Escolar Documentos
Profissional Documentos
Cultura Documentos
E
j
c
d , 1 | d
S
l o n g , n
o r S
s h o r t , n
+ j Q
D P D C H
1
Q
c
d , 3 | d
D P D C H
3
c
d , 5 | d
D P D C H
5
c
d , 2 | d
D P D C H
2
c
d , 4 | d
D P D C H
4
c
d , 6 | d
D P D C H
6
c
c | c
D P C C H
E
Up to 6 DPDCH
for one user
The Iigure above illustrates the principle oI the uplink spreading oI DPDCH and DPCCH. First
each channel is spread by an OVSF code. As it was mentioned beIore, channelization codes are
only used to spread the inIormation in uplink
The channelization code used Ior DPCCH is always C
ch,256,0
(all ones). II only one DPDCH is
used, it is spread by code C
ch,SF,k
, where k is linked to SF by kSF/4. When more than one
DPDCH is used, they will all have a SF equal to 4. DPDCH
n
is spread by code c
d,n
C
ch,4,k
,
where k1 Ior n e 1,2} , k3 Ior n e 3,4} , and k2 Ior n e 5,6}. Thus, the same
channelization code can be used by two diIIerent DPDCHs in uplink. AIter channelization, the
chip rate is equal to 3.84 Mcps.
AIter channelization, the spread signals are weighted by a gain Iactor (|
c
Ior DPCCH and |
d
Ior
all DPDCHs). These gain Iactors are quantized into 4 bits, giving values between 0 and 1. There
is at least one oI the values |
c
and |
d
that is equal to 1. These gain Iactors may vary Ior each
TFC, and are either signaled or computed.
Then, the streams oI chips are summed up giving a multilevel signal. AIter this addition, the real-
valued chips on the I and Q branches are summed up and treated like a complex-valued stream oI
chips. This stream is scrambled by a complex-valued scrambling code. For DPDCH and
DPCCH, a unique scrambling code oI 38,400 chips (corresponding to one radio Irame) is used.
That code can be either oI long or short type.
Finally, the complex chips are I and Q multiplexed and sent over the air interIace. The result oI
all this is a BPSK modulation, which gives us 1 bit per symbol. We will study that part in the
next section.
There can be up to 6 uplink DPDCHs, but only one DPCCH is associated to these DPDCHs on
each radio link. More than one DPDCH is used Ior data rates above 960 ksps (maximum
capacity oI one DPDCH). Thus, the maximum channel bit rate Ior one UE is 960 * 6 5.76
Mbps in uplink, which can correspond to a user bit rate oI 2.048 Mbps.
62
HUAWEI TECHNOLOGIES CO., LTD. Page 62 All rights reserved
Uplink PRACH Spreading
Message part is shown in the following figurethe value of
gain factors is the same with DPDCH/DPCCH
j
|
c
c
c
c
d
|
d
S
r-msg,n
IjQ
PRACH message
control part
PRACH message
data part
Q
I
This is the PRACH spreading Iigure. the value of gain factors is the same with
DPDCH/DPCCH
The preamble signature , 0 s s 15, points to one oI the 16 nodes in the code-
tree that corresponds to channelization codes oI length 16. The sub-tree below the
speciIied node is used Ior spreading oI the message part. The control part is
spread with the channelization code cc oI spreading Iactor 256 in the lowest
branch oI the sub-tree, i.e. cc Cch,256,m where m 16s 15. The data part
uses any oI the channelization codes Irom spreading Iactor 32 to 256 in the
upper-most branch oI the sub-tree. To be exact, the data part is spread by
channelization code cd Cch,SF,m and SF is the spreading Iactor used Ior the
data part and m SFs/16.
The scrambling code used Ior the PRACH message part is 10 ms long, and there
are 8192 diIIerent PRACH scrambling codes deIined.
63
HUAWEI TECHNOLOGIES CO., LTD. Page 63 All rights reserved
Downlink Spreading
Downlink physical channel except SCH is first serial-to-parallel
converted , spread by the spreading code, and then scrambled by a
complex-valued scrambling code.
The beginning chip of the scrambling code is aligned with the frame
boundary of P-CCPCH.
Each channel have different gain factor
I
Data oI
physical
channel
except
SCH
S
P
C
ch,SF,m
j
S
dl,n
Q
IjQ
S
Each pair oI two consecutive real-valued symbols is Iirst serial-to-parallel
converted and mapped to an I and Q branch. The mapping is such that even and
odd numbered symbols are mapped to the I and Q branch respectively.
The I and Q branches are then both spread to the chip rate by the same real-
valued channelization code Cch,SF,m. The channelization code sequence shall be
aligned in time with the symbol boundary. The sequences oI real-valued chips on
the I and Q branch are then treated as a single complex-valued sequence oI chips.
64
HUAWEI TECHNOLOGIES CO., LTD. Page 64 All rights reserved
Downlink Spreading
DiIIerent physical
channel come Irom point S
E EE E
G
1
G
2
G
P
G
S
S-SCH
P-SCH
E EE E
Each complex-valued spread channel, corresponding to point S in the Figure, is
separately weighted by a weight Iactor Gi. The complex -valued P-SCH and S-
SCH, are separately weighted by weight Iactors Gp and Gs. All downlink
physical channels are then combined using complex addition.
65
HUAWEI TECHNOLOGIES CO., LTD. Page 65 All rights reserved
Chapter 3 PhysicaI Layer Processing Procedure Chapter 3 PhysicaI Layer Processing Procedure
Section 1 Coding and MuItipIexing TechnoIogy Section 1 Coding and MuItipIexing TechnoIogy
Section 2 Spreading TechnoIogy Section 2 Spreading TechnoIogy
Section 3 ModuIation TechnoIogy Section 3 ModuIation TechnoIogy
66
HUAWEI TECHNOLOGIES CO., LTD. Page 66 All rights reserved
Uplink Modulation
The chip rate is 3.84Mbps
n the uplink, the complex-valued chip sequence generated by the
spreading process is QPSK modulated
S
m{S}
Re{S}
cos(et)
Complex-
valued
sequence
after
spreading
-sin(et)
Split
real &
imag
parts
Pulse
shaping
Pulse
shaping
The complex-valued sequence S aIter spreading is split into real part and
imaginary part. Then the real part is multiplied by cos(wt) aIter pulse shaping.
The imaginary part is multiplied by sin(wt) aIter shaping.
67
HUAWEI TECHNOLOGIES CO., LTD. Page 67 All rights reserved
Downlink Modulation
The chip rate is 3.84Mbps
n the downlink, the complex-valued chip sequence generated by the
spreading process is QPSK modulated
S
m{S}
Re{S}
cos(et)
Complex-
valued
sequence
after
spreading
-sin(et)
Split
real &
imag
parts
Pulse
shaping
Pulse
shaping
The complex-valued sequence S aIter spreading is split into real part and
imaginary part. Then the real part is multiplied by cos(wt) aIter pulse shaping.
The imaginary part is multiplied by sin(wt) aIter shaping.
68
HUAWEI TECHNOLOGIES CO., LTD. Page 68 All rights reserved
Chapter 1 PhysicaI Layer Overview Chapter 1 PhysicaI Layer Overview
Chapter 2 PhysicaI Layer Key TechnoIogy Chapter 2 PhysicaI Layer Key TechnoIogy
Chapter 3 PhysicaI Layer Processing Procedure Chapter 3 PhysicaI Layer Processing Procedure
Chapter 4 PhysicaI Layer Procedures Chapter 4 PhysicaI Layer Procedures
69
HUAWEI TECHNOLOGIES CO., LTD. Page 69 All rights reserved
Synchronization ProcedureCell Search
Frame synchronization and
code-group identification
ScrambIing-code
identification
UE uses SSC to find frame
synchronization and identify the
code group of the ceII found in
the first step
UE determines the primary
scrambIing code through correIation
over the CPICH with aII codes within
the identified group, and then detects
the P-CCPCH and reads BCH
information@
SIot synchronization
UE uses PSC to acquire sIot
synchronization to a ceII
The purpose oI the Cell Search Procedure is to give the UE the possibility oI Iinding a
cell and oI determining the downlink scrambling code and Irame synchronization oI that
cell. This is typically perIormed in 3 steps:
PSCH (Slot synchronization): The UE uses the SCH`s primary synchronization code to
acquire slot synchronization to a cell. The primary synchronization code is used by the
UE to detect the existence oI a cell and to synchronize the mobile on the TS boundaries.
This is typically done with a single Iilter (or any similar device) matched to the primary
synchronization code which is common to all cells. The slot timing oI the cell can be
obtained by detecting peaks in the matched Iilter output.
SSCH (Frame synchronization and code-group identiIication): The secondary
synchronization codes provide the inIormation required to Iind the Irame boundaries and
the group number. Each group number corresponds to a unique set oI 8 primary
scrambling codes. The Irame boundary and the group number are provided indirectly by
selecting a suite oI 15 secondary codes. 16 secondary codes have been deIined C
1
, C
2
,
..C
16
. 64 possible suites have been deIined, each suite corresponds to one oI the 64
groups. Each suite oI secondary codes is composed oI 15 secondary codes (chosen in the
set oI 16), each oI which will be transmitted in one time slot. When the received codes
matches one oI the possible suites, the UE has both determined the Irame boundary and
the group number.
CPICH (Scrambling-code identiIication): The UE determines the exact primary
scrambling code used by the Iound cell. The primary scrambling code is typically
identiIied through symbol-by-symbol correlation over the CPICH with all the codes
within the code group identiIied in the second step. AIter the primary scrambling code
has been identiIied, the Primary CCPCH can be detected and the system- and cell
speciIic BCH inIormation can be read.
70
HUAWEI TECHNOLOGIES CO., LTD. Page 70 All rights reserved
Synchronization Procedure Channel Timing Relationship
AICH access
sIots
Secondary
SCH
Primary
SCH
t tt t
S-
CCPCH,k
10 ms
t tt t
PICH
#0 #1 #2 #3 #14 #13 #12 #11 #10 #9 #8 #7 #6 #5 #4
P-CCPCH, (SFN moduIo 2) = 0 P-CCPCH, (SFN moduIo 2) = 1
CPICH
k:th S -CCPCH
PICH for k:th S -CCPCH
n:th DPCH
t tt t
DPCH,n
This page shows the transmission timing oI the various downlink channels. The 256
chips gap in the beginning oI each oI the PCCPCH slots is to accommodate the
transmission oI the SCH. The SCH is always transmitted Irom the base station and is
transmitted at the same timing reIerence as the CPICH. The SCCPCH is only transmitted
when there is data available. ThereIore ,it has its own transmission timing. The timing
oIIset is a multiple oI 256 chips. The PICH has a Iixed time oIIset time oIIset with
respect to the SCCPCH to be able to tell UE that there is paging coming on the PCH
mapped onto the SCCPCH
71
HUAWEI TECHNOLOGIES CO., LTD. Page 71 All rights reserved
Random access procedure
START
Choose a RACH sub channeI from
avaiIabIe ones
Get avaiIabIe signatures
Set PreambIe Retrans Max
Set PreambIe _InitiaI _Power
Send a preambIe
Check the corresponding AI
Increase message part power by p
-m based on preambIe power
Set physicaI status to be RACH
message transmitted
Set physicaI status to be Nack
on AICH received
Choose a access sIot again
Counter> 0 & PreambIe power-
maximum aIIowed power<6 dB
Choose a signature and
increase preambIe transmit power
Set physicaI status to be Nack
on AICH received
Get negative AI
No AI
Report the physicaI status to MAC
END
Get positive AI
The counter of preambIe retransmit
Subtract-1, Commanded preambIe power
increased by Power Ramp Step
N
Y
Send the corresponding message part
72
HUAWEI TECHNOLOGIES CO., LTD. Page 72 All rights reserved
Random Access ProcedureRACH
Physical random access procedure
1. Derive the available uplink access slots, in the next full access
slot set, for the set of available RACH sub-channels within the
given ASC. Randomly select one access slot among the ones
previously determined. f there is no access slot available in the
selected set, randomly select one uplink access slot corresponding
to the set of available RACH sub-channels within the given ASC
from the next access slot set. The random function shall be such
that each of the allowed selections is chosen with equal
probability
2. Randomly select a signature from the set of available signatures
within the given ASC.
3. Set the Preamble Retransmission Counter to Preamble_
Retrans_ Max
73
HUAWEI TECHNOLOGIES CO., LTD. Page 73 All rights reserved
Random Access ProcedureRACH
4. Set the parameter Commanded Preamble Power to
Preamble_nitial_Power
5. Transmit a preamble using the selected uplink access slot, signature, and
preamble transmission power.
6. f no positive or negative acquisition indicator (A = +1 nor 1)
corresponding to the selected signature is detected in the downlink access
slot corresponding to the selected uplink access slot:
~ A: Select the next available access slot in the set of available RACH
sub-channels within the given ASC;
~ B: select a signature;
~ C: ncrease the Commanded Preamble Power;
~ D: Decrease the Preamble Retransmission Counter by one. f the
Preamble Retransmission Counter > 0 then repeat from step 6.
Otherwise exit the physical random access procedure.
74
HUAWEI TECHNOLOGIES CO., LTD. Page 74 All rights reserved
Random Access ProcedureRACH
7. f a negative acquisition indicator corresponding to the selected
signature is detected in the downlink access slot corresponding to
the selected uplink access slot, exit the physical random access
procedure Signature
8. f a positive acquisition indicator corresponding to the selected
signature is detected , Transmit the random access message three
or four uplink access slots after the uplink access slot of the last
transmitted preamble
9. exit the physical random access procedure
75
HUAWEI TECHNOLOGIES CO., LTD. Page 75 All rights reserved
Transmit diversity Mode
Application of 1x diversity modes on downlink physical channel Application of 1x diversity modes on downlink physical channel
applied ACH
applied HS-SCCH
applied applied HS-PDSCH
applied PCH
applied applied applied DPCH
applied S-CCPCH
applied SCH
applied P-CCPCH
Mode 2 Mode 1 STTD TSTD
Closed loop mode Open loop mode Physical channel type
Transmitter-antenna diversity can be used to generate multipath diversity in
places where it would not otherwise exist. Multipath diversity is a useIul
phenomenon, especially iI it can be controlled. It can protect the UE against
Iading and shadowing. TX diversity is designed Ior downlink usage. Transmitter
diversity needs two antennas, which would be an expensive solution Ior the UEs.
The UTRA speciIications divide the transmitter diversity modes into two
categories: (1) open-loop mode and (2) closed-loop mode. In the open-loop mode
no Ieedback inIormation Irom the UE to the Node B is available. Thus the
UTRAN has to determine by itselI the appropriate parameters Ior the TX
diversity. In the closed-loop mode the UE sends Ieedback inIormation up to the
Node B in order to optimize the transmissions Irom the diversity antennas.
.
76
Thus it is quite natural that the open-loop mode is used Ior the common channels,
as they typically do not provide an uplink return channel Ior the Ieedback
inIormation. Even iI there was a Ieedback channel, the Node B cannot really
optimize its common channel transmissions according to measurements made by
one particular UE. Common channels are common Ior everyone; what is good Ior
one UE may be bad Ior another. The closed-loop mode is used Ior dedicated
physical channels, as they have an existing uplink channel Ior Ieedback
inIormation. Note that shared channels can also employ closed loop power
control, as they are allocated Ior only one user at a time, and they also have a
return channel in the uplink.There are two speciIied methods to achieve the
transmission diversity in the open-loop mode and two methods in closed-loop
mode
77
HUAWEI TECHNOLOGIES CO., LTD. Page 77 All rights reserved
Transmit Diversity-STTD
Space time block coding based transmit antenna diversity(STTD
4 consecutive bits b0, b1, b2, b3 using STTD coding
b
0
b
1 b
2
b
3
b
0
b
1 b
2
b
3
-b
2
b
3 b
0
-b
1
Antenna 1
Antenna 2
Channel bits
STTD encoded channel bits
Ior antenna 1 and antenna 2.
The TX diversity methods in the open-loop mode are
(1) space time-block coding-based transmit-antenna diversity (STTD)
(2) time-switched transmit diversity (TSTD).
In STTD the data to be transmitted is divided between two transmission antennas
at the base station site and transmitted simultaneously. The
channel-coded data is processed in blocks oI Iour bits. The bits are time reversed
and complex conjugated, as shown in above slide. The STTD method, in Iact,
provides two brands oI diversity. The physical separation oI the antennas
provides the space diversity, and the time diIIerence derived Irom the bit-
reversing process provides the time diversity.
These Ieatures together make the decoding process in the receiver more reliable.
In addition to data signals, pilot signals are also transmitted via both
antennas. The normal pilot is sent via the Iirst antenna and the diversity pilot via
the second antenna. The symbol sequence Ior the second pilot is given in
The two pilot sequences are orthogonal, which enables the receiving UE to
extract the phase inIormation Ior both antennas.
The STTD encoding is optional in the UTRAN, but its support is mandatory Ior
the UE`s receiver.
78
HUAWEI TECHNOLOGIES CO., LTD. Page 78 All rights reserved
Transmit Diversity-TSTD
1ime switching transmit diversity (1S1D) is used only on SCH cha 1ime switching transmit diversity (1S1D) is used only on SCH channel. nnel.
Antenna 1
Antenna 2
acs
i,0
ac
p
ac
s
i,1
ac
p
ac
s
i,14
ac
p
SIot #0 SIot #1 SIot #14
ac
s
i,2
ac
p
SIot #2
(Tx OFF)
(Tx OFF)
(Tx OFF)
(Tx OFF)
(Tx OFF)
(Tx OFF)
(Tx OFF)
(Tx OFF)
Time-switched transmit diversity (TSTD) can be applied to the SCH. Just as with
STTD, the support oI TSTD is optional in the UTRAN, but mandatory in the UE.
The principle oI TSTD is to transmit the synchronization channels via the two
base station antennas in turn. In even-numbered time slots the SCHs are
transmitted via antenna 1, and in odd-numbered slots via antenna 2. This is
depicted in above Figure. Note that SCH channels only use the Iirst 256 chips oI
each time slot (i.e., one-tenth oI each slot).
79
HUAWEI TECHNOLOGIES CO., LTD. Page 79 All rights reserved
Closed Loop Mode
The closed-loop-mode transmit diversity can only be applied to the
downlink channel iI there is an associated uplink channel. Thus this mode
canonly be used with dedicated channels The chieI operating principle oI
the closed loop mode is that the UE can control the transmit diversity in
the base station by sending adjustment commands in FBI bits on the uplink
DPCCH. This is depicted in next slide .The UE uses the base station`s
common pilot channels to estimate the channels separately. Based on this
estimation, it generates the adjustment inIormation and sends it to the
UTRAN to maximize the UE`s received
power.
There are actually two modes in the closed-loop method. In mode 1 only
the phase can be adjusted; in mode 2 the amplitude is adjustable as well as
the phase. Each uplink time slot has one FBI bit Ior closed-loop-diversity
control. In mode 1 each bit Iorms a separate adjustment command, but in
mode 2 Iour bits are needed to compose a command
80
HUAWEI TECHNOLOGIES CO., LTD. Page 80 All rights reserved
Transmit DiversityClosed Loop Mode
Closed loop mode transmit diversity
Used in DPCH and PDSCH
Channel coding, interleaving and spreading are done as in non-
diversity mode. The spread complex valued signal is fed to both TX
antenna branches, and weighted with antenna specific weight
factors w1 and w2.
The weight factors are determined by the UE, and signalled to the
UTRAN access point (=cell transceiver) using the D-bits of the FB
field of uplink DPCCH.
The calculation of weight factor is the key point of closed loop Tx
diversity.there are two modes with different calculation methods of
weight factor
~ 1mode 1 uses phase adjustmentthe dedicated pilot
symbols of two antennas are different(orthogonal)
~ 2mode 2 uses phase/amplitude adjustmentthe dedicated
pilot symbols of two antennas are the same.
81
www.huawei.com
Thank You