Escolar Documentos
Profissional Documentos
Cultura Documentos
UMTS/WCDMA
Technology Overview
Created by
Sandeep B Patil (ALUMS)
Pulok Sinha (ALUMS)
Slide 2
Course Contents :
Introduction
UMTS/WCDMA Architecture & Identifiers
WCDMA Radio Concepts and Procedures
WCDMA Protocols layers
WCDMA Radio Channels
WCDMA Power Controls and Handovers
Basic UE Call flow Procedures and Operations
High Speed Downlink Packet Access( HSDPA)
High Speed Uplink Packet Access (HSUPA)
Introduce HSPA +
Slide 3
Objectives
At the end of this training session,participants would be able to :
Slide 4
Chapter 1
Introduction
Slide 5
The 3G standard was created by the International Telecommunication Union (ITU) and is called
IMT‐2000.
Third‐generation (3G) systems will support:
• High data rates: Minimum of 144 kbit/s in all radio environments and 2 Mbit/s in low
mobility and indoor environments.
• Circuit‐switched and packet‐switched services, such as Internet Protocol (IP) traffic and real‐
time video.
• Good voice quality (comparable to wire‐line quality).
• Greater capacity and improved spectrum efficiency.
• Several simultaneous services to end users and terminals, for multimedia services.
• Seamless incorporation of second‐generation cellular systems, to avoid discontinuity
between second‐ and third‐generation systems.
• Global, i.e. international roaming, between different IMT‐2000 operational environments
Slide 6
2
Technology?
2
Individual new services?
3g is not about the technology and individual new service only its far more beyond that. Its
about doing things:
• Better
• Faster and also
• New thing
In addition, IMT‐2000 has the following key characteristics:
1. Flexibility
With the large number of mergers and consolidations occurring in the mobile industry, and the
move into foreign markets, operators wanted to avoid having to support a wide range of
different interfaces and technologies. This would surely have hindered the growth of 3G
worldwide. The IMT‐2000 standard addresses this problem, by providing a highly flexible
system, capable of supporting a wide range of services and applications.
2. Affordability
There was agreement among industry that 3G systems had to be affordable, in order to
encourage their adoption by consumers and operators.
3. Compatibility with existing systems
IMT‐2000 services have to be compatible with existing systems. 2G systems, such as the GSM
standard (prevalent in Europe and parts of Asia and Africa) will continue to exist for some time
and compatibility with these systems must be assured through effective and seamless migration
paths.
4. Modular Design
The vision for IMT‐2000 systems is that they must be easily expandable in order to allow for
growth in users, coverage areas, and new services, with minimum initial investment.
Slide 7
What is 3G or IMT-2000
The International Telecommunication Union (ITU) defined the
key requirements for International Mobile Telecommunications
2000 (IMT-2000) services, commonly known as……
3G
3G requirements
Improved system capacity, backward compatibility with Second Generation
(2G) systems , multimedia support, and high speed packet data services
meeting the following criteria:
The aim of IMT‐2000 is to harmonize worldwide 3G systems to provide global roaming.
However, as was explained in the introduction to this section, harmonizing so many different
standards proved extremely difficult. As a result, what we have been left with is five different
standards grouped together under the IMT‐2000 label:
• W‐CDMA
• CDMA2000
• TD‐CDMA/TD‐SCDMA
• DECT
• UWC‐136
At this point, the definition of what is and what isn't "3G" becomes somewhat murky. Of these
five standards, only three allow full network coverage over macro cells, micro cells and pico cells
and can thus be considered as full 3G solutions: W‐CDMA, CDMA2000, and TD‐SCDMA. Of the
remainder, DECT is used for those cordless phones you have in the house, and could be used for
3G short‐range "hot‐spots" (hence, it could be considered as being "part of a 3G network"), but
it does not allow full network coverage so is not considered further here. And UWC‐136 is
another name for EDGE which is generally considered to be a 2.5G solution.
So that leaves W‐CDMA, CDMA2000, and TD‐SCDMA ‐ the bona fide 3G solutions.
Slide 8
What is UMTS ?
What is Universal Mobile Telecommunications System (UMTS)?
UMTS is 3rd generation wireless technology that meets the requirement of IMT‐2000. It provides
an evolutionary path from GSM to achieve high speed data and higher capacity. UMTS uses
most of the GSM core network but different Radio Access Technology. The Radio Access
technology that is used in UMTS is WCDMA in which 5 MHz channel is used as carrier.
Slide 9
WCDMA ~ Why ?
Slide 10
WCDMA ~ What ?
Slide 11
WCDMA ~ Who ?
Slide 12
3GPP Releases
Releases Data Transfer Speed Features
Bearer Services
64 Kbps : Circuit switched Location services
Release 99
384 kbps : Packet switched Call services compatible with GSM based on
USIM
Multimedia messaging
Downlink : 384 Kbps
Release 4 Improved location Services
Uplink : 384 Kbps
IP Multimedia Services (IMS)
HSDPA
Downlink :1.8 Mbps-14.4 Mbps
Release 5 Ipv6,IP transport in UTRAN
Uplink :384 Kbps
IP Multimedia System(IMS)
HSUPA
Downlink : 14.4 Mbps Multimedia broadcast and multicast
Release 6
Uplink : 5.8 Mbps WLAN integration
Improvement in MS
64 QAM , MIMO
Downlink : 40 Mbps
Release 7 VoIP over HSPA
Uplink : 10 Mbps
CPC – continuous packet connectivity
Slide 13
QOS Classes
In WCDMA, on the basis of QoS the traffic has been divided into four Classes:
• Conversational class
• Streaming class
• Interactive class
• Background class
Slide 14
GSM vs WCDMA
GSM/EDGE UMTS
Generation 2.75 G 3G
Access Method TDMA WCDMA
Carrier Frequency
Bandwidth 200 KHz 5 MHz
Radio Network GERAN UTRAN
Core Network MSC/GMSC MSC/GMSC
MGW/GMGW
GPRS Network SGSN/GGSN SGSN/GGSN
UMTS and GSM/EDGE can share a Core Network (CN),making UTRAN
an alternative radio access network to GERAN (GSM/EDGE RAN)
Slide 15
CDMA vs WCDMA
Generation 3G 3G
Slide 16
WCDMA Benefits
Slide 17
Multimedia = RAN CN
High Data Rate
or
Text only = Low Data Rate
SN
Slide 18
HTTP - Request
(In Kilobytes)
3G Network
HTTP - Response
(In Megabytes)
HTTP Server
9 Channels with different bandwidths in UL & DL direction lead to
efficient radio spectrum utilization.
Slide 19
Stocks
Internet
Wireless
Network
E-mail/Voicemail
Maps
Maps
Travel Info
Messaging Weather Travel Horoscope
Info
19 All Lights Reserved © Alcatel-Lucent 2010
Slide 20
Chapter 2
UMTS/WCDMA
Architecture
&
Identifiers
Slide 21
Slide 22
User Equipment (UE) – May be a mobile, a fixed station, a data terminal, etc.
includes a USIM, which contains all of a user’s subscription information.
Core Network – Includes all of the switching and routing capability for
connecting to either the PSTN or a Packet Data Network ,for mobility and
subscriber location management and for authentication services.
Slide 23
User Equipment
Universal Subscriber Identity Module (USIM)
Slide 24
UTRAN
UTRAN is Radio Access Network portion of WCDMA. It consists of one or more Radio Network
Subsystems (RNS). Each RNS consist of only one Radio Network controller (RNC) and one or
more Node Bs. The main purpose of UTRAN is to provide a connection between UE and the
Core Network. The UTRAN offers Radio Access Bearer (RAB) to establish a call connection
between the UE and core network. The characteristic of RAB differs depending upon the type
service. RABs are characterized by Quality of service parameter like latency and Data Rate.
Different type of UTRAN Network interfaces are as follows:
Iu interface – this is the interface that bridges the Core Network and the Radio Access Network.
Iur Interface – this is the interface that carries the signaling and data link between different
RNCs. Plays a great role in soft handover and transition.
Iub Interface – The interface between the RNC and different Node Bs that carries signaling as
well as data links.
Uu Interface – The interface between different Node Bs and UE to carry the Signalling as well as
data link over the air interface.
Slide 25
RNC:
The Radio Network Controller (RNC) is a governing element in the
UMTS radio access network (UTRAN) and is responsible for
controlling the Node Bs that are connected to it..
Radio Network Controller (RNC)
The RNC controls the radio resources in its domain, meaning all the attached Nodes B. This
function of the RNC refers to its Controlling RNC part. The controlling RNC has the overall
control of the logical resources of its Node B and there is only one controlling RNC per Node B.
The RNC also controls the user equipment connections. This function of the RNC refers to its
Serving RNC part. In this case, the function of the RNC is directly related to the users. And there
is only one serving RNC per user. For one user, the serving RNC can change depending on the
location of this user. Finally, the RNC is the element of the UTRAN which collects user data for
transfer up to the Core Network. So, we can say that the RNC is like a Service Access Point for
the Core Network.
Slide 26
Node B
The Node B provides the physical radio link between the UE (User
Equipment) and the network.
Node B
The Node B is responsible for the radio transmission/reception in its cells of signals going to the
mobile terminal or coming from the mobile terminal. The Node B also participates in the radio
resource and mobility management. The Node B is the function within the UMTS network that
provides the physical radio link between the UE (User Equipment) and the network. Along with
the transmission and reception of data across the radio interface the Node B also applies the
codes that are necessary to describe channels in a CDMA system. Analogies can be drawn
between the function of a Node B and those of a BTS (Base Transceiver Station).
Slide 27
Core Network
Core Network
The Core Network Indeed reuses the infrastructure of GSM and GPRS respectively for the Circuit
Switched and Packet Switched domain. Core Network is responsible for the initiation and the
management of a call establishment.
It is in charge of the network mobility management by keeping in memory the location of the
user in the network as well as information about the subscriber. The Core Network also provides
support for services, manages and negotiates the Quality of Service requested by the UE for
those services.
Finally, it manages the interconnection between the local radio access of a UE and external
networks.
To perform those functions, the Core Network is made up of different entities.
The Home Location Register (HLR) is the home register of the subscriber. Subscription
information, allowed services, authentication information and localization of the subscriber are
at all times stored in the HLR.
The Mobile services Switching Center (MSC) is a normal switch with extended functionalities to
handle mobile subscribers. The basic function of the MSC is to switch speech and data
connections between radio access networks such as UTRAN and external non‐mobile networks.
A Visitor Location Register (VLR) is associated to each MSC. The VLR can be associated with one
or several MSCs. The VLR stores data about all customers who are roaming within the location
area of that MSC.
The Gateway MSC (GMSC) has a routing function. It is the gateway between the UMTS Mobile
network and external Circuit‐Switched networks such as PSTN.
The SGSN and GGSN are similar respectively to MSC/VLR and GMSC, but for the Packet‐
Switched domain.
Slide 28
For mobility management, like GSM, UMTS also has Location Area and Routing Area for Circuit
Switched and Packet Switched operation respectively. However in UMTS a new entity, UTRAN
Registration Area (URA) has been also introduced for Mobility Management while a UE is in
UTRA Connected Mode. An URA may consist of cells from different LA as well as different RA.
The only standard requirement on the relationship between LAs, RAs and URAs is that RA has to
be subset of one and only one LA. URA may be or may not be smaller than LA and RA. However,
a cell can be assigned or defined in max 8 URAs.
Slide 29
Slide 30
Subscriber and UE Identifiers
Signaling messages exchanged between UTRAN and the UE on common channels must include
an identifier. This identifier may be a permanent identifier, or it may be a temporary identifier
that was assigned to the UE in some earlier signaling exchange. The message type determines
the type of identifier that is used.
Some identifiers are associated with the subscriber, and are stored in the Universal Subscriber
Identity Module or USIM. These identifiers are assigned by the core network, and may be used
with any mobile.
Other identifiers are associated with the mobile and are stored in either permanent or
temporary storage within the mobile.
Slide 31
¾ Subscriber’ s permanent ID
¾ Assigned by the service provider when the subscription is activated
¾ Stored in the USIM and the HLR
The IMSI is a permanent identifier associated with a subscription. It is stored in the USIM and in
the Home Location Register or HLR. It is used when the UE first registers with a network.
Systems typically try to avoid sending the IMSI over the air, to prevent fraud and to provide user
confidentiality. After the first registration, the network assigns a temporary identifier which is
used in subsequent message exchanges.
The IMSI consists of three parts:
• Mobile Country Code (MCC) – Uniquely identifies the country in which the subscription
was activated.
• Mobile Network Code (MNC) – Uniquely identifies the home Public Land Mobile Network
(PLMN) of the subscriber.
• Mobile Subscriber Identification Number (MSIN) – Uniquely identifies a subscriber within
a PLMN.
Slide 32
XY =
00 -TMSI •All other bits are arbitrary assigned by VLR or SGSN
01- TMSI •A value of all 1’s is not valid
10- TMSI
11- P-TMSI
Temporary Mobile Subscriber Identity (TMSI and P‐TMSI)
A temporary identifier may be assigned to a subscriber when the subscriber registers for
service.
Using the temporary identifier instead of the IMSI protects the IMSI from fraud and provides
user identity confidentiality. For circuit‐switched service, the TMSI is assigned by the Visitor
Location Register, or VLR. For packet‐switched service, the P‐TMSI is assigned by the SGSN.
The TMSI or P‐TMSI has only local significance. It is used only by the VLR or SGSN and the UE in
the area controlled by the VLR or SGSN. A value of all 1s is not valid, and the two most
significant bits are used to distinguish circuit‐switched TMSIs and packet switched PTMSIs.
If the UE uses a TMSI or P‐TMSI to identify itself during its initial contact with UTRAN, it must
include a Location Area Identity or Routing Area Identity to ensure that the identifier is unique.
The VLR or SGSN may assign a new TMSI or P‐TMSI to the UE at any time. This is called a
reallocation procedure, and may be performed as part of the attached procedure, location
updating and routing area updating procedures, or as a standalone procedure.
Slide 33
Radio Network Temporary Identity (C‐RNTI and U‐RNTI)
When the UE enters connected mode, UTRAN may assign one or two temporary identifiers.
The U‐RNTI is always assigned, and the C‐RNTI is optionally assigned.
UTRAN Radio Network Temporary Identity (U‐RNTI)
The U‐RNTI is used by the RRC layer in all signaling messaging exchanged on common logical
channels (CCCH) between UTRAN and the UE while the UE is in connected mode. It is used, for
example, in the cell update procedure, the paging procedure, and all radio bearer assignment,
release and reconfiguration procedures. A new U‐RNTI may be assigned in many of these
procedures.
Cell Radio Network Temporary Identity (C‐RNTI)
The C‐RNTI is used by the MAC layer when DCCH and DTCH are mapped to FACH or RACH.
The C‐RNTI is only used in the CELL_FACH state.
Slide 34
9 Mobile Permanent ID
9 Assigned at the factory
9 Only used over the air if the USIM is not available or
if requested by the Network
International Mobile Station Equipment Identity (IMEI)
The IMEI is a permanent identifier assigned at the factory to a mobile. It contains the following
fields (all fields contain hexadecimal digits):
• Type Approval Code (TAC) – Identifies the country in which approval was sought and the
approval number. Type approval means that the mobile passes the tests specified in the
Mobile Station Conformance Specification.
• Final Assembly Code (FAC) – Identifies the place of manufacture or final assembly.
• Serial Number (SNR) – Assigned by the manufacturer to uniquely identify the mobile.
The IMEI is not typically sent over the air. Two exceptions to this are:
• The network can request that the UE send the IMEI in order to check whether it is a valid
device. This is a NAS layer procedure.
• If the UE does not have a valid IMSI, TMSI or P‐TMSI, the IMEI may be used in the RRC
Connection Request message. However, it is unlikely that the network will accept the
connection unless it is for the purpose of establishing an emergency call.
Slide 35
Chapter 3
WCDMA
Radio Concepts
and
Procedures
Slide 36
In FDMA the frequency band is divided into smaller band of frequencies. In TDMA each
allocated frequency is further divided into time domain increasing further more capacity. In
CDMA, basically neither frequency nor the time is divided for multiple accesses. In CDMA the
frequency reuse factor is one. Here basically each radio resources are separated with different
codes.
Slide 37
Duplex methods
Duplex Technology
Duplex technology provides both way communications simultaneously and can be further
divided into
• Frequency division duplex (FDD)
• Time division duplex (TDD)
In third generation mobile communication systems, WCDMA and cdma2000 adopt frequency
division duplex (FDD), TD‐SCDMA adopts time division duplex (TDD).
Slide 38
UMTS Spectrum
UL DL
Europe UMTS-2100 1920 - 1980 2110 - 2170
America UMTS-1900 1850 - 1910 1930 - 1990
America UMTS-850 824 - 849 869 - 894
Japan UMTS-800 830 - 840 875 - 885
Slide 39
UMTS Spectrum
• Nominal Channel Spacing is 5 MHz, but this can be adjusted to optimize performance
deployment scenario.
• The Channel raster is 200 kHz, which means that the centre frequency must be integer
multiple of 200 kHz.
• Channel No is designated by the UTRA Absolute radio frequency channel no (UARFCN),
F Centre = UARFCN x 200kHz
• Uplink and Downlink band separation varies from band to band. In 2100 band, the UL – DL
band separation is about 190.
Slide 40
Frequency Reuse
Slide 41
The figure above illustrates the basic radio resource strategy of the CDMA scheme. Unlike in the
TDMA and FDMA schemes, in CDMA the radio resource is allocated on codes. Thus, all
simultaneous users can occupy the same bandwidth at the same time. Every user is assigned a
code/codes varying per transaction and these codes are used for cell, channel and user
separation. Every user uses the same frequency band simultaneously. In other words, we can
say that the power is divided among different user having different codes.
Slide 42
• Channelization
• Scrambling
Slide 43
The channelization code (also called spreading code) transforms every data symbol into a
number of chips, thus increasing the bandwidth of the signal. The narrowband signal is spread
into a wideband signal with a chip rate of 3.84 Mchips/s.
The system must choose the adequate spreading factor to match the bit rate of the narrowband
signal.
The spreading factor is directly linked with the length of the channelization code.
Slide 44
Input Data
A orthogonal Code
A signal is said to be orthogonal when its cross co‐relation is Zero.
Slide 45
Slide 46
In the air interface, each originating information bit is like a ‘‘box’’ having constant volume but
the dimensions of the ‘‘box’’ change depending on the case. By studying the above, we can see
the depth of the ‘‘box’’ (frequency band) is constant in WCDMA.
The other two dimensions, power and spreading factor are subject to change. Based on this the
following conclusions can be made:
• The better the signal can be spread, the smaller the required energy per bit (power).
• This can be applied if the originating bit rate is low. In other words, the spreading factor
increases and power decreases.
• The smaller the spreading factor, the greater the energy required per bit (power). This is
applied when the originating bit rate is high. In other words, the spreading factor increases
and power decreases.
Slide 47
The channelization codes are OVSF (Orthogonal Variable Spreading Factor) codes:
• Their length is equal to the spreading factor of the signal: they can match variable bit rates on
a frame‐by‐frame basis.
• Orthogonality enables to separate physical channels:
UL: separation of physical channels from the same terminal
DL: separation of physical channels to different users within one cell
What is a channelization code?
• OVSF (Orthogonal Variable Spreading Factor)
• Length: 4‐256 chips according to the spreading factor (in downlink also 512 chips is possible to
match very low bit rate)
• The channelization codes can be defined in a code tree, which is shared by several users.
• If one code is used by a physical channel, the codes of underlying branches may not be used.
• The number of codes is consequently variable: the minimum is 4 codes of length 4, the
maximum is 256 codes of length 256.
• The channelization code (and consequently the spreading factor) may change on a frame‐by
frame basis.
Slide 48
How is Code Allocation managed?
• The codes within each cell are managed by the RNC.
• No need to coordinate code tree resource between different base stations or
terminals.
• Usually one code tree per cell. If two code trees are used, it is necessary to use the
secondary scrambling code.
Slide 49
Slide 50
Scrambling
¾ Used on the top of Channelization (OVSF)codes.
¾ Separates the signals coming from different cells in the
downlink.
¾ Separates the signals coming from different users in the Uplink.
¾ GOLD codes have been chosen as Scrambling codes in UMTS
networks.
− Gold codes are Pseudorandom Noise (PN)sequences having good
cross correlation properties which is good for separating cells and
users.
Slide 51
Only first 8192 codes are used and broken into 512 groups each consisting of a
primary code and 15 secondary codes.
The primary CCPCH is always transmitted using primary scrambling code while
other downlink channels can be transmitted with either primary or secondary
code.
Slide 52
The short scrambling codes are used with MUD ( Multi user detection)
The Uplink scrambling code is decided by the network and the mobile
is informed in the downlink access grant message what scrambling
code to use.
The uplink scrambling code has a period of one radio frame so that
each code length is 38400 chips (long) or 66.7μs to have 256 chips
(short).
Slide 53
Slide 54
Slide 55
An example to know how the different codes are used within the
WCDMA system.
It is usual that cells 1 and 2 will be transmitting and receiving on
the same frequency.
Slide 56
BS1 transmits a single signal which includes the channelization code for
user 1 (Ccu1)and the channelization code for user 2 (Ccu2), both of which
are unified under a single scrambling code (Csbs1).
In the downlink for cell 2 the same situation occurs with the exception that
the scrambling code (Csbs2) must be different to that of cell 1.
However, the same channelization codes which are used in cell 1 can also
be used in cell 2.
In the uplink each of the mobile devices is identified by its scrambling code
(Csu1..4). The mobile devices can all use the same channelization codes
since these are concealed by the unique scrambling code.
Slide 57
Chapter 4
WCDMA
Protocol layers
Slide 58
Slide 59
UMTS Signaling Protocol Stack
The UMTS signaling protocol stack is divided into Access Stratum (AS) and Non‐Access Stratum
(NAS). The Non‐Access Stratum architecture evolved from the GSM upper layers and includes:
• Connection Management – includes sub‐layers responsible for
− CS services: Call Control (e.g., call set‐up and release), supplementary services (e.g.,
call forwarding, 3‐way calling), and short message service (SMS).
− PS services: Session Management (e.g., PS connection set‐up and release), SMS.
• Mobility Management – Handles location updating and authentication for circuit‐switched
calls.
• GPRS Mobility Management – Handles location updating and authentication for packet‐
switched calls.
Slide 60
Protocol stack
Circuit Switched Control Plane
Circuit Switched Control Plane Protocol Stack
The control plane protocol stack illustrates how signaling protocols are terminated. This
example shows a circuit‐switched call operating on dedicated physical channels.
Non‐Access Stratum (NAS)
• Call Control (CC) protocols are defined between UE and MSC to handle call setup and
release functions.
• Mobility Management (MM) protocols are defined between UE and MSC to handle UE
mobility functions.
Access Stratum (AS)
• The Radio Resource Control (RRC) protocol is defined between UE and RNC to handle
establishment, release, and configuration of radio resources.
• The Radio Link Control (RLC) protocol is defined between UE and RNC to provide
segmentation, re‐assembly, duplicate detection, and other traditional Layer 2 functions.
• The Medium Access Control (MAC) protocol is defined between UE and RNC to multiplex
user plane and control plane data.
• The Physical Layer protocol is defined between UE and Node B to transfer data over the
radio link. The interface between UE and RNC at the Physical Layer handles macro diversity
combining and splitting functions.
Slide 61
Protocol stack
Circuit Switched User Plane
Circuit Switched User Plane Protocol Stack
The user plane protocol stack illustrates how user protocols are terminated. This example shows
a circuit‐switched voice call operating on dedicated Physical Channels.
Non‐Access Stratum (NAS)
• An application can consist of several layers. For example, in the case of voice, the topmost
layer corresponds to the actual acoustic signals heard by users on both ends, whereas a
lower layer carries the vo‐coded bits.
Access Stratum (AS)
• The RLC, MAC, and Physical Layer protocols for the user plane are the same as for the
control plane.
• RRC does not participate in user plane protocols. It is responsible for setting up the radio
bearers and channels, but does not touch the data.
Slide 62
Protocol stack
Packet Switched Control Plane Protocol Stack
The control plane protocol stack illustrates how signaling protocols are terminated. This
example shows a packet‐switched call operating on dedicated physical channels.
Non‐Access Stratum (NAS)
• Session Management (SM) protocols are defined between UE and SGSN to handle packet
session establish and release procedures.
• GPRS Mobility Management (GMM) protocols are defined between UE and SGSN to handle
UE mobility functions.
Access Stratum (AS)
• The control plane access stratum is identical for packet and circuit switched operations
Slide 63
Protocol stack
Packet Switched User Plane
Packet Switched User Plane Protocol Stack
The user plane protocol stack illustrates how user protocols are terminated. This example shows
a packet‐switched call operating on dedicated Physical Channels.
Non‐Access Stratum (NAS)
• The application layer could be Web browsing, FTP, email, etc.
• When the Session Management layer activates a Packet Data Protocol (PDP) context, it
identifies the type as Internet Protocol (IP) or Point to Point Protocol (PPP).
Access Stratum (AS)
• The Packet Data Convergence Protocol (PDCP) provides protocol transparency for higher
layer protocols, such as IPv4, PPP, and IPv6, and performs protocol control information
compression.
• The RLC, MAC, and Physical Layer protocols for the user plane are the same as for the
control plane.
• RRC does not participate in user plane protocols. It is responsible for setting up the radio
bearers and channels, but does not touch the data.
Slide 64
Access Stratum
The Access Stratum consists of the following layers:
Layer 3
• Radio Resource Control (RRC)
Layer 2
• Packet Data Convergence Protocol (PDCP)
• Broadcast/Multicast Control (BMC)
• Radio Link Control (RLC)
• Medium Access Control (MAC)
Layer 1
• Physical Layer (PHY or L1)
Slide 65
Access Stratum
RRC Control Functions
RRC has a control interface with each of the layers and sub‐layers below it in the Access Stratum
protocol stack. Through this interface, RRC is able to start, stop, and configure the other layers
of the Access Stratum.
For example, when an RRC connection is established and dedicated logical, transport, and
physical channels are allocated, UTRAN sends an RRC Connection Setup message to the UE. This
message contains parameters that define the configuration of these channels. The UE’s RRC
configures RLC, MAC and PHY layers to establish the desired channels.
Slide 66
Access Stratum
Slide 67
Access Stratum
Physical Channels – Carry signaling and user data over the radio
link.
Slide 68
Layer 3-RRC
Slide 69
Slide 70
Slide 71
Layer 2 – PDCP and BMC
Packet Data Convergence Protocol (PDCP) – deals mostly with header compression, which is
important because the IP header of a voice packet can be quite large without compression. This
protocol is only defined for use with the packet switched (PS) domain and is not used for circuit
switched services (e.g., R99 CS data).
Broadcast Multicast Protocol (BMP) – supports broadcast and multicast messaging.
Slide 72
Layer 2 – Medium Access Control (MAC)
The MAC protocol provides dynamic resource allocation under the control of the RRC layer. This
includes using relative priorities between services to control access to the radio interface
transmission resources. Specifically, the MAC layer provides transport format selection as well
as scheduling and mapping of logical channels onto transport channels found in the Physical
Layer. MAC also provides addressing to common channels so that individual users can
distinguish their data from that of other users.
Slide 73
Layer 1 – Physical Layer
Layer 1 is also referred to as the Physical Layer or Level 1 (L1). Functions of the Physical Layer
include RF processing, chip rate processing, and symbol rate processing, as well as transport
channel combination.
In the transmit direction, the Physical Layer takes blocks of data from the MAC layer contained
in transport channels and multiplexes them onto a physical channel.
In the receive direction, the Physical Layer receives and then processes the multiplexed data
from the physical channels and delivers it to the MAC Layer.
Slide 74
Slide 75
75
Slide 76
UTRAN Protocols
Slide 77
UTRAN Protocols
Slide 78
UTRAN Protocols
Slide 79
UTRAN Protocols
Slide 80
UTRAN Protocols
Slide 81
UTRAN Protocols
Slide 82
UTRAN Protocols
The same general protocol model is applied for all Iu Interfaces
Slide 83
UTRAN Protocols
Iub Protocols
(ALCAP signaling is used to set up AAL2 connections for Data Streams, NBAP & AAL2 are carried on AAL5)
83 All Lights Reserved © Alcatel-Lucent 2010
Slide 84
UTRAN Protocols
Iur Protocols
(ALCAP signaling is used to set up AAL2 connections for Data Streams, RNSAP AAL2 are carried on AAL5)
84 All Lights Reserved © Alcatel-Lucent 2010
Slide 85
Pulok Sinha
09320096525
pulok.sinha@alcatel-lucent.com
85 All Lights Reserved © Alcatel-Lucent 2010