio Bearer to a given domain in order to derive the correct key to utilise for each RB. The RLC and MAC layers receive the Radio Bearer IDs and CKs they should use from RRC.

BEARER This parameter indicates the logical channel identity, which shall be unique within a RRC connection. It is used as input parameter of the ciphering algorithm to ensure that the same ciphering mask is not applied to two or more parallel logical channels having the same CK and same COUNT-C. Each logical channel is ciphered independently.

3rd Generation Mobile Communication Systems

Page 6-22

Version 1.12 01.08.2000

DIRECTION This parameter indicates the transmission direction (uplink/downlink). LENGTH This parameter indicates the length of the keystream block (mask) to be generated by the algorithm. It is not an input to the keystream generation function.

References
[6.1] [6.2] [6.3] [6.4] [6.5] [6.6] [6.7] [6.8] [6.9] 3GPP TS 25.301, “Radio Interface Protocol Architecture”, Ver. 3.4.0, March 2000. 3GPP TS 25.302, “Services provided by the physical layer”, Ver. 3.4.0, March 2000. 3GPP TS 25.303, “Interlayer Procedures in Connected Mode”, Ver. 3.4.0, March 2000. 3GPP TS 25.321, “MAC Protocol Specification”, Ver. 3.2.0, March 2000. 3GPP TS 25.322, “RLC Protocol Specification”, Ver. 3.2.0, March 2000. 3GPP TS 25.323, “PDCP Protocol Specification”, Ver. 3.2.0, March 2000. 3GPP TS 25.324, “BMC Protocol Specification”, Ver. 3.2.0, March 2000. 3GPP TS 25.331, “RRC Protocol Specification”, Ver. 3.2.0, March 2000. 3GPP TS 24.007, “Mobile Radio Interface Signalling Layer 3 - General Aspects”, Ver. 3.3.1, March 2000.

[6.10] 3GPP TS 24.008, “Mobile Radio Interface Layer 3 Specification – Core Network protocols”, Ver. 3.3.1, March 2000. [6.11] M. Mouly, M-B. Pautet, “The GSM System for Mobile Communications”, published by the authors, 1992, ISBN 2-9507190-0-7. [6.12] M. Degermark et al, “IP Header Compression”, IETF RFC 2507, Feb.1999. [6.13] 3GPP TS 33.102, “Security Architecture”, Ver. 3.4.0, March 2000. [6.14] 3GPP TS 33.105, “Cryptographic Algorithm Requirements”, Ver. 3.3.0, March 2000.

3rd Generation Mobile Communication Systems

Page 7-1

Version 1.12 01.08.2000

7

Idle mode procedures of the mobile station

7.1 Idle mode
There are two fundamental “macro-states” defined a UE can take (in UMTS), Idle mode UTRAN Connected mode.

In this section we consider the processes performed by a UE in Idle mode. For details see TS 25.304 [1]. When a UE is switched on, it attempts to identify if there are public land mobile networks (PLMN) using a certain radio access technology. We assume a UE which is capable to support multiple Radio Access Technologies (RATs). Such a UE is called a multi-RAT UE, e.g. one that support UMTS and GSM. In addition to radio access technology, the core network type may differ as well. The term PLMN is used as a generic term covering both GSM MAP and ANSI-41 type of PLMNs. The UE looks for a suitable cell of the chosen PLMN and chooses that cell to provide available services, and tunes to its control channel in order to receive system information. This choosing is referred to as "camping on the cell". The UE will then register its presence, by means of a NAS registration procedure, in the registration area of the chosen cell, if necessary. If the UE finds a more suitable cell, it reselects onto that alternative cell of the selected PLMN and camps on that cell. If the new cell is in a different registration area, location registration is performed. If necessary, the UE will look for more suitable cells on other PLMNs at regular time intervals, which is referred to as PLMN-reselection. Particularly, in the home country of the UE, the UE will try to get back to its Home PLMN. If the UE loses coverage of a PLMN, either a new PLMN is selected automatically (automatic mode), or an indication of which PLMNs are available is given to the user, so that a manual selection can be made (manual mode). Registration is not performed by UEs only capable of services that need no registration. The purpose of camping on a cell in idle mode is fourfold:
a) It enables the UE to receive system information from the PLMN. b) When registered and if the UE wishes to initiate a call, it can do this by initially accessing the network on the control channel of the cell on which it is camped. c) If the PLMN receives a call for the registered UE, it knows (in most cases) the registration area of the cell in which the UE is camped. It can then send a "paging" message for the UE on control channels of all the cells in the registration area. The UE will then receive the paging message because it is tuned to the control channel of a cell in that registration area and the UE can respond on that control channel. d) It enables the UE to receive cell broadcast messages.

If the UE is unable to find a suitable cell to camp on, or the USIM is not inserted, or if the location registration failed, it attempts to camp on a cell irrespective of the PLMN identity, and enters a "limited service" state in which it can only attempt to make emergency calls. The idle mode tasks can be subdivided into three processes:

3rd Generation Mobile Communication Systems

Page 7-2

Version 1.12 01.08.2000

-

PLMN selection and reselection; Cell selection and reselection; Location registration.

7.2 Modulation/Spreading on the downlink (FDD)
Figure 73 and Figure 74 show modulation, spreading and combining as applied on the UMTS downlink in FDD mode on all physical channels, except for the Synchronization Channel SCH. The block “S -> P” refers to serial-to-parallel conversion with regard to the input data stream, i.e. on bit level QPSK is applied. The input symbols can take the three values +1, -1, and 0. A symbol “0” indicates that for this symbol discontinuous transmission (DTX) is applied, i.e. the power for this symbol is set to zero. Spreading is then performed with a real-valued channelization code C_ch, where the same code is applied for the Inphase (I) and Quadrature (Q) components. The two sequences of real-valued chips on the I and Q branch are then treated as a single complex-valued sequence of chips. This sequence of chips is scrambled (complex chip-wise multiplication) by a complex-valued scrambling code Sdl,n. In case of P-CCPCH, the scrambling code is applied aligned with the P-CCPCH frame boundary, i.e. the first complex chip of the spread P-CCPCH frame is multiplied with chip number zero of the scrambling code. In case of other downlink channels, the scrambling code is applied aligned with the scrambling code applied to the P-CCPCH. In this case, the scrambling code is thus not necessarily applied aligned with the frame boundary of the physical channel to be scrambled. Figure shows that the scrambled channels are weighted with power gain factors Gi and summed up. Also shown is that the primary and secondary Synchronization Channels, P-SCH and S_SCH are added after weighting. The reason for separation of the two SCHs from the other channels is that these are not scrambled. The scrambling code is generated with the code generator shown in Figure 32. A total of 218-1 = 262,143 scrambling codes, numbered 0…262,142 can be generated (i.e. the two m-sequences are not counted). However not all the scrambling codes are used. The scrambling codes are divided into 512 sets each of one primary scrambling code and 15 secondary scrambling codes. Hence, in total 512×16 = 8192 scrambling codes are used. The primary scrambling codes consist of the codes numbered n=16*i where i=0…511. The ith set of secondary scrambling codes consists of scrambling codes 16*i+k, where k=1…15. There is a one-to-one mapping between each primary scrambling code and 15 secondary scrambling codes in a set such that ith primary scrambling code corresponds to ith set of secondary scrambling codes. The set of primary scrambling codes is further divided into 64 scrambling code groups, each consisting of 8 primary scrambling codes. The jth scrambling code group consists of primary scrambling codes 16*8*j+16*k, where j=0..63 and k=0,…,7. The period of the scrambling code would also be 218-1. However after each radio frame of 10 ms, i.e. 38400 chips, the scrambling code is repeated (see TS 25.213 for further details).

3rd Generation Mobile Communication Systems

Page 7-3

Version 1.12 01.08.2000

The channelization codes are the same codes as used in the uplink, namely Orthogonal Variable Spreading Factor (OVSF) codes that preserve the orthogonality between downlink channels of different rates and spreading factors. (The OVSF codes are defined in figure 4 in section 4.3.1. of TS 25.211)

I Any downlink physical channel except SCH

S → P

Sdl,n I+jQ S

Cch,SF,m Q

j

Figure 73: Modulation and spreading on the UMTS downlink (FDD)
Different downlink Physical channels (point S in above Figure)

G1

G2

Σ
P-SCH GP S-SCH GS

Σ

(complex signal, input to pulse shaping)

Figure 74: Weighted combining of downlink channels (FDD)

7.3 The Common Pilot Channel
The Common Pilot Channel (CPICH) is a channel that does not carry any data . The CPICH can jointly be used by all UEs in a cell for time and frequency synchronization, and channel estimation. A cell has at least one Primary CPICH (PCPICH), and it can have up to 15 further Secondary CPICH (SCPICH), if needed. SCPICH may be established when beam-forming antenna systems are employed. Normally a cell will require only the Primary CPICH.

3rd Generation Mobile Communication Systems

Page 7-4

Version 1.12 01.08.2000

The channelization code for the Primary CPICH is fixed to the OVSF code number Cch,256,0. This is the “all 1” sequence of length 256 chips. Consequently the Primary CPICH is a channel where the pure primary scrambling code is transmitted. The PCPICH must be received by all UEs throughout the cell at adequate power level. The power allocated for the PCPICH alone is in the order of 10 % of the total base station power emitted into a cell. Before the UE can receive a CPICH it must know the scrambling code that is used. The scrambling code can be identified with support of the Synchronization Channel.

7.4 The Synchronisation Channels
The Primary and Secondary Synchronization Channels (SCHs) are transmitted discontinuously at the beginning of each slot. Both SCHs carry short sequences of 256 chips duration, referred to a primary and secondary synchronization codes. The Primary SCH is simply a repetition of the 256-chip primary synchronization code cp which is used in every cell throughout the system. The used sequence is a so-called generalised hierarchical Golay sequence, chosen to have good aperiodic autocorrelation properties (see TS 25.213). The primary synchronization code is a complex-valued sequence with identical real and imaginary components. For the secondary SCH there are 16 different secondary synchronization codes csk, k = 1,…, 16 of length 256 chips defined. These sequences are obtained by element-wise multiplication of one basis-sequence z of length 256, which is constructed in a similar was as cp, with 16 different Hadamard sequences of length 256. From these 16 codes csk, 64 different sequences consisting of 15 secondary synchronization codes are defined. The jth sequence is denoted

c sj ,k0 , c sj ,k1 , c sj ,k 2 ,..., c sj ,k14
where j = 0,…, 63. These 64 sequences are defined in a Table in TS 25.213, e.g. the sequence indexed j = 0, is defined by k0 = 1, k1 = 1, k2 = 2, k3 = 8, k4 = 9, k5 = 10, k6 = 15, k7 = 8, k8 = 10, k9= 16, k10 = 2, k11 = 7, k12 = 15, k13 = 7, k14 = 16. Note that in total 1615 such different sequences exist. The selected 64 sequences have the characteristic that their cyclic shifts are not equivalent to some cyclic shift of any other of the 64 sequences. These 15 codes are employed on the secondary synchronization channel, where c sj ,k n is used in slot n , and n = 0,…, 14. The sequences are repeated for every frame. The sequence index j is used as an identifier of the primary scrambling code group (see Sec. 7.2). Both the primary and secondary synchronization codes might be modulated with a constant a = 1 or -1 to indicate presence or absence of Space Time Transmit Diversity on the P-CCPCH. Time synchronization can now be obtained with the following three-step procedure: Step 1: Acquire slot synchronization to the strongest cell by matched filtering of the received signal with the primary synchronization code cp. This step is illustrated in Figure 75. The filter operation is performed for a time window corresponding to one slot interval. The matched filter output is squared, and several successive runs of squared filter outputs are accumulated. The overall result corresponds to a superposition of channel profiles of the neighboring cells from which the primary synchronization channel is received with strongest power. The timing instants of the strongest peaks are used in step 2.

3rd Generation Mobile Communication Systems

Page 7-5

Version 1.12 01.08.2000

Step 2: Detect scrambling code group identification j by cross-correlation of the received signal with all 64 permitted secondary synchronization code sequences at the timing instants found in step 1, this also establishes frame synchronization (as each sequence has unique cyclic shifts). Step 3: Identify the primary scrambling code (i.e. the CPICH) by cross-correlating the received signal with all scrambling codes belonging to the group j found in step 2 (8 different primary scrambling codes). In this step also the channel delay profile on the pilot channel is derived, from which an estimate of received power level on the pilot channel can be made.

1 slot Received signal Matched filter cp Square and slot-wise accumulation Strongest peak detection Slot sync clock

Figure 75: Illustration of cell search on the primary synchronization channel With above procedure time synchronization to one or several pilot channels can be obtained. The pilot channel of the cell with the strongest received power can be selected by the UE to camp on and to decode the Primary Common Control Physical Channel (P-CCPCH).

7.5 Broadcast Channel and Primary Common Control Physical Channel
The Primary Common Control Physical Channel (P-CCPCH) is the physical channel that carries the Broadcast Channel (BCH). The BCH is the transport channel on which the Broadcast Control Channel (BCCH) is mapped. The BCCH is a logical channel that carries System Information messages generated by the RRC protocol in the network. This is illustrated in Figure 76. In short, the P-CCPCH carries system information which is required by the UE before it can do any further actions in a radio cell. The channelization code for the Primary CCPCH is also fixed to Cch,256,1. Therefore a P-CCPCH can be despread and decoded by a UE after it has obtained synchronization and detected the primary scrambling code. There is only a single transport format employed on the BCH. Therefore there is no need for Transport Format Indication for the BCH. The Transmission Time Interval (TTI) on BCH is 20 ms. A BCH TTI carries a single transport block of 246 bits. On the physical layer 16 CRC bits are added to each transport block. Then encoding with a rate ½ convolutional code with constraint length 9 is performed. This means that 8 tail bits are added prior to encoding. After coding there are (246+8+16)×2 = 270×2 = 540 bits which are mapped to a C-CCPCH.

3rd Generation Mobile Communication Systems

Page 7-6

Version 1.12 01.08.2000

RRC System information messages TM-RLC BCCH MAC-b BCH PHY P-CCPCH (L1 internal)

Figure 76: Protocol Architecture for Broadcast Information The structure of the CPICH, primary and secondary SCH and P-CCPCH is shown in Figure 77. On the P-CCPCH one slot interval (2560 chips) corresponds to 20 bits or 10 QPSK symbols with spreading factor 256 per QPSK symbol. The SCH is transmitted at the beginning of each slot where the P-CCPCH is not used. The 256 chip interval for SCH corresponds to 2 bits or 1 Symbol on the P-CCPCH. From this follows that the P-SCCPCH can carry 18 bits per slot which is equal to 18×15 = 270 bits per frame, which is equal to the 540 bits per 20 ms TTI as explained above.

Slot #1

Slot #2 Common Pilot Channel (CPICH)

Slot #15

Primary CCPCH Primary ac p SCH Secondary acsi,1 SCH

Data
ac p acsi,2

Data
acp acsi,15

Data

256 chips
Figure 77: Structure and timing relation of CPICH, P-CCPCH and SCHs System information is hierarchically organized into a Master Information Block (MIB) and 16 System Information Blocks (SIB 1 – SIB 16). System information includes for example the following information (for details see TS 25.331): System Frame number (11 bits) is transmitted every TTI. MIB: PLMN identity and information on supported Core Networks. Scheduling information for the SIBs. SIB1: Core Network system information and information on timers and counters e.g. to be used in idle mode by the UE.

3rd Generation Mobile Communication Systems

Page 7-7

Version 1.12 01.08.2000

SIB2: Contains the URA identity and information for periodic cell and URA update. It also includes the UE timers and counters to be used in connected mode. SIB3: Contains parameters for cell selection and re-selection SIB4: Contains further parameters for cell selection and re-selection to be used in connected mode only. SIB5: Contains parameters for the configuration of the common physical channels in the cell. SIB6: Contains parameters for the configuration of the common and shared physical channels to be used in connected mode only. SIB7: Contains the fast changing parameters such as UL interference level and Dynamic persistence levels for RACHs. SIB8: Contains static CPCH information. SIB9: Contains fast changing CPCH information such as dynamic persistence levels. SIB10: Contains information to be used by UEs having their DCH controlled by a DRAC procedure. SIB11: Contains measurement control information SIB12: Measurement control information to be used in connected mode SIB13: Contains ANSI-41 system information SIB14: Contains parameters for common and dedicated physical channel uplink outer loop power control information to be used in both idle and connected mode, for TDD only. SIB15: Contains information useful for Location Services (LCS). In particular it allows the UE based method to perform localisation without dedicated signalling. SIB16: Radio bearer, transport channel and physical channel parameters to be stored by UE in idle and connected mode for use during handover to UTRAN.

7.6 The Paging Channel and Paging Indication Channel
After a UE has read system information it normally would register to the system, i.e. informing the system in which location area it is staying and that it is ready to receive network-originated calls. The details of this registration procedure will be discussed later. We assume that the system knows that the UE is available in some location area. A registered UE in Idle mode is required to listen to the so-called Paging Channel (PCH), which is a transport channel. It carries the Paging Control Channel (PCCH), which is the only logical channel mapped to a PCH. On the Paging channel a UE is e.g. paged for an incoming call or informed about a change of system information. A UE cannot listen to any channels permanently as in that case power consumption would be very high and battery life-time very short (“stand-by time”). Therefore so-called discontinuous reception (DRX) of paging information is applied, i.e. the UE only wakes up at certain time intervals to read paging information. This time intervals are referred to as paging occasions. Such paging occasions are assigned individually for each UE such that the overall time is uniformly utilized by all UEs in the system. The paging occasions of each individual UE must be known to the network in order to be able to schedule transmission the paging information accordingly.

3rd Generation Mobile Communication Systems

Page 7-8

Version 1.12 01.08.2000

The discontinuous reception scheme is supported by another auxiliary physical channel which is called the Paging Indication Channel (PICH). Figure 78 shows the protocol architecture for paging. The PCCH is mapped in the MAC-c/sh entity which handles common and shared channels, onto the PCH. MAC-c/sh also controls mapping of other logical channels onto the Forward Access Channel (FACH). A PCH can be multiplexed on the physical layer with one or several FACHs onto one Secondary Common Control Physical Channel (S-CCPCH). The channelization code and transport formats applicable for the Secondary CCPCH(s) is indicated in the system information SIB 5 (and SIB6 for UEs in Connected mode) to the UE. Note that PCCH, PCH and FACH are downlink channels. The arrows in Figure 78 shall be interpreted such that arrows downwards (from higher to lower layer) refer to the network side, arrows upwards (from lower to higher layer) refer to the UE side protocol stack.

CC/MM

RRC Paging type 1 messages TM-RLC PCCH MAC-c/sh PCH PHY FACH PICH & S-CCPCH (L1 internal) Other logical channels

Figure 78: Protocol architecture for paging The format of the Paging Indication Channel is shown in Figure 79. It carries 300 bits (150 QPSK symbols) per frame of which 288 bits are used and the last 12 bits in a frame are unused (transmit power set to zero). Every UE is assigned a so-called Paging Indicator which can be calculated in both the UE and the Network based on the International Mobile Station Identity (IMSI) . The network can configure the PICH to carry N Paging Indicators, where N = 18, 36, 72 or 144. Each Paging Indicator is mapped to a number of 288/N consecutive bits on PICH. The Paging Indicators are not encoded. The smaller N is chosen, the lower can the required transmit power for the PICH be set to achieve satisfactory performance. If a Paging Indicator is set to “1”, the associated UEs shall read a corresponding data block on the PCH carried on S-CCPCH at a defined time offset after the Paging Indicator has been seen on PICH. The UE needs to read the PICH only at some regular time intervals, the paging occasions. The length of this time interval is denoted as DRX cycle. The length of the DRX cycle is a parameter indicated in system information SIB 5. It can be set to values 2k ×10 ms, where k = 6,…,12 (i.e. 640 ms – 4.096 s).

3rd Generation Mobile Communication Systems

Page 7-9

Version 1.12 01.08.2000

288 bits {b0, …, b287} (for paging indication)) 12 bits (unused)

one radio frame (10 ms)
Figure 79: Format of the Paging Indication Channel (PICH) The general format of the S-CCPCH is shown in Figure 80. It carries the actual transport channel data bits “Data” and some physical layer control information, transport channel combination indicator (TFCI) and pilot bits. These TFCI and Pilot fields are optionally included. There are in total 18 different slot formats defined for the S-CCPCH which are listed in Table 2. Each SCCPCH in a cell is configured for a fixed slot format which is indicated in system information. This implies that the spreading factor cannot change dynamically. Pilot bits are only needed when the S-CCPCH is transmitted with directive antennas into only a part of the cell, so that channel estimation cannot be done on the CPICH. The TFCI is needed when several transport channels with possible many different transport formats are mapped onto the S-CCPCH. The TFCI can be omitted if there exist only very few transport format combinations which can be detected “blind”, i.e. without explicit indication with TFCI. The channel bit rates in Table 2 refer to the rates on S-CCPCH after encoding and rate matching. The rates can vary between 30 kbps and 1.92 Mbps. For the PCH in FDD mode a TTI of 10 ms is applied (20 ms TTI in TDD). The same rate ½ convolutional encoder as used for the BCH is employed. CRC can be chosen between 0, 8, 12, 16 and 24 bits as for all transport channels except for BCH where always CRC with 16 bits is used.

TFCI

Data

Pilot

2560 chips, 20*2k bits (k=0..6)

Slot #1

Slot #2

Slot #i

Slot #15

10 ms

Frame #1 Frame #2

Frame #i

Frame #N

Figure 80: Format of the Secondary Common Control Physical Channel (S-CCPCH)

3rd Generation Mobile Communication Systems

Page 7-10

Version 1.12 01.08.2000

Table 2: Slot Formats of the S-CCPCH (NTFCI bits marked * can be faded out by DTX)
Slot Format #i 0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 Channel Bit Rate (kbps) 30 30 30 30 60 60 60 60 120 120 240 240 480 480 960 960 1920 1920 Channel Symbol Rate (ksps) 15 15 15 15 30 30 30 30 60 60 120 120 240 240 480 480 960 960 SF Bits/ Frame Bits/ Slot 20 20 20 20 40 40 40 40 80 80 160 160 320 320 640 640 1280 1280 Ndata Npilot NTFCI

256 256 256 256 128 128 128 128 64 64 32 32 16 16 8 8 4 4

300 300 300 300 600 600 600 600 1200 1200 2400 2400 4800 4800 9600 9600 19200 19200

20 12 18 10 40 32 38 30 72 64 152 144 312 296 632 616 1272 1256

0 8 0 8 0 8 0 8 0 8 0 8 0 16 0 16 0 16

0 0 2 2 0 0 2 2 8* 8* 8* 8* 8* 8* 8* 8* 8* 8*

7.7 Mobility control in Idle mode
PLMN selection PLMN selection is performed using information stored on the UMTS Subscriber Identity Module (USIM). Cell selection/re-selection in idle mode In Idle mode the UE performs regularly measurements to see if there is a better cell to camp on. If it is registered after initial cell selection it checks whether the location area has changed. If it has changed it would perform a location update. Location Registration (LR) A UE registers its presence in a registration area to the Core Network, for instance regularly or when entering a new registration area. This is done only if by UEs with specific service capabilities. For example some UEs may only have capability to receive information from the system and cannot perform registration (e.g. terminals which only use the mobile system for location services or cell broadcast services). Location management means that the PLMNs keep track of where the MSs are located in the system area. The location information for each MS is stored in functional units called location registers. Functionally, there are two types of location registers: the Home Location Register where all subscriber parameters of an MS are permanently stored, and where the current location may be stored; the Visitor Location Register where all relevant data concerning an MS are stored as long as the station is within the area controlled by that visitor location register.

3rd Generation Mobile Communication Systems

Page 7-11

Version 1.12 01.08.2000

When location registration is performed in Idle mode, the UTRAN does not know in which cell the UE is located.

References
[7.1] [7.2] [7.3] [7.4] [7.5] [7.6] 3GPP TS 25.304, “UE Procedures in Idle mode and cell reselection in Connected mode”, V3.2.0, March 2000. 3GPP TS 25.922, “Radio Resource Management Strategies”, V3.0.0, Dec. 1999. 3GPP TS 25.211, “Physical channels and mapping of transport channels onto physical channels (FDD)”, V3.2.0, March 2000. 3GPP TS 25.221, “Physical channels and mapping of transport channels onto physical channels (TDD)”, V3.2.0, March 2000. 3GPP TS 25.213, “Spreading and modulation (FDD)”, V3.2.0, March 2000. 3GPP TS 25.223, “Spreading and modulation (TDD)”, V3.2.0, March 2000.

3rd Generation Mobile Communication Systems

Page 8-1

Version 1.12 01.08.2000

8

Initial access of the mobile station to the network

8.1 General
After a mobile has synchronized to a base station and read system information it would be allowed to send a first message to the network. This procedure where the mobile station sends a first message to the network is referred to as initial access of the mobile station. As the mobile has not yet been assigned a specific channel by the network it must use a common uplink channel that at the same time may also be accessed by another user. This common uplink channel to be used for initial access is referred to as Random Access Channel (RACH). One of the main characteristics of the RACH is that it is a contention based channel, i.e. several users contend about this channel. There is a chance that due to simultaneous access of several users collisions occur such that the initial access message cannot be decoded at the RACH receiver in the base station. The protocol architecture for initial access is shown in Figure 81. The initial access message originates from the RRC protocol in the UE (which itself is triggered from higher layers, i.e. CC and MM). There is only one type of initial access message which is referred to as “RRC Connection Request” message. There are several reasons for sending a RRC Connection Request message. An information element is included in this message which informs the network about the reason which is one of the following:
Originating Conversational Call, Originating Streaming Call, Originating Interactive Call, Originating Background Call, Terminating Conversational Call, Terminating Streaming Call, Terminating Interactive Call, Terminating Background Call, Emergency Call, Inter-system cell re-selection, Registration, Detach, SMS, Call re-establishment

When reason is “originating call” this message is send because the UE wants to setup a connection, for instance a speech connection. Reason “terminating call” means that the user replies to paging. Reason “registration” means that the user wants to register only, such that the system knows that he is located in a certain location area. This is a precondition that the user can be paged by the system. The RRC connection setup message is sent in transparent RLC mode on a Common Control Channel which is mapped by MAC onto an RACH. The physical layer then uses a physical random access channel, PRACH, to send the information. During random access the UE needs to observe a certain downlink physical channel which is denoted as Acquisition Indication Channel, AICH.

3rd Generation Mobile Communication Systems

Page 8-2

Version 1.12 01.08.2000

CC/MM

RRC RRC message (SRB 0) TM-RLC CCCH MAC-c/sh RACH PHY PRACH, AICH (L1 internal)

Figure 81: Protocol architecture for initial access (arrows down: UE side; arrows up: Network side)

8.2 Physical Random Access Procedure
Figure 82 shows the structure and timing of the PRACH and the AICH. The random access procedure is divided into two phases, initial synchronization phase and message transmission phase. The time axis of both the RACH and the AICH is divided into a sequence of well-defined time intervals, denoted access slots. The length of an access slot is 5120 chip intervals, i.e. twice the length of a slot on the other physical channels, i.e. there are 15 access slots per two frames. The beginning of access slot 0 on AICH is aligned with the beginning of slot 0 of the P-CCPCH. Access slot 0 on PRACH starts with a defined offset relative to the AICH. In the first phase a sequence of short signal bursts denoted as “RACH preambles” is sent with increasing power level. The purpose of this phase is that first the base station shall obtain synchronization to this signal and indicate its successful acquisition to the UE on AICH, before the UE starts with transmission of the actual message. While the UE is sending preambles, it is monitoring the AICH on the downlink. When it detects an acknowledgement on AICH for his preamble it transmits the actual message and then starts listening to a secondary Common Control Physical Channel (S-CCPCH) on which its expects an higher layer acknowledgement onto the message. Information on what access slots are available for random-access transmission and what timing offsets to use (between RACH and AICH, between two successive preambles and between the last preamble and the message) is indicated in system information on BCH to the UE. The initial power level of the first preamble is calculated by the UE in an open loop power control procedure. The UE reads in system information on BCH the power level used on the CPICH and the present interference level. It measures the received power on the CPICH. By subtracting the received power from the transmitted CPICH power (in dBm units) it can obtain an estimate of the path loss. With the estimated pathloss and interference power level the UE can

3rd Generation Mobile Communication Systems

Page 8-3

Version 1.12 01.08.2000

calculate the necessary transmit power needed to achieve a certain signal-to-interference ratio at the base station. The target signal-to-interference ratio is also indicated in system information. In order to not send initially with too high power and create too much interference to other CDMA channels, the power ramping should start at a rather conservatively set power level. When after a preamble transmission no acknowledgement is received on AICH, the power level is increased and the preamble sent again. This repeated until an acknowledgement is received or the maximum allowed power level is used. This random access procedure avoids a power ramping procedure for the entire message. Such a procedure would create more interference due to unsuccessful sent messages and it would be less efficient due to the larger delay since it would take much more time to decode the message before an acknowledgement could be given that it was received successful. The UE can start the random-access transmission (both preambles and message) at the beginning of an access slot only. This kind of access method is therefore a type of slotted ALOHA approach with fast acquisition indication.
Message 38400 chips (10 ms) Preamble 4096 chips “Access slot” 5120 chips Timing offset DPDCH DPCCH

Acquisition Indicator (AI) 4096 chips

Figure 82: Structure and timing of PRACH and AICH Format of the Preambles A preamble consists of 4096 chips, which is a sequence of 256 repetitions of Hadamard codes of length 16. The preamble is scrambled with a scrambling code. All 16 Hadamard codes can on principle be used for a random access (if not prohibited by system information). This reduces the collision probability. The Hadamard codes are referred to as signature of the preamble. It is possible to detect several access attempts with different signature simultaneously and also acknowledge them on AICH simultaneously.
Signature: 1 out of 16 possible 16 chips-Hadamard sequence, scrambling with cell specific 4096 chips-code
0 1 2

...
Preamble (4096 chips)

255

Figure 83: Structure of an RACH preamble

3rd Generation Mobile Communication Systems

Page 8-4

Version 1.12 01.08.2000

Format of the AICH The AICH is a downlink physical channel that uses a reserved OVSF channelization code of spreading factor 256 chips/bit (the code number is indicated to the UE with system information on BCH). The AICH consists of a repeated sequence of 15 consecutive access slots (AS), each of length 40 bit intervals. Each access slot consists of two parts, an Acquisition Indicator (AI) part consisting of 32 real-valued symbols a0, …, a31 and a part of duration 1024 chips where transmission is switched off. When the base station detects transmission of an RACH preamble in an RACH access slot with a certain signature, it echoes this signature in the associated AICH access slot. This means that the Hadamard code used as signature on RACH is modulated onto the AI part of the AICH. Since the Hadamard code is of length 16 and there are 32 bits available in the AI part each symbol of the Hadamard code spans 2 successive bits on the AICH. Such an echoed signature on AICH is denoted as acquisition indicator. Due to the orthogonality of the Hadamard code it is possible to transmit multiple acquisition indicators simultaneously in one access slot. Also it is possible to provide an “negative acknowledgement” by using the negative polarity of a Hadamard code. The AICH bits a0, a1, …, a31 can be represented as

a j = ∑ AI s bs,j
s =0

15

where AIs is the acquisition indicator corresponding to signature s. It can take the values +1, -1, and 0, depending on whether a positive acknowledgement a negative acknowledgement or no acknowledgement is given to a specific signature s, respectively. The sequence bs,0, …, bs,31 is the Hadamard code that of the signature to be indicated, where every bit is repeated once.. The positive polarity of signature is used in the base station to indicate to the UE that the preamble has been acquired and the message can be sent. The negative polarity is used to indicate to the UE that the preamble has been acquired and the power ramping procedure shall be stopped, but the message shall not be sent. This negative acknowledgement is used when due to a congestion situation in the base station a transmitted message cannot not be processed at the present time. In this case the access attempt needs to be repeated some time later by the UE (see Sec. 8.3).
AI part
a0 a1 a2 a30 a31

1024 chips Transmission Off

AS #14

AS #0

AS #1

AS #i 20 ms

AS #14

AS #0

Figure 84: Structure of the AICH

3rd Generation Mobile Communication Systems

Page 8-5

Version 1.12 01.08.2000

Format of the message The format of the message part of the PRACH is on principle the same as on dedicated transport channels (see Sec. 9). The message consists of two parallel physical subchannels which are denoted as data part which carries the information bits received from layer 2, and control part which carries physical control information, i.e. pilot bits and transport format combination indicator (TFCI) (for a dedicated channel the data part is denoted as DPDCH, the control part as DPCCH).
Data Ndata bits Pilot Npilot bits Tslot = 2560 chips, 10*2k bits (k=0..3) TFCI NTFCI bits

Data

Control

Slot #0

Slot #1

Slot #i Message part radio frame TRACH = 10 ms

Slot #14

Figure 85: Structure of the random-access message part radio frame A transport block set sent on RACH can consist of one or several transport blocks and employ a Transmission Time Interval (TTI) of either 10 or 20 ms. Accordingly the message on the PRACH has a duration of either one or two radio frames. Each transport block can be appended with a CRC code of length 0, 8, 12, 16, 24 bits. Rate ½ convolutional encoding with constraint length 9 is then applied. The number of bits in the PRACH message data part after encoding can take 150, 300, 600 or 1200 per frame, which means that the spreading factor is variable, and it takes 256, 128, 64 and 32, respectively. The control part is spread with a fixed spreading factor of 256. Modulation/spreading Figure 86 illustrates the principle of the spreading and scrambling of the PRACH message part. The binary control and data parts to be spread are represented by real-valued sequences, i.e. the binary value "0" is mapped to the real value +1, while the binary value "1" is mapped to the real value –1. The control part is spread to the chip rate by the channelization code cc, while the data part is spread to the chip rate by the channelization code cd. After channelization, the real-valued spread signals are weighted by gain factors, β c for the control part and β d for the data part. After the weighting, the stream of real-valued chips on the I- and Q-branches are treated as a complex-valued stream of chips. This complex-valued signal is then scrambled by the complexvalued scrambling code Sr-msg,n. The 10 ms scrambling code is aligned with the 10 ms message

3rd Generation Mobile Communication Systems

Page 8-6

Version 1.12 01.08.2000

part radio frames, i.e. the first scrambling chip corresponds to the beginning of a message part radio frame. On the PRACH the same long scrambling code generator is employed which is also used on dedicated channels. The long scrambling code generator can produce a complex sequence of period 225 –1. However for scrambling of the PRACH message only the first 38400 chips of one such sequence are used. This scrambling code is repeated for every radio frame. In total there are 8192 different scrambling codes defined for PRACH. In each cell 16 different codes can be used allowing to establish 16 different PRACH per cell. The indices of the PRACH scrambling codes are related to scrambling codes used on the downlink. Note that on the downlink 512 primary scrambling codes are defined, where each index of a primary scrambling code defines 15 further secondary scrambling codes. There is a one-to-one mapping of the primary scrambling codes on the downlink to the 16 scrambling codes that can be used on PRACH. This relationship between downlink and uplink scrambling codes has the advantage that no code allocation scheme different from the one on the downlink needs to be applied on the uplink. The scrambling code of the preamble is generated with the same scrambling code generator. Essentially the first 4096 chips output from code generator are used for the preamble (repeated for each power ramp) and the further 38400 chips are used for the message part.
βd Sr-msg,n I I+jQ Q S

cd PRACH message data part PRACH message control part cc

βc

j

Figure 86: Spreading of PRACH message part The channelization codes of the message part are derived as follows. The preamble signature s, 0 ≤ s ≤ 15, points to one of the 16 nodes in the OVSF code-tree that corresponds to channelization codes of length 16. The sub-tree below the specified node is used for spreading of the message part. The control part is spread with the channelization code cc of spreading factor 256 in the lowest branch of the sub-tree, i.e. cc = Cch,256,m where m = 16×s + 15. The data part uses any of the channelization codes from spreading factor 32 to 256 in the upper-most branch of the sub-tree. To be exact, the data part is spread by channelization code cd = Cch,SF,m and SF is the spreading factor used for the data part and m = SF×s/16. Functions of random access receivers in the base station The structure of a base station PRACH receiver is shown in Figure 87. It consists of a preamble detector and a message receiver. The message receiver consists of a Rake receiver and a message decoder. During preamble detection the initial synchronization instants for the message receiver are found. The synchronization instants can then further be tracked during message demodulation employing the pilot bits of the control part of the RACH message.

3rd Generation Mobile Communication Systems

Page 8-7

Version 1.12 01.08.2000

The preamble detector is on principle a matched filter to all possible 16 sequences of preamble spreading code. The feature that the preambles are distinguished by different Hadamard codes can be utilized in the receiver by application of the Walsh-Hadamard transform. Despreading and Walsh-Hadamard transform must be performed for every possible timing instant within a certain window that covers the maximum transmission delay that can occur in a cell. Note that the maximum one-way transmission delay in a cell with radius r is τ = r/c, where c = 3⋅108 m/s is the speed of light. This means τ is about 3.33 us per km, which corresponds to 12.8 chip intervals at the chip rate of 3.84 Mcps. For a cell with 10 km radius the preamble detector would need to span a search window of 2×128 chip intervals since it must cover the round-trip delay. A decision logic decides with some threshold values whether at a certain timing instant a preamble was sent or not. The performance of a preamble detector is characterized by its false alarm probability and detection probability.
to tx AICH control Preamble detector rx signal Control unit initial channel path delays, channelization code identifier scrambling code identifier

Message receiver
Preamble detector Buffer (4096 chip intervals)

decoded RACH data

...

scrambl code gener.

... ... CORR CORR ... CORR 0 1 15 ... Walsh-Hadamard Transform ...
Decision logic

...

Interleaver

...

Figure 87: Structure of a PRACH receiver

8.3 MAC random access procedure
The MAC sublayer needs to perform some important functions within the random access procedure which are related to priority and load control. Every channel that is handled on MAC is configured for a certain “MAC logical channel priority”. There are eight different priority levels defined, level 0 is the highest priority. For instance the CCCH carrying the initial access message is configured for a specified priority level which is implied by the so-called Access class which is stored on the SIM-card of the user. On a contention based channel such as the RACH it is important to provide a load control mechanism which allows to reduce the load of further incoming traffic when the load and thus the collision probability is already very high. Without load control mechanism it could happen that the throughput goes to zero because the channel is totally blocked by unsuccessful transmissions.

3rd Generation Mobile Communication Systems

Page 8-8

Version 1.12 01.08.2000

Every user is allowed to access the RACH in any radio frame with a certain probability Pv ≤ 1 which is denoted as persistence value. The actual persistence value top be applied by a user is derived by the RRC protocol. It is computed from a parameter that is broadcast in system information. This parameter can change rather fast and must therefore be read possibly for every access attempt. A flow chart of the MAC access procedure is shown in Figure 88.
Start NOTE: MAC-c/sh receives RACH tx control parameters from RRC with CMAC Config-REQ primitive whenever one of the parameters is updated

Get RACH tx control parameters from RRC: Mmax , N BO1min , N BO1max , set of ASC parameters N Any data to be transmitted ? Y

ASC selection: (PRACH partition i, Pi)
M := 0

Increment preamble transmission counter M M ≤ Mmax ? Y Update RACH tx control parameters Wait expiry Timer T 2 (next TTI) Set Timer T 2 (1 TTI) Draw random number 0 ≤ Ri< 1 R ≤ Pi ? Y Send PHY-ACCESS-REQ (start of L1 PRACH transmission procedure) N Wait expiry Timer T 2 (next TTI) Set and wait expiry timer T BO1 (N BO1 TTIs) N Error handling (ffs)

Wait expiry timer T 2 (next TTI)

No Ack L1 access info Ack ?

Nack

Send PHY-DATA-REQ
(PRACH message part transmitted) End

Figure 88: RACH access procedure on MAC MAC priority levels are mapped to so-called Access Service Classes (ASC). An ASC consists of a PRACH partition and a persistence value. RACH partition refers to a subset of RACH

3rd Generation Mobile Communication Systems

Page 8-9

Version 1.12 01.08.2000

preamble signatures and access slots which are allowed to be used for this access attempt. When priority level is low, a UE may be forced to use only a part of the PRACH not the entire resource.

8.4 Usage of the RACH for other purposes
The RACH is not only used for sending RRC Connection Setup message. It can also be used for user packet data transmission when the amount of data that needs to be transmitted is low (i.e. low traffic volume packet data). This is further described in Sec. 1.

8.5 The Forward Access Channel
When a UE sends the initial access message in Idle mode it receives a reply from the network on the Forward Access Channel, FACH. The reply could be either a “RRC Connection Setup” or a “RRC Connection Setup Reject” message. Protocol architecture of FACH in initial access procedure The RRC message is carried on CCCH, RLC transparent mode is used. The CCCH is mapped to FACH. The FACH is then mapped onto a Secondary Common Control Physical Channel (SCCPCH). The S-CCPCH is also used for the Paging Channel (PCH). Its frame format is shown in Figure 80. Whether or not CC/MM is involved in the reply from RRC depends on the reason for sending the RRC Connection Request message. FACH can also be used for user packet data transmission in connected mode.

CC/MM

RRC RRC message (SRB 0) TM-RLC CCCH MAC-c/sh FACH PHY S-CCPCH (L1 internal)

Figure 89: Protocol architecture for initial access (arrows down: Network side; arrows up: UE side)

3rd Generation Mobile Communication Systems

Page 8-10

Version 1.12 01.08.2000

8.6 UE states in Connected Mode
When the UE sends an “RRC Connection Request” message it normally receives on the FACH/CCCH a “RRC Connection setup message” and it enters from “Idle Mode” the other macro-state which is referred to as “UTRAN Connected Mode”. A UE in UTRAN connected mode receives a short user identification (UE-ID) from the network which can be used in subsequent access attempts. This UE-ID is denoted Radio Network temporary Identity (RNTI). It is in most messages included and evaluated on the MAC sublayer.
UTRAN Connected Mode URA_PCH CELL_PCH
UTRAN: Inter-System Handover GSM: Handover

GSM Connected Mode

CELL_DCH

Cell reselection

CELL_FACH

GPRS Packet Transfer Mode
Release RR Connection Establish RR Connection

Release RRC Connection

Establish RRC Release RRC Connection Connection

Establish RRC Connection

Release of temporary block flow

Initiation of temporary block flow

GPRS Packet Idle Mode Camping on a UTRAN cell Camping on a GSM / GPRS cell

Idle Mode

Figure 90: UE modes and states in UTRAN Connected mode

An RRC connection is defined as a point-to-point bi-directional connection between RRC peer entities on the UE and the UTRAN sides. When a RRC Connection is established a Dedicated Control Channel (DCCH) may be used for transmission. In UTRAN Connected mode the UE can be in on of the following four states which are characterized by different levels of activity: • Cell_DCH: A dedicated physical channel allocated. The location of the UE is known on cell level according to current active set. Dedicated (DCH) or Shared (DSCH) Transport Channels can be used. • Cell_FACH: The UE continuously monitors FACH on downlink. The UE is assigned a default RACH that can be used anytime. The UE location is known on cell level according to the last cell update. • Cell_PCH:

3rd Generation Mobile Communication Systems

Page 8-11

Version 1.12 01.08.2000

UE listens to PCH/PICH in DRX mode. UE known on cell level according to last cell update. In Cell_PCH state the UE is required to perform connection mobility tasks on cell level (“Cell update procedure”). • URA_PCH state: The UE listens to PCH/PICH in DRX mode. The UE location is known on UTRAN registration area (URA) level according to the last URA update. A URA is a specified group of cells. In URA_PCH state the UE is required to perform connection mobility tasks on URA level (“URA update procedure”).

References
[8.1] [8.2] [8.3] [8.4] [8.5] [8.6] [8.7] [8.8] 3GPP TS 25.303, “RRC Protocol specification”, V3.2.0, March 2000. 3GPP TS 25.321, “MAC Protocol specification”, V3.3.0, March 2000. 3GPP TS 25.211, “Physical channels and mapping of transport channels onto physical channels (FDD)”, V3.2.0, March 2000. 3GPP TS 25.221, “Physical channels and mapping of transport channels onto physical channels (TDD)”, V3.2.0, March 2000. 3GPP TS 25.212, “Multiplexing and channel coding (FDD)”, V3.2.0, March 2000. 3GPP TS 25.222, “Multiplexing and channel coding (TDD)”, V3.2.0, March 2000. 3GPP TS 25.213, “Spreading and modulation (FDD)”, V3.2.0, March 2000. 3GPP TS 25.223, “Spreading and modulation (TDD)”, V3.2.0, March 2000.

3rd Generation Mobile Communication Systems

Page 9-1

Version 1.12 01.08.2000

9 Establishment of user-specific control and traffic channels
9.1 General
Dedicated channels are channels which are assigned for communication between the network and one specific user equipment (i.e. dedicated channels can not be shared by several UEs as e.g. common channels). The user specific data exchanged in the user plane of the radio interface protocol stack is transmitted on dedicated traffic channels. User specific data exchanged in the control plane of the radio interface protocol stack is transmitted on dedicated control channels. Figure 91 shows an example of radio protocol configuration at the UE side. The channels provided on top of layer 2 are denoted as radio bearers (RB). In the control plane RBs are more specifically denoted as signalling radio bearers (SRBs). When all three modes of RLC shall be supported for dedicated signalling then at least three separate instances of RLC need to be established at both sides, in the network (in the serving RNC) and in the UE, one instance each for transparent (TR), unacknowledged (UM) and acknowledged mode (AM). There are primarily two kinds of signalling messages transported over the radio interface - RRC generated signalling messages and so-called Non-Access Stratum (NAS) messages generated in the higher layers of the Radio interface in the Core Network. On establishment of the signalling connection between the peer RRC entities three or four signalling radio bearers may be set up. Two of these bearers are set up for transport of RRC generated signalling messages - one for transferring messages through an UM RLC entity and the other for transferring messages through an AM RLC entity. One signalling radio bearer, SRB 3 is set up for transferring NAS messages set to "high priority" by the higher layers. Another optional signalling radio bearer, SRB 4 may be set up for transferring NAS messages set to "low priority" by the higher layers. Subsequent to the establishment of the signalling connection a further signalling radio bearer, SRB TR, may be set up for transferring RRC generated signalling messages using transparent mode RLC. In the user plane the example in Figure 91 shows two traffic radio bearers. The one radio bearer employs PDCP and AM RLC, which could be used for a “non-real-time” packet data transmission service (internet application). The other radio bearer does not employ PDCP and it uses TR RLC. This is typically a radio bearer for support of a “real-time” transmission service, e.g. speech or video. The radio bearers are mapped by RLC onto the logical channels. SRBs are mapped to Dedicated Control Channels (DCCH), user plane RBs are mapped to Dedicated Traffic Channels (DTCH). SRB 1 and 2 can be established by the RRC Connection establishment procedure. The UE sends the RRC Connection Request message and with the RRC Connection Setup message the UE gets SRBs and DCCHs assigned. Note that all Radio Bearers are identified with a unique 5 bit number, i.e. at most 32 Radio Bearers can be established. Of these the identifiers 0 – 4 are reserved for SRBs. After an RRC connection has been established, further Radio Bearers can be established at any time with Radio Bearer Setup and released with Radio Bearer Release procedures. Dedicated logical channels are provided by a MAC-d entity. In the UE there is one such MAC-d entity that serves all dedicated logical channels established for this UE. In the network there is one instance of MAC-d for each UE. In MAC-d, logical channels can optionally be multiplexed

3rd Generation Mobile Communication Systems

Page 9-2

Version 1.12 01.08.2000

before they are mapped to a Dedicated Channel (DCH). Alternatively, each dedicated logical channel is mapped individually to DCH. DCH refers to a dedicated transport channel, which is provided by the physical layer. On the physical layer several DCHs can be multiplexed and mapped onto one or several dedicated physical channels (DPCH). A DPCH consists of two parts, Dedicated Physical Control Channel (DPCCH) and a Dedicated Physical Data Channel (DPDCH). A DPCCH carries information which is generated internally on L1. A DPDCH carries the encoded bits of the DCH transport channel. One main feature of a DCH is that it employs fast inner-loop power control. This implies that on the physical layer there is always a channel in the reverse direction needed which carries power control commands. On a DCH also antenna beam forming may be applied this implies that there are pilot bits in each DPCH included, even on the downlink where a Common Pilot Channel (CPICH) is available also for channel estimation. Power control commands and pilot bits are examples of L1 information carried on the DPCCH.

RRC SRB
TM-RLC

Traffic RB 1 SRB 2 SRB 4 SRB 3
PDCP

Traffic RB 2

SRB 1
UM-RLC

AM-RLC

AM-RLC AM-RLC

AM-RLC

TM-RLC

DCCH0

DCCH1

DCCH2

DCCH3, 4

DTCH

DTCH

MAC-d DCH1 PHY



DCHn DPCCH, DPDCH

Figure 91: Example radio protocol configuration for transmission on dedicated channels

9.2 Principles of transport channel handling on Layer 1
The physical layer receives on each transport channel a certain amount of data within a certain time interval, which is referred to as Transmission Time Interval (TTI). A TTI is either 10, 20, 40 or 80 ms in duration. The data on each transport channel is organized in Transport Blocks (equal to a MAC PDU) which have a fixed length in terms of the number of bits, referred to as transport block length. In each TTI a variable number of transport blocks, i.e. 0, 1, 2,… , Kmax can be transmitted, referred to as transport block set. The actual number of transport blocks is part of the dynamic transport format, which is indicated from MAC to PHY together with the transport channel data. The principal steps of transport channel processing on the physical layer before spreading are illustrated in Figure 92. The physical layer adds to each transport block a CRC code. Then the entire transport block set is encoded with a convolutional code or a turbo code. If the TTI is larger then 10 ms, the encoded bits are inter-frame interleaved. Then rate matching is applied with regard to all bits on all transport channel which in the next step are multiplexed together. By repetition and puncturing, the number of bits is matched which is available in the frame and slot

3rd Generation Mobile Communication Systems

Page 9-3

Version 1.12 01.08.2000

format of the data part of the physical channel. The multiplexed bit stream is in the final step intra-frame interleaved. With each transport block set also a transport format indicator TFI is provided to the physical layer for each transport channel. From all transport formats in a given radio frame a transport format combination indicator (TFCI) is derived which is a block-encoded representation of the TFI combination. The TFCI is indicated in every radio frame in the physical control part of the physical channel. Note that the explicit indication of TFCI is optional. When only very few transport format combinations are employed it is possible not to signal TFCI on the physical channel explicitly and let the receiver detect blindly which transport format has been used. Blind transport format detection can for example be performed by testing all possible formats and selecting the one for which CRC test is passed successfully. This described transport channel processing is applied for dedicated transport channels, but also for transport channels which are mapped to S-CCPCH (i.e. FACH and PCH). The above steps are elaborated in more detail in Section 9.5.

TFI1 TFI2 TFIN
TrCh1 TrCh2

. . .

TFCI Coding CRC attachment CRC attachment Inter-frame interleaving Inter-frame interleaving Rate Matching
(repetition and puncturing)

TFCI

Coding Coding

. . .
TrChN

. . .

. . .
Coding

. . .

Multiplexing

Intra-frame interleaving

CRC attachment

Inter-frame interleaving

Figure 92: Principle of transport channel processing on the physical layer

9.3 Format of Downlink Dedicated Physical Channels
The format of downlink Dedicated Physical Channels is shown in Figure 93. The physical control and data parts, DPCCH and DPDCH are time multiplexed. In each slot, the data part is divided into two fields, Data1 and Data2. The control part consists of Transmit Power Control (TPC) bits, Transport Format Combination Indicator (TFCI), and Pilot bits. In total each slot can carry 10×2k bits (5×2k QPSK symbols), k = 0,…, 7. There are several different slot formats defined with different split of data and control bits. At establishment of a downlink DPCH one of the permitted slot formats is selected and applied. Table 3 shows the list of slot formats in normal transmission mode. The complete list of downlink slot formats can be found in TS 25.211 (including slot formats for “compressed transmission mode”). On the downlink the spreading factor cannot be changed fast during transmission. A change of the spreading factor is only possible with a Physical Channel Reconfiguration message exchanged between RRC entities. The spreading factor is selected according to the highest

3rd Generation Mobile Communication Systems

Page 9-4

Version 1.12 01.08.2000

possible combined data rate on all transport channels carried on this particular DPCH. If for example the spreading factor 16 chips/symbol (i.e. 8 chips/bit) is used, then up to 10×25 = 320 bits/slot (4800 bits/frame, 480 kbps) can be transmitted.
DPDCH DPCCH DPDCH 2560 chips 10×2k bits Data 1 TPC TFCI Data 2 Pilot DPCCH

Slot 1

Slot 2

Slot i

Slot 15

10 ms Frame 1 Frame 2 Frame i Frame N

One super frame = N*10 ms

Figure 93: Format of downlink Dedicated Physical Channels

Table 3: Downlink DPCH slot formats in normal transmission mode
Slot Channel Channel SF Format Bit Rate Symbol #i (kbps) Rate (ksps) 0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 15 15 30 30 30 30 30 30 60 60 60 60 120 240 480 960 1920 7.5 7.5 15 15 15 15 15 15 30 30 30 30 60 120 240 480 960 Bits/ Slot DPDCH Bits/Slot DPCCH Bits/Slot NTFCI NPilot 0 2 0 2 0 2 0 2 0 2 0 2 8* 8* 8* 8* 8* 4 4 2 2 4 4 8 8 4 4 8 8 8 8 16 16 16 Transmitted slots per radio frame NTr 15 15 15 15 15 15 15 15 15 15 15 15 15 15 15 15 15

NData1 NData2 NTPC 0 0 2 2 2 2 2 2 6 6 6 6 12 28 56 120 248 4 2 14 12 12 10 8 6 28 26 24 22 48 112 232 488 1000 2 2 2 2 2 2 2 2 2 2 2 2 4 4 8 8 8

512 10 512 10 256 20 256 20 256 20 256 20 256 20 256 20 128 40 128 40 128 40 128 40 64 80 32 160 16 320 8 640 4 1280

3rd Generation Mobile Communication Systems

Page 9-5

Version 1.12 01.08.2000

For support of variable rate transmission on the downlink discontinuous transmission (DTX) can be applied for the DPDCH bits, i.e. for bit positions in the fields data1 and data2 which are not used, transmit power is switched off. As the number of bits of each transport channel may change every Transmission Time Interval (TTI) the DTX pattern on the DPCH may change every radio frame if there is at least one transport channel with a TTI of 10 ms. Resulting pattern of different and variable rate data transmission on the downlink is illustrated in Figure 94. On a “full-(1)-rate” downlink DPCH continuous transmission would occur. On a “half-(1/2)-rate” channel half of the DPDCH bits would not be used and transmit power would be switched off. If no data bits are available, only the DPCCH is transmitted, power at DPDCH bit positions is switched off. If variable rate transport channels are carried on the DPCH, then every 10 ms radio frame, the DTX transmit pattern can change.

10 ms 1-rate

1/2-rate

0-rate

Variable rate R=1 : DPDCH-part (Data) : DPCCH-part (Pilot+TPC+TFCI) R=0 R = 1/2 R=1

Figure 94: Examples of downlink DPCH transmit pattern with different and variable rate For support of very high data rates multiple codes can be combined for one DPCH. As illustrated in Figure 95 in this case on one channelization code both DPCCH and DPDCH are transmitted but with possibly different power weighting of the data and control bits. On the other channelization code of the multicode DPCH only the data bits (i.e. the DPDCH) is transmitted.

3rd Generation Mobile Communication Systems

Page 9-6

Version 1.12 01.08.2000

DPDCH TPC Transmission Power

DPDCH TFCI Pilot

Physical Channel 1

Transmission Power

Physical Channel 2

Transmission Power

•••

Physical Channel L

One Slot (2560 chips)

Figure 95: Downlink DPCH slot format in case of multi-code transmission

9.4 Format of Uplink Dedicated Physical Channels
The format of uplink Dedicated Physical Channels is shown in Figure 96. The physical control and data parts, DPCCH and DPDCH, are transmitted in parallel on separate channels. The control part consists of Transmit Power Control (TPC) bits, Transport Format Combination Indicator (TFCI), diversity Feedback Information (FBI) and Pilot bits. The spreading factor of the DPCCH is fixed to 256, i.e. the DPCCH carries 10 bits. There are however different formats defined, with different split of the 10 bits over the above fields. One such format must be selected at initial configuration of the physical layer. The list of uplink DPCCH slot formats can be found in TS 25.211. On the uplink DPDCH the spreading factor can change on a frame-by-frame basis during transmission depending on the number of bits. It is aimed to transmit continuously with at least as possible jumps of transmit power as possible in order to improve electro-magnetic compatibility (EMC) of the uplink transmissions. Each DPDCH slot can carry 10×2k bits, k = 0,…, 6. The resulting formats and uplink transmission rates are shown in Table 4. The smallest spreading factor permitted to be used on a DPDCH is a parameter set at connection establishment depending on the established service (according to the maximum rate of all involved transport channels).

3rd Generation Mobile Communication Systems

Page 9-7

Version 1.12 01.08.2000

Table 4: Uplink DPDCH slot formats
Slot Format #i 0 1 2 3 4 5 6 Channel Bit Rate (kbps) 15 30 60 120 240 480 960 Channel Symbol Rate (ksps) 15 30 60 120 240 480 960 SF 256 128 64 32 16 8 4 Bits/ Frame 150 300 600 1200 2400 4800 9600 Bits/ Slot 10 20 40 80 160 320 640 Ndata 10 20 40 80 160 320 640

2560 chips, 10×2k bits DPDCH DPCCH Pilot Data TFCI 2560 chips, 10 bits FBI TPC

Slot 1

Slot 2

Slot i

Slot 15

10 ms Frame 1 Frame 2 Frame i Frame N

One super frame = N*10 ms

Figure 96: Format of uplink Dedicated Physical Channels Resulting pattern of different and variable rate data transmission on the uplink is illustrated in Figure 97. On a “full-(1)-rate” uplink DPDCH, continuous transmission with the smallest spreading factor is employed. On a “half-(1/2)-rate” channel there are only half the bits of the full rate channel, so they can be spread with the double spreading factor. The half rate channel requires only half the transmit power to achieve the same Es/N0 as the full rate channel. If no data needs to be transmitted the DPDCH is switched off. The DPCCH is transmitted continuously and independent of the DPDCH. If variable rate transport channels are carried on the DPDCH, then every 10 ms radio frame, the spreading factor can change. For support of very high data rates, multiple codes can be combined for one uplink DPCH. When multi-code transmission is used, several parallel DPDCH are transmitted using different channelization codes. However, there is only one DPCCH per radio link.

3rd Generation Mobile Communication Systems

Page 9-8

Version 1.12 01.08.2000

10 ms

1-rate

1/2-rate 1/4-rate 0-rate

Variable rate R=1 : DPDCH (Data) : DPCCH (Pilot+TFCI+FBI+TPC) R = 1/2 R=0 R=0 R = 1/2

Figure 97: Examples of uplink DPCH transmit pattern with different and variable rate

9.5 Coding, Rate Adaptation, Multiplexing
Figure 98 and Figure 99 show for uplink and downlink, respectively, the various steps of coding, rate adaptation and multiplexing of transport channels which were already presented in Figure 92 on a less detailed level. Most of the steps are identical for uplink and downlink channels. Differences occur mainly with regard to rate matching. The processing is done in the following steps: CRC attachment CRC code is attached to each Transport Block (MAC PDU) on every transport channel. The CRC result is used for e.g. macro diversity combining, outer loop power control, out-of-sync detection, and for triggering of retransmissions in RLC acknowledged transmission mode. CRC can be configured with length 24, 16, 12, 8 or 0 bits (0 bit means that no CRC is applied). The following CRC code polynomials are used: GCRC24(D) GCRC16(D) GCRC12(D) GCRC8 (D) = D24+D23+D6+D5+D+1 = D16+D12+D5+1 = D12+D11+D3+D2+D+1 = D8+D7+D4+D3+D+1

Transport block concatenation, code block segmentation In this step all transport blocks of a transport block set are serially concatenated. Due to implementation reasons there have been limits defined for the maximum size of a code block, which are specified to 512 – Ktail for convolutional codes and 5120 – Ktail for turbo codes, where Ktail is the number of tail bits of the encoder (Ktail = 8 for convolutional codes, Ktail = 6 for turbo codes). If the concatenated transport block is larger than this limit it is segmented into an integer number of code blocks. If transport block set length does not fit exactly into an integer number of code blocks, the last coding block is filled with padding bits (“0”).

3rd Generation Mobile Communication Systems

Page 9-9

Version 1.12 01.08.2000

TrCH#1 CRC attachment TB concatenation / Code block segmentation Channel coding Radio frame equalisation 1st interleaving Radio frame segmentation Rate matching

TrCH#2

Rate matching

TrCH Multiplexing Physical channel segmentation 2nd interleaving Physical channel mapping PhCH#1 PhCH#2

Figure 98: Coding, rate adaptation and multiplexing of uplink transport channels Channel coding Table 5 shows which codes can be applied on the various transport channels. On dedicated channels no channel coding, convolutional coding with rate 1/2 or 1/3, or turbo coding with rate 1/3 is employed (the mentioned rates do not take puncturing into account). Table 5: Coding schemes applied in UMTS Transport channel BCH PCH RACH Convolutional 1/2 Coding scheme Coding rate

CPCH, DCH, DSCH, FACH

1/3, 1/2 Turbo No coding 1/3

3rd Generation Mobile Communication Systems

Page 9-10

Version 1.12 01.08.2000

TrCH#1 CRC attachment TB concatenation / Code block segmentation Channel coding Rate matching Insertion of DTX indicat. with fixed positions 1st interleaving Radio frame segmentation

TrCH#2

Rate matching

TrCH Multiplexing Insertion of DTX indication with flexible positions Physical channel segmentation 2nd interleaving Physical channel mapping PhCH#1 PhCH#2

Figure 99: Coding, rate adaptation and multiplexing of downlink transport channels

The constraint length of the convolutional code is K = 9. Therefore Ktail = 8 tail bits (“0”) are included, the coder registers are initialized to ‘all 0’. Figure 100 shows the structure of the convolutional coders.

3rd Generation Mobile Communication Systems

Page 9-11

Version 1.12 01.08.2000

Input

D

D

D

D

D

D

D

D
Output 0 G0 = 561 (octal) Output 1 G1 = 753 (octal)

(a) Rate 1/2 convolutional coder Input

D

D

D

D

D

D

D

D
Output 0 G0 = 557 (octal) Output 1 G1 = 663 (octal) Output 2 G2 = 711 (octal)

(b) Rate 1/3 convolutional coder

Figure 100: Structure of convolutional encoders Turbo coding is employed in case of service quality requirements in the bit error rate range Pb = 10-6 ... 10-3 . The turbo codes specified for UMTS are Parallel Concatenated Convolutional Codes (PCCC) with 8-state constituent Recursive Systematic Code (RSC) encoders. The generator Polynomial of the turbo code is G(D) = [1,(1+D+D3)/(1+D2+D3)]. Figure 101 shows the structure of the turbo encoder. Trellis termination is performed by taking the tail bits from the shift register feedback after all information bits are encoded. Tail bits are padded after the encoding of information bits. The first three tail bits shall be used to terminate the first constituent encoder (upper switch of Figure 101 in lower position) while the second constituent encoder is disabled. The last three tail bits shall be used to terminate the second constituent encoder (lower switch of Figure 101 in lower position) while the first constituent encoder is disabled. The Turbo code internal interleaver consists of bits-input to a rectangular matrix, intra-row and inter-row permutations of the rectangular matrix, and bits-output from the rectangular matrix with pruning.

3rd Generation Mobile Communication Systems

Page 9-12
xk

Version 1.12 01.08.2000

1st constituent encoder

zk

xk
Input D D D

Input

Output 2nd constituent encoder

Turbo code internal interleaver
Output

z’k

x’k

D

D

D

x’k

Figure 101: Structure of rate 1/3 Turbo coder (dotted lines apply for trellis termination only) Radio frame equalization Radio frame size equalisation is padding the input bit sequence in order to ensure that the output can be segmented in C1 data segments of same size for the first interleaver. Radio frame size equalisation is only performed in the UL (DL rate matching output block length is always an integer multiple of C1). First Interleaving (inter-frame) The first interleaver is a block interleaver with inter-column permutation. Block length X = R1 . C1, R1 rows, C1 columns (= number of radio frames per TTI) Interleaving is performed in following steps: write block row by row perform inter-column permutation according to the table below read column by column TTI (ms) 10 20 40 80 Number of columns C1 1 2 4 8 {0} {0,1} {0,2,1,3} {0,4,2,6,1,5,3,7} Inter-column Permutation

Radio frame segmentation Grouping of the first interleaver output bits according to the interleaver columns (C1 segments). Rate matching Rate matching is applied to match the number of encoded bits with the number of available bits on a physical channel.

3rd Generation Mobile Communication Systems

Page 9-13

Version 1.12 01.08.2000

On the uplink rate matching is done by repetition and puncturing of selected bits. On the downlink rate matching is done by repetition of selected bits and discontinuous transmission (DTX). There are two optional DTX modes on the downlink: TrCH at fixed positions within radio frame TrCH at flexible positions (DTX at end of the radio frame)

When turbo codes are employed rate matching must only be applied to the parity bits. To ensure the turbo coder output bits need to be separated before rate matching is applied, see Figure 102. On downlink channels the bit separation is simple as rate matching is performed directly after coding. On uplink channels interleaving between turbo encoder and rate matching needs to be taken into account.

X Radio frame segm. Bit Y Rate sepaY’ matchration ing Uplink Turbo Encod. Bit Y Rate sepaY’ matchration ing Downlink

Figure 102: Bit separation for rate matching in case of turbo coding

Transport channel multiplexing The bits from each Transport Channel are blockwise (per 10 ms radio frame) concatenated. The multiplexer output is denoted as ”Coded Composite Transport Channel” (CCTrCH). Physical channel segmentation For very high rates several parallel physical channels need to be employed, all using the same spreading factor (“multicode channel”). Physical channel segmentation refers to splitting the bits of a CCTrCH into different streams, each mapped onto a separate physical channel. Second interleaving The second interleaver is a block interleaver with inter-column permutations. It interleaves the N bits within one radio frame (intra-frame interleaving) The block interleaver has a fixed number of columns C2 = 30. The number of rows is R2 = N/30. Interleaving is performed in following steps: write block row by row perform inter-column permutation according to the table below read column by column pruning (removing of output bits which do not correspond to input bits)

3rd Generation Mobile Communication Systems

Page 9-14

Version 1.12 01.08.2000

Number of columns C2 30

Inter-column Permutation
{0,20,10,5,15,25,3,13,23,8,18,1,11,21,6,16,26,4,14,24,19,9,29,12,2,7,22,27,17}

Physical channel mapping The bits are mapped onto physical channels such that uplink physical channels are completely filled (continuous transmission) Downlink physical channels may be filled partly only as discontinuous transmission (DTX) can be applied. When “blind rate detection” shall be applied, the bits of one transport channels requires fixed positions within a radio frame. When Transport Format Indication (TFCI) is applied, fixed or flexible positions of transport channels. Insertion of DTX indication bits This step is applicable on downlink transport channels only. It refers to insertion of symbols ∉{0, 1} which indicate to the spreading/modulation unit that these symbols should not be transmitted. DTX indication bits are inserted at fixed or flexible positions, depending on the transport channel mapping scheme. In Figure 99 only one of the blocks, either “Insertion of DTX indication with fixed positions” or “Insertion of DTX indication with flexible positions” is carried out. When transport channels have fixed positions in the transmitted radio frame, then the total available number of bits on the downlink DPDCH is divided into a number of parts equal to the number of transport channels. Each part has a fixed assignment to a specific transport channel, i.e. a fixed number of bits is reserved for each transport channel in the radio frame, the DTX indicators are placed at the end of each reserved field. When transport channels have variable positions, the DTX indication bits inserted in this step are placed first at the end of the radio frame. Note that after 2nd interleaving, however, the DTX will be distributed over all slots in both cases. TFCI encoding When TFCI bits are transmitted, TFCI is block-encoded with a (30, 10) punctured code of a (32,10) subcode of second order Reed-Muller code. The 10 bits before encoding can indicate 1024 different transport format combinations. The 30 block-encoded bits are transmitted in each frame, i.e. 2 bits/slot. In the receiver the respective inverse operations to the above described functions are performed (demultiplexing, deinterleaving, decoding, CRC check and removal of CRC bits, etc.).

9.6 Modulation and spreading Downlink
Modulation and spreading of downlink dedicated physical channels is performed as described in Section 7.2.

3rd Generation Mobile Communication Systems

Page 9-15

Version 1.12 01.08.2000

Uplink
Modulation and spreading of uplink dedicated physical channels is performed similarly as described in Section 8.2 for the PRACH (Figure 86). Figure 103 illustrates the general structure of the uplink spreading of DPCCH and DPDCHs. One DPCCH and up to six parallel DPDCHs can be transmitted simultaneously, i.e. 1 ≤ n ≤ 6. A UE with basic service capabilities would only use the DPCCH and DPDCH.
cd,1 DPDCH1 cd,3 DPDCH3 cd,5 DPDCH5 βd βd βd

Σ

I

Sdpch,n I+jQ cd,2 βd S

DPDCH2 cd,4 DPDCH4 cd,6 DPDCH6 cc DPCCH βc βd βd

Σ

Q

j

Figure 103: Spreading for uplink DPCCH and DPDCHs The binary DPCCH and DPDCHs to be spread are represented by real-valued sequences, i.e. the binary value "0" is mapped to the real value +1, while the binary value "1" is mapped to the real value –1. The DPCCH is spread to the chip rate by the channelization code cc, while the n:th DPDCH called DPDCHn is spread to the chip rate by the channelization code cd,n. After channelization, the real-valued spread signals are weighted by gain factors, β c for DPCCH and β d for all DPDCHs. As it is always different channels in the I and Q components, this kind of modulation is a form of binary PSK for each individual channel. It can however also be interpreted as “dual channel”

3rd Generation Mobile Communication Systems

Page 9-16

Version 1.12 01.08.2000

QPSK since the QPSK signal constellation points are utilized for the overall transmitted signal, although with possibly different weighting of the I and Q component. Channelization code for uplink DPCH The OVSF channelization codes for uplink DPCCH and DPDCHs are assigned as follows: The DPCCH is always spread by code cc = Cch,256,0 (note that this is the ‘all one’ sequence). When only one DPDCH is to be transmitted, DPDCH1 is spread by code cd,1 = Cch,SF,k where SF is the spreading factor of DPDCH1 and k= SF / 4 (note that this channelization code are repetitions of the sequence (1 1 –1 –1). When more than one DPDCH is to be transmitted, all DPDCHs have spreading factors equal to 4. DPDCHn is spread by the the code cd,n = Cch,4,k , where k = 1 if n ∈ {1, 2}, k = 3 if n ∈ {3, 4}, and k = 2 if n ∈ {5, 6}.

-

The channelization codes are numbered as shown in Figure 34. Scrambling codes for uplink DPCH All uplink physical channels are subjected to scrambling with a complex-valued scrambling code. The DPCCH/DPDCH may be scrambled by either long or short scrambling codes. The short scrambling codes have been specified in order to reduce implementation complexity of joint (multi-user) detection schemes. There are 224 long and 224 short uplink scrambling codes. Uplink scrambling codes are assigned by RRC. The long scrambling code is generated with the code generator shown in Figure 104 which generates two Gold codes of period 225 –1, clong,1,n and clong,2,n. The code clong,1,n is a 16777232 chip shifted version of the code clong,2,n.

Xn MSB LSB y

clong,1,n

clong,2,n

Figure 104: Configuration of uplink scrambling sequence generator We denote the two m-sequences with xn and y. The sequence xn is constructed using the primitive (over GF(2)) polynomial X25+X3+1. The sequence y is constructed using the polynomial X25+X3+X2+X+1. The shift register that generates the m-sequence xn is initialized with a 24 bit binary representation of the scrambling sequence number n = (n23 … n0) as follows:

3rd Generation Mobile Communication Systems

Page 9-17

Version 1.12 01.08.2000

xn(0)=n0 , xn(1)= n1 , … , xn(22)= n22 ,xn(23)= n23, xn(24)=1. The shift register that generates the m-sequence y is initialized with ‘all ones’: y(0)=y(1)= … =y(23)= y(24)=1. Finally the complex scrambling code used on the uplink is constructed from the two sequences clong,1,n and clong,2,n. as follows (here clong,1,n and clong,2,n are interpreted in ±1 representation):

S DPCH, n (i ) = clong,1,n (i ) 1 + j (− 1) clong,2,n (2 i / 2) , i = 0, 1, …, 38399
i

(

)

where  denotes rounding to nearest lower integer. Note that every chip of the sequence clong,2,n is repeated once. The period of the final scrambling code is limited to 38400 chips, i.e. the scrambling code is repeated for every radio frame. The chosen scrambling code introduces correlations between the real and imaginary chip sequences. In combination with the selected channelization codes this leads to a low peak-toaverage ratio (PAR) of the complex spread signal, especially for the case where only a single DPDCH is employed. Note that PAR is defined as the ratio of the maximum value of the complex baseband signal envelope s(t) relative to its root mean square (RMS) value:

PAR (dB) = 20 ⋅ log

max t s (t ) E s (t )
2

[ ]

.

The saving of PAR compared to normal (uncorrelated) QPSK spreading is in the order of 2 dB (the PAR is approximately the same as can be reached with Offset QPSK). The short scrambling codes cshort,1,n(i) and cshort,2,n(i) are generated with the code generator shown in Figure 105 which generates sequences from the family of periodically extended S(2) codes of period 255 chips [9.9]. With different initial settings n23n22…n0 of the three shift registers in total 224 different quaternary S(2) sequences zn(i), 0 ≤ n ≤ 16777215 can be generated by modulo 4 addition of the three sequences output from the shift registers. The sequence zn(i) is extended to length 256 chips by setting zn(255) = zn(0). The mapping from the quaternary sequence zn(i) to the real-valued binary sequences cshort,1,n(i) and cshort,2,n(i), , i = 0, 1, …, 255 is defined in the Table below.
zn(i) 0 1 2 3 cshort,1,n(i) +1 -1 -1 +1 cshort,2,n(i) +1 +1 -1 -1

Finally, a complex-valued short scrambling sequence Cshort, n, is defined as:

C short , n (i ) = c short ,1,n (i mod 256) 1 + j (− 1) c short , 2,n (2 (i mod 256 ) / 2)
i

(

)

where i = 0, 1, 2, … and  denotes rounding to nearest lower integer. When using short scrambling codes, the nth uplink scrambling code for DPCCH/DPDCH, denoted Sdpch, n, is defined as:
Sdpch,n(i) = Cshort,n(i), i = 0, 1, …, 38399.

3rd Generation Mobile Communication Systems

Page 9-18
2

Version 1.12 01.08.2000

7

6

5

4

3
mod 2

2

1

0
d(i)

+

+

+

2
zn(i)
Mapper

+

mod n addition 7 multiplication
mod 2

cshort,1,n(i) cshort,2,n(i)

6

5

4

3

2

1

0
b(i) mod 4

+

+

+

+

7

6

5

4

3

2

1

0
a(i)

3

3 2 3

mod 4

+

+

+

+

Figure 105: Uplink short scrambling sequence generator for 255 chip sequence

9.7 Compressed transmission mode
The compressed transmission mode is used to enable a UE in FDD mode to perform measurements on a second frequency while it is transmitting on another first frequency. Compressed transmission means that the DPCH transmission bursts are compressed such that they fit into a smaller timer interval than a radio frame. The compressed transmission mode is mainly foreseen for the downlink. It may however also be applied on the uplink. If it is applied on the downlink alone, the UE must be capable to operate at variable duplex distance since two frequencies f1 and f2 are used on the downlink while the uplink frequency would remain constant. If compressed mode is applied simultaneously on uplink and downlink, variable duplex distance can be avoided. Figure 106 shows an example transmit pattern in downlink compressed mode. Transmission is performed on a frequency f1 while measurements are performed on frequency f2.
10 ms 1-rate

UE Rx

f1

f1

f2

f1

f2

f1

Figure 106: Downlink DPCH compressed mode pattern There are three different methods for generating of the transmission gaps specified: • • • Puncturing, change of spreading factor, upper layer scheduling of data.

3rd Generation Mobile Communication Systems

Page 9-19

Version 1.12 01.08.2000

The method to be applied is selected by the RRC protocol based on UE capability information. When compressed mode transmission is enabled it must not be applied in every radio frame. The compressed mode transmission time instants can be configured by a set of RRC parameters as illustrated in Figure 107.
Pattern duration (PD)
ransmission Gap Period (TGP)

10 ms

Transmission Gap Length Transmission Gap Distance

Figure 107: Illustration of compressed mode pattern generation from RRC parameters

References
[9.1] [9.2] [9.3] [9.4] [9.5] [9.6] [9.7] [9.8] [9.9] 3GPP TS 25.303, “RRC Protocol specification”, V3.2.0, March 2000. 3GPP TS 25.321, “MAC Protocol specification”, V3.3.0, March 2000. 3GPP TS 25.211, “Physical channels and mapping of transport channels onto physical channels (FDD)”, V3.2.0, March 2000. 3GPP TS 25.221, “Physical channels and mapping of transport channels onto physical channels (TDD)”, V3.2.0, March 2000. 3GPP TS 25.212, “Multiplexing and channel coding (FDD)”, V3.2.0, March 2000. 3GPP TS 25.222, “Multiplexing and channel coding (TDD)”, V3.2.0, March 2000. 3GPP TS 25.213, “Spreading and modulation (FDD)”, V3.2.0, March 2000. 3GPP TS 25.223, “Spreading and modulation (TDD)”, V3.2.0, March 2000. P.V. Kumar, T. Helleseth, R. Calderbank, R. Hammons, “Large families of quaternary sequences with low correlation”, IEEE Transactions on Information Theory, Vol. 42, pp. 579-592, March 1996.

3rd Generation Mobile Communication Systems

Page 10-1

Version 1.12 01.08.2000

10 Support of packet-switched services
10.1 General network and protocol architecture aspects

Efficient support of packet data services is one of the most important design targets of UMTS. We understand here under packet services those telecommunication services where the information bearers are originating or terminating in the packet switched core network domain, i.e. bearer services provided by UTRAN to the PS-CN domain. Todays most important applications which require packet data transmission services are internet applications, for instance, • • • • • Interactive Web browsing, File transfer (ftp), Telnet, Electronic mail, Electronic commerce.

Figure 108 shows the Public Land Mobile Network (PLMN) architecture with respect to packet services.
N-ISDN/ PSTN Packet switched networks (IP, X.25)

MSC/ VLR

GMSC

PLMN Operator 1 Gc

GGSN

Gn
GPRS backbone IP Network

PLMN Operator 2 Gp
GGSN

GSM backbone

HLR MSC/ VLR

Gr Gs Gb

Gn
SGSN SGSN

A

Iu-PS

GSM BSS

UMTS RNS

Figure 108: PLMN Architecture for packet transmission The example shows the network of an operator providing GSM circuit-switched and GPRS packet switched services to mobile users via both, GSM and UMTS radio access networks. The packet switched core network consists of an Internet Protocol (IP) based GPRS backbone network. This backbone network is comprised of a network of IP routers. As edge nodes of the backbone network there are Gateway GPRS support nodes (GGSN) providing connectivity to external packet-switched telecommunication networks, e.g. to “the Internet”, or to other

3rd Generation Mobile Communication Systems

Page 10-2

Version 1.12 01.08.2000

operators’ PLMN. For mobility management the GPRS core network uses the same resources (VLR, HLR) as the circuit-switched core network. The network commonly referred to as “the Internet” is actually comprised of several IP networks as illustrated in Figure 109. Some networks are operated by Internet Service Providers (ISP), which provide access to “the Internet” to private users via data modems. Other networks are for example corporate networks, which itself may consist of an IP backbone which interconnects several local area networks (LAN). A LAN is a physical network of computers, hosts (H), and servers (S) which provide special services to the other computers (file management, data bases, etc.). The IP backbone is a network of IP routers (R). Special servers (S) may directly be connected to the backbone network. In ISP networks special servers perform the management of subscriber data, billing, Other servers provide access to WWW home pages, or manage mass storage devices for e-mail, voice mail or fax data, etc. The hosts shown in Figure 109 are those computers which normally act as “client” in internet application. On principle however every host connected to the internet may also become a server, i.e. provide services to other hosts (clients) which are connected to the internet.

Other IP networks

S e.g. ISP network S S backbone IP Network R S R S Modem Pool R GW GW

backbone IP Network R R R

S

e.g. corporate IP network

R Local area network H S

H PSTN H

H

H

H

Figure 109: Illustration of the Internet architecture The various IP networks are connected via Gateways (GW) with each other. A Gateway is a data relay station operating at Network layer (IP) or a higher layer than the Network layer. A Gateway is a router with some additional functions, for example “firewall” functionality which for example imposes certain restrictions on access-rights to non-authorized users. A special type of a Gateway is referred to as Proxy, which to external networks appears as it would be a client, whereas the real client is hidden in the protected network, e.g. a corporate network. With the above described architecture “the Internet” can be interpreted as a computer communication network, where each user (host) can uniquely be identified by an IP address. In the currently used version of the Internet Protocol, IPv4, the IP address is a 32 bit number.

3rd Generation Mobile Communication Systems

Page 10-3

Version 1.12 01.08.2000

There are five IP address classes defined (denoted class A – E) which allow a hierarchical organization of the IP address space: • • • • Class A allows to address up to 126 networks with 16 million hosts each, Class B allows up to 16382 networks with up to 64K hosts each, Class C allows 2 Million Networks with up to 256 hosts each, Class D is for multicast networks, Class E reserved for future use.

The Internet Protocol is a Network layer protocol (OSI layer 3) which provides connectionless packet transmission services (also referred to as datagram services). Each IP packet (or datagram) includes the source and the destination IP address. The length of the IP header is 20 bytes or larger. The total maximum length of an IP packet is 216 –1 = 65535 bytes. In todays systems the maximum length is often limited to 4096 bytes. IP networks employ on top of IP an end-to-end transport layer protocol (OSI layer 4), for example the Transport Control Protocol (TCP) or the User Datagram Protocol (UDP). TCP provides a virtual circuit service that “guarantees” to deliver a stream of data from one computer to another by means of retransmission. TCP provides segmentation/reassembly functionality to the higher layer. A TCP data PDU (“TCP packet”) contains as payload a segment of higher layer data which can have variable length.. There are also control PDUs defined which are used e.g. for TCP connection control (establishment, release) and retransmission control which do not contain payload. The size of the header of TCP data PDUs and the size of control PDUs is variable and amounts to at least 20 bytes. UDP provides an unacknowledged datagram transmission service of variable-length packets, i.e. without retransmission. The UDP header amounts to only 8 bytes. To be described in detail later: IP address management: • • • Leased IP address by PLMN operator, Leased IP address by ISP service provider, Home IP address, home agent, foreign agent

GPRS Tunneling Protocol (GTP): encapsulation of the end-user’s IP address, for PLMN internal transport separate IP addresses used.

Figure 110 shows the protocols involved in a TCP/IP connection between a mobile user and an application in an IP network. The user IP address is used for routing within the IP network to the GGSN. In the GPRS core network the user IP address is encapsulated by the GPRS Tunneling Protocol (GTP-U). Then the original IP packet included in the GTP-U PDU is included as payload into a new IP packet, which uses the IP address of the target SGSN. Note that there exist separate GTP connections between SGSNs and GGSNs, and RNCs and SGSNs.

3rd Generation Mobile Communication Systems

Page 10-4

Version 1.12 01.08.2000
IP server Application TCP

UE Application TCP IP RNC 3G-SGSN GGSN

IP

RRC PDCP RLC MAC

RRC PDCP RLC MAC

Iu UP GTP-U UDP GTP-U UDP GTP-U GPRS IP backbone UDP
IP routing

GTP-U

IP

UDP

IP PHY PHY Node B AALx/ ATM

IP AALx/ ATM

IP

IP

IP

IP

Uu

Iu

Gn

Gn

Gi

Figure 110: Radio and transport protocols involved in packet data transmission At the network side PDCP receives the de-encapsulated IP packets through the Iu user plane frame handling protocol. This point corresponds basically to the output of the IP protocol residing in the IP network below the application protocol. However due to the transport through the GPRS CN and the IP network, the transmission may be affected by delays and possibly even loss of packets. Note that the figure only shows transport protocols for the user plane. Mobility Management and Call Control radio interface protocols which reside on top of RRC are not shown for simplification. The radio interface must be capable to transmit IP packet data efficiently over the radio channels as it occurs on top of the PDCP protocol. Such packet data is characterized by its • • • burstiness, variable length of the packets (number of bytes per burst), delay insensitivity (however with different degrees of delay sensitivity),

Note that the current version of IP only supports so called “best effort data transmission”, it is generally not possible to control priority and delay of IP data packets. As described in Sec. 6.6 the PDCP protocol performs TCP/IP header compression. While PDCP adds itself one or three bytes header to each IP packet, it can reduce the TCP/IPv4 header from 40 bytes to around 4 – 7 bytes (depending on the selected compression algorithm).

10.2

Common Packet Channel CPCH

The CPCH can be regarded as a Random Access Channel (RACH) with provision of closed-loop inner transmit power control during transmission of the so-called message part. Due to the existence of fast power control, the CPCH message can be transmitted over time intervals of several radio frames. Note that due to lack of fast power control, RACH message transmission should be performed in as short as possible time intervals. In terms of the amount of data that can be transmitted, the CPCH can be regarded as an uplink channel that is targeted to be especially suited for support of "medium-size traffic volume"

3rd Generation Mobile Communication Systems

Page 10-5

Version 1.12 01.08.2000

packet services, aiming to provide an intermediate channel between RACH and Dedicated Channel (DCH). As the RACH, the CPCH is a contention based channel. Compared to the RACH there are following additional features: • • • Digital sensing whether a requested CPCH is busy or idle, Collision detection before the message is transmitted, "Long" message part (up to 64 radio frames), transmitted with closed loop power control.

Due to the first two features the CPCH as said to employ the Digital Sense Multiple Access with Collision Detection (DSMA-CD) access method. The CPCH requires two AICH-like downlink channels, one for acquisition indication of the access preamble (AP-AICH) and one for support of the collision detection function (CD/CAICH). In addition there is a CPCH Status Indication Channel (CSICH) employed which is time multiplexed with the AP-AICH. Two are two different CPCH operation modes defined: • UE channel selection (CS) The UE selects a CPCH based on status indication broadcast on CSICH and starts power ramping phase using a signature which identifies a specific requested CPCH in the CPCH det. If it is acknowledged negatively since the requested CPCH is already occupied, the access attempt is aborted and MAC starts another attempt after CPCH re-selection. • UTRAN channel assignment (CA) The UE requests for a CPCH with a certain bit rate (spreading factor) based on indication of maximum available spreading factor on CSICH. During CD phase the network assigns a specific CPCH to be employed by the UE for message transmission. The principle of CPCH transmission is illustrated in Figure 111. Before the UE accesses the CPCH it reads CPCH status information on the CSICH. Based on the status information, the UE selects a signature for the preamble transmission. The UE sends preambles with increasing power level and monitors the AP-AICH on the downlink. The format of CPCH preambles is identical with the format of RACH preambles (see Figure 83). When the network has detected a CPCH preamble it echoes it on the AP-AICH. The AP-AICH employed with CPCH and the AICH used with RACH are quite similar. A major difference between AICH used for RACH and AP-AICH used for CPCH is that in a given access slot for CPCH at most one positive acknowledgement (Ack) is transmitted. All other simultaneously acquired preambles would get a negative acknowledgement. Main reason for this is to improve the performance of collision detection. The UE that has received the positive acknowledgement sends in the next step a Collision Detection (CD) preamble, which uses a different scrambling code than the access preamble, but otherwise it has the same structure. The signature of the CD preamble is selected randomly. On the CD/CA-ICH the CD signature is echoed. A UE sends its message only in case of detecting the correct CD signature. A low likelihood for collisions of CPCH messages is an important requirement since it may have significant impact on performance due to the potentially long transmission duration (i.e. several TTIs) and potential problems with the uplink power control. After sending of the CD acknowledgement the network starts transmission of a downlink DPCCH which is mainly used for transmission of the TPC commands for power control during

3rd Generation Mobile Communication Systems

Page 10-6

Version 1.12 01.08.2000

CPCH message transmission. This DPCCH uses a code which has a fixed association with the CPCH used for message transmission. The downlink DPCCH is also employed to send some special CPCH control information to the UE. Firstly, at start of transmission of the DPCCH a specified number of start-of transmission indicators is sent by the network to the UE. Secondly, a UE can be commanded by the network to stop transmission on this CPCH immediately (“emergency stop”). The start-of transmission indication is needed especially in the UTRAN channel assignment operation mode. It enables the UE to check whether it really has acquired the correct DPCCH for power control. In the UTRAN channel assignment operation mode there is additional information sent on the CD/CA-ICH together with the Collision Detection signature. In this mode the UE just requests by the signature used in the access preamble for a CPCH allowing a specific maximum data rate (i.e. a certain minimum spreading factor for DPDCH). The network then assigns a specific CPCH to the UE by sending another signature together with the CD signature on the CD/CA-ICH. In this mode the bi-orthogonal set of signatures is employed and always two signatures are sent simultaneously. In case this channel assignment command is detected erroneously, the UE would select an incorrect CPCH and tune to the DPCCH associated with this incorrect CPCH. As the start-of transmission indicator is sent only on the DPCCH associated with the correct CPCH, the UE would notice from not getting it that it has acquired a wrong CPCH and DPCCH, and will stop using it.

Physical CPCH “Access slot” 5120 chips Timing offset

Access Preamble 4096 chips

CD Message signature (several frames) CD Preamble Power Control (0 or 15 slots) DPDCH EOT indic. DPCCH AP-AICH “Ack”

AP-AICH + CSICH

CD/CA-ICH Acquisition Indicator (AI) “Ack” 4096 chips DL-DPCCH

Figure 111: CPCH transmission On the uplink optionally transmission starts with a power control preamble of 15 slots (10 ms) duration in order to achieve a stabilized power level before the actual message (i.e. the DPDCH) is transmitted. When message transmission ends before the maximum permitted message duration this can be indicated to the base station receiver by sending a specified number of radio frames DPCCH only after end of the DPDCH transmission. This allows the network to release the CPCH and indicate its availability on CSICH faster than without this feature (referred to as End-oftransmission (EOT indication).

3rd Generation Mobile Communication Systems

Page 10-7

Version 1.12 01.08.2000

The format of the CSICH is shown in Figure 112. In every access slot 8 bits are transmitted which fills the 1024 chips interval between two AP-AICH transmissions (i.e. the same channelization code is used as for AP-AICH). The spreading factor is 128 chips/bit (256 chips/symbol). The 120 bits transmitted over 15 consecutive access slots (20 ms) form a CSICH message. Each CSICH message consists of N Status Indicators (SI), where N = 1, 3, 5, 15, 30 or 60. Status Indicator SIn, n = 1,…,N-1 is mapped to 120/N consecutive bits on the CSICH. There are two modes of CSICH messaging, • • PCPCH availability (PA) mode, used in conjunction with the UE channel selection scheme, PCPCH availability with minimum available spreading factor (PAMASF) mode, used in conjunction with the UTRAN channel assignment scheme.

In the UE channel selection mode there are K ≤ 16 CPCHs (per “CPCH set”, as there are at most 16 signatures defined). In PA mode, the availability of these K CPCHs is indicated as follows. Firstly the parameter N is determined from

 3,  5,  N = N (K ) =  15,  30, 
Then the status indictors are set as follows

K ≤3 4≤K ≤5 6 ≤ K ≤ 15 K = 16

SIn = PCA(k), k = (n mod K) , n = 0,…, N-1, Where PCA(k) = 1 indicates availability of the k-th CPCH, and PCA(k) = 0 its non-availability.

4096 chips AP-AICH

SI part (1024 chips)
b8i b8i+1 b8i+6 b8i+7

AS #14

AS #0

AS #1

AS #i 20 ms

AS #14

AS #0

Figure 112: Format of the CPCH Status Indicator Channel (CSICH)

In PAMASF mode, in addition to indication of channel availability the minimum available spreading factor (MASF) is indicated. For this purpose the Status Indicators are split into two fields, three SIs are used to indicate MASF and K SIs indicate channel availability. The scheme is illustrated in Figure 113. Channel availability is indicated always once per message, whereas the 3 SIs for MASF indication are repeated if SIs are available. With this scheme the status of maximum K = 57 CPCHs can be indicated (in this case N = 60).

3rd Generation Mobile Communication Systems

Page 10-8

Version 1.12 01.08.2000

N MASF
MASF(0) MASF(1) MASF(2)

0 0 0 no PCPCH available 0 0 1 SF = 256 … 0 1 1 SF = 4

SIs

... ...
K

All 0 J

PCAs PCA(0) PCA(1)

PCA(K-1)

Figure 113: CSICH mapping scheme in PAMASF mode

10.3

Downlink Shared Channel (DSCH)

A problem in WCDMA is the limited number of downlink channelization codes due to usage of OVSF codes. Although it is on principle possible to re-use the OVSF code tree several times by employing multiple downlink scrambling codes, this is not a very efficient method since the orthogonality of downlink transmissions is sacrificed. The Downlink Shared Channel (DSCH) aims to improve the channelization code limitation problem. The DSCH is a downlink channel which can be shared by several UEs. It carries dedicated control or traffic data (i.e. DCCHs and/or DTCHs are mapped onto a DSCH). The DSCH cannot be used as a stand-alone channel. It is always used in combination with a DCH. The DSCH can be interpreted as a part of the downlink OVSF code tree which is reserved for usage for DSCH transmissions. An example is shown in Figure 114. The yellow-shaded part of the code tree is allocated for DSCH usage. The code resource can be divided onto a single DSCH using spreading factor SF = 4. Alternatively it can be divided onto two DSCHs with SF = 8, four DSCHs with SF = 16, and so on, up to 32 DSCHs with SF =256.
SF=1 SF=2 SF=4 SF=8
SF=16 SF=32 SF=64,128

E-DSCH

DSCH

PILOT, ETC

Figure 114: Shared channelization code resources allocated to DSCH At a given time instant one DSCH code can only be employed by one user. The allocation of the DSCH code to different users is performed with a scheduling algorithm which takes priority and

3rd Generation Mobile Communication Systems

Page 10-9

Version 1.12 01.08.2000

the amount of user data into account. The information whether the DSCH is used or not, and which code is employed, is included into the Transport Format Combination Indicator (TFCI) which is transmitted on the DPCCH of the associated DCH. There is no other higher-layer signalling needed to indicate to a UE that the DSCH is used. However, before a UE is permitted to use a DSCH it must be configured by higher-layer signalling for this purpose, i.e. the DSCH must be assigned explicitly to a UE when entering Cell_DCH state. The format of the PDSCH is shown in Figure 115. The entire slot can be filled with data bits received from layer 2. The possible DSCH slot formats are shown in Table 6. The DSCH rate varies between 30 and 1920 kbps for different spreading factors in the range SF = 256 … 4 chips/symbol, respectively.

2560 chips, 20×2k bits (k = 0…6) PDSCH Data

Slot 1

Slot 2

Slot i

Slot 15

10 ms Frame 1 Frame 2 Frame i Frame N

One super frame = N*10 ms

Figure 115: Format of the DSCH

Table 6: DSCH Slot formats Slot format #k 0 1 2 3 4 5 6 Channel Bit Rate (kbps) 30 60 120 240 480 960 1920 Bits/ Frame 300 600 1200 2400 4800 9600 19200 Bits/ Slot Symbols/Slot SF

20 40 80 160 320 640 1280

10 20 40 80 160 320 640

256 128 64 32 16 8 4

There is a transmission offset between the physical DSCH (PDSCH) and the DPCH as shown in Figure 116. The timing offset TPDSCH – TDPCH is set by the network in the range of 1 radio frame plus 3 … 18 slots. The PDSCH frames have a fixed offset with regard to the CPICH frames. As

3rd Generation Mobile Communication Systems

Page 10-10

Version 1.12 01.08.2000

the DPCH frames have an user-individual offset relative to the CPICH, the timing offset TPDSCH – TDPCH is somewhat different for each user.

DPCH frame Associated PDSCH frame TDPCH TPDSCH

Figure 116: Timing of DSCH transmission relative to the associated DCH DSCH allocations are cell specific. When a user operates a DPCH in macro diversity, an associated PDSCH can only be received from one cell, i.e. there is no macro diversity defined for the PDSCH. This has some impact on the coding of the TFCI. There are two different TFCI encoding schemes defined for a DCH with an associated DSCH, which are referred to as “logical split” and “hard split” encoding schemes, see Figure 117. In the logical split scheme the 10-bit code space is shared for indicating DCH and DSCH allocations. In this case the same coding scheme as for a pure DCH is applied, using the (32,10) Reed-Muller code, which is further punctured to a (30, 10) code (not shown in the figure). The interpretation of the meaning of a TFCI is of course differently when a DSCH is assigned. When a UE gets a DSCH assigned from the network, it needs to receive all information on how to interpret each TFCI. Some TFCI codes then indicate that a DSCH is used, including which channelization code(s) are employed. One UE may use several DSCH codes simultaneously. In this case however these codes all must have the same spreading factor.
l Normal encoding (“logical split”):
TFCI (10 bits) a0...a9
(32,10) sub-code of second order Reed-Muller code

TFCI code word b0...b31

l “Hard split” encoding DPCH/PDSCH:
TFCI (5 bits) a1,0...a1,4
(16,5) bi-orthgonal code

TFCI code word b0,b2...b30

TFCI (5 bits) a2,0...a2,4

(16,5) bi-orthgonal code

TFCI code word b1,b3...b31

Figure 117: TFCI encoding for DCH with associated DSCH

3rd Generation Mobile Communication Systems

Page 10-11

Version 1.12 01.08.2000

The hard split scheme divides the 10 TFCI bits into two 5 bit parts which are encoded individually. The one part is assigned to the DCH, the other part is assigned to the DSCH. In this case only 32 transport format combinations can be indicated with each part. This coding scheme is however better suited when the DCH is in macro diversity. In this case the TFCI part allocated for the DCH can be maximum-ratio combined. The TFCI part allocated for the DSCH is transmitted only in that cell where the DSCH is allocated. In the logical split scheme the TFCIs received from different base stations differ from each other in macro diversity condition and can therefore not be combined.

10.4 Packet transmission on RACH/FACH
When the UE is in RRC state Cell_FACH it monitors an assigned S-CCPCH on the downlink continuously and can access a RACH when needed for uplink transmissions. Figure 118 illustrates the case of packet data transmission on the RACH. In this case the actual user data packets are transmitted on the uplink. On the downlink S-CCPCH acknowledgements from the peer RLC entities are received. This scheme is suitable when the uplink traffic volume is rather low.

S-CCPCH

TTI 2 TTI 1

TTI 3

PRACH
DPDCH DPCCH DPDCH DPCCH DPDCH DPCCH

AICH

Figure 118: Illustration of packet transmission on the RACH

Figure 119 illustrates the case of packet data transmission on FACH mapped to S-CCPCH. In this case the actual user data packets are transmitted on the downlink. On the uplink PRACH acknowledgements from the peer RLC entities are received. The PRACH is also employed for measurement reporting on DCCH This scheme is suitable for packet data transmission when downlink traffic volume is rather low. As the FACH/S-CCPCH has a higher capacity than the RACH it could be used even when the amount of downlink data is rather high. A main bottleneck of this scheme is the potential delay caused by the backoff delay of RACH transmissions. In order to achieve a high throughput on the downlink, it is necessary that the acknowledgements sent on RACH arrive at the peer RLC entity fast.

3rd Generation Mobile Communication Systems

Page 10-12

Version 1.12 01.08.2000

S-CCPCH

TTI 1

TTI 2 TTI 1

TTI 3

PRACH
DPDCH DPCCH DPDCH DPCCH

AICH

Figure 119: Illustration of packet transmission on the FACH

10.5

Packet transmission on CPCH/FACH

This scheme can be applied by a UE in Cell_FACH state when it has assigned a CPCH set. Figure 120 illustrates the case of packet data transmission on CPCH. In this case the actual user data packets are transmitted on the uplink. On the downlink S-CCPCH/FACH acknowledgements from the peer RLC entities are received. This scheme is suitable for packet data transmission when uplink traffic volume is higher than to be suitable for the RACH but still not large enough to employ a DCH. Note that support of CPCH is an optional UMTS feature. At this time it is not really clear whether there really exist conditions where the CPCH has significant advantages over both RACH and DCH transmission.

S-CCPCH

DL-DPCCH PCPCH
DPDCH DPCCH

AP-AICH + CSICH CD/CA-ICH

Figure 120: Illustration of packet transmission on the CPCH

10.6

Packet transmission on dedicated channels DCH/DCH

When the UE is in RRC state Cell_DCH it transmits and receives continuously DCH on uplink and downlink, respectively.

3rd Generation Mobile Communication Systems

Page 10-13

Version 1.12 01.08.2000

Figure 120 illustrates the case of packet data transmission on uplink DCH. On the downlink DCH acknowledgements from the peer RLC entities are received. This scheme is suitable for packet data transmission when the uplink traffic volume is high. Both uplink and downlink DCHs are also used for signalling (DCCH). An important feature of this case is that the degree of utilization of the downlink DCH is rather low, and accordingly the overhead created by the downlink DPCCH transmissions DPDCH is rather high relative to the amount of actual transmitted user data. This means with respect to the downlink this scheme may not be very efficient. Note also that the downlink code is occupied all the time although it is needed for data transmission (beyond DPCCH) rarely.

DL-DPCH

UL-DPCH
DPDCH DPDCH DPCCH DPDCH DPCCH DPCCH DPDCH DPCCH DPDCH DPCCH DPDCH DPCCH DPCCH DPCCH DPDCH DPCCH DPDCH DPCCH

TTI 2

TTI 1

Figure 121: Illustration of packet transmission on uplink DCH

Figure 122 illustrates the case of packet data transmission on downlink DCH. On the uplink DCH acknowledgements from the peer RLC entities are received. This scheme is suitable for packet data transmission when the downlink traffic volume is high. Both uplink and downlink DCHs are also used for signalling (DCCH). An important feature of this case is that the degree of utilization of the uplink DCH is rather low, and accordingly the overhead created by the uplink DPCCH transmissions is rather high relative to the amount of actual transmitted user data. This means with respect to the uplink this scheme may not be very efficient.

DL-DPCH

TTI 2 TTI 1

UL-DPCH
DPCCH DPCCH DPCCH DPDCH DPCCH DPCCH DPCCH DPCCH DPCCH DPCCH DPDCH DPCCH

Figure 122: Illustration of packet transmission on downlink DCH

3rd Generation Mobile Communication Systems

Page 10-14

Version 1.12 01.08.2000

10.7

Packet transmission on dedicated and shared channels

Here we consider the case where a UE is in RRC state Cell_DCH and it has assigned a DSCH. The UE transmits and receives continuously DCH on uplink and downlink, respectively, and it can when needed use also the DSCH. Figure 123 illustrates the case of packet data transmission on DSCH. The scheme differs form the case shown in Figure 122 only in the additional usage of a PDSCH for downlink packet transmission at a high peak data rate. In this case the downlink DPCH code can possibly be chosen lower than in the pure DCH transmission case, as data peaks can be handled by the DSCH. Using the DSCH has no impact on the utilization of the uplink DCH.

PDSCH
TTI

DL-DPCH
TTI 2 TTI 1

UL-DPCH
DPCCH DPCCH DPCCH DPDCH DPCCH DPCCH DPCCH DPCCH DPCCH DPCCH DPDCH DPCCH

Figure 123: Illustration of packet transmission on DSCH associated with DCH

10.8

Transport channel switching

Transport channel switching refers to dynamic change of packet transmission mode during an ongoing packet data session. Execution of transport channel switching means that RRC states are changed between Cell_DCH and Cell_FACH dynamically. In Cell_DCH state transmission with or without DSCH can be performed (if the UE has the capability to use a DSCH). In Cell_FACH state transmission on either RACH/FACH or CPCH/FACH can be performed, depending on UE capability and amount of uplink data. Transport channel switching is performed based on traffic volume measurements (note that transport channel switching is not performed for radio link control reasons). The traffic volume is measured by MAC and reported to RRC based on information on buffer status that MAC receives from RLC. Traffic volume monitoring procedure in MAC is shown in Figure 124. MAC receives RLC PDUs together with information of RLC transmission buffer occupancy. Every TTI, MAC compares the amount of data with the thresholds set by RRC. If the value is out of range, MAC sends measurement reports on traffic volume status to RRC. RRC decides on possible transport channel reconfigurations.

3rd Generation Mobile Communication Systems

Page 10-15

Version 1.12 01.08.2000

MAC receives RLC PDUs with the primitive MAC-Data-REQ including following parameters. • • Data (RLC PDU) Buffer Occupancy (BO) The parameter Buffer Occupancy (BO) indicates the amount of data that is currently queued for transmission (or retransmission)

MAC receives measurement information elements from RRC with the primitive CMACMeasure-REQ that includes parameters such as Mode, report interval, and upper and lower reporting thresholds THL and THU for each transport channel. Whenever MAC receives RLC PDUs from different RLC entities, it is notified by RLC about the amount of data queued in RLC transmission buffers. If the mode is event-triggered, MAC compares the amount of data to be transmitted on a transport channel with the threshold values. In case that the measured value is out of range, MAC reports the status individually for each logical channel to RRC. If reporting mode is periodic, MAC reports measurement result to RRC periodically. Measurement result can contain average and variance as well as amount of data for each channel. See TS 25.321 for further details.

Start

Get the measurement information from RRC: Mode, THU, THL, Report Interval, etc

Check traffic volume of transport channels

N

Mode = Eventtriggered Y

Y

THL < Amount of Data < THU ? N

Mode = Periodic & timer expired ? N

Y

Report Measurement Result to RRC

Wait TTI

Figure 124: Traffic volume measurement/report procedure in MAC

3rd Generation Mobile Communication Systems

Page 10-16

Version 1.12 01.08.2000

10.9 Dynamic Resource allocation control
Dynamic resource allocation control (DRAC) is a scheme that enables a user to transmit on a DCH occasionally with a high data rate. DRAC can be applied for uplink DCHs in FDD mode. The network initiates this procedure to dynamically control the allocation of power resources on uplink DCHs. This procedure shall be activated in the UE when it has been allocated an uplink DCH with DRAC static information elements. DRAC assignment (either a new DCH is assigned or an existing DCH is reconfigured) can be done with Radio Bearer Setup/Reconfiguration/Release or Transport Channel Reconfiguration messages. To each DRAC DCH, following “DRAC static information” IEs are assigned: • Transmission Time Validity (Tvalidity) The number of radio frames a user is allowed to transmit on this DCH in one shot, in the range 1,…,256. • Time duration before retry (Tretry) The backoff delay in terms of number of radio frames (range 1,…256) to be included before the next transmission attempt is started • DRAC Class Identity Indicates the class of DRAC parameters to use in SIB10 message in the range 1,…,8, i.e., up to 8 DRAC classes may be defined. Above parameters may be changed by Radio Bearer or Transport Channel Reconfiguration messages. The UE shall always use the latest received DRAC static parameters. For each DRAC class, System Information Block (SIB) 10 includes following “DRAC system information” IEs: • Transmission probability (Ptr) Indicates the probability for a mobile to be allowed to transmit on a DCH controlled by DRAC procedure in the range 0.125,…, 1 with step of 0.125. • Maximum bit rate (Rmax) Indicates the maximum user data rate allowed on a DRAC DCH for the transmission period (Transmission time validity) in the range 0,…,512 kbps in steps of 16 kbps. SIB 10 is broadcast on the BCCH. However the system information message that includes SIB 10 is carried on a BCCH which is mapped to FACH on MAC and S-CCPCH on PHY. UEs that employ the DRAC procedure must have the capability to receive a DPCH and a S-CCPCH simultaneously. When a UE is assigned a DRAC DCH it needs to listen periodically to SIB 10 of each cell in its Active Set. The scheduling information of SIB10 and the S-CCPCH info on which the SIB10 is transmitted are provided to the UE when the DCH is set up and when a cell is added to its Active Set. In case several SIB10 messages from different cells are scheduled at the same time, the UE shall only listen to the SIB10 broadcast in the cell of its Active Set having the best CPICH measurements.

3rd Generation Mobile Communication Systems

Page 10-17

Version 1.12 01.08.2000

Upon reception of a SYSTEM INFORMATION message comprising a SIB10, the UE shall:
1. Determine and store the most stringent DRAC parameters from the last received values from each cell of its active set (i.e. select the lowest product Ptr* Rmax corresponding to its DRAC class identity) 2. Determine the allowed subset of TFCS according to the selected maximum bit rate value, and store it for later usage. The allowed subset of TFCS are the ones of the TFCS for which the sum of bit rates of all DCHs controlled by DRAC is lower than Maximum Bit Rate IE, i.e.

DCH i controlled by DRAC

∑ TBSsize / TTI
i

i

< Rmax

After the first SIB10 has been received, the UE shall start the following process:
1. At the start of the next TTI, the UE shall randomly select p [0,1].

2. If p < Ptr, the UE shall transmit on the DCH controlled by DRAC during Tvalidity frames using the last stored allowed subset of TFCS and comes back to step 1, otherwise the UE shall not start transmission on this DCH during Tretry frames and return to step 1.

The procedure can be used for support of packet transmission services with high peak rate on the uplink. Due to the backoff delay the scheme is only applicable for delay insensitive transmissions (i.e. it should not be used for time-critical retransmission acknowledgements or other time critical data).

References
[10.1] 3GPP TS 25.303, “RRC Protocol specification”, V3.2.0, March 2000. [10.2] 3GPP TS 25.321, “MAC Protocol specification”, V3.3.0, March 2000. [10.3] 3GPP TS 25.211, “Physical channels and mapping of transport channels onto physical channels (FDD)”, V3.2.0, March 2000. [10.4] 3GPP TS 25.212, “Multiplexing and channel coding (FDD)”, V3.2.0, March 2000. [10.5] 3GPP TS 25.213, “Spreading and modulation (FDD)”, V3.2.0, March 2000. [10.6] A. S. Tannenbaum, “Computer Networks”, Prentice Hall, 3rd Ed. 1996.

3rd Generation Mobile Communication Systems

Page 11-1

Version 1.12 01.08.2000

11 Support of circuit-switched services
11.1 Speech transmission using the Adaptive Multirate (AMR) Codec
The speech codec in UMTS will employ the Adaptive Multirate (AMR) technique which originally has been foreseen to be introduced in evolved GSM systems. The AMR codec is an integrated speech codec with 8 different source encoding modes at different source data rates. The selection of AMR bit rates is controlled by the network and does not depend on the speech source characteristics. There are additional AMR modes defined which are employed in connection with voice activity detection for transmission of background noise in intervals of inactive speech. To facilitate interoperability with existing cellular systems, some AMR modes correspond to the speech codecs employed in those systems. For instance the 12.2 kbps AMR mode is the GSM Enhanced Full Rate (EFR) codec, the 7.4 kbps mode corresponds to the IS-641 codec employed in IS-136 (USA TDMA), and the 6.7 kbps codec corresponds to the one used in PDC in Japan. The various AMR modes are listed in Table 7. In all AMR modes switching of bit rate can be performed every 20 ms interval, i.e. the block length of the codec corresponds to 20 ms. In Table 7 the bit numbers delivered per 20 ms block are listed. These bits are grouped into three different protection classes A, B and C, in accordance with their sensitivity to transmission errors. Class A refers to the most sensitive class, which require the strongest error protection. Class C includes the least sensitive bits. Each protection class is channel encoded with a different FEC code. Such a scheme is referred to as Unequal Error Protection (UEP). With regard to the UTRAN principles an UEP scheme can be supported by utilizing a different transport channels for each protection class. Figure shows the allocation of the Transcoding Unit (TC) in the packet switched core network. The AMR transcoders are co-located with the MSC. In current GSM systems, transcoders always convert the AMR encoded data into a PCM representation. The transport through the core network and in external networks is performed in the PCM format. Table 7: Modes of the AMR codec
Frame Type Index 7 6 5 4 3 2 1 0 8 9 10 11 12-14 15 Mode Number of speech bits delivered per block (Kd) 244 204 159 148 134 118 103 95 Number of class A bits per block 81 65 75 61 58 55 49 42 39 43 38 37 00 Number of class B bits per block 103 99 84 87 76 63 54 53 0 0 0 0 00 Number of class C bits per block 60 40 0 0 0 0 0 0 0 0 0 0 0

MR12.2 (GSM EFR) MR10.2 MR7.95 MR7.4 (IS-641) MR6.7 (PDC-EFR) MR5.9 MR5.15 MR4.75 MR comf. noise SM-EFR comf. noise S-641 comf. noise DC-EFR comf. noise uture use o tx, no rx

3rd Generation Mobile Communication Systems

Page 11-2

Version 1.12 01.08.2000

CS-Domain Core Network

UE1

RNS

MSC/ TC
TFO PCM

PCM

FT

UE2

RNS
UTRAN

MSC/ TC

MS

GSM-BSS

Figure 125: Allocation of AMR transcoder in Trancoding units (TC) co-located with MSC This makes tandem transcoding even for UE-to-UE calls necessary, which yields significant performance degradation. For UMTS it is foreseen to allow tandem-free operation (TFO) for UEto-UE calls. In TFO essentially the TC operates in transparent mode. Figure 126 shows a configuration of radio interface protocols and channels for an AMR speech call. In the user plane three different logical channels and transport channels are established. One for each protection class. When the AMR mode changes, the transport format on all transport channels changes simultaneously. This allows to employ a special scheme for representation of TFCIs.
C-plane signalling U-plane information

CC, MM

AMR Transcoder

Iu
RRC control

L3
Class A B C Radio Bearers

AM

UM

TR

DCCH1: RRC signalling (HO, setup/release reconfig.) DCCH2: RRC signalling (measurements) DCCH3: AMR mode commands (3 bits/20ms)

control

control

RLC

RLC

RLC

L2/RLC

DCCH1 DCCH2 DCCH3 MAC

DTCH DTCH DTCH

Logical Channels

L2/MAC
DCH DCH DCH Transport Channels

DCH

DCH

DCH PHY

L1

Figure 126: Radio protocol configuration for AMR speech call (network side)

3rd Generation Mobile Communication Systems

Page 11-3

Version 1.12 01.08.2000

The transport format parameters for the speech data DCH/DTCH channels are provided in Figure 127. Details of the coding and rate matching schemes are presently not yet specified.
Attribute Class A Dynamic part Transport Block Size Value Class B Class C

Semi-static part

Transport Block Set Size Transmission Time Interval Type of channel coding code rates

CRC size Resulting ratio after static rate matching

60 103 81 40 99 65 0 84 75 0 87 61 0 76 58 0 63 55 0 54 49 0 53 42 0 0 39 Same as the transport block sizes 20 ms Convolutional coding 1/2, 1/3 None, None, 1/2 , + class1/2, 1/3 1/3 specific + class+ classrate specific specific rate matching rate matching matching 8 0 0 0.5 to 4(with no coding the rate matching ratio needs to be >1)

Figure 127: Transport Formats of the channels employed for the AMR There are also several DCCHs established. DCCH1 is employed for slow RRC signalling and employs AM RLC. DCCH2 is used for measurement reporting using UM RLC mode. DCCH3 is used for fast transmission of AMR mode switching commands in variable-rate operation. An AMR switching command consists of 3 bits/20 ms-block (in the GSM implementation of the AMR these commands are transmitted in-band together with the speech data). For codecs that support variable-rate operation, the UE can be allowed by RRC in UTRAN to reduce transmission rate independently without requesting a new codec mode from the NW side within the limits defined by the NW in the current TFS for the impacted radio bearer. The codec mode adaptation in the UE may be initialised e.g. when the maximum power level has been reached, or it is otherwise preferable from the UE point of view to decrease the power consumption by decreasing the data rate. The new Codec mode selected by the UE is signalled to the NW by means of the TFCI. This kind of AMR mode control is performed via RRC signalling (using DCCH1) between UE and RNC and network internal signalling between RNC and TC, see Figure 128.

3rd Generation Mobile Communication Systems

Page 11-4

Version 1.12 01.08.2000

MS
Air interface AMR speech codec

BS
Iub

RNC
Iu

TC

No further requirements due to AMR

Control of AMR modes

AMR speech codec

Downlink AMR mode command Downlink speech data with the commanded AMR mode

Uplink AMR mode command Uplink speech data with the commanded AMR mode

Figure 128: AMR mode control in a call UE – fixed network

11.2 Data transmission for real-time data services
(Will be added in a future version)

References
[11.1] 3GPP TS 26.071, “AMR speech Codec; General description”, V3.0.1, March 2000. [11.2] 3GPP TS 26.101, “AMR speech Codec; Frame Structure”, V3.1.0, March 2000. [11.3] 3GPP TS 26.102, “AMR speech Codec; Interface to Iu and Uu ”, V3.1.0, June 2000. [11.4] 3GPP TS 26.093, “AMR speech Codec; Source Controlled Rate operation”, V3.1.0, March 2000.

3rd Generation Mobile Communication Systems

Page 12-1

Version 1.12 01.08.2000

12 Deployment and future development of IMT2000/UMTS
12.1 Initial deployment of UMTS
In the phase of initial deployment of 3G mobile radio, UMTS will coexist with secondgeneration systems, e.g. in Europe with GSM. The way UMTS is deployed will depend on whether an operator is already operating a secondgeneration system in a geographic area or not. Those operators who own a 2G network will be interested to reuse as much as possible of the existing infrastructure, such as base station and antenna sites, RNC and MSC sites, the networks connecting the radio access and core network nodes. UMTS radio base stations and Radio Network Controllers are completely new equipment. MSC require hardware extensions for handling of new circuit-switched services. GSNs can be reused to much extent but require an additional interworking unit for the support of the newly specified Iu interface with the UTRAN. As ATM transport technology is introduced on all UTRAN interfaces (Iu, Iur and Iub), significant changes of the transport networks are needed. However initially ATM can also be operated on existing PDH physical transport technology used today in GSM BSS. Naturally operators will start offering new services, e.g. high-speed internet services, in order to maintain the already existing customer base and to attract new customers to mobile communications. However due to the high cost of infrastructure deployment, it is likely that UMTS will for some time be offered in urban areas only. Migrating subscribers from 2G to ‘UMTS service level’ means updating the subscriber profiles in HLR and AuC (and relevant services and application nodes) and providing the subscriber with a new SIM card. The subscriber is of course required to acquire a dual mode type of handset in order to benefit from new UMTS-specific services.

In Germany, the auction of the 2×60 MHz paired frequency band has started on July 31, 2000. There are seven applicants for a UMTS license in Germany: • • • • • • • Mannesmann Mobilfunk/Vodafone T-Mobil Deutsche Telekom E-Plus/KPN-Hutchison Viag Intercom/British Telecom Mobilcom/France Telecom Group 3G (Sonera Finland/Telefonica Espania) Debitel/Swisscom

3rd Generation Mobile Communication Systems

Page 12-2

Version 1.12 01.08.2000

An applicant must acquire at least two of the available 12 paired 5 MHz slots, and is permitted to acquire at most three paired frequency slots. There will therefore initially between 4 – 6 UMTS licenses be granted in Germany. UMTS operators in Germany are obliged to provide UMTS coverage for 25 % and 50 % of the population by the year 2003 and 2005, respectively. It is expected that at initial deployment of UMTS peak data rates up to 384 kbps will be supported. Higher rates, up to 2 Mbps, will be introduced only at a later stage of UMTS deployment as it is likely that neither infrastructure equipment nor terminals supporting such high rates will be available from the beginning. In the longer-term future (possibly in the years 2005 – 2010) when UMTS technology has become mature and the expected spectrum efficiency gains of the 3G technology has been verified, “refarming” of GSM frequency bands may become attractive to operators of 2G systems. However, whether using the present GSM frequencies for UMTS is permitted or not will also depend on national telecommunications regulation authorities. In May 2000 new bandwidth of more than 160 MHz has been identified by the World Radio Conference (WRC’2000) to be used for IMT-2000. It is likely that the WRC bandwidth identification will be approved by the ITU and that the national regulation bodies will implement the ITU recommendations in most parts of the world.

12.2 Service development
The fast introduction of new services is regarded as one of the crucial requirements for future telecommunication networks. In order to cope with this requirement there are intentions to divide the present Core Network into a Core Transport Network and Service Network, see Figure 129. The service network shall be capable to provide so-called “Intelligent Network” (IN) services, e.g. personal telephone number, freephone, premium rate, prepaid calls, establishment of virtual private network. The service network includes capabilities for advanced call handling services based on Customized Applications for Mobile Network Enhanced Logic (CAMEL), provides a standardised execution environment for mobile services (MExE), and provides a standardised execution environment for applications stored on the USIM/SIM card (SAT/USAT). In the network support of CAMEL, MExE and SAT/USAT will be based on Service capability servers (i.e. CAMEL service environment, MExE servers, SAT servers) and application servers.

3rd Generation Mobile Communication Systems

Page 12-3

Version 1.12 01.08.2000

Mobile user applications
ISDN / PSTN MExE B E A R E R S

N-ISDN Video Conference Terminal H.320

ISUP CORE NETWORK
VUS6I VUS6I 8PS@ÃUS6IT 8PS@ÃUS6IT QPSUÃIX QPSUÃIX

SIM toolkit
Tr…‰vpr Tr…‰vpr Ir‡‚…x Ir‡‚…x

IP based video conference “PC phone” H.323

IP CORE NETWORK

C A M E L

Home Environment

A P P L I C A T I O N S

CORP LAN

ISP
DIU@SI@U DIU@SI@U

Figure 129: Division of CN into Core Transport Network and Service Network The goal is not to standardize services as such but to use standardized service capabilities which allow the creation of services/applications. An example of a service which can be created based on above concepts is: ”Connect me to the nearest restaurant”.

12.2.1 Virtual Home Environment (VHE)
Virtual Home Environment (VHE) is defined as a concept for personal service environment portability across network boundaries and between terminals. The concept of the VHE is such that users are consistently presented with the same personalised features, User Interface customisation and services in whatever network and whatever terminal (within the capabilities of the terminal and network), where ever the user may be located (see TS 22.121). The key requirements of the VHE are to provide a user with a personal service environment which consist of: personalised services; personalised User Interface (within the capabilities of terminals); consistent set of services from the user's perspective irrespective of access e.g. (fixed, mobile, wireless etc. Global service availability when roaming.

The standards supporting VHE requirements should be flexible enough such that VHE can be applicable to all types of future networks as well as providing a framework for the evolution of existing networks. Additionally the standards should have global significance so that user's can avail of their services irrespective of their geographical location. This implies that VHE standards should: provide a common access for services in future networks; enable the support of VHE by future networks; enable the creation of services;

3rd Generation Mobile Communication Systems

Page 12-4

Version 1.12 01.08.2000

-

enable personal service environment to be recoverable (e.g. in the case of loss/damage of user equipment).

VHE is a platform to allow fast introduction of new (value-added) services by network operators or service providers. Applications using Service Capability Servers (SCSs) and other IP based application servers reside on a Service Network outside the Core Network nodes.

12.2.2 Customized Applications for Mobile Network Enhanced Logic (CAMEL):
CAMEL is a toolkit to create operator-specific set of services by modification of call handling (mainly supplementary services). CAMEL requires introduction of the CAMEL Service Environment (CSE) which consists of enhancements of present MSCs by Service Switching Functions (SSF) and Service Control Functions (SCF). CAMEL shall be introduced in three phases: Phase 1 includes: Operator-controlled number translation Route-home services from the VPLMN to the HPLMN, in order to use capacity set 1 /capacity set 1+ -services Virtual Private Network Terminating call screening Location dependant routing in HPLMN or VPLMN Call barring and forwarding can be integrated with the above Support for levels 1 & 2 of ETSI fraud info-rmation gathering service can be provided Pre-paid, with USSD credit interrogation VPN with short number forwarding, and full announcement capability Advice of Charge Personal number Fraud monitoring Efficient support of all number translation and location-based services in HPLMN and VPLMN, on behalf of HPLMN Pre-paid support enhanced via Mobile originated SMS, mobile terminated SMS, enhanced USSD and GPRS interfaces to SCF Post-paid support enhanced via extra free-format data Support for VPN enhanced via mobile originated SMS short number dialing, and mobile originated/Mobile terminated SMS barring at SCF Support for I&B services enhanced by ability to trigger number translation services for VPLMN SCF based on B-number analysis (2nd priority), with support retained for triggering back to HPLMN SCF on partial match to 1 of 10 numbers (1st priority)

Phase 2 includes:

Phase 3 includes: -

3rd Generation Mobile Communication Systems

Page 12-5

Version 1.12 01.08.2000

-

Support for all capacity set 1+ call party handling capabilities provided Support for FMC provided via mobility triggers 2 especially useful for personal number services

Further reading: TS 22.078.

12.2.3 Mobile Station Application Execution Environment (MExE)
MExE provides a standardised execution environment in an MS (UE), and an ability to negotiate its supported capabilities with a MExE service provider, allowing applications to be developed independently of any MS platform. The MS (consisting of the ME and SIM/USIM) can then be targeted at a range of implementations for MExE from small devices with low bandwidth, limited displays, low processor speeds, limited memory, MMI etc., to sophisticated with a complete MExE execution environment. The introduction of MExE execution environment into MSs is a significant step forward in their evolution. The ability of MSs to support MExE applications represents an extension of MSs’ capabilities. In order to allow current and future technologies to exploit and benefit from this, a standardised means of negotiating the MSs’ and network’s capabilities is supported. This negotiation will permit the mutual exchange of capabilities between the MS and the MExE server, and possibly include the service profile of the user and capabilities of the network. The negotiation may take place at service initiation, or on a dynamic basis. A network can be a transport bearer for the negotiation, interaction and transferring of applications, applets and content with the MS, however it need not necessarily be the provider of the MExE services with which the MS’s execution environment is interacting with. The network may also be the intermediary between two MSs which are engaged in a MExE service with each other, with the network effectively supplying the “pipe” and not playing a MExE rôle in the connection. Network nodes, nodes external to the network, or even MSs may be the entities which interacts with the MS’s execution environment. MexE will based on the Wireless Application Protocol (WAP) and the Java Programming language (JavaScript, Java Applets) Definitions with regard to MexE: applet: a small program that is intended not to be run on its own, but rather to be embedded inside another application application: MExE information in the form of software, scripts, applications, associated resources (e.g. libraries) and/or data content: data and/or information associated with, or independent of, a particular application which may be presented to or collected from a user MExE Classmark: a MExE Classmark identifies a category of MExE MS supporting MExE functionality with a minimum level of processing, memory, display and interactive capabilities. Several MExE Classmarks may be defined to differentiate between the functionalities offered by different MExE MSs. A MExE application or applet defined as being of a specific MExE Classmark indicates that it is supportable by a MExE MS of that Classmark. MExE server: a node supporting MExE services in the MExE service environment MExE service: a service enhanced (or made possible) by MExE technology

3rd Generation Mobile Communication Systems

Page 12-6

Version 1.12 01.08.2000

MExE service environment: Depending on the configuration of the PLMN, the operator may be able to offer support to MExE services in various ways. Examples of possible sources are from traditional GSM nodes, IN nodes, operator-specific nodes, operator-franchised nodes and services provider nodes, together with access to nodes external (i.e. vendor-specific) to the PLMN depending on the nature of the MExE service. These nodes are considered to constitute the MExE service environment. The MExE service environment shall support direct MExE MS to MExE MS interaction of MExE services. MExE service provider: an organisation which delivers MExE services to the subscriber. This is normally the PLMN operator, but could be an organisation with MExE responsibility (which may have been delegated by the PLMN operator). MExE subscriber: the owner of a subscription who has entered into an agreement with a MExE service provider for MExE services. Access to MExE services though other types of networks is out of scope of this specification. subscriber: the term subscriber in the context of this TS refers to a MExE subscriber user: the user of an MExE MS , who may or may not be the subscriber. Further reading: TS 22.057.

12.2.4 SIM/USIM Application Toolkit (SAT/USAT)
SAT/USAT provides a standardised execution environment for applications stored on the USIM/SIM card and the ability to utilize certain functions of the supporting mobile equipment. SAT/USAT provides mechanisms which allow applications, existing in the USIM/SIM, to interact and operate with any ME which supports the specified mechanism(s) thus ensuring interoperability between a USIM/SIM and an ME, independent of the respective manufacturers and operators. A transport mechanism is provided enabling applications to be down-loaded and/or updated. A significant aspect of SAT/USAT is the highly secure environment provided by the USIM/SIM card. This is further enhanced by the fact that the subscriber and the issuer of the USIM/SIM and also the SAT/USAT applications have a "trusted relationship" (e.g. the subscriber trusts the issuer of the card to charge correctly for the resources used). This allows certain features, such as call control, to be implemented with a degree of freedom which would not be acceptable in a "non-trusted relationship". The introduction of the SAT/USAT execution environment into UE/MSs (i.e. ME+USIM/SIM) is a significant step forward in their evolution. The ability of UE/MSs to support SAT/USAT represents an extension of the UE/MS’s and PLMN capabilities. In order to allow current and future technologies to exploit and benefit from this, a standardized means of exchanging the MEs’ and USIM/SIMs capability profiles is supported. Further reading: TS 22.038.

12.3 Further development of UMTS
Presently work is still ongoing in 2GPP on finalizing the initial specifications „UMTS Release 1999“.

3rd Generation Mobile Communication Systems

Page 12-7

Version 1.12 01.08.2000

It is planned to have in future annual releases of updated UMTS specifications. This shall ensure future evolution of UMTS The work towards UMTS Release 2000 is performed in parallel to completion of the initial specification release. Release 2000 will to much extent include corrections of the Release 99 specifications. It will also include a number of new features which were already discussed earlier in the standardization bodies but which were postponed for inclusion into a future release. New features considered for a future release are currently investigated as so-called work items or study items in 3GPP. The fact that a certain proposal is currently investigated does not mean that it is already decided that a respective feature will be included into a future UMTS release. The most important current work items in 3GPP are listed below. Core Network Architecture: • All IP based Core Network technology (see TS 23.922) Integration of packet switched and circuit switched CN domains into a single IP based core network architecture. Division of MSC into MSC server and Multimedia Gateways. UTRAN Architecture: • UTRAN architecture IP based UTRAN transport, “plug-and-play” base stations and RNCs. Radio Interface: • • • Narrowband TDD mode A 1.28 Mcps narrowband-variant of the TDD mode is considered. Terminal power saving methods e.g. Gated transmission of uplink and downlink DPCCH. Hybrid ARQ Introduction of Type II and III hybrid ARQ techniques on RLC (incremental redundancy and diversity combining of retransmissions). • General Radio Interface Improvements Serial concatenated convolutional codes (investigation of feasibility of turbo codes especially for short block lengths). Improved FACH with inner-loop power control (while using CPCH on the uplink). • Opportunity Driven Multiple Access (ODMA) Relaying of traffic within a cell over other terminals or over operator distributed relay stations, currently feasibility studied for TDD only (see TS 25.924). • High-speed packet data access Multilevel modulation, link adaptation (adaptive selection of modulation and coding scheme, incremental redundancy), no inner loop power control.

3rd Generation Mobile Communication Systems

Page 12-8

Version 1.12 01.08.2000

There is furthermore potential to improve UMTS by introduction of advanced receiver features which are compliant with the standard: Multi-user detection and interference cancellation, adaptive antenna arrays.

References
[12.1] 3GPP TS 22.121, “Provision of Services in UMTS - The Virtual Home Environment”, V3.2.0, March 2000. [12.2] 3GPP TS 22.078, “CAMEL; Stage 1”, V3.3.0, March 2000. [12.3] 3GPP TS 22.057, “Mobile Station Application Execution Environment (MExE); Stage 1”, V3.0.1, September 1999. [12.4] 3GPP TS 22.038, “SIM application toolkit (SAT); Stage 1”, V3.1.0, March 2000.

3rd Generation Mobile Communication Systems

Page

Version 1.12 01.08.2000

A-1

Annex A
Definitions (references: TS 21.905, TS 25.990)
Authentication: Property by which the correct identity of an entity or party is established with a required assurance. The party being authenticated could be a user, subscriber, home environment or serving network. Bearer: A information transmission path of defined capacity, delay and bit error rate, etc. Bearer capability: A transmission function which the user equipment requests to the network. Bearer service: A type of telecommunication service that provides the capability of transmission of signals between access points. Best effort QoS: The lowest of all QoS traffic classes. If the guaranteed QoS cannot be delivered, the bearer network delivers the QoS which can also be called best effort QoS. Best effort service: A service model which provides minimal performance guarantees, allowing an unspecified variance in the measured performance criteria. Cell: A cell is a geographical area that can be identified by a User Equipment from a (cell) identification that is broadcast from one UTRAN Access Point. Confidentiality: Avoidance of disclosure of information without the permission of its owner. Handoff Gain/Loss (dB) This is the gain/loss factor (+ or -) brought by handoff to maintain specified reliability at the cell boundary. Handover (Handoff) The transfer of a user’s connection from one radio channel to another (can be the same or different cell). Hard Handover Hard handover is a category of handover procedures where all the old radio links in the UE are abandoned before the new radio links are established. Home Environment: Home environment is responsible for enabling a user to obtain services in a consistent manner regardless of the user’s location or terminal used (within the limitations of the serving network and current terminal). IC Card: Card holding an Integrated Circuit containing subscriber, end user, authentication and/or application data for one or more applications. Integrity: (In the context of security) is the avoidance of unauthorised modification of information. Mobility: The ability for the user to communicate whilst moving independent of location. Multimedia service: multimedia services are services that handle several types of media such as audio and video in a synchronised way from the user's point of view. A multimedia service may involve multiple parties, multiple connections, and the addition or deletion of resources and users within a single communication session. Quality of Service: Collective effect of service performances which determine the degree of satisfaction of a user of a service. It is characterised by the combined aspects of performance factors applicable to all services, such as:
service operability performance; service accessibility performance;

3rd Generation Mobile Communication Systems

Page

Version 1.12 01.08.2000

A-2
service retention performance; service integrity performance; and other factors specific to each service.

Roaming: Ability for a user to function in a serving network. Seamless handover: "Seamless handover" is a handover without perceptible interruption of the radio connection. Security: Ability to prevent fraud as well as the protection of information availability, integrity and confidentiality. Service: Is set of functions offered to a user by an organisation. Service Control: is the ability of the user, home environment or serving environment to determine what a particular service does, for a specific invocation of that service, within the limitations of that service. Serving Network: Serving network provides the user with access to the services of home environment. Soft Handover: Soft handover is a category of handover procedures where the radio links are added and abandoned in such manner that the UE always keeps at least one radio link to the UTRAN. Subscriber: Responsibility for payment of charges incurred by one or more users may be undertaken by another entity designated as a subscriber. This division between use of and payment for services has no impact on standardisation. Supplementary service: A service which modifies or supplements a basic telecommunication service. Consequently, it cannot be offered to a customer as a standalone service. It must be offered together with or in association with a basic telecommunication service. The same supplementary service may be common to a number of telecommunication services. Teleservice: A type of telecommunication service that provides the complete capability, including terminal equipment functions, for communication between users according to standardised protocols and transmission capabilities established by agreement between operators. Terminal: A device into which a UICC can be inserted and which is capable of providing access to UMTS services to users, either alone or in conjunction with a UICC. Terminal equipment: Equipment that provides the functions necessary for the operation of the access protocols by the user (source: GSM 01.04). A functional group on the user side of a usernetwork interface (source: ITU-T I.112). Universal Terrestrial Radio Access Network: UTRAN is a conceptual term identifying that part of the network which consists of RNCs and Node Bs between Iu an Uu. Uplink: An "uplink" is a unidirectional radio link for the transmission of signals from a UE to a base station, from a Mobile Station to a mobile base station or from a mobile base station to a base station. User: A logical, identifiable entity which uses services. User Equipment: A Mobile Equipment (ME) with one or several UMTS Subscriber Identity Modules(s) (USIM).

3rd Generation Mobile Communication Systems

Page

Version 1.12 01.08.2000

A-3

User Profile: The set of information necessary to provide a user with a consistent, personalised service environment, irrespective of the user’s location or the terminal used (within the limitations of the terminal and the serving network). USIM: User Service Identity Module is an application residing on the IC-Card used for accessing services with appropriate security. UTRAN access point: A conceptual point within the UTRAN performing radio transmission and reception. A UTRAN access point is associated with one specific cell, i.e. there exists one UTRAN access point for each cell. It is the UTRAN-side end point of a radio link. Uu: The Radio interface between UTRAN and the User Equipment. Virtual Home Environment: Virtual home environment is a system concept for personalised service portability between serving networks and between terminals.

Abbreviations
3GPP AC ACK A/D AI AICH AM AMR AP ARIB ARQ AS ASC ATM AuC AWGN BCCH BCH BER BLER BMC BPSK BS Third Generation Partnership Project Access Class Acknowledgement Analog-to-Digital Acquisition Indicator Acquisition Indicator Channel Acknowledged Mode Adaptive Multi Rate Access preamble Association of Radio Industries and Businesses (Japan) Automatic Repeat Request Access Stratum Access Service Class Asynchronous Transfer Mode Authentication Center Additive White Gaussian Noise Broadcast Control Channel Broadcast Channel Bit Error Rate Block Error Rate Broadcast Multicast Control Binary Phase Shift Keying Base Station

3rd Generation Mobile Communication Systems

Page

Version 1.12 01.08.2000

A-4
BSC BSS BTS CCA CAMEL CATT CB CC CCCH CCH CCPCH CCTrCH CD CD/CA-ICH CDMA CM CN CPICH CPCH CRC CRNC CS CTCH CTDMA CWTS D/A DC DCA DCCH DCH DHO DL DPCCH DPCH DPDCH DRX Base Station Controller Base Station System Base Transceiver Station ControlChannel Assignment Customised Application for Mobile network Enhanced Logic China Academy of Telecommunication Technologies Cell Broadcast Call Control Common Control Channel Control Channel Common Control Physical Channel Coded Composite Transport Channel Collision Detection Collision Detection/ Channel Assignment Indication Channel Code Division Multiple Access Connection Management Core Network Common Pilot Channel Common Packet Channel Cyclic Redundancy Check Controlling Radio Network Controller Circuit Switched (also: Channel Selection) Common Traffic Channel Code Time Division Multiple Access China Wireless Telecommunication Standard Group Digital-to-Analog Dedicated Control (SAP) Dynamic Channel Allocation Dedicated Control Channel Dedicated Channel Diversity Handover Downlink (Forward Link) Dedicated Physical Control Channel Dedicated Physical Channel Dedicated Physical Data Channel Discontinuous Reception

3rd Generation Mobile Communication Systems

Page

Version 1.12 01.08.2000

A-5
DS-CDMA DSCH DTCH DTX ETSI FACH FAUSCH FBI FCS FCSS FDD FEC FER FFS GC GGSN GMM GMSC GPRS GSM GSN GTP GTP-U HHO HLR HO HPLMN ID IETF IMSI IMT IP IP-M ISDN ISO Direct-Sequence Code Division Multiple Access Downlink Shared Channel Dedicated Traffic Channel Discontinuous Transmission European Telecommunications Standards Institute Forward Access Channel Fast Uplink Signaling Channel Feedback Information Frame Check Sequence Fast Cell Site Selection Frequency Division Duplex Forward Error Correction Frame Erasure Rate, Frame Error Rate For Further Study General Control (SAP) Gateway GPRS Support Node GPRS Mobility Management Gateway Mobile Services Switching Center General Packet Radio Service Global System for Mobile communications GPRS Support Node GPRS Tunnelling Protocol GPRS Tunnelling Protocol for User Plane Hard Handover Home Location Register Handover Home PLMN Identifier Internet Engineering Task Force International Mobile Subscriber Identity International Mobile Telecommunications Internet Protocol IP Multicast Integrated Services Digital Network International Standards Organization

3rd Generation Mobile Communication Systems

Page

Version 1.12 01.08.2000

A-6
ITU kbps ksps L1 L2 L3 LAC MA MAC MASF MC Mcps ME MExE MM MS MSC NAS NBAP N-ISDN NW OCCCH ODCCH ODCH ODMA O&M ORACH ODTCH OVSF PAMASF PC PCCC PCCH PCH International Telecommunication Union kilo-bits per second kilo-symbols per second Layer 1 (physical layer) Layer 2 (data link layer) Layer 3 (network layer) Link Access Control Multiple Access Medium Access Control (also: Message Authentication Code) Minimum Available Spreading Factor Multicarrier Mega-chips per second Mobile Equipment Mobile station (application) Execution Environment Mobility Management Mobile Station Mobile Services Switching Center Non-Access Stratum Node B Application Part Narrowband Integrated Services Digital Network Network ODMA Common Control Channel ODMA Dedicated Control Channel ODMA Dedicated Channel Opportunity Driven Multiple Access Operation and Management ODMA Random Access Channel ODMA Dedicated Traffic Channel Orthogonal Variable Spreading Factor PCPCH Availability with Minimum Available Spreading Factor Power Control Parallel Concatenated Convolutional Code Paging Control Channel Paging Channel

3rd Generation Mobile Communication Systems

Page

Version 1.12 01.08.2000

A-7
PCPCH P-CCPCH PDH PDP PDSCH PDCP PDU PHY PhyCH PI PICH PLMN PRACH PS P-SCH PSCH PU QoS QPSK RAB RACH RANAP RB RF RL RLC RLCP RNC RNS RNSAP RNTI RRC RSC RRM RX SAP SAT Physical Common Packet Channel Primary Common Control Physical Channel Plesiochronous Digital Hierarchy Packet Data Protocol Physical Downlink Shared Channel Packet Data Convergence Protocol Protocol Data Unit Physical layer Physical Channel Page Indicator Page Indicator Channel Public Land Mobile Network Physical Random Access Channel Packet Switched Primary Synchronization Channel Physical Shared Channel Payload Unit Quality of Service Quadrature Phase Shift Keying Radio Access Bearer Random Access Channel Radio Access Network Application Part Radio Bearer Radio Frequency Radio Link Radio Link Control Radio Link Control Protocol Radio Network Controller Radio Network Subsystem Radio Network Subsystem Application Part Radio Network Temporary Identity Radio Resource Control Recursive Systematic Code Radio Resource Management Receive Service Access Point SIM Application Toolkit

3rd Generation Mobile Communication Systems

Page

Version 1.12 01.08.2000

A-8
SCCC SCCH S-CCPCH SCF SCH SCS SDU SF SFN SI SIR SM SMS SMS-CB SN SRB S-SCH SSDT SSF STM STTD TB TC TCH TCTF TDD TDMA TF TFC TFCI TFCS TFI TFO TFS TMSI TPC TrCH TR TRP Serial Concatenated Convolutional Code Synchronization Control Channel Secondary Common Control Physical Channel Service Control Function Synchronization Channel Service Capability Server Service Data Unit Spreading Factor System Frame Number Status Indicator Signal-to-Interference Ratio Session Management Short Message Service SMS Cell Broadcast Serving Network Signaling Radio Bearer Secondary Synchronization Channel Site Selection Diversity Transmission Service Switching Function Synchronous Transfer Mode Space Time Transmit Diversity Transport Block Transcoder Traffic Channel Target Channel Type Field Time Division Duplex Time Division Multiple Access Transport Format Transport Format Combination Transport Format Combination Indicator Transport Format Combination Set Transport Format Indicator Tandem Free Operation Transport Format Set Temporary Mobile Subscriber Identity Transmit Power Control Transport Channel Transparent Mode Transport (protocol suite)

3rd Generation Mobile Communication Systems

Page

Version 1.12 01.08.2000

A-9
TSTD TTA TTC TTI TX UUE UEP UICC UL UM UMTS USCH USAT USIM UTRA UTRAN UWC UWCC VHE VLR VPLMN WAP WCDMA Time Switched Transmit Diversity Telecommunication Technology Association (Korea) Telecommunication Technology Committee (Japan) Transmission Timing Interval Transmit UserUser Equipment Unequal Error Protection UMTS Integrated Circuit Card Uplink (Reverse Link) Unacknowledged Mode Universal Mobile Telecommunications System Uplink Shared Channel USIM Application Toolkit Universal Subscriber Identity Module Universal Terrestrial Radio Access Universal Terrestrial Radio Access Network Universal Wireless Telecommunications Universal Wireless Telecommunications Committee Virtual Home Environment Visitors Location Register Visited PLMN Wireless Application Protocol Wideband Code Division Multiple Access

Sponsor Documents

Or use your account on DocShare.tips

Hide

Forgot your password?

Or register your new account on DocShare.tips

Hide

Lost your password? Please enter your email address. You will receive a link to create a new password.

Back to log-in

Close