Slide title In CAPITALS 50 pt Slide subtitle 32 pt WCDMA Theory Dallas – 04 May 2006

Slides:



Advertisements
Similar presentations
College of Engineering Capacity Allocation in Multi-cell UMTS Networks for Different Spreading Factors with Perfect and Imperfect Power Control Robert.
Advertisements

ECE 5221 Personal Communication Systems Prepared by: Dr. Ivica Kostanic Lecture 24 – Basics of 3G – UMTS (3) Spring 2011.
1. 2 WP-CDMA Distinguishing Features 1. Uplink Common Packet Channel (All Rates)  Common Packet Channel will transport all data rates up to and including.
Tutorial 6 Mobile Communication Networks Mohamed Esam.
Layer 3 Messaging and Call Procedures
Final Year Project Presentation FYP 08 Arsalan Tariq Mir Saad Najeeb Syed Ammar Faheem.
© NOKIAProduced as informative material for 3GPP RAN WG1 meeting No. 2 Downlink Shared Channel - DSCH DSCH associated with a dedicated channel (DCH) Downlink.
LTE-A Carrier Aggregation
Multiple Access Techniques for wireless communication
Telecommunications and Multimedia Unit UTRA TDD Overview Agostinho Castro Rui Sarmento Castro
WCDMA Physical Layer Design
WCDMA Design using Simulink
Florida Institute of technologies ECE 5221 Personal Communication Systems Prepared by: Dr. Ivica Kostanic Lecture 23 – Basics of 3G - UMTS Spring 2011.
W-CDMA AIR INTERFACE FOR 3G SYSTEMS By Medapati, Sai Raghavendra Reddy Gadige, Raghunath.
1 S Post–graduated Course in Radio Communication, H. Yin Handover Control in CDMA Radio Networks Hongying Yin Feb. 11 th 2003 Helsinki University.
Channel Switching Capability Impacting features Channel Switching
Block error(BLER) target
1 HSDPA Overview By: Syed Asif Hussain Shah Mohammad Reza Akhavan 10th March, 2005 Networking Project.
Overview.  UMTS (Universal Mobile Telecommunication System) the third generation mobile communication systems.
3G CDMA - WCDMA and cdma2000 Rodger E. Ziemer IEEE Communications Society Distinguished Lecturer Program.
II. Medium Access & Cellular Standards. TDMA/FDMA/CDMA.
ECE 5221 Personal Communication Systems Prepared by: Dr. Ivica Kostanic Lecture 24 – Basics of 3G – UMTS (4) Spring 2011.
Cellular Communications UMTS/3G. Evolution : From 2G to 3G 2  Fully specified and world-widely valid, Major interfaces should be standardized and.
Modeling and Dimensioning of Mobile Networks: from GSM to LTE
Interview and drive test tips
WCDMA Physical Layer Procedures
UMTS protocols Different protocol stacks for user and control plane  User plane (for transport of user data): Circuit switched domain: data within ”bit.
4/ EN/LZU Rev A WCDMA Air Interface Part 4: 1 of 65 WCDMA Air Interface Training Part 4 WCDMA Physical Layer.
3/ EN/LZU Rev A WCDMA Air Interface Part 3: 1 of 22 WCDMA Air Interface Training Part 3 CDMA Capacity Considerations.
August 21, Mobile Computing COE 446 IS-95 Tarek Sheltami KFUPM CCSE COE Principles of Wireless Networks.
PHYSICAL LAYER. 6.2 Transport Channels and their Mapping to the Physical Channels.
Slide title In CAPITALS 50 pt Slide subtitle 32 pt ESPA in WCDMA.
Slide title In CAPITALS 50 pt Slide subtitle 32 pt Using TEMS Investigation.
CDMA Key Technology ZTE Corporation CDMA Division.
網路多媒體研究所 1 WCDMA Technology Past, Present and Future Part III: WCDMA Mobile Communication System.
W-CDMA and RNC. W-CDMA stands for Wideband Code Division Multiple Access. It is based on IMT-2000 specification and this specification is developed by.
Idle Mode and Common Channel Behavior
Slide title In CAPITALS 50 pt Slide subtitle 32 pt H igh S peed D ownlink P acket A ccess Naren Mohan
Slide title In CAPITALS 50 pt Slide subtitle 32 pt HANDOVER Overview.
30 Sidevõrgud IRT 4060/ IRT 0020 vooruloeng 4 / 6. okt 2004 Avo Ots telekommunikatsiooni õppetool, TTÜ raadio- ja sidetehnika inst.
1© Nokia Siemens NetworksSeminaariesitelmä / Jukka Valtanen / Transport Formats in UMTS Radio Network Controller’s Software Implementation Seminaariesitelmä.
Cellular Networks and Mobile Computing COMS , Spring 2012
Spread spectrum systems II: WCDMA
QUALCOMM PROPRIETARY QUALCOMM Corporate R & D1 Performance of VoIP Services over 3GPP WCDMA Networks Ozcan Ozturk Qualcomm.
Slide title In CAPITALS 50 pt Slide subtitle 32 pt POWER CONTROL UMTS Seminar.
WIDEBAND CODE DIVISION MULTIPLE ACCESS & THE CAPACITY IN CODE DIVISION MULTIPLE ACCESS Presented by Maheshwarnath Behary Assisted by Vishwanee Raghoonundun.
WCDMA Technology Past, Present and Future
Slide title In CAPITALS 50 pt Slide subtitle 32 pt Dynamic and Persistent Scheduling for Voice over IP Traffic in the Long-Term Evolution Uplink Master’s.
UMTS AIR CHANNEL TYPES There are 3 types of channels across air interface Physical channel: carries data between physical layers of UE and NodeB Transport.
Packet service in UMTS: delay- throughput performance of the downlink shared channel Flaminio Borgonovo, Antonio Capone, Matteo Cesana, Luigi Fratta.
Top right corner for field-mark, customer or partner logotypes. See Best practice for example. Slide title 40 pt Slide subtitle 24 pt Text 24 pt Bullets.
IEEE Communications Magazine February 2006 Stefan Parkvall, Eva Englund, Magnus Lundevall, and Johan Torsner, Ericsson Research 2015/12/31.
TCS 316 High Speed Information Networks UMTS Handover by Nasir Faruk Mobile Week 13 May, /04/ :14:46.
CDMA Reception Issues Unequal received power levels degrade SSMA performance Near-Far Ratio, terrain, RF obstacles, “Turn-the-Corner” effects, ... Multipath.
1 Harmonization Meeting on 3GPP HSDPA and 3GPP2 1xEV-DV Work New-Jersey Nov 2001 HSDPA presentation 3GPP TSG RAN WG2 Chairman, Nortel Networks 3GPP.
6/ EN/LZU Rev A WCDMA Air Interface Part 6: 1 of 17 WCDMA Air Interface Training Part 6 WCDMA TDD Mode.
1. 2 WP-CDMA Distinguishing Features 1.Uplink Common Packet Channel (All Rates) Common Packet Channel will transport all data rates up to and including.
Slide title In CAPITALS 50 pt Slide subtitle 32 pt Capacity Management in WCDMA.
Long Term Evolution Protocols
1 Wireless Networks Lecture 21 WCDMA (Part I) Dr. Ghalib A. Shah.
1 Wireless Networks Lecture 19 cdmaOne/IS-95 Dr. Ghalib A. Shah.
Outline  Introduction (Resource Management and Utilization).  Compression and Multiplexing (Other related definitions).  The Most Important Access Utilization.
Signaling Flow of WCDMA Advanced Radio Interfaces ZTE University.
Korean Intellectual Property Office – ICU seminar Ha, Jeongseok March 7, 2007 School of Engineering, Information and Communications University Wideband-CDMA.
Multiple Access Problem: When two or more nodes transmit at the same time, their frames will collide and the link bandwidth is wasted during collision.
Coding Methods in CDMA.
UTRA Physical Layer November 18 Raul Bruzzone.
Lecture 22 WCDMA (Part II) Dr. Ghalib A. Shah
Lecture 23 WCDMA (Part III) Dr. Ghalib A. Shah
Presentation transcript:

Slide title In CAPITALS 50 pt Slide subtitle 32 pt WCDMA Theory Dallas – 04 May 2006

Top right corner for field-mark, customer or partner logotypes. See Best practice for example. Slide title 40 pt Slide subtitle 24 pt Text 24 pt Bullets level pt Ericsson Confidential Agenda  UTRAN architecture  Multiple access techniques (DS-CDMA)  Spreading codes (Channelisation and Scrambling)  Fast link adaptation (Power and Rate control)  Soft Handover  Capacity limitation and cell breathing  Rake receiver  UE states  Services (Bearers)  Channels in WCDMA (logical, transport, physical)

Top right corner for field-mark, customer or partner logotypes. See Best practice for example. Slide title 40 pt Slide subtitle 24 pt Text 24 pt Bullets level pt Ericsson Confidential UTRAN Architecture OSS

Top right corner for field-mark, customer or partner logotypes. See Best practice for example. Slide title 40 pt Slide subtitle 24 pt Text 24 pt Bullets level pt Ericsson Confidential Agenda  UTRAN architecture  Multiple access techniques (DS-CDMA)  Spreading codes (Channelisation and Scrambling)  Fast link adaptation (Power and Rate control)  Soft Handover  Capacity limitation and cell breathing  Rake receiver  UE states  Services (Bearers)  Channels in WCDMA (logical, transport, physical)

Top right corner for field-mark, customer or partner logotypes. See Best practice for example. Slide title 40 pt Slide subtitle 24 pt Text 24 pt Bullets level pt Ericsson Confidential Multiple access techniques

Top right corner for field-mark, customer or partner logotypes. See Best practice for example. Slide title 40 pt Slide subtitle 24 pt Text 24 pt Bullets level pt Ericsson Confidential Separate users through different codes Large bandwidth Continuous transmission and reception f Code t MS 1 MS 2 MS 3 5 MHz WCDMA (5 MHz) IS-95 (1.25 MHz) CDMA2000 (1.25, 3.75 MHz) Direct Sequence - Code Division Multiple Access (DS-CDMA)

Top right corner for field-mark, customer or partner logotypes. See Best practice for example. Slide title 40 pt Slide subtitle 24 pt Text 24 pt Bullets level pt Ericsson Confidential Agenda  UTRAN architecture  Multiple access techniques (DS-CDMA)  Spreading codes (Channelisation and Scrambling)  Fast link adaptation (Power and Rate control)  Soft Handover  Capacity limitation and cell breathing  Rake receiver  UE states  Services (Bearers)  Channels in WCDMA (logical, transport, physical)

Top right corner for field-mark, customer or partner logotypes. See Best practice for example. Slide title 40 pt Slide subtitle 24 pt Text 24 pt Bullets level pt Ericsson Confidential Spreading principle User information bits are spread into a number of chips by multiplying them with a spreading code The chip rate for the system is 3.84 Mchip/s and the signal is spread in 5 MHz The Spreading Factor (SF) is the ratio between the chip rate and the symbol rate The same code is used for de/spreading the information after it is sent over the air interface Information signal Spreading signal Transmission signal

Top right corner for field-mark, customer or partner logotypes. See Best practice for example. Slide title 40 pt Slide subtitle 24 pt Text 24 pt Bullets level pt Ericsson Confidential Despreading User data Spreading code Chip sequence Spreading Case Case 2 Spreading principle

Top right corner for field-mark, customer or partner logotypes. See Best practice for example. Slide title 40 pt Slide subtitle 24 pt Text 24 pt Bullets level pt Ericsson Confidential Channelization Codes CC1, CC2 CC3, CC4 CC5, CC6, CC7 CC1, CC2, CC3 CC1, CC2 CC1, CC2, CC3, CC4 In the Uplink Channelization Codes are used to distinguish between data (and control) channels from the same UE In the Downlink Channelization Codes are used to distinguish between data (and control) channels coming from the same RBS

Top right corner for field-mark, customer or partner logotypes. See Best practice for example. Slide title 40 pt Slide subtitle 24 pt Text 24 pt Bullets level pt Ericsson Confidential Channelization Codes have different length depending on the bit rate A physical channel may use a certain code in the tree if no other physical channel uses a code from an underlying branch. Channelization Codes

Top right corner for field-mark, customer or partner logotypes. See Best practice for example. Slide title 40 pt Slide subtitle 24 pt Text 24 pt Bullets level pt Ericsson Confidential The bit stream is spread into a constant chip rate of 3.84 Mchip/s Channelization Codes

Top right corner for field-mark, customer or partner logotypes. See Best practice for example. Slide title 40 pt Slide subtitle 24 pt Text 24 pt Bullets level pt Ericsson Confidential Channelization codes are orthogonal (but only if they are synchronized) Orthogonal codes have perfect (100%) separation Channelization Codes

Top right corner for field-mark, customer or partner logotypes. See Best practice for example. Slide title 40 pt Slide subtitle 24 pt Text 24 pt Bullets level pt Ericsson Confidential After the Channelization Codes, the data stream is multiplied by a special code to distinguish between different transmitters. Scrambling codes are not orthogonal so they do not need to be synchronized The separation of scrambling codes is proportional to the code length – longer codes, better separation (but not 100%) Scrambling codes are chips long Scrambling Codes

Top right corner for field-mark, customer or partner logotypes. See Best practice for example. Slide title 40 pt Slide subtitle 24 pt Text 24 pt Bullets level pt Ericsson Confidential Scrambling Codes SC3SC4SC5SC6 SC1 Cell “1” transmits using SC1 SC2 Cell “2” transmits using SC2 In the Downlink, the Scrambling Codes are used to distinguish each cell (assigned by operator – SC planning) In the Uplink, the Scrambling Codes are used to distinguish each UE (assigned by network)

Top right corner for field-mark, customer or partner logotypes. See Best practice for example. Slide title 40 pt Slide subtitle 24 pt Text 24 pt Bullets level pt Ericsson Confidential Spread Spectrum gain

Top right corner for field-mark, customer or partner logotypes. See Best practice for example. Slide title 40 pt Slide subtitle 24 pt Text 24 pt Bullets level pt Ericsson Confidential  Used to distinguish Base Station transmissions on Downlink  Each Cell is assigned one and only one Primary Scrambling Code (of 512)  Secondary Scrambling Codes may be used over part of a cell, or for other data channels Primary SC 0 Secondary Scrambling Codes (15) Secondary Scrambling Codes (15) Secondary Scrambling Codes (15) Secondary Scrambling Codes (15) Code Group #1Code Group # Downlink Scrambling Codes Each code is 38,400 chips of a (262,143 chip) Gold Sequence Primary SC 7 Primary SC 504 Primary SC 511 Downlink Scrambling Codes

Top right corner for field-mark, customer or partner logotypes. See Best practice for example. Slide title 40 pt Slide subtitle 24 pt Text 24 pt Bullets level pt Ericsson Confidential Scrambling Code planning 64 Code Groups  SC are organized in Code Groups.  The first SC in each Code Group differs from the first SC in the subsequent Code Group by a multiple of 8

Top right corner for field-mark, customer or partner logotypes. See Best practice for example. Slide title 40 pt Slide subtitle 24 pt Text 24 pt Bullets level pt Ericsson Confidential Scrambling Code planning example SC 0 SC 16 SC 40 SC 32 SC 56 SC 24 SC 1 SC 17 SC 41 SC 33 SC 64 SC 8 SC 48 SC 9SC 25 SC 57 SC 65 SC 49

Top right corner for field-mark, customer or partner logotypes. See Best practice for example. Slide title 40 pt Slide subtitle 24 pt Text 24 pt Bullets level pt Ericsson Confidential Uplink Scrambling Code Random Access, Packet Access Cell-specific Scrambling Code(s) Code(s) are assigned by UTRAN Code(s) are conveyed to UE via the BCH or FACH 8,192 PRACH codes 32,768 PCPCH codes Code allocation corresponds to the cell’s DL scrambling code group Dedicated Traffic Connection UE-specific Scrambling Code(s) Code(s) are assigned by UTRAN Code(s) are conveyed to UE via the FACH 2 24 possible codes Uplink Scrambling Code Type depends on the Application

Top right corner for field-mark, customer or partner logotypes. See Best practice for example. Slide title 40 pt Slide subtitle 24 pt Text 24 pt Bullets level pt Ericsson Confidential Channelization and Scrambling Codes 2 data channels (voice, control) SC3 + CC1 + CC2 2 data channels (14 kbps data, control) SC4 + CC1 + CC2 3 data channels (voice, video, control) SC2 + CC1 + CC2 + CC3 3 data channels (voice, video, control) SC5 + CC1 + CC2 + CC3 4 data channels (384 kbps data, voice, video, control) SC6 + CC1 + CC2 + CC3 + CC4 4 data channels (384 kbps data, voice, video, control) SC2 + CC4 + CC5 + CC6 + CC7 2 data channels (voice, control) SC1 + CC1 + CC2 1 data channels (control) SC1 + CC3 Voice Conversation Uplink Packet Data Videoconference Videoconference with Data Pilot, Broadcast SC1 + CC P + CC B Pilot, Broadcast SC2 + CC P + CC B

Top right corner for field-mark, customer or partner logotypes. See Best practice for example. Slide title 40 pt Slide subtitle 24 pt Text 24 pt Bullets level pt Ericsson Confidential Agenda  UTRAN architecture  Multiple access techniques (DS-CDMA)  Spreading codes (Channelisation and Scrambling)  Fast link adaptation (Power and Rate control)  Soft Handover  Capacity limitation and cell breathing  Rake receiver  UE states  Services (Bearers)  Channels in WCDMA (logical, transport, physical)

Top right corner for field-mark, customer or partner logotypes. See Best practice for example. Slide title 40 pt Slide subtitle 24 pt Text 24 pt Bullets level pt Ericsson Confidential Fast link adaptation  Radio channel conditions varying significantly due to: –Different location –Interference level (position and transmission activity) –Multi-path fading –UE speed –...  Goal: ensure sufficient received energy per information bit for all communication links  Power control strategy (Rel.99): adjust transmitted power while keeping the data rate constant  Rate control strategy (Rel 5): adjust the data rate while keeping the transmitted power constant

Top right corner for field-mark, customer or partner logotypes. See Best practice for example. Slide title 40 pt Slide subtitle 24 pt Text 24 pt Bullets level pt Ericsson Confidential Power control  Power control is the most important element in WCDMA because many users access and use the same frequency and bandwidth at the same time  If no mechanism for the UEs to be power controlled to the same level at the RBS, the UE that is closer to the base station could easily overshoots another UE at the cell border and block a large part of the cell (near-far problem)  The signals received by the RBS serving different UEs should be the same independently from their location (pathloss condition)  Three types of power control: –Open loop: used for initial power setting of the UE at the beginning of the connection –Inner loop: used in connected mode (Rel 99) to ensure that the UE transmits just enough to be received to avoid unnecessary interference to other users. It compensates for fast fading –Outer loop: used in connected mode (Rel 99) to keep the quality of communication at the required level

Top right corner for field-mark, customer or partner logotypes. See Best practice for example. Slide title 40 pt Slide subtitle 24 pt Text 24 pt Bullets level pt Ericsson Confidential Power control vs data rate adaptation Rel ’99 traffic Rel 5 traffic (HSDPA)

Top right corner for field-mark, customer or partner logotypes. See Best practice for example. Slide title 40 pt Slide subtitle 24 pt Text 24 pt Bullets level pt Ericsson Confidential Dynamic power allocation

Top right corner for field-mark, customer or partner logotypes. See Best practice for example. Slide title 40 pt Slide subtitle 24 pt Text 24 pt Bullets level pt Ericsson Confidential Agenda  UTRAN architecture  Multiple access techniques (DS-CDMA)  Spreading codes (Channelisation and Scrambling)  Fast link adaptation (Power and Rate control)  Soft Handover  Capacity limitation and cell breathing  Rake receiver  UE states  Services (Bearers)  Channels in WCDMA (logical, transport, physical)

Top right corner for field-mark, customer or partner logotypes. See Best practice for example. Slide title 40 pt Slide subtitle 24 pt Text 24 pt Bullets level pt Ericsson Confidential Soft Handover Soft/softer handover is important for efficient power control. Without soft/softer handover there would be near-far scenarios of a UE penetrating from one cell deeply into an adjacent cell without being power controlled by the latter. Soft Handover: UE connected to two or more RBSs at the same time Softer Handover: UE connected to two or more sector of the same RBS

Top right corner for field-mark, customer or partner logotypes. See Best practice for example. Slide title 40 pt Slide subtitle 24 pt Text 24 pt Bullets level pt Ericsson Confidential Soft Handover Uplink Power is based on information (TPC bits) from both RBSs to which the UE is connected. The UE will decrease its output power in all cases except when both RBSs send increase power commands. Downlink Power control for both RBSs is based on one signal (TPC bits) from the UE (it does not distinguish between RBSs and the decision is base on the combined output from the RAKE receiver UL Power control DL Power control

Top right corner for field-mark, customer or partner logotypes. See Best practice for example. Slide title 40 pt Slide subtitle 24 pt Text 24 pt Bullets level pt Ericsson Confidential Soft Handover

Top right corner for field-mark, customer or partner logotypes. See Best practice for example. Slide title 40 pt Slide subtitle 24 pt Text 24 pt Bullets level pt Ericsson Confidential Agenda  UTRAN architecture  Multiple access techniques (DS-CDMA)  Spreading codes (Channelisation and Scrambling)  Fast link adaptation (Power and Rate control)  Soft Handover  Capacity limitation and cell breathing  Rake receiver  UE states  Services (Bearers)  Channels in WCDMA (logical, transport, physical)

Top right corner for field-mark, customer or partner logotypes. See Best practice for example. Slide title 40 pt Slide subtitle 24 pt Text 24 pt Bullets level pt Ericsson Confidential UL/DL capacity limitation  Scenario 1: Capacity limitation due to UL interference –The cell can’t serve UE1 because the increase in UL interference by adding the new user would be too high, resulting in a high risk of drops  Scenario 2: Capacity limitation due to DL power –The cell can’t serve UE2 because it’s using all its available power to maintain the connections to the other UEs UE 1 UE 2 Scenario 1 Scenario 2

Top right corner for field-mark, customer or partner logotypes. See Best practice for example. Slide title 40 pt Slide subtitle 24 pt Text 24 pt Bullets level pt Ericsson Confidential RBS 1RBS 2 Fully loaded system Unloaded system Cell breathing The more traffic, the more interference and the shorter the distance must be between the RBS and the UE The traffic load changes in the system causes the cells to grow and shrink with time

Top right corner for field-mark, customer or partner logotypes. See Best practice for example. Slide title 40 pt Slide subtitle 24 pt Text 24 pt Bullets level pt Ericsson Confidential Agenda  UTRAN architecture  Multiple access techniques (DS-CDMA)  Spreading codes (Channelisation and Scrambling)  Fast link adaptation (Power and Rate control)  Soft Handover  Capacity limitation and cell breathing  Rake receiver  UE states  Services (Bearers)  Channels in WCDMA (logical, transport, physical)

Top right corner for field-mark, customer or partner logotypes. See Best practice for example. Slide title 40 pt Slide subtitle 24 pt Text 24 pt Bullets level pt Ericsson Confidential Multipath Propagation   Time Dispersion  1  0  2  3  Maximum ratio combining (1/2)       Multiple paths possibly cause destructive interference between different replica of the desired signal

Top right corner for field-mark, customer or partner logotypes. See Best practice for example. Slide title 40 pt Slide subtitle 24 pt Text 24 pt Bullets level pt Ericsson Confidential Maximum ratio combining – RAKE (2/2) The RAKE receiver is used to overcome the multipath fading. Each finger tracks a different multipath component and other cells during Soft Handover A maximum ratio combining produces the output C O M B I N E R Power measurements of neighbouring RBSs Sum of individual multipath components Finger #1 Finger #2 Finger #3 Finger #N Buffer/delay Correlators Channel Searcher Finger

Top right corner for field-mark, customer or partner logotypes. See Best practice for example. Slide title 40 pt Slide subtitle 24 pt Text 24 pt Bullets level pt Ericsson Confidential Agenda  UTRAN architecture  Multiple access techniques (DS-CDMA)  Spreading codes (Channelisation and Scrambling)  Fast link adaptation (Power and Rate control)  Soft Handover  Capacity limitation and cell breathing  Rake receiver  UE states  Services (Bearers)  Channels in WCDMA (logical, transport, physical)

Top right corner for field-mark, customer or partner logotypes. See Best practice for example. Slide title 40 pt Slide subtitle 24 pt Text 24 pt Bullets level pt Ericsson Confidential UE states Establish RRC Connection Release RRC Connection UTRA RRC Connected Mode UTRA: Inter-RAT Handover GSM: Handover Establish RRC Connection Release RRC Connection GSM Connected Mode Establish RR Connection Release RR Connection Idle Mode Camping on a UTRAN cell 1 Camping on a GSM / GPRS cell 1 GPRS Packet Idle Mode 1 GPRS Packet Transfer Mode Initiation of temporary block flow Release of temporary block flow Cell reselection CELL_DCH out of service in service CELL_FACH

Top right corner for field-mark, customer or partner logotypes. See Best practice for example. Slide title 40 pt Slide subtitle 24 pt Text 24 pt Bullets level pt Ericsson Confidential Agenda  UTRAN architecture  Multiple access techniques (DS-CDMA)  Spreading codes (Channelisation and Scrambling)  Fast link adaptation (Power and Rate control)  Soft Handover  Capacity limitation and cell breathing  Rake receiver  UE states  Services (Bearers)  Channels in WCDMA (logical, transport, physical)

Top right corner for field-mark, customer or partner logotypes. See Best practice for example. Slide title 40 pt Slide subtitle 24 pt Text 24 pt Bullets level pt Ericsson Confidential UMTS bearer service

Top right corner for field-mark, customer or partner logotypes. See Best practice for example. Slide title 40 pt Slide subtitle 24 pt Text 24 pt Bullets level pt Ericsson Confidential Radio Access Bearer (RAB) A radio access bearer (RAB) connection via UTRAN is realised by two concatenated segments, the Iu bearer connection and the radio bearer connection

Top right corner for field-mark, customer or partner logotypes. See Best practice for example. Slide title 40 pt Slide subtitle 24 pt Text 24 pt Bullets level pt Ericsson Confidential RABs  CS –Speech AMR 12.2 kbps –Data (Video) 64 kbps  PS I/B (UL/DL) –64/64 kbps –64/128 kbps –64/384 kbps –128/128 kbps (P5)  HSDPA –64/HSDPA interactive –384/HSDPA interactive  Multi-RAB –Speech AMR 12.2 kbps + 64/HSDPA (P5) –Speech AMR 12.2 kbps + 384/HSDPA (P5)

Top right corner for field-mark, customer or partner logotypes. See Best practice for example. Slide title 40 pt Slide subtitle 24 pt Text 24 pt Bullets level pt Ericsson Confidential Agenda  UTRAN architecture  Multiple access techniques (DS-CDMA)  Spreading codes (Channelisation and Scrambling)  Fast link adaptation (Power and Rate control)  Soft Handover  Capacity limitation and cell breathing  Rake receiver  UE states  Services (Bearers)  Channels in WCDMA (logical, transport, physical)

Top right corner for field-mark, customer or partner logotypes. See Best practice for example. Slide title 40 pt Slide subtitle 24 pt Text 24 pt Bullets level pt Ericsson Confidential UTRAN Model  UTRAN OSI Model L2/MAC L1 L2/RLC L3/RRC UTRANUE RRC RLC MAC PHY RRC MAC PHY RLC Signaling Radio Bearer Logical Channel Transport Channel Physical Channel CTRL USER DATA USER DATA

Slide title In CAPITALS 50 pt Slide subtitle 32 pt WCDMA Downlink Rel ’99

Top right corner for field-mark, customer or partner logotypes. See Best practice for example. Slide title 40 pt Slide subtitle 24 pt Text 24 pt Bullets level pt Ericsson Confidential WCDMA Downlink (FDD) – Rel.’99 BCCH Broadcast Control Ch. PCCH Paging Control Ch. CCCH Common Control Ch. DCCH Dedicated Control Ch. DTCH Dedicated Traffic Ch. N BCH Broadcast Ch. PCH Paging Ch. FACH Forward Access Ch. DCH Dedicated Ch. P-CCPCH(*) Primary Common Control Physical Ch. S-CCPCH Secondary Common Control Physical Ch. DPDCH (one or more per UE) Dedicated Physical Data Ch. DPCCH (one per UE) Dedicated Physical Control Ch. Pilot, TPC, TFCI bits SSC i Logical Channels (Layers 3+) Transport Channels (Layer 2) Physical Channels (Layer 1) Downlink RF Out DPCH (Dedicated Physical Channel) One per UE DSCH Downlink Shared Ch. CTCH Common Traffic Ch. CPICH Common Pilot Channel Null Data Data Encoding PDSCH Physical Downlink Shared Channel AICH (Acquisition Indicator Channel) PICH (Paging Indicator Channel ) Access Indication data Paging Indication bits AP-AICH (Access Preamble Indicator Channel ) Access Preamble Indication bits CSICH (CPCH Status Indicator Channel ) CPCH Status Indication bits CD/CA-ICH (Collision Detection/Channel Assignment ) CPCH Status Indication bits S/P C ch S/P Cell-specific Scrambling Code I+jQ I/Q Modulator Q I C ch C ch 256,1 C ch 256,0  GSGS PSC GPGP  Sync Codes(*) * Note regarding P-CCPCH and SCH Sync Codes are transmitted only in bits of each timeslot; P-CCPCH transmits only during the remaining bits of each timeslot  Filter Gain SCH (Sync Channel) DTCH Dedicated Traffic Ch. 1 DCH Dedicated Ch. Data Encoding MUXMUX MUXMUX CCTrCH DCH Dedicated Ch. Data Encoding

Top right corner for field-mark, customer or partner logotypes. See Best practice for example. Slide title 40 pt Slide subtitle 24 pt Text 24 pt Bullets level pt Ericsson Confidential Downlink Logical Channels (L3)  Control Logical Channels  BCCH (Broadcast Control Channel) - Broadcasts cell site and system information to all UE  PCCH (Paging Control Channel) - Transmits paging information to a UE when the UEs location is unknown  CCCH (Common Control Channel) - Transmits control information to a UE when there is no RRC Connection  DCCH (Dedicated Control Channel) - Transmits control information to a UE when there is a RRC Connection  Traffic Logical Channels  CTCH (Common Traffic Channel) - Traffic channel for sending traffic to a group of UEs.  DTCH (Dedicated Traffic Channel) - Traffic channel dedicated to one UE

Top right corner for field-mark, customer or partner logotypes. See Best practice for example. Slide title 40 pt Slide subtitle 24 pt Text 24 pt Bullets level pt Ericsson Confidential Downlink Transport Channels (L2)  Common Transport Channels  BCH (Broadcast Channel) - Continuous transmission of system and cell information  PCH (Paging Channel) - Carries control information to UE when location is unknown - Pending activity indicated by the PICH (paging indication channel)  FACH (Forward Access Channel) - Used for transmission of idle-mode control information to a UE - Also used for some user data  Dedicated Transport Channels  DCH (Dedicated Channel) - Carries dedicated traffic and control data to one UE - Used for BLER measurements

Top right corner for field-mark, customer or partner logotypes. See Best practice for example. Slide title 40 pt Slide subtitle 24 pt Text 24 pt Bullets level pt Ericsson Confidential Downlink Physical Channels (L1)  Common Physical Channels –P-CCPCHCommon Control Physical Channel (Primary)  Broadcasts cell site information  Timing reference for all DL –SCHSynchronization Channel  Fast Synch. codes 1 and 2; time-multiplexed with P-CCPCH –S-CCPCHCommon Control Physical Channel (Secondary)  Transmits idle-mode signaling and control information to UEs –CPICHCommon Pilot Channel  Dedicated Physical Channels –DPDCHDedicated Downlink Physical Data Channel –DPCCHDedicated Downlink Physical Control Channel  Transmits connection-mode signaling and control to UEs

Top right corner for field-mark, customer or partner logotypes. See Best practice for example. Slide title 40 pt Slide subtitle 24 pt Text 24 pt Bullets level pt Ericsson Confidential Downlink Physical Channels…  Indicator Physical Channels –AICH (Acquisition Indicator Channel)  Acknowledges that BS has acquired a UE Random Access attempt  (Echoes the UEs Random Access signature) –PICH (Page Indicator Channel)  Informs a UE to monitor the next paging frame

Top right corner for field-mark, customer or partner logotypes. See Best practice for example. Slide title 40 pt Slide subtitle 24 pt Text 24 pt Bullets level pt Ericsson Confidential  Downlink CPICH (Common Pilot Channel) (C 256,0 ) Pilot Symbol Data (10 symbols per slot) Frame = 15 slots = 10 mSec 1 timeslot = 2560 Chips = 10 symbols = 20 bits = uSec  Sends the scrambling code of the cell  Used for channel estimation Common Pilot Channel

Top right corner for field-mark, customer or partner logotypes. See Best practice for example. Slide title 40 pt Slide subtitle 24 pt Text 24 pt Bullets level pt Ericsson Confidential Sync Channel / Primary Common Control Channel  Downlink SCH / P-CCPCH (C 256,1 ) Broadcast Data (18 bits) SSC i BCH Spreading Factor = Slot = mSec = 18 BCH data bits / slot Frame = 15 slots = 10 mSec 2304 Chips 256 Chips SCHBCH PSC  PSC used for slot synchronization, SSC used for frame synchronization and scrambling code group (16 SSCs in 64 different combinations)

Top right corner for field-mark, customer or partner logotypes. See Best practice for example. Slide title 40 pt Slide subtitle 24 pt Text 24 pt Bullets level pt Ericsson Confidential Secondary Common Control Channel  Downlink S-CCPCH Spreading Factor = 256 to 4 1 Slot = mSec = 2560 chips = 20 * 2 k data bits; k = [0..6] Frame = 15 slots = 10 mSec 20 to 1256 bits0, 2, or 8 bits DataTFCI or DTXPilot 0, 8, or 16 bits  Monitored by UE in idle mode, but also used in Cell FACH

Top right corner for field-mark, customer or partner logotypes. See Best practice for example. Slide title 40 pt Slide subtitle 24 pt Text 24 pt Bullets level pt Ericsson Confidential Dedicated Control/Data Channel  Downlink DPCCH/DPDCH Frame Data 2TFCIData 1TPC 1 Slot = mSec = 2560 chips = 10 x 2^k bits, k = [0...7] SF = 512/2 k = [512, 256, 128, 64, 32, 16, 8, 4] Frame = 15 slots = 10 mSec DPDCH Pilot DPDCHDPCCH The DPDCH carries user traffic, layer 2 overhead bits, and layer 3 signaling data. The DPCCH carries layer 1 control bits: Pilot (for SIR measurements), TPC (transmit power control to increase/decrease transmit power, and TFCI Downlink Inner-Loop Power Control steps of 1 dB, 0.5 dB The DPDCH carries user traffic, layer 2 overhead bits, and layer 3 signaling data. The DPCCH carries layer 1 control bits: Pilot (for SIR measurements), TPC (transmit power control to increase/decrease transmit power, and TFCI Downlink Inner-Loop Power Control steps of 1 dB, 0.5 dB

Slide title In CAPITALS 50 pt Slide subtitle 32 pt WCDMA Uplink Rel ’99

Top right corner for field-mark, customer or partner logotypes. See Best practice for example. Slide title 40 pt Slide subtitle 24 pt Text 24 pt Bullets level pt Ericsson Confidential WCDMA Uplink (FDD) – Rel ’99 Logical Channels (Layers 3+) Transport Channels (Layer 2) Physical Channels (Layer 1) Uplink RF Out UE Scrambling Code I+jQ I/Q Mod. Q I Ch c  II Filter CCCH Common Control Ch. DTCH (packet mode) Dedicated Traffic Ch. RACH Random Access Ch. PRACH Physical Random Access Ch. DPDCH #1 Dedicated Physical Data Ch. CPCH Common Packet Ch. PCPCH Physical Common Packet Ch. Data Coding DPDCH #3 (optional) Dedicated Physical Data Ch. DPDCH #5 (optional) Dedicated Physical Data Ch. DPDCH #2 (optional) Dedicated Physical Data Ch. DPDCH #4 (optional) Dedicated Physical Data Ch. DPDCH #6 (optional) Dedicated Physical Data Ch. QQ DPCCH Dedicated Physical Control Ch. Pilot, TPC, TFCI bits Ch d GcGc GdGd j Ch d,1 GdGd Ch d,3 GdGd Ch d,5 GdGd Ch d,2 GdGd Ch d,4 GdGd Ch d,6 GdGd Ch c GdGd  Ch d GcGc GdGd j RACH Control Part PCPCH Control Part  j  DCCH Dedicated Control Ch. DTCH Dedicated Traffic Ch. N DCH Dedicated Ch. Data Encoding DTCH Dedicated Traffic Ch. 1 DCH Dedicated Ch. Data Encoding MUXMUX CCTrCH DCH Dedicated Ch. Data Encoding

Top right corner for field-mark, customer or partner logotypes. See Best practice for example. Slide title 40 pt Slide subtitle 24 pt Text 24 pt Bullets level pt Ericsson Confidential Uplink Logical Channels (L3)  Control Logical Channels  CCCH (Common Control Channel) - Transmits control information to a UE when there is no RRC Connection  DCCH (Dedicated Control Channel) - Transmits control information from a UE when there is a RRC Connection  Traffic Logical Channels  CTCH (Common Traffic Channel) - Traffic channel for sending traffic to a group of UEs  DTCH (Dedicated Traffic Channel) - Traffic channel dedicated from one UE

Top right corner for field-mark, customer or partner logotypes. See Best practice for example. Slide title 40 pt Slide subtitle 24 pt Text 24 pt Bullets level pt Ericsson Confidential Uplink Transport Channels (L2)  Common Transport Channels  RACH- Random Access Channel - Carries access requests, control information, short data › Uses only open-loop power control › Subject to random access collisions  Dedicated Transport Channels  DCH - Dedicated Channel - Carries dedicated traffic and control data from one UE - Used for BLER measurements

Top right corner for field-mark, customer or partner logotypes. See Best practice for example. Slide title 40 pt Slide subtitle 24 pt Text 24 pt Bullets level pt Ericsson Confidential Uplink Physical Channels (L1)  Common Physical Channels –PRACHPhysical Random Access Channel  Used by UE to initiate access to BS  Dedicated Physical Channels –DPDCHDedicated Uplink Physical Data Channel –DPCCHDedicated Uplink Physical Control Channel  Transmits connection-mode signaling and control to BS

Top right corner for field-mark, customer or partner logotypes. See Best practice for example. Slide title 40 pt Slide subtitle 24 pt Text 24 pt Bullets level pt Ericsson Confidential Uplink DPDCH/DPCCH  Uplink DPDCH/DPCCH Coded Data, 10 x 2^k bits, k=0…6 (10 to 640 bits) Dedicated Physical Data Channel (DPDCH) Slot (0.666 mSec) PilotFBITPC Dedicated Physical Control Channel (DPCCH) Slot (0.666 mSec) Frame = 15 slots = 10 mSec I Q TFCI DPCCH: 15 kb/sec data rate, 10 total bits per DPCCH slot PILOT:Fixed patterns (3, 4, 5, 6, 7, or 8 bits per DPCCH slot) TFCI:Transmit Format Combination Indicator (0, 2, 3, or 4 bits) FBI:Feedback Information (0, 1, or 2 bits) TPC:Transmit Power Control bits (1 or 2 bits); power adjustment in steps of 1, 2, or 3 dB

Top right corner for field-mark, customer or partner logotypes. See Best practice for example. Slide title 40 pt Slide subtitle 24 pt Text 24 pt Bullets level pt Ericsson Confidential WCDMA Physical Channels Radio Base Station (RBS) User Equipment (UE) P-CCPCH- Primary Common Control Physical Channel SCH - Synchronization Channel CPICH - Common Pilot Channel Channels broadcast to all UE in the cell DPDCH - Dedicated Physical Data Channel DPCCH - Dedicated Physical Control Channel Dedicated Connection Channels PICH - Page Indicator Channel Paging Channels S-CCPCH - Secondary Common Control Physical Channel PRACH - Physical Random Access Channel AICH - Acquisition Indicator Channel Random Access and Packet Access Channels

Slide title In CAPITALS 50 pt Slide subtitle 32 pt HSDPA channels

Top right corner for field-mark, customer or partner logotypes. See Best practice for example. Slide title 40 pt Slide subtitle 24 pt Text 24 pt Bullets level pt Ericsson Confidential HSDPA channels

Top right corner for field-mark, customer or partner logotypes. See Best practice for example. Slide title 40 pt Slide subtitle 24 pt Text 24 pt Bullets level pt Ericsson Confidential HSDPA Channels RNC Iur Iub Iu Associated Dedicated Channels HS-DSCH HS-SCCH HS-DPCCH

Top right corner for field-mark, customer or partner logotypes. See Best practice for example. Slide title 40 pt Slide subtitle 24 pt Text 24 pt Bullets level pt Ericsson Confidential HS-PDSCH (Physical, user data)

Top right corner for field-mark, customer or partner logotypes. See Best practice for example. Slide title 40 pt Slide subtitle 24 pt Text 24 pt Bullets level pt Ericsson Confidential HS-SCCH (Physical, Shared control)

Top right corner for field-mark, customer or partner logotypes. See Best practice for example. Slide title 40 pt Slide subtitle 24 pt Text 24 pt Bullets level pt Ericsson Confidential HS-DPCCH (Physical - UL control)

Top right corner for field-mark, customer or partner logotypes. See Best practice for example. Slide title 40 pt Slide subtitle 24 pt Text 24 pt Bullets level pt Ericsson Confidential