Escolar Documentos
Profissional Documentos
Cultura Documentos
1
Company Confidential
Multiservice Environment Data speed In RAN1 bit rate varies from 8 kbps up to 384 kbps Variable bit rate also available Bit rate gradually grows up to 2 Mbps Service delivery type Real-time (RT) & non real-time (NRT) Quality classes for user to choose Different error rates and delays Traffic asymmetric in uplink & downlink Common channel data traffic (FACH) Inter-system handovers
Company Confidential
Air Interface Capacity and coverage coupled cell breathing Neighbor cells coupled via interference Soft handover Fast power control Interference limited system (e.g. GSM frequency limited)
2
GMSC
GGSN
AuC
C
PSTN PSTN
Gc Gn Gr
HLR
D
EIR
F Gf Gs
VLR
B
VLR
B
MSC
MSC
SGSN CN
Gb
IuCS
IuPS
BSS BSC
Abis
RNS RNC
Iubis
Iur
RNC
BTS Um
BTS
Node B
cell
Node B
Uu ME
SIM-ME i/f
or
Cu
SIM
USIM
MS
Company Confidential
3G Spectrum Allocation
4
Company Confidential
TDD UL/DL
FDD UL
FDD DL
MSS DL
MHz
FDD Mode
TDD Mode
Company Confidential
3G Terms
Third generation mobile systems as defined by ITU Global recommendation 3rd Generation Partnership Project (Forum for a WCDMA standardization) Involved: ETSI (Europe), ARIB (Japan), TTA (Korea), T1P1 (USA), TTC (Japan) and CWTS (China)
3GPP2
3rd Generation Partnership Project (Forum for a CDMA2000)
UMTS
Third generation telecommunication system, that is subject to specifications produced by 3GPP
WCDMA
Air Interface technology adapted for UMTS Terrestrial Radio Access (UTRA)
UTRA-FDD
WCDMA in 3GPP, FDD mode
UTRA-TDD
WCDMA in 3GPP, TDD mode
CDMA2000
Air Interface technology proposal from TR45.5 (USA) on evolution of IS-95 (CDMA)
TD-SCDMA
Time Division Synchronous CDMA (TD-SCDMA) was proposed by China Wireless Telecommunication Standards group (CWTS) and approved by the ITU in 1999
MSS
Mobile Satellite System
Company Confidential
3G Standards
7
Company Confidential
allow each UE to simultaneously communicate with multiple base stations. The diversity gain associated with soft handoff is known as the "soft handoff gain factor".
that have traveled over different physical paths from the base station. For example, one signal may travel directly from the base station to the UE, and another may reflect off a large building and then travel to the UE. This phenomenon, "multi-path propagation", also provides a diversity gain. The same effect occurs on the uplink from the UE to the base station.
Multi-path reception: the rake receivers also allow the UE to decode multiple signals
Frequency reuse of 1: every base station in the CDMA system operates on the same
number of users in the system and the amount of interference allowed before access is blocked for new users. By setting the allowed interference threshold lower, coverage will improve at the expense of capacity. By setting the threshold higher, capacity will increase at the expense of coverage. Because of the fundamental link between coverage and capacity, cells with light traffic loads inherently share some of their latent capacity with more highly loaded surrounding cells.
Soft capacity: capacity and coverage are intertwined in CDMA, depending on the
10
Company Confidential
11
Company Confidential
12
Company Confidential
13
Real time
14
Company Confidential
Conversational services
Speech service:
Real time conversational service require the low time delay from end to end , and the uplink and the downlink service bandwidth is symmetrical Adopt AMR ( adaptive multi rate ) technique (WCDMA).
12.2 (GSM), 10.2, 7.95, 7.40(IS-41), 6.70(PDC), 5.90, 5.15 and 4.75kbps The bit rate of AMR voice can be controlled by the RAN according to the payload of air interface and the quality of voice service According to the requirement of the operator ,AMR technique can balance the relationship among the network capacity, coverage and the service quality
Streaming services
Multimedia data streaming:
Preserve time relation between information entities of the data streaming Data is processed into stable and continuous streaming Non-symmetry service
Services example :
Telemetry ( monitoring )
16
Company Confidential
Interactive services
Interactive traffic - fundamental characteristics for QoS:
request response pattern preserve payload content
Services example :
Location based services Online game Web browsing
17
Company Confidential
Background services
Background traffic - fundamental characteristics for QoS:
the destination is not expecting the data within a certain time preserve payload content
Service example:
E-mail ( server to server ) SMS Download of database Reception of measurement records
18
Company Confidential
19
Company Confidential
20
Company Confidential
21
Company Confidential
WCDMA = DS-CDMA
WCDMA is a code-division multiple access technology which separates each users voice or data information by multiplying the information by pseudo-random bits called "chips". Direct sequence (DS): with DS, a binary modulated signal is directly multiplied by a code. The code is a pseudo-random sequence of 1, where the bit rate of the code (Chip Rate) is higher than the rate of the signal, usually considerably higher. This has the effect of spreading the signal to a wideband. At the receiver, the same code is used to extract the original signal from the incoming wideband signal. A bit of the code is referred to as a chip, and the defining parameter for such a system is the chip rate. The pseudo-random bit sequences have a rate of 3.84 Mcps (millions of chips per second), resulting in the narrowband information bits of the user being spread across a much wider bandwidth of approximately 5 MHz. For this reason, CDMA technology is sometimes referred to as spread spectrum. Spread spectrum describes any system in which a signal is modulated so that its energy is spread across a frequency range that is greater than that of the original signal The user data (signal) is first spread by the channelisation code (based on Hadamard matrix) called Orthogonal Variable Spreading Factor (OVSF) Code. OVSF code has the property that two different codes from the family are perfectly orthogonal if in phase
22
Company Confidential
23
Company Confidential
24
Company Confidential
According to information theory, as the frequency spectrum a signal occupies is expanded, the overall power level decreases. In CDMA, the user signals are spread up to a wideband by multiplication by a code. Consider a narrowband signal, say, for example, a voice call. When viewed in the frequency spectrum, it occupies some frequency and has some power level. Once the frequency is spread across a wideband, the total power of this signal is substantially reduced. Now consider that another user has the same procedure performed on it and is also spread to the same wideband. The total system power is increased by a small amount as the two users are transmitted at the same time. Therefore, 25 each new user entering the system will cause the power of the wideband to increase. Company Confidential
The regenerated signal needs to be retrieved with enough power that it can be perceived above the level of the remaining spread signals. That is, it needs to be of a sufficient strength, or margin, above the rest of the signals so that the signal can be accurately interpreted. Considering this as a signal to interference ratio (SIR), or carrier to interference (C/I) ratio, the noise affecting one signal is the remaining spread signals that are transmitting at that frequency. This SIR is classified in CDMA as Eb/No. For mobile device measurements of the quality of the signals from the network, it uses a pilot channel (CPICH), which is broadcast by each cell. The mobile device measures Ec/Io, the energy level of this pilot channel, Ec, compared to the total energy received, Io Another important characteristic is the rejection of unwanted narrowband noise signals. If a wideband signal is affected by a narrowband noise signal, then since the spreading function is commutative, the despreading operation while extracting the wanted signal will in turn spread the narrowband noise to the wideband, and reduce its power level The lower the power that the original signals are transmitted with, the lower the noise in the system. It is therefore essential that each user in the system transmits with an optimum power level to reach the receiver with its required power level. If the power level is too high, then that user will generate noise, which in turn affects the performance of all the other users. If there is too little power, then the signal which reaches the receiver is of too low quality, and it cannot be accurately heard
26
Company Confidential
The ratio of the original signal to the spread signal is referred to as the spreading factor and is defined as:
Spreading factor (SF) = chip rate/symbol rate
27
Company Confidential
where R12 is the correlation between two signals v1 and v2, and is their relative time offset. For the code to be effective, the receiver must know the specific code (in this case 1,-1,1,-1, see next slides) which is being used for transmission and it must also be synchronized with this transmission. On reception the receiver can then simply reintroduce the correct code which is multiplied with the incoming signal and reproduce the actual symbol sent by the transmitter. The receiver also needs to know the actual number of chips that represent a symbol (spreading factor) so that the chips can be regenerated to the sent symbol through averaging the value of the chips over the symbol time. This is achieved through integration, where the chips are summed over the total time period of the symbol they represent. The principle of correlation is used at the receiver to retrieve the original signal out of the noise generated by all the other users wideband signal.
28
Company Confidential
The spreading sequences must have good correlation properties to facilitate the separation of the wanted signal from all others: One sharp and dominant peak of the autocorrelation function for zero phase shift As small as possible values of the autocorrelation function for all out-of-phase shift 30 As small as possible values of the cross-correlation (different signals) function for Company Confidential all phase shift
31
Company Confidential
S1
S1xC1 f
p
RECEIVER of USER 1 f
p
S1 = S1 X C1 X C1
S2
S2 X C2 X C1
f S2xC2 f f
32
Company Confidential
S1
S1xC1 f
p
f S1 IxC1 f
Correlation Narrowband Interference Spread the power Only a small portion of the interfering signal energy passes the filter and remain as residual interference
Company Confidential
33
CDMA Principles
m1(t)
Tb
c1(t)
2Tb
3Tb
f Tc
m1(t).c1(t)
4Tc
1/Tc
f 1/Tb
Company Confidential
1/Tc
34
Gp = Wc/Wi
Where
Wc: chip rate Wi: user data rate
Wi
Wc
The more processing gain the system has, the more the power of uncorrelated interfering signals is suppressed in the despreading process Thus, processing gain can be seen as an improvement factor in the SIR (Signal to Interference Ratio) of the signal after despreading Example: Voice AMR 12.2 Kbps Gp = 10*log(3840000/12200)= 25 dB After despreading the signal power has to be typically few dB above the interference and noise: Eb/No = 5dB; therefore the required wideband signalto-interference ratio is 5dB Gp = -20 dB. In other words, the signal power can be 20 dB under the interference and the WCDMA receiver can still detect the signal Wideband signal-to-interference ratio is also called carrier-to-interference ratio: C/I Thanks to spreading and desporeading, C/I can be much lower in WCDMA than GSM (C/I = 9-12 dB)
35
Company Confidential
Spreading sequences of different length Processing gain dependent on user data rate
36
Spreading in WCDMA
Consists of 2 operations: 1. Channelisation (OVSF: Orthogonal Variable SF)
Transforms each symbol (data bit) to the number of chips (increases bandwidth) Number of chips per symbol = Spreading Factor (SF) Scrambling code is applied (PN codes) TX Scrambling Code Data Bit Rate
Channel coding (CRC, Encoder, Interleaver, convoluter, Rate Matching)
3.84 Mcps
MOD
Chip Rate
37
Company Confidential
Channel coding
Spreading in WCDMA
CRC attachment
Check for error during transmission Voice: if CRC check returns error discard information Data: if CRC check returns error ask for retransmission
Interleaving
Distribute error (burstly error) over data transmitted
Rate Matching
Match Symbol Rate to that accepted by spreading Rate matching techniques: Repeat or Puncturing (remove) Example: voice 12.2 (SF 128) Rs=3.84/128= 30Ksps If the output of Channel cod is < 30Ksps, Rate matching repeats the info else uses 38 puncturing (remove)
Rb
Channel coding
Rs Symbol Rate
Spreading in WCDMA
39
In the spreading process, information symbols, which occupy a relatively narrow bandwidth, are multiplied by a high-rate spreading code consisting of chips The resulting spread signal has a wider bandwidth dependent on the number of chips per symbol In the de-spreading process, the spreading code is multiplied by the spread signal to recover the original data symbols. The de-spreading process converts the wide bandwidth spread signal back to the original narrower bandwidth of the data symbols Spreading codes (OVSF) are specially designed to allow the symbols from multiple users to occupy the same spectrum at the same time, while still allowing the original information to be retrieved. Codes are allocated in RNC OVSF code has the property that two different codes from the family are perfectly orthogonal if in phase Restrictions: another physical channel may use a certain code in the tree if no other physical channel to be transmitted using the same code tree is using a code that is on an underlying branch, i.e. using a higher SF generated from the intended spreading code to be used. Neither can a smaller SF code on 40 SF4 the path to the root of the tree be used
Company Confidential
OVSF properties
OVSF properties
The signals that are all being transmitted at the same time and frequency must be separated out into those from individual users. This is the second role of the code. Considering the party analogy, if this was a GSM party, then the problem is solved easily. All guests must be quiet and each is then allowed to speak for a certain time period; no two guests speak at the same time. At a CDMA party, all users are allowed to speak simultaneously, and they are separated by speaking in different languages, which are the CDMA codes. All of the codes that are used must be unique and have ideally no relationship to each other. Mathematically speaking, this property is referred to as orthogonality. The system can support as many simultaneous users as it has unique or orthogonal codes. Orthogonal codes are used in CDMA systems to provide signal separation. As long as the codes are perfectly synchronized, two users can be perfectly separated from each other. To generate a tree of orthogonal codes, a WalshHadamard matrix is used. For perfect orthogonality between two codes, for example, it is said that they have a crosscorrelation of zero when = 0. Consider a simple example using the following two codes:
41
Company Confidential
OVSF properties
To verify if two codes have a zero cross-correlation, they are tested in the below equation, first multiplied together and then integrated, as shown in Figure below. The result is zero, indicating that indeed they are orthogonal.
The number of chips which represent a symbol is known as the SF or the processing gain. To support different data rates within the system, codes are taken from an appropriate point in the tree. These types of orthogonal codes are known as orthogonal variable spreading factors (OVSF). In the 3G WCDMA system the chip rate is constant at 3.84 Mchips/s. However, the number of chips that represent a symbol can vary. Within this system as laid down by the specifications, the minimum number of chips per symbol is 4 which would give a data rate of 3 840 000/4 = 960 000 symbols per second. The maximum SF or number of chips per symbol is 256,1 which would give a data rate of 3 840 000/256 = 15 000 symbols per second. Thus it can be seen that the fewer chips used to represent a symbol, the higher the user data rate. The actual user data rate must be rate matched to align with one of these SF symbol rates. Although orthogonal codes demonstrate perfect signal separation, they MUST be perfectly synchronized to achieve this. Another drawback of orthogonal codes is that they do not evenly spread signals across the wide frequency band, but rather concentrate the signal at certain discrete frequencies. As an example, consider that the code 1 1 1 1 will have no spreading effect on a symbol. To overcome these drawbacks the PN codes are introduced 42
Company Confidential
Another property of PN sequences is that they exhibit what is known as autocorrelation. This is defined as the level of correlation between a signal and a time-shifted version of the same signal, measured for a given time shift. For a PN sequence, the autocorrelation is at a maximum value, N, when perfectly time aligned, i.e. = 0. N is the length in numbers of bits of the PN sequence. This single peak drops off quickly at Tc, where Tc is the width of a chip of the code. This allows a receiver to focus in on where the signal is, without a requirement for the transmitter and receiver to be synchronized. In comparison, the autocorrelation of time-shifted orthogonal codes results in several peaks, which means that this signal locking is much more problematic. 43
Company Confidential
Scrambling Code
Uplink: Separation of terminals
Downlink: Separation of sectors (cells) Uplink: 10ms = 38400 chips Downlink: 10ms = 38400 chips
Length
Number of codes
Uplink: over 16 millions Downlink: 512 10ms code: Gold Code 66.7s code: Extended code family No, does not affect bandwidth
Code Family
Spreading
45
Company Confidential
Receivers
Both NodeB and Terminals use the same type of correlation receivers Due to multipath propagation its necessary to use multiple correlation receivers (fingers) in order to recover (combine) the energy from all paths coherently and obtain multipath diversity
46
Company Confidential
1 fc = 2S
48
Company Confidential
Dominant Path
49
Company Confidential
50
Company Confidential
51
Company Confidential
52
Company Confidential
53
Company Confidential
Rake Receiver
Rake finger delays tuned based on channel impulse response estimation Code Matched Filter, Search Finger Fingers combined with Maximal Ratio combining Performance of Rake Receiver depends on the channel powers delay profile Max path delay difference vs. chip time amount of multipath diversity
54
Company Confidential
55
Company Confidential
Finger n.2
Finger n.3
UE WBTS
56
Company Confidential
Finger n.1
Finger n.2
Finger n.3
UE WBTS
57
Company Confidential
WCDMA in TU Channel
time
Corr 1
Corr 5 Corr 6
Corr 7
Corr 1
78m
No multipath diversity
59
Company Confidential
60
Company Confidential
61
Company Confidential
62
Company Confidential
63
Company Confidential
64
Company Confidential
65
Company Confidential
66
Company Confidential
67
Company Confidential
68
Company Confidential
69
Company Confidential
70
Company Confidential
71
Company Confidential
72
Company Confidential
Channel Mapping
In GSM, we distinguish between logical and physical channels. In UMTS there are three different types of channels: Logical Channels
Logical Channels were created to transmit a specific content. There are for instance logical channel to transmit the cell system information, paging information, or user data. Logical channels are offered as data transfer service by the Medium Access Control (MAC) layer to the next higher layer. Consequently, logical channels are in use between the mobile phone and the RNC.
Logical Channels (define what type of data is transferred ) content is organised in separate channels, e.g. System information, paging, user data, link management
L2
RLC Layer
Transport Channels define how and with which type of characteristics the data is transferred by the physical layer
MAC Layer
L1
PHY Layer
74
Company Confidential
RRC
control
L3
Radio Bearers PDCP PDCP
control
control
control control
L3 RRC (Radio Resource Control): Broadcast of information provided by the non-access stratum (Core Network). Broadcast of information related to the access stratum Establishment, reestablishment, maintenance and release of an RRC connection between the UE and UTRAN , Establishment, reconfiguration and release of Radio Bearers, Assignment, reconfiguration and release of radio resources for the RRC connection, RRC connection mobility functions, Paging/notification, Control of requested QoS, UE measurement reporting and control of the reporting, Outer loop power control L2/PDCP (Packet Data Convergence Protocol): Header compression and decompression, Support for lossless SRNS relocation L2/BMC (Broadcast/Multicast Control): Storage of Cell broadcast messages, dealing with CBS (Cell Broadcast Servises) L2/RLC (Radio Link Control): Segmentation (Reassembly), Retransmission, Error correction [Transparent (no overhead added, e.g. voice/video), Unack (add overhead but no retransmission, e.g. cell broadcast), Ack (add overhead and retransmission enable, e.g. PS)]
L2/PDCP
BMC
L2/BMC
RLC RLC
RLC
RLC
L2/RLC
MAC
PHY
L2/MAC (Medium Access Control): Mapping Logical channels to transport Reporting of measurements.Chipering. Local measurements such as traffic volume and quality indication are L2/MAC reported to RRC Transport L1:Closed loop PC, Macrodiversity distribution/combining and soft Channels handover execution; Error detection on transport channels and indication to higher layers; FEC encoding/decoding and interleaving/deinterleaving L1 of transport channels; Multiplexing of transport channels and demultiplexing of coded composite transport channels; Rate matching; Mapping of coded composite transport channels on physical channels; Power weighting and combining of physical channels; Modulation and spreading/demodulation and despreading of 75 physical channels; Frequency and time (chip, bit, slot, frame) synchronisation; Company Confidential Measurements and indication to higher layers (e.g. FER, SIR,
Logical Channels
There are two types of logical channels (FDD mode): Control Channels (CCH): Broadcast Control Channel (BCCH)
Logical Channels
System information is made available on this channel. The system information informs the UE about the serving PLMN, the serving cell, neighbourhood lists, measurement parameters, etc. This information permanently broadcasted in the downlink.
76
78
Company Confidential
79
Company Confidential
BCH PCH
CCCH
RACH
PRACH
DCCH
CPCH
PCPCH
DTCH
DCH
DPDCH
I branch
DPCCH Q branch
81
Company Confidential
82
Company Confidential
Transport Formats
TFCS TB TB
TTI
TB
TTI
TB
TTI
DCH 2
TB TB TB
TTI
TB TB
TTI
TB TB
TBS
DCH 1 TFS
TTI
TFC
TB TBS Transport Block Transport Block Set TF TFS TFC TFCS
TF
Transport Format Transport Format Set Transport Format Combination Transport Format Combination83 Set
Company Confidential
When a UE is switched on, it starts to monitor the radio interface to find a suitable cell to camp on. But it has to determine, whether there is a WCDMA cell nearby. If a WCDMA cell is available, the UE has to be synchronised to the downlink transmission of the system information transmitted on the physical channel P-CCPCH before it can make a decision, in how far the available cell is suitable to camp on. Initial cell selection is not the only reason, why a UE wants to perform cell synchronisation. This process is also required for cell re-selection and the handover procedure. Cell synchronisation is achieved with the Synchronisation Channel (SCH). This channel divides up into two sub-channels, P-SCH and S-SCH are not under the cellspecific primary scrambling code (the UE must be able to synchronize to the cell before knowing the downlimk scrambling code) Primary Synchronisation Channel (P-SCH) (SLOT and CHIP SYNCHRONIZATION) A time slot lasts 2560 chips. The P-SCH only uses the first 10% of a time slot. A Primary Synchronisation Code (PSC) is transmitted the first 256 chips of a time slot. This is the case in every UMTS cell. If the UE detects the PSC, it has performed TS and chip synchronisation. This is typically done with a single matched filter matched to the primary synchronization code which is common for all cells. The slot timing of the cell can be obtained by decoding peaks in the matched filter output 84 Matched Filter (continued on the next text slide)Company Confidential
Cell Synchronisation
Slot 0
Slot 1
Slot 14
Slot 0
85
Cell Synchronisation
Secondary Synchronisation Channel (S-SCH) (FRAME SYNCH and Scrambling Code Group DETECTION) The S-SCH also uses only the first 10% of a timeslot; Secondary Synchronisation Codes (SSC) are transmitted. There are 16 different SSCs, which are organised in a 10 ms frame (15 timeslots) in such a way, that the beginning of a 10 ms frame can be determined, and 64 different SSC combinations within a 10 ms frame are identified. There is a total of 512 primary scrambling codes, which are grouped in 64 scrambling code families, each family holding 8 scrambling code members. The 15 SSCs in one 10 ms frame identify the scrambling code family of the cells downlink scrambling code. The sequence permits downlink frame synchronization and indicate which of the code grouping the downlink scrambling code belongs to. This is done by correlating the received signal with all possible secondary synchronization code sequences and identifying the maximum correlation value. Since the cyclic shifts of the sequences are unique, the code group as well as the frame synchronization is determined
86
Company Confidential
15 9 10 15
8 10 16 16 16 2 3 10 6 11 5 8
5 16 1 15 3 1 6 7
7 5 8
3 14 5 12 6 5
5 12 14 12 2 16 11 15 4 4 6 3
2 16 3 4
6 11 15 4 1 5
5 12 5 3
1 15 12 16 11 6 2 8 7 6
11
15
5
87
Company Confidential
CP
P-CPICH
P-CPICH
89
received wide band power, including thermal noise and noise generated in the receiver CPICH Ec/No = CPICH RSCP UTRA carrier RSSI
CPICH Ec/No
0: -24 1: -23.5 2: -23 3: -22.5 ... 47: -0.5 48: 0 Ec/No values in dB
CPICH RSCP
0: -115 1: -114 2: -113 : 88: -27 89: -26
92
Company Confidential
CP
P-CCPCH
P-CCPCH
channelisation code: Cch,256,1 no TPC, no pilot sequence 27 kbps (due to off period) organised in MIBs and SIBs
93
Company Confidential
In GSM all common channels have the same power, there is no need to consider the power setting of common channels as all common channels are on full power. In GSM we have to decide how many TSLs to dedicate to common tasks, I.e. how many SDCCH TSL are required per cell
Company Confidential
94
95
Company Confidential
96
Company Confidential
97
Company Confidential
TFCI (optional)
Data
Pilot bits
carries PCH and FACH Multiplexing of PCH and FACH on one S-CCPCH, even one frame possible with and without TFCI (UTRAN set) SF = 4..256 (18 different slot formats) no inner loop power control
Company Confidential
S-CCPCH
98
The network has detected, that there is data to be transmitted to the UE (MTC). Both in the RRC idle mode and in the RRC connected mode (e.g. in the sub-state CELL_PCH) a UE may get paged. But how does the mobile know, when it was paged ? And in order to save battery power, we dont want the UE to listen permanently to paging channel instead, we want to have discontinuous reception (DRX) of paging messages. But WHEN and WHERE does the UE listen to the paging messages? Cell system information is broadcasted via the P-CCPCH. The cell system information is organised in System Information Blocks (SIB). SIB5 informs the mobile phones about the common channel configuration, including a list of SCCPCH descriptions. The first 1 to K entries transmit the (transport channel) PCH, while the remaining S-CCPCH in the list hold no paging information. The UE determines the S-CCPCH, where it is paged, by its IMSI and the number of PCH carrying S-CCPCHs K. When paging the UE, the RNC knows the UEs IMSI, too, so that it can put the paging message on the correct PCH transport channel. Discontinuous Reception (DRX) of paging messages is supported. A DRX cycle length k has to be set in the network planning process for the cs domain, ps domain, and UTRAN. k ranges between 3 and 9. If for instance k=6, then the UE can be paged every 2k = 640 ms. If the UE is in the idle mode, it takes the smaller k-value of either the cs- or ps-domain. If the UE is in the connected mode, it has to select the smallest k99 value of UTRAN and the CN, it is not connected to.
Company Confidential
UTRAN
UE
Index of S-CCPCHs
Node B
RNC
Company Confidential
for paging indication b0 b1 # of paging indicators per frame (Np) 18 (16 bits) 32 (8 bits) 72 (4 bits) 144 (2 bits) Subscribers with Pq indicator paged =>
{b16q, ,b16q+15} = {1,1,,1} {b8q, , b8q+7} = {1,1,,1} {b4q, , b4q+3} = {1,1,,1} {b2q, b2qCompany Confidential +1} = {1,1}
WCEL: NbrOfSCCPCHs The parameter defines how many S-CCPCH are configured for the given cell. Range: [1,2], step: 1; default = 1 (1 = FACH&PCH; 2 = FACH on 1st / PCH on 2nd) WCEL: PtxSCCPCH1 (carries FACH & PCH) This is the transmission power of the 1st S-CCPCH channel, the value is relative to primary CPICH transmission power. Range: [-35 dB 15 dB] , step size 0.1 dB, default: - 5dB
WCEL: PtxSCCPCH2 (carries PCH only) This is the transmission power of the 2nd S-CCPCH channel, the value is relative to primary CPICH transmission power. Range: [-35 dB 15 dB] , step size 0.1 dB, default: - 5dB
103
Company Confidential
UE
0..25.5 dB, step size 0.1 Transmit Power Level TFCI (optional) PO1 Data
106
Company Confidential
PO3
Pilot bits
WCEL: PowerOffsetSCCPCHTFCI Defines the power offset for the TFCI symbols relative to the downlink transmission power of a Secondary CCPCH. This parameter is part of SIB 5. P01_15/30/60 15 ksps: [0..6 dB]; step 0.25 dB; default: 2 dB 30 ksps : [0..6 dB]; step 0.25 dB; default: 3 dB 60 ksps : [0..6 dB]; step 0.25 dB; default: 4 dB
WCEL: PowerOffsetSCCPCHPilot Defines the power offset for the pilot symbols relative to the downlink transmission power of a Secondary CCPCH. This parameter is part of SIB 5. P03_15/30/60 15 ksps : [0..6 dB]; step 0.25 dB; default: 2 dB 30 ksps : [0..6 dB]; step 0.25 dB; default: 3 dB 60 ksps : [0..6 dB]; step 0.25 dB; default: 4 dB
107
Company Confidential
There are 5 CCH's (4 use SF256 and one uses SF64), they blocked (5 used + 13 not allowed) a total of 18 codes
108
Company Confidential
109
Company Confidential
Since every TX and RX power is causing interference to others, PC 110 is necessary to limit the interference
Company Confidential
PL1 = 100 dB MS2 MS1 (S/N)1 = Pr,1 - Pr,2 = -10 dB (S/N)2 = Pr,2 - Pr,1 = +10 dB MS2 must be Power Controlled by -10 dB to have the same S/N for both users MS1 and MS2
Company Confidential
111
Near-Far Effect
112
Company Confidential
113
Company Confidential
Physical Random Access (Open loop Power Control) Outer Loop Power Control Fast Closed Loop (Inner) Power Control
114
Company Confidential
115
UE
No response by the Node B No response by the Node B
Node B
PRACH (preamble)
PRACH (preamble)
PRACH (preamble)
OLA!
PRACH (message part)
AICH
116
Company Confidential
1,
then, the minimum preamble-to-preamble distance is 4 access slots, the minimum preamble-to117 message distance is 4 access slots, and the preamble-to-acquisition indication is 5 timeslots.
Company Confidential
P-CCPCH
1 2 3 4 5120 chips UE point of view 5 6 7 8 9 10 11 12 13 14 0 1 2 3 4 5 6 7
Acquisition Indication AS # i
4096 chips PRACH access slots Preamble 5120 chips preamble-to-preamble distance p-p
Message part
Company Confidential
118
Preamble_Initial_Power =
UL interference + Primary CPICH TX power CPICH_RSCP + Constant Value
UL interference at Node B
-5..10 dB
1..8 dB
Pp-p
Preamble Preamble
Pp-p
Preamble
Pp-m
Message part
# of preambles: 1..64
119
Company Confidential
OL PC is needed to keep the quality of the communication at the required level (BLER, SIR, BER,) by setting the target (SIR) for the fast power control. It aims at providing the required quality: no worse, no better. Too high quality would waste capacity. It is needed in both UL and DL since there is Fast PC (Closed Loop or Inner Loop) in both UL and DL
123
Company Confidential
In RADIO BEARER SETUP Message you can find the Target BLER (for the DL) For AMR and PS 128 = 1% BLER, CS T (VIDEO) = 0.1%, CS NT = 0.2%
124
Company Confidential
125
Company Confidential
When Max SIR Target is hit, RNC might force a hard handover
126
Company Confidential
UL OL PC: BLER
Eb/No
127
Company Confidential
DeltaSIR(1,2), DeltaSIR after (1,2),.. The adjustments of the SIR Target done by the UE is a proprietary algorithm that provides the same measured quality (BLER) as the quality target set by the RNC 128
Company Confidential
129
Company Confidential
132
Company Confidential
TPC two modes DPC_MODE = 0 unique TPC command per TS DPC_MODE = 1 same TPC over 3 TS, then new command
cell
1500 times/s
500 times/s
TPCest per 1 TS / 3 TS
133
Company Confidential
SIRtarget
time
T TC TCP CP = TC P P= = =0 0 1 1
TPC TPC_cmd
135
Company Confidential
PCA1
TPC_cmd for each TS TPC_cmd values: +1, -1 step size TPC: 1dB or 2dB
PCA2
TPC_cmd for 5th TS TPC_cmd values: +1, 0, -1 step size TPC: 1dB
UL DPCCH power adjustment: DPCCH = TPC TPC_cmd PCA2 0 PCA1 PCA2 km/h
138
Cell 3 UP
TPC1 = 1 UP Cell 1
TPC3 = 0 Down
Cell 2
139
Company Confidential
TPC = 1 TPC = 1 TPC = 1 TPC = 1 TPC = 1 TPC = 1 TPC = 0 TPC = 1 TPC = 0 TPC = 1 TPC = 0 TPC = 0 TPC = 0 TPC = 0 TPC = 0
TPC_temp 0 0 0 0 1 0 0 0 0 0 0 0 0 0 -1
Company Confidential
140
Soft Handover Case :UL Inner Loop Power Control Algorithm 2 (Part 2)
Example:
N = 3 cells
1 N TPC_tempi N i=1
-1 TPC_cmd = -1
-0.5
0 0
0.5 1
1
141
Company Confidential
142
Company Confidential
The exact length of the fields depends on the slot format, which is determined by higher layers. The TFCI is optional, because it is not required for services with fixed data rates. Slot format are also defined for the compressed mode; hereby different slot formats are in used, when compression is archived by a changed spreading factor or a changed puncturing scheme. The pilot sequence is used for channel estimation as well as for the SIR ratio determination within the inner loop power control. The number of the pilot bits can be 2, 4, 8 and 16 it is adjusted with the spreading factor. A similar adjustment is done for the TPC value; its bit numbers range between 2, 4 and 8. The spreading factor for a DPCH can range between 4 and 512. The spreading factor can be changed every TTI period. 143 Superframes last 720 ms and were introducedConfidential Company for GSM-UMTS handover support.
10 ms Frame
Slot 0 Slot 1 Slot 2 Slot 14
Data 1 bits
TPC bits
TFCI bits
(optional)
Data 2 bits
Pilot bits
DPDCH
17 different slot formats Compressed mode slot format for changed SF & changed puncturing
DPCCH
DPDCH
DPCCH
2,4,8 bits
Company Confidential
2,4,8,16 bits (SIR estimation, phase estimation for Rake 144 receiver)
Multicode usage:
Several physical channels can be allocated in the downlink to one UE. This can occur, when several DPCH are combined in one CCTrCH in the PHY layer, and the data rate of the CCTrCH exceeds the maximum data rates allowed for the physical channels. Then, on all downlink DPCHs, the same spreading factor is used. Also the downlink transmission of the DPCHs takes place synchronous. One DPCH carries DPDCH and DPCCH information, while on the remaining DPCHs, no DPCCH information is transmitted. But also in the case, when several DPCHs with different spreading factors are in use, the first DPCH carries the DPCCH information, while in the remaining DPCHs, this information is omitted (discontinuous transmission). Multicode usage is not implemented in RAN1.
145
Company Confidential
TS Multicode usage:
TS
TS
TS
TS
Power offsets TFCS DL DPCH slot format FDD DL TPC step size
Node B
Uu
Iub RNC
UE
PO3 Data 2 bits
148
Company Confidential
TPC bits
TFCI bits
(optional)
PO1
Pilot bits
149
Company Confidential
10 ms Frame
Slot 0 Slot 1 Slot 2 Slot 14
DPDCH DPCCH
Pilot bits 6 different slot formats Compressed mode slot format for changed SF & changed puncturing
FBI bits
TPC bits
Feedback Indicator for Closed loop mode transmit diversity, & Site selection diversity transmission (SSDT)
Company Confidential
151
DPDCH DPCCH
TTI
TTI
TTI
Aj =
d c
DPDCH
DPCCH
153
Company Confidential
154
Company Confidential
155
Company Confidential
reception at UE
transmission at UE
T0 0 to 7 frames for power control preamble DPCCH only, always based on PCA1 DPCCH & DPDCH PCA based on RRC
Radio frame timing and access slot timing of downlink physical channels
Primary SCH Secondary SCH Any CPICH P-CCPCH k:th S-CCPCH
PICH for k:th S-CCPCH AICH access slots Any PDSCH n:th DPCH HS-SCCH Subframes DPCH,n #0 #1 #2 #3 #4 #5 #6 #7 #8 #9 #10 #11 #12 #13 #14
10 ms
10 ms
157
Company Confidential
158
Company Confidential
O&M
Network Optimisation Survey measurements Statistical performance analysis
159
Company Confidential
Planning issues
Planning should meet current standards and demands and also comply with future requirements. Uncertainty of future traffic growth and service needs. High bit rate services require knowledge of coverage and capacity enhancements methods. Real constraints Coexistence and co-operation of 2G and 3G for old operators. Environmental constraints for new operators. Network planning depends not only on the coverage but also on load.
Planning methods
Preparation phase Defining coverage and capacity objectives Selection of network planning strategies Initial design and operation parameters Initial dimensioning First and most rapid evaluation of the network elements count and capacity of these elements Offered traffic estimation Joint capacity coverage estimation Detailed planning Detailed coverage capacity estimation Iterative coverage analysis Planning for codes and powers Optimization Setting the parameters Soft handover Power control Verification of the static simulator with the dynamic simulator
161
Company Confidential
162
Company Confidential
Dimensioning process
163
Company Confidential
164
Company Confidential
165
Planning
Importing sites.
Utilization of 2G networks.
Optimising dominance.
Interference and capacity analysis. Locating best servers in each location in the service area. Target to have clear dominance areas.
Company Confidential
166
Monte-Carlo simulation.
Finding average over many snapshots: average, minimum, maximum, std. Averages over mobile locations. Iterations are described by:
Number of iterations. Maximum calculation time. Mobile list generation. General calculation settings. 167
Company Confidential
Reporting:
Raster plots from the selected area. Network element configuration and parameter setting. Various graphs and trends. Customized operator specific trends.
168
Company Confidential
The power calculation loop is repeated until powers converge. Mobiles exceeding the limit power
Attempt inter-frequency handover. Are put into outage.
Allocation of P-CPICH powers. Transmit power of BS should fulfill required receiver Eb/Io in MS. The initial Tx powers are assigned iteratively. The planning tool evaluates the actual CIR and compares it to the Target CIR
170
Company Confidential
Coverage Analysis
UL DCH Coverage
Whether an additional mobile having certain bit rate could be served. The transmit power need for the MS is calculated and compared to the maximum allowed
DL DCH Coverage
Pixel by pixel is checked whether an additional mobile having certain bit rate could be served. Concentration on the power limits per radio link. The transmit power need for supporting the link is calculated and compared to the maximum allowed
DL CPICH Coverage
Pixel by pixel is checked whether the P-CPICH channel can be listened.
171
Company Confidential
Examples of Plots/Arrays
172
Company Confidential
Examples of Plots/Arrays
173
Company Confidential
Examples of Plots/Arrays
174
Company Confidential
Examples of Plots/Arrays
175
Company Confidential
178
Company Confidential
Noise Rise =
1 1 I total = = N PN 1 j =1 L j 1 UL
UL = (1 + i ) j =1 L j = (1 + i
N
NS
) j =1
N
1 W 1+ ( Eb / N O ) j R j j
Where UL [0,1]
Recommended Values
j
Eb/No
W Rj
NS i
Number of Sectors Other cell to own cell interference ratio seen by the base station receiver Macro Cell with omni antennas: 55%. Macro Cell with 3 sectors: 65% 180
Company Confidential
Range [km]
2 1.5 1 0.5 0 32 kbps 64 kbps 144 kbps 384 kbps 1024 kbps 2048 kbps
183
( Eb / N O ) j W Rj
(1 - j ) + i j
Noise Rise over therm al noise due to multiple access interferen ce is equal to - 10 log 10 (1 DL ) Where DL [0,1]
Definitions
Recommended Values 0.58 for speech Dependent on service, bit rate, mulitpath, fading channel, receive antenna diversity, mobile speed, etc 3.84 Mcps Dependent on service
j
Eb/No
Number of users per cell Activity Factor of user j at physical layer Signal energy per bit divided by noise spectral density that is required to meet a predifined BLER. Noise includes both thermal and interference WCDMA chip rate Bit Rate of user j Orthogonality of channel of user j
W Rj
ij
Dependent on the multipath propagation 1: fully orthogonal 1-path channel 0: no orthogonality ITU Vehicular A channel: ~ 50% ITU Pedestrian A channel: ~ 90% ij Ratio of other cell to own cell base station power, Each user sees a different , depending on received by user j its location in the cell and log-normal shadowing. Macro Cell with omni antennas: 184 55%. Macro Cell with 3 sectors: 65% Company Confidential
BS _ TxPw =
N rf W L j =1 j
N
(Eb
(W
No ) j Rj )
1 DL
Where N rf is the noise spectral density of the mobile N rf = k T + NF = 174dBm + NF (assuming T = 290K) k is the Boltzmann constant of 1.38110-23 J / K , NF is mobile Noise Figure (5 - 9 dB)
185
Company Confidential
20-3.6 = 16.4 W
186
Worst case; Depends on the FACH bit rate; Depends on PCH and FACH traffic
Company Confidential
60 50 40 30 20 10 0 0 10 20 30 40 50 UL Load [%]
Increasing asymmetry
Downlink load is always higher than uplink load due to: asymmetry in user traffic different Eb/No values in uplink and downlink orthogonality in downlink overhead due to softhandover
DL Load [%]
187
Company Confidential
189
160,00
better coverage
Pathloss [dB]
155,00
150,00
Speech 12,2k UL Pathloss RT Data 14k UL Pathloss RT Data 64k UL Pathloss NRT Data 144k UL Pathloss NRT Data 384k UL Pathloss DL Pathloss
145,00
140,00
190
Company Confidential
191
Company Confidential
192
Company Confidential
193
Company Confidential
194
Company Confidential
195
Company Confidential
196
Company Confidential
197
Company Confidential
198
Company Confidential
199
Company Confidential
200
Company Confidential
201
Company Confidential
202
Company Confidential
203
Company Confidential
204
Company Confidential
205
Company Confidential
206
Company Confidential
ACell
3 2 r =3 2
Number of Sites = Number of Cells /3 Intersite Distance = 1.5*r Example: r = 0.409 km Acell = 0.432 km2 Stotal = 100 km Number of Tri-secotrial sites = 100/0.432 230
207
Company Confidential
208
Company Confidential
6 sectored site utilizing narrowbeam antennas ~ 2 dB better antenna gain than in 3 sectored site Nokia Smart Radio Concept, SRC 4-branch uplink diversity
209
Company Confidential
210
Company Confidential
RX RX RX
+ TX
100 200 300 400 500 600 700 800 900 1000110012001300 Load per sector [kbps]
212
Company Confidential
213
214
3-sector (SRC)
215
Company Confidential
Capacity Optimisation The impact of MHA, SRC & 6 -sector site 3G Radio Network Planning case study
Assumptions: The geographic area under study is defined by the suburban area of London The site's location was given, antennas directions are the same as the DCS network. Two antenna type has been used, 60 and 90 degrees horizontal opening 1800MHz measurements provided. Assumption that narrow band 1800MHz propagation is representative of wideband 2GHz propagation 15dB of building penetration loss included in the link budget for Indoor Coverage. Multiple simulation runs. MS positions and slow fading changed for each run
217
Company Confidential
218
Company Confidential
Parameter Assumptions
Parameter Max. transmit power Max. power per link Min. transmit power per link CPICH power Common channel power Cable/connector loss Soft handover window RF carriers available Slow fading standard dev. Maximum uplink load Value 43dBm not limited not limited 30dBm 30dBm 3dB 5dB 1 8dB 50%
219
Company Confidential
Antenna Configuration
1G and 2G antenna list 60 antenna x 56 85 antenna x 97 3G antenna list 60 antenna x 56 90 antenna x 97
741415
Company Confidential
CS72138
220
Traffic Modeling
Priority placed on modeling traffic services separately 12.2kbps speech 64kbps data 144kbps data Symetric data services
Service 64 kbps data 21 dBm -50 dBm 1.5 m 0 dBi 0 dB 64 kbps 64 kbps 1 1 3 km/hr
Uniform distribution of mobile terminals System loaded to maximum capability fixed uplink load limit fixed BTS power capability Link level simulations used to define Eb/No requirements, SHO Gain
Parameter Max. transmit power Min. transmit power Antenna height Antenna gain Body loss Uplink bit rate Downlink bit rate Uplink activity factor Downlink activity factor Mobile speed
12.2 kbps voice 21 dBm -50 dBm 1.5 m 0 dBi 3 dB 12.2 kbps 12.2 kbps 0.67 0.67 50 km/hr
144 kbps data 21 dBm -50 dBm 1.5 m 2 dBi 0 dB 144 kbps 144 kbps 1 1 3 km/hr
MS Numbers
Distrib. Supp. 12.2kbps speech 15000 ~5400 64kbps data 144kbps data 5000 1500 ~1100 ~500
221
Company Confidential
Benchmark Results
MHA, SRC, 6 Sector not included Only coverage and capacity presented here
Service 12.2kbps Speech 64kbps Data 144kbps Data Envir. Outdoor Indoor Outdoor Indoor Outdoor Indoor
Uplink limited
Capacities network per cell 5074 33.2 5336 34.9 966 6.3 1100 7.2 470 3.1 501 3.3
Uplink limited
Number of Cells
Depends upon polygon
Envir. Outdoor Indoor Service of the Probe Mobile Speech 64kbps Data 144bps Data Speech 64kbps Data 144bps Data Mean 99.83 98.54 96.74 88.05 70.05 59.71
12
222
Company Confidential
Percentage of Cells
100
Impact of MHA
MHA introduced at all sites Improves uplink power budget Improved Example indoor speech: 88 93% indoor 64kbps data: 70 79% indoor 144kbps data: 60 71%
Improved indoor speech: 88 92% indoor 64kbps data: 70 77% indoor 144kbps data: 60 68% Remains uplink limited
225
Company Confidential
Impact of 6 Sectors
2 scenarios 6 Sector introduced at all sites 6 Sector introduced at TACS sites only 33 beam width antennas Doubled Example, outdoor speech, 2500 5100 users 64kbps data, 440 950 users 144kbps data, 230 450 users Improved Example, indoor speech: 85 93% indoor 64kbps data: 65 80 % indoor 144kbps data: 50 70 % Not true in this case due to antenna pattern selected: reduced SHO and inter-cell interference
226
increased gain Usual message for 6S: capacity improves by less than a factor of 2 due to increased SHO & inter-cell interference
Company Confidential
227
Company Confidential
GSM 900 / GSM 1800 shared antenna lines by diplexers/triplexers GSM 900 / GSM 1800/WCDMA multi band antennas
228
Company Confidential
Shared antennas
WCDMA MHA
WCDMA MHA
Dual Band GSM 900 / WCDMA Dual Band GSM 1800/WCDMA Triple Band 900/1800/WCDMA
Triplexer supports MHA in one GSM 900 branch BTS Additional MHAs to be equipped with direct DC feed
229
Company Confidential
Space diversity Space diversity improves performance improves performance 0.5..1.0 dB compared 0.5..1.0 dB compared to single radome. to single radome. The gain of 2.5 dB The gain of 2.5 dB assumes single radome. assumes single radome.
150 mm
1300 mm
300 mm
230
DPX
Triplexer
Power
GSM BTS
WCDMA
BTS
TPX DPX
231
Company Confidential
232
Company Confidential
233
Company Confidential
234
Company Confidential
Spurious emissions
ITU-R definition of Spurious Emission (ITU-R: 329-7_ww7.doc): Spurious Emission: Emission on a frequency or frequencies which are outside the necessary bandwidth and the level of which may be reduced without affecting the corresponding transmissions of information. Spurious emissions include harmonic emissions, parasitic emissions, intermodulation products and frequency conversion products, but exclude out-of-band emissions. Normally the intermodulation distortion (IMD) is handled separately due to its importance. Spurious signals can be coupled by radiation conduction combination of radiation and conduction
236
Company Confidential
Nonlinear system
Nonlinear system transfer function can be expressed as a series expansion
System
In the case of one input frequency, vin = cos 1t, output will consist of harmonics, m1 Fundamental (m = 1) frequency is the desired one. If m > 1, there are higher order harmonics in output => harmonic distortion. Can be generated both inside an offender or a victim system. In the case of two input frequencies, vin = cos 1t + cos 2t , output will consist of harmonics m1 + n2, where n and m are positive or negative integers. Intermodulation is a process generating an output signal containing frequency components not present in the input signal and it is called intermodulation distortion (IMD). Most harmful are 3rd order (|m| + |n| = 3) products. Can be generated both inside an offender or a victim system.
237
Company Confidential
Nonlinear components
Nonlinearities of active components like amplifiers under normal operation. Nonlinearities of passive components Antennas Feeders Connectors Antenna mismatching Reflected wave can cause IMD in the power amplifier. Damaged feeders => mismatching Loose connectors => mismatching, reflections and rectification.
238
Company Confidential
240
Company Confidential
Harmonic distortion
Harmonic distortion can be a problem in the case of co-siting of GSM900 and WCDMA. GSM900 DL frequencies are 935 - 960 MHz and second harmonics may fall into the WCDMA TDD band and into the lower end of the FDD band. 2nd harmonics fGSM = 950 - 960 MHz
...
WCDMA WCDMA FDD TDD 1920 - 1980
241
Company Confidential
fIM3 = 2f2 - f1
f1
f2 X dBc fIM3
GSM1800 UL
GSM1800 DL
WCDMA UL
WCDMA DL
242
1710 - 1785 MHz 1805 - 1880 MHz MHz1920 - 1980 MHz 2110 - 2170 MHz 40
Company Confidential
RF Specifications
GSM 05.05-8.7.1, WCDMA TS 25.104-3.5.0 Two main reasons to isolate GSM and WCDMA Blocking Sensitivity
Transmitter GSM spurious GSM main UMTS spurious UMTS main Frequency Level Parameter affected [MHz] [dBm] / [MHz] 1920 1980 UMTS BTS 96 / 0.1 (FDD UL) sensitivity -80 / 4.0 +40 / 0.2 UMTS BTS 1805 Typical blocking 1880 GSM BTS 1710 98 / 0.1 sensitivity 1785 95 / 0.2 2110 2170 +43 / 4.0 GSM BTS (FDD DL) Typical blocking Required Required [dBm] / MHz isolation [dB] 28 < 108 / 4.0 (Noise floor) 55 < 15 / CW (Specifications) 15 < 110 / 0.2 (Typical) 0 43 (Specifications)
244
Company Confidential
Means to achieve the required isolation RF-methods Tighter filtering of the GSM BTS TX signal Proper frequency planning in GSM Di- or triplexer in case of feeder and antenna sharing between different systems By proper antenna selection and placing Baseband methods Interference cancellation receivers If the interferer is known its effect can be removed easily Combined RF and baseband methods
245
Company Confidential
df =
2D 2
, and d f , D >>
where D is the largest dimension of an antenna, is wavelength and df is the distance from antenna. The far field assumption is not valid => measurements needed. For a typical GSM1800 antenna dimensions (D 1 m) df 13 m. Let's assume coupling loss of 65 dB from the near field to the far field => Extra 10 dB means therefore about 30 m distance by deploying a free space model from d0 = 10 m.
246
Company Confidential
Dual. Pol
120
d
I (90)
1TSG-RAN
II (120)
III (180)
IV (Horizontal)
V (Vertical)
247
Working Group 4 (Radio) Meeting #8 TSGR4#8(99)631 Sophia Antipolis, France 26-29 October 1999 Company Confidential Source: Allgon
d [mm] / Min is olation [dB] 250 / 50 250 / 46 250 / 54 200 / 46 200 / 49 S ame mast / 49 S ame mast / 38 S ame mast / 53 S ame mast / 38 S ame mast / 43
d [mm] / Max is olation [dB] 850 / 63 975 / 59 950 / 62 1250 / 59 1000 / 58 1050 / 66 1100 / 66 1150 / 68 1100 / 65 1050 / 63
248
I (90)
II
d 120
A B C D, C o-polar
II (120)
D, C ross-polar
Company Confidential
Antenna
A B C D, Co-polar
III (180)
d
IV (Horizontal)
D, Cross-polar 250 / 36
Company Confidential
d [mm] / Min d [mm] / Max is olation [dB] 2250 / 50 2250 / 55 2250 / 61 1500 / 42 1500 / 44 is olation [dB] 6000 / 70 5500 / 69 6000 / 66 6000 / 61 5500 / 65
V (Vertical)
250
Company Confidential
Horizontal, vertical and combined displacement configurations measured. Rooftop, face and tower mounted measurements. Both co- and cross-polar feed used.
251
Company Confidential
output
input
Antenna A (fixed)
Antenna B
252
Company Confidential
Side View
direction of radiation
1000mm
2000mm
400mm 650mm
253
Company Confidential
Isolation (dB)
00 0.
1.
00
2.
00
3.
00
4.
00
00 5.
6.
00
7.
00
8.
00
9.
00
1.
..
Distance (m)
254
Company Confidential
65.00 60.00
Isolation (dB)
9. 00 10 .0 0
2. 00
3. 00
6. 00
0. 00
1. 00
4. 00
5. 00
7. 00
8. 00
255
Company Confidential
Distance (m)
256
Company Confidential
Front View
1m
5m
Antenna B UMTS
Side View
direction of radiation
1000mm
2000mm
300mm
400mm
650mm
direction of radiation
257
Company Confidential
1950MHz
80.00
1980MHz
75.00
70.00 0.00
1.00
2.00
3.00
4.00
5.00
258
Company Confidential
Antenna B UMTS
10m
259
Company Confidential
Isolation (dB)
0. 50
0. 25
0. 7
0. 0
Distance (m)
260
Company Confidential
1. 0
1. 25
1. 50
261
Company Confidential
262
Company Confidential
263
Company Confidential
264
Company Confidential
265
Company Confidential
266
Company Confidential
267
Company Confidential
268
Company Confidential
269
Company Confidential
270
Company Confidential
271
Company Confidential
272
Company Confidential
273
Company Confidential
274
Company Confidential
275
Company Confidential
276
Company Confidential
277
Company Confidential
278
Company Confidential
279
Company Confidential
280
Company Confidential
281
Company Confidential
282
Company Confidential
Optimization-Overview
283
Company Confidential
Optimization-Overview Block A
284
Company Confidential
Optimization-Overview Block A
285
Company Confidential
Optimization-Overview Block B
286
Company Confidential
Optimization-Overview Block C
287
Company Confidential
289
Company Confidential
WCDMA RAN
Configuration
KPIs, measurements
me as
ur e me nt
air-interface
RAN Optimisation
pre-defined procedures semi / full automated
No Start
Yes
No
Field Tool
290
Company Confidential
End
connection to NMS
Field Tool Server
3G Network Optimization
3G Network optimization is divided into 1. Pre-launch optimization (without traffic, No OSS KPIs) 2. Continuous optimization (with traffic, KPIs used) 3G Network optimization could be split into A. Cluster Optimization:
Area
Cluster
B.
Area optimization:
Mainly concentrates on the detail network optimization for each individual sub-cluster area Cluster optimization work start when all the sites in the Sub-cluster have been implemented and integrated into the Network 10-12 cells form one cluster takes broader approach by focusing the network performance over the whole area Will begin after a number of clusters have finished implemented & optimised
Company Confidential
292
293
Company Confidential
Cluster Preparation
Cluster Identification Site locations, major roads, RNC borders, other geographical aspects, e.g. rivers Interference analysis to minimise the amount of external interference to a cluster from neighbouring clusters MapInfo plot illustrating sites within cluster, cluster borders etc. Site information spreadsheet (cluster id, priority etc.) Site Integration percentage criteria check Drive route planning A good percentage of main roads, motorways Different clutter types, where applicable Areas of special interest, e.g. airport routes, corporate routes Drive test equipment check Site Verification (crossed feeders etc.)
294
Company Confidential
Cluster Preparation
Collection of Cluster data Dominance plot CPICH coverage plot Best server Ec/Io plot RSCP plot SHO plot Configuration data (scrambling codes, tilts & bearing, data build) Network health check Identifying faulty Sites with Cell availability check Alarm check Neighbour list check (Planner vs. configuration management) Parameter consistency check (configuration management) RNW parameter check 295 Transmission parameter check
Company Confidential
Cluster Tuning
RF optimisation (physical change of antenna tilt, azimuth, type and height) based on scanner data Target exit criteria for RF optimisation is based on CPICH RSCP (Ec) per each SC Best Server CPICH Ec/Io Pilot Pollution (high RSCP vs. low EcNo) SHO overhead (active set count) Neighbour list (scrambling code) verification based on scanner data incl. GSM/EDGE neighbours Call Performance KPI Verification with logging tool AMR call setup success rate (CSSR) AMR call drop rate (DCR) Call setup time (CST)
296
Company Confidential
Cluster Optimisation
Maximise call performance KPIs by Analysis of Drive test data Analysis PM data (counters and KPIs) Investigation of bad quality lack of coverage external interference wrong or missing neighbours Additionally Golden cluster can be used for solving UE-specific problems (hanging on the cell, poor cell reselection, poor power control) UE-NW incompatibilities Troubleshooting (call tracing)
297
Company Confidential
Network Verification
Used to accept the network performance based on drive tests along reference routes in the area of multiple clusters KPIs are measured in areas of acceptable coverage is achieved
298
Company Confidential
299
Company Confidential
300
Company Confidential
Dominance Verification
301
Company Confidential
RSCP Verification
302
Company Confidential
EcIo Verification
303
Company Confidential
304
Company Confidential
UL Coverage Verification
305
Company Confidential
Throughput Verification
306
Company Confidential
A
1. 2. 3. 4. 5. Etc. No
No
Possible Actions/Solutions Antenna Tilting Antenna Panning Change Antenna Type Change Antenna Height Change CPICH Tx Pwr
Low CPICH Ec A
Yes
Yes No
Bad Ec/Io A
Company Confidential
No A
307
308
Company Confidential
309
Company Confidential
310
Company Confidential
311
Company Confidential
312
Company Confidential
313
Company Confidential
314
Company Confidential
AC
Network based functions
PC HC
HC HO Control
315
Company Confidential
Open Loop Power Control (Initial Access) Closed Loop Power Control Outer Loop Power Control
318
Company Confidential
320
Company Confidential
322
Company Confidential
Ithreshol
d
Itotal_old
I =?
Company Confidential
load
323
Load
Prx_target defines the optimal operating point of the cell interference power, up to which the AC of the RNC can operate.
Company Confidential
324
Load
Downlink power increase estimation is done for non-controllable load just like UL power increase.
325
Company Confidential
Admission Decisions
326
Company Confidential
Admission Decisions
327
Company Confidential
Admission Decisions
328
Company Confidential
Packet Scheduler
Packet scheduler is a general feature, which takes care of scheduling radio resources for NRT radio access bearers for both uplink and downlink. The packet access procedure in WCDMA should keep the interference caused to other users as small as possible. Packet access is implemented for both dedicated (DCH) and common control transport channels (RACH/FACH). There are three scenarios for WCDMA packet access: infrequent transmission of short packets, frequent transmission of short packets (RACH/FACH)
transmission of long packets (DCH) Packet scheduler makes the decision of the used channel type for downlink direction. For uplink direction the decision of the used channel type is made by UE
329
Company Confidential
non-controllable load
time
Company Confidential
330
331
Company Confidential
332
Company Confidential
333
Controllable traffic =
334
Company Confidential
AC
LC
NRT load
PS
335
Company Confidential
Handover Control
336
Company Confidential
Softer Handover
Sector/Antenna RAKE combining (MRC) Handover between cells within a BS softer handover is handled by BS internally softer handover probability about 5 - 15 % no extra transmissions across Iub basically same RAKE MRC processing as for multipath/antenna diversity (BS / MS). More RAKE fingers needed. provides additional diversity gain softer handover does create additional interference and needs BS PA resources
338
Company Confidential
RNC
Soft handover
Handover between cells from different BS's Soft handover probability about 20 - 50 % Required to avoid near/far effects Extra transmission across Iub, more channel cards are needed RNC CN
frame selection / duplication
info
Except for the TPC symbol exactly the same information (symbols) sent over air. Differential delay in order of fraction of symbol duration
DL/MS: Maximal ratio combining fra m e UL/RNC: Frame selection combining re lia Soft handover does create additional bi lit yi interference in downlink and needs BS nf o power amplifier resources DL Power drifting in soft HO BSs a problem due to independent errors in uplink commands
Company Confidential
339
340
Company Confidential
341
Company Confidential
342
Company Confidential
343
Company Confidential
344
Company Confidential
345
Company Confidential
346
Company Confidential
347
Company Confidential
348
Company Confidential
349
Company Confidential
350
Company Confidential
Service Control
351
Company Confidential
Resource Manager
The main function of RM is to allocate logical radio resources of BS according to the channel request by the RRC layer for each radio connection The RM is located in the RNC and it works in close co-operation with the AC and the PS The actual input for resource allocation comes from the AC /PS and RM informs the PS about the resource situation The RM is able to switch codes and code types for different reasons such as soft handover and defragmentation of code tree. Manages the BS logical resources BS reports the available logical HW resources Maintains the code tree, Allocates the DL channelization codes, UL scrambling code, UL channelization code type Allocates UTRAN Registration Area(URA) specific Radio Network Temporary Identifier(RNTI) allocated for each connection and reallocated 352 when updating URA
Company Confidential
widespread data
353