You are on page 1of 397

Wi res and Waves Sol ut i ons

EXPLOIT THE EVOLUTION


Lets take out 10 days and learn the essential concepts about 3G technology.
Written by Kamal Vij
Lets Learn
in 10 Days
So Much to Learn...
So Little Time
Lets Learn 3G in 10 Days
written by
Kamal Vij
FOREWORD
The success story of GSM has generated a lot of motivation for businessmen, edu-
cational institutes, private consultants, legacy telecom operators, mobile operators,
equipment vendors and many more to master the fundamentals of 3G. It has been
13 years since the publication of the rst 3G specication. It is no secret that 3G
(UMTS along with HSPA) has established itself as a successful and commercially
protable mobile standard.
Telecom professionals keep on trying to search for the latest updates on the emerging
technologies. There are a lot of white papers, blogs, posters, and e-books available
on the Internet which help them in the learning but their busy schedule hardly
allows them to spend even a single hour per day to learn the updates of technology.
This was my motivation to write this book. In this book, the emphasis is on keeping
the language simple and focus on the essential concepts only. This book is not about
radio planning or RF optimization. Its sole purpose is to introduce the readers to
the 3G technology.
To get the maximum benet out of this 10 days crash course with me, I recommend
you to follow the following plan:
DAY 1 History and Standardization: On the rst day of reading, we will have
an ultra quick look at the history and very brief preview of the future. This
module or chapter will give us an overview about the legacy systems and their
migratory path to 3G and beyond. An the same time, we will also learn about
3GPP releases and their features.
2
DAY 2 Network Elements and Functionalities: The second day is planned
for learning about the network elements, interfaces, and to have a look at the
combined network architecture of 2G & 3G network.
DAY 3 WCDMA Air Interface: On the third day, we will focus on the radio
technology used in 3G system. In the third chapter, the principles of spreading
and code multiplexing are explained. We will also see the series of physical
layer procedures that take place at layer 1 of UE and Node B.
DAY 4 Logical, Transport & Physical Channels: On the fourth day, some
more physical layer aspects will be discussed when we will learn about the
channels of UMTS. In this module, we will focus on the UMTS channels only.
For HSDPA & HSUPA, separate modules are planned.
DAY 5 Radio Resource Management: The fth day of our reading should fo-
cus on the RRM module, which discusses several features that work in parallel
to optimize the radio resource utilization.
DAY 6 Protocols & Interfaces: On the sixth day, topic of discussion will be
the protocols of UMTS. Along with radio protocols, we will also learn about
the control plane & user plane protocols on various UTRAN interfaces.
DAY 7 HSDPA: Release 5 onwards, the downlink speeds can be pushed beyond
2 Mbps. The seventh day is reserved for understanding the basics of HSDPA.
DAY 8 HSUPA: The project HSPA is completed only when both Uplink and
Downlink are High Speed. The eighth module of this book will discuss how
HSUPA diers from the conventional UMTS uplink.
DAY 9 Signalling: Towards the end of our journey, Module 9 is planned to dis-
cuss a few signalling scenarios. Here, we will discuss how a CS AMR call
and a PS data session gets established on UMTS & HSPA. Mobility related
signalling will also be illustrated, which plays an important role in service con-
tinuity and improves call success ratio.
3
DAY 10 Self Test: On the last day, I request all the readers to put themselves to
a self-evaluation and evaluate whether they have learnt something from this
book. 5 to 8 questions/exercises from each module are planned.
Please visit www.3gin10days.com to watch some video lessons related to these topics
and to download the e-book.
4
ABOUT THE AUTHOR
Kamal Vij received a B.Engg. degree in Electronics & Com-
munication from Kuvempu University, India in 2001. In 2005,
he received a M.Sc. degree in Communication Technology
from University of Bremen, Germany. While pursuing his
M.Sc., he took special interest in semiconductor simulation
and worked as a research assistant in the power electronics
department of University of Bremen. In 2006, he started his
career as a trainer for telecommunication. Since then, he has
been delivering trainings on WCDMA, HSPA & LTE Radio
Access Network technologies across the world.
Kamal Vij is now a technical trainer and private consultant.
He has keen interest in emerging technologies and following the market trends. His
skills are signalling, parameter optimization, radio planning and optimization. More
about him can be found at http://www.wiresandwaves.net and he can be reached
at: kamal.vij@wiresandwaves.net.
5
ACKNOWLEDGEMENTS
I, Kamal Vij, the author of this book, would like to thank 3GPP for being so
kind and allowing me to use their graphics, tables and text pieces in this book.
I also want to express my thankful regards to my friends working in the telecom
sector who have helped me in writing this book by giving me tips and ideas. My
biggest teachers are those telecom professionals whom I met while delivering the
classroom training. The discussions I had with them have enhanced my knowledge
and motivated me to work more passionately. I cannot mention all the names here
but a few colleagues and friends this group are Andreas Annen, Ashok Joshi, Andrey
Yaroshenko, Ilya Andreev, Jeetendra Ghare, Karl Hofmann, Kapil Bhutani, Michael
Oestreicher, Silviu Mihailescu, Jan Berglund, Ronald Fabian, Ravindra Mawale,
Saikat Nandi.
I also want to show my appreciation towards the authors of the following three
books. These books have been an excellent source of information for me. The Ideas
for many sections of this book were inspired from these books.
H.Holma and A. Toskala, WCDMA for UMTS , 5th Edition, John
Wiley & Sons.
H.Holma and A. Toskala, HSDPA/HSUPA for UMTS , 1st Edi-
tion, John Wiley & Sons.
Chris Johnson, Radio Access Networks For UMTS; Principles
And Practice , John Wiley & Sons.
I would like to thank Zorba Publishers Pvt. Ltd. (www.zorbapublishers.com)
6
for meticulously proof reading this book and removing hundreds of typographic and
grammatical errors.
Above all, I want to thank my family, who supported and encouraged me in spite
of all the time it took me away from them. It was a long and dicult journey
for them. I apologize to all those who have been with me during my journey as a
telecom trainer and whose names I have failed to mention.
7
DISCLAIMER
The information contained in Lets Learn 3G in 10 Days is for general information
purposes only. The author has tried to simplify the explanation, and in that process
few complicated equations and rules have been dropped while maintaining the overall
correctness to the best of his knowledge. Every eort is made to keep the information
accurate. However, the author takes no responsibility for any damage caused by the
information obtained by this book.
Every care has been taken to mention the references and sources wherever needed.
This process has taken several months because references were added after the book
was written. Afterwards, it is a time-consuming and laborious task to recall all the
sources. The author has tried his best but at few places, he might have forgotten to
mention the source/reference due to human limitation. Author asks for forgiveness
if he has failed to declare the references in any part of the book.
8
CONTENTS
Preface 2
Preface 5
Acknowledgements 6
1 History and Standardization 2
1.1 Mobile Telecom Market . . . . . . . . . . . . . . . . . . . . . . . . . . 2
1.2 History . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3
1.2.1 0G Systems . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4
1.2.2 1G Systems . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4
1.2.3 2G Systems . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5
1.2.4 3G Systems . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11
1.3 3GPP and 3GPP2 . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13
1.3.1 3rd Generation Partnership Project (3GPP) . . . . . . . . . . 14
1.3.2 3rd Generation Partnership Project 2 (3GPP2) . . . . . . . . 15
1.3.3 WiMAX as IMT-2000 System . . . . . . . . . . . . . . . . . . 17
9
1.4 WCDMA FDD - Releases . . . . . . . . . . . . . . . . . . . . . . . . 18
1.5 WCDMA FDD - Releases and Features . . . . . . . . . . . . . . . . . 19
2 Network Elements and Functionalities 25
2.1 Architecture of the GSM Network . . . . . . . . . . . . . . . . . . . . 26
2.1.1 The Mobile Station MS . . . . . . . . . . . . . . . . . . . . . . 27
2.1.2 Base Station Subsystem BSS . . . . . . . . . . . . . . . . . . . 27
2.1.3 Switching Subsystem . . . . . . . . . . . . . . . . . . . . . . . 28
2.2 Improvements of GSM Standard . . . . . . . . . . . . . . . . . . . . 32
2.2.1 CAMEL . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 33
2.3 GPRS Network Architecture . . . . . . . . . . . . . . . . . . . . . . . 35
2.3.1 GPRS Mobile Terminals . . . . . . . . . . . . . . . . . . . . . 36
2.3.2 GPRS Base Station Subsystem . . . . . . . . . . . . . . . . . 37
2.3.3 New Elements in the Core Network . . . . . . . . . . . . . . . 38
2.3.4 Other Changes . . . . . . . . . . . . . . . . . . . . . . . . . . 40
2.3.5 GPRS Roaming Scenario . . . . . . . . . . . . . . . . . . . . . 41
2.4 Migration to 3G Network Architecture . . . . . . . . . . . . . . . . . 42
2.5 UTRAN . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 43
2.5.1 Node B . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 44
2.5.2 RNC . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 45
2.6 Logical roles of RNC: S-RNC and D-RNC . . . . . . . . . . . . . . . 47
2.7 Release 4 Modications . . . . . . . . . . . . . . . . . . . . . . . . . . 50
2.7.1 Architecture . . . . . . . . . . . . . . . . . . . . . . . . . . . . 51
2.7.2 New Interfaces . . . . . . . . . . . . . . . . . . . . . . . . . . 53
2.8 Release 5 Modications . . . . . . . . . . . . . . . . . . . . . . . . . . 54
2.8.1 IP Transport . . . . . . . . . . . . . . . . . . . . . . . . . . . 54
2.8.2 IP Multimedia Subsystem (IMS) . . . . . . . . . . . . . . . . 55
2.9 Release 6 Modications . . . . . . . . . . . . . . . . . . . . . . . . . . 56
2.9.1 IMS for IP-CAN or IMS phase 2 . . . . . . . . . . . . . . . . 57
2.10 Rel-7 & Rel-8 Modications . . . . . . . . . . . . . . . . . . . . . . . 58
10
3 WCDMA Air Interface 62
3.1 Duplex Methods . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 62
3.2 Multiple Access Technologies . . . . . . . . . . . . . . . . . . . . . . . 63
3.2.1 Frequency Division Multiple Access . . . . . . . . . . . . . . . 64
3.2.2 Time Division Multiple Access . . . . . . . . . . . . . . . . . . 65
3.2.3 Code Division Multiple Access . . . . . . . . . . . . . . . . . . 65
3.2.4 Orthogonal Frequency Division Multiple Access . . . . . . . . 65
3.3 UMTS operating Bands and Spectrum . . . . . . . . . . . . . . . . . 65
3.4 Timing in WCDMA . . . . . . . . . . . . . . . . . . . . . . . . . . . 66
3.5 Spreading Principles . . . . . . . . . . . . . . . . . . . . . . . . . . . 68
3.6 Codes in UMTS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 72
3.6.1 Channelization Code . . . . . . . . . . . . . . . . . . . . . . . 73
3.6.2 Scrambling Code . . . . . . . . . . . . . . . . . . . . . . . . . 74
3.6.3 Summary of Scrambling Codes . . . . . . . . . . . . . . . . . 78
3.6.4 Summary of Codes in UMTS . . . . . . . . . . . . . . . . . . 78
3.7 Modulation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 79
4 Logical, Transport & Physical Channels 82
4.1 Chronology: First 3G and then 3.5G . . . . . . . . . . . . . . . . . . 83
4.2 Logical Channels . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 83
4.2.1 Logical Channels for Control Plane Information . . . . . . . . 84
4.2.2 Logical Channels for User Plane Information . . . . . . . . . 85
4.3 Transport Channels . . . . . . . . . . . . . . . . . . . . . . . . . . . . 86
4.3.1 Common Transport Channels . . . . . . . . . . . . . . . . . . 87
4.3.2 Dedicated transport channels . . . . . . . . . . . . . . . . . . 88
4.4 Physical Channels . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 88
4.4.1 UL Common Channel . . . . . . . . . . . . . . . . . . . . . . 91
4.4.2 DL common Channel . . . . . . . . . . . . . . . . . . . . . . . 94
4.4.3 UL Dedicated Channels . . . . . . . . . . . . . . . . . . . . . 105
4.4.4 DL Dedicated Channels . . . . . . . . . . . . . . . . . . . . . 106
11
4.4.5 Summary of DCH Channels . . . . . . . . . . . . . . . . . . . 108
4.5 Cell Search Procedure . . . . . . . . . . . . . . . . . . . . . . . . . . 109
4.6 HSDPA Channels in Short . . . . . . . . . . . . . . . . . . . . . . . . 111
4.7 HSUPA Channels in Short . . . . . . . . . . . . . . . . . . . . . . . . 113
5 Radio Resource Management 117
5.1 Inputs for RRM Functionality . . . . . . . . . . . . . . . . . . . . . . 119
5.1.1 RNC Parameter Database . . . . . . . . . . . . . . . . . . . . 120
5.1.2 Node B Measurements . . . . . . . . . . . . . . . . . . . . . . 121
5.1.3 UE Measurements . . . . . . . . . . . . . . . . . . . . . . . . 123
5.1.4 Internal RNC Measurements . . . . . . . . . . . . . . . . . . . 125
5.2 Load Estimation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 126
5.2.1 Uplink Load Estimation . . . . . . . . . . . . . . . . . . . . . 126
5.2.2 Downlink Load Estimation . . . . . . . . . . . . . . . . . . . . 128
5.3 Radio Resource Management Strategies . . . . . . . . . . . . . . . . . 129
5.4 Admission Control . . . . . . . . . . . . . . . . . . . . . . . . . . . . 129
5.5 Code Allocation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 132
5.5.1 Code Tree Optimization . . . . . . . . . . . . . . . . . . . . . 134
5.6 Packet Scheduler . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 134
5.6.1 RRC States . . . . . . . . . . . . . . . . . . . . . . . . . . . . 137
5.6.2 RRC States Transitions . . . . . . . . . . . . . . . . . . . . . 141
5.7 Power Control . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 144
5.7.1 Open Loop Power Control . . . . . . . . . . . . . . . . . . . . 145
5.7.2 Inner Loop Power Control . . . . . . . . . . . . . . . . . . . . 146
5.7.3 Outer Loop Power Control . . . . . . . . . . . . . . . . . . . . 152
5.8 Handover Control . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 154
5.8.1 Active, Monitored and Detected cells . . . . . . . . . . . . . . 156
5.8.2 Soft/Softer Handover . . . . . . . . . . . . . . . . . . . . . . . 157
5.8.3 ISHO and IFHO Triggering . . . . . . . . . . . . . . . . . . . 162
5.8.4 Inter-Frequency Measurements . . . . . . . . . . . . . . . . . . 163
12
5.8.5 Inter-System Measurements . . . . . . . . . . . . . . . . . . . 164
5.8.6 Compressed Mode . . . . . . . . . . . . . . . . . . . . . . . . 165
5.8.7 Inter System HO Signalling . . . . . . . . . . . . . . . . . . . 166
6 Protocols & Interfaces 171
6.1 Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 172
6.1.1 Horizontal Layers . . . . . . . . . . . . . . . . . . . . . . . . . 173
6.1.2 Vertical Planes . . . . . . . . . . . . . . . . . . . . . . . . . . 173
6.2 QoS and Bearer . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 175
6.2.1 UMTS QoS Classes . . . . . . . . . . . . . . . . . . . . . . . . 177
6.3 Access Stratum and Non-Access Stratum . . . . . . . . . . . . . . . . 178
6.4 Radio Protocols . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 180
6.4.1 Control Plane . . . . . . . . . . . . . . . . . . . . . . . . . . . 180
6.4.2 User Plane . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 181
6.4.3 RRC-layer Functions . . . . . . . . . . . . . . . . . . . . . . . 182
6.4.4 RLC-layer Functions . . . . . . . . . . . . . . . . . . . . . . . 183
6.4.5 MAC-layer Functions . . . . . . . . . . . . . . . . . . . . . . . 185
6.4.6 PDCP-layer Functions . . . . . . . . . . . . . . . . . . . . . . 186
6.5 Iu-CS Interface Protocols . . . . . . . . . . . . . . . . . . . . . . . . . 187
6.5.1 Control Plane - Iu-CS . . . . . . . . . . . . . . . . . . . . . . 187
6.5.2 User Plane - Iu-CS . . . . . . . . . . . . . . . . . . . . . . . . 187
6.5.3 RANAP Functions . . . . . . . . . . . . . . . . . . . . . . . . 189
6.6 Iu-PS Interface Protocols . . . . . . . . . . . . . . . . . . . . . . . . . 190
6.6.1 Control Plane - Iu-PS . . . . . . . . . . . . . . . . . . . . . . 190
6.6.2 User Plane - Iu-PS . . . . . . . . . . . . . . . . . . . . . . . . 190
6.7 Iub Interface Protocols . . . . . . . . . . . . . . . . . . . . . . . . . . 192
6.7.1 Control Plane - Iub CP . . . . . . . . . . . . . . . . . . . . . . 192
6.7.2 User Plane - Iub UP . . . . . . . . . . . . . . . . . . . . . . . 193
6.7.3 NBAP Functions . . . . . . . . . . . . . . . . . . . . . . . . . 193
6.8 Iur Interface Protocols . . . . . . . . . . . . . . . . . . . . . . . . . . 195
13
6.8.1 Control Plane - Iur CP . . . . . . . . . . . . . . . . . . . . . . 195
6.8.2 User Plane - Iur UP . . . . . . . . . . . . . . . . . . . . . . . 195
6.8.3 RNSAP functions . . . . . . . . . . . . . . . . . . . . . . . . . 195
6.9 Non-Access Stratum Protocols . . . . . . . . . . . . . . . . . . . . . . 198
7 High Speed Downlink Packet Access 204
7.1 Why HSDPA? . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 204
7.2 HSDPA Standardization, 3GPP Releases and Evolution . . . . . . . . 205
7.2.1 Release 99 & Rel-4 . . . . . . . . . . . . . . . . . . . . . . . . 206
7.2.2 Release 5 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 206
7.2.3 Release 6 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 207
7.2.4 Release 7 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 207
7.2.5 Release 8 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 207
7.3 HSDPA Operation . . . . . . . . . . . . . . . . . . . . . . . . . . . . 208
7.3.1 HSDPA Operation: Between UE and RNC . . . . . . . . . . . 208
7.3.2 HSDPA Operation: Between Node B and RNC . . . . . . . . 209
7.4 Whats new in HSDPA? . . . . . . . . . . . . . . . . . . . . . . . . . 211
7.4.1 Adaptive Modulation & Coding . . . . . . . . . . . . . . . . . 211
7.4.2 Shorter and Fixed TTI . . . . . . . . . . . . . . . . . . . . . . 211
7.4.3 Node B-based Packet Scheduling . . . . . . . . . . . . . . . . 212
7.4.4 Multi-code Operation . . . . . . . . . . . . . . . . . . . . . . . 213
7.4.5 L1 H-ARQ Retransmission . . . . . . . . . . . . . . . . . . . . 217
7.4.6 MAC-hs Protocol in Node B and UE . . . . . . . . . . . . . . 218
7.4.7 Serving Cell Change Instead of Soft HO . . . . . . . . . . . . 219
7.5 HSDPA Protocol Architecture . . . . . . . . . . . . . . . . . . . . . . 221
7.5.1 MAC-hs entity - UE Side . . . . . . . . . . . . . . . . . . . . . 221
7.5.2 MAC-hs entity - UTRAN Side . . . . . . . . . . . . . . . . . . 224
7.6 Channels and Physical Layer . . . . . . . . . . . . . . . . . . . . . . . 226
7.6.1 HS-DPCCH . . . . . . . . . . . . . . . . . . . . . . . . . . . . 227
7.6.2 HS-SCCH . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 229
14
7.6.3 HS-PDSCH . . . . . . . . . . . . . . . . . . . . . . . . . . . . 231
7.6.4 Associated DCH . . . . . . . . . . . . . . . . . . . . . . . . . 233
7.6.5 Fractional-DPCH . . . . . . . . . . . . . . . . . . . . . . . . . 234
7.7 Timing of HSDPA Channels . . . . . . . . . . . . . . . . . . . . . . . 235
7.8 HSDPA UE Categories . . . . . . . . . . . . . . . . . . . . . . . . . . 236
7.9 HSDPA Peak Bitrate Calculation . . . . . . . . . . . . . . . . . . . . 237
7.10 Serving HS-DSCH Cell Change . . . . . . . . . . . . . . . . . . . . . 239
7.11 Summary: HSDPA Operation in Short . . . . . . . . . . . . . . . . . 241
8 High Speed Uplink Packet Access 245
8.1 Requirements . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 245
8.2 Comparison with HSDPA . . . . . . . . . . . . . . . . . . . . . . . . 247
8.2.1 Commonalities with HSDPA . . . . . . . . . . . . . . . . . . . 247
8.2.2 Dierences from HSDPA . . . . . . . . . . . . . . . . . . . . . 248
8.3 HSUPA User Plane Protocols . . . . . . . . . . . . . . . . . . . . . . 248
8.4 HSUPA Conguration Options . . . . . . . . . . . . . . . . . . . . . . 250
8.5 E-DCH UE Categories and Bit Rates . . . . . . . . . . . . . . . . . . 251
8.6 Starting of HSUPA Operation . . . . . . . . . . . . . . . . . . . . . . 253
8.7 HSUPA Protocol Architecture . . . . . . . . . . . . . . . . . . . . . . 254
8.8 Channels and Physical Layer . . . . . . . . . . . . . . . . . . . . . . . 260
8.8.1 E-DPDCH . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 261
8.8.2 E-DPCCH . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 262
8.8.3 E-AGCH . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 264
8.8.4 E-RGCH . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 266
8.8.5 E-HICH . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 270
8.8.6 F-DPCH . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 272
8.9 Summary: Serving and Non-serving RLS . . . . . . . . . . . . . . . . 273
8.10 E-TFC Selection Procedure . . . . . . . . . . . . . . . . . . . . . . . 276
8.10.1 Step 1: UE sends Scheduling Requests to Node B . . . . . . . 276
8.10.2 Step 2: Serving Grant Value . . . . . . . . . . . . . . . . . . . 277
15
8.10.3 Step 3: Find Power Oset . . . . . . . . . . . . . . . . . . . . 278
8.10.4 Step 4: Reference E-TFCI & Power Oset Curve . . . . . . 278
8.10.5 Step 5: Calculate E-TFCI Allowed by Grant Value . . . . . . 278
8.10.6 Step 6: Calculate TB Size . . . . . . . . . . . . . . . . . . . . 278
8.10.7 Step 7: Select Channelization Code & L1 Parameters . . . . . 279
8.10.8 Step 8: UL Transmission on E-DCH . . . . . . . . . . . . . . 280
8.10.9 Step 9: Feedback from Node B on E-HICH . . . . . . . . . . 281
8.10.10Step 10: Feedback from Node B on E-RGCH . . . . . . . . . . 282
8.11 Summary: HSUPA Operation in Short . . . . . . . . . . . . . . . . . 283
8.12 UL Channelization Codes . . . . . . . . . . . . . . . . . . . . . . . . 288
8.13 DL Channelization Codes . . . . . . . . . . . . . . . . . . . . . . . . 291
8.13.1 R99 DL Channels . . . . . . . . . . . . . . . . . . . . . . . . . 291
8.13.2 HSDPA-related DL Channels . . . . . . . . . . . . . . . . . . 292
8.13.3 HSUPA Related DL Channels . . . . . . . . . . . . . . . . . . 292
9 Signalling 295
9.1 Building Blocks of 3G Signalling . . . . . . . . . . . . . . . . . . . . . 296
9.1.1 RRC Connection . . . . . . . . . . . . . . . . . . . . . . . . . 296
9.1.2 Radio Access Bearer (RAB) . . . . . . . . . . . . . . . . . . . 298
9.1.3 Radio Bearer . . . . . . . . . . . . . . . . . . . . . . . . . . . 298
9.1.4 Radio Link . . . . . . . . . . . . . . . . . . . . . . . . . . . . 299
9.1.5 Non-Access Stratum (NAS) Signalling Connection . . . . . . . 301
9.2 RRC Connection Establishment . . . . . . . . . . . . . . . . . . . . . 302
9.2.1 RRC Connection on Dedicated Channels - DCH . . . . . . . . 302
9.2.2 RRC Connection on Common Channels - FACH/RACH . . . 304
9.3 Mobile Originated Voice Call Establishment . . . . . . . . . . . . . . 306
9.4 Mobile Terminated Voice Call Establishment . . . . . . . . . . . . . . 310
9.5 PS Data Session Setup . . . . . . . . . . . . . . . . . . . . . . . . . . 314
9.6 Soft Handover . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 320
9.7 Inter-RNC Handover with Iur Interface . . . . . . . . . . . . . . . . . 323
16
1
9.8 Inter-RNC Handover without Iur Interface . . . . . . . . . . . . . . . 326
9.9 CS Inter-System Handover (3G to 2G) . . . . . . . . . . . . . . . . . 329
9.10 PS Inter-System Handover (3G to 2G) . . . . . . . . . . . . . . . . . 335
9.11 HSDPA Mobility . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 338
9.11.1 Serving HS-DSCH Cell Change . . . . . . . . . . . . . . . . . 338
9.11.2 HS-DSCH Channel Type Switch . . . . . . . . . . . . . . . . . 342
9.11.3 HS-DSCH IFHO and ISHO . . . . . . . . . . . . . . . . . . . 343
9.12 HSUPA Mobility . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 345
9.12.1 E-DCH Soft Handover . . . . . . . . . . . . . . . . . . . . . . 345
9.12.2 E-DCH Serving Cell Change . . . . . . . . . . . . . . . . . . . 345
9.12.3 E-DCH Channel Type Switch . . . . . . . . . . . . . . . . . . 345
9.12.4 E-DCH IFHO and ISHO . . . . . . . . . . . . . . . . . . . . . 347
10 Self Test 351
10.1 Module 1 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 351
10.2 Module 2 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 354
10.3 Module 3 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 357
10.4 Module 4 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 360
10.5 Module 5 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 363
10.6 Module 6 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 367
10.7 Module 7 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 369
10.8 Module 8 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 372
10.9 Module 9 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 376
CHAPTER
1
HISTORY AND STANDARDIZATION
We have come a long way. GSM made it possible to leave the oce and yet
answer the phone calls, 3G did the same for the e-mails, and SMS still creates
wonders despite its tiny size.
If you have decided to read this book, you are denitely involved with the mobile
communication industry and it is quite possible that at least once someone has asked
you What is 3G ?. Especially after hearing the words iPhone 3G & 3GS, even
non-technical people have started wondering what exactly is 3G. In this chapter, we
will try to nd the answer to this question and have a look at the evolutionary path
taken by 3G.
1.1 Mobile Telecom Market
Source:
Informa Telecoms & Media
http://www.4gamericas.org/
The statistics from the 4
th
Quarter 2012
1
show that 90% of the mobile subscriptions
in the world are using GSM, UMTS & HSPA Systems. Figure 1.1 is taken from
1
Source: Informa Telecoms & Media & http://www.4gamericas.org/
2
1.2. HISTORY 3
www.4gamericas.com, which contains a lot of interesting details about the present
telecom market. Among all the cellular systems, GSM has been the most successful
technology and due to aordable handsets and the importance of voice service, it
will continue to remain the leading technology for the coming years as well.
When UMTS was developed as the 3G system, the 3G-2G interworking was planned
so that the investments of GSM could be reused and 3G cost of ownership could be
reduced. Even today, 2G provides a coverage safety belt to 3G. When subscribers
run into 3G coverage holes, then they can use the 2G systems. Similarly, when
the 2G load increases, 3G can provide some load-sharing possibility for the smooth
operation of 2G cell.
Figure 1.1: Mobile market in Q4 2012; source: Informa Telecoms & Media
1.2 History
Nowadays, the word mobile phone is a synonym of cellular phones. In some coun-
tries
2
, the mobile phones are called handy. But there was a time when mobile phones
were neither handy nor cellular. Those commercial mobile systems can be called as
0G or Single Cell Systems.
2
e.g., in Germany
4 CHAPTER 1. HISTORY AND STANDARDIZATION
1.2.1 0G Systems
0G Systems are called so because they were the predecessors of the rst generation
(1G) modern cellular communication systems. They were planned to serve a very
large geographical area using a very high base station. Due to this huge distance,
mobile was required to transmit at a very high transmit power, and it needed a bulky
battery to make it possible. Therefore, the tranmitters/receivers of these phones
were typically mounted on the top of vehicles and the handset was tted close to
the drivers seat. Because of the huge cost of equipment and service operation, this
could be used only by very few groups of people, e.g., celebrities, politicians and
construction managers.
For operators: These systems were not a protable technology because each fre-
quency could be used only once in a very large geographical area.
For Users: Cost of service and user equipment was so high that the common man
did not feel the need of using this service.
Both of the points listed above stopped the growth of 0G systems and these remained
as low-subscriber system.
1.2.2 1G Systems
First-generation mobile systems were a big revolution. In 1G systems, for the rst
time, we divided the coverage areas into cells and hence started the history of the
modern cellular mobile communication system. 1G systems could also be called
as analog
3
mobile phone systems because they used analog transmission for speech
services.
In 1979, the rst cellular system in the world became operational by Nippon Tele-
phone and Telegraph (NTT) in Tokyo, Japan. Two years later, the cellular epoch
reached Europe. The two most popular analogue systems were Nordic Mobile Tele-
phones (NMT) and Total Access Communication Systems (TACS). In 1981, the
NMT-450 system was commercialized by NMT in Scandinavia. The system oper-
ated in the 450 MHz and 900 MHz band with a total bandwidth of 10 MHz.
Advanced Mobile Phone System (AMPS) was an analog mobile phone system stan-
dard developed by Bell Labs, and ocially introduced in the Americas in 1983.
TACS, launched in the United Kingdom in 1982, operated at 900 MHz with a band
of 25 MHz for each path and a channel bandwidth of 25 KHz. Other than NMT
3
Analog: Amplitude Modulation, Frequency Modulation, Phase Modulation
1.2. HISTORY 5
and TACS, some other analogue systems were also introduced in the 1980s across
Europe. For example, in Germany, the C-450 cellular system, operating at 450 MHz
and 900 MHz (later) was deployed in September in 1985.
All of these systems oered handover and roaming capabilities but the cellular net-
works were unable to inter-operate between countries. This was one of the inevitable
disadvantages of the rst-generation mobile networks. Other than being just the lo-
cal & region-specic systems, these systems also had some other disadvantages:
Security: Analog speech was transmitted without any encryption.
Quality: Transmission errors were not so easy to correct because it was very dicult
to reconstruct exactly the same analog signal.
Capacity: Analog speech cannot be compressed. Therefore, 1G radio transmission
requires a lot of bandwidth. This causes network congestion for the operator
and expensive operation for the subscriber.
With the introduction of 1G phones, the mobile market showed some growth and
the number of subscribers reached 20 million by 1990. But still, to own a mobile
phone was a luxury and only a few people could aord it.
1.2.3 2G Systems
Just like 1G, every region had its own local 2G standards as well. For example, in
the USA, 1G AMPS was upgraded to digital AMPS (D-AMPS), in the USA itself, a
CDMA based IS-95 2G network was launched. Japan developed its own 2G system
called Personal Digital Cellular (PDC). PDC is a TDMA-based technology that is
deployed only in Japan. Among all 2G systems, one system that made the largest
impact on our lives is Global System for Mobile communication (GSM). The second-
generation (2G) mobile systems were introduced in the early 1990s. Low bit rate
data services were supported as well as the traditional speech service.
Development of GSM in Europe
But in Europe, there was a growing demand of a common standard which should
work in the major part of Europe. To full this need, in 1982 a group was formed,
which is knows as Groupe Speciale Mobile (GSM)
4
. This group was formed by
4
This was the original name of GSM. Later it was changed to Global System of Mobile Com-
munications
6 CHAPTER 1. HISTORY AND STANDARDIZATION
the Confederation of European Posts and Telecommunications (CEPT) to design a
pan-European mobile technology. In coming years, the European Commission and
European Union heads of states endorsed the GSM project. The GSM project was
started as a European initiative but soon the non-European operators also started
endorsing it. In fact, the GSM has been more successful than the most optimistic
forecast ever made for it. For example, the number of GSM subscribers reached
the 1 Million mark in 1994, 10 million in 1995, 50 million in 1996 and in 1998 the
number reached 100 million mark. In 1998, there were more than 100 countries
which were using GSM. A more detailed description of the events can be found at
http://www.gsma.com/aboutus/history/.
On technical aspects also, the second-generation mobile systems were a big enhance-
ment which fullled many shortcomings of 1G analog systems. One remarkable
aspect of 2G systems is that they all utilize digital
5
modulation.
In a digital system, the analog speech signal passes through an analog-to-digital
converter and the digitized signal is fed to the modulator. When compared to the
rst-generation systems, 2G systems are able to achieve:
higher spectrum eciency due to modern speech codecs
(encrypted) secure radio transmission
better quality by using an error-correction scheme (channel coding)
better data services
more advanced roaming
Three 2G Standards of USA
In the United States, there were three lines of development in the second-generation
digital cellular systems.
1. The rst digital system, introduced in 1991, was the IS-54 (North America
TDMA Digital Cellular) of which a new version supporting additional services
(IS-136) was introduced in 1996.
2. Meanwhile, IS-95 (cdmaOne) was deployed in 1993. In many regions of the
world, it is called 2G CDMA.
5
Digital: Amplitude Shift Keying, Frequency Shift Keying, Phase Shift Keying
1.2. HISTORY 7
Figure 1.2: Commercially deployed Mobile Communication Systems of the 3GPP
Family
3. The US Federal Communications Commission (FCC) also auctioned a new
block of spectrum in the 1900 MHz band (PCS), allowing GSM1900 to enter
the US market.
In Japan, the Personal Digital Cellular (PDC) system, originally known as JDC
(Japanese Digital Cellular) was initially dened in 1990. Commercial service was
started by NTT in 1993 in the 800 MHz band and in 1994 in the 1.5 GHz band.
GSM and its Evolution
GSM has emerged as a single, unied 2G standard operating in more than 200 coun-
tries. This enabled seamless services throughout Europe by means of international
roaming. The earliest GSM system operated in the 900 MHz frequency band. Later,
GSM specications for 1800 & 1900 MHz bands were released. During development
over more than 20 years, the GSM technology has been continuously improved to
oer better services in the market. New technologies have been developed based
on the original GSM system, leading to some more advanced systems known as 2.5
8 CHAPTER 1. HISTORY AND STANDARDIZATION
Generation (2.5G) systems.
HSCSD, GPRS and EDGE are all based on the original GSM system.
High Speed Circuit Switched Data (HSCSD)
HSCSD is the rst enhancement of the GSM air interface. The new features included
in HSCSD are illustrated in gure 1.3, These 2 features are:
1. The new channel coding used in HSCSD yields 14.4 kbps user data per time
slot.
2. For high bit rates, several time slots could be bundled and allocated to the
same user.
HSCSD bundles GSM time slots to give a theoretical maximum data rate of 57.6
kbit/s (bundling 4 X 14.4 kbit/s full rate time slots). HSCSD provides both sym-
metric and asymmetric services and it is relatively easy to deploy. However, HSCSD
is not easy to price competitively since each time slot is eectively a GSM channel.
Figure 1.3: HSCSD compared with GSM
1.2. HISTORY 9
General Packet Radio Service
Following HSCSD, GPRS is the next step of the evolution of the GSM air inter-
face. Other than bundling timeslots, 4 new channel coding schemes are proposed.
GPRS provides always-on packet-switched services with bandwidth only being used
when needed. Therefore, GPRS enables GSM with Internet access at high spectrum
eciency by sharing time slots between dierent users. Theoretically, GPRS can
support data rate up to 160 kbit/s (current commercial GPRS provides 40 kbit/s).
Deploying GPRS is not as simple as HSCSD because the core network needs to be
upgraded as well.
General Packet Radio Service (GPRS) provides packet data radio access for GSM
mobile phones. On a general level, GPRS connections use the resources only for a
short period of time when sending or receiving data:
In a circuit-switched system, the line is occupied even when no data is trans-
ferred.
In a packet-switched system, the resources are released so they can be used by
other subscribers.
GPRS is, therefore, well adapted to the bursty nature of data applications. GPRS
has minimal eects on the handling of circuit switched calls but the inter-operability
of existing circuit switched functionalities needs to be taken into account.
An investment in the GPRS infrastructure is an investment in future services. GPRS
paves the way and is already part of the third generation (3G) network infrastruc-
ture. Migration to 3G comprises deployment of the new WCDMA radio interface
served by the GSM and GPRS core networks. Many of the 3G services are based
on IP, and the GPRS Core network is the key step of introducing the IP service
platform into the present GSM networks.
When migrating to 3G services, preserving the Core Network investments is a top
priority. Introducing UMTS will complement the GSM network, not replace it.
Enhanced Data Rates for GSM Evolution
Enhanced Data rates for GSM Evolution (EDGE) boosts GSM/GPRS network ca-
pacity and data rates to meet the demands of wireless multimedia applications and
mass market deployment. EDGE uses the GSM radio structure but with a new
modulation scheme, 8-PSK, instead of GMSK, thereby increasing by three times
the GSM throughput using the same bandwidth. A quick summary of EDGE tech-
nology can be found in gure 1.5.
10 CHAPTER 1. HISTORY AND STANDARDIZATION
Figure 1.4: GPRS improvements for higher bit rates
With the new modulation, EDGE increases the radio interface data throughput, as
per 3GPP standardization, three-fold compared to todays GSM and boosts both
circuit switched and packet switched services. The maximum standardized data rate
per timeslot will triple, and the peak throughput, with eight time slots in the radio
interface, can be up to 473 kbit/s. Since it is fully based on GSM, introducing EDGE
to the existing network requires relatively small changes to the network hardware
and software. EDGE does not entail any new network elements
6
. The operators
need not make any changes to the network structure or invest in new regulatory
licenses.
EDGE, in combination with GPRS, will deliver single user data rates of up to 384
kbit/s.
EDGE or E-GPRS supports higher data rates compared to basic GPRS, using sev-
eral Modulation and Coding Schemes (MCSs) varying from 8.8 kbit/s to 59.2 kbit/s
in the radio interface. Nine dierent MCS schemes are designed for EGPRS. When
an RLC data block is sent, the information is encoded using one of the MCSs to resist
6
Compared to GPRS network architecture, the EDGE network does not need any additional
network element.
1.2. HISTORY 11
Figure 1.5: Summary of EDGE Technology
8-PSK GMSK
Modulation 8-PSK, 3 bit/sym GMSK, 1 bit/sym
Symbol rate 270.833 ksps 270.833 ksps
Payload/burst 346 bits 116 bits
Gross rate/time slot 69.6 kbit/s 23.2 kbit/s
Table 1.1: Comparison of 8-PSK and GMSK modulation schemes
channel degradation and modulated before transmission over the radio interface.
Since the resources are limited, the higher the level of protection for information,
the less information is sent. The protection that best ts the channel condition is
chosen for a maximum throughput. The GMSK modulation provides a robust mode
for wide area coverage while 8PSK provides higher data rates.
1.2.4 3G Systems
The idea of next generation mobile network was rst conceived by ITU and was
called IMT-2000. IMT-2000 is the result of collaboration of many entities, inside
the ITU (ITU-R and ITU-T), and outside the ITU (3GPP, 3GPP2, UWCC and so
12 CHAPTER 1. HISTORY AND STANDARDIZATION
MCS Modulation Code Rate User Rate
MCS-1
GMSK
0.53 8.8 kbps
MCS-2 0.66 11.2 kbps
MCS-3 0.80 14.8 kbps
MCS-4 1.0 17.6 kbps
MCS-5
8-PSK
0.37 22.4 kbps
MCS-6 0.49 29.6 kbps
MCS-7 0.76 44.8 kbps
MCS-8 0.92 54.4 kbps
MCS-9 1.0 59.2 kbps
Table 1.2: Peak data rates for E-GPRS Modulation and Coding Schemes
on).
As shown in gure 1.6, the vision of ITU for its next generation system was some-
thing like this.
Quoted word-by-word,
Source: http://www.itu.int/osg/spu/imt-2000/technology.html
IMT-2000 oers the capability of providing value-added services and applica-
tions on the basis of a single standard. The system envisages a platform for
distributing converged xed, mobile, voice, data, Internet and multimedia ser-
vices. One of its key visions is to provide seamless global roaming, enabling
users to move across borders while using the same number and handset. IMT-
2000 also aims to provide seamless delivery of services, over a number of media
(satellite, xed, etc). It is expected that IMT-2000 will provide higher trans-
mission rates: a minimum speed of 2 Mbit/s for stationary or walking users,
and 348 kbit/s in a moving vehicle. Second-generation systems only provide
speeds ranging from 9.6 kbit/s to 28.8 kbit/s.
When ITU dened the requirements of its next generation mobile system, several
standards development organizations started working on nding solutions to fulll
those requirements in the easiest and most cost-eective manner. A few well known
organizations in this race were European Telecommunications Standards Institute
(ETSI), Telecommunications Technology Association, Korea, Association of Radio
Industries and Businesses, Japan etc.
As a part of the roadmap, July 1998 was accepted as the deadline for submission of
proposals for IMT-2000 by the regional standardization development organizations.
1.3. 3GPP AND 3GPP2 13
Third-generation (3G) systems promise faster communications services, including
voice, fax and Internet, anytime and anywhere with seamless global roaming. ITUs
International Telecommunication Union IMT-2000 global standard for 3G has opened
the way to enabling innovative applications and services (e.g. multimedia entertain-
ment, infotainment and location-based services, among others).
Figure 1.6: ITUs vision of IMT-2000
The terrestrial radio transmission technologies proposed to ITU in July 1998 in-
cluded a number of dierent Wideband CDMA (WCDMA) based radio access tech-
nologies, which can be grouped into two types.
Synchronous: These type of proposals requires synchronized base stations.
These proposals were built on the IS-95 2G radio transmission technology
(e.g., TD-SCDMA).
Non-Synchronous: The other group of concepts does not rely on base station
synchronization (e.g., WCDMA).
1.3 3GPP and 3GPP2
By the end of 1998, two specication development projects were founded by the
regional standardization organizations, 3GPP (3rd Generation Partnership Project)
14 CHAPTER 1. HISTORY AND STANDARDIZATION
and 3GPP2. The goal of both 3GPP and 3GPP2 was to merge a number of the
IMT-2000 proposals into a single one, see gure 1.7.
3GPP: 3GPP includes the organizations which are working on evolving GSM to-
wards 3G standards and beyond. 3GPP is responsible for the standardization
of GSM, GPRS, UMTS, HSPA & LTE.
3GPP2: 3GPP2 includes the organizations which are working on evolving IS-95
(2G CDMA) towards 3G standards. 3GPP2 is responsible for the standard-
ization of CDMA2000 1X, CDMA200 EV-DO Rev. A/B/C.
1.3.1 3rd Generation Partnership Project (3GPP)
Source: http://3gpp.org/Partners
http://3gpp.org/About-3GPP
The 3rd Generation Partnership Project (3GPP) unites six telecommunications stan-
dards bodies, known as Organizational Partners and provides their members with a
stable environment to produce the highly successful Reports and Specications that
dene 3GPP technologies.
The six 3GPP Organizational Partners - from Asia, Europe and North America -
determine the general policy and strategy of 3GPP.
ARIB The Association of Radio Industries and Businesses, Japan
CCSA China Communications Standards Association, China
TTA Telecommunications Technology Association, Korea
TTC Telecommunication Technology Committee, Japan
ETSI The European Telecommunications Standards Institute
ATIS The Alliance for Telecommunications Industry Solutions, USA
Other than these, 3GPP currently has three Observers. Observers are Standards
Development Organizations (SDOs) who have the qualications to become future
Organizational Partners.
TIA Telecommunications Industries Association, USA
1.3. 3GPP AND 3GPP2 15
ISACC ICT Standards Advisory Council of Canada, Canada
ACIF Communications Alliance - former Australian Communications Industry Fo-
rum, Australia
Additionally, 3GPP has also members who have the ability to oer market advice
to 3GPP and to bring into 3GPP a consensus view of market requirements falling
within the 3GPP scope; but does not have the capability and authority to dene,
publish and set standards within the 3GPP scope. These partners are called Market
Representation Partners.
3GPP has several market representative partners, which are IMS Forum, TD-
Forum, GSA, GSM Association, IPV6 Forum, UMTS Forum, 4G Amer-
icas, TD SCDMA Industry Alliance, InfoCommunication Union, Small
Cell Forum, CDMA Development Group, Cellular Operators Association
of India (COAI) and NGMN Alliance.
1.3.2 3rd Generation Partnership Project 2 (3GPP2)
Source: http://www.3gpp2.com/Public html/Misc/AboutHome.cfm
The Third Generation Partnership Project 2 (3GPP2) is also a collaborative eort
among 5 North American and Asian standards development organizations whose
aim is to develop the specications for ANSI/TIA/EIA-41 Cellular Radio telecom-
munication Intersystem Operations network evolution to 3G. 3GPP2 is responsible
for standardization of cdma2000 and its future evolutions.
Similar to 3GPP, 3GPP2 also has organizational partners, which are:
ARIB The Association of Radio Industries and Businesses, Japan
7
CCSA China Communications Standards Association, China
TTA Telecommunications Technology Association, Korea
TTC Telecommunication Technology Committee, Japan
TIA Telecommunications Industry Association, USA
7
ARIB, CCSA, TTA & TTC organizations are partners in both 3GPP and 3GPP2.
16 CHAPTER 1. HISTORY AND STANDARDIZATION
3GPP2 also has market representation partners which have the ability to oer mar-
ket advice to 3GPP2 and to bring into 3GPP2 a consensus view of market re-
quirements falling within the 3GPP2 scope. There are 4 market representatives
of 3GPP2: CDMA Development Group (CDG), IPv6 Forum, Small Cell
Forum, CDMA Certication Forum.
Figure 1.7: Standards Development Organizations responsible for forming 3GPP
& 3GPP2
List of all IMT-2000 Systems
The purpose of this section is to show the complete picture of 3G. In the
whole book, we will discuss only WCDMA FDD (ocially called as IMT-2000
CDMA Direct Spectrum).
For someone living in Europe, 3G, WCDMA and UMTS are synonyms. But if we
analyze carefully, it is not correct. According to ITUs Recommendation ITU-R
M.1457, there were 5 systems recommended for terrestrial radio interfaces of IMT-
2000.
Source: ITUs Recommendation ITU-R M.1457
1. IMT-2000 CDMA Direct Spread: The IMT-2000 radio-interface specica-
tions for CDMA Direct Spread technology are developed by 3GPP. This radio
1.3. 3GPP AND 3GPP2 17
interface is called Universal Terrestrial Radio Access (UTRA) FDD or Wide-
band CDMA (WCDMA). In the development of this radio interface, the CN
specications are based on an evolved GSM-MAP. However, the specications
include the necessary capabilities for operation with an evolved ANSI-41-based
CN.
2. IMT-2000 CDMA Multi-Carrier: The IMT-2000 radio interface specica-
tions for CDMA multi-carrier (MC) technology are developed by 3GPP2. This
radio interface is called cdma2000. In the development of this radio interface
the CN specications are based on an evolved ANSI-41 and IP network, but the
specications include the necessary capabilities for operation with an evolved
GSM-MAP based CN, a CN based on IETF protocols, or the 3GPP Evolved
Packet Core (EPC).
3. IMT-2000 CDMA TDD: The IMT-2000 radio interface specications for CDMA
TDD technology are developed by 3GPP. This radio interface is called the Uni-
versal Terrestrial Radio Access (UTRA) time division duplex (TDD), where
three options are dened:
1.28 Mchip/s TDD (TD-SCDMA)
3.84 Mchip/s TDD
7.68 Mchip/s TDD
4. IMT-2000 TDMA Single-Carrier: The IMT-2000 TDMA Single-Carrier ra-
dio interface specications contain two variations depending on:
whether a TIA/EIA-41 circuit switched network component is used, or
a GSM evolved UMTS circuit switched network component is used.
In either case, a common enhanced GSM General Packet Radio Service (GPRS)
packet switched network component is used. The initial focus of the following
sections has been to provide an evolution path for the TIA/EIA-136 pre-IMT-
2000 radio interface to evolve to IMT-2000.
5. IMT-2000 FDMA/TDMA: The IMT-2000 radio interface specications for
FDMA/TDMA technology are dened by a set of ETSI standards. This radio
interface is called digital enhanced cordless telecommunications (DECT).
1.3.3 WiMAX as IMT-2000 System
In 2007, WiMAX was also accepted as a new member of IMT-2000 family with the
ocial name of IMT-2000 OFDMA TDD WMAN. WiMAX (designated as IEEE
18 CHAPTER 1. HISTORY AND STANDARDIZATION
Std 802.16) is developed and maintained by the IEEE 802.16 Working Group on
Broadband Wireless Access. It is published by the IEEE Standards Association
(IEEE-SA) of the Institute of Electrical and Electronics Engineers (IEEE).
1.4 WCDMA FDD - Releases
Source: http://3gpp.org/Releases
Before 3G, the standardization work of GSM and GPRS was done by ETSI. From
R99 onwards, ETSI is one of the bodies in the collaboration of 3GPP. Hence, after
R99, we always talk about 3GPP releases instead of ETSI releases.
Table 1.3 shows the dates on which various 3GPP releases were standardized and
frozen. According to 3GPP, after freezing, a release can have no further additional
functions added. However, detailed protocol specications (stage 3) may not yet be
complete.
Release Freezing Date
Ph 1 1992
Ph 2 1995
R96 Early 1997
R97 Early 1998
R98 Early 1999
R99 March 2000
Rel-4 March 2001
Rel-5 March - June 2002
Rel-6 December 2004 - March 2005
Rel-7 Stage 3 freeze December 2007
Rel-8 Stage 3 freeze December 2008
Rel-9 Stage 3 freeze December 2009
Rel-10 Stage 3 freeze March 2011
Table 1.3: 3GPP releases of WCDMA and their freezing dates
In some of the releases, dates are mentioned according to the stages (stage 1, 2, 3).
The term stage has following meaning:
Stage 1 refers to the service description from a service-users point of view.
Stage 2 is a logical analysis, breaking the problem down into functional elements
and the information ows amongst them across reference points between func-
tional entities.
1.5. WCDMA FDD - RELEASES AND FEATURES 19
Stage 3 is the concrete implementation of the protocols appearing at physical
interfaces between physical elements onto which the functional elements have
been mapped.
1.5 WCDMA FDD - Releases and Features
Before we discuss the details of each 3GPP release and the corresponding features, let
us have a quick look at the bit rates oered by various 2G and 3G technologies. Table
1.4 shows both numbers, one which are mentioned in the technology description and
the others which are commercially used in practice. It is expected that HSDPA will
bridge the gap between theoretical and practical numbers and hence, the mobile
operators will feel transparency in the system operation and description.
System GSM GPRS EDGE UMTS HSDPA
Typical Max Bitrate(Kbps) 9.6 50 150 384 14400
Theoretical Max Bitrate(Kbps) 9.6 171 384 2048 14400
Table 1.4: Maximum bit rates of various technologies
Figure 1.8: Mobile Evolution from 2G to 4G
Release 99 or Rel-99: In December 1999, the rst UMTS Release, the so-called
Release 99 was frozen. UMTS Rel-99 is based on the large experience of
GSM,GPRS standardization, taking over many principles of the matured GSM,
GPRS network, protocol and service architecture.
Mature GSM/GPRS Core network
20 CHAPTER 1. HISTORY AND STANDARDIZATION
New Air IF technology (WCDMA)
New radio network (UTRAN)
bit rates up to 384 kbps
8
Rel-99 was the start of 3G. The highlights of R99 was a CDMA based radio
access network (UTRAN) and the new interfaces which connect UTRAN to
the existing GSM/GPRS core network. Rel. 99 species that transmission
technology on these interfaces should be ATM
9
.
REL-4 Continuing the 3GPP evolution, Release 4 enhanced UMTS via several
features, e.g.:
Bearer independent CS Core Network
CAMEL CAMEL Phase 4
Low chip rate TDD mode
Transcoder Free Operation
There was no major enhancement to the UTRAN in Rel-4. Therefore, the bit
rates of R99 and Rel-4 are identical. In CS Core Network, MSC functional-
ity was split into 2 separate Units: MSC Server (MSS) and Media Gateway
(MGW). This type of Core Network architecture is also called as Split Archi-
tecture. The next chapter explains these issues.
REL-5 UMTS Release 5 was nalized at the end of 2002, including several Core
Network and Radio Interface enhancements such as:
High Speed Downlink Packet Access; peak DL bitrate up to 14.4 Mbps
All IP Core Network
IP Multimedia Subsystem
Wide Band AMR
Release 5 is a very signicant release which aected all areas of UMTS. For
radio network, HSDPA improved the peak bit rates of DL beyond the 2 Mbps
limit. For transmission network, IP based Iub, Iur and Iu interfaces were
dened. In core network, IP multimedia subsystem (IMS) was dened, which
uses SIP based signalling to setup, maintain and tear down the packet sessions.
8
Theoretically 2 Mbps but in practice, we do not get more than 384 kbps using conventional
3G DCH resources.
9
There were 3 options available: TDM, ATM or IP. ATM was chosen because of its exibility
and QoS provisioning.
1.5. WCDMA FDD - RELEASES AND FEATURES 21
REL-6 UMTS Release 6 was frozen 09/2005, containing features such as:
FDD Enhanced Uplink (HSUPA ); peak UL bitrate up to 5.76 Mbps
WLAN-UMTS Interworking
IP Multimedia Subsystem Phase 2
Release 6 was the point where both UL and DL could be High Speed. The
common name for HSDPA and HSUPA is HSPA. It was specied that HSUPA
cannot work without HSDPA in DL.
REL-7 UMTS Release 7 has been closed end of 2007, including important UMTS &
HSPA enhancements, improving the UMTS peak rates and spectral eciency:
Higher order Modulation: 64QAM for the DL (up to 21 Mbps), 16QAM
for the UL (up to 11.5 Mbps)
2x2 MIMO (up to 28 Mbps) for downlink (HSDPA)
Continuous Packet Connectivity CPC
Flexible RLC
Enhanced Cell FACH
The development of HSPA in Rel-7 was focussed on 3 dierent objectives,
which are:
To increase the peak bit rate of HSDPA towards higher limits. This could
be achieved by
Higher Order Modulation (64QAM in DL & 16QAM in UL), or
Multiple Input Multiple Output (MIMO) in DL.
To decrease the battery consumption so that UEs could stay connected
for a longer period even if they are inactive.
Reduced latency (Round trip time) for better support of RT services on
HSPA.
REL-8 3GPP Release 8 was frozen in 03/2009, containing further HSPA improve-
ments as well as the UMTS Long Term Evolution LTE and the Evolved Packet
System EPS:
HSDPA further improvement using DC-HSDPA (42 Mbps) and simulta-
neous operation of MIMO & 64QAM in DL.
DC-HSUPA (23 Mbps)
22 CHAPTER 1. HISTORY AND STANDARDIZATION
New radio access technology: E-UTRAN /Long Term Evolution (LTE)
New purely packet switched core network Evolved Packet Core (EPC)
Release 8 pushed HSDPA peak bit rate to even higher values by using the
combined operation of 64-QAM and 2X2 MIMO. Additionally, an OFDMA-
based new radio network (E-UTRAN) and a pure IP-based new core network
was dened. This new system os commonly known as Evolved Packet System
(EPS) or Long Term Evolution (LTE).
REL-9 3GPP Release 9 has been closed end of 2009, including HSPA+ enhance-
ments and initial LTE-Advanced (LTE-A) denitions.
Dual-Cell HSDPA, 2x2 MIMO & 64QAM (up to 84 Mbps).
REL-10 3GPP Release 10 was nished in early 2011; central focus will be on LTE-
Advanced
10
Few highlights of Rel-10 are described below.
Furthermore, denition of Multi-Carrier HSPA for UL & DL is expected.
LTE-Advanced (up to 1 Gbps DL & 500 Mbps UL for low mobility/Indoor)
as IMT-Advanced proposal (4G).
Multi-Carrier HSDPA (DL: up to 3 or 4 carrier delivering up to 126 &
168 Mbps respectively).
Dual-Carrier HSUPA (UL: up to 23 Mbps).
10
The term 4G is quite often used without much care. The ITU guidelines and requirements
show that only in Rel 10, LTE is able to full the requirements of the 4G system. Hence, it is
technically wrong to call REL-8 LTE as 4G system.
1.5. WCDMA FDD - RELEASES AND FEATURES 23
Copyright Notices
Main reference material for this book has been technical specications (TSs) and
technical reports (TRs) of 3rd Generation Partnership Project (3GPP). Information
has been interpreted and presented in a simplied manner.
In the rst chapter no copyrighted material has been used. But the information
available on the ocial website of 3GPP has been the main source of information.
Text on page 16 http://3gpp.org/Partners
Text on page 16 http://3gpp.org/About-3GPP
Table 1.3 http://3gpp.org/Releases
Figure 1.1 on page 3 source: Informa Telecoms & Media
BIBLIOGRAPHY
[1] General information about 3GPP; Available at
http://www.3gpp.org/About-3GPP
[2] Information about 3GPP Organizational partners and market representatives ;
Available at http://www.3gpp.org/Partners
[3] Information about 3GPP Releases ; Available at http://3gpp.org/Releases
[4] Information about mobile technology and IMT-2000; Available at
http://www.itu.int/osg/spu/imt-2000/technology.html
[5] General information about 3GPP2; Available at http://www.3gpp2.com/.
[6] Information about 3GPP Organizational partners and market representatives ;
Available at http://www.3gpp2.com/Public html/Misc/PartnersHome.cfm
[7] http://www.4gamericas.org/
[8] http://www.gsma.com/aboutus/history/
[9] M.1457-11 Detailed specications of the terrestrial radio interfaces of Interna-
tional Mobile Telecommunications-2000 (IMT-2000)
[10] H.Holma and A. Toskala, WCDMA for UMTS , 5th Edition, John Wiley
& Sons.
24
CHAPTER
2
NETWORK ELEMENTS AND
FUNCTIONALITIES
To understand the network architecture and interfaces of UMTS, we must go through
the evolution of GSM and GPRS. UMTS can be understood as a combination of the
existing pre-Rel-99 GSM/GPRS core network and a new type of radio access network
(UTRAN). Hence, the core networks of 2G and 3G are the same. This aspect
signicantly reduced the 3G cost of ownership and inspired the mobile operators
to invest in UMTS. The following sections will explain the architecture, network
elements and interfaces of an UMTS network.
Figure 2.1 shows the GSM network architecture according to its basic release (GSM
Phase 1 and phase 2). The services oered by such a purely circuit switched network
can be categorized in 2 categories.
1. CS Speech: Back in the early 90s, the voice service was the main objective
while buying a mobile phone. Even today, voice is the most important service
for the majority of the subscribers and operators.
2. CS Data: The CS Data service can be compared to Internet access using
dial-up modem. Compared to the modern days Internet access, it is dierent
because in the early days of GSM, the trac was carried by switches instead
of routers. The switches are equipped with an interworking functionality that
25
26 CHAPTER 2. NETWORK ELEMENTS AND FUNCTIONALITIES
can convert data into a form which can be accepted at the external packet
data network.
Figure 2.1: GSM Network Architecture
2.1 Architecture of the GSM Network
A GSM network is composed of several functional entities whose functions and
interfaces are depicted in gure 2.1. It shows the layout of a generic GSM network.
The GSM network can be divided into three broad subsystems or parts.
1. The Mobile Station (MS): MS is carried by the subscriber.
2. The Base Station Subsystem (BSS): BSS controls the radio link with the
Mobile Station.
3. The Switching Subsystem (SS): SS is also known as core network. Its main
part is the Mobile services Switching Center (MSC) which performs the switch-
ing of calls between the mobile and other xed or mobile network users as well
as mobility management.
2.1. ARCHITECTURE OF THE GSM NETWORK 27
Not shown is the Operations and Maintenance Center (OMC) which oversees the
proper operation and setup of the network. The MS and the BSS communicate
across the Um interface
1
. The Base Station Subsystem communicates with the
Mobile services Switching Center (MSC) across the A interface.
2.1.1 The Mobile Station MS
MS consists of the mobile equipment (the handset) and a smart card called the
Subscriber Identity Module SIM. The SIM provides personal mobility so that the
user can have access to subscribed services irrespective of a specic terminal. By
inserting the SIM card into another GSM terminal, the user is able to receive calls at
that terminal, make calls from that terminal and receive other subscribed services.
The mobile equipment is uniquely identied by the International Mobile Equip-
ment Identity (IMEI).
The SIM card contains the International Mobile Subscriber Identity(IMSI),
which is used to identify the subscriber. SIM also contains a secret key which
is required for authentication of the user and encryption of information.
The IMEI and the IMSI are independent thereby allowing personal mobility. The
SIM card may be protected against unauthorized use by a password or personal
identity number.
IMSI is a GSM-specic number which is used for internal signalling be-
tween the nodes of GSM. It is a secret information which is typically
unknown to the subscriber. For making calls and SMS, we use another
number known as MSISDN number
2
or simply phone number. MSISDN
looks similar to the phone numbers of xed line telephones. In HLR, the
mapping between MSISDN and IMSI can be performed.
2.1.2 Base Station Subsystem BSS
The Base Station Subsystem is composed of two types of network elements, the
Base Transceiver Station (BTS) and the Base Station Controller (BSC). These two
communicate across the standardized Abis interface
3
. The openness is desired to
allow the interconnection of BTS from one vendor to the BSC of another vendor.
1
also known as the air interface or radio link
2
Mobile Station ISDN Number
3
Although Abis is planned to be an open interface but typically BTS and BSC belong to the
same vendor.
28 CHAPTER 2. NETWORK ELEMENTS AND FUNCTIONALITIES
BTS
The Base Transceiver Station houses the radio transceivers that dene a cell and
handle the radio link protocols with the Mobile Stations In a large urban area, there
will potentially be a large number of BTSs deployed. Thus the requirements for a
BTS are ruggedness, reliability, portability and minimum cost. The most important
functions of BTS are:
Physical layer processing (channel coding, interleaving, puncturing etc.)
Uplink physical layer measurements
Radio transmission and reception
BSC
The Base Station Controller is the most important network element in BSS. It is
responsible for radio channel assignment, allotment, maintenance and release. One
BSC can control the operations of hundreds of BTS. BSC also controls the handover
procedures for connected mode mobility. BSC is the connection between the mobile
station and the Mobile service Switching Center MSC.
2.1.3 Switching Subsystem
Network Switching Subsystem (NSS) or Switching Subsystem (SS) is responsible for
switching the trac from one mobile operator to another operator or to PSTN.
MSC and VLR
The central component of the this subsystem is the Mobile services Switching Center
(MSC). It acts like a normal switching node of the PSTN or ISDN and additionally
provides all the functionality needed to handle a mobile subscriber such as registra-
tion, authentication, location updating, handovers
4
and call routing to a roaming
subscriber. These services are provided in conjunction with several functional enti-
ties which together form the switching subsystem. The MSC provides the connection
to the xed networks such as the PSTN or ISDN. Signalling between functional en-
tities in the this subsystem uses Signalling System Number 7 SS7 used for trunk
signalling in ISDN and widely used in current public networks.
4
in the case of Inter-BSC handovers
2.1. ARCHITECTURE OF THE GSM NETWORK 29
The Visitor Location Register (VLR) contains selected subscribers information from
the HLR necessary for call control and provision of the subscribed services for each
subscriber currently located in the geographical area controlled by the VLR. Al-
though each functional entity can be implemented as an independent unit, all man-
ufacturers of switching equipment implement the VLR together with the MSC so
that the geographical area controlled by the MSC corresponds to that controlled
by the VLR thus simplifying the signalling required. Note that the MSC contains
no information about particular mobile stations. This information is stored in the
location registers.
The following steps take place when a MS tries to register itself with an MSC/VLR.
Step 1: A subscriber sends its request to register with an MSC/VLR (Using IMSI).
Step 2: MSC analyzes the IMSI and nds out the home operator and the HLRs
address.
Step 3: MSC/VLR contacts the HLR and requests for subscribers information.
Step 4: Using this information, the serving MSC/VLR authenticates the subscriber.
Step 5: After successful authentication, VLR informs the HLR about the successful
registration. In future, if any incoming call or SMS arrives for this subscriber,
this MSC/VLR will be contacted for setting up the connection.
Gateway MSC GMSC
From basic operation and functionality, GMSC is in fact the same as MSC but its
logical role is dierent. GMSC is that MSC which is at the border of the PLMN
and interconnects one network to another. The main function of GMSC is HLR-
Interrogation. This procedure takes place when a Mobile Terminated Call (incoming
call) request comes to GMSC, and GMSC interrogates HLR regarding the current
location of a mobile subscriber.
To understand the role of GMSC, let us take a look at the sequence of events which
take place when an incoming
5
call comes.
Step 1: Mobile terminated call setup request arrives at GMSC (using MSISDN of
called party).
Step 2: GMSC queries HLR regarding the current location of subscriber
(using MSISDN number).
5
also known as Mobile Terminated Call (MTC)
30 CHAPTER 2. NETWORK ELEMENTS AND FUNCTIONALITIES
Step 3: HLR maps MSISDN to IMSI and nds the VLR address where UE was
last reported.
Step 4: HLR contacts VLR (using IMSI).
Step 5: VLR assigns a temporary Mobile Station Roaming Number (MSRN) to
this IMSI and sends it back to HLR.
Step 6: HLR sends MSRN to GMSC and hence the call can be forwarded to the
serving-MSC where the user is currently located.
The acceptance of an interrogation to an HLR is the decision of the operator. The
choice of which MSCs can act as Gateway MSCs is for the operator to decide (i.e.
all MSCs or some designated MSCs).
Home Location Register HLR
Home Location Register (HLR) is a central database that stores the information
about the subscribers. When a SIM card is issued to a mobile user, it gets reg-
istered in HLR. Afterwards, wherever the user goes, it gets registered with local
MSC/VLR and that MSC/VLR contacts HLR to get the administrative informa-
tion of the subscriber. In this way, HLR always keeps track of the users location.
This information is stored in the form of signalling address of VLR. HLR and VLR
communicate using MAP protocol of the SS7 signalling suite.
For each subscriber HLR contains a lot of information. Some of that is shown below:
IMSI of the subscriber
MSISDN of the subscriber
VLR-address which is currently serving this subscriber
List of Subscribed services
GPRS related data
Quality-of-service (QoS) prole
Subscribed supplementary services (e.g., Call Waiting, Call Forwarding, etc.)
There is logically one HLR per GSM operator but as the number of subscribers
grows, there can be more than one HLR in the network. It is also better to have
2.1. ARCHITECTURE OF THE GSM NETWORK 31
another HLR node for redundancy purpose. The second node can be used for backup
and for redundancy purpose. This arrangement can be used to guarantee the service
continuity in case of technical failure with the rst node. The information about
HLR-address can be found from the IMSI.
Equipment Identity Register EIR
The Equipment Identity Register (EIR) is a database that contains a list of all
valid mobile equipment on the network where each mobile station is identied by
its International Mobile Equipment Identity IMEI. An IMEI is marked as invalid if
it has been reported stolen or is not type-approved. An EIR maintains three lists:
1. Black: The IMEI numbers of the mobile handsets which have been reported
stolen or inappropriate are stored in black list.
2. White: The while list contains the few digits of IMEI number that identify the
handset type. In white list, there is no need to have the full IMEI number.
If a handset model has been approved by 3GPP standards, then its handset
type is stored in the white list.
3. Grey: Under the grey list of EIR, one can nd the IMEI numbers of phones
which are under surveillance. Every time, this handset is used to access the
network services, a log will be generated.
In the criminal investigation, IMEI number proves to be quite helpful. Sometimes,
criminals steal the phones and start using them with their own SIM cards. Fortu-
nately, the IMEI number of the handset can help the law enforcement agencies to
track the mobile equipment.
Authentication Center AuC
The Authentication Center (AuC) is a protected database that stores a copy of
the secret key stored in each subscribers SIM card. The AuC always resides in
the HPLMN. This network element is the most secured node in the whole PLMN.
The AuC generates security data which is used for authentication of users and
encryption of data over the radio channel. The secret master key (K) never leaves
the authentication center. The AuC feeds random number (RAND) and master key
(K) to a standards algorithm and generate security data. This security data is then
forwarded to the serving MSC/VLR in VPLMN.
32 CHAPTER 2. NETWORK ELEMENTS AND FUNCTIONALITIES
As described, MSC/VLR perform an authentication procedure to verify the identity
of the user at the time of registration. The relationship between MSC/VLR and the
AuC can be illustrated in gure 2.2.
Figure 2.2: Authentication of user during roaming
2.2 Improvements of GSM Standard
Compared to the mobile systems which were available till the 90s, GSM was a
magical invention and hence, a huge success in the commercial market.
The services oered by GSM could be summarized as:
Incoming and outgoing speech calls
Short message services
Supplementary services e.g., call forwarding, calling line identication presen-
tation etc.
Data services e.g., email, fax, web surng
In the next few sections, we will discuss the developments which improved the GSM
system in terms of eciency and user experience.
2.2. IMPROVEMENTS OF GSM STANDARD 33
2.2.1 CAMEL
Source: 3GPP TS 29.002 (MAP) & 3GPP TS 22.078, 23.078, 29.078
(CAP)
CAMEL (Customized Applications for Mobile network Enhanced Logic) is an
IN
6
architecture within the GSM based on 3GPP standardization. CAMEL pro-
vides mechanisms to support services independently of the serving network. With
CAMEL, it is possible to oer operator-specic services (OSS), that is, intelligent
network services, for the subscriber while roaming outside the home PLMN.
In order to support Intelligent-Network applications:
MSCs are often upgraded with a Service Switching Point (SSP) which resides
in VPLMN.
Operator-specic services can be generated in the Service Control Point (SCP)
which lies in HPLMN.
Inter-operator communication is guaranteed by using an open interface and
common protocol. The Interface between SSP-SCP is well-dened open inter-
face and the protocol used is called CAMEL Application Part (CAP).
CAMEL was developed under the framework of Virtual Home Environment, which
means that the subscriber should get the same look & feel of the services, inde-
pendent of the serving network, type of handset etc.
CAMEL within Home PLMN
Within Home PLMN (or Home Network), 2 functional entities are involved.
HLR: The HLR stores subscriber-related data, which also includes the informa-
tion whether the subscriber is a CAMEL subscriber. The HLR transfers the
CAMEL Subscription Information (CSI) to the network elements which need
it to be able to provide CAMEL services. These network elements have to
support CAMEL, and sending the CSI to these elements has to be allowed.
gsmSCF: The operator-specic services are executed in the gsmSCF, which con-
tains the service logics invoked during originating and terminating CAMEL
calls, originating SMSs, etc. The CAMEL standard does not specify the im-
plementation of operator-specic services.
6
Intelligent Network
34 CHAPTER 2. NETWORK ELEMENTS AND FUNCTIONALITIES
Figure 2.3: CAMEL Service Architecture (Phase 1)
CAMEL within visited PLMN
The PLMN where the CAMEL subscriber is roaming is called the visited net-
work (VPLMN). The VMSC, VLR & gsmSSF handle the processing of originating
CAMEL calls and forwarded calls, and terminating CAMEL calls.
Visited MSC: The VMSC sets up calls from and towards the visiting subscriber.
When handling service setup, the VMSC detects whether the subscriber has
CAMEL services. If the VMSC receives CSI from VLR and the triggering
criteria are met, an initial contact to the gsmSCF takes place. During the
CAMEL call, the gsmSCF may request the VMSC to monitor and report
certain call events.
gsmSSF: The gsmSSF acts as an interface from the MSC/GMSC towards the gsm-
SCF. The gsmSSF initiates the dialogue with the gsmSCF to get instructions
for the CAMEL call handling.
VLR: The VLR stores the CAMEL subscriber data received from the HLR of the
home network as part of the subscriber data of the subscriber roaming in the
VLR area. The VLR sends the subscriber data to the VMSC during originating
or forwarded call processing, and terminating call processing.
CAMEL standard has been gradually improved in phases. Currently, there are 4
phases:
CAMEL Phase 1
2.3. GPRS NETWORK ARCHITECTURE 35
CAMEL Phase 2
CAMEL Phase 3
CAMEL Phase 4
In order to identify the CAMEL phase, we must check which version of MAP &
CAP protocols are supported by gsmSSF, gsmSCF & HLR.
2.3 GPRS Network Architecture
In the list of services oered by GSM, there is a circuit switched data service but it
has 2 basic problems:
Low Bit rate (only 9.6 kbps)
Circuit switching & time-based charging
As explained in the previous module, HSCSD was introduced to improve the GSM
bit rates by roughly 5 times by allocating multiple time slots to the same subscriber.
But as the name suggests, HSCSD is also a circuit switched technology which relies
on time-slot management and time-dependent charging. In a data session, typically
we never use the channel 100% of allocation time. Hence, the operator has to allocate
the resources unnecessarily and the user has to pay for this channel for the whole
duration of the connection.
This was the main motivation to develop the concept of GPRS. GPRS is a packet
switched technology where the packets are carried using routers and not using
switches. Figure 2.4 clearly shows the combined GSM & GPRS network archi-
tecture.
On a general level, GPRS connections use the resources only for a short period of
time when sending or receiving data:
In a circuit-switched system, the line is occupied even when no data is trans-
ferred.
In a packet-switched system, the resources are released so they can be used by
other subscribers.
36 CHAPTER 2. NETWORK ELEMENTS AND FUNCTIONALITIES
Figure 2.4: GPRS Network Architecture
The General Packet Radio System (GPRS) is a new service that provides actual
packet radio access for mobile GSM and time-division multiple access (TDMA)
users. The main benets of GPRS are that it reserves radio resources only when
there is data to send and it reduces reliance on traditional circuit-switched network
elements. The increased functionality of GPRS decreases the incremental cost to
provide data services and increases the penetration of data services among consumer
and business users.
In addition to providing new services for todays mobile user, GPRS is an important
migration step toward third-generation (3G) networks. GPRS will allow network
operators to implement an IP-based core architecture for data applications, which
will continue to be used and expanded upon for 3G services for integrated voice
and data applications. Today, everyone knows that packets are transported using
routers. Prior to GPRS, the packets were carried via switches (MSCs) which is very
inecient if the nature of trac is bursty.
2.3.1 GPRS Mobile Terminals
New mobile terminals are required because existing GSM phones do not handle the
enhanced air interface nor do they have the ability to packetize trac directly. All
these terminals will be backward compatible with GSM for making voice calls using
GSM.
2.3. GPRS NETWORK ARCHITECTURE 37
Class A terminals: Class A terminals support simultaneous circuit-switched (CS)
and packet-switched (PS) trac.
Class B terminals: Class B terminals attach to the network as both CS and PS
clients but only support trac from one service at a time. They can monitor
GSM and GPRS channels simultaneously. In other words, a Class B terminal
can support simultaneous attach, activation, and monitor, but not simultane-
ous trac.
Class C terminals: Class C terminals support attach to only one type of network
(either CS or PS). The user must manually select the service to which it wants
to connect. Therefore, a Class C terminal can make or receive calls from only
the manually (or default) selected service. The service that is not selected is
not reachable.
The three modes of operation are dened in 3GPP TS 22.060.
2.3.2 GPRS Base Station Subsystem
Impact of GPRS on BSC
Each BSC will require the installation of one or more Packet Control Unit (PCUs)
and a software upgrade. The PCU provides a physical and logical data interface
out of the base station system (BSS) for packet data trac. When either voice or
data trac is originated at the subscriber terminal, it is transported over the air
interface to the BTS, and from the BTS to the BSC in the same way as a standard
GSM call. However, at the output of the BSC the trac is separated; voice is sent
to the mobile switching center (MSC) per standard GSM, and data is sent to a new
device called the SGSN, via the PCU over a Frame Relay interface.
Impact of GPRS on BTS
The BTS may also require a software upgrade but typically will not require hardware
enhancements. The upgrade in BTS is called Channel Control Unit (CCU) which
is responsible for adaptive coding (CS-1 , 2 , 3 and 4).
The CCU (Channel Coding Unit) in the BTS performs channel coding whose rate
is adapted to the radio transmission conditions:
CS-1 (Channel Coding Scheme 1) - 9.05 kbps
CS-2 (Channel Coding Scheme 2) - 13.4 kbps
38 CHAPTER 2. NETWORK ELEMENTS AND FUNCTIONALITIES
CS-3 (Channel Coding Scheme 3) - 15.6 kbps
CS-4 (Channel Coding Scheme 4) - 21.4 kbps
2.3.3 New Elements in the Core Network
Source : 3GPP TS 23.060
SGSN
At the hierarchical level, SGSN can be considered as an MSC with in-built VLR for
PS users. In other words, SGSN can be viewed as a packet-switched MSC. Very
similar to the CS registration with MSC/VLR, a GPRS mobile station has to register
with SGSN. This registration process is called GPRS attach. After entering a new
area, GPRS user reports its location to the corresponding SGSN. Thus SGSN is
responsible for the registration of new mobile subscribers, and keep a record of their
location inside a given area. In other words, SGSN performs mobility management
functions such as mobile subscriber attach/detach and location management. The
SGSN is connected to the base-station subsystem via a Frame Relay connection to
the PCU in the BSC.
For a better understanding, the following section breaks down the attach process of
GRPS into several steps and explains it.
Step 1: A subscriber sends its request to register with an SGSN (Using IMSI).
Step 2: SGSN analyzes the IMSI and nds out the home operator and HLRs
address.
Step 3: SGSN contacts HLR and requests for subscribers information (e.g., Sub-
scribers service prole, QoS agreement, max bit rate etc., authentication re-
lated data).
Step 4: Using this information, the serving SGSN authenticates the subscriber.
Step 5: After successful authentication, SGSN informs HLR about the successful
registration.
At this moment, a so-called MM-Context is generated at MS and SGSN. In other
words, a logical-connection has been established between MS and SGSN. This con-
nection is not enough to receive/transmit IP packets because the MS does not have
an IP address yet.
The main functions of SGSN can be summarized as:
2.3. GPRS NETWORK ARCHITECTURE 39
Mobility Management
Subscribers registration and authentication
Charging Data Records (CDR) collection
Ciphering
7
Packet routing
Gateway GPRS Support Node
When we observe the GPRS network from the outside worlds viewpoint, it appears
that GPRS is nothing but a private IP network owned by the mobile operator. The
access to this IP network is allowed only via a gateway router known as GGSN.
Hence GGSNs are used as interfaces to external IP networks such as the public
Internet, other mobile service providers GPRS services, or enterprise intranets.
UE establishes an IP connectivity with GGSN via a procedure known as PDP
Context Activation. This procedure takes place in following sequence:
Step 1: MS sends PDP activation requests by specifying the Access Point Name
(APN) Access Point Name (APN) and requested Quality-of-Service (QoS).
Step 2: SGSN translates APN into the IP address of GGSN with the help of a DNS
system.
Step 3: SGSN forwards the request to GGSN and GGSN allocates an IP address
to the mobile user.
Step 4: GGSN informs SGSN and SGSN informs MS about the successful PDP
context activation. From this moment, MS is known in the IP world because
it has been allocated a valid IP address.
At this point, a so-called PDP Context is generated at MS, SGSN and GGSN side.
The main functions of GGSN can be summarized as:
Packet routing
Charging Data Records (CDR) generation
Firewall functionality
7
(only in 2G but not in 3G SGSN)
40 CHAPTER 2. NETWORK ELEMENTS AND FUNCTIONALITIES
IP-address allocation
QoS negotiation
Session management (e.g., PDP context activation)
GGSNs maintain routing information that is necessary to tunnel the protocol data
units (PDUs) to the SGSNs that service particular mobile stations.
A more detailed information about each parameter of MM-context and
PDP-context goes beyond the scope of this book. 3GPP TS 23.060
8
contains tables which show the information storage structures required
for GPRS. There, we can also nd details about subscription data stored
in the HLR. For proper GPRS operation, MM-context must be stored
in UE & SGSN; PDP-context must be stored in UE, SGSN & GGSN.
Please refer to 3GPP TS 23.060 to get more details.
2.3.4 Other Changes
The databases in the GSM network, such as the Home Location Register (HLR)
that handle the mobility management in the network also require software updates
to be able to handle the GPRS functions. Other than these standard nodes, the
GPRS network also requires the following network functionalities:
Border Gateway (BG)
The BG is a special rewall which connects SGSN or GGSN to GPRS Roaming
Exchange (GRX) which is used for inter-PLMN connectivity. To understand the
role of BG, please refer to gure 2.5.
Charging Gateway (CG)
The Charging Gateway or charging gateway functionality (CGF) is used for col-
lecting the CDRs from SGSN and GGSN. Quite often, the format of CDRs is not
standardized and varies strongly from one vendor to another. Charging gateway
functionality is used for transforming the CDRs into a standard form and forward
them to the billing center. It helps the telecom operators to implement dierent
services with little billing and charging eort as well as protecting the subscriber
8
General Packet Radio Service (GPRS); Service description
2.3. GPRS NETWORK ARCHITECTURE 41
and operator from wrong charging. During PDP context activation the GGSN sends
a charging ID (CID) to the SGSN. During the billing process, CDRs are regularly
sent from each network node to a central billing centre. The CID is used to merge
the records from dierent network nodes which apply to the same subscriber.
Domain Name System (DNS)
While activating the PDP context, UE sends Access Pint Name (APN) to SGSN.
APN is a user-friendly name which is designed for the comfort of human beings.
But routers cannot work with these names. GSGN uses DNS to translate the APNs
into the IP-Address of GGSN
9
.
Lawful Interception Gateway (LIG)
LIG is used for law enforcement agencies (like police) to monitor the activities of
some suspicious subscriber.
Firewall
Firewall is used to lter the malicious packets and keep GPRS networks safe from
unwanted virus and other threats. Quite often, Firewall functionality is implemented
in the GGSN itself.
2.3.5 GPRS Roaming Scenario
Till now, we have observed that a packet in GPRS network takes the following path:
Radio Network (BSS) SGSN GGSN
The path shown above is depicted in the upper half of gure 2.5. This is true as long
as the SGSN and GGSN both reside in the same network. In other words, when the
user is not roaming.
However, in roaming scenarios, the most popular implementation is to use the
SGSN in Visited PLMN and GGSN in the Home PLMN. This inter-PLMN connec-
tion is made using a private IP-backbone owned by one of the operators or by a
third party. This scenario is depicted by the lower half of gure 2.5.
We hereby like to briey mention the two scenarios:
9
The same principle is used in internet for translating URLs into an IP address.
42 CHAPTER 2. NETWORK ELEMENTS AND FUNCTIONALITIES
Figure 2.5: Data Access during roaming and non-roaming scenario
1. In non-roaming scenario: In non-roaming scenario, both SGSN and GGSN
are located in the same PLMN using intra-PLMN backbone commonly
known as the Gn interface.
2. In roaming scenario: In roaming scenario, SGSN resides in the VPLMN whereas
GGSN resides in the HPLMN. The two GPRS nodes are connected to each
other using inter-PLMN backbone using Gp interface via a secure border
gateway functionality. Gp is the name of the interface between SGSN and
Border Gateway and GGSN and Border Gateway.
2.4 Migration to 3G Network Architecture
In order to re-use the investments of GSM and to minimize the rollout cost of UMTS,
it was decided that the existing GSM & GPRS core network will be slightly modied
but the very same nodes will be utilized to provide access to both
10
the radio access
networks. There were some minor modications dened for 3G MSC and 3G SGSN.
Many authors like to show these changes as interworking functionality IWF and
10
TDMA based 2G radio network BSS and WCDMA based 3G radio network UTRAN
2.5. UTRAN 43
reuse the same conventional MSC and SGSN.
Figure 2.6: Block Diagram of Combined GSM & UMTS Network Architecture
As a starting point, we should consider combined GSM, GPRS & UMTS the
network architecture as a combination of the following subsystems:
1. GSM Base station Subsystem: BTS and BSC
2. GSM CS core network: MSC and GMSC
3. GPRS CN: SGSN and GGSN
4. UTRAN: newly developed WCDMA based radio access network
5. Common units: Databases, registers, application servers and billing system
From this list, all objects except UTRAN have been already discussed in this chapter.
Therefore, in the following section, we will concentrate on the details of UTRAN.
2.5 UTRAN
UMTS Terrestrial Radio Access Network (UTRAN) is the brand new Wideband
CDMA-based access network dened for 3G UMTS networks. UTRAN is divided
44 CHAPTER 2. NETWORK ELEMENTS AND FUNCTIONALITIES
into several Radio Network Subsystems where each RNS is managed by one RNC.
A RNS typically consists of hundreds of base stations known as Node B.
The Radio Network System (RNS) is the system of base station equipments (transceivers,
controllers, etc. . . . ) which is viewed by the MSC through a single Iu-interface as
being the entity responsible for communicating with Mobile Stations in a certain
area. Similarly, in PLMNs supporting GPRS, the RNS is viewed by the SGSN
through a single Iu-PS interface. In short,the RNS consists of one Radio Network
Controller (RNC) and one or more Node B.
Figure 2.7: UMTS Network Architecture
2.5.1 Node B
Node B can be simply considered as the BTS of 3G. The main functions of Node
B is to establish the physical implementation of Uu interface and Iub interface. The
realization of Uu interface means that Node B implements WCDMA physical chan-
nels and converts the information coming from transport channels to the physical
channels under control of RNC. For the Iub interface, Node B performs the inverse
functionality. It should be noted here that Node B owns only physical channels
resources whereas transport channels are completely managed by RNC.
Spreading
2.5. UTRAN 45
Figure 2.8: New Interfaces dened in UTRAN Iub, Iur and Iu
Scrambling
Modulation
Channel Coding
Interleaving
Power Control
Synchronization
Measurement reporting
2.5.2 RNC
Radio Network Controller (RNC) is the main controlling element in UTRAN, since
it owns all the logical resources of Radio Network Subsystem. It is responsible for
controlling the use and integrity of all 3G radio resources by the means of performing
Radio Resource Management (RRM) procedures. This includes functions such as
handover and admission control, power control and code allocation, radio resource
control (RRC) and macro diversity combining (MDC).
46 CHAPTER 2. NETWORK ELEMENTS AND FUNCTIONALITIES
RNC is the central unit in 3G RAN. It also plays an important role in conguration
management because the radio related parameters for the whole RNS are stored in
RNC. For performance management, RNC updates counters, which are later used
to calculate the key performance indicators (KPIs) for RAN. RNC also provided
support in fault management by keeping track of the alarms in any Node B controlled
by that particular RNC.
Radio Resource Management
Management of System information
Alarms handling
Interworking node Iub and Iu interfaces
Operation and Maintenance
Performance Measurement
RNC works as the intermediate node which connects Core Network (CN) to RAN. It
is possible that the transport technologies in RAN and Core are dierent (e.g., One
side is using ATM and the other side IP). In that case, RNC performs the protocol
conversion required for interworking.
2.6. LOGICAL ROLES OF RNC: S-RNC AND D-RNC 47
2.6 Logical roles of RNC: S-RNC and D-RNC
Figure 2.9: Logical Roles of RNC: SRNC and DRNC
In UMTS, while the user is moving from one cell to another, radio links are added
and deleted without breaking the connection. This is called Soft Handover. If the
two cells belong to 2 dierent RNCs, then SHO is possible only if the Iur interface
between the two RNCs exists. Otherwise, a hard handover takes place which can
be compared to Inter-BSC handover of GSM.
As shown in gure 2.9, the logical role played by RNC can earn it 3 dierent titles.
Controlling RNC (CRNC): CRNC of Cell # 1 is the RNC which controls the
operation of cell by dening its load and other parameters. For all the tele-
48 CHAPTER 2. NETWORK ELEMENTS AND FUNCTIONALITIES
com procedures happening in cell #1, RNC #1 is responsible. Therefore, the
CRNC of cell #1 is RNC#1.
Serving RNC (SRNC): SRNC of UE is the RNC, which has a signalling connec-
tion (RRC Connection) with UE. From Core Network viewpoint, UE is con-
nected to only this RNC because Core Network (MSC or SGSN) receives/sends
data from/to this RNC only. UE always has only one SRNC. Serving RNC
owns all logical resources belonging to the user connection. Serving RNC is
the place where the Macro Diversity Combining (MDC) is executed.
Drift RNC (DRNC): DRNC of UE is the RNC which is involved in soft handover
but is not the SRNC. The DRNC is CRNC of one of the cells which are involved
in Soft Handover. DRNC comes into play only if we have Inter-RNC Soft HO.
Please refer to gure 2.9 for clear understanding.
Whenever we talk about Soft HO, there is always a discussion of Micro or Macro-
diversity.
Micro-diversity: Micro-diversity comes into play when UE is involved in Soft han-
dover with 2 cells which belong to the same Node B. This special case of soft
HO is called Softer HO. Micro-diversity combining takes place in Node B.
Macro-diversity: Macro-diversity comes into play when UE is involved in soft
handover with 2 or more cells which belong to 2 (or 3) dierent Node Bs.
Macro-diversity combining takes place in RNC.
2.6. LOGICAL ROLES OF RNC: S-RNC AND D-RNC 49
Summary of R99 Network Architecture
Source: 3G TS 23.002 V3.1.0; Network architecture
Figure 2.10: Conguration of a PLMN and Interfaces (Source TS 23.002)
50 CHAPTER 2. NETWORK ELEMENTS AND FUNCTIONALITIES
2.7 Release 4 Modications
Source:
Overview of 3GPP Release 4 V1.1.2 (2010-02)
3GPP TS 23.205 V4.0.0; Bearer Independent CS Core Network
3GPP TS 23.002 V4.8.0; Network architecture
Figure 2.11: BICC Network Architecture or Split Architecture
As shown in chapter 1, after Rel-99, 3GPP stopped naming the releases after the
year as they did in Rel-95, 96, etc. The rst set of modications introduced were
called 3GPP Rel-4. In short, the history and future follows this path: Rel-96
Rel-97 Rel-98 R99 Rel-4 Rel-5 Rel-6 and so on.
3GPP Rel-4 specications were frozen in March 2001. One of the highlights of Rel-4
is known as Bearer Independent Call Control. In order to understand this feature,
please refer to the CS part of core network in gure 2.11.
The objective of this feature is to separate the user plane (trac) and control plane
(signalling) in the Circuit Switched (CS) domain. This new scheme oers a better
2.7. RELEASE 4 MODIFICATIONS 51
transport resource eciency and a convergence with the Packet Switched (PS) do-
main transport. Also, this enables to use one single set of layer 3 protocols on top
of dierent transport resources as ATM, IP, STM, or even new ones.
The users shall not notice whether they are connected to a bearer independent CS
network or to a classical CS domain. Also, none of the protocols used on the radio
interface is modied by this feature. This means, for example, there is no need for
the terminals to support IP even if IP is the transport protocol used in the network.
Using BICC, the trac is switched using CS-MGW which is capable of handling all
modern codecs (e.g., 4.75 kbps AMR ). Thus the speech can be transported from
one CS-MGW to another CS-MGW without the need of transcoding. This feature
has at least three direct benets for the operator:
Reduced cost of transmission: The utilization of ATM/IP resources reduces sig-
nicantly compared to the conventional MSCs. Because speech must be transcoded
into 64 kbps TDM format so that MSCs can handle it. Using BICC, the need
of transcoding arises just before the speech packet leaves UMTS domain and
enters PSTN. In conventional CS core network, the transcoding is performed
as soon as the rst MSC is encountered, whereas in BICC, transcoding is
performed by the last CS-MGW in the chain.
Improved capacity: By avoiding the unnecessary transcoding, the speech quality
gets improved. In CDMA networks, this turns out to be a gain in network
capacity.
Reduced delay: If transcoding is not performed, then the delay caused by transcod-
ing is also avoided. This reduces the transmission delay and improved users
perception.
2.7.1 Architecture
The basic principle is that the MSC is split into an MSC server and a (Circuit-
Switched) Media Gateway (CS-MGW), the external interfaces remaining the same
as much as possible as for a monolithic MSC.
According to 23.002, When needed, the MSC can be implemented in
two dierent entities: the MSC Server, handling only signalling,
and the CS-MGW, handling users data. A MSC Server and a
CS-MGW make up the full functionality of a MSC.
The MSC server provides the call control and mobility management functions,
and
52 CHAPTER 2. NETWORK ELEMENTS AND FUNCTIONALITIES
The CS-MGW provides the stream manipulating functions, i.e. bearer control
and transmission resource functions.
The same applies to the GMSC, split into a GMSC server and a CS-MGW.
Figure 2.12: BICC Network Architecture and Interworking with PSTN
MSC Server
The MSC Server comprises all the call control and mobility control parts of an MSC.
As such, it is responsible for the control of mobile originated and mobile terminated
CS domain calls. It terminates the user to network signalling and translates it into
the relevant network to network signalling. It also contains a VLR.
The MSC Server controls the parts of the call state that pertain to connection control
for media channels in a CS-MGW.
A GMSC Server is to a GMSC as an MSC Server is to an MSC.
CS-MGW
The CS-MGW interfaces the transport part of the UTRAN/BSC with the one of
the core network over Iu or the A interface. It interacts with the (G)MSC server for
resource control.
2.7. RELEASE 4 MODIFICATIONS 53
A CS-MGW may also terminate bearer channels from a circuit switched network
and media streams from a packet network (e.g., RTP streams in an IP network).
As the entity interfacing the access and the core network, the CS-MGW operates
the requested media conversion (it contains e.g., the TRAU), the bearer control and
the payload processing (e.g. codec, echo canceller, conference bridge). It supports
the dierent Iu options for CS services (AAL2/ATM based as well as RTP/UDP/IP
based).
2.7.2 New Interfaces
CS-MGW to MSC Server (Mc)
The Mc reference point describes the interfaces between the MSC Server and CS-
MGW, and between the GMSC Server and CS-MGW. It supports a separation of
call control entities from bearer control entities, and a separation of bearer control
entities from transport entities. It uses the H.248/IETF Megaco protocol, jointly
developed by ITU-T and IETF.
MSC-Server to MSC-Server (Nc)
Over the Nc reference point, the Network-Network based call control is performed.
Examples of this are ISUP or an evolvement of ISUP for Bearer Independent Call
Control (BICC).
CS-MGW to CS-MGW (Nb)
Over the Nb reference point, the bearer control and transport are performed. Dif-
ferent options are possible for user data transport and bearer control.
54 CHAPTER 2. NETWORK ELEMENTS AND FUNCTIONALITIES
2.8 Release 5 Modications
Source:
Overview of 3GPP Release 5 V0.1.1 (2010-02)
3GPP TS 23.002 V5.12.0; Network Architecture
Release 5 is a very important release because HSDPA was introduced in it. From
the architecture perspective too, there were very signicant improvements suggested
by 3GPP in REL-5 specications. The IMS
11
is standardized by 3GPP in Rel-5.
Usage of IP on the transport plane was another improvement which was introduced
in this release. These features are briey illustrated below.
2.8.1 IP Transport
In Rel-99 and Rel-4, only ATM can be used at the transport layer in the various
interfaces. Rel-5, introduces the possibility to use IP at the transport layer in the
Iub, Iur, Iu-Ps and Iu-Cs interfaces, as an alternative to ATM. However, the use of
ATM at the link layer under IP is not precluded. For more detailed description of
the protocol stacks, please refer to chapter 6.
The introduction of IP as a transport protocol in the radio network does not imply
an end to end IP network; the UE may be given an IP address by the higher layers,
but it will not be part of the UTRAN IP network (which is private), and packets
will be encapsulated in the corresponding User Plane protocol. 3GPP has made a
choice for the protocols to transport the Radio and Signalling bearers over IP.
Dierent solutions are adopted. UDP is used in the user plane in the three interfaces,
and SCTP with additional protocols is used for the signalling bearers. Addition-
ally, 3GPP resulted in the following decisions on QoS and interworking with ATM
transport networks:
Diserv is the mechanism to provide dierent service levels, and several al-
ternatives are allowed for the trac ow classication. It is also allowed that
the QoS dierentiation can be provided either on a hop-by-hop basis or on a
edge-to-edge basis;
Interworking with Rel-99/Rel-4 and Rel-5 ATM nodes is required, and it can
be accomplished via a dual stack, a logical interworking function or a separate
Interworking unit.
11
Now a days, IMS is a very hot topic because in LTE, there is a provision of supporting IMS-
based Voice service over PS-domain.
2.8. RELEASE 5 MODIFICATIONS 55
2.8.2 IP Multimedia Subsystem (IMS)
Figure 2.13: Overview of IMS architecture
Home Subscriber Server
Home Subscriber Server (HSS) is an evolved version of HLR. From Rel-5 onwards,
the name of HLR is changed into HSS to emphasize that this database contains
not only location-related data but also subscription-related data, like the list of
services the user is able to get and the associated parameters. It keeps track of
which subscribers belong to the network and their service capabilities. The CSCF
consults with the HSS before initiating SIP connections.
Media Gateway Control Function (MGCF)
MGCF performs translation of SIP signalling messages into ISUP messages which
can be understood by the PSTN switches. As the name suggests, MGCF controls
the functions of IM-MGW.
56 CHAPTER 2. NETWORK ELEMENTS AND FUNCTIONALITIES
IP Multimedia Media Gateway Function (IM-MGW)
An IM-MGW is used to terminate bearer channels from circuit switched infrastruc-
tures and media streams from packet data networks. For instance, when it interfaces
an ISDN network, it takes the data of voice from i-law PCM call, processes the user
data bits with a voice codec (e.g. AMR), before forwarding the voice information
via RTP/UDP/IP over a packet network. To do so, an IM-MGW requires its own
resources, such as codecs, echo cancellers, and conference bridges. The IM-MGW
communications with the Media Gateway Control Function (MGCF) for resource
control via the interface Mc. For this interface, the media gateway control protocol
H.248 is applied.
Proxy-Call State Control Function (P-CSCF)
P-CSCF is the rst contact point of IMS. It is located in the same network as the
GGSN (visited or home network). Its main task is to select the I-CSCF of the Home
Network of the user. It also performs some local analysis (e.g. number translation,
QoS policing,..).
Interrogating-CSCF (I-CSCF)
I-CSCF is the main entrance point of the home network: it selects (with the help
of HSS) the appropriate S-CSCF.
Serving-CSCF (S-CSCF)
S-CSCF performs the actual Session Control. It handles the SIP requests, performs
the appropriate actions (e.g. requests the home and visited networks to establish
the bearers), and forwards the requests to the S-CSCF /external IP network of other
end users, as applicable. The S-CSCF might be specialized for the provisioning of a
(set of) service(s).
2.9 Release 6 Modications
Source: Overview of 3GPP Release 6 V0.1.1 (2010-02)
2.9. RELEASE 6 MODIFICATIONS 57
2.9.1 IMS for IP-CAN or IMS phase 2
IMS was primarily designed in Rel-5 to work on top of UMTS/GPRS using SIP
signalling but in 3GPP Rel-6, it was extended to work on top on non-GPRS
based access and SIP terminal equipments. ETSI TISPAN
12
has worked very
hard to adapt the IMS for requirements of xed networks.
Figure 2.14: Usage of IMS expanded for any IP access network
As shown in gure 2.14, the access network for using IMS services is no more re-
stricted to GPRS & UMTS. The name chosen for this generic access network is
IP-Connectivity Access Network (IP-CAN). Some of the examples of IP-CAN are
DSL, Cable, Wired and Wireless LAN, LTE etc.
IP-CAN of 3GPP Rel-6 also addresses the issues like:
Policy Control: Policy Decision Function in the IMS (e.g., in P-CSCF) and
Policy Enforcement Function in the IP-CAN (e.g., in GGSN)
Security
User and service prole
UE and ISIM/USIM
IP version issues
12
TISPAN: Telecommunications and Internet converged Services and Protocols for Advanced
Networking
58 CHAPTER 2. NETWORK ELEMENTS AND FUNCTIONALITIES
SIP Compression
Emergency calls
2.10 Rel-7 & Rel-8 Modications
3GPP REL-7 & 8 have introduced a lot of improvements of HSDPA & HSUPA
of REL-6. This bundle-of-enhancements is collectively called as evolved-HSPA or
HSPA+. Since, we have not discussed the details of HSPA yet, it makes no sense to
talk about HSPA+ in this module.
In nutshell, we can say that HSPA+ is trying to:
Push the peak bit rates of HSDPA & HSUPA higher
Reduce the battery consumption for continuous connectivity
Reduce the latency (transfer delay)
3GPP REL-7 & 8 have also introduced some changes in the core network to optimize
the network performance towards lower latency. These changes in the PS core
network are popularly called as one tunnel solution. Figure 2.15 shows the changes
introduced in Rel. 7 & 8.
1. As in conventional GPRS, EDGE, UMTS & HSPA (R6), there are two tunnels:
One between GGSN & SGSN and the other one between SGSN & RNC. That
means, SGSN takes out the IP packets from one tunnel and packs it into
another tunnel. This procedure certainly takes some time.
2. In Rel-7, there is a mechanism for One- Tunnel- Solution. This allows
SGSN to be involved with only a control plane, e.g., connection setup, mobility
management, authentication etc. SGSN does not appear in the chain for user
plane trac ow. User data can be directly tunneled from GGSN to RNC.
Although this solution reduced the round trip time but there are some com-
plications with this scheme.
(a) Volume-dependent charging at SGSN will not be possible with this solu-
tion.
(b) For Lawful Interception also, SGSN will not be able to provide any details
about the packet transmitted during the session.
2.10. REL-7 & REL-8 MODIFICATIONS 59
3. In Rel-8, the concept of one tunnel can be extended by one more step where
the user data is directly tunneled from GGSN to Node B. But we must not
forget that this Node B is a special one. The Node B has in-built capability
of RNC.
Figure 2.15: Direct Tunnel Solution of REL-7 & REL-8
60 CHAPTER 2. NETWORK ELEMENTS AND FUNCTIONALITIES
Copyright Notices
In order to create some gures, tables and text-sections, the following reference ma-
terial has been used. Information has been interpreted and presented in a simplied
manner. The original references are provided here.
Main reference material for this book has been technical specications (TSs) and
technical reports (TRs) of 3rd Generation Partnership Project (3GPP).
Figure 2.10 on page 49 Figure 1 of TS 23.002 v 3.1.0
c 1999. 3GPP
TM
TSs and TRs are the property of ARIB, ATIS, ETSI, CCSA,
TTA, and TTC who jointly own the copyright for them. They are subject to
further modications and are therefore provided to you as is for information
purposes only. Further use is strictly prohibited.
Text on page 51 Section 4.1.1 of Overview of 3GPP Release
4 v 1.1.2
Text about MSC Server on page
52
Section 4.1.2.1 of Overview of 3GPP Re-
lease 4 v 1.1.2
Text about CS-MGW on page 52 Section 4.1.2.2 of Overview of 3GPP Re-
lease 4 v 1.1.2
Figure 2.11 on page 50 Figure: BICC Network Architecture of
Overview of 3GPP Release 4 v 1.1.2
Figure 2.12 on page 52 Figure: Bearer Independent Core Network
with A- and Iu-Interfaces of Overview of
3GPP Release 4 v 1.1.2
Text in section 2.7.2 on page 53 Section 4.1.3.1, 4.1.3.2 & 4.1.3.3 of
Overview of 3GPP Release 4 v 1.1.2
Text in section 2.8.1 on page 54 Section 6.1 of Overview of 3GPP Release 5
v 0.1.1
Text about CSCF on page 56 Section 12.2 of Overview of 3GPP Release
5 v 0.1.1
c 2010. 3GPP
TM
TSs and TRs are the property of ARIB, ATIS, ETSI, CCSA,
TTA, and TTC who jointly own the copyright for them. They are subject to
further modications and are therefore provided to you as is for information
purposes only. Further use is strictly prohibited.
BIBLIOGRAPHY
[1] 3GPP TS 25.401 Ver. 7.0.0 ;UTRAN overall description
[2] 3GPP TS 23.002 ver. 3.1.0 ;Network architecture
[3] 3GPP TS 23.002 ver. 4.0.0 ;Network architecture
[4] 3GPP TS 23.002 ver. 5.0.0 ;Network architecture
[5] 3GPP TS 29.002 ver. 3.0.0 ;Mobile Application Part (MAP) specication
[6] 3GPP TS 22.078 ver. 9.0.0 ;Customised Applications for Mobile network En-
hanced Logic (CAMEL) Service description
[7] 3GPP TS 23.078 ver. 5.0.0 ;Customised Applications for Mobile network En-
hanced Logic (CAMEL) Phase 4
[8] 3GPP TS 29.078 ver. 5.0.0 ;CAMEL Application Part (CAP) specication
[9] 3GPP TS 23.205 ver. 4.0.0;Bearer Independent CS Core Network
[10] 3GPP TS 23.060 ver. 6.0.0 ;General Packet Radio Service (GPRS); Service
description
[11] 3GPP TS 22.060 ver. 6.0.0 ;General Packet Radio Service (GPRS); Service
description
[12] Overview of 3GPP Release 4 v 1.1.2 ; Available at
http://www.3gpp.org/ftp/Information/WORK PLAN/Description Releases/.
[13] Overview of 3GPP Release 5/ 6 / 7 /8 . . . ; Available at
http://www.3gpp.org/ftp/Information/WORK PLAN/Description Releases/.
[14] H.Holma and A. Toskala, WCDMA for UMTS , 5th Edition, John Wiley
& Sons.
61
CHAPTER
3
WCDMA AIR INTERFACE
The main dierence between GSM of second generation and UMTS of third genera-
tion is the air interface technology. The switches, routers and databases in the core
network behave in the the same manner in both the technologies. Therefore, un-
derstanding the concepts of UMTS air interface is a very important part in learning
3G fundamentals. This module tries to cover the basic principles about spreading,
code multiplexing and physical layer processing of the data in UMTS.
3.1 Duplex Methods
Because commercial mobile networks are used to send as well as receive data from
UE, they are duplex systems. This is dierent from simplex transmission as in TV
or radio broadcast where the user only receives but does not send data. Hence, in
mobile communication we use full-duplex. There are two popular methods which
can be used to separate the signals from UE to Node B, Uplink and Node B to UE,
Downlink. They are:
FDD: As shown in gure 3.1, in FDD scheme, user sends his data on one frequency
and receives on another one. These 2 frequencies must be separated by several
MHz. FDD can only operate in paired band. For every uplink frequency, there
62
3.2. MULTIPLE ACCESS TECHNOLOGIES 63
Figure 3.1: Popular duplexing methods - FDD & TDD
is a downlink frequency. This pair of frequencies forms a carrier. For example,
GSM is a FDD system.
TDD: In contrast with FDD, TDD operates in an unpaired spectrum. The same
frequency is used for both uplink and downlink. This is achieved by organizing
the time into time slots and assigning some lots to uplink and remaining slots
for downlink.
According to 3GPP, UMTS can operate both in FDD and TDD mode. But FDD has
been a more popular choice among the commercial telecom operators. According
to common practice and usage, when someone speaks of UMTS, we undoubtedly
assume that UMTS-FDD is referred to. But for TDD, it must be explicitly men-
tioned that we are referring to the UMTS-TDD version. Both technologies have
their advantages and disadvantages but we will investigate only the FDD part in
this book due to its popularity.
3.2 Multiple Access Technologies
In the previous section, we saw 2 methods to separate the uplink and downlink
streams. Now, if we imagine a cell with several users simultaneously accessing the
64 CHAPTER 3. WCDMA AIR INTERFACE
Figure 3.2: Popular multiple-access methods
services, their individual signals will interfere with each other and cause distur-
bance in the transmission and reception. In order to avoid or minimize the eect of
interference from other users, several multiple access schemes have been designed.
In other words, multiple access technique is a method by which multiple users can
share the same radio resources. This sharing can be in time domain, frequency
domain or in power domain. Hence, we have several options for multiple access
schemes. Some of them are briey
1
mentioned here:
3.2.1 Frequency Division Multiple Access
FDMA is a multiple access scheme where the total frequency spectrum is divided
into small radio channels and each user is allocated one radio channel. This is one of
the oldest radio techniques which was used in 1G cellular systems like NMT, C-Nets,
AMPS etc. Figure 3.2 shows FDMA principle in the left upper subgure.
In FDMA, several users use the radio resources at their allocated section of frequency
spectrum.
1
The discussion is kept very short because generally these topics are well known.
3.3. UMTS OPERATING BANDS AND SPECTRUM 65
3.2.2 Time Division Multiple Access
In the TDMA multiple access scheme, the time resource is structured into TDMA
frames and each frame is further divided into time slots. Each user is allocated one
time slot every TDMA frame. Therefore, in TDMA we can accommodate only as
many users as the number of time slots per TDMA frame. In GSM, such a scheme
with 8 slots per frame is used.
In TDMA, several users use the radio resources at their scheduled time intervals.
3.2.3 Code Division Multiple Access
CDMA is the main topic to be discussed in this chapter because air interface tech-
nology used in UMTS air interface is based on Wideband CDMA.
In CDMA, several users are allowed to use the same frequency resource at the same
time but their signals are separated by codes. Theoretically, we can accommodate
as many simultaneous users as the number of codes. It sounds like magic but
this scheme has its limitation. The communication with acceptable quality can be
maintained as long as the interference at the receiver is within allowed limits. If
the interference rises, the transmitter should increase the power to ght against the
disturbance. But the power of UE and Node B are nite. Therefore, CDMA systems
are also called as interference limited systems.
3.2.4 Orthogonal Frequency Division Multiple Access
Orthogonal FDMA is a relatively new technology where dierent frequencies are
allocated to dierent users. Therefore, it is a frequency division multiple access
scheme but with one basic dierence. In OFDMA, the allocated frequency is further
divided into smaller sub-carriers which makes it very robust against inter-symbol
interference, multipath fading and other radio disturbances.
Radio access technology used in E-UTRAN (LTE), WiMAX and WLAN is based
on OFDMA principles.
3.3 UMTS operating Bands and Spectrum
Source: 3GPP TS 25.104 ; Base Station (BS) radio transmission and
reception (FDD)
66 CHAPTER 3. WCDMA AIR INTERFACE
The spectrum allocated for IMT-2000 deployment was declared in WRC-92 which
included the bands shown in gure 3.3. This is a country-independent data which
might suit one geographical region but may be conicting with other radio systems
in another part of world. The allocated spectrum had separate frequency regions of
terrestrial communication systems and mobile satellite communication systems.
Figure 3.3: Operating frequency bands for IMT-2000 System (BAND I)
In the same gure (3.3), the core band of UMTS has also been illustrated which
is chosen by 3GPP for the UMTS deployment in Europe. This gure shows both
the TDD and FDD regions of the UMTS core band. Other than the Core Band or
BAND I, UTRA/FDD is designed to operate in the paired bands shown in table
3.1. Nominal channel spacing is 5 MHz. The channel raster is 200 kHz for all bands,
which means that the center frequency must be an integer multiple of 200 kHz. This
rule is generally true but for some specic bands, the center frequencies are shifted
by 100 kHz relative to the channel raster. These frequencies are explicitly listed in
table 5.0 & 5.1 in 3GPP TS 25.104.
In UTRAN FDD Band I, there is 2 60 MHz. Hence, there can be 12 FDD carriers
in this band. For example, the center of the rst carrier will be 1922.4 MHz for
uplink and 2112.4 MHz for DL. Similarly, the center of the last carrier in this band
is at 1977.6 MHz for uplink and 2167.6 MHz for downlink.
3.4 Timing in WCDMA
In UMTS, the smallest time unit is called T
Chip
which is equal to
1
3.84 Mcps
= 0.26 s.
Quite often, other important time units are specied as multiples of T
Chip
. The three
3.4. TIMING IN WCDMA 67
Operating Band Uplink Freq. Downlink Freq. TX-RX
Freq.
separation
I 1920-1980 MHz 2110 -2170 190 MHz
II 1850 -1910 MHz 1930 -1990 MHz 80 MHz
III 1710-1785 MHz 1805-1880 MHz 95 MHz
IV 1710-1755 MHz 2110-2155 MHz 400 MHz
V 824 - 849MHz 869-894 MHz 45 MHz
VI 830-840 MHz 875-885 MHz 45
VII 2500 - 2570 MHz 2620 - 2690 MHz 120 MHz
VIII 880 - 915 MHz 925 - 960 MHz 45 MHz
IX 1749.9 - 1784.9 MHz 1844.9 - 1879.9 MHz 95 MHz
X 1710-1770 MHz 2110-2170 MHz 400 MHz
XI 1427.9 - 1447.9 MHz 1475.9 - 1495.9 MHz 48 MHz
XII 699 - 716 MHz 729 - 746 MHz 30 MHz
XIII 777 - 787 MHz 746 - 756 MHz 31 MHz
XIV 788 - 798 MHz 758 - 768 MHz 30 MHz
XV - XVIII Reserved Reserved -
XIX 830 845 MHz 875 -890 MHz 45 MHz
XX 832 - 862 MHz 791 - 821 MHz 41 MHz
XXI 1447.9 - 1462.9 MHz 1495.9 - 1510.9 MHz 48 MHz
Table 3.1: UTRAN FDD Bands, reproduced from 3GPP TS 25.104
most important time units discussed in UMTS & HSPA are illustrated in gure 3.4.
Figure 3.4: Time units used in WCDMA air interface
1. Radio Frame: A radio frame is a processing duration which consists of 15 slots.
68 CHAPTER 3. WCDMA AIR INTERFACE
The length of a radio frame corresponds to 38400 chips. In other words, a radio
frame is 10 ms long and can accommodate 38,400 chips.
2. Slot: A slot is a duration which consists of elds containing bits. The length of
a slot corresponds to 2560 chips. Compared to the 2G combination of TDMA
frame & Time Slot, 3G uses a combination of Radio Frame & Slot. One Radio
Frame of 3G is further divided into 15 Slots but all the times slots are allocated
to the same users. The main purpose of having Slots in 3G is so that control
information can be sent to the UE at a regular and very fast interval. One
slot is 2/3 ms long.
3. Sub-frame: A sub-frame is the basic time interval for E-DCH and HS-DSCH
transmission and E-DCH and HS-DSCH-related signalling at the physical
layer
2
. The length of a sub-frame corresponds to 3 slots (7680 chips).
3.5 Spreading Principles
UMTS air interface is based on code division multiple access scheme where the
bandwidth after spreading is 5 MHz wide. The narrowband signal is converted to
wideband with the help of a spreading code. The exact details of the codes will be
shown in the next section but for the current discussion, they are simply called code.
Figure 3.5 shows 4 users using the same 5 MHz wideband carrier. The time is
organized in 10 ms radio frame. Each user is allowed to transmit or receive in the
entire 10 ms period. Therefore, the users are using the same frequency & time
domain resources. It is natural for them to interfere with each other. In order to
keep the interference to a minimum level, it is desirable that each users uses as little
power as possible. This reduction in power
3
is achieved by spreading the whole
energy over a wide frequency band. The spreading technique allows the operator to
simultaneously allocate the same time and frequency resources to many users.
There are two resources in CDMA world, which are (1) code and (2) power. Let us
analyze them one by one:
1. Codes: In general, the users must be identied by codes. A new user cannot be
admitted until there is a code available for him. Hence, the number of active
users can be limited by unavailability of codes.
2
Please note: Prior to the introduction of HSDPA in 3GPP Rel-5, there was no discussion about
sub-frame. Therefore, for R99 channels (DCH, FACH, RACH etc.) the term sub-frame has no
signicance.
3
Power spectral density
3.5. SPREADING PRINCIPLES 69
Figure 3.5: Principle of Spreading
2. Power: Code itself is not enough to allow a radio connection in CDMA.
2.a In Uplink: In Uplink, the received power at the Node Bs receiver
should be under the manageable limits. If the interference at the receiver
becomes very high, then the desired signal cannot be reconstructed from
the received signal. This is a very common reason for blocking in CDMA
networks. In other words, CDMA systems are interference limited sys-
tems.
2.b In Downlink: In Downlink, the transmitted power of Node B is the
resource which limits the number of subscribers. With each connected
user, Node B needs to spend aome nite power for each active user.
Therefore, in DL Node B transmit power is the shared resource.
Figure 3.6 illustrates how the spreading & despreading mechanism can be used to
suppress interference. After spreading, when the wideband signal is transmitted,
it gets interfered by both narrowband and wideband interference. In the receiver,
during despreading, the narrow band interference gets spread and its power spec-
tral density gets reduced. After despreading, when the output is passed through a
lowpass lter then despreaded data signal can be derived.
The received data signal can be used to regenerate the actual data only if the received
bit energy is greater than the overall noise energy by at least
Eb
No
[dB].
If CDMA is successfully used in commercial networks, it should be robust against
the interference from the other user interference. This principle is illustrated in
gure 3.7. For example, imagine that the transmitter shown in this picture depicts
the transmitter in Node B, which spreads the data for user 1 with code # 1 and
data for user 2 with code # 2. As expected, the spread signal for both the users will
interfere at the radio interface. Now, the User 1 will try to despread the received
70 CHAPTER 3. WCDMA AIR INTERFACE
Figure 3.6: Spreading and despreading to suppress the interference
signal with code # 1. UE has the knowledge about the codes by prior signalling
with RNC.
As a result of despreading, the data of user 1 can be reconstructed. In the same
gure, we can see that spread signal of user 2 does not get despreaded at the receiver
of UE 1. This is possible if:
Code # 1 and code # 2 are orthogonal to each other. [AND]
Codes at the transmitter and receiver are synchronized to each other.
In commercial cellular networks, operators want that one cell should cover a large
geographical area. In other words, communication should be possible between base
station and a distant user equipment. This can be achieved if the sensitivity of
the base station and user equipment is good. While performing despreading, the
receiver can manifold amplify the received signal. This gain is called Processing
gain. Processing gain can be mathematically expressed as:
Processing Gain = 10 log
3.84 Mcps
R
bit
[dB]
3.5. SPREADING PRINCIPLES 71
Figure 3.7: Multiple access using dierent codes for 2 users
Figure 3.8: Processing gain at the receiver side
Figure 3.9 shows a fast code sequence whose symbol duration is xed by 3GPP
72 CHAPTER 3. WCDMA AIR INTERFACE
specications. This small symbol is called a chip. According to 3GPP, in one
second, there can be 3.84 million such chips. Hence, each chip is 0.26 s long.
The channelization codes used for spreading always use this fast code. As a result,
the product is always 3.84 Mcps. The bandwidth required to transmit this fast
waveform is also very large. In UMTS, the licensed bandwidth is 5 MHz but the
eective transmission takes place in 3.84 MHz.
Figure 3.9 also illustrates that for various services, the symbol rate can vary but the
chip rate is always constant and xed.
For a high bit rate service, the symbol duration is short. Therefore,
the SF is also small.
For a low bit rate service, the symbol duration is very large and
therefore, the SF is also very high.
In other words Bit Rate
1
SF
Figure 3.9: Eect of SF on bitrate and symbol duration
3.6 Codes in UMTS
Source: 3GPP 25.213 Spreading and Modulation (FDD)
3.6. CODES IN UMTS 73
According to the denition used by 3GPP TS 25.213, spreading consists of two
operations. The rst is the channelization operation, which transforms every data
symbol into a number of chips, thus increasing the bandwidth of the signal. The
second operation is the scrambling operation, where a scrambling code is applied to
the spread signal. Hence, there are two types of codes used in UMTS.
1. Scrambling Codes: Scrambling codes do not perform any spreading of band-
width. These codes are used to super-impose the identity of transmitter on the
physical layer signals. Scrambling codes are not orthogonal. They are derived
using sequence generators consisting of shift registers.
2. Channelization Codes: According to section 4.3.1.1 of 3GPP TS 25.213, the
Channelization codes are the codes which perform spreading of bandwidth.
Therefore, sometimes, these codes are also called as spreading code. Channel-
ization codes dene the user bit rate. These codes are Orthogonal Variable
Spreading Factor (OVSF) codes that preserve the orthogonality between a
users dierent physical channels. The OVSF codes can be dened using the
code tree shown in gure 3.10.
The number of chips per data symbol is called the Spreading Factor (SF).
3.6.1 Channelization Code
Channelization Codes have similar properties in DL and UL. As stated earlier,
Bit Rate
1
SF
. Therefore, the user bit rate is dened by the channelization code.
In UL, Channelization codes are used to separate control and data chan-
nels from the same UE (DPDCH and DPCCH).
In DL, Channelization codes are is used to separate the users within a
cell.
In order to calculate the L1 data rate for each spreading factor, we use following
formula:
Symbol Rate =
R
chip
SF
=
3.84 Mcps
SF
It will be explained in the next section that UL modulation is BPSK and DL mod-
ulation is QPSK. Therefore, for the same SF, UL & DL bit rates are dierent. For
QPSK, one symbol corresponds to two bits whereas in BPSK one symbol equals one
bit only. This concept is illustrated in Table 3.2.
74 CHAPTER 3. WCDMA AIR INTERFACE
SF
Symbol Rate (ksps)
=
[
R
chip
SF
]
=
[
3.84 Mcps
SF
]
bit rate (kbps) on DL
DPCH
bit rate (kbps) on UL
DPDCH
512 7.5 15 -
256 15 30 15
128 30 60 30
64 60 120 60
32 120 240 120
16 240 480 240
8 480 960 480
4 960 1920 960
Table 3.2: SF and the corresponding L1 bitrate
Figure 3.10: Code Tree for generation of Orthogonal codes
3.6.2 Scrambling Code
As stated earlier in the introduction part, the scrambling codes do not perform
any spreading of bandwidth. These codes are used to super-impose the identity of
transmitter on the physical layer signals. As a result of scrambling, some 0s become
1s and some 1s become 0s, but the time-duration of each chip does not alter.
Hence, the scrambling procedure does not aect the bandwidth of the transmitted
signal. Spreading is achieved by Channelization code alone. The following sections
tries to investigate the usage of scrambling codes in UL and DL.
3.6. CODES IN UMTS 75
UL Scrambling Codes
UL Scrambling codes are used as user identity in Uplink. All uplink physical chan-
nels are scrambled with a complex-valued Scrambling code. The dedicated physical
channels may be scrambled by either a long or a short scrambling code.
There are 2
24
long and 2
24
short uplink scrambling codes. The usage of long
scrambling codes in UL is very popular. Therefore, in this book we will
only discuss the long codes. The sequence generator used to generate the long
UL scrambling codes is shown in gure 3.11. The shift registers with 24 bit delay
capability and can be used to create 2
24
1 or 16.7 Million UL scrambling codes.
Uplink scrambling codes are assigned by RRC signalling.
Figure 3.11: Conguration of uplink scrambling sequence generator
DL Scrambling Codes
DL (primary) scrambling codes are used as a physical layer cell-id in UMTS. The DL
scrambling codes are generated using the sequence generator shown in gure 3.12.
There are 18 shift registers in the sequence generator. Hence, we can get a total of
2
18
1 = 262, 143 scrambling codes. But not all of the SC are used. Only 8192
DL scrambling codes are allowed in UMTS which are further divided into
512 groups.
Each group contains one primary Scrambling code and 15 secondary
scrambling codes. Figure 3.14 illustrates this arrangement.
The Scrambling code sequences are constructed by combining two real sequences into
76 CHAPTER 3. WCDMA AIR INTERFACE
Figure 3.12: Conguration of downlink scrambling sequence generator
a complex sequence. Each of the two real sequences are constructed as the position
wise modulo 2 sum of 38400 chip segments of two binary m-sequences generated
by means of two generator polynomials of degree 18. The resulting sequences thus
constitute segments of a set of Gold sequences. The scrambling codes are repeated
for every 10 ms radio frame.
The primary scrambling codes n : n = 16 i where i = 0 . . . 511
The i:th set of secondary scrambling codes: 16 i +k, where k = 1 . . . 15
Each cell is allocated one and only one primary Scrambling code. The primary
CCPCH, primary CPICH, PICH, AICH and S-CCPCH carrying PCH shall always
be transmitted using the primary scrambling code. The other downlink physical
channels may be
4
transmitted with either the primary scrambling code or a sec-
ondary scrambling code from the set associated with the primary scrambling code
of the cell.
The set of primary scrambling codes is further divided into 64 Scrambling code
groups, each consisting of 8 primary scrambling codes. The j:th scrambling code
group consists of primary scrambling codes 16*8*j+16*k, where j=0..63 and k=0..7.
4
Use of secondary scrambling code is not very popular in practice. Therefore, this book will
further assume that in DL only primary scrambling code is used.
3.6. CODES IN UMTS 77
Figure 3.13: Total 8192 DL Scrambling Codes and 512 Primary SC
Figure 3.14: 512 SC divided into 64 Groups of 8 codes each
78 CHAPTER 3. WCDMA AIR INTERFACE
3.6.3 Summary of Scrambling Codes
In the last few sections, the details about channelization and scrambling codes were
given. Table 3.3 shows a brief summary of the codes in UMTS.
In UL, the users are separated by using dierent UL scrambling codes.
There are 2
24
- 1 = 16.7 Million UL scrambling codes. RNC allocates
one SC to one user at connection setup. SC are unique within one
RNC area. The number of SC available in one RNC are dened by the
hardware capacity of RNC.
In DL, the cells are separated by DL scrambling codes. There are 512
primary scrambling codes which are organized in 64 code groups having 8
codes per group ( 64 8 = 512)). DL SC are planned by radio planners.
3.6.4 Summary of Codes in UMTS
At this point, it is quite normal for the readers to feel confused and lost in details.
Therefore, table 3.3 shows the summary of the previous section by highlighting the
main aspects of the codes used in UMTS.
Scrambling Code Channelization Code
Usage
UL: User Id UL: To separate control and data
channels from UE
DL: Cell Id DL: User Id
Spreading Does not perform spreading Performs spreading
# of codes
UL : 16.7 Million UL: Depends on the SF ( 256 ,. . . ,
4)
DL : 8192 (512 Primary SC and the
rest are secondary SC)
DL: Depends on the SF (512,. . . , 4)
Orthogonality Non-orthogonal Orthogonal
Length
UL : There are 2 options
Option 1: long Codes 38400
chips
Option 2: Short codes 256 chips
UL: 4 to 256 chips
DL: 10 ms (38400 Chips) DL: 4 to 512 chips
Code Genera-
tion
Using Shift Register based sequence
generator
Using Walsh Code Tree matrix
Table 3.3: Main aspects about the codes used in UMTS
3.7. MODULATION 79
3.7 Modulation
The modulation schemes used in UMTS uplink and downlink are illustrated in
gure 3.15. The same gure also shows the codes used in spreading and scrambling.
For example, in UL, we use user-specic scrambling codes and in DL, cell-specic
scrambling code.
Figure 3.15: Spreading and Modulation in UL & DL
The modulation used in downlink is Quadrature Phase Shift Keying (QPSK)
which involves 2 bits per symbol. For example,
SF = 256 15 ksps = 30 kbps
The modulation used in uplink is Binary Phase Shift Keying (BPSK ) which
involves 1 bits per symbol. For example,
SF = 256 15 ksps = 15 kbps
Figure 3.15 illustrates the spreading and modulation for the uplink dedicated phys-
ical channels & DL dedicated channel. In Uplink, data modulation is dual branch
QPSK, that is, the I and Q channels are used as two independent BPSK channels.
80 CHAPTER 3. WCDMA AIR INTERFACE
Copyright Notices
In order to create some gures, tables and text-sections, the following reference ma-
terial has been used. Information has been interpreted and presented in a simplied
manner. The original references are provided here.
Main reference material for this book has been technical specications (TSs) and
technical reports (TRs) of 3rd Generation Partnership Project (3GPP).
Text about UMTS operating
Bands on page 66
Section 5.4.1 & 5.4.2 of 3GPP TS 25.104
v9.6.0
Table 3.1 on page 67 Table 5.0 of 3GPP TS 25.104 v9.6.0
c 2011. 3GPP
TM
TSs and TRs are the property of ARIB, ATIS, ETSI, CCSA,
TTA, and TTC who jointly own the copyright for them. They are subject to
further modications and are therefore provided to you as is for information
purposes only. Further use is strictly prohibited.
Figure 3.11 on page 75 Figure 5 of 3GPP TS 25.213 v 8.4.0
Figure 3.12 on page 76 Figure 10 of 3GPP TS 25.213 v 8.4.0
Text in section 3.6 on page 72 Section 4.1 of 3GPP TS 25.213 v 8.4.0
Text in section 3.6 on page 73 Section 4.3.1.1 of 3GPP TS 25.213 v 8.4.0
Text about UL Scrambling Codes
on page 75
Section 4.3.2.1 of 3GPP TS 25.213 v 8.4.0
Text about DL Scrambling Codes
on page 75
Section 4.1 of 3GPP TS 25.213 v 8.4.0
Text in section 3.4 on page 66 Section 5 of 3GPP TS 25.211 v 9.1.0
c 2009. 3GPP
TM
TSs and TRs are the property of ARIB, ATIS, ETSI, CCSA,
TTA, and TTC who jointly own the copyright for them. They are subject to
further modications and are therefore provided to you as is for information
purposes only. Further use is strictly prohibited.
BIBLIOGRAPHY
[1] 3GPP TS 25.201 ver. 6.0.0 ;Physical layer - General description
[2] 3GPP TS 25.211 ver. 6.0.0 ;Physical channels and mapping of transport chan-
nels onto physical channels (FDD)
[3] 3GPP TS 25.212 ver. 6.0.0 ;Multiplexing and Channel Coding (FDD)
[4] 3GPP TS 25.213 ver. 6.0.0 ;Spreading and Modulation (FDD)
[5] 3GPP TS 25.214 ver. 6.0.0 ;Physical Layer Procedures (FDD)
[6] 3GPP TS 25.104 ver. 6.0.0 ;Base Station (BS) radio transmission and reception
(FDD)
[7] H.Holma and A. Toskala, WCDMA for UMTS , 5th Edition, John Wiley
& Sons.
[8] Chris Johnson, Radio Access Networks For UMTS ; Principles And
Practice , John Wiley & Sons.
81
CHAPTER
4
LOGICAL, TRANSPORT & PHYSICAL
CHANNELS
In order to master the fundamentals of 3G radio transmission and reception, it is
essential to get acquainted with the channels used in UMTS and HSPA. Channels
are simply a method to organize the information into some categories depending
on some common aspects. This chapter is written to provide the most essential
details about them. According to UTRAN specications, there are three hierarchies
of channels.
Logical channels
Transport channels
Physical channels
The concept of channel was used in GSM as well. In 2G, there are logical and
physical channels. The concept of Transport channel is new in UMTS. This page
tries to illustrate the dierence between the three types of channels and later in this
chapter more details can be found about each of them.
A Logical channel is used to describe what type of information is being
transported by it (e.g., control signalling or user data).
82
4.1. CHRONOLOGY: FIRST 3G AND THEN 3.5G 83
A Transport channel is used to describe the characteristics with which it
transports the information carried by it (e.g., using common channels of the
cell or dedicated channels especially allocated to one user).
A Physical channel is used to describe the physical aspects of it (e.g., fre-
quency, scrambling code, channelization code and slot format).
4.1 Chronology: First 3G and then 3.5G
As we all know, 3G is constantly evolving and getting better with each 3GPP release.
Therefore, we should study the changes in chronological order. It is highly recom-
mended that readers must try to learn channels in the same order. The learning
becomes much easier if we break the whole process in three steps.
Step 1, R99 Channels: R99 channels are the topic of this particular chapter.
Here, we will discuss common control channels and dedicated channels of
UMTS.
Step 2, HSDPA Channels: HSDPA channels will be discussed in chapter 7. All
the channels which have something to do with HSDPA, start with HS-. There
are only 3 new channels introduced in Rel-5 for HSDPA operation.
Step 3, HSUPA Channels: HSUPA channels will be discussed in chapter 8. All
the channels which have something to do with HSUPA, start with E-. There
are only 5 new channels introduced in Rel-6 for HSUPA operation.
As we can see, there will be a lot of channels to learn and discuss. Therefore, we
will start building our knowledge on the strong foundation of R99 UMTS channels.
4.2 Logical Channels
Source: 3GPP TS 25.301, 25.211, 25.212, 25.213
As explained in the rst section of this chapter, Logical channels are used to describe
what is being transported. According to 3GPP TS 25.301, logical channels are
divided into two groups:
1. Control channels: for the transfer of control plane information, &
84 CHAPTER 4. LOGICAL, TRANSPORT & PHYSICAL CHANNELS
2. Trac channels: for the transfer of user plane information.
Figure 4.1 illustrates the distribution of uplink and downlink logical channels. It can
be seen that there are 6 logical channels in UMTS, 2 for trac and 4 for control plane.
Some of these channels are only in DL e.g., (BCCH, PCCH and CTCH) whereas the
other 3 channels are bidrectional (CCCH, DCCH and DTCH). Splitting the analysis
in DL and UL makes it much easier to understand.
While describing the logical channels, we do not discuss the issues about power, bit
rates, bit error rate, block error rates, etc. At this level, we only consider the nature
of data being transported.
Figure 4.1: UL & DL Logical channels
4.2.1 Logical Channels for Control Plane Information
In this section, all 6 logical channels are described.
1. BCCH, Downlink only BCCH channel is used for system control informa-
tion broadcasting. It exists only in the downlink.
4.2. LOGICAL CHANNELS 85
2. PCCH, Downlink only PCCH channel is used to transmit the paging mes-
sages. RNC can generate paging after getting the paging requests from core
network or generate the paging by itself to page the packet-switched users who
are in RRC power saving stand-by states.
3. CCCH, Uplink and Downlink CCCH is a bi-directional channel. It carries
control information between the network and the UE. This channel is used by
those UEs which access a new cell after cell re-selection as well as by UEs
which do not have a RRC connection.
4.DCCH, Uplink and Downlink This is a point-to-point bi-directional chan-
nel which is set up in the RRC connection establishment procedure. It carries
dedicated control information between RNC and the UE.
4.2.2 Logical Channels for User Plane Information
5. CTCH, Downlink only This point-to-multipoint channel is used to carry
dedicated information in the downlink to all or a group of UEs. For example,
stock market updates, sports results, weather updates, business promotions
and service area broadcast.
6. DTCH, Uplink and Downlink DTCH is a dedicated point-to-point chan-
nel which can be used in the uplink as well as in the downlink. This channel
carries user trac like CS speech, video, streaming video, emails with and
without attachments, le transfer etc.
As a quick summary, table 4.1 lists all the logical channels. In this table, we can see
which channels are used to carry control data and which channels for trac. The
same table also shown whether the channels are unidirectional or bidirectional.
Logical Channels for Control Plane
1. BCCH Broadcast Control Channel DL only
2. PCCH Paging Control Channel DL only
3. CCCH Common Control Channel UL & DL
4. DCCH Dedicated Control Channel UL & DL
Logical Channels for User Plane
5. CTCH Common Trac Channel DL only
6. DTCH Dedicated Trac Channel UL & DL
Table 4.1: List of all Logical channels in UMTS
86 CHAPTER 4. LOGICAL, TRANSPORT & PHYSICAL CHANNELS
4.3 Transport Channels
Source: 3GPP TS 25.301, 25.302, 25.321
The main task of a transport channel is to describe the characteristics with which
the data will be transported. At this moment, it is quite normal for the readers to
doubt why do we need transport channels?
As we have seen in the previous section, there is only one logical channel DTCH for
describing the one-to-one user trac, for example, voice, video, streaming and NRT
data. We cannot expect the transport conditions of CS voice and FTP le transfer
be same. Typically, there are the following preferences:
CS Voice needs low but constant bit rate with strict delay requirements. Voice
service is insensitive to bit error rates and we do not re-transmit the speech
frame in case of errors.
File transfer requires high bit rate which can tolerate the bit-rate uctua-
tions. The end-to-end delay can also be exible but le transfer is very strict
about bit errors which are achieved using negative acknowledgements and re-
transmissions.
Furthermore, the packets sessions can be of various natures:
1. Packet session with small amount of infrequent data transmission.
2. Packet session with high amount of data transmission.
3. Packet session with small amount of packets but very frequently transmitted.
Medium Access Control Layer (MAC) in RNC & UE is responsible for map-
ping logical channels to transport channels. This procedure is illustrated in
gure 4.2.
Hence, one can argue that UMTS needs dierent types of transport channels to
fulll the dierent types of needs. There are 2 types of transport channels dened
for UMTS.
1. Common transport channels
2. Dedicated transport channels
4.3. TRANSPORT CHANNELS 87
Figure 4.2: UL & DL Transport channels ; Logical Transport channel mapping
Common Transport Channels
BCH Broadcast Channel DL only
PCH Paging Channel DL only
FACH Forward Access Channel DL only
RACH Random Access Channel UL only
Dedicated Transport Channels
DCH Dedicated Channel UL & DL
Table 4.2: List of all Transport channels in UMTS
1
4.3.1 Common Transport Channels
In the common transport channels, if UE addressing is required, then explicit ad-
dressing is used.
BCH BCCH BCH. (Logical channel BCCH is mapped on the transport channel
BCH.) The Broadcast Channel (BCH) is a downlink transport channel that is
used to broadcast system- and cell-specic information. The BCH is always
88 CHAPTER 4. LOGICAL, TRANSPORT & PHYSICAL CHANNELS
transmitted over the entire cell and has a single transport format.
PCH PCCH PCH. (Logical channel PCCH is mapped on the transport channel
PCH.) The Paging Channel (PCH) is a downlink transport channel. The
PCH is always transmitted over the entire cell. The transmission of the PCH is
associated with the transmission of physical-layer generated Paging Indicators,
to support ecient sleep-mode procedures.
RACH RACH is a well-known name for people who are familiar with 2G. In GSM,
RACH is used to make the initial access to the network and ask for dedicated
signalling resources. Here in 3G also, the same functions are performed by
RACH channel.
But in UMTS, RACH can also be used to transmit small amount of NRT PS
data in uplink
2
. Hence, RACH can generate some revenue for the operator.
FACH In 2G, the answer to RACH is received on Access Grant Channel AGCH.
In UMTS, the same task has been given to Forward Access Channel (FACH).
Hence, FACH is used to inform the users about allocated dedicated signalling
resources in response to the RACH request.
But in UMTS, FACH can also be used to transmit small amount of NRT PS
data in downlink
3
. Hence, FACH can generate some revenue for the operator.
4.3.2 Dedicated transport channels
Dedicated Channel DCH is a transport channel allocated to one UE. It can be
used either for uplink or downlink. This channel is controlled through the inner
power control. DCH bit rate is variable depending on the channel conditions
and the allocated bearer. Bit rate variations can be performed every 10 ms.
4.4 Physical Channels
According to 3GPP TS 25.211, a physical channel is dened by:
a specic carrier frequency,
scrambling code,
channelization code,
2
3G RACH = 2G RACH + Small amount of UL NRT PS trac.
3
3G FACH = 2G AGCH + Small amount of DL NRT PS trac.
4.4. PHYSICAL CHANNELS 89
time start & stop (giving a duration) &
on the uplink, relative phase (0 or /2).
Scrambling and channelization codes are specied in chapter 3. Time durations are
dened by start and stop instants, measured in integer multiples of chips. Suitable
multiples of chips also used in specication are:
Figure 4.3: Slot, Subframe and Radio Frame as used in WCDMA
1. Radio frame: A radio frame is a processing duration which consists of 15 slots.
The length of a radio frame corresponds to 38400 chips or 10 ms.
2. Slot: A slot is a duration which consists of elds containing bits. The length of
a slot corresponds to 2560 chips or 2/3 ms.
3. Sub-frame: A sub-frame is the basic time interval for E-DCH and HS-DSCH
transmission and E-DCH and HS-DSCH-related signalling at the physical
layer. The length of a sub-frame corresponds to 3 slots (7680 chips) or 2
ms.
Physical layer (L1) in Node B & UE is responsible for mapping transport
channels to physical channels. This procedure is illustrated in gure 4.4.
As shown in gure 4.4, there are some physical channels which do not have any
corresponding transport or logical channels. These channels are, in fact, physical
signals which are generated by physical layer of transmitter (e.g., Node B) and used
by the physical layer of the receiver (e.g., UE). The scope of these channels are
restricted to only physical layer. These physical channels exist to support some
special functions of physical layer e.g., synchronization, channel estimation etc.
90 CHAPTER 4. LOGICAL, TRANSPORT & PHYSICAL CHANNELS
The default time duration for a physical channel is continuous from the instant
when it is started to the instant when it is stopped. Physical channels that are not
continuous will be explicitly described.
UMTS has been designed in such a way that physical layer maps various transport
channels to physical channels. When more than one transport channel is multi-
plexed, this composite channel is called composite coded transport channel (CC-
TrCH). This composite transport channel (CCTrCH) is mapped to the data part of
a physical channel. In addition to data parts, there also exist control parts which
are locally generated and inserted by the physical layer.
Figure 4.4: UL & DL Physical channels ; Transport Physical channel mapping
In chapter 3, the basics about channelization and scrambling were discussed. The
unique combinations of these codes works as the identity of various physical channels.
Example: Let us consider two physical channels and investi-
gate their physical layer attributes. First channel is the Primary-
common pilot channel (P-CPICH) of the cell and the second one a DL
dedicated physical channel (DPCH) allocated to a specic user.
P-CPICH is a physical channel that uses
4.4. PHYSICAL CHANNELS 91
Frequency F
DL
, that has been assigned to the cell by radio
planner,
Scrambling code SC
Cell
, assigned by the planner while radio
planning,
& the Channelization Code
4
, CC
256, 0
.
Downlink DPCH allocated to a particular user is a physical channel
that uses
Frequency F
DL
, that has been assigned to the cell by radio
planner,
Scrambling code SC
Cell
, assigned by the planner while radio
planning,
& the Channelization Code
5
, CC
SF, Code Number
which is allo-
cated by RNC at the time of call or session setup.
There are a lot of physical channels dened for UMTS. In order to make the under-
standing easier, we will discuss them in four groups:
1. UL Common Channels: PRACH
2. UL Dedicated Channels: DPDCH and DPCCH
3. DL Common Channels: P-SCH, S-SCH, P-CPICH, P-CCPCH, S-CCPCH,
AICH and PICH
4. DL Dedicated Channels: DPCH
Please refer to gure 4.5 and table 4.3 to keep an overview about the physical
channels. There is only one UL common channel and there are 2 UL dedicated
channels. Similarly in DL, there are 7 common channels and one dedicated channels.
4.4.1 UL Common Channel
There is only one UL common physical channel PRACH. The next section explains
more details about it.
4
This is a standard code which is used in all UMTS networks for primary-common pilot channel
(P-CPICH).
5
Here SF is decided based on the allocated bit rate while code number is a random choice based
on the codes availability.
92 CHAPTER 4. LOGICAL, TRANSPORT & PHYSICAL CHANNELS
DL Common Channels UL Common Channels
P-SCH Primary Synchronization Ch.
PRACH Physical Random Access Ch.
S-SCH Secondary Synchronization Ch.
P-CPICH Primary Common Pilot Ch.
P-CCPCH Pri. Common Control Physical Ch.
S-CCPCH Sec. Common Control Physical Ch.
PICH Paging Indication Channel Ch.
AICH Acquisition Indication Channel Ch.
DL Dedicated Channels UL Dedicated Channels
DPCH Dedicated Physical Channel
DPDCH Dedicated Phy. Data Ch.
DPCCH Dedicated Phy. Control Ch.
Table 4.3: List of all R99 Physical channels
Figure 4.5: Summary of all R99 Channels
Physical Random Access Channel (PRACH)
In section 4.3, we discussed about an UL transport channel RACH. Physical layer
of UE maps this transport channel to a physical channel called Physical Random
4.4. PHYSICAL CHANNELS 93
Access CHannel (PRACH). Therefore, PRACH is used by user for making initial
contact with the UTRAN and also to transmit some small amount of non-real time
(NRT) data.
PRACH physical channel can be used to carry transport channel RACH, which
in turn, carries logical channel DTCH and CCCH.
Logical Ch. Transport Ch. Physical Ch.
CCCH RACH PRACH
DTCH RACH PRACH
While making the initial access to UTRAN, UE has no idea about the amount the
transmitted power which is sucient to reach Node B. Therefore, the UE uses a
mechanism called Open Loop Power Control. This mechanism is explained in full
details in chapter 5 in section 5.7.1. This procedure is illustrated in gure 4.6.
Figure 4.6: PRACH procedure in UMTS
In short, this procedure can be summarized as following.
Step 1: UE transmits a PRACH preamble with a very small power which is calcu-
lated by UE, based on path loss calculations and some system parameters.
Step 2: UE waits for the response to this preamble on a DL channel called Acqui-
sition Indication Channel (AICH). At this point, 3 scenarios can take place
which are explained in the step 3-a, 3-b & 3-c.
94 CHAPTER 4. LOGICAL, TRANSPORT & PHYSICAL CHANNELS
Step 3-a: If there is a positive response from Node B on AICH, UE sends the
PRACH message part. Using this message, UE informs RNC about its inten-
tions and asks for dedicated resources.
Step 3-b: If there is no response from Node B on AICH, then UE ramps up the
transmission power and sends another preamble. UE keeps on ramping its
preamble power until it hears a reply from Node B.
Step 3-c: If there is a negative response from Node B on AICH, UE aborts the
random access procedures.
The preamble is a sequence of 16 chips which are repeated 256 times. Hence, the
length of a PRACH preamble is 256 16 = 4096 chips. Table 4.4 shows all the 16
preamble signature sequences dened by 3GPP. This table can be found in 3GPP TS
25.211. Operators can dene how many and which preambles are allowed to be used
in a cell and broadcast this information using system information. UE randomly
selects one of the allowed preamble signatures and forms its preamble.
Preamble
Signature
Sequence
P
0
1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1
P
1
1 -1 1 -1 1 -1 1 -1 1 -1 1 -1 1 -1 1 -1
P
2
1 1 -1 -1 1 1 -1 -1 1 1 -1 -1 1 1 -1 -1
P
3
1 -1 -1 1 1 -1 -1 1 1 -1 -1 1 1 -1 -1 1
P
4
1 1 1 1 -1 -1 -1 -1 1 1 1 1 -1 -1 -1 -1
P
5
1 -1 1 -1 -1 1 -1 1 1 -1 1 -1 -1 1 -1 1
P
6
1 1 -1 -1 -1 -1 1 1 1 1 -1 -1 -1 -1 1 1
. . . . . .
P
14
1 1 -1 -1 -1 -1 1 1 -1 -1 1 1 1 1 -1 -1
P
15
1 -1 -1 1 -1 1 1 -1 -1 1 1 -1 1 -1 -1 1
Table 4.4: PRACH preamble signatures
4.4.2 DL common Channel
There are 7 DL common channels which are referred to as R99 common channels.
The next sections discuss some essential details of these channels. Each section is
numbered from one to seven for convenience.
4.4. PHYSICAL CHANNELS 95
1. P-SCH
At switch-on, UE looks for P-SCH and tries to identify the beginning of a
time slot by using a globally unique code called primary synchronization
code. Hence, P-SCH is the starting point of all UMTS activities.
The Synchronization Channel (SCH) is a downlink signal used for cell search. The
SCH consists of two sub channels, the Primary and Secondary SCH. The 10 ms
radio frames of the Primary and Secondary SCH are divided into 15 slots, each of
length 2560 chips. Figure 4.8 illustrates the structure of the SCH radio frame.
P-SCH is transmitted for only rst 10% of each slot. One slot corresponds to 2/3 ms
or 2560 chip. Therefore, P-SCH consists of a unique code, Primary Synchronization
Code (PSC) which is modulated and transmitted at the beginning of every slot.
This is illustrated in gure 4.8. The PSC is the same for every cell in the UMTS
system irrespective of the country or operator. The value of code itself goes beyond
the scope of our discussion. If you are interested in knowing more about the PSC,
please refer to section 5.3.3.5 of 3GPP TS 25.213.
Figure 4.7: Timing of Synch. Channels; sent on the rst 10 % of every slot
At the beginning, UE is not synchronized to the Node B timing. Therefore, it is
impossible to perform spreading and scrambling. Hence, P-SCH is sent without any
spreading. In other words, P-SCH does not consume any channelization code.
2. S-SCH
After nding the beginning of Slot using P-SCH, UE searches for S-SCH and
tries to identify the beginning of radio frame by using a sequence of sec-
ondary synchronization code. This sequence is shared by all cells belong-
ing to that scrambling code group.
96 CHAPTER 4. LOGICAL, TRANSPORT & PHYSICAL CHANNELS
SC Group
Slot #
0 1 2 3 4 5 6 7 8 9 10 11 12 13 14
Group 0 1 1 2 8 9 10 15 8 10 16 2 7 15 7 16
Group 1 1 1 5 16 7 3 14 16 3 10 5 12 14 12 10
Group 2 1 2 1 15 5 5 12 16 6 11 2 16 11 15 12
Group 3 1 2 3 1 8 6 5 2 5 8 4 4 6 3 7
Group 4 1 2 16 6 6 11 15 5 12 1 15 12 16 11 2
Group 5 1 3 4 7 4 1 5 5 3 6 2 8 7 6 8
.
.
.
. . .
. . .
. . .
Group 61 9 10 13 10 11 15 15 9 16 12 14 13 16 14 11
Group 62 9 11 12 15 12 9 13 13 11 14 10 16 15 14 16
Group 63 9 12 10 15 13 14 9 14 15 11 11 13 12 16 10
Table 4.5: Table 4: Allocation of SSCs for secondary SCH (from TS 25.213)
Just like P-SCH, the Secondary SCH is also transmitted in the rst 10 % of each
time slot only. The information transmitted on S-SCH repeats after every 15 slots.
Therefore, S-SCH is transmitting a unique sequence of secondary synchronization
codes. These sequences are well dened in 3GPP TS 25.213
6
.
SSC is a 256 chip long sequence and there are only 16 Secondary Synchronization
Codes (SSC). By arranging them in dierent order, dierent sequences could be
formed. As we know, there are 64 primary scrambling code groups. Therefore,
there are only 64 sequences dened for secondary synchronization codes, as shown
in table 4.5.
From table 4.5, one can say if a cell belongs to scrambling code group # 0,
the it will broadcast SSC # 1 on slot #0, SSC # 1 on slot # 1, . . . , SSC # 16
on slot # 14 of S-SCH channel. Similarly for a cell belonging to scrambling
code group # 63, S-SCH will broadcast SSC # 9 on slot # 0, , SSC # 12 on
slot # 1, . . . , SSC # 10 on slot # 14. This principle is illustrated in gure
4.8.
Just like P-SCH, S-SCH is also transmitted without any spreading. Hence, S-SCH
also does not consume any channelization code.
This sequence on the Secondary SCH indicates which of the code groups the cells
downlink Scrambling code belongs to. In the cell-search procedure, from 512 options
6
3GPP TS 25.213, section Code allocation of SSC
4.4. PHYSICAL CHANNELS 97
Figure 4.8: Content of Primary and Secondary SCH ; PSC and SSC
UE has narrowed down to 8. There are 8 cells which belong to one SC group.
Therefore, the information on S-SCH is the same in all the cells of one SC Group.
4.5 is copied from 3GPP TS 25.213.
As shown in gure 4.9, the radio planners have two choices while allocating SC to a
new cell.
Minimize the # of SC Groups: In this scheme, the neighbouring cells are allo-
cated the SC from the same group. Once the SC in that group are all used,
then they start with the next group. This scheme is shown as Option 1 in
gure 4.9.
Minimize the # of SC Groups: In this scheme, the neighboring cells are allo-
cated the SC from two dierent groups. When all 64 Groups have been used,
then they go to the rst group again and pick the next SC from that group,
and so on. This is shown as Option 2 in gure 4.9.
98 CHAPTER 4. LOGICAL, TRANSPORT & PHYSICAL CHANNELS
Figure 4.9: Cells belonging to the same SC group can be adjacent or distant
3. Primary Common Pilot Channel (P-CPICH)
P-CPICH, or simply Pilot channel, is probably the most commonly dis-
cussed channel by radio planners and optimizers. P-CPICH is used for SC
identication and channel estimation. If this channels received level is not
satisfactory, UE tries for cell reselection or handover. P-CPICH is measured
by 2 quantities, CPICH RSCP [dBm] & CPICH Ec/No [dB].
The Primary Common Pilot Channel (P-CPICH) has the following characteristics:
The same channelization code is always used for the P-CPICH (Cch,256,0)
7
,
The P-CPICH is scrambled by the primary scrambling code of the cell,
There is one and only one P-CPICH per cell, and
The P-CPICH is broadcasted over the entire coverage area of the cell.
Due to its xed SF (256), the bit rate of this DL control channel is also xed.
P-CPICH can carry 30 kbps information.
7
Cch,256,0 = [1 1 1 1 1 1 1 1 1 1 . . . 1 1 1 1], or 256 chips long sequence of all 1s
4.4. PHYSICAL CHANNELS 99
Figure 4.10: Primary Common Pilot Channel
The Primary CPICH is a phase reference for the following downlink channels: SCH,
Primary-CCPCH, AICH, PICH and the Secondary-CCPCH. By default, the Pri-
mary CPICH is also a phase reference for downlink DPCH.
4. P-CCPCH
Although P-CCPCH is a complicated name but it is simply a physical channel
which is used to bring system information from UTRAN to UE.
CCCH BCH P-CCPCH
The Primary CCPCH is a DL control channel which has a xed SF=256 & a xed
rate 30 kbps. This downlink physical channels used to carry the BCH transport
channel (system information).
As shown in gure 4.11, the Primary CCPCH is not transmitted during the rst
256 chips of each slot. Instead, Primary SCH and Secondary SCH are transmitted
during this period. Hence, P-CCPCH has an activity factor of 90% which reduces
the eective bit rate to 27 kbps. System information is organized in blocks known
as System Information Block or SIB # N where N = 1, 2, 3,. . . .
5. S-CCPCH
S-CCPCH can be compared to Swiss Army Knife which is one tool that
perform several functions.
BCCH FACH S-CCPCH
100 CHAPTER 4. LOGICAL, TRANSPORT & PHYSICAL CHANNELS
Figure 4.11: Primary-CCPCH Structure: ON & OFF periods
DCCH FACH S-CCPCH
DTCH FACH S-CCPCH
CTCH FACH S-CCPCH
CCCH FACH S-CCPCH
and
PCCH PCH S-CCPCH
S-CCPCH physical channel carries FACH and PCH transport channels. There
could be 1, 2 or more S-CCPCH per cell.
The Secondary CCPCH is used to carry the FACH and PCH. The frame structure
of the Secondary CCPCH is shown in the gure 4.12 above.
S-CCPCH can have a spreading factor in a range from 256 to 4. As usual, the used
spreading factor decides the total number of bits per downlink Secondary CCPCH
slot.
The FACH and PCH can be mapped to the same or to separate Secondary CCPCHs.
By having separate S-CCPCHs for FACH & PCH, the physical layer overhead in-
creases but the paging & FACH capacity can be increased.
The main dierence between a S-CCPCH and a downlink dedicated physical
channel (DPCH) is that an S-CCPCH is not inner-loop power controlled.
The main dierence between the Primary and Secondary CCPCH is that the
transport channel mapped to the Primary CCPCH (BCH) can only have a
xed predened transport format combination, while the Secondary CCPCH
support multiple transport format combinations using TFCI.
4.4. PHYSICAL CHANNELS 101
Figure 4.12: Secondary Common Control Physical Channel
Figure 4.13: Paging Process in UMTS; First Paging Indication & then Paging
6. PICH
PICH is a wake-up call which carries either 1 or 0. Each idle mode UE
keeps on monitoring PICH on periodic intervals.
If PICH = 1: UE wakes up and reads the PCH on S-SCCPCH which fol-
lows 3 slots after PICH.
If PICH = 0: UE stays idle and checks PICH on the next PICH occasion.
Figure 4.13 illustrates the two step paging process in UMTS. First the UEs in sleep-
ing mode wake up and read the paging indicator channel (PICH). If there is a paging
indicator, they read the S-SCCPH and decode the paging message which carries UE
identity (e.g., IMSI).
The Paging Indicator Channel (PICH) is a xed rate (SF=256) physical channel used
to carry the paging indicators. The PICH is always associated with an S-CCPCH
to which a PCH transport channel is mapped.
Figure 4.14 illustrates the frame structure of the PICH. One PICH radio frame of
length 10 ms consists of 300 bits (b0, b1, . . . ,b299). Of these, 288 bits (b0, b1, . . . ,
102 CHAPTER 4. LOGICAL, TRANSPORT & PHYSICAL CHANNELS
Figure 4.14: Slot format of PICH for Np = 18, 36, 72 and 144
b287) are used to carry paging indicators. The remaining 12 bits are not formally
part of the PICH and shall not be transmitted.
In each PICH frame, N
p
paging indicators, where N
p
=18, 36, 72, or 144.
Further, the PI calculated by higher layers is associated with the value of the paging
indicator Pq. If a paging indicator in a certain frame is set to 1 it is an indication
that UEs associated with this paging indicator and PI should read the corresponding
frame of the associated S-CCPCH.
7. AICH
AICH channel is used to inform UE that its PRACH preamble has been ac-
quired by Node B. From this, UE concludes that the currently used trans-
mission power is sucient to communicate with Node B. At this point, Open
Loop Power Control is nished.
AICH is a common DL channel whose operation is closely related to UL PRACH
channel. As shown in gure 4.6, the response to the successful PRACH preamble
is sent on the AICH channel. Hence, AICH is a channel that carries Acquisition
Indicators (AI). The Acquisition Indicator channel (AICH) is spreaded by a xed
SF = 256. Acquisition Indicator AI
s
corresponds to signature s on the PRACH.
AICH is aligned with Primary CPICH for the phase reference and timing.
Figure 4.15 illustrates the structure of the AICH. The AICH consists of a repeated
sequence of 15 consecutive access slots (AS), each of length 5120 chips. Each access
slot consists of two parts:
4.4. PHYSICAL CHANNELS 103
Figure 4.15: Acquisition Indication Channel
Acquisition-Indicator (AI) part: an Acquisition-Indicator (AI) part consisting
of 32 real-valued symbols a
0
, . . . , a
31
.
No Transmission part: For last 1024 chips AICH is switched o
8
.
According to 3GPP TS 25.211, the real-valued symbols, a
j
are given by
a
j
=
15

s=0
AI
s
b
s,j
(4.1)
In equation 4.1, there are two terms on right hand side, AI
s
and b
s,j
. Let us inves-
tigate more about them step-by-step.
1. AI
s
: AI can have 3 values:
If an Acquisition Indicator is set to +1, it represents a positive acknowl-
edgement.
If an Acquisition Indicator is set to -1, it represents a negative acknowl-
edgement.
0
2. b
s
: b
s
is chosen depending on the signature used by UE on PRACH preamble
using table 4.6 which has been dened by 3GPP
9
.
The real-valued symbols, a
j
, are spread and modulated in the same fashion as bits
when represented in +1, -1 form.
8
PRACH Preamble is also 256 16 = 4096 chips
9
3GPP TS 25.211
104 CHAPTER 4. LOGICAL, TRANSPORT & PHYSICAL CHANNELS
S
b
s
,
j
,
w
h
e
r
e
j
=
0
,
1
,
2
,
.
.
.
,
3
1
0
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
-
1
-
1
1
1
-
1
-
1
1
1
-
1
-
1
1
1
-
1
-
1
1
1
-
1
-
1
1
1
-
1
-
1
1
1
-
1
-
1
1
1
-
1
-
1
2
1
1
1
1
-
1
-
1
-
1
-
1
1
1
1
1
-
1
-
1
-
1
-
1
1
1
1
1
-
1
-
1
-
1
-
1
1
1
1
1
-
1
-
1
-
1
-
1
3
1
1
-
1
-
1
-
1
-
1
1
1
1
1
-
1
-
1
-
1
-
1
1
1
1
1
-
1
-
1
-
1
-
1
1
1
1
1
-
1
-
1
-
1
-
1
1
1
4
1
1
1
1
1
1
1
1
-
1
-
1
-
1
-
1
-
1
-
1
-
1
-
1
1
1
1
1
1
1
1
1
-
1
-
1
-
1
-
1
-
1
-
1
-
1
-
1
5
1
1
-
1
-
1
1
1
-
1
-
1
-
1
-
1
1
1
-
1
-
1
1
1
1
1
-
1
-
1
1
1
-
1
-
1
-
1
-
1
1
1
-
1
-
1
1
1
6
1
1
1
1
-
1
-
1
-
1
-
1
-
1
-
1
-
1
-
1
1
1
1
1
1
1
1
1
-
1
-
1
-
1
-
1
-
1
-
1
-
1
-
1
1
1
1
1
7
1
1
-
1
-
1
-
1
-
1
1
1
-
1
-
1
1
1
1
1
-
1
-
1
1
1
-
1
-
1
-
1
-
1
1
1
-
1
-
1
1
1
1
1
-
1
-
1
8
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
-
1
-
1
-
1
-
1
-
1
-
1
-
1
-
1
-
1
-
1
-
1
-
1
-
1
-
1
-
1
-
1
9
1
1
-
1
-
1
1
1
-
1
-
1
1
1
-
1
-
1
1
1
-
1
-
1
-
1
-
1
1
1
-
1
-
1
1
1
-
1
-
1
1
1
-
1
-
1
1
1
1
0
1
1
1
1
-
1
-
1
-
1
-
1
1
1
1
1
-
1
-
1
-
1
-
1
-
1
-
1
-
1
-
1
1
1
1
1
-
1
-
1
-
1
-
1
1
1
1
1
1
1
1
1
-
1
-
1
-
1
-
1
1
1
1
1
-
1
-
1
-
1
-
1
1
1
-
1
-
1
1
1
1
1
-
1
-
1
-
1
-
1
1
1
1
1
-
1
-
1
1
2
1
1
1
1
1
1
1
1
-
1
-
1
-
1
-
1
-
1
-
1
-
1
-
1
-
1
-
1
-
1
-
1
-
1
-
1
-
1
-
1
1
1
1
1
1
1
1
1
1
3
1
1
-
1
-
1
1
1
-
1
-
1
-
1
-
1
1
1
-
1
-
1
1
1
-
1
-
1
1
1
-
1
-
1
1
1
1
1
-
1
-
1
1
1
-
1
-
1
1
4
1
1
1
1
-
1
-
1
-
1
-
1
-
1
-
1
-
1
-
1
1
1
1
1
-
1
-
1
-
1
-
1
1
1
1
1
1
1
1
1
-
1
-
1
-
1
-
1
1
5
1
1
-
1
-
1
-
1
-
1
1
1
-
1
-
1
1
1
1
1
-
1
-
1
-
1
-
1
1
1
1
1
-
1
-
1
1
1
-
1
-
1
-
1
-
1
1
1
T
a
b
l
e
4
.
6
:
A
I
C
H
S
i
g
n
a
t
u
r
e
p
a
t
t
e
r
n
s
4.4. PHYSICAL CHANNELS 105
4.4.3 UL Dedicated Channels
In the uplink, there are only two dedicated physical channels, the uplink Dedi-
cated Physical Data Channel (uplink DPDCH) and the uplink Dedicated Physical
Control Channel (uplink DPCCH).
Uplink Dedicated Physical Channel
As stated above, there are 2 dedicated physical channels in UL, the DPDCH and
the uplink DPCCH. The DPDCH and the DPCCH are I/Q code multiplexed which
means they are modulated by carrier waves which have 90 degree phase dierence.
Figure 4.16: Slot format of UL DPDCH and DPCCH Channel
1. DPDCH: The uplink DPDCH is used to carry the DCH transport channel.
In other words, DPDCH carries user data and L3 control signalling
10
.
According to 3GPP specications, there could be several DPDCHs per radio
link, but in practice however, we use only one DPDCH per radio link (per
user). This channel has a variable spreading factor which can assume any
value from 256 to 4.
2. DPCCH: As shown in gure 4.16, the uplink DPCCH is carries control informa-
tion which is added by Layer 1. Layer 1 control information contains following
elds:
1. Pre-known pilot bits for channel estimation for coherent detection,
10
Note! It is a common misunderstanding that L3 messages are sent using DPCCH. In fact
DPCCH is physical channel which does not have any corresponding transport or logical channel.
Therefore, DPCCH can be called as L1 control channel.
106 CHAPTER 4. LOGICAL, TRANSPORT & PHYSICAL CHANNELS
2. Transmit power-control (TPC) commands,
3. Feedback information (FBI) (used only if DL transmit diversity is used
on DL DPCH channel) and
4. A Transport-format combination indicator (TFCI) which is optional.
The transport-format combination indicator (TFCI) serves the duty of inform-
ing the receiver receiver about the current transport format combination of the
transport channels mapped to the uplink DPDCH radio frame sent in the same
slot. It is not allowed to have less than or more than one DPCCH channel per
radio link.
Due to a xed SF = 256, the DPCCH bit rate equals 15 kbps in UL.
Figure 4.16 shows the frame structure of the uplink DPDCH and the uplink DPCCH.
Each radio frame of length 10 ms is split into 15 slots, each of length T
slot
= 2560
chips, corresponding to one power-control period. The DPDCH and DPCCH are
always frame-aligned with each other.
Having one power control command per time slot means 15 power control commands
per radio frame (or 10 ms). This simply implies that in UMTS, when UE is using
dedicated physical channels, its power can be modied 1500 times per second.
Since DPDCH is our main UL data channel, it is crucial to know about the possible
bit rates that can be achieved.
DPDCH can have SF = 256, 128, 64, 32, 16, 8 and 4 which corresponds to
15, 30, 60, 120, 240, 480 and 960 kbps respectively. Hence, variable bit rate
services can be achieved using variable spreading factors. Please refer to table
4.7 for more details.
The modulation used in UL is BPSK.
4.4.4 DL Dedicated Channels
There is only one type of downlink dedicated physical channel, the Downlink Dedi-
cated Physical Channel (downlink DPCH).
Downlink Dedicated Physical Channel
In uplink, L1 control and data are transmitted on two separate physical chan-
nels (DPDCH and DPCCH) but in downlink both L1 control and data is car-
ried by the same physical channel known as DPCH. Here DPCH is a combi-
nation of DPDCH & DPCCH.
4.4. PHYSICAL CHANNELS 107
SF
Symbol Rate (ksps)
=
[
R
chip
SF
]
=
[
3.84 Mcps
SF
]
bit rate (kbps) on DL
DPCH
bit rate (kbps) on UL
DPDCH
512 7.5 15 -
256 15 30 15
128 30 60 30
64 60 120 60
32 120 240 120
16 240 480 240
8 480 960 480
4 960 1920 960
Table 4.7: SF and the corresponding Channel bitrate
Figure 4.17: Slot format of DL DPCH Channel
As stated above, there is only one type of downlink dedicated physical channel, the
downlink DPCH. Within one downlink DPCH, the following information is trans-
mitted:
User Data, DTCH logical Channel
L3 Control Information, DCCH logical channel
L1 Control Information, Physical signals, generated by L1
The physical control information consistes of (1) pilot bits, (2) TPC commands, and
(3) an optional TFCI ). Therefore, DL DPCH can be considered as time multiplex
of a downlink DPDCH and a downlink DPCCH.
As usual, the timing is organized into 10 ms radio frames which equals 15 time slots.
If we carefully examine the conents of a slot in gure 4.17, various elds of DPCH
108 CHAPTER 4. LOGICAL, TRANSPORT & PHYSICAL CHANNELS
can be identied. Since there is one TPC command every 2/3 ms, the DL power
control also happens at 1500 times per second (just like uplink).
DL DPCH can have SF = 512,
11
256, 128, 64, 32, 16, 8 and 4 which corre-
sponds to 30, 60, 120, 240, 480, 960 and 1920 kbps respectively. Hence, vari-
able bit rate services can be achieved using variable spreading factors. Please
refer to table 4.7 for more details.
The modulation used in DL is QPSK.
4.4.5 Summary of DCH Channels
DCH is the main channel used for transferring user data in UMTS. Therefore, it is
better to understand the slot format of UL and DL DCH channel. In gure 4.18,
the slot format of both UL and DL DCH channels is shown.
In order to understand the fast inner loop power control of UMTS, this section is
very important.
Figure 4.18: Slot format of UL and DL DPCH Channel
In gure 4.19, an example is illustrated where 3 dierent UEs are using 3G services
in a cell which is operating at UL frequency f
UL
and DL frequency f
DL
. The DL
primary scrambling of the cell is 511 and the UL scrambling codes allocated to the
3 UEs are 1,000,111, 1,000,222 & 1,000,333.
11
Some vendors do not support SF 512
4.5. CELL SEARCH PROCEDURE 109
Figure 4.19: Example of DCH usage, 3 DCH users shown here
This example has been specially included to explain the usage of channelization code
in UL and DL.
In uplink, the control and data channel from the same UE is identied by UL
channelization codes.
In downlink, channelization code is used to identify the UEs because frequency
and DL Scrambling code is the same for all users in that cell.
4.5 Cell Search Procedure
Source: 3GPP TS 25.214, Annexure C (quoted Word-by-word)
During the cell search, the UE searches for a cell and determines the downlink
Scrambling code and frame synchronization of that cell. The cell search is typically
carried out in three steps:
Step 1: Slot synchronization
During the rst step of the cell search procedure the UE uses the SCHs primary
synchronization code to acquire slot synchronization to a cell. This is typically
done with a single matched lter (or any similar device) matched to the primary
synchronization code which is common to all cells. The slot timing of the cell can
be obtained by detecting peaks in the matched lter output.
110 CHAPTER 4. LOGICAL, TRANSPORT & PHYSICAL CHANNELS
Step 2: Frame synchronization and code-group identication
During the second step of the cell search procedure, the UE uses the SCHs sec-
ondary synchronization code to nd frame synchronization and identify the code
group of the cell found in the rst step. This is done by correlating the received
signal with all possible secondary synchronization code sequences, and identifying
the maximum correlation value. Since the cyclic shifts of the sequences are unique
the code group as well as the frame synchronization is determined.
Step 3: Scrambling code identication
During the third and last step of the cell search procedure, the UE determines
the exact primary Scrambling code used by the found cell. The primary Scrambling
code is typically identied through symbol-by-symbol correlation over the CPICH
with all codes within the code group identied in the second step. After the primary
Scrambling code has been identied, the Primary CCPCH can be detected and the
system- and cell specic BCH information can be read. If the UE has received in-
formation about which scrambling codes to search for, steps 2 and 3 above can be
simplied.
4.6. HSDPA CHANNELS IN SHORT 111
4.6 HSDPA Channels in Short
Although the channels and other details about HSDPA will be discussed in chapter
7, a list of all HSDPA related physical channels is included in this chapter. There
are 3 new physical channels which are illustrated in gure 4.20.
Figure 4.20: HSDPA operation explained using the physical channels.
HS-PDSCH: HS-PDSCH is a shared channel; it is shared between all active HS-
DPA users in the cell. Each radio frame is divided into 2 ms sub-frames in
HSDPA. There are 3 timeslots within one HSDPA sub-frame. The main fea-
tures about HS-PDSCH are listed below:
High Speed Physical Downlink Shared Channel
Only in DL
Carries User data and scheduled by Node B
SF is xed, SF = 16
Uses adaptive modulation, QPSK and 16QAM
No Soft Handover, no fast power control
Shorter transmission time interval (TTI), TTI = 2ms
HS-SCCH: The High Speed Shared Control Channel (HS-SCCH) is a downlink
control channel that is specially designed to inform UE about the scheduling
decisions made by Node B. The information on HS-SCCH is absolutely essen-
tial for HS-PDSCH reception. This channel indicates when there is data on
the HS-PDSCH that is addressed to this UE.
112 CHAPTER 4. LOGICAL, TRANSPORT & PHYSICAL CHANNELS
High Speed Shared Control Channel
Carries control information for HS-PDSCH:
Channelization code set information
Modulation scheme
Transport block size
Hybrid ARQ process id
Redundancy and constellation version
New data indicator
UE identity = H-RNTI
HS-DPCCH: In the uplink direction, there is the High Speed Dedicated Physical
Control Channel (HS-DPCCH) that is used for sending feedback information
to Node B.
High Speed Dedicated Physical Control Channel
Carries L1 feedback information from a UE:
L1 H-ARQ NACK/ACK
Channel Quality Indicator (CQI)
4.7. HSUPA CHANNELS IN SHORT 113
4.7 HSUPA Channels in Short
A detailed description of HSUPA can be found in chapter 8. In this section a very
brief introduction to HSUPA channels is given.
Figure 4.21: HSUPA operation explained using the physical channels.
As shown in gure 8.23, there are 2 UL channels and 3 DL channels in relation to
the HSUPA operations.
E-DPDCH: E-DPDCH is the main data channel of HSUPA. In UL, UE can have
1, 2 or 4 E-DPDCHs. The main parameters about E-DPDCH are:
E-DCH Dedicated Physical Data Channel
Carries UL user data up to 5.76 Mbps
Variable SF; SF = 256, 128, 64, 32, 16, 8, 4 & 2
Uses same modulation as the UL DCH, BPSK
Uses soft Handover & fast power control
Shorter transmission time interval (TTI) , TTI = 10 ms & 2ms (optional)
E-DPCCH: E-DPCCH is used to carry L1 control information related to E-DPDCH.
The E-DPCCH is time-aligned with the uplink DPCCH.
E-DCH Dedicated Physical Control Channel
Carries control information for E-DPDCH:H:
Retransmission sequence number (RSN), 2 bits
E-TFCI, 7 bits
Happy bit, 1 bit
114 CHAPTER 4. LOGICAL, TRANSPORT & PHYSICAL CHANNELS
E-AGCH: The E-AGCH is a downlink physical channel used to transmit absolute
grants to a UE or a group of UEs. The absolute grant consists of a 5 bit grant
value which is between 0 and 31. The denition of grant is the ratio between
the transmit powers of E-DPDCH and DPCCH.
Grant represents the maximum E-DPDCH to DPCCH power ratio the
UE may use in the next transmission.
Grant =
P
tx,E-DPDCH
P
tx,DPCCH
E-RGCH: The E-RGCH carries relative grants that are used in the scheduling
process to gradually increment or decrement the allowed UE grant.
E-DCH Relative Grant Channel
Carries relative grants for uplink E-DCH scheduling
Relative grants transmitted with signature sequences
E-HICH: The E-HICH carries the HARQ acknowledgement indicator, ACK or
NACK.
E-DCH Hybrid ARQ Indicator Channel
Carries hybrid ARQ ACK/NACK indicator
HARQ acknowledgment indicators transmitted with signature sequences
4.7. HSUPA CHANNELS IN SHORT 115
Copyright Notices
In order to create some gures, tables and text-sections, the following reference ma-
terial has been used. Information has been interpreted and presented in a simplied
manner. The original references are provided here.
Main reference material for this book has been technical specications (TSs) and
technical reports (TRs) of 3rd Generation Partnership Project (3GPP).
Text in section 4.2 on page 83 Section 5.3.1.1.1 of 3GPP TS 25.301 v 7.0.0
Text in section 4.2.1 on page 84 Section 5.3.1.1.1 of 3GPP TS 25.301 v 7.0.0
Text in section 4.2.2 on page 85 Section 5.3.1.1.1 of 3GPP TS 25.301 v 7.0.0
c 2006. 3GPP
TM
TSs and TRs are the property of ARIB, ATIS, ETSI, CCSA,
TTA, and TTC who jointly own the copyright for them. They are subject to
further modications and are therefore provided to you as is for information
purposes only. Further use is strictly prohibited.
Text in section 4.4 on page 88 Section 5 of 3GPP TS 25.211 v 9.1.0.
Text about P-CPICH on page 98 Section 5.3.3.1.1 of 3GPP TS 25.211 v 9.1.0.
Text about S-CCPCH on page
100
Section 5.3.3.4 of 3GPP TS 25.211 v 9.1.0.
Text about PICH on page 101 Section 5.3.3.10 of 3GPP TS 25.211 v 9.1.0.
Text about P-SCH on 95 Section 5.3.3.5 of 3GPP TS 25.211 v 9.1.0.
Text about AICH on 103 Section 5.3.3.7 of 3GPP TS 25.211 v 9.1.0.
Text about Cell Search Procedure
in section 4.5 on page 109
Quoted word-by-word from Annex C of
3GPP TS 25.214 v 9.1.0.
Figure 4.10 on page 99 Figure 13 of 3GPP TS 25.211 v 9.1.0.
Figure 4.11 on page 100 Figure 15 of 3GPP TS 25.211 v 9.1.0.
Figure 4.12 on page 101 Figure 17 of 3GPP TS 25.211 v 9.1.0.
Figure 4.15 on page 103 Figure 21 of 3GPP TS 25.211 v 9.1.0.
Figure 4.16 on page 105 Figure 1 of 3GPP TS 25.211 v 9.1.0.
Figure 4.17 on page 107 Figure 9 of 3GPP TS 25.211 v 9.1.0.
Table 4.4 on page 94 Table 3 of 3GPP TS 25.213 v 8.4.0.
Table 4.5 on page 96 Table 4 of 3GPP TS 25.213 v 8.4.0.
Table 4.6 on page 104 Table 22 of 3GPP TS 25.211 v 9.1.0.
c 2009. 3GPP
TM
TSs and TRs are the property of ARIB, ATIS, ETSI, CCSA,
TTA, and TTC who jointly own the copyright for them. They are subject to
further modications and are therefore provided to you as is for information
purposes only. Further use is strictly prohibited.
BIBLIOGRAPHY
[1] 3GPP TS 25.201 ver. 6.0.0 ;Physical layer - General description
[2] 3GPP TS 25.211 ver. 6.0.0 ;Physical channels and mapping of transport chan-
nels onto physical channels (FDD)
[3] 3GPP TS 25.212 ver. 6.0.0 ;Multiplexing and Channel Coding (FDD)
[4] 3GPP TS 25.213 ver. 6.0.0 ;Spreading and Modulation (FDD)
[5] 3GPP TS 25.214 ver. 6.0.0 ;Physical Layer Procedures (FDD)
[6] 3GPP TS 25.104 ver. 6.0.0 ;Base Station (BS) radio transmission and reception
(FDD)
[7] 3GPP TS 25.301 ver. 6.0.0 ;Radio Interface Protocol Architecture
[8] H.Holma and A. Toskala, WCDMA for UMTS , 5th Edition, John Wiley
& Sons.
[9] Chris Johnson, Radio Access Networks For UMTS ; Principles And
Practice , John Wiley & Sons.
For HSDPA-secic details, the version of these specs should be 5.0.0 or
higher & for HSUPA-specic details, it shold be 6.0.0 or higher.
116
CHAPTER
5
RADIO RESOURCE MANAGEMENT
Source:
3GPP TR 25.922 ver. 7.0.0 ; Radio resource management strategies
H.Holma and A. Toskala, WCDMA for UMTS , 5th Edition, John
Wiley & Sons.
Radio Resource Management or RRM is a collective term used for the algorithms
and features designed for the optimized operation of radio networks. Radio Resource
is a generic term which is applicable to all radio access technologies. In a TDMA
based system, radio resource is a time slot, whereas, in a FDMA system it is a
frequency channel. Similarly in our CDMA-based cellular systems, UMTS & HSPA,
radio resource can be identied as a combination of:
frequency,
Scrambling code,
channelization code &
power.
Radio resources are valuable resources which directly contribute to the revenue of
the service provider. Therefore, it is very crucial to have a well-tuned radio resource
117
118 CHAPTER 5. RADIO RESOURCE MANAGEMENT
management working in the network. The tuning is generally performed by various
parameters dened at RNC, Node B or cell level. Other than these, for proper
handover and mobility, there are parameters which can separately aect the mobility
from one source cell to dierent target cells. The most common approach for RRM
implementation is to take decisions based on cell load where the word load refers to
as received power at Node B receiver for Uplink and transmitted power from Node
B transmitter for downlink.
In short, the functions of Radio Resource Management can be summarized as:
1. Maximize Capacity: If the current load in a cell is less than the planned target
load, there should be a mechanism to increase the resources of Non-real Time
(NRT) data users and utilize the total cell resources.
This feature will have at least two advantages: the increased cell throughput
from the operator perspective and improved user experience from end-user
perspective. This can be achieved by smart packet scheduling in RNC. With
the introduction of HSDPA & HSUPA, there are new schedulers introduced in
Node B which can respond much quicker to the variations in radio conditions
and adapt the throughput according. This well-known concept is called link
adaptation.
2. Guarantee the Planned Coverage: In CDMA-based networks, if a cell ex-
periences overload, then the interference becomes higher than usual. To over-
come this, UEs are asked to increase the transmit power. At this moment,
the UEs at cell edge, which are already transmitting with maximum power,
cannot increase their power and nd themselves out-of-coverage area due to
this overload mechanism. This well-known mechanism is called cell breathing.
Therefore, there should be some mechanism, which will prevent the cell to go
into overload. This is achieved by an eective admission control algorithm in
RNC.
If admission control algorithm is too relaxed, then there will be admission of
new users even if the cell is close to overload, which will cause instability. On
the other hand, if admission control algorithm is over-protective, then there
will be very high blocking although there are some free resources left in the
cell. Therefore, proper parameter setting to tune the admission control is very
crucial to the network performance.
3. Provide good Quality of Service: In order to achieve an acceptable bit error
rate (BER), there must be sucient quality at the physical link. There are
three important QoS attributes which are quite often used in RRM, in order
to guarantee a good link quality. They are:
5.1. INPUTS FOR RRM FUNCTIONALITY 119
1. Signal to Interference Ratio (SIR) [in dB]
2. Bit Energy to Noise Energy Ratio (Eb/No) [in dB]
3. Block Error Rate (BLER) [in %]
While admitting a new bearer, admission control already takes into account
the Planned Required EbNo, BLER target and SIR Target values. Based on
these values, admission control makes an estimate of the increment in the cell
load caused by this particular bearer. Once the bearer is admitted, the power
control mechanism tries to maintain the power level at an absolute minimum
level which will be enough to meet the quality criterion
1
.
4. Priority Handling: The services can be broadly categorized into 4 trac classes
namely: (1 = Highest priority)
1. Conversational
2. Streaming
3. Background
4. Interactive
Generally, Conversational class has the highest priority followed by Streaming,
Interactive and then Background. Therefore, Conversational class users are
given the highest importance while admitting the service. (e.g., Voice or video
calling). Rest 3 classes are subjected to buering and scheduling according to
their relative priorities.
5.1 Inputs for RRM Functionality
In this section, we will discuss the inputs which are used by RRM functions. There
are 4 main inputs which are illustrated in gure 5.1.
1. Radio parameters stored in RNCs database
2. Node B measurements
(a) Common Measurements
(b) Dedicated Measurements
3. UE measurements
4. RNCs internal calculation and measurements
120 CHAPTER 5. RADIO RESOURCE MANAGEMENT
Figure 5.1: Inputs for RRM functionality
Lets us discuss them one by one.
5.1.1 RNC Parameter Database
RNC is responsible for storing the radio parameters for the whole radio network
subsystem. Among other parameters, it also stores the cell specic uplink load
target and downlink load target.
For example, if the target DL load is 75% and the current load is 65%, RRM can
easily decide about the next strategy. Therefore, the parameters stored in RNCs
database are an important input for RRM functionality.
Figure 5.2 shows three regions according to the cell load status.
The planned area is the safe operation area where the load is under con-
trollable limits and neither coverage nor the quality of active connections gets
aected. The threshold which denes the upper limit of planned area is de-
cided in co-ordination with radio network planning strategy.
Generally in this situation, admission control is advised to allow more RABs
and packet scheduler is advised to schedule higher bit rates.
1
Transmit power should be much as required, as little as possible.
5.1. INPUTS FOR RRM FUNCTIONALITY 121
The marginal area is the safety window between normal and overload
states. In this situation, the new real-time calls are generally denied. Ongoing
packet sessions continue but their bit rates are neither throttled not increased.
The threshold which denes the upper limit of marginal area is decided by the
planner and dened relative to the threshold for the planned area, for example,
1 dB above the threshold for planned area.
The overlaod area is the area where the cell load is beyond the controllable
limits. This can severely aect the quality and coverage of the cell-edge users.
Generally, in this state, the admission control stops allowing more real time
RABs in the cell and packet scheduler tries to reduce the load by scheduling
less bit rates.
Figure 5.2: Load Regions used in Radio Resource Management
5.1.2 Node B Measurements
Source: 3GPP TS 25.433, UTRAN Iub interface Node B Application
Part (NBAP) signalling
One central dierence between the RRM of 2G family of systems (GSM, GPRS &
EDGE) and 3G family of systems (WCDMA & HSPA) is the exact knowledge about
current actual load.
122 CHAPTER 5. RADIO RESOURCE MANAGEMENT
In 2G, the RRM is located at BSC/PCU and it knows exactly how many times
slots have been allocated. The decisions about resource allocation is purely in
the hand of BSC. BTS does not have the authority to modify the resources
autonomously. Thus, there is no confusion about the current load in the
cell.
In 3G, the RRM is located at the RNC site. But the exact knowledge about
the cell load (UL received power and DL transmitted power) is available at the
Node B. RNC makes decisions about the initial, minimum and maximum
power of each connection but the instantaneous power can be modied by
Node B using power control feature. RNC has to completely depend on the
measurements performed by Node B and reported to RNC.
The interface connecting Node B & RNC is Iub. The signalling protocol on Iub
is called Node B Application Part (NBAP). There are two types of measurement
reports, common measurements and dedicated measurements.
Figure 5.3: Common NBAP measurement management, source: 3GPP TS 25.433
Common Measurement Report
These reports are handled by C-NBAP protocol. The word common here means
common to the cell. Hence we have one such report at scheduled intervals decided
by operator specic parameters
2
. Typical values reported in this report are:
Total Carrier Power (TCP)
2
Typically one such report is sent from Node B to RNC at several 100 ms, e.g., 400 ms.
5.1. INPUTS FOR RRM FUNCTIONALITY 123
Transmitted carrier power of all codes not used for HS transmission
Received Total Wideband Power (RTWP)
Acknowledged PRACH Preambles
HS-DSCH Required Power
E-DCH Provided Bit Rate
Dedicated Measurement Report
These reports are handled by D-NBAP protocol. The word dedicated here means
dedicated to one radio link. Using this measurement report, Node B can inform
RNC about the transmit power of a particular radio link in downlink. Typical values
reported in this report are:
SIR
SIR Error
Transmitted Code Power
NBAP protocol uses 2 special identiers for this purpose. They are called Node B UE
context ID and CRNC Communication Context ID. These IDs are like nicknames
that were chosen by Node B and RNC at the time of initial radio link establishment.
Due to multitude of dedicated measurements, these reports are sent at lower fre-
quency compared to common measurement reports
3
.
5.1.3 UE Measurements
According to 3GPP, the measurements performed by UE can be either periodic
or event-triggered. Event triggered option requires parameters to be set to
clearly dene an event.
Source: 3GPP TS 25.215, Physical layer - Measurements (FDD)
Other than the measurements performed by Node B, UE physical layer also performs
various measurements which are reported back to RNC for optimum functionality
of RRM functions e.g., handover mobility, bit-rate modication etc.
According to 3GPP TS 25.215, some of the crucial UE measurements are:
3
Typically every few seconds. e.g., 3s.
124 CHAPTER 5. RADIO RESOURCE MANAGEMENT
Figure 5.4: Dedicated NBAP measurement management, source: 3GPP TS 25.433
P-CPICH RSCP
P-CPICH E
c
/N
0
UTRA carrier RSSI
GSM carrier RSSI (BCCH RxLev of GSM)
Transport channel BLER
UE transmitted power
UE Rx-Tx time dierence
SFN-SFN Observed time dierence
. . .
In order to read more about the denition of these quantities, please refer to section
5.1 & 5.2 in 3GPP TS 25.215. Section 5.1 describes the UE measurement abilities
and section 5.2 explains UTRAN measurement abilities.
Please note that not all the measurements are performed periodically. According
to 3GPP specications
4
, the measurements can be either periodic, or on demand or
event-based. This simply implies that there is a great deal of freedom which can
be used by infrastructure vendors for controlling the UE reporting whereas the UEs
must be capable of measuring these quantities.
4
TS 25.302, section 9.2 and TS 25.215
5.1. INPUTS FOR RRM FUNCTIONALITY 125
It has been observed, that the vendors have opted for event-based triggering
of measurements. Therefore, the UE looks out for some special scenarios to take
place. For example, UE monitors a new target cell whose CPICH signal is almost-
equally-strong as the serving cell. When such a scenario happens, UE sends a RRC:
Measurement Report Message with the details of the target cell scrambling code
and signal strength. Such a scenario is called Event 1A. In the similar fashion,
various events have been dened by 3GPP which will be discussed later in this
module.
5.1.4 Internal RNC Measurements
RNC is the central controlling unit of the RAN. Therefore, RNC keeps on performing
certain calculations, estimations and measurements to guarantee the stability of cells
within its controlling area. For example,
For packet users, RNC keeps on performing measurement on DL Transport
Channel Trac Volume. If the data volume exceeds a given threshold, it can
notify the packet scheduler to:
Perform state transition from CELL FACH to CELL DCH or
Upgrade the bit rate of allocated DCH
Once a DCH channel is established for a UE, RNC keeps on measuring the ac-
tual throughput in UL and DL. Based on these measurements, packet sched-
uler can:
Decrease the allocated bit rate in next scheduling decision, or
Release the allocated bit rate in next scheduling decision, or
Increase the allocated bit rate if throughput measurements indicate a
very high utilization.
Another example is when admission control admits a new real-time (RT) RAB.
Admission control informs the load estimation entity of RRM about this inac-
tive bearer. This procedure makes sure that the load-calculation entity always
has the knowledge about load which is as close to reality as possible.
Similarly, after scheduling a PS bearer, packet scheduler informs the load-
calculation entity about its estimate of the load caused by PS bearers.
. . .
126 CHAPTER 5. RADIO RESOURCE MANAGEMENT
5.2 Load Estimation
Source:
3GPP TR 25.922 ver. 7.0.0 ; Radio resource management strategies
H.Holma and A. Toskala, WCDMA for UMTS , 5th Edition, John
Wiley & Sons.
The following section is inspired from the book WCDMA for UMTS by
H.Holma and A. Toskala, where these topics are explained with a step-
by-step mathematical analysis and description. In Lets Learn 3G in 10
Days, the author has tried to summarize the nal result of the analysis.
The advanced readers should refer to the above mentioned reference to
get more details.
For the proper functionality of RRM, the RNC must periodically estimate the UL
& DL load in order to decide the actions for admission control and packet scheduler.
The following section explains the procedure of current cell load estimation,
in both uplink and downlink. Let us start the discussion with uplink cell load
estimation.
5.2.1 Uplink Load Estimation
RNC can estimate the current uplink load in 2 dierent ways.
1. Uplink cell load estimation based on Received Total Wideband Power
(RTWP), and
2. Uplink cell load estimation based on Total Uplink Throughput
Option 1: Received Total Wideband Power-based UL load Estimation
In all CDMA-based systems, UL capacity is directly aected by the noise rise gen-
erated by users in the uplink. Typically, an operator restricts the acceptable uplink
load to a certain UL noise rise. The noise rise in the UL is the increase in noise
compared to the noise oor of the Node B:
Noise Rise, NR
UL
=
P
rx,total
P
noise
(5.1)
5.2. LOAD ESTIMATION 127
Without going into the mathematical derivation, we will write the nal relation
between Noise Rise (NR) and the cell load
UL
:
NR =
1
1
UL
or
UL
= 1
1
NR
(5.2)
Received Total power (RTWP) consists of three components:
1. System and equipment noise (or background noise),
2. Interference caused by OWN CELL USERS &
3. Interference caused by OTHER CELL USERS
Or,
RTWP = P
Noise
+ Int
Own cell
+ Int
Other cell
(5.3)
As explained earlier, Node B keeps on reporting the current Received Total Wide-
band Power (RTWP) to RNC. RNC uses this RTWP measurements and compares
it with the P
noise
. This indicates the amount of noise which has risen.
This scheme has a limitation, because:
RTWP does not dierentiate between own cell interference and other cell in-
terference. RTWP is simply the measured received power at Node B receiver
which might be caused by users in the own cell or neighbouring cells.
RTWP also includes P
Noise
, as depicted in equation 5.3. If the noise level itself
uctuates, then the RTWP cannot indicate the UL loading in an accurate
manner.
In order to overcome the problems listed above, it is better to combine the power-
based load estimation with another scheme described below.
Option 2: Throughput-based UL Load Estimation
Throughput-based UL load estimation utilizes the concepts of fractional load caused
by one user and summing the load of all the users to calculate the total cell load.
Throughput based UL load can be depicted by L
Thr,Cell
where
L
Thr,Cell
=

iAll DCH in Cell


L
DCH,i
(5.4)
128 CHAPTER 5. RADIO RESOURCE MANAGEMENT
where the individual DCH of bit rate R
i
kbps, causes a load L
DCH,i
which is calcu-
lated by:
L
DCH,i
=
1
1 +
W/R
i
(Eb/No)
i

1
AF
i
(5.5)
where Eb/No is the signal energy per bit divided by noise spectral density that is
required to meet a predened block error rate, W is WCDMA chip rate, R
i
is the
bit rate of user i & AF
i
is the activity factor
5
for uses i.
5.2.2 Downlink Load Estimation
Transmitted Power-based DL load Estimation
In the section related to Node B measurements, it was shown that Node B keeps on
reporting the current Total Transmitted Carrier Power (TCP) or P
tx,total
to RNC.
RNC uses this P
tx,total
measurements and compares it with the P
BTS,Max
. This
indicates what percentage of the Node B Power Ampliers power has been utilized
in the current measurement period.

DL
=
P
tx,total
P
BTS,Max
(5.6)
The operator must dene the DL load target. DL load target is dened as a ratio
of maximum Node B power amplier value. For example, in a 20 W carrier, if we
plan to use
DL
= 75%, then the cell is in normal state up to P
tx,total
< 15W.
Throughput-based DL Load Estimation
In principle, the throughput-based DL load estimation can be utilized in the same
manner as discussed in the previous section for Uplink. But in DL, the power based
measurements are quite reliable. Therefore, there is not much need for a separate
estimation of DL load based on throughput. The implementation is vendor specic.
5
For voice 0.5-0.7 & for Data service 1.0
5.3. RADIO RESOURCE MANAGEMENT STRATEGIES 129
5.3 Radio Resource Management Strategies
Source: Section 12: Congestion Control of 3GPP TR 25.922,
Radio resource management strategies
In UMTS, congestion control mechanism takes care of the situations where system
has reached a congestion state and therefore the QoS guarantees can be at at risk.
This feature is implemented in the packet scheduler of RNC. 3GPP only gives rough
guidelines about these feature. The exact rules of this feature are decided by the
equipment vendors. Some of these features are optional. Therefore, it is possible
for the operators to enable only those feature, which sound useful to them. But in
principle, the congestion control mechanism should perform the following tasks:
1. Congestion detection: Periodically Node B reports the cell load to RNC and
RNC compared the reported load with the target load. After this comparison,
RNC declares whether congestion has been detected.
2. Congestion resolution. Various steps can be taken by RNCs packet scheduler
to resolve the state of congestion.
Prioritization: Ordering the dierent users from lower to higher priority
(e.g., from those that expect a lower grade of service to those with more
stringent QoS requirements).
Load reduction: Two main actions could be taken:
(a) Selective blocking of new connections while in congestion
(b) Reducing the maximum transmission rate
Load check: Load reduction actions can be carried on until the considered
load factor is below a given threshold for a certain amount of time (i.e.,
the system can enter the congestion recovery status).
3. Congestion recovery: It is possible to attempt to restore the transmission pa-
rameters used before the congestion was triggered, by using a time schedul-
ing on a user by user basis.
5.4 Admission Control
Imagine an empty party hall. The rst two guests arrive and start their small-
talk at a comfortable volume. As few more guests arrive, they also start talking
in pairs or groups. Later, when the room is full and everyone is busy in
130 CHAPTER 5. RADIO RESOURCE MANAGEMENT
the conversation with their partner, the rst two guests realize that they are
actually speaking much louder compared to the situation when they were all
alone in the hall.
From this small story, one can understand that every subscriber that gets admitted
in UMTS cell, adds its contribution to the overall interference. If we want to keep
the interference within a controlled limit, the admission control must play an active
role and stop admitting new users after a certain limit.
For admission control, the following strategies must be used:
Admission control should be performed according to the Quality of Service.
Typically, the admission control is very strict while admitting guaranteed bit
rate (GBR) services like voice, because once admitted, RNC has no authority
to drop the connection if resource congestion is detected.
On the contrary, for non-GBR services like email, web-browsing, FTP, etc.,
admission control is quite relaxed. These bearers are allowed to setup be-
cause later if congestion is detected, the resource allocation can be reduced or
eliminated.
Admission control should take the decision after considering the current system
load and the required service. The quality can be dened in terms of required
Block Error Rate (BLER) or required Eb/No.
Admission control should use these quality parameters and estimate the in-
crement in load that will be caused if this bearer is admitted.
Imagine a room with 10 chairs where already 8 chairs are occupied. 3
more persons want to enter this room. Should admission control allow
them to enter?
I am sure your answer is No. From this simple example, we can learn that admission
control not only considers the existing load but also the hypothetical or simulated
load for the connections for which admission control is deciding. This clearly shows
that admission control algorithm prepares for the worst-case scenario before saying
yes to a new bearer.
There are various scenarios where admission control must step in and make the
decisions. The following section describes these situations.
1. AC at the time of RRC Connection Setup. This signalling is depicted
in gure 5.5
5.4. ADMISSION CONTROL 131
Figure 5.5: Admission Control in RNC at RRC Connection Establishment
In RRC Connection request, UE species the cause of establishment. For
example, mobile originated call, mobile terminated call, interactive session,
emergency call, registration and so on. At this moment, admission control
can prioritize the RRC connection for certain causes. It is quite obvious that
RRC connection to set up an emergency call must be treated with the highest
priority.
2. AC at the time of RAB Setup. This signalling is depicted in gure 5.6.
The procedure of RAB establishment is started by core network. Either MSC
or SGSN requests RNC to establish a RAB with certain QoS parameters.
For example, trac class, max bit rate, guaranteed bit rate, SDU error ratio,
trac handling priority, allocation retention priority, etc. From these QoS
parameters, RNC nds out the radio bearer attributes like Eb/No target,
Signal-to-Interference target & block error rate (BLER) target. RNC typically
uses some look-up table to do so.
Using these attibutes, admission control can estimate the increment in load
caused by the RAB in question.
(a) For RT RAB setup, AC works independently.
RT RABs have certain guaranteed bit rates. Therefore, if the resources
for these GBR service are not available, the RT RABs are denied.
(b) For NRT RAB setup, AC works in close co-ordination with packet sched-
uler (PS). Therefore, NRT RAB admission is performed by AC but the
subsequent scheduling of resources is performed by PS.
3. AC at the time of SHO diversity branch addition. This signalling
is depicted in gure 5.7. The decision about handover is taken in SRNC
132 CHAPTER 5. RADIO RESOURCE MANAGEMENT
Figure 5.6: Admission Control in RNC at RAB Establishment
whereas the admission control takes place in the target cells CRNC. In general,
admission control is a little bit relaxed for the handover decisions. Admission
control allows handover to take place up to a higher load limit compared to
the admission control for a new RAB setup.
5.5 Code Allocation
As discussed in the chapter related to CDMA, Spreading and air interface technology,
we have learnt that there are 4 types of codes used in WCDMA which are:
1. DL Scrambling Code
2. DL Channelization Code
3. UL Scrambling code
4. UL Channelization Code
1. DL Scrambling Code: Used as the physical cell id. There are totally 512
Primary-Scrambling codes in DL, which are used as L1 identity of any WCDMA
5.5. CODE ALLOCATION 133
Figure 5.7: Admission Control in RNC at Inter-RNC SHO
cell. After 512, these codes can be repeated. Therefore, we never face conges-
tion or blocking in DL Scrambling. Therefore, RRM has not much role to play
in DL SC.
2. DL Channelization Code: The channelization codes used for spreading are
Orthogonal Variable Spreading Factor (OVSF) codes that preserve the or-
thogonality between physical channels. In DL, Channelization codes are used
to dierentiate among the individual users. Hence, as the need for capacity in-
creases, the DL Channelization codes face congestion. Code-tree optimization
procedure is explained in section 5.5.1.
3. UL Scrambling Code: UL Scrambling codes are used as user Id for Uplink
signal separation. According to 3GPP specication, more than 16 Million
UL SC have been dened. Out of which, one RNC can utilize a subset of
those based on the hardware limitation of RNC (for example 50,000 codes).
Therefore, shortage of UL SC is also not a very common cause for congestion.
4. UL Channelization Code: UL channelization code is used to dierentiate among
the various channels transmitted from the same UE. For example:
In Rel-99 Conguration: DPDCH & DPDCH
134 CHAPTER 5. RADIO RESOURCE MANAGEMENT
In Rel-5 conguration: DPDCH, DPDCH & HS-DPCCH
In Rel-6 conguration: DPDCH, DPDCH, HS-DPCCH, E-DPCCH &
E-DPDCH
In Uplink, every user uses a dierent Scrambling code. Therefore, every UE
has its own code tree. Hence, the same UL CC can be re-used within the
same cell. This is the reason why we never observe congestion in the UL
channelization code tree.
Summary: DL channelization code is a rare radio resource and must be used
very eciently. In most of 3G cellular networks, 3G and HSDPA are deployed.
HSDPA makes use of multiple code allocation to one user. This further in-
creases the code utilization. In order to reduce the code blocking, a technique
called code tree optimization is used by RNC (see section 5.5.1).
Code allocation deals with the problem how dierent codes are allocated to dierent
connections. The channelization codes used for spreading are Orthogonal Variable
Spreading Factor (OVSF) codes that preserve the orthogonality between physical
channels. The OVSF code is shown in gure 5.8.
5.5.1 Code Tree Optimization
RNC has a smart algorithm which either periodically or based on some threshold,
re-organizes the DL channelization code tree. The main purpose of this feature is to
avoid the fragmentation of a code tree. Figure 5.9 depicts the same with example
where CC
16,2
code was allocated to user 1 and CC
16,10
is allocated to another user.
As a result, CC
8,1
and CC
8,5
are forbidden to be used in the same cell. This happens
due to the fragmented nature of code allocation.
In RRM framework, there should be a smart code allocation algorithm that can
release CC
16,10
and re-assign CC
16,3
to the same UE. Because the SF remains un-
changed, the net bit rate does not get aected. Therefore, this procedure happens
only at physical layer, without disturbing the higher
6
protocols layers.
5.6 Packet Scheduler
With the introduction of GPRS into the mobile world, it became clear that packet
switched IP-based data services are going to be an important part of the services
6
MAC, RLC and PDCP
5.6. PACKET SCHEDULER 135
Figure 5.8: OVSF code Tree
oered by future mobile systems. That is why Packet Scheduler is introduced in
RNC to handle the packet trac more eciently. The main function of packet
scheduler are:
Transport Channel Type Selection: Logical channel DTCH can be mapped
on either common channels, dedicated channels or on shared channels. PS is
responsible to select the channel type and later on, if needed, channel type
switching
7
.
Transport Format Combination Set (TFCS) construction: At the time
7
HS-DSCH DCH channel type switching can be understood as HSDPA to R99 handover.
136 CHAPTER 5. RADIO RESOURCE MANAGEMENT
Figure 5.9: DL Channelization Code Tree Optimization to avoid code congestion
of radio bearer setup, the PS decides about the possible transport formats
(transport block size, TB set size, TTI, channel coding scheme, coding rate,
etc.).
RRC state handling: PS is responsible to handle the UE state. This concept
is explained later in section 5.6.1.
Priority handling: All the PS bearers to be scheduled are put into queue
and PS picks the bearer according to their relative priorities.
Overload Control: If the cell load goes to overload, it is PS which reduced
the bit rates and thereby tries to bring back the load to normal state.
Bit Rate Adaptation: Other than these, PS also keeps an eye on the re-
source allocation & utilization. For example, if allocated bit rate is higher
and actual throughput is not high, then the bit rate can be reduced to avoid
wastage of resources.
5.6. PACKET SCHEDULER 137
In order to transmit data in uplink, UE can use RACH, DCH or E-DCH transport
channels. Similarly UE can receive downlink data on FACH, DCH or HS-DSCH
transport channels. This mapping between logical channels and transport channels
is performed by the MAC layer which is implemented in RNCs packet scheduler
algorithm. With the introduction of HSDPA & HSUPA, the packet scheduling
function is distributed, which is described below:
RACH (), FACH () & DCH (): For these transport channels, the packet
scheduling is performed by RNC. The main input for the scheduler decision
are: the amount of data to be transmitted, actual throughput measured in
past few TTIs, cell load status, priorities of the bearers etc
8
.
HS-DSCH () HS-DSCH is the DL transport channel used by HSDPA system.
The scheduler for this channel is located at Node B and known as MAC-hs
scheduler. CQI plays a central role in selecting which HSDPA user will be
served in the next TTI and what transport block size will be selected.
E-DCH () Finally, E-DCH is the UL transport channel used by HSUPA. The
scheduler for this channel is also located at Node B and known as MAC-e
scheduler. The main input to these schedulers are the feedback reports from
UE. Each UE keeps on reporting the status of its buer, power control head-
room and the priority of the logical channel whose data is to be transmitted.
Scheduling request happens periodically, e.g., every 100 ms. Meanwhile UE
keeps on reporting one bit information called Happy Bit which indicated the
UEs wish for an upgrade in UL resources.
5.6.1 RRC States
Source : 3GPP TS 25.331 RRC Protocol Specification
9
RRC is the central L3 protocol in UTRAN. RRC protocol is implemented in UE
and RNC. Therefore, whenever UE & RNC want to communicate, they use RRC
protocol. Some important procedures of RRC protocols are RRC connection estab-
lishment, Radio Bearer Management, Measurement control and reporting, System
information transfer, Paging etc.
The RRC states introduced in 3G are a compromise of the following aspects:
8
Please note that Radio conditions (CPICH Ec/No or CQI) is not a factor for RNC based
packet scheduler. This happens because UE reporting to RNC is so slow that RNC cannot keep
track of radio condition of all the users.
9
TS 25.331 is perhaps the most bulky specication of UTRAN. Developments in HSDPA,
HSUPA & HSPA+ domain have further increased the details available in this this document.
138 CHAPTER 5. RADIO RESOURCE MANAGEMENT
Which physical channels that are allocated to the UE, and thus which trans-
port channels that can be used. This factor aects the eective utilization of
UTRAN resources.
Which type of RRC connection mobility procedures that are used. For exam-
ple, in one state UE performs handovers whereas in another one Cell Reselec-
tion.
The level of UE activity, e.g. whether it is known on cell or URA level and
whether or not it uses DRX. This is a deciding factor for UE battery consump-
tion and longer standby time. In principle, UE should be in a power saving
state, if inactive. At the same time, it should be possibly to quickly make a
state transition from stand by state to active state
10
.
In nutshell, the UE behaviour is broadly decided by the state in which it currently
is. Therefore, the knowledge about RRC state is very crucial in 3G understanding.
There are two modes: idle mode and connected mode. When UE is in connected
mode, its behaviour is decided by the sub-state in which it is. There are 4 sub-states
dened. They are, Cell DCH, Cell FACH, Cell PCH & URA PCH.
[1. IDLE Mode]
When a UE is in Idle Mode, there is no RRC connection between the UE and
the RNC. In other words, RNC does not even know that this UE exists in
its area. In such a situation, UE keeps on listening to system information of
the cell and periodically reads paging channel. After being paged, UE can
establish an RRC connection.
Similarly, to initiate a call, UE can establish and RRC connection with RNC
and use it to perform call control signalling.
[2. Connected mode]
2.a Cell DCH: The CELL DCH state is characterized by:
A dedicated physical channel is allocated to the UE in uplink and
downlink.
The UE is known on cell level according to its current active set.
UE shall use the connected mode measurement control information
received in other states until new measurement control information
has been assigned to the UE.
10
The words standby and active mentioned above are used as English words rather than telecom
specic technical words.
5.6. PACKET SCHEDULER 139
It shall perform measurements and transmit measurement reports
according to the measurement control information.
UE performs handover in this state - soft, softer or hard handover.
Battery consumption is the highest in Cell DCH state ( 300 -400
mA
11
).
From Operators perspective, this state is very expensive because cer-
tain dedicated radio resources have to be reserved for one subscriber.
2.b Cell FACH: The Cell FACH state is characterized by:
Neither an uplink nor a downlink dedicated physical channel is allo-
cated to the UE.
The UE continuously monitors FACH tranport channel in the down-
link (mapped on S-CCPCH physical channel).
The UE is assigned a default common transport channel in the up-
link (e.g. RACH) that it can use anytime according to the access
procedure dened by system information.
The UE is known on cell level according to the cell where the UE last
made a cell update. It performs cell reselection and upon selecting a
new UTRAN cell, initiates a cell update procedure.
UE is identied by a C-RNTI on common transport channels. The
scope of C-RNTI is limited to a cell. If a new cell is selected, a new
C-RNTI must be allocated.
UE must monitor a FACH to receive signalling messages or user data
addressed to the UE or any broadcast messages.
UE performs measurements and transmits measurement reports ac-
cording to the measurement control information.
Battery consumption in this state is lower than that in Cell DCH
state but yet very high( 150-200 mA).
Therefore, Cell FACH should not be considered as standby state. It
is an active state. The dierence compared to Cell DCH is the usage
of common channel rather than a dedicated channel.
2.c Cell PCH: The Cell PCH state is characterized by:
Neither an uplink nor a downlink dedicated physical channel is allo-
cated to the UE.
The UE uses DRX for monitoring a PCH via an allocated PICH.
11
UE battery consumption strongly depends on the handsets hardware, features and congura-
tion. Therefore, the number mentioned here should be used as approximate value for understanding
purpose.
140 CHAPTER 5. RADIO RESOURCE MANAGEMENT
No uplink activity is possible. If the UE wants to make an uplink
access, it autonomously shall enter the Cell FACH state and inform
RNC about it using cell Update signalling message.
The UE is known on cell level according to the cell where the UE
last made a cell update in CELL FACH state.
In this state, UE shall monitor the paging occasions according to the
DRX cycle and receive paging information on the PCH.
UE shall acquire system information on the BCH and use the mea-
surement control information according to that system information
when no dedicated measurement control information has been as-
signed to the UE.
Perform cell reselection and upon selecting a new UTRA cell, enter
the CELL FACH state and initiate a cell update procedure.
Perform measurements according to the measurement control infor-
mation. Consequently, when needed, enter CELL FACH state and
transmit measurement reports.
In Cell PCH state, the UE battery consumption is very small ( 5-15
mA).
2.d URA PCH: The URA PCH state is very similar to the CELL PCH
state. Therefore, a [] sign has been printed in front of those points
which dierentiate between these two states. Other points are common
in both the states. The URA PCH state is characterized by:
Neither an uplink nor a downlink dedicated physical channel is allo-
cated to the UE:
The UE uses DRX for monitoring a PCH via an allocated PICH.
No uplink activity is possible. If the UE wants to make an uplink
access it autonomously enters the Cell FACH state.
The UE is known on URA level according to the URA assigned to
the UE during the last URA update in CELL FACH state.
In this state, the UE shall monitor the paging occasions according to
the DRX cycle and receive paging information on the PCH.
Acquire system information on the BCH and use the measurement
control information according to that system information when no
dedicated measurement control information has been assigned to the
UE.
Perform cell reselection and upon selecting a new UTRA cell that
does not match the URA assigned to the UE, enter the CELL FACH
state and initiate a URA update procedure.
5.6. PACKET SCHEDULER 141
Perform measurements according to the measurement control infor-
mation when needed according to the measurement control informa-
tion, enter CELL FACH state and transmit measurement reports.
Just like the CELL PCH state, in URA PCH state also, the UE
battery consumption is very small ( 5-15 mA).
Some advanced readers might notice that there are a lot of details about RRC
states that could be added in the previous section. Their thoughts are absolutely
right. I wanted to keep is simple and short. For more details, readers are
advised to refer to TS 25.331.
5.6.2 RRC States Transitions
For the discussion about RRC State transition, URA PCH will not be discussed.
This will simplify our learning. Afterwards, the same concepts can be extended by
involving URA PCH as well.
From inactive to active transitions
This subsection will mainly treat the transition, which results in Idle to connected
mode transition, DCH allocation or DCH bit rate upgrade.
1. RRC Idle to CELL DCH Transition: From RRC IDLE, UE can directly
enter CELL DCH or Cell FACH state depending on the establishment cause
specied by UE in the RRC Connection Request message. The complete
signalling ow is shown in gure 5.5.
2. CELL FACH to CELL DCH Transition: This transition takes place
when UE has no DCH allocated. In this scenario, it can use RACH in UL
& FACH in DL. But if the UE requires higher bitrates in either DL or UL,
a request is received at RNC either from UE or from within RNC. This is
typically called as Capacity Request.
This capacity request is generated when the UE or RNC buer contains data
[in Bytes] which exceeds a certain threshold. In UL, the capacity request is
ocially known as Event 4A.
3. CELL DCH to CELL DCH Transition: This special case is not a state
transition but we should still discuss it. When a UE has been allocated some
bit rates in UL & DL and yet the amount of data [in Bytes] exceeds a certain
threshold, then DCH is upgraded to a higher bit rate, if allowed by the cell
load condition.
142 CHAPTER 5. RADIO RESOURCE MANAGEMENT
Figure 5.10: RRC State Transition: From Inactive Active behaviour
4. Cell PCH to Cell FACH Transition: If a packet session remains inactive
for several seconds or minutes, the UE will enter Cell PCH state. In this state,
there is no possibility to transmit or receive any data.
If RNC receives data from SGSN for the UE in DL: RNC will page the
UE in the Cell where it last performed a Cell Update. UE in return re-
sponds to this paging with another Cell Update message where the cause
will be explicitly specied as Paging Response. This response will go to
RNC using RACH and UE will enter Cell FACH state where once again
the data transmission can take place.
If UE has some data to send in UL: On the contrary, if the UE has some
data to send, it autonomously enters into the CELL FACH state. Once
again, on RACH it sends a Cell Update message to RNC where the cause
is specied as Uplink Data transmission.
From Active to Inactive Transitions
In contrast to the discussion in the previous section, this subsection will mainly
treat the transition which happens, if the UE becomes inactive. We will start by
5.6. PACKET SCHEDULER 143
imagining the UE has been allocated some DCH channel with N kbps in UL and
M kbps in DL. Now let us discuss the UE behaviour if it becomes inactive for a few
seconds.
Figure 5.11: RRC State Transition: From Active Inactive behaviour
1. CELL DCH to Cell FACH Transition: In CELL DCH state, UE has
a dedicated code and power allocation. If RNCs Packet scheduler detects
inactivity in UL & DL, the dedicated resources are taken back from UE and
it can be sent to CELL FACH state. The timer value used in gure 5.11 is
to give a rough idea about the range which this parameter should take. In
practice, network optimizers can change these values to control the wastage of
resources in cell.
2. CELL FACH to Cell PCH Transition: As it was shown in section 5.6.1,
CELL FACH state is a state where UE constantly monitors FACH channel.
This causes very high battery consumption in UE. Therefore, if inactivity is
detected in this state, the UE moves to the real power saving state known as
Cell PCH.
3. Cell PCH to RRC IDLE Transition: In Cell PCH, UE can generally stay
inctive for a longer period because neither it is holding any network resource
nor it is wasting its battery power.
144 CHAPTER 5. RADIO RESOURCE MANAGEMENT
5.7 Power Control
As we have seen in the sections 5.2.1 & 5.2.2, transmit power in any CDMA-based
system is directly connected to the capacity of a cell. Therefore, it is desired to
keep the transmit power level at a minimum level which will be just enough to
meet the quality target but not exceed the desired quality. In UMTS, this task is
accomplished by 3 types of power control algorithms, which are explained in this
section.
DL Common Channels UL Common Channels
P-SCH Primary Synchronization Ch.
PRACH Physical Random Access Ch.
S-SCH Secondary Synchronization Ch.
P-CPICH Primary Common Pilot Ch.
P-CCPCH Pri. Common Control Physical Ch.
S-CCPCH Sec. Common Control Physical Ch.
PICH Paging Indication Channel Ch.
AICH Acquisition Indication Channel Ch.
DL Dedicated Channels UL Dedicated Channels
DPCH Dedicated Physical Channel
DPDCH Dedicated Phy. Data Ch.
DPCCH Dedicated Phy. Control Ch.
Table 5.1: List of all R99 Physical channels
Table 5.1 shows a list of all UL & DL physical channels of R99 UMTS. Among these:
The DL common channels do not undergo any power control. The power of
these channels is decided by radio network planners and remains xed through-
out the operation. Their power values can be changed as an optimization eort
by the optimization engineers but RRM plays no role in dynamically changing
the power of DL common channels.
UL Common channel PRACH is used for making initial access to the net-
work. Additionally, in UMTS, PRACH can carry small amount of UL NRT
data trac. The power control on PRACH is known as Open Loop Power
Control.
From the table 5.1, the only remaining channels are UL & DL dedicated chan-
nels. These are the main trac channels in 3G. These channels undergo two
power control mechanisms in parallel, known as Inner Loop Power Control
and Outer Loop Power Control.
5.7. POWER CONTROL 145
5.7.1 Open Loop Power Control
Source : 3GPP TS 25.211, 25.214, 25.331
According to Open Loop Power Control of PRACH channel, UE transmits a PRACH
preamble with a certain initial power (see equation 5.7). If it does not receive any
response in downlink on the Aquisition Indication channel (AICH), it ramps up the
power and sends the next preamble with a higher power. UE keeps on doing it until
it receives the response from Node B.
According to the procedure dened by 3GPP TS 25.331 (section 8.5.7), UE calcu-
lates the power for the rst preamble as:
Preamble Initial Power = Primary CPICH TX power
CPICH RSCP
+ UL interference
+ Constant Value (5.7)
Primary CPICH Tx power and Constant value are broadcasted by
system information in System Information Block type 5;
UL interference is broadcasted by system information in System Infor-
mation Block type 7;
and the CPICH RSCP is measured by UE;
As expressed by equation 5.7, the initial preambles strength can be controlled by
a constant value. This parameter can be in the range of [-35 . . . -10] dB. Once, the
value of this parameter is xed, then the equation can be simplied as
Preamble Initial Power Primary CPICH TX power CPICH RSCP
Path Loss (5.8)
From equation 5.8, we can conclude that transmission power of rst preamble is
directly proportional to the path loss experienced by the UE. Hence, further away
the UE is, stronger will be the initial preamble.
146 CHAPTER 5. RADIO RESOURCE MANAGEMENT
After transmitting the initial preamble UE will wait for a certain time
12
. Within this
period if there is no response from the Node B, UE will send the next preamble with
an increased power. This power ramping is called Open Loop power Control.
The word Open Loop means that this power control works autonomously in the
transmitter (UE) without any feedback from the receiver (Node B). The moment UE
receives a feedback from Node B, open loop PC is nished because its purpose was
only to calculate the minimum initial UL power which will allow UE to communicate
with Node B.
As dened in 3GPP TS 25.214 (section 6.1), before the physical random-access
procedure can be initiated, Layer 1 shall receive the following information from the
higher layers (RRC): (The parameters related to Open Loop Power Control are indicated
by [].)
The message length in time, either 10 or 20 ms.
The AICH Transmission Timing parameter [0 or 1].
The set of available signatures and the set of available RACH sub-channels for each
Access Service Class (ASC).
The power-ramping factor Power Ramp Step [integer > 0].
The parameter Preamble Retrans Max [integer > 0].
The Power oset P p-m = (P
message-control
P
preamble
), measured in dB, between the
power of the last transmitted preamble and the control part of the random-access
message.
In order to know more about the RACH procedure in UMTS, advanced readers are advised
to refer to 3GPP TS 25.214, (section: Physical random access procedure). PRACH
procedure has also been discussed in chapter 4 of this book in section ULcomCH. As a
quick summary, please refer to gure 5.12.
5.7.2 Inner Loop Power Control
In order to understand the fast inner loop power control of UMTS, let us review our
knowledge about UL and DL dedicated channel. As shown in gure 5.13, there are two
physical channels in UL (DPDCH and DPCCH) and only one physical channel in DL
(DPCH).
12
The exact time can be calculated by reading the AICH transmission timing from system
information.
5.7. POWER CONTROL 147
Figure 5.12: Open loop Power Control on PRACH physical Channel
Figure 5.13: Slot format of UL and DL DPCH Channel
On UL DPCCH, UE sends Pilot bits whose quality is measured by Node
B. In response, Node B sends TPC Command on DL DPCH. Based
on this TPC Command, UE can increase or decrease its transmission
power. In gure 5.13, this phenomenon is highlighted by oval shapes.
Similarly, on DL DPCH, Node B sends Pilot bits whose quality is mea-
sured by UE. In response, UE sends TPC Command on UL DPCCH.
Based on this TPC Command, Node B can increase or decrease its trans-
mission power used on that particular radio link. 5.13, this phenomenon
is highlighted by triangle shapes.
148 CHAPTER 5. RADIO RESOURCE MANAGEMENT
Source : 3GPP TS 25.214;
Section 5.1 Uplink power control,
Section 5.2 Downlink power control
The concept of power control mechanism is very easy but to understand the mathematical
description available in TS 25.214, we require some acquaintance with these procedures.
In the following section, we will try to simplify the explanation. The exact details should
be studied from the reference mentioned above.
Let us discuss the uplink and downlink power control procedures one by one. First we will
start with uplink.
Uplink Inner Loop PC
3GPP TS 25.214 (section 5.1.2.2.1) provides the general description of uplink inner-loop
power control. UL inner loop PC adjusts the UE transmit power in order to keep the
received uplink signal-to-interference ratio (SIR) at a given SIR target, SIR
Target
.
The serving cells (cells in the active set) should estimate signal-to-interference ratio SIR
Est
of the received uplink using the Pilot Bits in UL DPCCH.
On Node B side, this decision has to be taken:
if SIR
Est
> SIR
Target
then the TPC command to transmit is 0.
if SIR
Est
< SIR
Target
then the TPC command to transmit is 1.
If UE is in soft handover with 2 or more cells, it is possible that it received dierent TPC
Commands from dierent cells. For example, in 2 cells TPC Command = 1 and one cell
TPC command = 0.
UE must combine the multiple TPC commands and derive one nal TPC command that
will be eective in that slot. TPC Command is 0 if at least one cell is sending
TPC command = 0 and TPC Command is 1 only if all the cells are sending TPC
command =1.
To convert the binary values (0 or 1) to the power step (+1 dB, +2 dB, -1 dB, 0 dB or
any other value), UE uses following guidelines:
If the received TPC command is equal to 0, then TPC cmd for that slot is -1.
DPCCH =
TPC
TPC cmd
(or) P
tx,DPCCH
(n + 1) = P
tx,DPCCH
(n)
TPC
(5.9)
5.7. POWER CONTROL 149
If the received TPC command is equal to 1, then TPC cmd for that slot is +1.
DPCCH =
TPC
TPC cmd
(or) P
tx,DPCCH
(n + 1) = P
tx,DPCCH
(n) +
TPC
(5.10)
On UE side, the TPC command is interpreted according to the power control algorithm
selected by operator.
[PCA 1 Power Control Algorithm 1 (3GPP TS 25.214 section 5.1.2.2.2)]
When PCA 1 is selected, UE responds to TPC commands every time slot. In
other words, Power control happens at a rate of 1500 times per second. The
rules for TPC cmd calculation are explained in equations 5.10 & 5.9.

TPC
= 1 dB or 2 dB, which is derived from the UE-specic higher-layer
parameter TPC-StepSize. This parameter value is signalled to UE by RNC
using L3 RRC signalling at the time of DCH allocation.
[PCA 2 Power Control Algorithm 2 (3GPP TS 25.214 section 5.1.2.2.3)]
When the PCA 2 is selected, then UE responds to TPC command every 5
th
time slot. This reduces the frequency of power control from 1500 to 300 times
per second.
For rst four slots in set, TPC cmd = 0.
For the 5
th
time slot, UE follows following rule:
If all 5 TPC commands within a set are 1 (i.e., 11111) then
TPC cmd = +1 in the 5th slot.
If all 5 TPC commands within a set are 0 (i.e., 00000) then
TPC cmd = 1 in the 5th slot.
Otherwise, TPC cmd = 0 in the 5
th
time slot.

TPC
= 1 dB. For Algorithm 2,
TPC
shall always take the value 1 dB.
After doing all this analysis, UE knows TPC cmd = 0 or 1 in every slot.
Two algorithms shall be supported by the UE for deriving a TPC cmd. Which of these
two algorithms is used is determined by a UE-specic higher-layer parameter, PowerCon-
trolAlgorithm, and is signalled to UE by RNC using L3 RRC signalling at the time of
DCH allocation.
Summary of uplink fast power control algorithms:
150 CHAPTER 5. RADIO RESOURCE MANAGEMENT
Power Control Algorithm 1: If the power control algorithm is PCA 1,
then the UE responds of TPC commands as following:
If TPC bit = 1 Increase the power by 1 or 2 dB
If TPC bit = 0 Decrease the power by 1 or 2 dB
Power Control Algorithm 2: PCA 2 means:
If 5 consecutive TPC bits are = 11111 Increase the power by 1 dB
If 5 consecutive TPC bits are = 00000 Decrease the power by 1 dB
If 5 consecutive TPC bits are = 01101 Ignore the commands
If 5 consecutive TPC bits are = 10110 Ignore the commands
If 5 consecutive TPC bits are = . . . Ignore the commands
Please refer to section 5.1 Uplink power control in 3GPP TS 25.214 for the exact math-
ematical analysis and more details about the UL inner loop power control. Now let us
focus on the DL power control mechanism.
Downlink Inner Loop PC
We must remember, Node B is transmitting several physical channels simul-
taneously. The power control explained in this section works independently
on all the DL DPCHs. In other words, if there are 10 users using speech
service in a cell, the power used for each user is calculated separately and
independently.
As explained in the introductory remarks about power control, the DL inner loop PC ad-
justs the Node B transmit power to maintain the received Downlink signal-to-interference
ratio (SIR) at a given SIR target, SIR
Target
. Node B adjusts it transmit power according
to the TPC commands received from UE in UL DPCCH. UE calculates the value of TPC
command by comparing the desired Target SIR and actually measured SIR.
Figure 5.14, shows that DPDCH and DPCCH are time-multiplexed to form DPCH. The
DL power control algorithm controls the DL transmit power of the pilot bits eld of
DPCCH. From this gure, one can notice the power osets as following:
P01: The power oset between TFCI elds of DPCCH and the DPDCH.
P02: The power oset between TPC elds of DPCCH and the DPDCH.
PO3: The power oset between PILOT BITS elds of DPCCH and the DPDCH.
5.7. POWER CONTROL 151
Figure 5.14: Slot format of DL DPCH Channel
As power control takes place, the relative power osets between the DPCCH and DPDCH
are not changed.
According to 3GPP TS 25.214 (section 5.2.1.2.1 UE behaviour), the UE shall generate
TPC commands to control the network transmit power and send them in the TPC eld
of the uplink DPCCH. The UE shall check the downlink power control mode (DPC
Mode
)
before generating the TPC command. The DPC MODE parameter is a UE specic
parameter controlled by the UTRAN.
If DPC
Mode
= 0: the UE sends a unique TPC command in each slot and the TPC
command generated is transmitted in the rst available TPC eld in the uplink
DPCCH;
If DPC
Mode
= 1: the UE repeats the same TPC command over 3 slots and the new
TPC command is transmitted such that there is a new command at the beginning
of the frame.
According to 3GPP TS 25.214 (section 5.2.1.2.2 UTRAN behaviour), upon receiving the
TPC commands, UTRAN shall adjust its downlink DPCCH/DPDCH power accordingly.
For DPC
Mode
= 0, UTRAN shall estimate the transmitted TPC command TPC
est
to be
0 or 1, and shall update the power every slot. If DPC
Mode
= 1, UTRAN shall estimate
the transmitted TPC command TPC
est
over three slots to be 0 or 1, and shall update the
power every three slots.
According to 3GPP TS 25.214, the power control step size can take four values: 0.5, 1,
1.5 or 2 dB. It is mandatory for UTRAN to support the step size of 1 dB, while support
of other step sizes is optional.
Summary of downlink fast power control algorithms:
152 CHAPTER 5. RADIO RESOURCE MANAGEMENT
DPC
Mode
= 0: If the power control algorithm is DPC Mode=0, the then
Node B responds of TPC commands as following:
If TPC bit = 1 Increase the power by a xed step size
If TPC bit = 0 Decrease the power by a xed step size
DPC
Mode
= 1: If the power control algorithm is DPC Mode=1, the then
Node B responds of TPC commands as following:
If 3 consecutive TPC bits are = 111 Increase the power by a xed step size
If 3 consecutive TPC bits are = 000 Decrease the power a xed step size
If 3 consecutive TPC bits are = 011 Ignore the commands
If 3 consecutive TPC bits are = 101 Ignore the commands
If 3 consecutive TPC bits are = . . . Ignore the commands
5.7.3 Outer Loop Power Control
Outer Loop Power Control adjusts the SIR target (SIR
Target
), in order to achieve a desired
Target Block Error Rate (BLER
Target
). Therefore, the decisions to increase or decrease
the SIR Target are made based on the comparison of estimated (measured) BLER with
Target BLER.
DL Outer Loop PC
DL outer loop power control is mainly implemented within the user equipment. At the
beginning of connection setup, RNC informs UE about the desired value of block error
rate (BLER
Target
). When UE receives the data, it calculates the actual value of BLER
received in the current TTI. This procedure is illustrated in gure 5.15.
If Estimated BLER is < Target BLER then the DL Target SIR is reduced.
If Estimated BLER is > Target BLER then the DL Target SIR is increased.
If Estimated BLER is = Target BLER then the DL Target SIR is not modied.
Figure 5.15 illustrates both DL innerloop and DL outerloop power control mechanisms.
The DL outerloop function appears to be an autonomous algorithm which tries to reach
the BLER
Target
as informed by the RNC at the beginning of connection setup. Hence, the
UE handset vendors have some degree of freedom while implementing the DL outer loop
PC.
5.7. POWER CONTROL 153
Figure 5.15: Functionality of DL Outer Loop & Inner Loop PC
UL Outer Loop PC
Figure 5.16: Functionality of UL Outer Loop & Inner Loop PC
In uplink, the Outer Loop Power Control takes place in RNC. The whole procedure is
illustrated in gure 5.16. The same sequence of steps are described in the following text:
154 CHAPTER 5. RADIO RESOURCE MANAGEMENT
1. At connection setup, (RRC or RAB), RNCs admission control decides the UL BLER
Target
.
2. Admission control also decides the initial, minimum and maximum SIR
Target
.
3. RNC informs Node B about the initial SIR
Target
.
4. On physical layer between UE and Node B, UL inner-loop power control tries to
achieve this target value of SIR. The process is briey described below.
(a) UE transmits pilot bits on UL DPCCH channel.
(b) Node B estimates the Signal-to-interference-ratio (SIR
Est
) & decides the po-
larity of TPC bits.
if SIR
Est
> SIR
Target
then the TPC command to transmit is 0
if SIR
Est
< SIR
Target
then the TPC command to transmit is 1
(c) This communication between UE and Node B happens once every slot (once
every 2/3 ms).
5. After receiving the data from UE, the Node B forms a frame protocol frame. This
frame has 2 parts, header and payload. Payload is for the received data from UE,
but the header contains some control information. Among other things, the header
eld contains frame reliability information.
6. (In case of Soft handover), UE is connected to more than one cell or Node B. RNC
receives the frames from all the Node Bs and looks into the frame reliability infor-
mation. Based on this information, RNC decides, which frame should be forwarded
to the core network.
7. After combining the frames from all the Node Bs, RNC estimates the BLER
Est
and
compares it with BLER
Target
. Based on the result from this last step, the SIR target
is either reduced, increased or kept unchanged.
8. RNC informs Node B about the modied target of SIR and the whole process repeats
once again (steps 3, 4, 5, 6 & 7).
5.8 Handover Control
In early 90s, people were amazed to know that while talking they can move
from one cell to another, without disconnecting the call. Now a days, we treat
it as a basic functionality of cellular networks. We have certainly come a long
way.
Handover is a mechanism where a UE in connected mode can move from one WCDMA cell
to another cell. The target cell can be of the same radio access technology or a dierent
one e.g., GSM. This brings us to the point where we should classify the type of handovers
5.8. HANDOVER CONTROL 155
in WCDMA. In RRM framework, the handover control makes decisions that will be made
based on the measurement results reported primarily by the UE but also by measurements
in the network or various parameters set for each cell. In general, the handovers in all
the systems can be categorized into two families, namely Soft HO & Hard HO. A brief
introduction to both is given below.
(a) Soft Handover: Soft Handover is a handover in which the mobile station adds and
removes radio links in such a manner that the UE always keeps at least one ra-
dio link to UTRAN. This can be performed on the same carrier frequency
only. For this reason, Soft Handover allows easily the provision of macro diversity
transmission. As a result of this denition, there are areas of the UE operation in
which the UE is simultaneously communicating via a number of radio links towards
dierent cells.
With reference to Soft Handover, the Active Set is dened as the set of radio links
simultaneously involved in the communication between the UE and UTRAN (i.e.,
the UTRA cells currently assigning a downlink DPCH to the UE constitute the
active set). Typically, max Active Set Size = 3.
(b) Hard Handover: A Hard handover is a handover in which the mobile station has to
remove all the active radio links before establishing a new radio link with the target
cell. A need of hard handover arises when:
The target cell is a WCDMA cell but operating at a frequency other than the
frequency used in the source cell.
The target cell belongs to a dierent radio access technology.
The source and target cell are both operating at same frequency but a SHO is
not possible
13
.
Another way of classication of handover is based on the Radio frequency and technology
used in the source cell and the same used in the target cell. Based on this criterion, the
handover in WCDMA can be categorized in 3 groups:
1. Intra Frequency Handover: This scenario happens when the source cell is a WCDMA
cell with operating frequency f
1
& the target cell is also a WCDMA cell with the
same operating frequency. These kinds of handovers are typically:
Soft HO: Inter Node B soft HO
Softer HO: Intra Node B soft HO
Hard HO: Inter-RNC HO but no Iur interface between the two RNCs.
13
This happens in the case of Inter-RNC Handover without Iur interface support.
156 CHAPTER 5. RADIO RESOURCE MANAGEMENT
2. Inter Frequency Handover (IFHO): In GSM, the neighbouring cells generally op-
erate on dierent frequency. Therefore, while moving from one cell to another is
simply an Inter Frequency HO, but there is a big dierence between TDMA-based
2G system and CDMA-based 3G system. In CDMA systems, UE is constantly
receiving & transmitting on its serving frequency. Therefore, UE cannot measure
another carrier without interrupting its reception on the serving UTRAN frequency.
Hence we need some kind of scheme where some well-dened gaps are created in
which UE can perform measurements of signal strength of P-CPICH of the inter-
frequency target cell. This concept is called Compressed Mode and will be discussed
later in this section.
Concept of compressed measurement is also needed for 3G to 2G Handover or ISHO.
3. Inter System Handover (ISHO): In the early days of UMTS deployment, it can be
anticipated that the service area will not be as contiguous and extensive as existing
second generation systems. It is also anticipated that UMTS network will be an
overlay on the 2nd generation network and utilize the latter, in the minimum case,
as a fall back to ensure continuity of service and maintain a good QoS as perceived
by the user.
Therefore, the majority of 3G mobile devices will be a multimode equipment, capable
of using both 2G & 3G. This concept is benecial for both the technologies. Where
3G gets some kind of coverage safety belt from the underlying legacy 2G network,
at the same time, 2G investments can be reused in the modern 3G technology. This
backward compatibility of 3G to 2G is a major driving force in the success of UMTS.
5.8.1 Active, Monitored and Detected cells
According to 3GPP TS 25.331 (section 8.4.0 Measurement related denitions), cells that
the UE is monitoring are grouped in the three mutually exclusive categories:
Active Set Cells: Cells, which belong to the active set. User information is sent from
all these cells. The cells in the active set are involved in soft handover. The UE
shall only consider active set cells included in the variable CELL INFO LIST for
measurement; i.e., active set cells not included in the CELL INFO LIST shall not
be considered in any event evaluation and measurement reporting.
Monitored Cells: Cells, which are not included in the active set, but are included in
the CELL INFO LIST belong to the monitored set. In common mans language, we
can call these cells as dened neighbours.
Detected Cells: Cells detected by the UE, which are neither in the CELL INFO LIST
nor in the active set belong to the detected set. Reporting of measurements of the
detected set is only applicable to intra-frequency measurements made by UEs in the
CELL DCH state. These cells can be understood as missing neighbours.
5.8. HANDOVER CONTROL 157
5.8.2 Soft/Softer Handover
The only dierence between soft and softer handover is:
In Soft Handover, the cells taking part in HO are served by two dierent Node Bs,
whereas, in Softer handover, they belong to the same Node B.
In Soft Handover, RNC receives the data from two (or more) Node Bs. Both of
these data ow can have dierent block error rates (BLER). RNC can select the
data with less BLER and ignore the other one. This procedure in called Macro
Diversity Combining (MDC). An example of this was shown in the UL outer loop
PC section (see gure 5.16).
In Softer HO, there is no MDC because it is Node B which performs the combining
of two uplink radio links.
Another dierence between the Soft & Softer HO is in terms of Iub utilization. In
Softer Handover, the data is sent/received on Iub only on one link, where as in
Sot handover at least two Iub links are used and in worst case, even an Iur link is
required if the two Node Bs are controlled by two dierent RNCs.
Otherwise from the RF perspective, Soft and Softer HO are very similar. Therefore, in
the next sections the word Soft Ho will be used for both types of HO.
Soft handovers are Mobile Evaluated Handovers, MEHO. Therefore, it is UE which initiates
the handover procedure. As dened in section 5.1.3, UE can inform RNC about the need
for handover either periodically or based on some events.
According to 3GPP TS 25.331 (section 14.1.1 Intra-frequency measurement quantities),
a measurement quantity is used to evaluate whether an intra-frequency event has occurred
or not. It can be:
1. Downlink Ec/No.
2. Downlink path loss. For FDD:
Pathloss in dB = Primary CPICH Tx power CPICH RSCP
For Primary CPICH Tx power, the IE Primary CPICH Tx power shall be used
which is signalled to UE in system information (SIB 5). The unit is dBm. CPICH
RSCP is the result of the CPICH RSCP measurement. The unit is dBm.
3. Downlink received signal code power (RSCP) after despreading.
In practice, most commonly, CPICH Ec/No is chosen as a measurement quan-
tity for Soft HO decisions. For Inter-frequency and Inter-System handover,
both CPICH RSCP and CPICH Ec/No are used to trigger the handover mea-
surements.
158 CHAPTER 5. RADIO RESOURCE MANAGEMENT
For Soft handover, there are three main events dened in the specications 3GPP TS
25.331. Within Measurement Control message, the UTRAN noties the UE which events
should trigger a measurement report. The listed events are the toolbox from which the
UTRAN can choose the reporting events that are needed for the implemented handover
evaluation function, or other radio network functions.
In the description about the SHO related events, we will assume that Intra-
frequency measurement quantity is CPICH Ec/No. The explanation is a sim-
plied version of the complicated (and complete) procedure explained in 3GPP
TS 25.331.
[Event 1A:] A Primary CPICH enters the reporting range.
Figure 5.17: Event 1A triggered
Commonly network planners and optimizers dene event 1A as Event
1A is used to ADD a cell to the active set.
As shown in gure 5.17, event 1A can take place when the UE has an active set =
1 or 2. The threshold value of CPICH Ec/No is calculated with reference to the
best active set cell. Therefore, if a neighbour cell is to be added to the active set,
its CPICH Ec/No should be greater than the threshold shown in the gure. The
threshold does not have an absolute value but relative to the best active set cell.
In right sub-gure of gure 5.17, there are 2 cells in AS but the threshold for
handover evaluation is calculated with reference to the cell with SC a because it is
the strongest cell in AS.
(CPICH Ec/No)
Neighbour Cell
> (CPICH Ec/No)
Best, AS Cell
Add Window (5.11)
5.8. HANDOVER CONTROL 159
UE RNC: Measurement Report
After event 1A gets triggered, UE reports this to RNC by sending a L3 RRC:
Measurement Report massage. In this, UE species the DL SC of the neigh-
bour cell along with the CPICH Ec/No value. This signalling scenario was
illustrated in gure 5.7 in admission control section.
RNC UE: Active Set Update
At this moment, RNC performs admission control for the target cell. On
successful addition decision, RNC informs UE by sending a L3 RRC: Active
Set Update message.
UE RNC: Active Set Update Complete
In response, UE nally replies with RRC: Active Set Update Complete.
Adding another cell to the active set makes the neighbours of the added cell also
the neighbours for UE. Therefore, RNC performs neighbour list combining and
informs UE about its decision using RRC: Measurement Control message.
[Event 1B:] A primary CPICH leaves the reporting range .
Figure 5.18: Event 1B triggered
Commonly network planners and optimizers dene event 1B as Event
1B is used to DELETE a cell from the active set.
As shown in gure 5.18, e1B takes place when the UE has an active set = 2 or
3. Just like e1A, here also the threshold value of CPICH Ec/No is calculated with
reference to the best active set cell. Therefore, if a neighbour cell is to be deleted
or removed from the the active set, its CPICH Ec/No should be weaker than the
160 CHAPTER 5. RADIO RESOURCE MANAGEMENT
threshold shown in the gure. The threshold does not have an absolute value but
relative to the best active set cell.
In the left sub-gure of gure 5.18, there are 2 cells in the AS and in the right
sub-gure there are 3 cells in AS. In both the scenarios, the threshold for handover
evaluation is calculated with reference to the cell with SC a because it is the
strongest cell in AS.
(CPICH Ec/No)
AS,Cell
< (CPICH Ec/No)
Best, AS Cell
Drop Window (5.12)
The signalling procedures explained in the case of event 1A are also valid in this
case. The name of messages are the same. In short:
UE RNC: Measurement Report
RNC UE: Active Set Update
UE RNC: Active Set Update Complete
After deleting an AS cell, RNC performs neighbour list combining and informs
UE about its decision using RRC: Measurement Control message.
[Event 1C:] A non-active primary CPICH becomes better than an active primary
CPICH.
Figure 5.19: Event 1C triggered
Commonly network planners and optimizers dene event 1C as Event 1C is
used to REPLACE a weak AS Cell with a Stronger one outside
the AS.
5.8. HANDOVER CONTROL 161
As shown in gure 5.19, e1C can only take place when the UE has an active set = 3. In
other words, when the AS is full. In contrast to e1A & e1B, where the threshold value of
CPICH Ec/No is calculated with reference to the best active set cell, for e1C, the threshold
is calculated with reference to the Weakest active set cell. Therefore, if a neighbour cell
is to be replaced with one of the AS cells, its CPICH Ec/No should be stronger than the
threshold shown in gure 5.19.
In gure 5.18, there are 3 cells in AS. The threshold for handover evaluation is calculated
with reference to the cell with SC c because it is the weakest cell in AS.
(CPICH Ec/No)
Neighbour Cell
> (CPICH Ec/No)
Weakest, AS Cell
+ Replacement Window
(5.13)
The signalling procedures explained in the case of event 1A & 1B.
As a summary, the SHO mechanism can be summarized by gure 5.20. This gure has
been copied from Figure 5-1: Example of Soft Handover Algorithm of 3GPP TR 25.922
V7.0.0 which explains Radio resource management (RRM) strategies. Advanced readers
who might be interested in more details, are advised to refer to section 5.1.4.2 in TR
25.922.
Figure 5.20: Summary of Soft Handover Mechanism (from TR 25.922)
162 CHAPTER 5. RADIO RESOURCE MANAGEMENT
5.8.3 ISHO and IFHO Triggering
In CDMA, the UEs with only one receiver are only monitoring the DL frequency used by
the active set cells. Therefore, to start the inter-frequency or inter-system measurements,
certain events must take place. In general, there are several reasons to start an IFHO or
ISHO. The following is a non-exhaustive list for causes that could be used for the initiation
of a handover process.
Uplink quality (e.g.BLER)
Downlink quality (e.g. Transport channel BLER)
Downlink signal measurements (e.g. CPICH RCSP, CPICH Ec/No, Pathloss)
UE transmit power
Node B radio link Power
Trac load (or Load Based HO)
Pre-emption
Change of service (service based HO)
. . .
. . .
The exact strategies implemented in the RAN depends on infrastructure vendors. From
those strategies, the network optimizers can enable only a subset (or all the strategies)
that will control inter-system and inter-frequency handover. In this book, we will discuss
the ISHO/IFHO due to downlink pilot channel measurements (e.g. CPICH RCSP, CPICH
Ec/No).
As depicted by the left sub-gure of gure 5.21, the downlink signal of the active set cell
has become very weak. According to 3GPP TS 25.331, there are specic events described
for these scenarios.
Event 1F: A Primary CPICH becomes worse than an absolute threshold. The
strength of P-CPICH can be measured in terms of CPICH RCSP, CPICH Ec/No. In
order to trigger an event 1F, either of the two quantities has to fall below a certain
threshold. In gure 5.21(see left sub-gure), these thresholds are depicted as N dB
for Ec/No and M dBm for RSCP.
Please note: A UE can be in SHO with 2 or 3 cells. If 1F is triggered for one of
the AS cells, UE reports this to RNC but RNC does not start the measurement
mechanism because there are still other AS cells, which can maintain the service
with adequate quality. Only when the e1F is triggered for the last AS cell, the
measurements procedure is started.
5.8. HANDOVER CONTROL 163
Figure 5.21: Event 1E & 1F triggered
Event 1E: A Primary CPICH becomes better than an absolute threshold. In
order to trigger an event 1E, either of the two quantities has to rise above a certain
threshold. In gure 5.21 (see right sub-gure), these thresholds are depicted as N
+
1
dB for Ec/No and M +
2
dBm for RSCP.
In simple words, event 1E can be called as Cancel previously reported event 1F.
Summary: Event 1F is a method by which UE informs RNC about its poor
3G coverage and the need for an IFHO or ISHO and Event 1E is a method by
which UE informs RNC about its 3G reception with acceptable signal quality.
For a more detailed information, readers should refer to 3GPP TS 25.331. Section 14.1.2.5
describes the details of Event 1E & 14.1.2.6 illustrates Event 1F.
5.8.4 Inter-Frequency Measurements
Source: 3GPP TS 25.331, section 14.2.0a Inter-frequency measurement
quantities
Within the measurement reporting criteria eld in the MEASUREMENT CONTROL mes-
sage, UTRAN noties the UE which events should trigger the UE to send a MEASURE-
MENT REPORT message. The listed events are the toolbox from which the UTRAN
164 CHAPTER 5. RADIO RESOURCE MANAGEMENT
can choose the reporting events that are needed for the implemented handover evaluation
function or other radio network functions. The measurement quantities are measured on
the monitored primary common pilot channels (CPICH) in the FDD mode. In order to
understand the events of IF measurements, we need to dene 2 terms:
1. Non-used Frequency: A non-used frequency is a frequency that the UE has been
ordered to measure upon but is not used for the connection.
2. Used Frequency: A used frequency is a frequency that the UE has been ordered
to measure upon and is also currently used for the connection.
The following events are described in section 10.3.7.19 of 3GPP TS 25.331. This section
is about Inter-frequency measurement reporting criteria.
1. Event 2a: Change of best frequency.
2. Event 2b: Event 2b is triggered when following 2 conditions are fullled:
The estimated quality of the currently used frequency is below a certain thresh-
old, and
the estimated quality of a non-used frequency is above a certain threshold.
3. Event 2c: The estimated quality of a non-used frequency is above a certain threshold.
4. Event 2d: The estimated quality of the currently used frequency is below a certain
threshold.
5. Event 2e: The estimated quality of a non-used frequency is below a certain threshold.
6. Event 2f: The estimated quality of the currently used frequency is above a certain
threshold.
5.8.5 Inter-System Measurements
Source: 3GPP TS 25.331, section 14.3.0a Inter-RAT measurement quantities
At the time of writing of this book, the commonly used inter-system handover from an
UTRAN cell are towards a GERAN cell (2G) or a E-UTRAN cell (LTE). We will discuss
only the handovers from 3G to 2G.
A measurement quantity is used by the UE to evaluate whether an inter-RAT measurement
event has occurred or not is described below:
Measurement quantity for UTRAN: The measurement quantity for UTRAN is used
to compute the frequency quality estimate for the active set, as described in the next
subclause, and can be:
5.8. HANDOVER CONTROL 165
Downlink Ec/No.
Downlink received signal code power (RSCP) after despreading.
Measurement quantity for GSM: The measurement quantity for GSM can be:
GSM Carrier RSSI
Within the measurement reporting criteria eld in the MEASUREMENT CONTROL mes-
sage, UTRAN noties the UE which events should trigger the UE to send a MEASURE-
MENT REPORT message. The listed events are the toolbox from which the UTRAN
can choose the reporting events that are needed for the implemented handover evaluation
function or other radio network functions. The measurement quantities are measured on
the monitored primary common pilot channels (CPICH) in the FDD mode. In order to
understand the events of inter-system measurements, we need to dene 2 terms:
1. Other System: Other system is e.g., GSM or E-UTRA
14
. But in this book, we will
discuss on the GSM case.
2. Used Frequency: A used UTRAN frequency is a frequency that the UE have been
ordered to measure upon and is also currently used for the connection to UTRAN.
Following events are described in section 10.3.7.30 of 3GPP TS 25.331. This section is
about Inter-RAT measurement reporting criteria.
1. Event 3a: Event 3a is triggered when the following two conditions are fullled:
The estimated quality of the currently used UTRAN frequency is below a
certain threshold, and
The estimated quality of the other system is above a certain threshold.
2. Event 3b: The estimated quality of the other system is below a certain threshold.
3. Event 3c: The estimated quality of the other system is above a certain threshold.
4. Event 3d: Change of the best cell in the other system.
5.8.6 Compressed Mode
In the previous section, we saw how a UE informs RNC about the need for handover to
another frequency UTRAN cell or a cell with another RAT (e.g. GSM). In this section,
we will try to investigate the method by which the UE can perform measurements on
14
LTE
166 CHAPTER 5. RADIO RESOURCE MANAGEMENT
another frequency while resuming the service on its serving frequency. This method is
called Compressed Mode
15
.
According to 3GPP TR 25.922, Compressed Mode can be avoided if the device supports
dual-receiver. UE can signal this capability to RNC using at the time of RRC establish-
ment. But the majority of UEs, which are commercially available, have only one receiver,
therefore, the radio planners cannot rely on this option. It is assumed that UEs do not
support dual-receivers and therefore, compressed mode is very much needed.
Methods of Compressed Mode
Spreading Factor by 2 or SF/2: This method has advantages and also disadvantages:
Adv: This method allows us to achieve the same bitrate in compressed frames as
in the normal frame.
Disadv: In compressed frames, the SF becomes half, therefore, the power require-
ment becomes double. This causes problems in terms of coverage and capacity.
Higher Layer Scheduling: This method also has advantages and disadvantages:
Adv: This method allows us to transmit with the same power in compressed frames
and normal frames.
Disadv: The bit rate in compressed mode is reduced because higher layers have
scheduled less data in compressed frame.
5.8.7 Inter System HO Signalling
The signalling procedures involved with Inter-system HO is explained in chapter section
9.9. In short, the steps involved in this procedure are:
1. Phase 1: ISHO triggers
2. Phase 2: Compressed Mode measurements for BCCH RSSI
3. Phase 3: Measurement Reports (UE to RNC)
4. Phase 4: Compressed Mode measurements for BSIC verication
5. Phase 5: Measurement Reports (UE to RNC)
6. Phase 6: HO decision
7. Phase 7: Signalling between SRNC & BSC
15
This has nothing to do with data compression as we know from our computer and IP knowledge.
5.8. HANDOVER CONTROL 167
8. Phase 8: Communication between UE and GERAN
9. Phase 9: Conrmation about successful HO to RNC
Please refer to section 9.9 for the signalling ow and more explanation.
168 CHAPTER 5. RADIO RESOURCE MANAGEMENT
Copyright Notices
In order to create some gures, tables and text-sections, the following reference material
has been used. Information has been interpreted and presented in a simplied manner.
The original references are provided here.
Main reference material for this book has been technical specications (TSs) and technical
reports (TRs) of 3rd Generation Partnership Project (3GPP).
Figure 5.3 on page 122 Figure 13 of 3GPP TS 25.433 v 7.0.0.
Figure 5.4 on page 124 Figure 40 of 3GPP TS 25.433 v 7.0.0.
Figure 5.20 on page 161 Figure 5-1 of 3GPP TS 25.922 v 7.0.0.
Text about RRM Strategies in
section 5.3 on page 129
Section 12 of 3GPP TS 25.922 v 7.0.0.
Text about Common-NBAP mea-
surements on page 122
Section 8.2.9.2 of 3GPP TS 25.433 v 7.0.0.
Text about Dedicated-NBAP
measurements on page 123
Section 8.2.9.2 of 3GPP TS 25.433 v 7.0.0.
Text about UE measurements on
page 123
Section 5.1 & 5.2 of 3GPP TS 25.215 v 7.0.0.
Text about Initial PRACH
Preamble on page 145
Section 8.5.7 of 3GPP TS 25.331 v 6.9.0.
Text about Active, Monitored
and Detected cells on page 156
Section 8.4.0 of 3GPP TS 25.331 v 6.9.0.
Text about Intra-frequency mea-
surement quantities on page 157
Section 14.1.1. of 3GPP TS 25.331 v 6.9.0.
Text about IF measurement
quantities on page 164
Section 14.2.0a of 3GPP TS 25.331 v 6.9.0.
Text about Event 2A to 2F on
page 164
Section 10.3.7.19 of 3GPP TS 25.331 v 6.9.0.
Text about IS measurement
quantities on page 164
Section 14.3.0a of 3GPP TS 25.331 v 6.9.0.
Text about Event 3A to 3D on
page 165
Section 10.3.7.30 of 3GPP TS 25.331 v 6.9.0.
c 2006. 3GPP
TM
TSs and TRs are the property of ARIB, ATIS, ETSI, CCSA,
TTA, and TTC who jointly own the copyright for them. They are subject to
further modications and are therefore provided to you as is for information
purposes only. Further use is strictly prohibited.
5.8. HANDOVER CONTROL 169
Text about Open Loop PC pa-
rameters on page 146
Section 6.1 3GPP TS 25.214 v 6.9.0.
Text about UL Inner Loop PC on
page 148
Section 5.1.2.2.1 3GPP TS 25.214 v 6.9.0.
Text about UL PC Algorithm 1
on page 149
Section 5.1.2.2.2 3GPP TS 25.214 v 6.9.0.
Text about UL PC Algorithm 2
on page 149
Section 5.1.2.2.3 3GPP TS 25.214 v 6.9.0.
Text about DL PC (UE be-
haviour) on page 151
Section 5.2.1.2.1 3GPP TS 25.214 v 6.9.0.
Text about DL PC (UTRAN be-
haviour) on page 151
Section 5.2.1.2.2 3GPP TS 25.214 v 6.9.0.
Figure 5.12 on page 147 Figure 31 of 3GPP TS 25.211 v 9.1.0.
c 2009. 3GPP
TM
TSs and TRs are the property of ARIB, ATIS, ETSI, CCSA,
TTA, and TTC who jointly own the copyright for them. They are subject to
further modications and are therefore provided to you as is for information
purposes only. Further use is strictly prohibited.
BIBLIOGRAPHY
[1] 3GPP TS 25.211 ver. 6.0.0 ;Physical channels and mapping of transport channels
onto physical channels (FDD)
[2] 3GPP TS 25.212 ver. 7.0.0 ;Multiplexing and Channel Coding (FDD)
[3] 3GPP TS 25.213 ver. 6.0.0 ;Spreading and Modulation (FDD)
[4] 3GPP TS 25.214 ver. 6.0.0 ;Physical Layer Procedures (FDD)
[5] 3GPP TS 25.214 ver. 6.0.0 ;3GPP TS 25.215, Physical layer - Measurements (FDD)
[6] 3GPP TS 25.301 ver. 7.0.0 ;Radio Interface Protocol Architecture
[7] 3GPP TS 25.401 Ver. 7.0.0 ;UTRAN overall description
[8] 3GPP TS 25.413 ver. 6.0.0 ;UTRAN Iu interface RANAP signalling
[9] 3GPP TS 25.433 ver. 6.0.0 ;UTRAN Iub interface Node B Application Part (NBAP)
signalling
[10] 3GPP TS 25.331 ver. 7.0.0 ;Radio Resource Control (RRC) protocol specication
[11] 3GPP TR 25.922 ver. 7.0.0 ;Radio resource management strategies
[12] 3GPP TR 25.931 ver. 8.0.0 ;UTRAN functions, examples on signalling procedures
[13] H.Holma and A. Toskala, WCDMA for UMTS , 5th Edition, John Wiley & Sons.
[14] Chris Johnson, Radio Access Networks For UMTS ; Principles And Prac-
tice , John Wiley & Sons.
For HSDPA-specic details, the version of these specs should be 5.0.0 or
higher & for HSUPA-specic details, it should be 6.0.0 or higher.
170
CHAPTER
6
PROTOCOLS & INTERFACES
Abbreviations
In this module, a lot of abbreviation will be used. Therefore, it is better to introduce a
list of all the abbreviations used in the coming sections.
AAL2/5: ATM adaptation Layer type 2 / Type 5
ATM: Asynchronous Transfer Mode
BMC: Broadcast/Multicast Control Protocol
BSSAP: Base Station System Application Part Protocol
FP: Frame Protocol
GMM: GPRS Mobility Management
SM: (GPRS) Session Management
GTP: GPRS Tunneling Protocol
luUP: Iu User Plane Protocol
MAC: Medium Access Control
171
172 CHAPTER 6. PROTOCOLS & INTERFACES
MAP: Mobile Application Part
MM: Mobility Management
MTP-3B: Message Transfer Part Level 3B
NBAP: NBAP Node B Application Part
PDCP: Packet Data Convergence Protocol
ALCAP: Access Link Control Application Part
RANAP: Radio Access Network Application Protocol
RLC: Radio Link Control Protocol
RNSAP: Radio Network Subsystem Application Part
RRC: Radio Resource Control
RTCP: Real Time Control Protocol
RTP: Real Time Protocol
SCCP: Signalling Connection Control Part
SCTP: Stream Control Transmission Protocol
SMS: SMS Short Message Service
SS: Supplementary Services
SSCOP: Service Specic Connection-Oriented Protocol
SSCF-NNI: Service Specic Coordination Function - Network-Network Interface
SSCF-UNI: Service Specic Coordination Function - User-Network Interface
UDP: User Datagram Protocol
6.1 Overview
Source: 3GPP TS 25.401; UTRAN overall description
Figure 6.1 shows the general protocol model for UTRAN interfaces. While designing this
structure, it was planned to keep the layers and planes logically independent of each other.
This strategy was designed so that protocol stacks and planes can be modied according
to the future requirements.
6.1. OVERVIEW 173
Figure 6.1: General Protocol Model for UTRAN Interfaces (TS 25.401)
6.1.1 Horizontal Layers
The Protocol Structure consists of two main layers, Radio Network Layer, and Transport
Network Layer. A description for both is available in 3GPP TS 25.401 (section 11.1.2).
1. Radio Network Layer: All UTRAN related issues are visible only in the Radio Net-
work Layer. It denes the procedures related to the operation of Node B. The radio
network layer consists of a radio network control plane and a radio network user
plane.
2. Transport Network Layer: Transport Layer denes the procedures for establishing
physical connections between Node B and the RNC. It represents standard transport
technology that is selected to be used for UTRAN, but without any UTRAN-specic
requirements.
6.1.2 Vertical Planes
Similarly, the UTRAN protocol structure is vertically divided into 3 planes. The descrip-
tion is available in section 11.1.3 of 3GPP TS 25.401.
174 CHAPTER 6. PROTOCOLS & INTERFACES
Interface Control Plane User Plane
Iub NBAP FP
Iur RNSAP FP
Iu-CS RANAP
Iu-PS RANAP GTP-U
Table 6.1: Main Protocols used on UTRAN Terrestrial Interfaces
1. Control Plane: The Control Plane consists of protocols which have functionality
purely designed for the UMTS operation. On the Iu-CS & Iu-PS interface, the
control plane protocol is RANAP. On the Iur interface it is RNSAP and on Iub in-
terface it is NBAP. In addition, the control plane also includes the Signalling Bearer
for transporting the Application Protocol messages.
Application Protocol is used for setting up bearers. The Signalling Bearer for the
Application Protocol may or may not be of the same type as the Signalling Protocol
for the ALCAP. The Signalling Bearer is always set up by O & M actions.
2. User Plane: The User Plane Includes the Data Stream(s) and the Data Bearer(s) for
the Data Stream(s). The Data Stream(s) is/are characterized by one or more frame
protocols specied for that interface.
3. Transport Network Control Plane: The Transport Network Control Plane does
not include any Radio Network Layer information, and is completely in the Trans-
port Layer. It includes the ALCAP protocol(s) that is/are needed to set up the
transport bearers (Data Bearer) for the User Plane. It also includes the appropriate
Signalling Bearer(s) needed for the ALCAP protocol(s).
4. Transport Network User Plane: The Data Bearer(s) in the User Plane, and the
Signalling Bearer(s) for Application Protocol also belong to Transport Network User
Plane. As described in the previous section, the Data Bearers in the Transport Net-
work User Plane are directly controlled by the Transport Network Control Plane
during real time operation but the control actions required for setting up the Sig-
nalling Bearer(s) for Application Protocol are considered O & M actions.
Figure 6.2 shows the UMTS network architecture with only the most essential network
elements. Here, various network elements are connected using well-dened standard in-
terfaces called Iub, Iur & Iu, whre Iu itself has 2 versions. One towards CS core network,
called as Iu-CS and the other one towards the Packet core network, called as Iu-PS.
These four are also called as UTRAN interfaces. All of these interfaces are used to carry
signalling as well as the trac which is depicted by dashed and solid lines respectively in
the gure 6.2. On each interface, a shaded box is drawn to indicate the name of Interface,
protocol used for control plane and the protocol used for user plane data transfer.
6.2. QOS AND BEARER 175
Other than the UTRAN interfaces, the gure 6.2 also illustrated the UTRAN Radio
Interface protocols. The network element which controls the whole radio network is RNC.
Therefore, UE & RNC need to communicate very often in UMTS. This communication
happens using the radio protocols. Physical realization of this signalling transfer happens
using the Uu Interface ( UE Node B) and Iub Interface (Node B RNC).
Figure 6.2: Overview of all UTRAN Interfaces and Protocols
6.2 QoS and Bearer
Source : 3GPP TS 23.107 ; Quality of Service (QoS) concept and architecture
End-to-End Service: End-to-end service means the service as perceived by the end user.
For example, the end-to-end service from one Terminal Equipment (TE) to another TE,
or from laptop to web server. In order to provide a certain QoS to a user, there must be
a bearer with well-dened characteristics and functionality.
End-to-end service is like a chain of several smaller links (or bearers) and
it is a well-known fact that a chain is never stronger than the weakest list.
Therefore, the weakest bearer in the chain will dene the QoS of end-to-end
service.
End-to-end service = UMTS bearer + External Bearer.
External bearer is beyond the scope of UMTS technology. Therefore, the operator has to
rely on the QoS provided by the external bearer. If the external bearer is between GMSC
176 CHAPTER 6. PROTOCOLS & INTERFACES
Figure 6.3: UMTS QoS Architecture and Bearer Concept (3GPP TS 23.107)
and external PSTN exchange, then these links can be the PCM lines which have excellent
QoS with guaranteed bit rate. On the other hand, if these external bearers are between
GGSN and some web server, then the external bearer is implemented on the IP link. The
QoS in IP is a congurable thing. But we will not discuss it here and restrict ourself to
the UMTS bearer.
The UMTS bearer can be understood as a chain of three smaller bearers.
UMTS Bearer = [Radio Bearer] + [Iu Bearer] + [Core
Network Bearer].
where , [Radio Bearer + Iu Bearer] is often called as Radio
Access Bearer (RAB).
Radio Access Bearer can be considered as a service provided by lower layers to higher
layers. Using RAB, the information is transferred between UE and core network (MSC
or SGSN). In order to have a RAB, UE must have a radio bearer and Iu bearer. Radio
bearers are managed by RNC. Therefore, while RAB setup, core network requests RNC
and after successful response from RNC, the RAB is established.
Please note! RB Reconguration and RAB Reconguration sound very similar
and quite often people mix them up.
6.2. QOS AND BEARER 177
We should remember that Radio Bearer (RB) Reconguration is a local sig-
nalling procedure between UE and RNC, whereas, RAB Reconguration hap-
pens with the involvement of core network. RB reconguration happens very
often and can be seen from L3 radio messages, but to analyze the signalling
of RAB reconguration we must use the signllinng traces on Iu-CS or Iu-PS
interface.
Please refer to section 6.1 of TS 23.107 for more details.
6.2.1 UMTS QoS Classes
The QoS is simply a phrase. For implementation, we dene it using a list of parameters.
One of these parameters is the Trac Class. According to 3GPP TS 23.107, all the
services can be classied into 4 groups:
Conversational class
Streaming class
Interactive class
Background class
The delay sensitivity of trac is the main criteria for this classication. Conversational
class trac is aected very badly the bearer is lost for few hundred ms where as the
bearer background class will not be aected so badly even if the bearer is unavailable for
few seconds.
Other than this classication, we can also group the services in two groups: Real-Time
(RT) and Non-Real-Time (NRT) services. Conversational and Streaming classes are
mainly used for carrying real-time trac ows whereas the Interactive and Background
trac classes are suitable for carrying Non-Real-Time trac.
Conversational Class
The most well-known use of this scheme is telephony speech (e.g. GSM). But with Internet
and multimedia, a number of new applications will require this scheme, for example,
voice over IP and video conferencing tools. Real time conversation is always performed
between peers (or groups) of live (human) end-users. This is the only scheme where the
required characteristics are strictly given by human perception. Real time conversation -
fundamental characteristics for QoS:
Preserve time relation (variation) between information entities of the stream;
Conversational pattern (stringent and low delay).
178 CHAPTER 6. PROTOCOLS & INTERFACES
Streaming Class
When the user is looking at (listening to) real time video (audio), the scheme of real time
streams applies. The real time data ow is always aiming at a live (human) destination.
It is a one way transport.
Real time streams - fundamental characteristics for QoS:
Preserve time relation (variation) between information entities of the stream.
Interactive Class
When the end-user, that is either a machine or a human, is on line requesting data from
remote equipment (e.g. a server), this scheme applies. Examples of human interaction with
the remote equipment are: web browsing, data base retrieval, server access. Interactive
trac - fundamental characteristics for QoS:
Request response pattern;
Preserve payload content.
Background Class
When the end-user, that typically is a computer, sends and receives data les in the
background, this scheme applies. Examples are background delivery of E-mails, SMS,
download of databases and reception of measurement records. Background trac - fun-
damental characteristics for QoS:
The destination is not expecting the data within a certain time;
Preserve payload content.
6.3 Access Stratum and Non-Access Stratum
According to 3GPP TR 21.905 Vocabulary for 3GPP Specications , the denition of
Stratum is as follows:
Stratum: Grouping of protocols related to one aspect of the services
provided by one or several domains.
In simple words, Stratum is similar to a stack of protocols. There are two types of
stratums that are often discussed. They are Access Stratum (AS) & Non-Access-Stratum
(NAS). The same concept is illustrated in gure 6.4.
6.3. ACCESS STRATUM AND NON-ACCESS STRATUM 179
Figure 6.4: Access Stratum & Non-access Stratum Signalling
Access Stratum: Access Stratum protocols are dened in close co-ordination with the
technology and medium of transport. AS protocol in radio interface is RRC, which
clearly denes the communication between UE and RNC. Similarly, the AS protocol
in Iu Interface is RANAP. RANAP is used to control the communication between
RNC and Core network. AS also works like a delivery service for NAS messages. For
example, PAGING REQUEST is a NAS signalling message that must be delivered
from MSC to UE. Higher layers (NAS) use the services of access stratum protocols
RANAP and RRC to deliver this signalling message to UE. This mechanism is called
Direct Transfer (DT).
Please note that in UMTS, the paging procedure between RNC and UE is dier-
ent from the paging procedure in GSM between BSC and MS. Therefore, the AS
protocols are access-aware protocols.
Non-access Stratum: Non-access stratum is a set of protocols which are access-agnostic.
In other words, these protocols are higher layer end-to-end protocols which do not
depend on the underlying access network. One example of such protocol is Mobility
Management protocol of UMTS. The same MM is used in GSM for procedures like
location update, authentication, paging etc.
NAS protocol messages can be carried over a TDMA-based 2G access network
or CDMA-based 3G access network. The structure of these protocols remain un-
changed.
There are totally 6 NAS protocols dened which will be discussed in section 6.9.
180 CHAPTER 6. PROTOCOLS & INTERFACES
6.4 Radio Protocols
Source:
3GPP TS 25.301: Radio Interface Protocol Architecture.
3GPP TS 25.321: MAC Protocol Specification.
3GPP TS 25.322: RLC Protocol Specification.
3GPP TS 25.323: PDCP Protocol Specification.
3GPP TS 25.324: BMC Protocol Specification.
3GPP TS 25.331: RRC Protocol Specification.
These specications contain the details of UMTS, HSDPA as well as HSUPA.
But we should pay attention to the version. For HSDPA, the version number
should be 5.0.0 or higher. Similarly, for HSUPA-specic information, the
version number has to be 6.0.0 or higher.
Radio Protocols are the set of protocols which control the communication between UE
and RNC. This section will investigate those set of protocols. As usual, we will focus on
control plane and user plane separately.
6.4.1 Control Plane
The main signalling protocol in 3G is RRC protocol but RRC is a higher layer protocol,
which uses the services of underlying layers L2 (MAC and RLC) and L1 (PHY layer). The
complete protocol stack is shown in gure 6.5. The functions of each individual protocol
layer is explained in the coming sections. This gure also shows the protocol termination
point. The physical layer is implemented by UE and Node B. Similarly, it can be seen
that MAC, RLC and RRC protocols are implemented in UE and RNC.
Figure 6.5: Protocol Termination for DCH, control plane(from TS 25.301)
6.4. RADIO PROTOCOLS 181
As seen in gure 6.5, downlink signalling messages can be either generated by RNC or they
might arrive from the core network which must be forwarded to the user(s). Similarly, in
uplink, the signalling messages from UE can be either processed by RNC or forwarded to
core network.
Signalling message coming from/going to Core Network: for example, Paging re-
quest/response, authentication request/response, etc.
NAS Signaling from CN RRC Signalling RLC MAC PHY
Hence, we can identify the rst function of RRC layer which is NAS message trans-
port in the uplink and downlink.
Signalling message generated from/terminated within RNC: for example measure-
ment control/report, handover commands, system information broadcast, etc.
RRC Signalling RLC MAC PHY
This category of RRC messages are used by RNC to control the behaviour of UE.
Similarly, UE can contact RNC and inform about some event that took place.
Note! The details shown in gures 6.5 & 6.6 are applicable to DCH transport channel
only. In order to keep this book at an overview level, the protocol termination for transport
channels RACH & FACH is not shown here. Readers are advised to refer to section 5.6.2
of 3GPP TS 25.301 to learn more. Details about of HS-DSCH and E-DCH will be shown
in their respective module.
6.4.2 User Plane
There are many similarities between the control plane and user plane protocols on the
radio interface. By comparing the gures 6.5 & 6.6, we observe that the RRC protocol is
only for CP whereas in UP we have 2 new protocols: PDCP for packet switched UP and
BMC for the broadcast services.
As we know, in UMTS, the same transport channel (DCH) is used for voice, video, text,
data, streaming and more. Therefore, depending on the service carried by it, the user plane
protocol stack gets slightly modied. In this section, we will learn the set of protocols in
the path of CS service, PS services and broadcast & multicast service.
CS Services
On the transmitter side, the protocol stack for UP is as follows:
CS data streams RLC MAC PHY
182 CHAPTER 6. PROTOCOLS & INTERFACES
Figure 6.6: Protocol Termination for DCH, User Plane(from TS 25.301)
PS Services
On the transmitter side, the protocol stack for UP is as follows:
IP Data ow PDCP RLC MAC PHY
Broadcast & Multicast Services
On the transmitter side, the protocol stack for BC services is as follows:
Common Trac or CBS BMC RLC MAC PHY
6.4.3 RRC-layer Functions
3GPP TS 25.331 is a bulky document with more than 1200 pages (in Rel-6). The details
about all the RRC procedures, RRC messages and their parameters can be found in it.
According to Section 5.1 of TS 25.331, RRC layer performs following functions:
Non-access stratum message broadcast
Access stratum related information broadcast
RRC Connection Management
Radio Bearer Management
6.4. RADIO PROTOCOLS 183
Management of radio resources for RRC Connection and radio bearers
Connected mode mobility functions (handover, cell update, URA update, etc.)
Paging
Control of requested QoS
Control of UE measurement reporting
Outer loop power control
Control of ciphering
Initial cell selection and re-selection in idle mode
Initial Conguration for CBS
. . .
6.4.4 RLC-layer Functions
This section provides an overview on services and functions provided by the RLC sublayer.
The RLC sublayer is a part of L2 in the Radio interface protocol stack. The detailed
description of RLC is available in 3GPP TS 25.322. Depending on the type of information
carried in the RLC SDU, the RLC layer can be congured in 3 modes:
1. Transparent Mode (TM): In this mode, RLC layer processing is very minimal. The
name transparent mode shows that it appears as if the RLC layer is not present in
the processing chain. This mode is generally used for real time user plane services
like voice or video telephony. In this mode, there is no feedback from the receiver
and there is no re-transmission mechanism.
The service provided by RLC layer in TM are:
Segmentation and reassembly,
Transfer of user data, and
SDU discard.
Please note! Ciphering is an important function of the RLC layer. But in the
list above, ciphering is missing. Does it mean that there is no ciphering for the
services which use RLC transparent mode? In other words, is our voice sent without
encryption in UMTS?
Answer is No. When the RLC-sublayer is congured in the Transparent mode, the
ciphering is performed by the MAC sublayer.
184 CHAPTER 6. PROTOCOLS & INTERFACES
2. Unacknowledged Mode (UM): In the unacknowledged mode, there is no guaran-
tee of delivery because there is no retransmission mechanism. This mode can be
used for Voice over IP which is possible with HSPA solution. The following functions
are needed to support unacknowledged data transfer:
Segmentation and reassembly.
Concatenation.
Padding.
Transfer of user data.
Ciphering.
Sequence number check.
SDU discard.
Out of sequence SDU delivery.
Duplicate avoidance and reordering.
Provisioning of sequence number.
Unacknowledged mode of RLC can be compared to UDP transport, which does
not provide guarantee of delivery but is still a popular transport method due to its
reduced protocol overhead compared to more expensive alternative, i.e., TCP.
3. Acknowledged Mode: The third mode of RLC conguration uses a ACK/NACK
feedback from the receiver and performs re-transmission. Therefore, it is the most
reliable mode which provides some guarantee of delivery. But at the same time,
this mode is most expensive one if we compare the size of the RLC header and the
processing delay. The following functions are needed to support acknowledged data
transfer:
Segmentation and reassembly.
Concatenation.
Padding.
Transfer of user data.
Error correction.
In-sequence delivery of upper layer PDUs.
Duplicate detection.
Flow Control.
Protocol error detection and recovery.
Ciphering.
SDU discard.
6.4. RADIO PROTOCOLS 185
Other than this, RLC layer also performs the following functions:
Maintenance of QoS as dened by upper layers.
Notication of unrecoverable errors.
6.4.5 MAC-layer Functions
Source: 3GPP TS 25.321; Medium Access Control (MAC) protocol specica-
tion
It can be said that the MAC sublayer is the brain of modern communication
systems like UMTS, HSDPA, HSUPA & LTE. It is the MAC layer who takes
decisions about scheduling and bit rate adjustments. Without the MAC layers
priority handling capability, we would not be discussing QoS concept in modern
telecom systems.
The functions of MAC include:
Mapping between logical channels and transport channels;
Selection of appropriate Transport Format for each Transport Channel depending
on instantaneous source rate;
Priority handling between data ows of one UE;
Priority handling between UEs by means of dynamic scheduling;
Identication of UEs on common transport channels;
Identication of MBMS services on common transport channels;
Multiplexing/demultiplexing of upper layer PDUs into/from transport blocks deliv-
ered to/from the physical layer on common transport channels;
Multiplexing/demultiplexing of upper layer PDUs into/from transport block sets
delivered to/from the physical layer on dedicated transport channels;
Segmentation and reassembly of upper layer PDUs;
Trac volume measurement;
Transport Channel type switching and
Ciphering for transparent mode RLC.
HSDPA-specic MAC (MAC-hs) and HSUPA-specic MAC(MAC-e/es) will
be discussed in their respective modules.
186 CHAPTER 6. PROTOCOLS & INTERFACES
6.4.6 PDCP-layer Functions
Source: 3GPP TS 25.323; Packet Data Convergence Protocol (PDCP) speci-
cation
This section provides an overview on services and functions provided by the Packet Data
Convergence Protocol (PDCP).
Header compression and decompression: Header compression and decompression of
IP data streams (e.g., TCP/IP and RTP/UDP/IP headers) at the transmitting and
receiving entity, respectively. The header compression method is specic to the
particular network layer, transport layer or upper layer protocol combinations e.g.
TCP/IP and RTP/UDP/IP.
Transfer of user data: Transmission of user data means that PDCP receives PDCP
SDU from the NAS and forwards it to the RLC layer and vice versa.
Support for lossless SRNS relocation or lossless DL RLC PDU size change: Maintenance
of PDCP sequence numbers for radio bearers that are congured to support lossless
SRNS relocation or lossless DL RLC PDU size change.
6.5. IU-CS INTERFACE PROTOCOLS 187
Till now, we were focussing on the radio interface protocols. Now, we will draw our
attention towards the protocols used on the UTRAN interfaces Iu-PS, Iu-CS, Iub and Iur.
Due to various options available in transport (IP, ATM, IP over ATM) and then separate
protocol stacks for control plane and user plane, it is very dicult to keep an overview of
the protocol stacks. Therefore, instead of going into the details of every protocol, we will
aim at getting a big picture about the protocols used on every interface. The interested
readers are advised to refer to the 3GPP specs mentioned in the following sections
1
.
6.5 Iu-CS Interface Protocols
From protocol description description, Iu-CS and IU-PS are simply referred to as Iu interface.
The following section is written with the reference from following specications.
Source :
3GPP TS 25.410: UTRAN Iu Interface: general aspects and principles
3GPP TS 25.411: UTRAN Iu Interface Layer 1
3GPP TS 25.412: UTRAN Iu Interface Signalling Transport.
3GPP TS 25.413: UTRAN Iu Interface RANAP Signalling.
3GPP TS 25.414: UTRAN Iu Interface Data Transport and Transport
Signalling
3GPP TS 25.415: UTRAN Iu Interface User Plane Protocols.
6.5.1 Control Plane - Iu-CS
Iu-CS interface connects RNC to the CS-domain of the core network. Therefore, the
protocols stack shown here is implemented in RNC and MSC.
The protocol stacks for the Iu-CS Domain are shown in gure 6.7.
As shown in gure 6.7, there are two options for the realization of transport network, they
are:
ATM-based transport, &
IP-based transport
6.5.2 User Plane - Iu-CS
User plane protocols on Iu-CS are shown in gure 6.8. Both ATM-based transport option
and the IP-based transport options are shown.
1
TS 25.41x for Iu, 25.42x for Iur and 25.43x for Iub.
188 CHAPTER 6. PROTOCOLS & INTERFACES
Figure 6.7: Iu-CS control plane protocol architecture (TS 25.410)
Figure 6.8: Iu-CS user plane protocol architecture (TS 25.410)
Figures 6.7 & 6.8 are drawn with the help of Figure 6.1 in 3GPP TS 25.410.
6.5. IU-CS INTERFACE PROTOCOLS 189
6.5.3 RANAP Functions
RANAP provides the signalling service between UTRAN and CN, which are described in
3GPP TS25.413. In this book, we will not dig into the details of each function. A list of
the functions performed by RANAP lyer are listed below:
Relocating serving RNC,
Overall RAB management,
Queuing the setup of RAB,
Requesting RAB release,
Release of all Iu connection resources,
SRNS context forwarding function,
Controlling overload in the Iu interface,
Resetting the Iu,
Sending the UE Common ID to the RNC,
Paging the user,
Transport of NAS information between UE and CN. This function has two sub-
classes:
1. Transport of the initial NAS signalling message from the UE to CN.
2. Transport of subsequent NAS signalling messages between UE and CN.
Controlling the security mode in the UTRAN,
Controlling location reporting,
Location reporting,
Data volume reporting function,
Reporting general error situations,
Location related data, and
Information Transfer.
190 CHAPTER 6. PROTOCOLS & INTERFACES
6.6 Iu-PS Interface Protocols
Iu-PS interface connects RNC to the PS-domain of core network. Therefore, the protocols
stack shown here is implemented in RNC and SGSN.
6.6.1 Control Plane - Iu-PS
The protocol stacks for the Iu PS Domain is shown in gure 6.9. The standard allows
operators to choose one out of the three standardized protocol suites for transport of SCCP
messages.
Figure 6.9: Iu-PS control plane protocol architecture (TS 25.410)
ATM-based transport,
IP-based transport &
IP over ATM-based transport
6.6.2 User Plane - Iu-PS
There are two options for the transport layer for data streams over Iu-PS.
6.6. IU-PS INTERFACE PROTOCOLS 191
ATM-based Transport (ATM transport option)
IP-based Transport (IP transport option)
Figure 6.10: Iu-PS user plane protocol architecture (TS 25.410)
Figures 6.9 & 6.10 are drawn with the help of Figure 6.3 in 3GPP TS 25.410.
192 CHAPTER 6. PROTOCOLS & INTERFACES
6.7 Iub Interface Protocols
Source :
3GPP TS 25.430: UTRAN Iub Interface: general aspects and principles.
3GPP TS 25.431: UTRAN Iub Interface Layer 1.
3GPP TS 25.432: UTRAN Iub Interface Signalling Transport.
3GPP TS 25.433: UTRAN NBAP Specification.
3GPP TS 25.434: UTRAN Iub Interface: Data Transport & Transport
Signalling for Common Transport Channel Data Streams.
3GPP TS 25.435: UTRAN Iub Interface: User Plane Protocols for
Common Transport Channel Data Streams.
Iub interface is used to connect Node B and RNC. For network operation, they must
communicate with each other at regular periods. Whenever a radio link is established,
NBAP protocol is used. Similarly, Node reports the measurements about current UL
interference and DL transmission power to RNC. Based on these reports, RNC performs
Radio Resource Management.
Figure 6.11: Iub control plane protocol architecture (TS 25.430)
6.7.1 Control Plane - Iub CP
The Signalling Bearer for NBAP is a point-to-point protocol. There may be multiple
point-to-point links between an RNC and a Node B. As shown in gure 6.11, the standard
allows operators to choose one out of two protocol suites for transporting the NBAP
messages.
6.7. IUB INTERFACE PROTOCOLS 193
ATM-based transport, &
IP-based transport
6.7.2 User Plane - Iub UP
This section species the transport layers that support Common Transport Channel
(FACH, RACH, PCH, DSCH, HS-DSCH) data streams. As usual, there are two op-
tions for protocol suites for transport of RACH, FACH, DSCH and HS-DSCH Iub data
streams, which are shown in gure 6.12.
ATM-based transport, &
IP-based transport.
Figure 6.12: Iub user plane protocol architecture (TS 25.430)
6.7.3 NBAP Functions
The functions performed by NBAP protocol layer are specied in section 7 of 3GPP
TS 25.433. NBAP procedures are divided into common procedures and dedicated
procedures.
NBAP common procedures or C-NBAP are procedures that are not related
to one particular subscriber or radio link. C-NBAP procedures are common to a
cell.
194 CHAPTER 6. PROTOCOLS & INTERFACES
NBAP dedicated procedures or D-NBAP are procedures that are related to
a specic subscriber who is identied by Node B Communication Context in Node
B.
The full NBAP specications are available in 3GPP TS 25.433. From the same specica-
tion, the functions performed by NBAP are listed below:
Cell Conguration Management,
Common Transport Channel Management,
System Information Management,
Resource Event Management,
Measurements on Common Resources,
Radio Link Management,
Radio Link Supervision,
Compressed Mode Control,
Measurements on Dedicated Resources,
Reporting of General Error Situations,
Physical Shared Channel Management,
Information Exchange,
Bearer Rearrangement, and
MBMS Notication.
6.8. IUR INTERFACE PROTOCOLS 195
6.8 Iur Interface Protocols
Source :
3GPP TS 25.420: UTRAN Iur interface general aspects and principles
3GPP TS 25.421: UTRAN Iur Interface: Layer 1
3GPP TS 25.422: UTRAN Iur Interface: Signalling Transport
3GPP TS 25.423: UTRAN Iur Interface: RNSAP Signalling
3GPP TS 25.424: UTRAN Iur Interface: Data Transport & Transport
Signalling
3GPP TS 25.426: UTRAN Iur & Iub Interface: Data Transport & Transport
Signalling for DCH Data Streams.
Iur interface is the link between any two RNCs within the UTRAN. Its main purpose is to
handle Inter-RNC mobility within UTRAN and hide this mobility from the core network.
If Iur is not present between the two RNCs, then the Inter-RNC soft handover cannot
take place. In this case, a hard handover will be performed instead. For multi-vendor
operability, it is recommended that Iur should be an open interface. Iur interface is not
only used for signalling but also for carrying data streams. RNC-to-RNC interface is a
logical description. It can be implemented even if there is no direct physical connection
between two RNCs.
6.8.1 Control Plane - Iur CP
Due to the similarity between the control plane protocol stack of Iur and Iu-PS, the
description is not given in order to avoid repetition. The protocol stack of control plane
signalling over Iur is shown in gure 6.13. The main control plane protocol on Iur interface
is RNSAP. The word RNS in UMTS means one RNC and several Node B controlled by
it.
All three transport options are shown in gure 6.13.
6.8.2 User Plane - Iur UP
The user plane protocol stack on Iur interface is illustrated in gure 6.14. As we can easily
identify, the protocol stack resembles the user plane protocol stack on Iub. Therefore, the
description can be avoided here as well.
6.8.3 RNSAP functions
The full RNSAP specications are available in section 7 of 3GPP TS 25.423. The functions
performed by RNSAP are listed below:
196 CHAPTER 6. PROTOCOLS & INTERFACES
Figure 6.13: Iur Interface Protocol Architecture for Control Plane
Figure 6.14: Iur Interface Protocol Architecture for User Plane
Radio Link Management,
Physical Channel Reconguration,
Radio Link Supervision,
Compressed Mode Control,
6.8. IUR INTERFACE PROTOCOLS 197
Measurements on Dedicated Resources,
DCH Rate Control,
CCCH Signalling Transfer,
Paging,
Common Transport Channel Resources Management,
Relocation Execution,
Reporting of General Error Situations,
Measurements on Common Resources,
Information Exchange, and
Resetting the Iur.
198 CHAPTER 6. PROTOCOLS & INTERFACES
6.9 Non-Access Stratum Protocols
Till now, in this chapter we have discussed the access stratum. Now it is time for some
NAS signalling. The term access stratum and non-access stratum was explained in section
6.3 at the beginning of this chapter. The fact, that NAS protocols are access-agnostic,
is illustrated on gure 6.15. In this gure, there are 2 access technologies, TDMA-based
BSS (2G) and CDMA-based UTRAN (3G). The NAS messages are depicted with the
bidirectional arrows which ow between UE and core network. The structure of NAS
message does not depend on the underlying access network.
Figure 6.15: Principle of NAS signalling
In gure 6.16, we can see that there are three sublayers in the overall protocol architecture.
These sublayers are:
The Access Stratum (AS) sublayer: The AS sublayer performs the duties of a post-
man and transports NAS signalling messages between UE & core network.
The Mobility Management sublayer: The MM sublayer provides its services to CM.
The MM sublayer contains two protocol entities:
The MM protocol for mobility related signalling towards the CS core network
domain, and
The GMM protocol for mobility related signalling towards the PS core network
domain.
The Connection Management sublayer: The CM sublayer consists of four basic pro-
tocol entities: CC, SM, SMS and SS.
If we ignore the AS sublayer and focus on only NAS sublayers, we can conclude that
there are following protocol entities which together constitute the NAS domain. Those six
entities are identied by their protocol discriminator eld as shown in table 6.2.
In LTE/EPS, the concept of AS and NAS protocols is reused and the denitions are also
not changed. The protocols which carry signalling messages between UE and Evolved
6.9. NON-ACCESS STRATUM PROTOCOLS 199
Figure 6.16: NAS protocols in UMTS
Name of NAS protocol Protocol Discrimina-
tor
Call Control (CC) 3
Mobility Management 5
GPRS Mobility Management 8
SMS 9
Session Management 10
Supplementary Services 11
Table 6.2: NAS protocols and the protocol discriminator values
Packet Core (EPC) are called NAS protocols and they include 2 protocols: EMM and
ESM. The words MM and SM are already known from 2G & 3G, E stands for EPS or
Evolved packet System.
200 CHAPTER 6. PROTOCOLS & INTERFACES
Copyright Notices
In order to create some gures, tables and text-sections, the following reference material
has been used. Information has been interpreted and presented in a simplied manner.
The original references are provided here.
Main reference material for this book has been technical specications (TSs) and technical
reports (TRs) of 3rd Generation Partnership Project (3GPP).
Text in section 6.5.3 on page 189 Section 7 of 3GPP TS 25.413 v 7.0.0.
c 2005. 3GPP
TM
TSs and TRs are the property of ARIB, ATIS, ETSI, CCSA,
TTA, and TTC who jointly own the copyright for them. They are subject to
further modications and are therefore provided to you as is for information
purposes only. Further use is strictly prohibited.
Figure 6.1 on page 173 Figure 10 of 3GPP TS 25.401 v 7.0.0.
Figure 6.5 on page 180 Figure 11 of 3GPP TS 25.301 v 7.0.0.
Figure 6.6 on page 182 Figure 12 of 3GPP TS 25.301 v 7.0.0.
Figure 6.7 on page 188 Figure 6.1 of 3GPP TS 25.410 v 7.0.0.
Figure 6.8 on page 188 Figure 6.1 of 3GPP TS 25.410 v 7.0.0.
Figure 6.9 on page 190 Figure 6.3 of 3GPP TS 25.410 v 7.0.0.
Figure 6.10 on page 191 Figure 6.3 of 3GPP TS 25.410 v 7.0.0.
Figure 6.11 on page 192 Figure 7 of 3GPP TS 25.430 v 7.0.0.
Figure 6.12 on page 193 Figure 7 of 3GPP TS 25.430 v 7.0.0.
Figure 6.13 on page 196 Figure 4 of 3GPP TS 25.420 v 7.0.0.
Figure 6.14 on page 196 Figure 4 of 3GPP TS 25.420 v 7.0.0.
Text about RRC Protocol func-
tions on page 182
Section 5.1 of 3GPP TS 25.331 v 6.9.0.
Text about Protocol Layers on
page 173
Section 11.1.2 of 3GPP TS 25.401 v 7.0.0.
Text about Protocol Planes on
page 173
Section 11.1.3 of 3GPP TS 25.401 v 7.0.0.
Text in section 6.7.3 on page 193 Section 7 of 3GPP TS 25.433 v 7.0.0.
Text in section 6.8.3 on page 195 Section 7 of 3GPP TS 25.423 v 7.0.0.
c 2006. 3GPP
TM
TSs and TRs are the property of ARIB, ATIS, ETSI, CCSA,
TTA, and TTC who jointly own the copyright for them. They are subject to
further modications and are therefore provided to you as is for information
purposes only. Further use is strictly prohibited.
6.9. NON-ACCESS STRATUM PROTOCOLS 201
Figure 6.3 on page 176 Figure 1 of 3GPP TS 23.107 v 7.0.0.
Text in section 6.2.1 on page 177 Section 6.3 of 3GPP TS 23.107 v 7.0.0.
c 2007. 3GPP
TM
TSs and TRs are the property of ARIB, ATIS, ETSI, CCSA,
TTA, and TTC who jointly own the copyright for them. They are subject to
further modications and are therefore provided to you as is for information
purposes only. Further use is strictly prohibited.
Text in section 6.4.4 on page 183 Section 6 of 3GPP TS 25.322 v 9.0.0.
Text in section 6.4.6 on page 186 Section 5 of 3GPP TS 25.323 v 9.0.0.
c 2010. 3GPP
TM
TSs and TRs are the property of ARIB, ATIS, ETSI, CCSA,
TTA, and TTC who jointly own the copyright for them. They are subject to
further modications and are therefore provided to you as is for information
purposes only. Further use is strictly prohibited.
BIBLIOGRAPHY
[1] 3GPP TS 23.107 ver. 7.0.0 ;Quality of Service (QoS) concept and architecture
[2] 3GPP TS 25.301 ver. 7.0.0 ;Radio Interface Protocol Architecture
[3] 3GPP TS 25.321 ver. 7.0.0 ;MAC protocol specication
[4] 3GPP TS 25.322 ver. 7.0.0 ;RLC protocol specication
[5] 3GPP TS 25.323 ver. 7.0.0 ;PDCP protocol specication
[6] 3GPP TS 25.324 ver. 7.0.0 ;BMC protocol specication
[7] 3GPP TS 25.331 ver. 7.0.0 ;Radio Resource Control (RRC) protocol specication
[8] 3GPP TS 25.401 Ver. 7.0.0 ;UTRAN overall description
[9] 3GPP TS 25.410 Ver. 7.0.0 ;UTRAN Iu Interface: general aspects and principles
[10] 3GPP TS 25.411 Ver. 7.0.0 ;UTRAN Iu Interface: Layer 1
[11] 3GPP TS 25.412 Ver. 7.0.0 ;UTRAN Iu Interface: Signalling Transport
[12] 3GPP TS 25.413 Ver. 7.0.0 ;UTRAN Iu Interface: RANAP Signalling
[13] 3GPP TS 25.414 Ver. 7.0.0 ;UTRAN Iu Interface: Data Transport and Transport
Signalling
[14] 3GPP TS 25.415 Ver. 7.0.0 ;UTRAN Iu Interface: User Plane Protocols
[15] 3GPP TS 25.420 Ver. 7.0.0 ;UTRAN Iur Interface: general aspects and principles
[16] 3GPP TS 25.421 Ver. 7.0.0 ;UTRAN Iur Interface: Layer 1
[17] 3GPP TS 25.422 Ver. 7.0.0 ;UTRAN Iur Interface: Signalling Transport
[18] 3GPP TS 25.423 Ver. 7.0.0 ;UTRAN Iur Interface: RNSAP Signalling
202
BIBLIOGRAPHY 203
[19] 3GPP TS 25.424 Ver. 7.0.0 ;UTRAN Iur Interface: Data Transport and Transport
Signalling
[20] 3GPP TS 25.426 Ver. 7.0.0 ;UTRAN Iur & Iub Interface: Data Transport & Trans-
port Signalling for DCH Data Streams
[21] 3GPP TS 25.430 Ver. 7.0.0 ;UTRAN Iub Interface: general aspects and principles
[22] 3GPP TS 25.431 Ver. 7.0.0 ;UTRAN Iub Interface: Layer 1
[23] 3GPP TS 25.432 Ver. 7.0.0 ;UTRAN Iub Interface: Signalling Transport
[24] 3GPP TS 25.433 Ver. 7.0.0 ;UTRAN Iub Interface: NBAP Signalling
[25] 3GPP TS 25.434 Ver. 7.0.0 ;UTRAN Iub Interface: Data Transport & Transport
Signalling for Common Transport Channel Data Streams
[26] 3GPP TS 25.435 Ver. 7.0.0 ;UTRAN Iub Interface: User Plane Protocols for Com-
mon Transport Channel Data Streams
[27] H.Holma and A. Toskala, WCDMA for UMTS , 5th Edition, John Wiley & Sons.
[28] Chris Johnson, Radio Access Networks For UMTS ; Principles And Prac-
tice , John Wiley & Sons.
For HSDPA-specic details, the version of these specs should be 5.0.0 or
higher & for HSUPA-specic details, is should be 6.0.0 or higher.
CHAPTER
7
HIGH SPEED DOWNLINK PACKET
ACCESS
Source: 3GPP TS 25.308,
High Speed Downlink Packet Access (HSDPA); Overall description;
Overview of 3GPP Release 5; available at:
http://www.3gpp.org/ftp/Information/WORK PLAN/Description Releases/
7.1 Why HSDPA?
Actually the question should be Why HSPA? HSDPA (and later HSUPA) was designed
to overcome the limitations of the Rel-99 WCDMA air interface. If an operator disables
HSDPA services from any cell, the maximum bit rate drops from Mbps to kbps range.
UMTS in its basic form (Rel-99 and Rel-4) can theoretically achieve 2 Mbps, both
in uplink and downlink. But these theoretical numbers are very far from the popular
implementation. In most common deployments across the globe, Rel-99 UMTS is able to
show the peak bit rates of only 384 kbps and that too with a very limited coverage. Due
to this, the end-user experience is very poor.
From an operators perspective, in order to get high cell throughput, it should be possible
to have several simultaneous users with high bit rates. But due to high fractional load of
204
7.2. HSDPA STANDARDIZATION, 3GPP RELEASES AND EVOLUTION 205
data bearers, unfortunately only a few simultaneous users are possible.
This indirectly also aects the handset manufacturers because all the smart phones, pads
and tablets are useless if they cannot provide fast wireless internet access to the subscribers.
Let us discuss some limitations of Rel-99 UMTS.
End user experience: Due to limited practical bit rates, the end user does not experi-
ence good throughput.
Poor coverage for data bearers: In WCDMA, coverage is separately calculated for
each service. As the service bit rate increases, the coverage area decreases. User
must be in excellent radio condition and the cell load should be quite low, only then
the user can experience the bit rates of several hundred kbps.
Cell capacity: Although the load in cell depends on various factors, but it has been
observed that only a few users of 384 kbps bearer can block the entire cell capacity.
This is very bad for the operators revenue and also network accessibility KPI.
Cost of usage: 3G was expected to fulll the dream which was started by GPRS. Ev-
eryone expected that aordable unlimited data usage plans will become popular.
But unfortunately due to the high cost of operation, it did not happen. Hence, one
of the requirements while designing HSDPA was to reduce the cost-per-bit from the
operators perspective so that more aordable data plans could be introduced.
Latency: UMTS experiences very high control plane and user plane latency.
Revenue vs. Investment: Due to high cost of spectrum licences, mobile operators ex-
pected a huge revenue which unfortunately did not happen.
3G or no 3G?: People often described 3G as a system with 2 new services Video
telephony and broadband data access. Video telephony never became popular
and data rates in 3G were quite limited. Therefore, the GSM operators were unable
to decide whether they should go for 3G or just settle down with EDGE
1
. At the
same time operators started comparing 3G with Mobile-WiMAX solution.
7.2 HSDPA Standardization, 3GPP Releases and
Evolution
Source: 3GPP TS 25.306 ; UE Radio Access capabilities
HSDPA is just a milestone in the journey of High Speed Packet Access (HSPA). Due to
the urgency and demand of higher bit rates in DL, the HSDPA standard was released and
1
EDGE can oer > 200 kbps (practically) & operators do not need to wait/pay for new 3G
licences.
206 CHAPTER 7. HIGH SPEED DOWNLINK PACKET ACCESS
in the next 3GPP release, its counterpart HSUPA was standardized. The terminology
of 3GPP specications & releases is quite complicated. Therefore, we will try to explain
only the most important features of each 3GPP release in terms of PS NRT data access.
Table 7.1 describes the new categories that were dened when HSDPA was standardized
in Rel. 5. In later releases, newer devices with more advanced features were introduced.
The following section will take us through this journey in a few steps.
Release
UE
Category
Mod MIMO
DC-
HSDPA
Peak
Bitrate
Release 5 1 to 12
QPSK,
16QAM
No No 14.4 Mbps
Release 6 Same as Rel-5
Release 7 13 to 18
QPSK,
16QAM,
64QAM
2X2 with
16QAM
No
28 or 21
Mbps
Release 8 19 to 24
QPSK,
16QAM,
64QAM
2X2 with
64QAM
2 Carriers 42 Mbps
Table 7.1: HSDPA features in REL-5, REL-7 & REL-8 (Source TS 25.306, Table
5.1a)
7.2.1 Release 99 & Rel-4
Basic 3G
Downlink data services available on FACH and DCH transport channels
Uplink data services available on RACH and DCH transport channels
RACH, FACH & DCH are scheduled by RNCs packet scheduler
Peak bit rates UL: 384 kbps & DL: 384 kbps
No concept of CQI reporting, UE categories etc.
DCH uses a fast power control but no link adaptation mechanism
7.2.2 Release 5
Commonly called as 3.5G
DL HSDPA operation without UL HSUPA
7.2. HSDPA STANDARDIZATION, 3GPP RELEASES AND EVOLUTION 207
DL HSDPA and UL R99 DCH
DL packet scheduling is done by Node B based on CQI feedback from the UE
Supported UE categories: 1 to 12
Peak bit rates in UL: 384 kbps & DL: 14.4 Mbps
7.2.3 Release 6
HSDPA + HSUPA = HSPA
Just like HSDPA R5, HSPA is also commonly called as 3.5G
DL HSDPA operation is a must for UL HSUPA. Hence, HSPA is a synonym for
HSUPA.
Channel scheduling is done by Node B based on feedback from the UE (e.g., data
buer status, power headroom, etc.)
Supported HSDPA UE categories: 1 to 12 (no change compared to R5)
Supported HSUPA UE categories: 1 to 6
Peak bit rates in UL: 5.76 Mbps & DL: 14.4 Mbps
7.2.4 Release 7
Commonly called as evolved HSPA or HSPA+
Supported HSDPA UE categories: 1 to 12 & 13 to 18
Support of 2 X 2 MIMO or 64QAM modulation in DL
Supported HSUPA UE categories: 1 to 6 & 7
Supported 16QAM Modulation in UL
Peak bit rates UL: 11.2 Mbps & DL: 28 Mbps
7.2.5 Release 8
Commonly called as evolved HSPA or HSPA+ (just like Rel-7)
Supported HSDPA UE categories: 1 to 12 & 13 to 18 & 19 to 24
Support of Simultaneous 64QAM with MIMO operation or DC-HSDPA
208 CHAPTER 7. HIGH SPEED DOWNLINK PACKET ACCESS
Supported HSUPA UE categories: 1 to 6 & 7
Peak bit rates UL: 11.2 Mbps & DL: 42 Mbps
The points listed in previous section are summarized in table 7.1.
7.3 HSDPA Operation
This section explains the operation of HSDPA from an higher-layer perspective. There
will be a detailed discussion about L1 physical channels and L2 protocols in the later
sections. In this section, we are trying to nd an answer to the question how does
HSDPA operation start? We will analyze in this process by breaking it into two steps.
1. HSDPA Operation: Between UE and RNC
2. HSDPA Operation: Between Node B and RNC
7.3.1 HSDPA Operation: Between UE and RNC
Figure 7.1: Signalling to initiate an HSDPA session
7.3. HSDPA OPERATION 209
The HSDPA-capable user equipment (mobile phone, smart phone, USB stick modem,
tablet etc.) starts the connection setup in the same manner as a R99 device. Therefore,
on higher layers (L3 and NAS protocols), there are no HSDPA specic messages and
procedures. In other words, the call ow of packet switched connection setup of Rel-99
and Rel-5 are the same which is illustrated in gure 7.1.
At the time of transport channel type selection, if the DL transport channel is HS-DSCH,
in uplink, RNC can choose either DCH or E-DCH based on the UE device capability. UE is
informed about this channel selection by RRC: Radio Bearer Setup or RRC: Radio Bearer
Reconguration messages. Using this message, UE comes to know about its HSDPA-
specic id H-RNTI and the HSDPA conguration of the cell.
HSDPA without HSUPA: HS-DSCH in DL and DCH in UL, or
HSDPA with HSUPA: HS-DSCH in DL and E-DCH in UL. This option is available
only for Rel-6 or newer UEs.
7.3.2 HSDPA Operation: Between Node B and RNC
The most remarkable dierence between UMTS and HSDPA is the presence of an addi-
tional scheduler in Node B for scheduling the resources to HSDPA users. If the transmitted
packets are not acknowledged, then Node B performs re-transmission. Therefore, it is re-
quired to buer the user data at Node B. The transfer of data from RNC to Node B takes
place in such a way that the buer at Node B does not over ow. This procedure is called
Iub ow control and accomplished by the two messages illustrated in gure 7.2.
Figure 7.2: Iub Flow Control
Step 1: RNC asks Node B, How much can I send for a particular UE? As shown
in the rst message in gure 7.2, the Capacity Request message provides the
210 CHAPTER 7. HIGH SPEED DOWNLINK PACKET ACCESS
Node B with information regarding the RNC buer occupancy for a specic priority
queue belonging to a specic MAC-d ow.
Step 2: Node B informs RNC about the suitable amount. As shown in the sec-
ond message in gure 7.2, the Capacity Allocation message is sent from the
serving Node B to the controlling RNC. Its primary purpose is to provide the RNC
with permission to transfer MAC-d PDU belonging to a specic MAC-d ow pri-
ority queue towards the Node B at a specic maximum rate. This message has 3
important parameters:
1. number of credits,
2. time interval, and
3. repetition period.
For example, if the number of credits is 50, the time interval is 20 ms and the repetition
period is 10, then the RNC is permitted to transfer 50 MAC-d PDU every 20 ms during
the next 200 ms. A repetition interval of 0 is interpreted as unlimited repetition, i.e.,
if the repetition period in the previous example was 0, the RNC would be permitted to
transfer 50 MAC-d PDU every 20 ms for an indenite period.
7.4. WHATS NEW IN HSDPA? 211
7.4 Whats new in HSDPA?
HSDPA can be better understood by comparing it with the Rel-99 DCH transport channel.
In other words, we can focus on the new features introduced for HS-DSCH transport
channel.
Adaptive modulation and coding
Shorter and xed TTI (2 ms)
Node B based packet scheduling
Multi-code Operation
L1 H-ARQ retransmission
MAC-hs protocol in Node B
Serving Cell Change instead of Soft Handover
7.4.1 Adaptive Modulation & Coding
The Node B selects the modulation and the coding for each TTI for each user
based on an estimate of the downlink. Each UE reports an indicator of the
DL channel quality in the uplink signalling.
One of the main drawbacks of R99 DCH channel is its inexibility. If the UE comes close
to Node B, power control decreases the transmission power but the bit rate remains the
same. In DCH, bit rate modication is not very easy because the scheduler is located
at RNC and it does not know anything about the current radio conditions. In contrast
to this, in HSDPA, the transport block size for HS-DSCH channel can be changed every
TTI. In other words, 500 times in one second, the bit rates can be adjusted to match
the radio conditions. Table 7.2 illustrates the eect of modulation and coding on the net
user throughput. The number of codes is also a deciding factor in determining the net bit
rates.
7.4.2 Shorter and Fixed TTI
Transmission Time Interval is dened as the inter-arrival time of Transport Block Sets,
i.e. the time it should take to transmit a Transport Block Set. In general, if this time
is big, then the information bits from higher layer will be buered at MAC layer before
being delivered to the lower layers for transmission.
212 CHAPTER 7. HIGH SPEED DOWNLINK PACKET ACCESS
Modulation Coding Rate # codes
Gross Bit
Rate
Net Bit
Rate
QPSK 1/4 5 2.4 Mbps 600 kbps
QPSK 1/2 5 2.4 Mbps 1.2 Mbps
QPSK 3/4 5 2.4 Mbps 1.8 Mbps
QPSK 1/4 10 4.8 Mbps 1.2 Mbps
QPSK 1/2 10 4.8 Mbps 2.4 Mbps
QPSK 3/4 10 4.8 Mbps 3.6 Mbps
16QAM 1/2 10 9.6 Mbps 4.8 Mbps
16QAM 3/4 10 9.6 Mbps 7.2 Mbps
16QAM 4/4 10 9.6 Mbps 9.6 Mbps
16QAM 1/2 15 14.4 Mbps 7.2 Mbps
16QAM 3/4 15 14.4 Mbps 10.8 Mbps
16QAM 4/4 15 14.4 Mbps 14.4 Mbps
Table 7.2: Eect of Modulation and Coding scheme on net bit rate
For the DCH Transport channel, TTI can be either 10, 20, 40 or 80 ms. For HS-DSCH,
TTI has been xed and its value is 2 ms. In simple words, every 2ms one
2
MAC-hs
transport block can be delivered to the physical layer for transmission.
Shorter TTI interval helps in reducing the round trip time (RT) for the user plane.
If HS-DSCH is used for L3 signalling, then the control plane latency can also be reduced.
7.4.3 Node B-based Packet Scheduling
In R99, the packet scheduling is purely handled by RNC. Due to the dynamic nature of the
radio conditions, it is impossible to inform the scheduler about the users radio channels
quality. Therefore, the bit rate upgrade/downgrade is only possible by RNC. To illustrate
this, two methods are briey explained below:
High Trac Volume Measurement: User data might be buered at UE for Uplink
transmission or in RNC for DL transmission:
If the amount of data (in Bytes) buered in user-specic buer at RNCs side
exceeds a certain threshold, then RNC automatically tries to upgrade the DL
DCH bitrate (For example, DCH128 to DCH256).
2
From R7 onwards, more than one TB can also be transmitted but that is possible only with
MIMO. From R8 onwards, DC-HSDPA operation can also deliver 2 TABS per TTI.
7.4. WHATS NEW IN HSDPA? 213
If the amount of data (in Bytes) buered in user equipments buer exceeds a
certain threshold, then UE sends a measurement report to RNC and informs
about this event
3
. After receiving this measurement report, RNC automati-
cally tries to upgrade the UL DCH bitrate.
High Throughput Measurement: If a DCH has been allocated to a user in UL & DL,
RNC constantly keeps on measuring the actual throughput in terms of kbps. If the
throughput in UL or/and DL drops/exceeds some operator specic thresholds, then
the allocated bitrates in that direction can be reduced or increased. This mechanism
is called Throughput Based Bitrate Adaptation.
Although the two methods explained above are very eective in adjusting the bitrate
allocation to the UEs requirements but this mechanism is very slow and it takes
several hundred ms before the bit rate modication takes place. These delays are
caused because the scheduler is residing in RNC and the signalling between UE &
RNC is not very frequent.
By introducing a MAC-hs scheduler at Node B and CQI reporting mechanism, it
is possible to look into the instantaneous channel quality and select the scheduled
user in current TTI. Furthermore, the TB size in that TTI can also be adapted to
the current radio conditions. This is explained in more details in CQI section.
In fact, the dynamic sharing of HS-PDSCH among users is only possible if the
decisions are made by Node B-based scheduler. This changed behaviour is benecial
for both end-user and the operator. The end-user benets by always getting the
suitable bitrate and reduced number of retransmission. On the other hand, the
operator can more often allocate resources to the users in favorable conditions and
improve the cell throughput.
7.4.4 Multi-code Operation
In Rel-99 DCH, the exibility in bit rates (8, 16, 32, . . ., 384) is achieved by using
variable spreading factor from SF4 to SF256.
Whereas, in HSDPA, the SF is xed to 16. Therefore, the exibility in bit rates
comes from:
varying the number of SF16 codes simultaneously allocated to a user,
varying the modulation scheme, and
varying the channel coding scheme.
CQI reporting is a mechanism where UE suggests the Node B about the suitable modu-
lation, number of codes and suitable transport block size.
3
Commonly known as Capacity Request or Event 4a
214 CHAPTER 7. HIGH SPEED DOWNLINK PACKET ACCESS
A user can be allocated up to 15 HS-PDSCH channel codes. But the instantaneous actual
multicode allocation is decided by UE handset category, instantaneous CQI and the current
load in the cell.
CQI reports one value at a time from the CQI report denition. CQI report denition is a
table containing 31 values, each of which is dened with N parameters. These parameters
shall consist of one or more of the following:
the transport block size,
the coding rate,
the number of HS-PDSCH codes,
modulation,
power osets, etc.
For every UE category, there is a CQI table dened in 3GPP TS 25.214. Since these
specications are readily available on 3GPP website, we will not show all the tables.
Instead, we will use only two table and try to understand its elds. In the examples, we
will take a low-end device category 6 & a high-end device category 14.
CQI table for UE Category 6
HS-DSCH Category 6 UE has following features
Modulation: QPSK & 16QAM only
Max. # of codes: 5
Category 6 HSDPA device uses CQI table A which is shown in table 7.3
CQI table for UE Category 14
Category 14 has following features
Modulation: QPSK, 16QAM & 64QAM
Max. # of codes: 15
For example, category 14 device uses CQI table D (from 3GPP TS 25.214, not included
in this book), if 64QAM is not congured and table G if 64QAM is congured. CQI table
G is shown in table 7.4.
7.4. WHATS NEW IN HSDPA? 215
CQI value
Transport Block
Size
Number of
HS-PDSCH
Modulation
Reference power
adjustment
0 N/A Out of range
1 137 1 QPSK 0
2 173 1 QPSK 0
3 233 1 QPSK 0
4 317 1 QPSK 0
5 377 1 QPSK 0
6 461 1 QPSK 0
7 650 2 QPSK 0
8 792 2 QPSK 0
9 931 2 QPSK 0
10 1262 3 QPSK 0
11 1483 3 QPSK 0
12 1742 3 QPSK 0
13 2279 4 QPSK 0
14 2583 4 QPSK 0
15 3319 5 QPSK 0
16 3565 5 16QAM 0
17 4189 5 16QAM 0
18 4664 5 16QAM 0
19 5287 5 16QAM 0
20 5887 5 16QAM 0
21 6554 5 16QAM 0
22 7168 5 16QAM 0
23 7168 5 16QAM -1
24 7168 5 16QAM -2
25 7168 5 16QAM -3
26 7168 5 16QAM -4
27 7168 5 16QAM -5
28 7168 5 16QAM -6
29 7168 5 16QAM -7
30 7168 5 16QAM -8
Table 7.3: CQI Table A, taken from Table 7A of TS 25.214
Observations from the CQI tables
By carefully analyzing the information available in CQI tables and comparing the same
for two dierent device categories, we can make following observations:
216 CHAPTER 7. HIGH SPEED DOWNLINK PACKET ACCESS
CQI value
Transport Block
Size
Number of
HS-PDSCH
Modulation
Reference power
adjustment
0 N/A Out of range
1 136 1 QPSK 0
2 176 1 QPSK 0
3 232 1 QPSK 0
4 320 1 QPSK 0
5 376 1 QPSK 0
6 464 1 QPSK 0
7 648 2 QPSK 0
8 792 2 QPSK 0
9 928 2 QPSK 0
10 1264 3 QPSK 0
11 1488 3 QPSK 0
12 1744 3 QPSK 0
13 2288 4 QPSK 0
14 2592 4 QPSK 0
15 3328 5 QPSK 0
16 3576 5 16QAM 0
17 4200 5 16QAM 0
18 4672 5 16QAM 0
19 5296 5 16QAM 0
20 5896 5 16QAM 0
21 6568 5 16QAM 0
22 7184 5 16QAM 0
23 9736 7 16QAM 0
24 11432 8 16QAM 0
25 14424 10 16QAM 0
26 15776 10 64QAM 0
27 21768 12 64QAM 0
28 26504 13 64QAM 0
29 32264 14 64QAM 0
30 38576 15 64QAM 0
Table 7.4: CQI Table G, taken from Table 7G TS 25.214
Observation # 1. TB Size divided by 2ms TTI length gives the MAC-hs throughput.
Observation # 2. As the CQI becomes better, TB size, # of HS-PDSCH codes and
7.4. WHATS NEW IN HSDPA? 217
modulation scheme is improved.
Observation # 3. Cat 6 & Cat 14 UEs have a similar TB size for poor & medium CQIs.
Therefore, a high-end device experiences better throughput only in the excellent
radio conditions.
Observation # 4. 64QAM modulation of Cat. 14 is only available at CQI 26.
Observation # 5. In table 7.3, the maximum TB size, max # of codes and the best
modulation is already used at CQI = 15. Therefore, as the CQI becomes better,
there is a reference power adjustment factor. This factor is a negative factor whose
absolute value increases as the radio channel becomes better.
7.4.5 L1 H-ARQ Retransmission
Here the word ARQ stands for Automatic Retransmission Query. In other words, if the
packet received by receiver is erroneous, it will send a negative-acknowledgement which
will trigger the retransmission of the same packet. Some books also call it backward error
correction (BEC) because we take the action after the errors have occurred.
In contrast to backward error correction, there is another scheme called forward error
correction (FEC) or channel coding. In FEC, we add some extra redundant bits to improve
the channel conditions and to ght against the errors. FEC is called so because FEC steps
are performed at the transmitter end before the errors have actually occurred.
The scheme used in HSDPA is a mixture of both FEC and BEC. Therefore, it is called
hybrid-ARQ. The specialty of HSDPA is that this H-ARQ happens at MAC-hs layer
between Node B and UE. UE also needs to play an active part in this scheme. If UE
receives a packet with a lot of errors, it sends a negative-Ack and stores a copy of this
erroneous reception. Later on, after receiving the retransmitted packet, UE has to softly
combine these two versions. This soft combining capacity is decided by the number of soft
channel bits in the handset.
Retransmission on negative acknowledgement can be done in many ways, e.g.,
Stop-and-Wait
Go Back N
Selective Repeat
. . .
The method chosen for HSDPA retransmission is Stop-and-Wait (SAW) proce-
dure, where the transmitter sends a transport block and waits for the receivers response
before sending a new block or retransmitting the erroneous one.
218 CHAPTER 7. HIGH SPEED DOWNLINK PACKET ACCESS
In its basic form, stop-and-wait mechanism is not very ecient, since the transmitter is
inactive until it gets a response. This eventually reduces the throughput. Therefore, in
HSDPA, 3GPP chose a smart way to improve the existing stop-and-wait algorithm. In
HSDPA, Node B can congure up to six parallel H-ARQ processes active for one user.
While Node B is waiting for a feedback from UE for process # 1, data can be transmitted
from process # 2, 3, 4, 5 or 6. Hence, Node B can transmit without interrupting the data
ow.
Figure 7.3: Ilustration of parallel processes of HSDPA H-ARQ scheme
7.4.6 MAC-hs Protocol in Node B and UE
It wont be any exaggeration if we say that MAC-hs is the brain of HSDPA.
Prior to HSDPA, MAC layer was implemented at RNC. Therefore, only RNC
had the authority to perform packet scheduling for Rel-99 channels.
Please refer to section 7.5 for detailed information about MAC-hs protocols and also its
interworking with it others protocols. In short, the MAC-hs protocol is responsible for:
packet scheduling,
transport format combination (TFC) selection,
L1 Hybrid-ARQ, and
Iub ow control etc.
7.4. WHATS NEW IN HSDPA? 219
7.4.7 Serving Cell Change Instead of Soft HO
UE in HSDPA connected mode does not perform soft handover. While moving from one
HSDPA cell to another HSDPA cell, UE undergoes serving cell change. As a result of
serving cell change, UE stops receiving data from one Node B and starts receiving from
another one. This topic is explained in more details in carefully in section 7.10. In short,
the serving cell change mechanism is divided into three phases (as shown in gure 7.4).
Figure 7.4: HS-DSCH Serving Cell Change; 3 phases
The gure 7.4, explains the serving cell change procedure by dividing into three chrono-
logical steps.
1. When UE is in Source Cell: UE has no radio link with the target cell. HS-DSCH
as well as the associated-DCH channels are only between the UE and the Node B
of the source cell.
2. When UE is in overlapping area of the 2 cells: In the overlapping area, UE sends
a measurement report to RNC and performs soft handover for the associated-DCH
(A-DCH) channel. But the HS-DSCH channel is only received from the source cell.
3. When UE is in Target Cell After leaving the overlapping area, if UE comes to the
target cells area, it will maintain the radio link only with the Node B of the target
cell.
220 CHAPTER 7. HIGH SPEED DOWNLINK PACKET ACCESS
When the cell change action is triggered, there is always some interruption of HS-DSCH
but the end-user sees it as a reduced throughput. During this procedure, the user data
buered at old Node B cannot be transferred to the new Node B. In case of Inter-Node
B serving cell change, the old Node B ushes (or discards) the buered data and the new
Node B receives the same data from RNC. In case of Intra-Node B serving cell change,
both the source and the target cells are served by the same Node B. Therefore, the same
data can be delivered to UE in the target cell.
7.5. HSDPA PROTOCOL ARCHITECTURE 221
7.5 HSDPA Protocol Architecture
Figure 7.5: MAC-hs Protocol in UE and Node B
Figure 7.5 shows the user plane protocol stack of HSDPA operation. In conventional Rel-
99 operation, MAC-d PDUs are transmitted from RNC to Node B using Frame Protocol
(FP) for DCH. For HSDPA operation, a new FP for HS-DSCH is introduced. MAC-d
ows from RNC are buered at Node B. The data ow on Iub is controlled by MAC-hs
protocol and the procedure is known as Iub Flow Control. Figure 7.5 illustrates a FP data
frame from RNC to Node B.
After getting the CQI reports from UE, Node B can decide the size of MAC-hs transport
block, which is used by Node B to calculate the number of MAC-d PDUs that can be
multiplexed in MAC-hs PDU. Please note that the size of MAC-hs PDU can change every
TTI. Therefore, UE must also be informed about it. The information about the number
of MAC-d PDUs and their sizes is signalled to UE using the header eld of MAC-hs PDU.
7.5.1 MAC-hs entity - UE Side
According to section 4.2.3.3 of 3GPP TS 25.321, the functions performed by MAC-hs
entity on UE side is depicted in gure 7.6. These functions are listed in table 7.5. Lets
discuss them one-by-one.
1. HARQ: The HARQ functional entity handles all the tasks that are required for hy-
brid ARQ. It is responsible for generating ACKs or NACKs. In the case of re-
transmission, UE has to perform soft combining of previous erroneous reception and
new received transport block. There are two popular algorithms for this: Chase
Combining CC and Incremental Redundancy IR. These two schemes are de-
scribed using gure 7.7.
222 CHAPTER 7. HIGH SPEED DOWNLINK PACKET ACCESS
On Node B Side On UE side
1. Flow Control
2. Scheduling/Priority
Handling
3. HARQ
4. TFRC selection
1. HARQ
2. Reordering Queue dis-
tribution:
3. Reordering
4. Disassembly
Table 7.5: Summary of MAC-hs protocol functions
Figure 7.6: MAC-hs Protocol in UE Side (from TS 25.321)
Chase Combining: Chase combining is also called as identical retransmis-
sion. As shown in the upper part of gure 7.7, in chase combining, when
Node B gets a negative acknowledgement for an MAC-hs transport block, it
retransmits exactly the same amount of bits as the original transmission. In
other words, the same Redundancy Version (RV) is used for the original trans-
mission and re-transmission. We can also say that the coding schemes used in
7.5. HSDPA PROTOCOL ARCHITECTURE 223
Figure 7.7: Chase Combining (upper) and Incremental Redundancy (lower)
schemes for HSDPA HARQ
transmission and subsequent re-transmissions are identical.
Incremental Redundancy: Incremental redundancy scheme is illustrated in the
lower subgure of gure 7.7. IR has the liberty to change the redundancy
version after getting a negative acknowledgement.
2. Reordering Queue distribution: Using the QUEUE ID eld of MAC-hs header,
UEs MAC-hs protocol entity forwards the MAC-hs PDUs to the correct reordering
buer.
3. Reordering: On UE side, one reordering entity is congured for each Queue ID. The
main purpose of this function is to deliver the MAC-hs PDUs with consecutive
Trasnmission Sequence Number (TSN) to the disassembly function. If MAC-hs
PDUs with lower TSN are missing, MAC-hs PDUs are not delivered to the disas-
sembly function.
4. Disassembly: A MAC-hs PDU contains three elds: (1) MAC-hs header, (2) MAC-d
PDUs & and (3) padding bits. Disassembly function removes the other two parts
and extracts the useful part, which is MAC-d PDUs. These MAC-d PDUs are
delivered to the MAC-d protocol layer.
224 CHAPTER 7. HIGH SPEED DOWNLINK PACKET ACCESS
7.5.2 MAC-hs entity - UTRAN Side
In the previous section, we discussed the MAC-hs entity on the UE side. Now we will
focus on the same protocol entity on UTRAN side. In UTRAN, MAC-hs is implemented
in Node B which is shown in gure 7.8. These functions are described in section 4.2.4.3
of 3GPP TS 25.321 and listed in table 7.5.
Figure 7.8: MAC-hs Protocol in UTRAN Side (from TS 25.321)
1. Flow Control: Flow control mechanism has already been discussed in section 7.3 and
gure 7.2.
Flow control function in MAC-d provides a controlled data ow between the MAC-
d (RNC) and MAC-hs (Node B), taking the transmission capabilities of the air
interface into account in a dynamic manner. In other words, the ow controls
function is to negotiate the numbers of MAC-d PDUs transferred from RNC to
Node B. Node B is in a better position to decide this for individual HSDPA user
because of the received CQI feedback from each user.
The aim of ow control is to limit the layer 2 signalling latency and minimize the
discarded and retransmitted data which can happen due to HS-DSCH congestion.
7.5. HSDPA PROTOCOL ARCHITECTURE 225
In case of congestion, Node B can decrease the number of credits which means RNC
will send less amount of MAC-d data. This avoids buer overow and makes the
Iub transmission more eective. Flow control is provided independently by MAC-d
ow for a given MAC-hs entity.
2. Scheduling & Priority Handling: Every TTI Node B has to allocate HS-DSCH
resources between HARQ entities and data ows according to their priority class.
Based on UEs feedback in uplink, Node B decides whether new transmission or
retransmission should be transmitted.
3. HARQ: One HARQ entity is responsible for managing the hybrid ARQ functionality
for one user. As explained in an earlier section (see gure 7.3), we can have up to
six parallel processes per HARQ entity. These multiple processes are used to avoid
the interruption in continuous data ow caused by stop-and-wait HARQ algorithm.
There can be only one HARQ process per HS-DSCH per TTI.
In HSDPA, up to six parallel HARQ processes can be congured. There can be one
HARQ process per TTI, whose identity is signalled to UE using L1 signalling. For
more information, please read about the information delivered on HS-SCCH channel
in a later part of this chapter (section 7.6.2).
4. TFRC selection: Transport Format and Resource Combination selection for the data
to be transmitted on HS-DSCH is very strongly attached to the link adaptation. As
discussed earlier, after receiving the feedback from UE, Node B decides:
the size of MAC-hs Transport block,
number of HS codes,
channel coding rate, &
modulation scheme etc.
226 CHAPTER 7. HIGH SPEED DOWNLINK PACKET ACCESS
7.6 Channels and Physical Layer
Source: 3GPP TS 25.211 Physical channels and mapping of transport channels
onto physical channels
In chapter 4, we discussed about the logical, transport and physical channels and restricted
our discussion to only Release 99 channels. With HSDPA development, there is no new
logical channel introduced in the system. But a new transport channel is designed which
is known as High speed- downlink shared channel (HS-DSCH). This transport channel is
specially used to carry DTCH logical channel
4
. In R99, the logical channel DTCH
5
could
be mapped to FACH and DCH transport channels. But with Rel-5, RNC has the options
to select from the choices shown below.
From Rel-5 onwards, the DL logical channel DTCH is mapped to:
=

FACH if data volume is very small


DCH if data volume is large but HSDPA not supported
HS-DSCH if data volume is large and HSDPA is supported
Supported means that both UE device and the UTRAN must be capable of HSDPA
functionality.
The transport channel HS-DSCH is further mapped to HS-PDSCH (High
Speed-Physical Downlink Shared Channel).
Log. Ch. DTCH Tra. Ch. HS-DSCH Phy. Ch. HS-PDSCH
In the nal section of chapter 4, there was brief overview of the HSDPA related channels
in section 4.6. For clarity, the same gure is shown in gure 7.9.
Now, we will focus on the functionality of L1 signalling for HSDPA operation. As shown in
gure 7.1, the decision to use HS-DSCH is taken by RNC. After this, RNC informs Node
B and UE about the HSDPA conguration to kick-start the HSDPA operation. RNC can
only select the transport channel type but the actual scheduling is done by Node B. As we
know, HS-DSCH is a shared channel which is shared among all the users in a cell. Node
B has to notify the UEs about its scheduling decisions.
The procedure described in gure 7.9 can be understood in 4 steps.
Step 1: Every UE reports its radio conditions in the form of a Channel Quality Indicator
(CQI ). The UL channel used for this feedback is HS-DPCCH.
4
Optionally DCCH can also be carried by HS-DSCH. This is called Signalling Radio Bearer
(SRB) on HSPA.
5
Dedicated Trac Channel
7.6. CHANNELS AND PHYSICAL LAYER 227
Figure 7.9: HSDPA related physical channels
Step 2: The MAC-hs scheduler at Node B calculates the Priority Metric for all the users
and selects the User (or Users)
6
, who will get scheduled in the next TTI.
Each scheduled user is individually notied using an HS-SCCH channel.
Step 3: Exactly 2 slots after the HS-SCCH, Node B transmits data on HS-PDSCH chan-
nel to the scheduled users. There can be maximum 15 HS-PDSCH per cell. One
user can be allocated 1 to 15 HS-PDSCH codes. Therefore, it is also possible to
allocate the whole cell resources to one user.
Step 4: After receiving and decoding the data, each scheduled UE transmits ACK or
NACK in UL. The uplink channel used for this purpose the same as used in step 1,
that is, HS-DPCCH.
In the section below, we will try to investigate these 3 physical channels in more depth.
7.6.1 HS-DPCCH
HS-DPCCH is a dedicated UL channel for sending HSDPA related feedback
information to Node B.
HS-DPCCH is a dedicated channel. In simple words, if there are, for example, 50
users in HSDPA active mode, then each user will transmit its own UL feedback
channel.
The timing of HS-DPCCH is organized in sub-frame which is 2ms or 3 slots long.
6
The number of scheduled users is decided by the number of HS-SCCH congured in the cell.
We can have at least one and at most 4 such channels. The most popular choices are 3 and 4.
228 CHAPTER 7. HIGH SPEED DOWNLINK PACKET ACCESS
Figure 7.10: Frame structure for uplink HS-DPCCH (TS 25.211)
The HARQ-ACK is carried in the rst slot of the HS-DPCCH sub-frame.
The CQI is carried in the second and third slot of a HS-DPCCH sub-frame.
SF for HS-DPCCH is 256.
Bit Rate = 15 kbps. Therefore, 30 bits can be sent in UL every TTI.
10 bits are used for ACK/NACK and 20 bits for CQI
7
.
CQI repetition cycle can be congured by operator.
Figure 7.10 shows that there are N users in a cell and every UE is sending L1 feedback in
uplink using HS-DPCCH channel. The same gure also shows that a 10 ms radio frame is
broken down into 5 sub-frames of 2ms. Each sub-frame can accommodate three slots and
these three slots of HS-DPCCH sub-frame carry two elds.
1. CQI: An active HSDPA UE is bound to report the DL channel conditions back to the
Node B. The network signals the periodicity of channel condition indicator (CQI )
reporting, and whether it is repeated (optionally). The UE measures the received
P-CPICH & uses a proprietary algorithm to calculate CQI. CQI value also strongly
depends on the ratio of HS-PDSCH Power to Total Carrier power. For example,
7
After channel coding 1 bit of ack/nack becomes 10 bits and 5 bits of CQI become 20 bits
7.6. CHANNELS AND PHYSICAL LAYER 229
6W out of 20W is allocated to HSDPA. Therefore, UE must get this information by
higher layer signalling.
The reported value indicates the maximum amount of data the UE estimates it could
receive given the current channel conditions and UE capabilities. The network can
then use this value as a guideline when it schedules the next block of data. Node
B can of course, perform some vendor specic compensation to this reported CQI.
There are 30 dierent CQI values for each UE category, so a CQI can be addressed
using 5 bits. However, CQI values are coded using a robust (20,5) code, so the
channel coder output is 20 bits long and lls completely the two slots allocated for
CQI.
2. ACK/NACK: After the UE has received the HS-PDSCH frame and successfully
decoded it, it has to send an ACK (or NACK in case of errors) back to Node B
using a HS-DPCCH channel. The UE has approx. 7.5 slots (5 ms) to complete this
procedure. ACK/NACK channel coding is very robust, because the input consists
of only one bit (ACK=1, NACK=0), and the channel coder simply repeats this ten
times, so the output is ten bits long.
7.6.2 HS-SCCH
Figure 7.11: Subframe structure for the HS-SCCH (TS 25.211)
230 CHAPTER 7. HIGH SPEED DOWNLINK PACKET ACCESS
HS-SCCH is a common DL channel which can be read by every HSDPA users.
Each user reads this channel (or channels) every 2 ms to nd out if he has
been scheduled.
If not: UE ignores the content of HS-SCCH (or HS-SCCHs).
If Yes: UE nds out which codes, how many codes, which modulation &,
which Transport Block (TB) Size has been scheduled for him.
HS-SCCH is a common channel. Operator can congure 1, 2, 3 or 4 such channels
per cell.
SF for HS-SCCH is 128.
Bit Rate = 60 kbps. Therefore, 120 bits can be sent in DL on each channel every
TTI.
It is used to informs all the UEs how and when to receive the HS-PDSCH.
For example, if 3 such channels are congured then 15 HS-PDSCH codes can be
divided into 3 blocks every TTI ( e.g., 5+5+5 or 2+8+5 or 3+10+2 etc.).
Figure 7.11 shows a cell with several users. In this example, the cell has been congured
with only one HS-SCCH channel. In this example, only one UE can be scheduled in
one TTI. Therefore, the cell uses pure time-multiplexing principle. It is also allowed to
have more than one HS-SCCH in a cell. This alternative, increases the overhead in code
and power domain but allows the operator to serve more than one UE in one TTI which
allows us to have code multiplexing of resources. Figure 7.11 also shows that HS-SCCH
transmission is two slots ahead of actual data transmission of HS-PDSCH. In short, we
can say that HS-SCCH informs and prepares the UE to receive HSDPA data on shared
resources.
HS-SCCH channel carries the following elds: .
Channelization Code Set, 7 bits: The CCS eld indicates the number of SF16 codes
and the code oset that are used for the HS-DSCH during the specic 2 ms TTI.
Modulation Type, 1 bit: This bit indicates the modulation type. In Rel-5 & Rel-6,
there are only two options. Therefore, one bit is sucient. But from Release 7,
the third option of 64QAM is also available. Hence, if 64QAM is congured in the
cell, then 7 bits of CCS and 1 bit modulation type should be considered together to
identify the modulation.
Transport Block Size, 6 bits:
Hybrid-ARQ Process ID, 3 bits:
Redundancy and Constellation Version, 3 bits:
7.6. CHANNELS AND PHYSICAL LAYER 231
New Data Indicator, 1 bit: This bit toggles (0 to 1 or 1 to 0) for every new transmis-
sion and remains the same in case of retransmission.
7 bits of Channelization Code Set and 1 bit of Modulation Type are
multiplexed together. These 8 bits are channel coded and the result is
sent on the rst slot of HS-SCCH sub-frame.
6 bits of Transport Block Size, 3 bits of HARQ process ID, 3 bits of
Redundancy and Constellation Version & 1 bit of New Data Indicator
elds are multiplexed together. These 13 bits are channel coded and sent
on 2
nd
and 3
rd
slot of HS-SCCH sub-frame.
Several times, it has been stated that HS-SCCH carries the UE identity. But that identity
eld is missing from the list shown above. This list is actually copied from section 4.6.2
of 3GPP TS 25.212. Are we missing something?
Yes, we are missing the concept of masking UE identity on the CRC eld.
From the aforementioned 21 bits (8 + 13 bits) of HS-SCCH elds, a 16-bit CRC is calcu-
lated by Node B. The CRC is masked with a 16-bit user specic identity called H-RNTI.
H-RNTI is allocated by RNC at the time of radio bearer setup or radio bearer recong-
uration, if the HS-DSCH transport channel is selected. Although HS-SCCH transmission
is on three slots of a sub-frame, UE can read the UE identity from the rst slot itself.
UE must monitor all HS-SCCHs in the HS-SCCH set. If the UE did detect control
information intended for this UE in the previous subframe, it is sucient to only monitor
the same HS-SCCH used in the previous subframe. If a UE detects that one of the
monitored HS-SCCHs carries control information intended for this UE, the UE shall start
receiving the HS-PDSCHs indicated by this control information.
For more details, readers are advised to refer to 3GPP TS 25.212; Multiplexing and channel
coding (FDD).
7.6.3 HS-PDSCH
HS-PDSCH is the main DL channel which carries DL data for the subscribers.
HS-PDSCH is a shared channel. There can be up to 15 such channels per cell
SF for HS-PDSCH is 16
Bit rate = 240 ksps per code
8
No soft handover
8
To get kbps, multiply by #bits per symbol, 2 for QPSK, 4 for 16QAM and 6 for 64QAM
232 CHAPTER 7. HIGH SPEED DOWNLINK PACKET ACCESS
Figure 7.12: Subframe structure for the HS-PDSCH (TS 25.211)
No fast inner-loop power control
The High Speed Physical Downlink Shared Channel (HS- PDSCH) is used to carry the
High Speed Downlink Shared Channel (HS-DSCH). A HS-PDSCH corresponds to one
channelization code of xed spreading factor SF=16 from the set of channelization codes
reserved for HS-DSCH transmission. Multi-code transmission is allowed, which translates
to UE being assigned multiple channelization codes in the same HS-PDSCH subframe,
depending on its UE capability. According to the principles of channelization codes, there
are 16 codes of SF=16, but one of them CC
16,0
is forbidden to use because a SF 256
(CC
256,0
) code from the same branch is used for P-CPICH in the same cell. Therefore, to
maintain orthogonality on DL, it is decided to use only 15 codes for HSDPA transmission.
This concept is described in gure 7.12. The same gure also shows the subframe and slot
structure of HS-PDSCH.
An HS-PDSCH may use QPSK, 16QAM or 64QAM modulation symbols. All relevant
Layer 1 information is transmitted in the associated HS-SCCH i.e. the HS-PDSCH does
not carry any Layer 1 information. The slot formats for HS-PDSCH are shown in table
7.6. The three rows of this table emphasize the eect of modulation on channel bit rate.
7.6. CHANNELS AND PHYSICAL LAYER 233
Slot format
#i
Channel Bit
Rate (kbps)
Channel Symbol
Rate (ksps)
SF
Bits/ HS-DSCH
subframe
0 (QPSK) 480 240 16 960
1 (16QAM) 960 240 16 1920
2 (64QAM) 1440 240 16 2880
Table 7.6: HS-DSCH elds (TS 25.211)
Figure 7.13: All Channels in REL-5 Conguration (including A-DCH)
7.6.4 Associated DCH
A-DCH or associated DCH is the new name used for the well-known R99 DCH
channels when these channels are used in association with HSDPA channels.
Uplink: In UL, the Control channel (DPCCH) and Data channel (DPDCH) are code
multiplexed. DPCCH is used for carrying L1 Control
9
bits & DPDCH is used for
carrying for user data and signalling radio bearer (SRB or L3 signalling)
Downlink: In DL Control channel and Data channel are time multiplexed. The multi-
plexed channel is called DPCH. Hence, DPCH is used for L1 control, User Data and
SRB.
One again, we would emphasize that A-DCHs are dedicated channels. Therefore, if there
are 50 active HSDPA users then there will be 50 UL channels and 50 DL channels. Due
to this, every active users A-DCH will cause additional UL interference and DL code &
power congestion.
9
TFCI, Pilot Bits and TPC
234 CHAPTER 7. HIGH SPEED DOWNLINK PACKET ACCESS
Figure 7.14: Fractional DPCH Channel as reduced version DL DPCH (TS 25.211)
7.6.5 Fractional-DPCH
As the name implies, F-DPCH is a fractional version of the normal DL DPCH
channel. For every active HSDPA user, one DL DPCH is needed but one F-
DPCH can be used by upto 10 users. This solves DL code and power congestion
up to some extent.
An F-DPCH carries control information generated at layer 1 (TPC com-
mands) for one uplink DPCCH.
As explained in section 7.6.4, every active HSDPA user requires one SF256 from DL
channelization code tree. At the time of writing this book (August 2012), vendors are
supporting more than 70 active HSDPA users per cell. If conventional A-DCH is used,
then for every active user a DL SF256 code will be reserved for DPCH. To solve this
problem, 3GPP has introduced DL Fractional-DPCH which can be used as a replacement
for DL DPCH. But there are a few prerequisites for using F-DPCH.
F-DPCH is possible for HSDPA+HSUPA.
SRB on HSPA must be congured because DL RRC signalling cannot be conveyed
on F-DPCH.
As shown in gure 7.14, Normal DPCH with SF 256 can be used to transmit 20 bits per
time slot. But in Fractional DPCH, the transmitter is OFF for 18 bits and ON for only
two bits. These two bits are DL TPC (Transmit Power Control) command. The users are
allocated a slot format number (0, 1, 2, . . . , 9). Based on the slot number, UE nds out
when TPC bits are transmitted for him. In the remaining 90% of time, other nine users
are provided with their respective TPC commands. In the same gure, an example of slot
format # 4 is shown. The exact denition of each slot format # can be found in table 7.7.
7.7. TIMING OF HSDPA CHANNELS 235
Slot Format
SF
Total N
OFF1
N
TPC
N
OFF2
# Bits/Slot Bits/Slot Bits/Slot Bits/Slot
0 256 20 2 2 16
1 256 20 4 2 14
2 256 20 6 2 12
3 256 20 8 2 10
4 256 20 10 2 8
5 256 20 12 2 6
6 256 20 14 2 4
7 256 20 16 2 2
8 256 20 18 2 0
9 256 20 0 2 18
Table 7.7: F-DPCH elds (from 3GPP TS 25.211)
7.7 Timing of HSDPA Channels
Source: 3GPP TS 25.211;
section 7; Timing relationship between physical channels
A simplied HSDPA operation is depicted in gure 7.15. In the example shown in this
gure, we have assumed that there is only one HS-SCCH in the cell and the UEs are
expected to send CQI reports every 2 ms. UE # 1 is scheduled in rst TTI, UE #2 and
UE # 3 in the 2 next TTIs and UE #2 is again scheduled in the 4th TTI. The same
gure (g. 7.15) also shows the behaviour of UE # 1 and UE # 2 from the reception and
transmission perspective.
x
It can be seen that CQI reports are sent periodically. If the HSDPA user gets scheduled,
it receives data and sends either positive or negative acknowledgement. A/NACK are sent
on the rst time slot of HS-DPCCH channel.
Timing of HS-SCCH: This downlink channel has the same reference and frame timing
as P-SCH, S-SCH, P-CPICH and P-CCPCH. The start of HS-SCCH subframe #0
is aligned with the start of the P-CCPCH frames.
Timing of HS-PDSCH: Figure 7.15 illustrates the timing structure for the HS-DSCH
control signalling. The xed time oset between the HS-SCCH information and the
start of the corresponding HS-DSCH TTI equals 2 time slots (2*Tslot=5120chips).
Timing of HS-DPCCH: The timing of HS-DPCCH is calculated in relation to the DL
HS-PDSCH reception time and UL DPCCH/DPDCH transmission time. The rela-
tive timing between DPCCH/DPDCH and HS-DPCCH is kept constant.
236 CHAPTER 7. HIGH SPEED DOWNLINK PACKET ACCESS
Figure 7.15: Summary of HSDPA operation and timing
The start of HS-DPCCH subframe which carries Ack/Nack for the received
HS-PDSCH data is approx. 7.5 Time slot after the reception of corresponding
HS-PDSCH subframe at UE receiver.
The time oset between UL DPCCH/DPDCH and HS-DPCCH is a multiple
of 256 chip (n 256 chips).
7.8 HSDPA UE Categories
Quite often the network performance is limited by the population of low-end HSDPA
devices on the network. Therefore, it is quite important to learn about the maximum bit
rates that can be achieved by a certain UE category. Every 3GPP release has added new
functionalities to HSDPA operation and thereby dened new device categories. According
to 3GPP Rel-9, there are 28 HSDPA UE categories, whose details are readily available in
3GPP TS 24.306. The purpose of this book is to make the learning easier. Therefore, we
would focus on the device categories according to each release.
7.9. HSDPA PEAK BITRATE CALCULATION 237
Category Modulation Max. Codes
11 & 12 Only QPSK 5
1 to 6
QPSK & 16QAM
5
7 & 8 10
9 & 10 15
Table 7.8: UE categories according to Rel-5 & Rel-6
Category Modulation Max. Codes MIMO Support
11 & 12 Only QPSK 5 No
1 to 6 QPSK & 16QAM 5 No
7 & 8 QPSK & 16QAM 10 No
9 & 10 QPSK & 16QAM 15 No
13 & 14 QPSK & 16QAM & 64QAM 15 No
15 & 16 QPSK & 16QAM 15 Yes
17 & 18 QPSK & 16QAM & 64AM 15 No
17 & 18 QPSK & 16QAM 15 Yes
Table 7.9: UE categories according to Rel-5, Rel-6 & Rel-7
7.9 HSDPA Peak Bitrate Calculation
In this section, we will investigate the maximum bit rates that can be achieved with an
HSDPA device of certain category. The word maximum here means the peak instantaneous
bit rate for 2ms TTI. In order to calculate the average throughput, we should also consider
those TTIs where the user was not scheduled.
Data Rate per code =
[
R
chip
SF
]
Symbols/second
Bit Rate per code = [Data Rate [ksps] Bits per Symbol] kbps ,
Bits per Symbol =

2 if Modulation is QPSK,
4 if Modulation is 16QAM,
6 if Modulation is 64QAM .
Max. Gross Bit Rate = [Bit Rate per code Max. # of codes supported] kbps
Max. Net Bit Rate = [Gross Bit Rate] [Channel Coding Rate] kbps
Let us take examples of device categories 12, 6, 8, 10, 14 & 16 and calculate the peak net
bit rates achieved. In this example, we will assume channel coding rate of 3/4. Please
refer to table 7.10.
238 CHAPTER 7. HIGH SPEED DOWNLINK PACKET ACCESS
UE
Cat.
Symbol
Rate
Best Mod-
ulation
Bit Rate
#
codes
R
bit
(Gross)
R
bit
(Net)
12 240 Ksps QPSK 480 kbps 5 2.4 Mbps 1.8 Mbps
6 240 Ksps 16QAM 960 kbps 5 4.8 Mbps 3.6 Mbps
8 240 Ksps 16QAM 960 kbps 10 9.6 Mbps 7.2 Mbps
10 240 Ksps 16QAM 960 kbps 15 14.4 Mbps 10.8 Mbps
14 240 Ksps 64QAM 1440 kbps 15 21.6 Mbps 16.2 Mbps
16 240 Ksps 16QAM 960 kbps 15
28.8
Mbps
10
1.8 Mbps
Table 7.10: Example of peak bit rate calculation for several devices categories
While doing the same calculation for a UE which supports MIMO operation, the nal
result can be multiplied by 2. Because in the MIMO scheme, where 2 transport blocks are
multiplexed on the same TTI, the peak bit rates are doubled.
7.10. SERVING HS-DSCH CELL CHANGE 239
7.10 Serving HS-DSCH Cell Change
Figure 7.16: Inter-Node B serving HS-DSCH cell change (TS 25.308)
According to 3GPP TS 25.308, A serving HS-DSCH cell change facili-
tates the transfer of the role of serving HS-DSCH radio link from one radio
link belonging to the source HS-DSCH cell to a radio link belonging to the
target HS-DSCH cell.
As discussed in chapter 5, mobile in CELL DCH mode performs soft-handover or hard-
handover in order to maintain the connectivity with UTRAN. However, for HS-PDSCH
allocation for a given UE belongs to only one of the radio links assigned to the UE, the
serving HS-DSCH radio link. The cell associated with the serving HS-DSCH radio link is
dened as the serving HS-DSCH cell. While moving, UE can perform serving HS-DSCH
cell change. Quite often, people call it HSDPA Serving Cell Change (SCC).
This mechanism is almost similar to a hard handover with a small dierence that during
transition UE may perform soft handover on A-DCH channels with source and target
cells. Hence for HS-DSCH, UE does not perform Soft handover but for the associated-
DCH (A-DCH) it does. The source and the target cells can be controlled by the same Node
B or two dierent Node Bs. Thus, we need to discuss two dierent mobility scenarios:
In 3GPP 25.308, several ways to classify the Serving HS-DSCH Cell change procedures
are dened. We will discuss the classication which is based on the serving HS-DSCH
Node B. The signalling scenarios related to these procedures are discussed in chapter 9.
240 CHAPTER 7. HIGH SPEED DOWNLINK PACKET ACCESS
Intra-Node B serving HS-DSCH cell change: In this scenario, the source and the
target cells are two adjacent sectors of the same site (Node B). Therefore, the
unacknowledged data which is buered at Node B can be transmitted to the user
using new radio link. There is no need to ush the data. Intra-Node B SCC has
less interruption in service.
Inter-Node B serving HS-DSCH cell change: In contrast to the earlier case, in this
case, the source and the target cells are controlled by two dierent Node Bs. There-
fore, when the user moves into the new cell, the unacknowledged buer data at old
Node B must be ushed and the new Node B must get the same from RNC. As
expected, this causes delay and increases the service interruption time.
For UE it is irrelevant whether the serving HS-DSCH cell change procedure is of a intra-
Node B or inter-Node B nature. The cell change decisions are always made by UTRAN.
Hence SCC procedure of HSDPA is known as network-controlled serving HS-DSCH cell
change. A network controlled HS-DSCH cell change is performed as an RRC layer sig-
nalling procedure and is based on the existing handover procedures in CELL DCH state.
The detailed signalling between UE and RNC related to both Inter-Node B and Intra-
Node B Serving Cell Change is described in the in chapter 9 along with other intersting
signalling scenarios related to UMTS and HSPA.
7.11. SUMMARY: HSDPA OPERATION IN SHORT 241
7.11 Summary: HSDPA Operation in Short
The whole communication between UE and Node B can be explained using the 3 physical
channels designed for HSDPA operation. This procedure is illustrated in gure 7.17. In
short, the various steps are as following:
Figure 7.17: HSDPA operation explained using the physical channels.
Channel Direction Function SF Modulation Ch. Coding
HS-PDSCH
Carries DL user
data
16
QPSK &
16QAM
1/3 Turbo coding
HS-SCCH
Carries
scheduling info
128 QPSK
1/3
Convolutional
coding
ACK =
1111111111
HS-
DPCCH

Used to send UL
feedback
256 BPSK
NACK =
0000000000
CQI = (20,5)
Block coding
Table 7.11: Summary of HSDPA channels
242 CHAPTER 7. HIGH SPEED DOWNLINK PACKET ACCESS
Copyright Notices
In order to create some gures, tables and text-sections, the following reference material
has been used. Information has been interpreted and presented in a simplied manner.
The original references are provided here.
Main reference material for this book has been technical specications (TSs) and technical
reports (TRs) of 3rd Generation Partnership Project (3GPP).
Table 7.3 on page 215 Table 7A of 3GPP TS 25.214 v 9.1.0.
Table 7.4 on page 216 Table 7G of 3GPP TS 25.214 v 9.1.0.
Figure 7.10 on page 228 Figure 2A of 3GPP TS 25.211 v 9.1.0.
Figure 7.11 on page 229 Figure 26A of 3GPP TS 25.211 v 9.1.0.
Figure 7.12 on page 232 Figure 26B of 3GPP TS 25.211 v 9.1.0.
Table 7.6 on page 233 Table 26 of 3GPP TS 25.211 v 9.1.0.
Figure 7.14 on page 234 Figure 12B of 3GPP TS 25.211 v 9.1.0.
Table 7.7 on page 235 Table 16C of 3GPP TS 25.211 v 9.1.0.
Text in section 7.7 on page 235 Section 7 of 3GPP TS 25.211 v 9.1.0.
c 2009. 3GPP
TM
TSs and TRs are the property of ARIB, ATIS, ETSI, CCSA,
TTA, and TTC who jointly own the copyright for them. They are subject to
further modications and are therefore provided to you as is for information
purposes only. Further use is strictly prohibited.
Text in section 7.5.1 on page 221 Section 4.2.3.3 of 3GPP TS 25.321 v 7.7.0.
Text in section 7.5.2 on page 224 Section 4.2.4.3 of 3GPP TS 25.321 v 7.7.0.
Figure 7.6 on page 222 Figure 4.2.3.3.1 of 3GPP TS 25.321 v 7.7.0.
Figure 7.8 on page 224 Figure 4.2.4.3.1 of 3GPP TS 25.321 v 7.7.0.
c 2008. 3GPP
TM
TSs and TRs are the property of ARIB, ATIS, ETSI, CCSA,
TTA, and TTC who jointly own the copyright for them. They are subject to
further modications and are therefore provided to you as is for information
purposes only. Further use is strictly prohibited.
7.11. SUMMARY: HSDPA OPERATION IN SHORT 243
Table 7.1 on page 206 Table 5.1a of 3GPP TS 25.306 v 9.1.0.
Table 7.8 on page 237 Table 5.1a of 3GPP TS 25.306 v 9.1.0.
Table 7.9 on page 237 Table 5.1a of 3GPP TS 25.306 v 9.1.0.
Text in section 7.6.2 on page 229 Section 4.6 of 3GPP TS 25.212 v 9.3.0.
c 2010. 3GPP
TM
TSs and TRs are the property of ARIB, ATIS, ETSI, CCSA,
TTA, and TTC who jointly own the copyright for them. They are subject to
further modications and are therefore provided to you as is for information
purposes only. Further use is strictly prohibited.
BIBLIOGRAPHY
[1] 3GPP TS 25.301 ver. 7.0.0 ;Radio Interface Protocol Architecture
[2] 3GPP TS 25.308 ver. 7.0.0 ;High Speed Downlink Packet Access (HSDPA); Overall
Description;
[3] 3GPP TS 25.306 ver. 9.0.0 ;UE Radio Access capabilities
[4] 3GPP TS 25.211 ver. 6.0.0 ;Physical channels and mapping of transport channels
onto physical channels (FDD)
[5] 3GPP TS 25.212 ver. 6.0.0 ;Multiplexing and Channel Coding (FDD)
[6] 3GPP TS 25.213 ver. 6.0.0 ;Spreading and Modulation (FDD)
[7] 3GPP TS 25.214 ver. 6.0.0 ;Physical Layer Procedures (FDD)
[8] 3GPP TS 25.321 ver. 7.0.0 ;MAC protocol specication
[9] 3GPP TS 25.331 ver. 7.0.0 ;Radio Resource Control (RRC) protocol specication
[10] 3GPP TS 25.401 Ver. 7.0.0 ;UTRAN overall description
[11] 3GPP TS 25.413 Ver. 7.0.0 ;UTRAN Iu Interface: RANAP Signalling
[12] 3GPP TS 25.433 Ver. 7.0.0 ;UTRAN Iub Interface: NBAP Signalling
[13] 33GPP TR 25.931 ver. 8.0.0 ;UTRAN functions, examples on signalling procedures
[14] H.Holma and A. Toskala, WCDMA for UMTS , 5th Edition, John Wiley & Sons.
[15] H.Holma and A. Toskala, HSDPA/HSUPA for UMTS , 1st Edition, John Wiley
& Sons.
[16] Chris Johnson, Radio Access Networks For UMTS ; Principles And Prac-
tice , John Wiley & Sons.
244
CHAPTER
8
HIGH SPEED UPLINK PACKET
ACCESS
Source: 3GPP TS 25.319; Enhanced uplink; Overall description
After learning the important facts about High Speed Downlink Packet Access (HSDPA)
in the previous chapter, the next logical step is to investigate the improvements in uplink.
These new set of improvements are known as High Speed Uplink Packet Access (HSUPA)
or Enhanced Uplink
1
.
The rst release of HSDPA standard was available in 3GPP Rel-5. HSUPA was standard-
ized in 3GPP Rel-6. Once again, the design targets are very similar to HSDPA. But in
Uplink, there are some additional requirements which need to be met. These requirements
are discussed in 3GPP 25.319. Some of those points are mentioned below.
8.1 Requirements
The uplink coverage for R99 DCH channel is generally very limited. Therefore, the
end user experience in wide area cells is not very good.
1
Enhanced Uplink (EUL) is the ocial name chosen by 3GPP but due to popularity of HSDPA,
the term HSUPA is also very widely used.
245
246 CHAPTER 8. HIGH SPEED UPLINK PACKET ACCESS
The Enhanced Uplink feature is targeted at providing a signicant improvements in
terms of user experience (throughput and delay) and/or capacity. The coverage is
one of the aspects which aect the user experience. For an operator, it is desirable
to have good coverage to provide consistency of performance across the whole cell
area. Therefore, it is expected that HSUPA should serve a wider cell area. Hence,
coverage will be one of the main design criterion while development. In contrast to
this, in HSDPA, the focus was on DL throughput.
HSUPA should be designed to serve urban, sub-urban and rural deployment scenar-
ios.
HSUPA should support full mobility. Undoubtedly, the system is best optimized for
stationary users but it should perform well for fast-moving users as well.
HSUPA should be designed with least complexity so that the user equipments (UE)
& network elements cost is not very high. In R99 specication, there were a lot
of features that are practically not used anywhere. In HSUPA development, such
features should be avoided so that the time-to-market can be reduced.
It is required that HSUPA should provide improved QoS compared to R99 UL ded-
icated channels. The main focus should be on the services of streaming, interactive
and background trac classes.
There is always a trade-o between performance improvement & complexity
of upgrades. HSDPA introduced a lot of changes in hardware and protocol archi-
tecture. It is desirable that changes caused by HSUPA should be as little as possible.
According to 3GPP TS 25.319: New techniques or group of techniques shall there-
fore provide signicant incremental gain for an acceptable complexity.
The improvements should be designed in such a away that HSUPA can be introduced
to a network which has UEs of dierent radio capabilities, i.e., R6 UEs and the UEs
from R99, R4 and R5.
A terminal supporting the Enhanced Uplink feature must support HSDPA. There-
fore, the term HSPA can be used to describe the combination of HSDPA and
HSUPA. In our further discussions, we will use HSPA as a synonym for HSUPA.
From the end-user point of view, HSUPA is an enhancement to Rel-99 UTRAN which
allows him to achieve higher Uplink peak bit rates in a wider service area compared to
classical R99 solution for Uplink data transmission. This is an important upgrade because
the UL bit rates of R99 DCH are very low when the UE is at cell-edge.
8.2. COMPARISON WITH HSDPA 247
8.2 Comparison with HSDPA
As the names indicate, HSDPA and HSUPA sound very similar. Therefore, we commonly
assume that HSUPA is nothing but HSDPA for Uplink. This is not exactly true. To
investigate this issue further, lets discuss the commonalities and dierences between the
two technologies.
8.2.1 Commonalities with HSDPA
Node B based scheduling: The transport channels used to carry the user data in R99
UMTS are RACH (), FACH () & DCH (). All of these channels are scheduled
by RNCs packet scheduler. This concept was explained in HSDPA module.
HSDPA transport channel HS-DSCH and HSUPA transport channel E-DCH are
both scheduled by Node B based packet scheduler.
Fast L1 H-ARQ: In HSUPA, the data transmitted via E-DCH transport channel re-
quired immediate acknowledgements from Node B. This concept was introduced
in HSDPA where the role of transmitter is played by Node B and UE sends the
acknowledgment.
Multicode Operation: The peak UE bit rates in HSDPA are achieved by sending data
to a user on multiple SF16 codes. Similarly, in HSUPA, UE can send uplink data
on either 1, 2 or 4 channelization codes.
Link Adaptation: Based on the UE radio conditions, data volume and many other
conditions, UE resource allocation can be modied. This concept is common in
HSDPA and HSUPA.
Rel-5 HSDPA devices support QPSK & 16QAM modulation
2
. Therefore, link
adaptation happens by adaptive modulation and coding (AMC).
Rel-6 HSUPA devices support only BPSK modulation. Therefore, the link
adaptation happens mainly by adaptive coding (AC) only.
Shorter TTI: The Rel-99 transport channel DCH supports the TTI length of 10, 20, 40
or 80 ms. HSDPA utilizes a signicantly shorter TTI of 2 ms. In HSUPA:
10 ms TTI is a mandatory for every network and the UE. This is to ensure
that UE will be able to use HSUPA when it nds itself in a poor coverage area.
2 ms TTI is optional. 2 ms will allow the user to achieve higher peak bit rates
and lower latency, but 2ms TTI can be used only if the UE is in good radio
conditions.
2
Except special category 11 & 12 UEs
248 CHAPTER 8. HIGH SPEED UPLINK PACKET ACCESS
8.2.2 Dierences from HSDPA
Power Control: In HSDPA, all 3 slots in a subframe are transmitted at a constant
power. In other words, there is no fast inner loop PC for HSDPA. But in HSUPA,
the power control is very crucial for minimizing the near-far eect.
In HSDPA, there is a central transmitter in Node B whereas in HSUPA, the trans-
mitters are distributed across the whole cell coverage area. Therefore, management
of interference requires more signalling in HSUPA.
Soft Handover: HSDPA performs a (hard) Serving Cell Change whereas, in HSUPA the
E-DCH channel can be in soft-handover with up to 3 Cells.
Variable Spreading factor: In HSDPA, the SF = 16, which is xed. But in HSUPA,
UE gets a resource grant from Node B and decides which SF to use. It is allowed to
use eight possible spreading factors (SF 256, 128, ..., 2). This is shown in table 8.4.
Overall Procedure: In HSDPA, the scheduler resides in Node B and data is also buered
at Node B & RNC side. Therefore, Node B can very well decide how much bitrate
will satisfy the need of the user. On the contrary, in uplink, the scheduler needs to
know the status of the UE buer. There has to be some periodic reporting of the
buer status.
In HSUPA, we have some kind of
Request Grant Data Transmission Acknowledgement
mechanism. Whereas,
In HSDPA, we have
Notication to UE Data Transmission Acknowledgement
type of mechanism.
8.3 HSUPA User Plane Protocols
A detailed description of PDCP, RLC and MAC-d protocols is available in chapter 6.
HSUPA related MAC protocols are MAC-e and MAC-es, which are explained later in this
chapter.
In this section, we will examine the HSUPA transmission only in an overview manner.
1. On UE Side PDCP layer compresses the headers belonging to higher layers e.g.,
TCP/IP or RTP/UDP/IP.
RLC layer performs segmentation on the big data block received from PDCP
layer. The size of RLC PDU is explicitly signalled to the user via RRC sig-
nalling
3
. RLC also performs ciphering. If the Acknowledged Mode (AM) of
RLC is congured, then RLC layer keeps track of L2 retransmissions.
3
in RB setup or RB Reconguration message.
8.3. HSUPA USER PLANE PROTOCOLS 249
Figure 8.1: HSUPA User Plane Protocols
MAC-d layer in UE generates the MAC-d ows. MAC-d layer is transparent
in HSUPA. Therefore, the MAC-d PDU is exactly the same as RLC PDU.
MAC-es layers combines MAC-d PDUs of the same logical channel and same
size into one MAC-es PDU. MAC-es layer adds a Transmission Sequence Num-
ber which will help the RNC to re-order the correctly received MAC-es PDUs.
MAC-e layer in UE, combines several MAC-es PDUs and form a MAC-e PDU.
Physical layer in UE carries on L1 processing and transmits the data on
WCDMA air interface.
2. On Node B Side Node Bs Physical layer receives the data coming from UEs
physical layer.
MAC-e layer in Node B checks for L1 H-ARQ and decides whether an Ack or
Nack has to be sent.
MAC-e layer demultiplexes the MAC-e PDU and extracts the MAC-es PDUs
which are sent towards RNC.
3. On RNC Side By looking into the transmission sequence number (TSN), MAC-
es layer of RNC re-orders the correctly received MAC-es PDUs. It demulti-
plexes the MAC-es PDUs to extract the MAC-d pdus. In HSUPA, UE can
be in soft handover with more than one cell. Therefore, MAC-es layer also
performs Macro Diversity Combining (MDC) to achieve the link diversity.
Finally, the correctly received MAC-d PDUs are forwarded to the MAC-d layer.
RLC layer in RNC checks whether a L2 Ack or Nack has to be sent to the UE.
On RNC side, the RLC layer performs reassembly of several RLC blocks and
constructs a big data block to be delivered to the PDCP layer.
250 CHAPTER 8. HIGH SPEED UPLINK PACKET ACCESS
PDCP layer in RNC performs header decompression and restores the original
header of higher layer application.
Summary of HSUPA Operation (according to TS 25.401):
The E-DCH MAC (MAC-e/MAC-es) entity in the UE trans-
fers MAC-e PDUs to the peer MAC-e entity in the Node B and
MAC-es PDUs to the peer MAC-es entity in the RNC using the
services of the Physical Layer.
8.4 HSUPA Conguration Options
At rst sight, one can guess that E-DCH transport channel is mainly designed for carrying
uplink user data (Logical channel DTCH). Similarly HS-DSCH transport channel is mainly
designed to transmit downlink user data.
But if we carefully examine options available for mapping the Signalling Radio Bearers
(SRB) on transport channels, operators have two choices. This section investigates both
options. The general channel structure of UMTS was discussed in chapter 4.
Figure 8.2: HSUPA Control Plane Protocols - SRB on DCH
Option 1: SRB on DCH: In this conguration, HS-DSCH channel and E-DCH chan-
nel is used to carry the DTCH logical channel whereas the logical channel DCCH
or RRC signalling
4
is still sent via UL & DL DCH channels. Obviously this option
is not the best option because it includes a lot of DCH overhead channels. The
control plane protocol stack for this option is exactly the same as Rel-99 control
plane protocol stack as shown in gure 8.2.
SRB on DCH option does not reduce the control plane latency.
4
also known as Signalling Radio Bearer SRB or L3 Signalling
8.5. E-DCH UE CATEGORIES AND BIT RATES 251
Figure 8.3: HSUPA Control Plane Protocols - SRB on HSPA
Option 2: SRB on HSPA: Alternatively, HS-DSCH and E-DCH channels can be con-
gured to send both User data DTCH and DCCH. This option is commonly known
as SRB on HSPA. The control plane protocol stack for this conguration is illus-
trated in gure 8.3.
This option signicantly reduces the amount of DCH overhead channels and control
plane latency.
SRB on HSPA is a pre-requisite for some other smart features, for example, Fractional-
DPCH (F-DPCH).
8.5 E-DCH UE Categories and Bit Rates
Source: 3GPP TS 25.306 ; UE Radio Access capabilities
In HSDPA, we have learnt about a variety of UE categories. Up to Release 9, there
are 28 HS-DSCH UE categories dened for HSDPA operation. Similarly, there exist
some standard UE categories for HSUPA operation too. In order to follow the HSUPA
development in chronological order, the E-DCH UE categories are illustrated in three
dierent tables.
Rel. 6: Category 1, 2, 3, 4, 5 & 6 are introduced.
Rel. 7: Category 7 UE has been added to the list of UE categories. Main enhance-
ment is 4-PAM modulation on E-DPDCH channel (which is quite often referred to
as 16-QAM).
252 CHAPTER 8. HIGH SPEED UPLINK PACKET ACCESS
Rel. 8: No new Category dened in Rel-8.
Rel. 9: Category 8 & 9 Categories have been added which support Dual Cell-HSUPA
(or DC-HSUPA) operation.
E-DCH
Category
Max
no. of
E-DCH
Codes
Min.
SF
Supported
TTI
Max. TB
Size [bits]
in 10 ms
TTI
Max. TB
Size [bits]
in 2 ms
TTI
Modul.
Cat. 1 1 SF4 10 ms only 7110 - BPSK
Cat. 2 2 SF4 10 ms & 2 ms 14484 2798 BPSK
Cat. 3 2 SF4 10 ms only 14484 - BPSK
Cat. 4 2 SF2 10 ms & 2 ms 20000 5772 BPSK
Cat. 5 2 SF2 10 ms only 20000 - BPSK
Cat. 6 4 SF2 10 ms & 2 ms 20000 11484 BPSK
Table 8.1: E-DCH UE Categories introduced in 3GPP Rel. 6 (25.306)
E-DCH
Category
Max
no. of
E-DCH
Codes
Min.
SF
Supported
TTI
Max. TB
Size [bits]
in 10 ms
TTI
Max. TB
Size [bits]
in 2 ms
TTI
Modul.
Cat. 7 4 SF2 10 ms & 2 ms 20000 22996 4-PAM
Table 8.2: Additional E-DCH UE Categories in 3GPP Rel. 7 (25.306)
E-DCH
Category
Max
no. of
E-DCH
Codes
Min.
SF
Supported
TTI
Max. TB
Size [bits]
in 10 ms
TTI
Max. TB
Size [bits]
in 2 ms
TTI
Modul.
Cat. 8 4 SF2 10 ms & 2 ms 20000 11484 BPSK
Cat. 9 4 SF2 10 ms & 2 ms 20000 22996 4-PAM
Table 8.3: Additional E-DCH UE Categories in 3GPP Rel. 9 (25.306)
After observing the tables 8.1, 8.2 & 8.3, we can make some remarks about the various
UEs of dierent categories.
1. Multi-code Support: Some UEs do not support multi-code operation on E-DPDCH
(for example Cat. 1 UE), some support upto 2 codes (for example Cat. 2, 3, 4, &
5) while some UEs support upto 4 code transmission (for example UE cat. 6, 7, 8
& 9).
8.6. STARTING OF HSUPA OPERATION 253
2. Min. SF: SF2 was introduced in 3GPP REL-6 for E-DPDCH channel. But all the
UEs cannot use SF2. This aspect of their radio access capabilitis is shown in the
column Min. SF in the UE categories tables.
3. TTI Support: Both 2 ms and 10 ms TTI have their own advantages and disadvan-
tages. 10 ms TTI is a mandatory feature which is supported by all UEs but 2 ms
TTI operation is possible only for UE cat. 2, 4, 6, 7, 8 & 9.
4. Modulation: Cat. 1 to 6 and cat. 8 can transmit data using BPSK modulation (one
bit per symbol) only whereas the UE category 7 & 9 can also use 4PAM; modulation
(2 bits per symbol).
5. DC-HSUPA: Only Rel. 9 categories UEs, i.e. Category 8 & 9 UEs, can support
DC-HSUPA operation.
8.6 Starting of HSUPA Operation
As discussed in the chapter 5 about the Radio Resource Management, we saw that RNCs
PS is responsible for deciding the transport channel type selection. This procedure can
yield 4 possible outcomes:
1. RACH & FACH
2. DCH & DCH
3. DCH & HS-DSCH
4. E-DCH & HS-DSCH
As shown in gure 8.4, every HSUPA device starts the signalling procedure as if it were
a simple R99 UE. After performing GPRS ATTACH, the serving SGSN, UE acquires a
P-TMSI and knows about the Routing area ID of the cell. As a result of GPRS attach,
there is a MM context stored in UE and SGSN. Later, UE establishes a PDP context and
tries to acquire an IP address and negotiate the QoS.
Later on, when UE feels the need of UL resources, it sends an UL capacity request to
the RNC. RNC performs the channel type selection and decides one of the options listed
above. Up to this point in signalling, a 3G R99 UE and HSUPA UE behave almost the
same.
In case, RNC chooses to use E-DCH in UL, the use of HS-DSCH becomes mandatary.
If HS-DSCH resources are also available, RNC sends the information regarding the cell
specic HSDPA and HSUPA details to user in a L3 RRC message Radio Bearer Recon-
guration.
254 CHAPTER 8. HIGH SPEED UPLINK PACKET ACCESS
Figure 8.4: Signalling to initiate an HSUPA session
8.7 HSUPA Protocol Architecture
Source: 3GPP TS 25.321; Medium Access Control (MAC) Protocol Speci-
cation
Earlier in section 8.3, the user plane protocol architecture of HSUPA & data-ow was
described but the details about MAC-e and MAC-es were not discussed. In the same sec-
tion, gure 8.1 described the overall functionality of HSUPA using the user plane protocol
stack. In the following section, we will investigate the MAC layer of HSUPA in depth.
On UTRAN side, for each UE that uses E-DCH, one MAC-e entity per Node-B and one
MAC-es entity in the SRNC are congured. Whereas on UE side, both MAC-e & MAC-es
are congured in the user equipment.
MAC-e/es entity - UE Side
Figure 8.5 is copied from Figure 4.2.3.4.1a: UE side MAC architecture / MAC-e/es details
(FDD) of 3GPP TS 25.321. The MAC-es/e handles the E-DCH specic functions. The
split between MAC-e and MAC-es in the UE is not detailed. In the model below, the
8.7. HSUPA PROTOCOL ARCHITECTURE 255
Figure 8.5: UE side MAC-e/es details (25.321)
MAC-e/es comprises the following entities:
1. H-ARQ: The HARQ entity is responsible for handling the MAC functions relat-
ing to the HARQ protocol. It is responsible for storing MAC-e payloads and
re-transmitting them. The detailed conguration of the hybrid ARQ protocol is
provided by RRC over the MAC-Control SAP. The HARQ entity provides the E-
TFC, the retransmission sequence number (RSN), and the power oset to be used
by L1. Redundancy version (RV) of the HARQ transmission is derived by L1 from
RSN, CFN and in case of 2 ms TTI from the sub-frame number. RRC signalling
can also congure the HARQ entity to use RV=0 for every transmission.
2. Multiplexing and TSN setting: Figure 8.6 illustrates multiplexing of multiple MAC-
d PDUs into MAC-es PDU. After this, MAC-e layer further multiplexes several
MAC-es PDUs into MAC-e PDUs, as shown by gure 8.7. PDU sizes directly aect
the user bit rate. Therefore, these decisions are done by E-TFC selection function.
UE also sets the TSN while concatenating multiple MAC-d PDUs into MAC-es
PDUs.
3. E-TFC selection: This entity is responsible for E-TFC selection according to the
scheduling information, Relative Grants and Absolute Grants, received from UTRAN
256 CHAPTER 8. HIGH SPEED UPLINK PACKET ACCESS
via L1 and Serving Grant value signalled through RRC, and for arbitration among
the dierent ows mapped on the E-DCH. The detailed conguration of the E-
TFC entity is provided by RRC over the MAC-Control SAP. The E-TFC selection
function controls the multiplexing function.
Figure 8.6: MAC-es PDU
Figure 8.7: MAC-e PDU
As shown in gure 8.1, MAC-es sits on top of MAC-e and receives PDUs directly from
MAC-d. Figure 8.6 illustrates that MAC-es SDUs (i.e. MAC-d PDUs) of the same size,
coming from a particular logical channel are multiplexed together into a single MAC-es
8.7. HSUPA PROTOCOL ARCHITECTURE 257
payload. There is one and only one MAC-es PDU per logical channel per TTI (since only
one MAC-d PDU size is allowed per logical channel per TTI). To this payload is prepended
the MAC-es header.
The number of PDUs, as well as the one DDI value identifying the logical channel,
the MAC-d ow and the MAC-es SDU size are included as part of the MAC-e
header. In case sucient space is left in the E-DCH transport block or if Scheduling
Information needs to be transmitted, an SI will be included at the end of the MAC-e
PDU. Multiple MAC-es PDUs from multiple logical channels, but only one MAC-e PDU
can be transmitted in a TTI.
In the example shown in gure 8.7, the eld DDI0 is referring to the specic DDI value
that indicates that there is an SI included in the MAC-e PDU. This header will not be
associated with a new MAC-es payload.
258 CHAPTER 8. HIGH SPEED UPLINK PACKET ACCESS
MAC-es entity - UTRAN Side
Figure 8.8: UTRAN side MAC-es details(25.321)
For each UE, there is one MAC-es entity in the SRNC. The MAC-es sublayer handles
E-DCH specic functionality,which is not covered in the MAC-e entity in Node B. The
MAC-es comprises the following entities:
1. Reordering Queue Distribution: The reordering queue distribution function routes
the MAC-es PDUs to the correct reordering buer based on the SRNC conguration.
8.7. HSUPA PROTOCOL ARCHITECTURE 259
2. Reordering: This function reorders received MAC-es PDUs according to the received
TSN and Node B tagging i.e. (CFN, subframe number). MAC-es PDUs with consec-
utive TSNs are delivered to the disassembly function upon reception. Mechanisms
for reordering MAC-es PDUs are left to the implementation. The number of re-
ordering entities is controlled by the SRNC. There is one Reordering Queue per
logical channel.
3. Macro diversity selection: The function is performed in the MAC-es, in case of soft
handover with multiple Node Bs (The soft combining for all the cells of a Node B
takes place in the Node B). This means that the reordering function receives MAC-es
PDUs from each Node B in the E-DCH active set. The exact implementation is not
specied. However, the model below is based on one Reordering Queue Distribution
entity receiving all the MAC-d ow from all the Node Bs, and one MAC-es entity
per UE.
4. Disassembly: The disassembly function is responsible for disassembly of MAC-es
PDUs. When a MAC-es PDU is disassembled the MAC-es header is removed, the
MAC-d PDUs are extracted and delivered to MAC-d.
MAC-e entity - UTRAN Side
There is one MAC-e entity in the Node B for each UE and one E-DCH scheduler function
in the Node B. The MAC-e and E-DCH scheduler handle HSUPA specic functions in the
Node B. In HSUPA, the MAC-e and E-DCH scheduler comprises the following entities:
1. E-DCH Scheduling: This function manages E-DCH cell resources between UEs.
Based on scheduling requests, Scheduling Grants are determined and transmitted.
The general principles of the E-DCH scheduling are described by 3GPP but the
actual implementation is not specied (i.e. depends on RRM strategy).
2. E-DCH Control: The E-DCH control entity is responsible for reception of scheduling
requests and transmission of Scheduling Grants.
3. De-multiplexing: This function provides de-multiplexing of MAC-e PDUs. MAC-es
PDUs are forwarded to the associated MAC-d ow.
4. HARQ: One HARQ entity is capable of supporting multiple instances (HARQ pro-
cesses) of stop and wait HARQ protocols. Each process is responsible for generating
ACKs or NACKs indicating delivery status of E-DCH transmissions. The HARQ
entity handles all tasks that are required for the HARQ protocol.
260 CHAPTER 8. HIGH SPEED UPLINK PACKET ACCESS
Figure 8.9: UTRAN side MAC-e details(25.321)
8.8 Channels and Physical Layer
In the previous section, we learnt about the L2 MAC sub-layer functionality for HSUPA
operation. Now we will take a closer look at L1 Physical layer and learn about the HSUPA
physical channels. All the channels related to HSUPA operation have a name which start
with E-.
One by one, we will discuss the following physical channels:
1. E-DPDCH
2. E-DPCCH
3. E-RGCH
4. E-HICH
5. E-AGCH
8.8. CHANNELS AND PHYSICAL LAYER 261
8.8.1 E-DPDCH
Figure 8.10: Subframe Structure of E-DPDCH and E-DPCCH Channels
The E-DPDCH is the principal channel which is used to carry the E-DCH transport
channel. There may be zero, one, 2 or 4 E-DPDCH on each radio link. The E-DPCCH
is a physical channel used to transmit control information associated with the E-DCH.
There is at most one E-DPCCH on each radio link.
Figure 8.10 shows the E-DPDCH and E-DPCCH (sub)frame structure. Each radio frame
is divided in 5 subframes, each of length 2 ms; the rst subframe starts at the start of
each radio frame and the 5th subframe ends at the end of each radio frame.
Just like Rel. 99 DPDCH channel, REL-6 E-DPDCH channel can also have variable
spreading factor. E-DPDCH support 8 dierent SF as shown in table 8.4 by row number
1 to 8. Various slot formats actually represent a combination of SF and Modulation.
An E-DPDCH may use BPSK (all UE categories) or 4PAM modulation symbols (Category
7 and 9 only). Table 8.1, 8.2 & 8.3 show various UE categories and their physical layer
capabilities.
In the basic form of HSUPA (3GPP release 6), there are 6 UE categories dened. As an
example, we try to calculate the peak L1 bitrate of category 6.
262 CHAPTER 8. HIGH SPEED UPLINK PACKET ACCESS
Slot format #i Channel Bit
Rate (kbps)
Channel Symbol
Rate (ksps)
SF Bits/ E-DPDCH
subframe
0 (BPSK) 15 15 256 30
1 (BPSK) 30 30 128 60
2 (BPSK) 60 60 64 120
3 (BPSK) 120 120 32 240
4 (BPSK) 240 240 16 480
5 (BPSK) 480 480 8 960
6 (BPSK) 960 960 4 1920
7 (BPSK) 1920 1920 2 3840
8 (4PAM) 1920 960 4 3840
9 (4PAM) 3840 1920 2 7680
Table 8.4: E-DPDCH slot formats (from TS 25.211)
E-DPDCH Code # 1 : SF4 = 960 ksps
+ E-DPDCH Code # 2 : SF4 = 960 ksps
+ E-DPDCH Code # 3 : SF2 = 1920 ksps
+ E-DPDCH Code # 4 : SF2 = 1920 ksps
= Sum of all 4 E-DPDCH Codes = 5760 ksps
or Cat. 6 UE supports only BPSK Modulation 5760 kbps
Hence, by sending Uplink data on 4 channelization codes ( 2SF2+2SF4 ), UE is able
to achieve a L1 bit rate of 5.76 Mbps. The knowledge of channel coding rate is needed to
nd out the L2 user bit rate. Same calculation can be done for UE of category 7, which
supports both BPSK and 4PAM modulation. 4PAM modulation uses 2 bits to generate
one modulation symbol. For 4-PAM case, 5760 ksps = 11200 kbps or 11.2 Mbps.
8.8.2 E-DPCCH
The E-DPCCH is a physical channel carrying control information for the E-DPDCH. The
E-DPCCH is sent with a power oset relative to the DPCCH. The power oset is signalled
by RRC. E-DPCCH has a xed spreading factor 256 which allows UE to send 15 kbps
control signalling. In a 2 ms subframe, UE can send maximum 30 bits on E-DPCCH. Out
of these 30 bits, only 10 carry useful information and the remaining 20 bits are used for
the reliability or channel coding. The details can be found in 3GPP TS 25.212.
8.8. CHANNELS AND PHYSICAL LAYER 263
For both 2 ms and 10 ms TTI, the information carried on the E-DPCCH consists of 10
bits in total.
E-TFCI, 7 bits: An E-DCH Transport Format Combination Indicator (E-TFCI) iden-
ties the transport block size on E-DCH (7 bits). SRNC signals which E-DCH
Transport Block Size table should be used by the UE
5
.
RSN, 2 bits: The Retransmission Sequence Number (RSN) is used to convey the uplink
HARQ transmission number. The combination of the RSN and the transmission
timing allows the receiver to determine the exact transmission number. The length
of the RSN eld is 2 bits. 2 bits of RSN are interpreted as:
00 Original Transmission
01 First Re-transmission
10 Second Re-transmission
11 Third or higher retransmission
Happy Bit, 1 bit: One bit of the E-DPCCH is used to indicate whether or not the UE
is satised (happy) with the current Serving Grant. This bit is always be present
during uplink transmission of E-DPCCH. According to section 11.8.1.5 of 25.321,
UE indicates that it is unhappy if the following criteria are met:
1. UE is transmitting as much scheduled data as allowed by the current Serving
Grant;
2. UE has enough power available to transmit at higher data rate;
3. Total buer status would require more than Happy Bit Delay Condition
ms to be transmitted with the current Serving Grant.
Happy Bit Delay Condition is an operator congurable parameter.
5
3GPP TS 25.321, annexure B shows all the tables for E-DCH FDD mode.
If the UE is congured with E-TFCI table 0 and 2ms TTI, use Annex B.1
If the UE is congured with E-TFCI table 1 and 2ms TTI, use Annex B.2
If the UE is congured with E-TFCI table 2 and 2ms TTI, use Annex B.2a
If the UE is congured with E-TFCI table 3 and 2ms TTI, use Annex B.2b
If the UE is congured with E-TFCI table 0 and 10ms TTI, use Annex B.3
If the UE is congured with E-TFCI table 1 and 10ms TTI, use Annex B.4
264 CHAPTER 8. HIGH SPEED UPLINK PACKET ACCESS
Slot format #i Channel Bit
Rate (kbps)
Channel Symbol
Rate (ksps)
SF Bits/ E-DPDCH
subframe
0 (BPSK ) 15 15 256 30
Table 8.5: E-DPCCH slot formats (from TS 25.211)
8.8.3 E-AGCH
The E-DCH Absolute Grant Channel (E-AGCH) is a downlink physical channel with xed
spreading factor (SF=256). In other words, the E-AGCH has a bit rate 30 kbps. In a
subframe of 2 ms, Node B can send 60 bits. E-AGCH transmission is:
Over one sub-frame if E-DCH TTI is set to 2ms.
Over one frame if E-DCH TTI is set to 10ms.
The sequence of 60 bits are mapped to the corresponding E-AGCH sub-frame. If the E-
DCH TTI is equal to 10 ms, the same sequence of bits is transmitted in all the E-AGCH
sub-frames of the E-AGCH radio frame. In other words, the same 2 ms sub-frame of
E-AGCH is re-transmitted four times (sent total 5 times).
E-AGCH channel is used to carry the uplink E-DCH Absolute Grant. Figure 8.11 illus-
trates the frame and sub-frame structure of the E-AGCH.
Figure 8.11: Subframe Structure of E-AGCH
The absolute grant channel carries six bits which are concatenated with 16 bit CRC. The
user identity E-RNTI is masked on the CRC. After channel coding, E-AGCH becomes 90
bits long. A Rate Matching procedure is used to select selected 60 bits and those bits are
transmitted in E-AGCH sub-frame. The six data bits of E-AGCH channel are:
8.8. CHANNELS AND PHYSICAL LAYER 265
Index Absolute Grant Value
31 (168/15)
2
6
30 (150/15)
2
6
29 (168/15)
2
4
28 (150/15)
2
4
27 (134/15)
2
4
26 (119/15)
2
4
25 (150/15)
2
2
24 (95/15)
2
4
23 (168/15)
2
22 (150/15)
2
21 (134/15)
2
20 (119/15)
2
19 (106/15)
2
.
.
.
.
.
.
11 (42/15)
2
10 (38/15)
2
9 (34/15)
2
8 (30/15)
2
7 (27/15)
2
6 (24/15)
2
5 (19/15)
2
4 (15/15)
2
3 (11/15)
2
2 (7/15)
2
1 ZERO GRANT
0 INACTIVE
Table 8.6: Mapping of Absolute Grant Value (from 3GPP TS 25.321)
Absolute Grant Value, 5 bits: This eld indicates the maximum E-DCH trac to pi-
lot ratio (E-DPDCH/DPCCH) that the UE is allowed to use in the next transmis-
sion. The length of the Absolute Grant Value eld is 5 bits.
Absolute Grant =
P
tx,E-DPDCH
P
tx,DPCCH
Absolute Grant Scope, 1 bit: This eld indicates the applicability of the Absolute
Grant. It can take two dierent values, Per HARQ process or All HARQ pro-
cesses, allowing to indicate whether the HARQ process activation/de-activation
266 CHAPTER 8. HIGH SPEED UPLINK PACKET ACCESS
will aect one or all processes. The Absolute Grant Scope is encoded in 1 bit.
When the E-DCH is congured with 10ms TTI, only the value All HARQ pro-
cesses is valid. In case, Identity Type is Secondary, only the value All HARQ
processes is valid.
8.8.4 E-RGCH
The E-DCH Relative Grant Channel (E-RGCH) is a downlink physical channel with xed
spreading factor (SF=128). Hence, this channel can carry information at 60 kbps. E-
RGCH carries dedicated uplink E-DCH relative grants. The word Relative means, in
comparison to the current grant used by UE. Figure 8.15 illustrates the structure of the
E-RGCH. A relative grant can have one of the following three values.
UP
DOWN
HOLD
E-RGCH channel can be transmitted either in 3, 12 or 15 consecutive slots and in each
slot a sequence of 40 ternary values is transmitted (Up, Down or Hold).
E-RGCH transmission on 3 slots: Used on an E-RGCH transmitted to UEs for which
the cell transmitting the E-RGCH is in the E-DCH serving radio link set
and for which the E-DCH TTI is 2 ms.
E-RGCH transmission on 12 slots: Used on an E-RGCH transmitted to UEs for which
the cell transmitting the E-RGCH is in the E-DCH serving radio link set
and for which the E-DCH TTI is 10 ms.
E-RGCH transmission on 15 slots: Used on an E-RGCH transmitted to UEs for which
the cell transmitting the E-RGCH is not in the E-DCH serving radio link set.
For non-serving E-DCH RLS, the duration of E-RGCH transmission is irrespective
of the E-DCH TTI.
The next section has been written with the help of 3GPP TS 25.321 as reference material.
For the following discussion, it is assumed that UEs E-DCH active set is more than one.
Hence, UE is in soft handover for E-DCH with two or more cells.
Serving Relative Grant: Transmitted in downlink on the E-RGCH from all cells in
the serving E-DCH RLS, the serving relative grant allows the Node B scheduler
to incrementally adjust the serving grant of UEs under its control. By denition,
there can only be one serving relative grant command received at any time. This
indication can take three dierent values, UP, DOWN or HOLD.
8.8. CHANNELS AND PHYSICAL LAYER 267
Non-serving Relative Grant: Transmitted in downlink on the E-RGCH from a non-
serving E-DCH RL, the non-serving relative grant allows neighboring Node Bs to
adjust the transmitted rate of UEs that are not under their control in order to avoid
overload situations. By denition, there could be multiple non-serving relative grant
commands received by MAC at any time. This indication can take two dierent
values, DOWN or HOLD.
Figure 8.12: Subframe Structure of E-RGCH & E-HICH
The sequence b
i,0
, b
i,1
. . . , b
i,39
is calculated as
[b
i,0
, b
i,1
. . . , b
i,39
] = a [40 bit long Signature Sequence], where:
a =

+1 if Relative Grant is UP,


0 if Relative Grant is HOLD,
1 if Relative Grant is DOWN.
The orthogonal signature sequences are dened by 3GPP TS 25.21. Figure 8.14 shows
a table with all of these 40 signature sequences which are numbered from C
SS,40,0
to
C
SS,40,39
. Each HSUPA user is assigned one signature sequence for E-HICH and another
sequence for E-RGCH. Hence, every user requires at least two signature sequences. This
is a nice trick which consumes only one channelization code for E-RGCH and E-HICH for
up to 20 HSUPA users. The principle of creating 40 dedicated channels using only one
channelization code is illustrated in gure 8.13.
In gure 8.13, UE1 has been assigned a signature sequence # 0 for E-RGCH and # 1 for
E-HICH. Similarly the other users are also assigned 2 signature sequences per UE.
If there are more than 20 HSUPA users in a cell, then additional channelization codes
must be allocated for additional E-RGCH and E-HICH channels.
268 CHAPTER 8. HIGH SPEED UPLINK PACKET ACCESS
Figure 8.13: Signature Multiplexing Scheme for E-RGCH and E-HICH
Which Grant to be Respected: AGCH or RGCH?
According to 3GPP TS 25.321, UEs congured with an E-DCH transport channel shall
maintain a Serving Grant and the list of active HARQ processes based on the absolute
and relative grant commands decoded on the congured E-AGCH and E-RGCH(s). The
UE will only act on a relative grant command if all of the following are true:
The current serving grant is not set to ZERO GRANT.
The UE has not received a new absolute grant within 1 HARQ Round Trip Time
(40 ms for 10 ms TTI, 16 ms for 2 ms TTI).
The UE was expecting to receive an ack/nack on the E-HICH at the same time
as the network sent the E-RGCH command (an ack/nack sent for a E-DPDCH
transmission that just contained MAC-e Scheduling Information alone does not meet
this criteria).
Now the question is:
If Serving Relative Grant is UP, how much should the SG be increased?
Similarly, if serving Relative Grant is down, how much should the SG be
decreased?
According to TS 25.321, the answer to this question can be found by using two param-
eters: 3-index-step threshold and 2-index-step threshold that are congured
by higher layers.
8.8. CHANNELS AND PHYSICAL LAYER 269
Figure 8.14: E-RGCH and E-HICH signature sequences (from TS 25.211)
If the UE received a Serving Relative Grant UP: UE determine the Serving Grant
as follows:
if SG < 3-index-step threshold: Serving Grant (SG) = [MIN(SG + 3, 37)].
if 3-index-step threshold <= SG < 2-index-step threshold: Serving Grant
(SG) = [MIN(SG + 2, 37)].
if SG <= 2-index-step threshold: Serving Grant (SG) = [MIN(SG + 1, 37)].
If the UE received a Serving Relative Grant DOWN: UE determine the Serv-
ing Grant as follows:
Serving Grant (SG) = [MAX(SG -1, 0)]
270 CHAPTER 8. HIGH SPEED UPLINK PACKET ACCESS
Index Scheduled Grant
37 (168/15)
2
6
36 (150/15)
2
6
35 (168/15)
2
4
34 (150/15)
2
4
33 (134/15)
2
4
32 (119/15)
2
4
31 (150/15)
2
2
30 (95/15)
2
4
29 (168/15)
2
28 (150/15)
2
27 (134/15)
2
26 (119/15)
2
25 (106/15)
2
.
.
.
.
.
.
11 (21/15)
2
10 (19/15)
2
9 (17/15)
2
8 (15/15)
2
7 (13/15)
2
6 (12/15)
2
5 (11/15)
2
4 (9/15)
2
3 (8/15)
2
2 (7/15)
2
1 (6/15)
2
0 (5/15)
2
Table 8.7: Scheduling Grant Table (from 3GPP TS 25.321)
8.8.5 E-HICH
The E-DCH Hybrid ARQ Indicator Channel (E-HICH) is a xed rate (SF=128) dedicated
downlink physical channel carrying the uplink E-DCH hybrid ARQ acknowledgement in-
dicator. Figure 8.15 illustrates the structure of the E-HICH. A hybrid-ARQ acknowledge-
ment indicator is transmitted using 3 or 12 consecutive slots and in each slot, a sequence
of 40 binary values is transmitted. The 3 and 12 slot duration shall be used for UEs whose
E-DCH TTI is set to 2 ms and 10 ms respectively.
3GPP TS 25.212 shows the mapping for E-HICH ACK/NACK. The same concept is briey
8.8. CHANNELS AND PHYSICAL LAYER 271
Figure 8.15: Subframe Structure of E-RGCH & E-HICH
mentioned below.
In a radio link set containing the serving E-DCH radio link set, the hybrid-ARQ
acknowledgement indicator a is set to:
+1: If Node B wants to send a positive Acknowledgement
-1: If Node B wants to send a negative Acknowledgement
In a radio link set not containing the serving E-DCH radio link set, the hybrid
ARQ acknowledgement indicator a is set to:
+1: If Node B wants to send a positive Acknowledgement
0 or DTX: If Node B wants to send a Negative Acknowledgement
The sequence b
i,0
, b
i,1
. . . , b
i,39
is calculated as
[b
i,0
, b
i,1
. . . , b
i,39
] = a [40 bit long Signature Sequence], where :
a =

+1 if H-ARQ Indication is ACK,


0 if H-ARQ Indication is NACK & Cell is not in serving E-DCH radio link set]
1 if H-ARQ Indication is NACK & Cell is in in serving E-DCH radio link set.
272 CHAPTER 8. HIGH SPEED UPLINK PACKET ACCESS
8.8.6 F-DPCH
Although F-DPCH was described in HSDPA chapter, but it is not allowed
to use F-DPCH until the uplink is on E-DCH. HSDPA without HSUPA
conguration cannot use F-DPCH for the users.
The F-DPCH carries control information generated at layer 1 (TPC commands). It is a
special case of downlink DPCCH. Figure 8.16 shows the frame structure of the F-DPCH.
Each frame of length 10 ms is split into 15 slots, each of length T
slot
= 2560 chips,
corresponding to one power-control period.
Figure 8.16: Frame Structure of F-DPCH
The exact number of bits of the OFF periods and of the F-DPCH elds (N
TPC
) is described
in table 8.8. Each slot format corresponds to a dierent set of OFF periods within the
F-DPCH slot.
Slot format #i SF Bits/Slot N
OFF1
Bits/slot
N
TPC
Bits/slot
N
OFF2
Bits/slot
0 256 20 2 2 16
1 256 20 4 2 14
2 256 20 6 2 12
3 256 20 8 2 10
4 256 20 10 2 8
5 256 20 12 2 6
6 256 20 14 2 4
7 256 20 16 2 2
8 256 20 18 2 0
9 256 20 0 2 18
Table 8.8: F-DPCH Fields
8.9. SUMMARY: SERVING AND NON-SERVING RLS 273
8.9 Summary: Serving and Non-serving RLS
When I started learning HSUPA, it was fun to learn about the L1 and L2
modications. But I want to honestly admit that I had a very hard time in
getting comfortable with the words Serving E-DCH Radio Link Set and Non-
serving E-DCH Radio Link Set. Therefore, in this section, I have tried to
summarize those concepts which will help the readers to clear some doubts.
For more information, please refer to TS 25.319 and TS 25.321.
When a UE has an active HSUPA session, it is mandatory to have HSDPA congured
in downlink. HS-DSCH channel undergoes Hard serving cell change, whereas E-DCH
channel undergoes normal soft handover. Therefore, we need to dene a few new terms
which will help us in understanding HSUPA operation. In our discussion, we will take the
help of gure 8.17. In this gure, there are 3 cells which are named as A, B & C. The
UE shown in this gure happens to receive DL HS-DSCH from cell A only but its uplink
E-DCH is in soft handover with all the three cells shown in this gure.
Let us try to nd out the answers to following questions:
1. Which cell is E-DCH Serving Cell?
2. Which cell(s) form the E-DCH Active Set?
3. Which cell(s) belong to Serving E-DCH RLS?
4. Which cell(s) belong to Non-serving E-DCH RLS?
Serving E-DCH Cell: Serving E-DCH cell is the same cell as serving HS-DSCH cell.
HS-DSCH channel cannot be in soft handover. Because HS-DSCH has only one
cell delivering DL data, there is no confusion in deciding which cell is our E-DCH
serving cell.
In other words, E-DCH serving cell is the cell from which the UE receives Absolute
Grants. A UE has only one Serving E-DCH cell. In gure 8.17, cell A is our seving
E-DCH cell.
E-DCH Active Set Cells: This is a set of cells with which a UE has active E-DCH
connection. In gure 8.17, cell A, B & C are our E-DCH active set cells.
Serving RLS Cells: It was stated earlier,for each UE that uses E-DCH, we have one
MAC-e entity per Node-B. If cell A is our Serving E-DCH cell, then the main
MAC-e entity will be in the Node B which controls cell A. If the same Node B
also controls cell B, then the E-RGCH and E-HICH in these two cells will carry
the same information. There will be an additional MAC-e entity at the Node
B which controls cell C. This additional MAC-e entity does not have authority to
send E-AGCH or to send an UP command on E-RGCH. The information sent on
E-RGCH and E-HICH from these two MAC-e entities can be dierent or the same.
274 CHAPTER 8. HIGH SPEED UPLINK PACKET ACCESS
Figure 8.17: E-DCH Cell Status: Serving RLS and Non-serving RLS
Hence, the cells that belong to that Node B which controls the Serving E-DCH
cell, form Serving E-DCH RLS. The UE has only one Serving E-DCH RLS. In our
example of gure 8.17, cell A & B belong to Serving E-DCH RLS. The content
of E-RGCH and E-HICH in these cells can have the following values:
On E-RGCH UP, DOWN or HOLD
On E-HICH +1 for ACK and -1 for NACK
Non-serving RL: Cell which belongs to the E-DCH active set but does not belong to
the Serving E-DCH RLS and from which the UE can receive one Relative Grant.
The UE can have zero, one or several non-serving E-DCH RL(s). In gure 8.17, cell
C is in non-serving E-DCH RLS.
On E-RGCH DOWN or HOLD
On E-HICH +1 for ACK and DTX for NACK
8.9. SUMMARY: SERVING AND NON-SERVING RLS 275
The following are the main takeaways from this section:
Once again, please have a look at gure 8.17 and observe the E-AGCH, E-
RGCH & E-HICH behaviour.
E-AGCH comes only from Serving E-DCH Cell.
E-RGCH comes from all the Active Set Cells, but:
If Cell belongs to Serving E-DCH RLS, E-RGCH can have 3 values:
UP, DOWN & HOLD.
If Cell belongs to Non-Serving E-DCH RLS, E-RGCH can have 2
values: DOWN & HOLD.
E-HICH also comes from all the Active Set Cells. But:
If Cell belongs to Serving E-DCH RLS, E-HICH can have 2 values:
ACK (+1) & NACK (-1).
If Cell belongs to Non-Serving E-DCH RLS, E-RGCH can have 2
values: ACK (+1) & NACK (0).
276 CHAPTER 8. HIGH SPEED UPLINK PACKET ACCESS
8.10 E-TFC Selection Procedure
As we have learnt in the discussion so far, Node B only sends a grant value to UE and it
is UEs duty to select the transport block size, transport format combination and other
L1 parameters such as spreading factor, number of codes, coding rate, etc.
This whole procedure is explained in a chronological order in the next few pages. The
starting of HSUPA operation was explained in section 8.6. In short, when RNC decides
to allocate E-DCH transport channel to the UE in uplink, an initial serving grant is
assigned to it. This grant is generated by Node B but UE receives it from RNC using RRC
signalling. Once, HSUPA operation begins, UE and Node B can perform L1 signalling
without bothering RNC for each message transfer.
In HSUPA, UE and Node B are in constant touch and maintain a REQUEST-GRANT
mechanism. Let us begin by analyzing how UE requests uplink resources from Node B
and follow the steps after that. This description is broken down into 10 steps.
8.10.1 Step 1: UE sends Scheduling Requests to Node B
In order to start the whole HSUPA operation, UE has to send some feedback or request
towards Node B to indicate its desire to send uplink data and therefore, its wish to get
scheduled. This can be done via two methods: Happy Bit and Scheduling Info.
Figure 8.18: Scheduling Information format
1. Happy Bit, 1 bit: As explained in the section 8.8.2, Happy bit is a single bit infor-
mation sent on E-DPCCH which indicates whether the UE demands an upgrade in
the resource allocation or not.
2. Scheduling Info, 18 bits: The Scheduling Information is located at the end of the
MAC-e PDU and is used to provide the serving Node B with a better & more
detailed view of the amount of system resources needed by the UE and the amount
of resources it can actually make use of. The transmission of this information will be
initiated due to the quantization of the transport block sizes that can be supported.
Figure 8.18 is copied from 3GPP TS 25.321 which shows the information elds
included in Scheduling Information. These elds are briey explained below:
Highest priority Logical channel ID (HLID): The HLID eld identies unam-
biguously the highest priority logical channel with available data. If multiple
8.10. E-TFC SELECTION PROCEDURE 277
logical channels exist with the highest priority, the one corresponding to the
highest buer occupancy will be reported. The length of the HLID is 4 bits.
In case the TEBS is indicating index 0 (0 byte), the HLID shall indicate the
value 0000.
Total E-DCH Buer Status (TEBS): The TEBS eld identies the total amount
of data available across all logical channels for which reporting has been re-
quested by the RRC and indicates the amount of data in number of bytes
that is available for transmission and retransmission in the RLC layer. When
MAC is connected to an AM RLC entity, control PDUs to be transmitted and
RLC PDUs outside the RLC Tx window shall also be included in the TEBS.
RLC PDUs that have been transmitted but not negatively acknowledged by
the peer entity shall not be included in the TEBS. TEBS index is signalled to
the Node B which can be from 0 to 31. 0 indicated TEBS = 0 and 31 indicated
TEBS > 37642 Bytes.
Highest priority Logical channel Buer Status (HLBS): The HLBS eld in-
dicates the amount of data available from the logical channel identied by
HLID, relative to the highest value of the buer size range reported by TEBS
when the reported TEBS index is not 31, and relative to 50000 bytes when the
reported TEBS index is 31. The length of HLBS is 4 bits.
UE Power Headroom (UPH): The UPH eld indicates the ratio of the maxi-
mum UE transmission power and the corresponding DPCCH code power. The
length of UPH is 5 bits.
8.10.2 Step 2: Serving Grant Value
The UE must be able to receive Absolute Grants from the Serving E-DCH cell and Relative
Grants from the Serving E-DCH RLS. The UE shall handle the Grant from the Serving
E-DCH RLS and determine a Serving Grant.
Many times in this chapter, we have discussed grants. Let us summarize the concepts
about grant. We have seen three types of grants.
1. Absolute Grant: Absolute Grant is the value which is signalled to the user on the
E-AGCH channel. AG Value can be from 0 to 31
6
.
2. Relative Grant: Relative Grant can be either UP, DOWN or HOLD. This grant
is signalled to UE using E-RGCH channel. The word Relative in RGCH means
Relative to the current Serving Grant.
3. Serving Grant: The E-TFC selection function of MAC-e/es entity of UE is respon-
sible to nd out the Serving Grant value from:
6
Absolute Grant Value: INACTIVE (Index 0), ZERO GRANT (Index 1), & Index 2 , 3, . . . 31.
278 CHAPTER 8. HIGH SPEED UPLINK PACKET ACCESS
Relative Grants and Absolute Grants, received from UTRAN via L1.
Serving Grant value signalled through RRC.
UE maintains a Serving grant value which can be from 0 to 37. Serving Grant
7
values
were described in table 8.7.
8.10.3 Step 3: Find Power Oset
After calculating the Serving Grant (SG), UE reads the actual E-DPDCH to DPCCH
power oset from the Serving Grant table as shown in table 8.7. This is a straightforward
mechanism of reading look-up table. Therefore, it requires no further explanation.
8.10.4 Step 4: Reference E-TFCI & Power Oset Curve
At the time of HSUPA session setup, there is a lot of information exchanged from SRNC
to UE. In gure 8.19, this section of signalling is illustrated with the emphasis on the
information elements which are crucial for HSUPA operation. The detailed information
about each information of this RRC message is available in 3GPP TS 25.331. Among
other parameters, RNC indicates up to 8 pairs of Reference E-TFCI and Reference E-
TFCI-PO values. In gure 8.19, these values are highlighted by drawing an oval shape
around them. Using these set of paired-values, UE can plot a 2-dimensional curve, which
looks like the one shown in gure 8.20.
8.10.5 Step 5: Calculate E-TFCI Allowed by Grant Value
In step 3, UE calculated the power oset allowed by the serving grant. Now it has to map
the power oset on the x-axis of the curve made in step 4 and calculate the E-TFCI index
from the y-axis.
The numbers shown in gure 8.21 are just for explaining the principle. Their actual value
should not be considered for quantitative analysis. For the exact numbers, it is suggested
to refer to TS 25.211, TS 25.212 and TS 25.331.
8.10.6 Step 6: Calculate TB Size
In the RRC signalling shown in gure 8.19, SRNC informs the user about the TB Size
Table to be used while E-TFC selection procedure. All the tables are dened in the
annexure of 3GPP TS 25.321. Just for the illustration purpose, a section of Table B.3
from TS 25.321 is shown in Table 8.9. In 3GPP specications, this table is known as Table
0 for 10 ms TTI case.
7
Serving Grant Value: (5/15)
2
(Index 0), (6/15)
2
(Index 1), . . . , Index 37
8.10. E-TFC SELECTION PROCEDURE 279
Figure 8.19: RB Reconguration Message with emphasis on E-DCH info.
This step is also quite straight forward. Because once the E-TFCI index is known (from
step 5), in step 6, UE simply needs to look up the corresponding TB size in the relevant
TB size table.
8.10.7 Step 7: Select Channelization Code & L1 Parameters
This step is performed by UE based on some standard algorithms dened by 3GPP. In
Step 7, UE will determine following items.
SF,
280 CHAPTER 8. HIGH SPEED UPLINK PACKET ACCESS
Figure 8.20: Reference E-TFCI & Power Oset Curve
Modulation scheme (from R7 onwards),
and number of physical channels needed.
This step will not be explained in detail in this book. If you are interested in the details
of this procedure, please refer to section 4.8.4.1 of 3GPP TS 25.212.
8.10.8 Step 8: UL Transmission on E-DCH
Lets assume the number of physical channels needed = 4 from the calculation performed
in Step 7. It implies that there will be 4 E-DPDCH physical channels along with one
E-DPCCH. The scenario of uplink transmission will look like the one depicted in gure
8.22.
E-DPDCH: E-DPDCH is mainly designed for carrying user data but additionally we
can send SRB on this channel. In addition to that, periodically UE can send 18 bit
scheduling information. At the time when SI transmission is scheduled, then SI bits
will be attached to the MAC-e PDU, as shown in gure 8.7.
8.10. E-TFC SELECTION PROCEDURE 281
Figure 8.21: Calculating the E-TFCI from Power Oset
Figure 8.22: HSUPA transmission from UE
E-DPCCH: E-DPCCH is used to carry L1 control information related to HSUPA data
on E-DPDCH. One such information is the famous Happy Bit.
8.10.9 Step 9: Feedback from Node B on E-HICH
Node B checks whether the received MAC-e PDU has been received with acceptable qual-
ity. If yes, then Node B sends positive ACK to the UE using E-HICH channel and sends
282 CHAPTER 8. HIGH SPEED UPLINK PACKET ACCESS
E-TFCI TB Size(bits) E-TFCI TB Size(bits) E-TFCI TB Size(bits)
0 18 43 660 85 3634
1 120 44 687 86 3784
2 124 45 716 87 3941
3 130 46 745 88 4105
4 135 47 776 89 4275
5 141 48 809 90 4452
6 147 49 842 91 4636
7 153 50 877 92 4828
. . . . . . . . . . . . . . . . . .
38 539 80 2966 123 17001
39 561 81 3089 124 17706
40 584 82 3217 125 18440
41 608 83 3350 126 19204
42 634 84 3489 127 20000
Taken from Annex B.3 of 3GPP TS 25.321
E-DCH Transport Block Size Table 0 for 10ms TTI
Table 8.9: E-DCH TB Size Selection Table (example)
the Data block in a E-DCH Frame Protocol frame. If not, then Node B sends negative
acknowledgement to the UE using E-HICH channel.
8.10.10 Step 10: Feedback from Node B on E-RGCH
The scheduler at Node B takes various factors into account and decides whether an UP,
DOWN or HOLD command should sent to the user. Some of these factors are received
Happy Bits value, scheduling info (SI), current UL interference in the cell etc.
8.11. SUMMARY: HSUPA OPERATION IN SHORT 283
8.11 Summary: HSUPA Operation in Short
Figure 8.23: HSUPA operation explained using the physical channels.
Channel Direction Function SF Modulation
E-DPDCH Carries UL user data 256 to 2 BPSK & 4PAM
E-DPCCH Carries L1 Signalling 256 BPSK
E-RGCH Grant (Up, Down, Hold) 128 QPSK
E-HICH ACK or NACK 128 QPSK
E-AGCH Grant (Absolute value) 256 QPSK
Table 8.10: Summary of HSUPA channels
284 CHAPTER 8. HIGH SPEED UPLINK PACKET ACCESS
Copyright Notices
In order to create some gures, tables and text-sections, the following reference material
has been used. Information has been interpreted and presented in a simplied manner.
The original references are provided here.
Main reference material for this book has been technical specications (TSs) and technical
reports (TRs) of 3rd Generation Partnership Project (3GPP).
Text in section 8.1 on page 245 Section 5 of 3GPP TS 25.319 v 7.0.0.
Figure 8.1 on page 249 Figure 26 of 3GPP TS 25.401 v 7.0.0.
c 2006. 3GPP
TM
TSs and TRs are the property of ARIB, ATIS, ETSI, CCSA, TTA, and
TTC who jointly own the copyright for them. They are subject to further modications
and are therefore provided to you as is for information purposes only. Further use is
strictly prohibited.
8.11. SUMMARY: HSUPA OPERATION IN SHORT 285
Text in section 8.7 on page 254 Section 4.2.3.4 of 3GPP TS 25.321 v 7.7.0.
Figure 8.5 on page 255 Figure 4.2.3.4.1a of 3GPP TS 25.321 v 7.7.0.
Text in section 8.7 on page 258 Section 4.2.4.4 of 3GPP TS 25.321 v 7.7.0.
Figure 8.8 on page 258 Figure 4.2.4.4-1 of 3GPP TS 25.321 v 7.7.0.
Text about Relative Grant on
page 266
Section 9.2.5.2.1 of 3GPP TS 25.321 v 7.7.0.
Text about Interpretation of RG
value on page 268
Section 9.2.5.2.1 of 3GPP TS 25.321 v 7.7.0.
Text about Absolute Grant on
page 264
Section 9.2.5.2.2 of 3GPP TS 25.321 v 7.7.0.
Text about Scheduling Info on
page 276
Section 9.2.5.3.2 of 3GPP TS 25.321 v 7.7.0.
Text about Happy Bit setting on
page 263
Section 11.8.1.5 of 25.321 v 7.7.0.
Text in section 8.7 on page 259 Section 4.2.4.5 of 3GPP TS 25.321 v 7.7.0.
Figure 8.9 on page 260 Figure 4.2.4.5-1a of 3GPP TS 25.321 v 7.7.0.
Figure 8.6 on page 256 Figure 9.1.5.1 of 3GPP TS 25.321 v 7.7.0.
Figure 8.7 on page 256 Figure 9.1.5.2a of 3GPP TS 25.321 v 7.7.0.
Table 8.7 on page 270 Table 9.2.5.2.1.1 of 3GPP TS 25.321 v 7.7.0.
Table 8.9 on page 282 Table B.3 in Annex B of 3GPP TS 25.321 v
7.7.0
c 2008. 3GPP
TM
TSs and TRs are the property of ARIB, ATIS, ETSI, CCSA,
TTA, and TTC who jointly own the copyright for them. They are subject to
further modications and are therefore provided to you as is for information
purposes only. Further use is strictly prohibited.
Figure 8.10 on page 261 Figure 2B of 3GPP TS 25.211 v 9.1.0.
Figure 8.15 on page 271 Figure 12A of 3GPP TS 25.211 v 9.1.0.
Figure 8.16 on page 272 Figure 12B of 3GPP TS 25.211 v 9.1.0.
Table 8.8 on page 272 Table 16C of 3GPP TS 25.211 v 9.1.0.
Table 8.4 on page 262 Table 5B of 3GPP TS 25.211 v 9.1.0.
Table 8.5 on page 264 Table 5C of 3GPP 3GPP TS 25.211 v 9.1.0.
Figure 8.13 on page 268 Figure 16A of 3GPP TS 25.211 v 9.1.0
c 2009. 3GPP
TM
TSs and TRs are the property of ARIB, ATIS, ETSI, CCSA,
TTA, and TTC who jointly own the copyright for them. They are subject to
further modications and are therefore provided to you as is for information
purposes only. Further use is strictly prohibited.
286 CHAPTER 8. HIGH SPEED UPLINK PACKET ACCESS
Table 8.1 on page 252 Table 5.1g of 3GPP TS 25.306 v 9.1.0.
Table 8.2 on page 252 Table 5.1g of 3GPP TS 25.306 v 9.1.0.
Table 8.3 on page 252 Table 5.1g of 3GPP TS 25.306 v 9.1.0.
Table 8.6 on page 265 Table 16B of 3GPP TS 25.212 v 9.3.0.
c 2010. 3GPP
TM
TSs and TRs are the property of ARIB, ATIS, ETSI, CCSA,
TTA, and TTC who jointly own the copyright for them. They are subject to
further modications and are therefore provided to you as is for information
purposes only. Further use is strictly prohibited.
BIBLIOGRAPHY
[1] 3GPP TS 25.301 ver. 7.0.0 ;Radio Interface Protocol Architecture
[2] 3GPP TS 25.319 ver. 7.0.0 ;High Speed Uplink Packet Access (HSUPA); Overall
description
[3] 3GPP TS 25.306 ver. 9.0.0 ;UE Radio Access capabilities
[4] 3GPP TS 25.211 ver. 7.0.0 ;Physical channels and mapping of transport channels
onto physical channels (FDD)
[5] 3GPP TS 25.212 ver. 7.0.0 ;Multiplexing and Channel Coding (FDD)
[6] 3GPP TS 25.213 ver. 7.0.0 ;Spreading and Modulation (FDD)
[7] 3GPP TS 25.214 ver. 7.0.0 ;Physical Layer Procedures (FDD)
[8] 3GPP TS 25.321 ver. 7.0.0 ;MAC protocol specication
[9] 3GPP TS 25.331 ver. 7.0.0 ;Radio Resource Control (RRC) protocol specication
[10] 3GPP TS 25.401 Ver. 7.0.0 ;UTRAN overall description
[11] 3GPP TS 25.413 Ver. 7.0.0 ;UTRAN Iu Interface: RANAP Signalling
[12] 3GPP TS 25.433 Ver. 7.0.0 ;UTRAN Iub Interface: NBAP Signalling
[13] 3GPP TR 25.931 ver. 8.0.0 ;UTRAN functions, examples on signalling procedures
[14] H.Holma and A. Toskala, WCDMA for UMTS , 5th Edition, John Wiley & Sons.
[15] H.Holma and A. Toskala, HSDPA/HSUPA for UMTS , 1st Edition, John Wiley
& Sons.
[16] Chris Johnson, Radio Access Networks For UMTS ; Principles And Prac-
tice , John Wiley & Sons.
287
APPENDIX 8.1
Source:
3GPP TS 25.211: Physical channels and mapping of transport channels onto
physical channels (FDD).
3GPP TS 25.212: Multiplexing and channel coding (FDD).
3GPP TS 25.213: Spreading and modulation (FDD).
3GPP TS 25.214: Physical layer procedures (FDD).
3GPP TS 25.215: Physical layer - Measurements (FDD).
In this book, we have seen the physical channels of the three technologies: UMTS, HSDPA
& HSUPA. This appendix is written for advanced readers who might be interested in
knowing the exact channelization code that is used for a particular physical channel. For
some of the channels, there are xed code allocations; for some channels, there are standard
rules to decide the code and for some channels, RNC allocates the code when the need
arises.
8.12 UL Channelization Codes
In total, there are ve types of uplink physical channels. These are shown in gure 8.24.
The DPDCH, the DPCCH, the E-DPDCH, the E-DPCCH and the HS-DPCCH are I/Q
code-multiplexed, where I and Q denote real and imaginary parts, respectively. This gure
has been copied from 3GPP TS 25.213.
The coding takes place in 2 steps: channelization and scrambling.
288
8.12. UL CHANNELIZATION CODES 289
During the channelization coding process, data symbols on I- and Q-branches are indepen-
dently spread by OVSF
8
codes and during the scrambling operation, the resultant signals
on the I- and Q-branches are further multiplied by complex-valued Scrambling code. The
following section describes the codes used on each of these uplink channels.
Figure 8.24: Spreading for uplink dedicated channels (Source: 25.213)
1. Code Allocation for DPCCH: There can be only one DPCCH channel per UE
which is used for sending L1 control information from UE to Node B. According to
TS 25.213, the channelization code used for DPCCH is always cc = C
ch,256,0
.
2. Code Allocation for DPDCH: According to Rel-99 specications, it is possible to
have 1, 2, 3, 4, 5 or 6 DPDCH channels from one UE. It is also specied that if a
UE transmits more than one DPDCH, then the SF of all of these channels will be
SF=4. But from practical implementation viewpoint, this case is not so interesting.
In popular deployments around the world, we have maximum one DPDCH per UE.
DPDCH channel is a variable bit rate channel which can have seven possible spread-
ing factors; SF = 4, 8, 16, 32, 64, 128 or 256. The exact spreading code can be
found by C
CH,SF, SF/4
, where SF is the spreading factor.
Channelization Code for DPDCH
1
= C
CH,SF, SF/4
3. Code Allocation for HS-DPCCH: Since there is an HS-, in the name of this
channel, one can easily identify that this channel is related to HSDPA. The ocial
name of HS-DPCCH channel is uplink Dedicated Control Channel associated
8
Orthogonal Variable Spreading Factor
290 BIBLIOGRAPHY
with HS-DSCH transmission. I have often heard people calling it as High
Speed DPCCH or HSDPA Feedback channel. In fact, this channel is used to send
uplink feedback (CQI and Ack/Nack) for HSDPA transmission.
HS-DPCCH is always spread with SF = 256 and the exact code number is dependent
of Max Number of R99 DPDCH channels, which can be 1 to 6.
The HS-DPCCH shall be spread with code which is decided by the following rules:
Code for HS-DPCCH =

Cch,256,33 if N
Max, DPDCH
= 0,
Cch,256,64 if N
Max, DPDCH
= 1,
Cch,256,1 if N
Max, DPDCH
= 2, 4, 6
Cch,256,32 if N
Max, DPDCH
= 3, 5
These rules are described in the section 4.3.1.2.2 of 3GPP TS 25.213.
This section shows all the possible cases but only the rst two cases are
popularly used. N
Max, DPDCH
= 0 is possible if the L3 signalling (SRBs)
are mapped on HSPA.
HS-DPCCH shall be mapped to the I-branch in case N
Max, DPDCH
is 2, 4 or 6, and
to the Q-branch otherwise (N
Max, DPDCH
= 0, 1, 3 or 5).
4. Code Allocation for E-DPCCH: Now its turn of HSUPA related channels. Just
like R99 DPCCH, in HSUPA also, we have a E-DPCCH channel which carries L1
control information in uplink. This L1 signalling is related to the data transmission
in E-DPDCH.
E-DPCCH is a xed rate channel which always uses SF =256. According to 3GPP
TS 25.213, the DPCCH is always spread by code cc = C
ch,256,1
and always mapped
on the I-branch.
5. Code Allocation for E-DPDCH: The data channel which is used for carrying up-
link HSUPA data is called E-DPDCH. Just like Rel-99 DPDCH, E-DPDCH is also
a variable bit rate channel with two improvements:
1. Smallest SF of DPDCH is 4, whereas E-DPDCH can also use SF = 2.
2. The modulation used in Rel-99 DPDCH is always BPSK. In Rel-6, E-DPDCH
cannot use any higher order modulation. But from REL-7 onwards, E-DPDCH
is allowed to use both BPSK and 4PAM modulations.
Hence, E-DPDCH channel can have 8 possible spreading factors: SF = 2, 4, 8, 16,
32, 64, 128 or 256. In order to achieve multi-Mbps speeds, UE can combine several
codes and transmit them together in uplink. Once again, the channelization code(s)
used for E-DPDCH(s), depends on if N
Max, DPDCH
. Table 8.11 is taken from 3GPP
TS 25.213, where the rules for code allocation are described with full details.
8.13. DL CHANNELIZATION CODES 291
if N
Max, DPDCH
E-DPDCH
k
Channelization Code C
ed,k
0 E-DPDCH
1
C
ch, SF, SF/4
if SF 4
C
ch, 2, 1
if SF = 2
E-DPDCH
2
C
ch, 4, 1
if SF = 4
C
ch, 2, 1
if SF = 2
E-DPDCH
3
C
ch, 4, 1
E-DPDCH
4
1 E-DPDCH
1
C
ch, SF, SF/2
E-DPDCH
2
C
ch, 4, 2
if SF = 4
C
ch, 2, 1
if SF = 2
Table 8.11: Channelisation code for E-DPDCH
8.13 DL Channelization Codes
The channelization codes used on DL physical channels are the same codes as used in the
uplink namely Orthogonal Variable Spreading Factor (OVSF) codes that preserve the
orthogonality between downlink channels of dierent rates and spreading factors.
8.13.1 R99 DL Channels
1. & 2. Synchronization Channels: As an exception, P-SCH and S-SCH channels are
not spread using any channelization codes.
3. Primary-CPICH: The channelization code for the Primary-CPICH is xed to Cch,256,0
in all 3G networks around the world. Please refer to section 5.2.1 of 3GPP TS 25.213.
4. Primary-CCPCH: The channelization code for the Primary CCPCH is xed to
Cch,256,1. This rule is specied is also specied in section 5.2.1 of 3GPP TS 25.213.
Other R99 Common Channels: The channelization codes for all other physical chan-
nels are assigned by UTRAN.
5. PICH: SF of Paging Indicator Channel (PICH) is xed and equal to 256. The
exact code number is broadcasted to UEs via system information (BCH).
6. AICH: SF of Acquisition Indicator Channel (AICH) is also xed and equal to
256. Similar to PICH, the code number of AICH is also broadcasted via system
information (BCH).
7. S-CCPCH: Secondary Common Control Physical Channel (S-CCPCH) is used
to carry the FACH and PCH transport channels. The FACH and PCH can
be mapped to the same or to separate secondary-CCPCHs. Spreading fac-
tor of S-CCPCH can have 7 possible values; SF = 4, 8, 16, 32, 64, 128 or
292 BIBLIOGRAPHY
256. The spreading factor, code number and other details about S-CCPCH
conguration, are broadcasted using system information.
8. DL DPCH: Dedicated physical channel (DPCH) is the main data channel in R99
(UMTS). Its spreading factor can take one value from the 7 possible options; SF =
4, 8, 16, 32, 64, 128 or 256. RNC is responsible for performing the code allocation
on demand. RNC chooses the SF & Code Number based on required bit rate and
the code availability. UE gets the information about code allocation by explicit L3
(RRC layer) signalling. Some famous messages in this category are RRC Connection
Setup, Active Set Update, Radio Bearer Setup, Radio Bearer Reconguration,
etc.
8.13.2 HSDPA-related DL Channels
1. HS-SCCH: 3GPP has xed the spreading factor of HS-SCCH to 128. As mentioned
earlier in this book, there can be 1 or more HS-SCCH(s) per cell. Their conguration
& code number must be signalled to the user by RNC at the beginning of HSDPA
session using RRC signalling. For example, messages like Radio Bearer Setup,
Radio Bearer Reconguration, etc. are used to inform UE about the operator-
dened cell-specic details of HSDPA & HSUPA.
2. HS-PDSCH: For HS-PDSCH, the spreading factor is always 16. Since the name
itself says shared channel, there is no static allocation of these channels to a UE.
The Node Bs MAC-hs scheduler makes the decision about Code(s) allocation and
informs all the UEs in cell using HS-SCCH channel.
8.13.3 HSUPA Related DL Channels
1. & 2. E-HICH & E-RGCH: For E-HICH and for E-RGCH, the spreading factor is
always 128. The E-RGCH and E-HICH are sent on the same channelization code.
The exact code number must be signalled to the user by RNC at the beginning of
the HSUPA session.
3. E-AGCH: For E-AGCH, the spreading factor is 256. The exact code number must
be signalled to the user by RNC at the beginning of HSUPA session. If the cell
supports both 10ms and 2ms TTI on E-DCH transport channel, there must be two
separate E-AGCHs:
E-AGCH for 10 ms E-DCH TTI &
E-AGCH for 2 ms E-DCH TTI.
8.13. DL CHANNELIZATION CODES 293
Copyright Notices
In order to create some gures, tables and text-sections, the following reference material
has been used. Information has been interpreted and presented in a simplied manner.
The original references are provided here.
Main reference material for this book has been technical specications (TSs) and technical
reports (TRs) of 3rd Generation Partnership Project (3GPP).
Figure 8.24 on page 289 Figure 1 of 3GPP TS 25.213 v 8.4.0.
Table 8.11 on page 291 Table 1E of 3GPP TS 25.213 v 8.4.0.
Text about DPCCH/DPDCH
channelization codes on page 289
Section 4.3.1.2.1 of 3GPP TS 25.213 v 8.4.0.
Text about HS-DPDCH channel-
ization codes on page 289
Section 4.3.1.2.2 of 3GPP TS 25.213 v 8.4.0.
Text about E-DPCCH/E-
DPDCH channelization codes on
page 290
Section 4.3.1.2.3 of 3GPP TS 25.213 v 8.4.0.
Text about channelization codes
of R99 DL channels on page 291
Section 5.2.1 of 3GPP TS 25.213 v 8.4.0.
Text about channelization codes
of HSDPA DL channels on page
292
Section 5.2.1 of 3GPP TS 25.213 v 8.4.0.
Text about channelization codes
of HSUPA DL channels on page
292
Section 5.2.1 of 3GPP TS 25.213 v 8.4.0.
c 2009. 3GPP
TM
TSs and TRs are the property of ARIB, ATIS, ETSI, CCSA,
TTA, and TTC who jointly own the copyright for them. They are subject to
further modications and are therefore provided to you as is for information
purposes only. Further use is strictly prohibited.
BIBLIOGRAPHY
[1] 3GPP TS 25.211 ver. 6.0.0 ;Physical channels and mapping of transport channels
onto physical channels (FDD)
[2] 3GPP TS 25.212 ver. 6.0.0 ;Multiplexing and Channel Coding (FDD)
[3] 3GPP TS 25.213 ver. 6.0.0 ;Spreading and Modulation (FDD)
294
CHAPTER
9
SIGNALLING
Source:
3GPP TR 25.931 ver. 8.0.0 ;UTRAN functions, examples on signalling
procedures
H.Holma and A. Toskala, WCDMA for UMTS , 5th Edition, John Wiley
& Sons.
Chris Johnson, Radio Access Networks For UMTS; Principles And Practice ,
John Wiley & Sons.
This chapter is inspired from the book Radio Access Networks For UMTS;
Principles And Practice by Chris Johnson, where various signalling scenarios
are illustrated with the help of diagrams, signalling traces and elaborative text.
In Lets Learn 3G in 10 Days, the author has tried to explain the same
by skipping some details. The advanced readers should refer to the above
mentioned reference to get more details, which is an excellent source of 3G
fundamentals.
In order to establish any service, certain information much be exchanged between various
nodes in the network. For example, subscriber has to request for radio resources from
RNC and services from core network. To fully understand the functionality of UMTS and
HSPA, we should understand these signalling mechanisms.
295
296 CHAPTER 9. SIGNALLING
9.1 Building Blocks of 3G Signalling
Any signalling diagram of 3G is a combination of 2 or more building blocks that are
discussed below. In the following section, we will make ourselves familiar with these terms
which are very commonly used in 3G. These words have been used several times in this
book which proves their importance. We will dene 5 items here:
1. RRC Connection
2. Radio Bearer
3. Radio Access Bearer
4. Radio Link
5. Non-Access Stratum (NAS) Signalling Connection
9.1.1 RRC Connection
RRC connection is a dedicated connection between RRC peer entities on UE
and UTRAN side (in RNC). It is used to carry dedicated control channel
(logical channel DCCH) in both directions (i.e., UE to RNC, as well as RNC
to UE).
There are two kinds of RRC connections. One kind is related to service access, the other
kind is not related to service, such as related to location update, cell update, network
registration etc.
As we know, Radio Resource Control (RRC) is the name of control plane protocol
between UE and RNC. Therefore, an RRC Connection is a connection that carries control
signalling between these two entities. RRC connection is always point-to-point between
RRC entities on the UE and the RNC sides. It is always bi-directional in nature. UE has
at least zero and at most one RRC connection
1
.
When UE has zero RRC connections, it is said to be in RRC IDLE Mode.
In this state, RNC has no information about the subscriber.
When UE has one RRC connection, it is in RRC Connected Mode. In RRC
connected mode, UE can be in either CELL DCH, CELL FACH, CELL PCH or
URA PCH states.
1
Note: Even in soft-handover or Inter-RNC Soft-handover case, there is only one RRC connec-
tion.
9.1. BUILDING BLOCKS OF 3G SIGNALLING 297
Figure 9.1: RRC Connection Establishment & Idle to Connected Mode Transition
The transition from Idle to Connected mode takes place on RRC Connection Establish-
ment. Request to setup an RRC connection is always initiated by UE. RNCs admission
control has the authority to setup or reject the RRC connection request. The signalling
ow is illustrated in gure 9.1.
1. The UE initiates set-up of an RRC connection by sending RRC CONNECTION
REQUEST message on RACH.
2. Based on a look-up table which shows mapping between the establishment cause and
transport channel type (e.g., for voice calls: DCH/DCH and for SMS: RACH/FACH),
the SRNC decides to use either RACH/FACH or DCH/DCH for this RRC connec-
tion. Later, RNC checks for the availability of radio resources, hardware resources,
transmission resources and if all these checks are successful, RRC CONNECTION
SETUP message is sent on FACH.
3. UE sends RRC CONNECTION SETUP COMPLETE on a DCCH logical chan-
nel mapped on the DCH transport channel or RACH transport channel as
decided by RNC and indicated to UE by RRC CONNECTION SETUP message.
In this section, we are trying to dene RRC Connection as a signalling building block
only. A more detailed description of RRC Connection establishment is available in section
9.2.
298 CHAPTER 9. SIGNALLING
9.1.2 Radio Access Bearer (RAB)
According to 3GPP TR 21.905 which contains a vocabulary for 3GPP Speci-
cations, Radio Access Bearer (RAB) is a service provided by access stra-
tum to the non-access stratum for transfer of user data between User
Equipment (UE) and Core Network (CN).
In order to establish a RAB between UE and CN, we require
1. Radio Bearer (between UE and RNC), and
2. Iu Bearer (between RNC and CN)
As a rst step, we can consider RAB as the same as service. There are many types of
RABs, e.g., CS Voice RAB, CS Streaming RAB, CS Video RAB, PS Interactive RAB,
PS Background RAB, etc. In case of multiple services, we can dene a multi-RAB as a
combination of two or more RABs. A CS RAB is established between UE and MSC and
a PS RAB is between UE and SGSN. Radio Access Bearer is a logical connection between
UE and Core Network(MSC or SGSN). But in order to guarantee the QoS, RAB uses the
services of Radio Bearer and Iu Bearer.
Figure 9.2 illustrates the sequence of messages exchanged between UE, RNC and CN for
establishing a RAB.
1. The process of RAB establishment starts after RNC gets a RANAP: RAB ASSIGN-
MENT REQUEST message from Core Network.
2. RNC has the authority to either accept or reject this request. In both the cases,
RNC sends a RANAP: RAB ASSIGNMENT RESPONSE message to CN which
indicates either positive outcome or negative outcome of the RAB establishment
procedure.
9.1.3 Radio Bearer
Radio Bearer is a bearer service which denes the quality of service for the
user data stream between UE and RNC. If we study the Radio Bearer care-
fully, we can nd the conguration of all protocol layers of radio protocols e.g.,
PDCP, RLC, MAC and Physical layers.
According to 3GPP TR 21.905, Radio Bearer is dened as, the service provided by the
Layer 2 for transfer of user data between User Equipment and UTRAN. Radio Bearer is
a building block and pre-requisite for RAB. Therefore, when core network requests RNC
for RAB establishment, the Radio Bearer setup procedure gets automatically triggered.
9.1. BUILDING BLOCKS OF 3G SIGNALLING 299
Figure 9.2: Radio Access Bearer
The same situation has been illustrated in gure 9.3. Since radio bearer is established
between UE and RNC, the RRC protocol plays an important role in the setup procedure.
After successful decision to establish Radio Bearer, RNC informs UE about the congu-
ration of Physical, MAC, RLC and PDCP layer using RRC: RADIO BEARER SETUP
message. During the connection, if RNC decides to modify the current conguration, it
sends RRC: RADIO BEARER RECONFIGURATION message to UE. As shown in gure
9.3, UE acknowledges the receipt and compatibility by sending a RRC: RADIO BEARER
SETUP COMPLETE or RRC: RADIO BEARER RECONFIGURATION COMPLETE
message.
Figure 9.3: Radio Bearer Establishment/Modication
9.1.4 Radio Link
By denition, Radio Link is the logical name given to the association between
a single user and single Node B. During soft-handover, UE can maintain
300 CHAPTER 9. SIGNALLING
several radio links (one radio link for each active set cell). Radio links are
added to or deleted from the active set. Even in softer-handover, UE has
multiple radio links.
A Radio Link is simply a bunch of UL & DL physical channels between one UE and
one Node B. The decision about the codes used on the physical channels is made by RNC.
Therefore, RNC informs Node B about the codes, timing, Transport Format Set, TTI and
other essential information using NBAP: RADIO LINK SETUP REQUEST message. The
details of NBAP protocol are available in 3GPP TS 25.433.
As shown in the gure 9.4, RNC initiates the setup of radio link by sending NBAP: RADIO
LINK SETUP REQUEST message to Node B. This message instructs Node B about the
CRC communication Context id, which acts like a nickname for this particular radio
link whenever Node wants to address RNC regarding this radio link. This process gets
completed when Node B replies with NBAP: RADIO LINK SETUP RESPONSE message,
which includes a Node B Communication Context id. For any future NBAP transactions,
reference will be made using these 2 context ids.
Figure 9.4: Radio Link Setup or Reconguration
An example of this is shown in the right sub-gure in gure 9.4. In this gure, the
procedure of Synchronised Radio Link Reconguration is illustrated. There can be several
Radio Links between the UE and the Node B but with the help of Node B Communication
Context ID and CRNC Communication context id, we can uniquely identify the radio link
whose conguration must be modied. This procedure gets completed in three messages:
1. Radio Link Reconguration Prepare
2. Radio Link Reconguration Ready
9.1. BUILDING BLOCKS OF 3G SIGNALLING 301
3. Radio Link Reconguration Commit
9.1.5 Non-Access Stratum (NAS) Signalling Connection
NAS Signalling connection (UE CN) is a control plane logical connection.
NAS connection is realized using a combination of RRC Connection (UE
RNC) and Iu Connection (RNC CN).
Figure 9.5: Non-Access Stratum (NAS) Signalling Connection
Non-Access Stratum is a combined name for a group of control plane protocols that are
used in 2G & 3G. These set of protocols are access-agnostic which means that their deni-
tions do not depend on the underlying Access Stratum technology. Access stratum is used
to carry the NAS messages. Transfer of NAS messages between RNC and Core network
happens by RANAP signalling protocol. Similarly, between UE and RNC, RRC protocol
is used to transfer NAS messages. The example described in the following paragraph and
gure 9.5 elaborate this concept.
For example, CM: Service Request is a message which UE sends to MSC in order to request
for a specic circuit switched service. Therefore, CM: Service Request is a NAS message
which gets transported by RRC:Initial Direct Transfer from UE to RNC and by RANAP:
Initial UE message from RNC to CN. The RRC layer and RANAP layer do not decode
the NAS message because Node B and RNC do not have NAS entities. NAS entities are
only in UE and Core Network.
After learning about these building blocks, now we will focus on few commonly discussed
signalling scenarios and analyze how these building blocks are used.
302 CHAPTER 9. SIGNALLING
9.2 RRC Connection Establishment
As explained in section 9.1.1, RRC connection is a dedicated signalling connection be-
tween UE and RNC. The transport channels used for these signalling messages can be
either dedicated channels (DCH() ) or common channels (FACH () /RACH()). In
the following sections, we will investigate both the options.
Option 1: Signalling Radio Bearers on dedicated channels (see section 9.2.1).
1. UE sends RRC CONNECTION REQUEST on CCCH logical channel mapped
on the RACH transport channel.
2. RNC sends RRC CONNECTION SETUP on CCCH logical channel mapped
on the FACH transport channel.
3. UE sends RRC CONNECTION SETUP COMPLETE on a DCCH logical
channel mapped on the DCH transport channel.
4. All further DCCH messages are exchanged on DCH.
Option 2: Signalling Radio Bearers on common channels (see section 9.2.2)
1. UE sends RRC CONNECTION REQUEST on CCCH logical channel mapped
on the RACH transport channel (same as option 1).
2. RNC sends RRC CONNECTION SETUP on CCCH logical channel mapped
on the FACH transport channel (same as option 1).
3. UE sends RRC CONNECTION SETUP COMPLETE on a DCCH logical
channel mapped on the RACH transport channel.
4. All further DCCH messages are exchanged on RACH/FACH.
9.2.1 RRC Connection on Dedicated Channels - DCH
1. The UE initiates the set-up of an RRC connection by sending RRC CONNECTION
REQUEST message on RACH. The main parameters in this message are Initial UE
Identity (e.g., IMSI or TMSI+LAI), Establishment cause (e.g., Originating conver-
sation call), measurement result about DL coverage quality. The quantity used for
this reporting is broadcasted in SIB 11 of system information under the IE Intra-
frequency reporting quantity for RACH reporting.
From Rel-5 onwards, the new devices must also indicate whether they support HS-
DPA or HSPA
2
. All the possible values for establishment cause are listed in 3GPP
TS 25.331.
2
Not the exact device category and radio access capabilities.
9.2. RRC CONNECTION ESTABLISHMENT 303
Figure 9.6: RRC Connection Establishment - DCH Establishment.
2. Based on a look-up table, the SRNC decides to use either RACH/FACH or DCH/DCH
for this RRC connection. Operators can tune this table by RNC parameters for each
establishment cause. At this moment, RNC allocates both U-RNTI and C-RNTI
identiers to address the UEs within UTRAN.
In this example, the SRNC decides to use a DCH for this RRC connec-
tion, allocates U-RNTI and radio resources for the RRC connection.
Step 2a. Radio Link Setup: When a DCH is to be setup, NBAP: RADIO LINK
SETUP REQUEST message is sent to Node B. In this message, RNC informs
Node B about the Cell id, Transport Format Set (TFS), Transport Format
Combination Set (TFCS), frequency, UL Scrambling code, DL channelization
code, Power control information etc. Node B allocates resources, starts phys-
304 CHAPTER 9. SIGNALLING
ical layer reception, and responds with NBAP: RADIO LINK SETUP RE-
SPONSE message. The main parameters in this message are: signalling link
termination, transport layer addressing information (AAL2 address, AAL2
Binding Identity) for the Iub Data Transport Bearer.
As indicated in section 9.1.4, Node B and RNC negotiate two context ids for
this particular radio link for future NBAP transactions related to this radio
link.
Step 2b. Iub Transport Bearer Setup: RNC initiates setup of Iub Data Trans-
port bearer using ALCAP protocol using ALCAP: ESTABLISHMENT RE-
QUEST (ERQ) message. This request contains the AAL2 Binding Identity to
bind the Iub Data Transport Bearer to the DCH. The request for setup of Iub
Data Transport bearer is acknowledged by Node B by sending an ALCAP:
ESTABLISHMENT CONFIRM message.
Step 2c. DCH Frame Synchronization: The Node B and SRNC establish syn-
chronization for the Iub Data Transport Bearer by means of exchange of the ap-
propriate DCH Frame Protocol frames DOWNLINK SYNCHRONIZATION
and UPLINK SYNCHRONIZATION. Then Node B starts DL transmission.
3. If all these procedures are successful, the RRC CONNECTION SETUPmessage
is sent on FACH from RNC to UE. Using this message, RNC informs UE about
several parameters, such as, Initial UE Identity, U-RNTI, Transport Format Set
(TFS), Transport Format Combination Set (TFCS), DL channelization code, UL
Scrambling code, Power control information, etc. RRC CONNECTION SETUP
message informs UE about the Capability update Requirement. It is expected
that UE will include the details about its capabilities in the next message. If RRC
redirection to another frequency is used, RRC CONNECTION SETUP message also
includes the target frequency where the redirection must take place.
4. Node B achieves uplink sync and noties SRNC with NBAP: RADIO LINK RE-
STORE INDICATION message.
5. Message RRC Connection Setup Complete is sent on DCCH logical channel from UE
to SRNC. This message includes parameters like integrity protection and ciphering
algorithms supported by UE information and UE radio access capability. If the
device supports HSDPA and/or HSUPA, the device category number must also be
specied here. Additionally, if smart features like MIMO, A-GPS, DC-HSDPA,
16-QAM etc. are supported, UE must include these details in this message.
9.2.2 RRC Connection on Common Channels - FACH/RACH
Figure 9.7 shows the establishment of an RRC connection on the RACH/FACH common
transport channel. In comparison to the previous example, we can observe that there is no
signalling to setup the Iub Data Transport bearer. Therefore, it is required that transport
bearer for the RACH/FACH is established prior to this procedure.
9.2. RRC CONNECTION ESTABLISHMENT 305
Figure 9.7: RRC Connection on Common Channels - FACH/RACH
Advantages:
The use of Common Channel for carrying DCCH is very benecial for the
operator because it brings resource eciency in various ways. The connection
setup signaling and user dedicated resource requirements are reduced at the
BTS, the Iub, and the RNC.
At the Iub interface also, the common channels are carried in a resource-
ecient way. In the Node B, less processing capacity (channel element) is
consumed for signalling radio bearers, and the hardware load caused by sig-
nalling is decreased. In the RNC, the number of users in the Cell DCH state,
as well as the load of the connection setup signaling, is reduced.
At the radio interface, less channelization codes are required for signaling.
Typically, RRC connection setup on common channels is faster than using DCH, because
delays for setting up dedicated channels and synchronous reconguration can be avoided.
When RNC feels the need of setting up an DCH, HS-DSCH or E-DCH channel for UE, it
can instruct the user to perform Cell FACH to Cell DCH transition.
Disadvantages:
Since RACH and FACH are common transport channels, they can experience
congestion if a large number of UEs are using them simultaneously. Therefore,
the quality of service oered by RRC connection on common channels is less
than the same on dedicated channels.
Operators have to consider an upgrade in L1 capacity of RACH and FACH
before allowing RRC connection on common channels.
306 CHAPTER 9. SIGNALLING
9.3 Mobile Originated Voice Call Establishment
Source:
Chris Johnson, Radio Access Networks For UMTS ; Principles And
Practice , John Wiley & Sons.
3G has improved the end-user experience of high bit rate data services but voice is still the
most important service oered by mobile operators. In this section, we will understand
the signalling ow of a Mobile Originated CS conversational voice call setup. If the
readers are familiar with the call ow of GSM, they should compare the GSM call ow
with UMTS CS call ow and nd out the similarities and dierences. In short, we can
make 2 statements in advance.
1. RRC connection and RAB are new concepts that were introduced in 3G. Therefore,
RRC Connection establishment and RAB setup phase are dierent in comparison
to 2G call ow.
2. The signalling between UE and Core Network is exactly the same as used in GSM.
In order to simplify the understanding, we will divide the whole procedure into phases 4
phases:
1. Phase 1: RRC Connection Establishment
2. Phase 2: Signalling between UE & CN
3. Phase 3: RAB Setup
4. Phase 4: Signalling between UE & CN
Phase 1: RRC Connection Establishment: In order to establish any CS service, UE
must contact MSC and request for the same. But in order to reach MSC, UE needs
dedicated signalling resources (DCCH). UE uses the common signalling resources
(CCCH mapped on RACH/FACH) to obtain dedicated signalling resources. This
procedure was explained in full detail in section 9.2.
Phase 2: Signalling between UE & CN: Using the signalling resources obtained in
phase 1, UE performs negotiations with MSC.
1. The rst NAS message is CM: Service Request. This NAS message is
carried by two access stratum (AS) protocols RRC and RANAP, as shown in
gure9.8. When the rst NAS message arrives at RNC, it encapsulates it into
an SCCP: CONNECTION REQUEST message. SCCP signalling is used to
establish an Iu-CS signalling connection. The CS core network conrms the
9.3. MOBILE ORIGINATED VOICE CALL ESTABLISHMENT 307
Figure 9.8: Mobile Originated Voice Call Establishment; Source: Radio Access
Networks For UMTS; Principles And Practice by Chris Johnson
308 CHAPTER 9. SIGNALLING
setup of an Iu-CS connection by sending SCCP: CONNECTION CONFIRM
message. SCCP connection is identied by 2 numbers source local reference
and destination local reference.
2. Serving MSC sends AUTHENTICATION REQUEST message with 2 pa-
rameters: Authentication Token (AUTN) and Random Number (RAND). Us-
ing RAND and a secret key (stored in SIM card), UE calculates the AUTN,
Signed Response (SRES), Integrity key (IK) and ciphering key (CK). UE com-
pares the calculated AUTN with received AUTN. If they match, UE sends
AUTHENTICATION RESPONSE message to MSC including SRES.
3. The RANAP: SECURITY MODE COMMAND message informs RNC
about the list of integrity protection and ciphering algorithms that are per-
mitted by the core network. RNC chooses the algorithms according to its own
capability and UEs capability. This message also includes the reference start-
ing point of ciphering. UE acknowledges by responding with SECURITY
MODE COMPLETE and RNC forwards this message to core network.
4. The next message in the sequence is a CM: SETUP message from UE to MSC
which informs MSC about the bearer capability (supported codecs), the binary
coded decimal (BCD) number of called party and call control capabilities.
Phase 3: RAB Setup: Procedure of RAB setup begins when core network requests
RNC for setting up a CS conversational class RAB with some requested QoS. At
this moment, RNCs admission control checks for UL interference, DL transmission
power and DL channelization codes. If these radio resources are available, RNC
starts hunting for logical and physical resources. This mechanism is briey summa-
rized as:
(3.a) Radio Link: A radio link between UE and Node B was established at the
time of RRC connection establishment. But that radio link was purely for
signalling. In order to setup the radio bearer for user plane voice trac, radio
link must be recongured. The procedure has been illustrated in gure 9.4 and
explained in section 9.1.4. Using this proedure, RNC informs Node B about
the transport format set, DL channelization code, UL scrambling code, DPCH
oset etc. At this point, RNC informs Node B about the Connection Frame
Number (CFN) where the modied radio link will become active.
(3.b) Transport Bearer: Using ALCAP signalling, data transport bearer on Iub
and Iu-CS is established. RNC initiates the setup of the transport bearer
between RNC and Node B and between RNC and MSC.
(3.c) Radio Bearer: Using RRC: Radio Bearer Setup message, RNC instructs
UE about the conguration of various protocol layers and channel mapping.
Information about all the transport channel parameters e.g. Transport For-
mat Set, TTI, CRC size etc. and all physical layer parameters e.g., codes,
frequency band, slot format, power control information and CFN are carried
9.3. MOBILE ORIGINATED VOICE CALL ESTABLISHMENT 309
by this message
3
. UE acknowledges the reception by sending RRC: RADIO
BEARER SETUP COMPLETE message.
Phase 4: Signalling between UE & CN: 1. After getting response from the serv-
ing MSC of the called party, MSC of the calling party sends an ALERTING
message to UE which indicates that the other partys phone is ringing.
2. After the called party accepts the call, this information is transported to the
calling party using CONNECT message.
3. UE responds with a CONNECT ACKNOWLEDGE message to CN.
From this point onwards, a CS voice call is established between the calling and the called
party.
3
This step can be compared to TCH ASSIGNMENT in GSM call ow because up to this point,
UE is assigned resources for only DCCH and after this point, DTCH can also be sent/received by
UE.
310 CHAPTER 9. SIGNALLING
9.4 Mobile Terminated Voice Call Establishment
Source:
Chris Johnson, Radio Access Networks For UMTS ; Principles And
Practice , John Wiley & Sons.
When we compare the gure 9.9 showing the call ow for Mobile Terminated CS con-
versational voice call setup with gure 9.8 showing the same for mobile originated call
ow, it is obvious that there are a lot of similarities but there are some dierences too.
In this section, we will investigate the signalling for an incoming call by focussing on the
serving-MSC, SRNC and the called party
4
.
Similar to the example of mobile-originated-call, we will divide the whole procedure into
phases to simplify the learning:
1. Phase 1: Paging
2. Phase 2: RRC Connection Establishment
3. Phase 3: Signalling between UE & CN
4. Phase 4: RAB Setup
5. Phase 5: Signalling between UE & CN
The rst dierence between the MTC and MOC is already visible at this point. There is
an additional signalling phase called Paging for MTC case.
Phase 1: Paging: In idle mode, UE keeps on reporting
5
its Location Area (LA) to
MSC/VLR and about its Routing Area (RA) to the SGSN of the visited-PLMN
(VPLMN). In other words, the location of an idle mode UE is known to the network
at LA level or RA level. Therefore, if there is any incoming call for him, the network
must page him by shouting his name in the relevant area.
In the case of Mobile Terminated Call (MTC), when MSC receives a request to
setup a call, it sends a RANAP: PAGING message to all the RNCs in that Location
Area. This message contains the subscribers identity (e.g., IMSI or TMSI+LAI,
etc.) and the paging cause. In case of incoming voice call, it will be Terminated
Conversation Call. RNCs forward the paging message to all the cells in their
4
often called as subscriber B or B Party
5
1. At Switch On/OFF,
2. after moving to a new LA/RA,
3. and periodically based on timers
9.4. MOBILE TERMINATED VOICE CALL ESTABLISHMENT 311
Figure 9.9: Mobile Terminated Voice Call Establishment; Source: Radio Access
Networks For UMTS; Principles And Practice by Chris Johnson
312 CHAPTER 9. SIGNALLING
respective controlling areas using RRC: PAGING TYPE 1 message (PCCH PCH
S-CCPCH).
Phase 2: RRC Connection Establishment: When UE in idle mode reads its own
identity on the paging message, it tries to contact the network by using initial
access. This triggers the setup of an RRC Connection. This mechanism is the same
as in Mobile Originated Call (MOC) except the establishment cause parameter.
The cause specied in paging message is echoed by UE while requesting for an RRC
Connection.
Phase 3: Signalling between UE & CN: Using the signalling resources obtained in
phase 1, UE performs negotiations with MSC.
1. The rst NAS message is CM: PAGING RESPONSE. This NAS message
is carried by two access stratum (AS) protocols: RRC and RANAP, as shown
in gure 9.9.
Similar to the MOC case, when the rst NAS message arrives at RNC, a SCCP
connection is setup between CN and RNC.
2. Authentication procedure is optional but if it is used, there is no dierence
compared to the MOC case.
3. SECURITY MODE COMMAND and SECURITY MODE COM-
PLETE procedures are also exactly the same as in MOC example.
4. In MTC case, the CM: SETUP message is sent from MSC to UE which
informs UE about the bearer capability (supported codecs) and the binary
coded decimal (BCD) number of the calling party. This number is used to ash
on the UEs display so that the called subscriber can identify the calling party.
The UE acknowledges the setup message by sending a CALL CONFIRMED
message.
Phase 4: RAB Setup: RAB setup phase has no dierence compared to the MOC ex-
ample. Therefore, the description of this phase will not be repeated. This phase
includes following procedures:
(4.a) Radio Link setup
(4.b) Transport Bearer setup
(4.c) Radio Bearer setup
Phase 5: Signalling between UE & CN: After the Radio Access Bearer (RAB) has
been established, the signalling to connect the two parties takes place.
1. The UE of called party sends an ALERTING message to the core network.
This message will be forwarded to the serving core network of the calling party
and nally delivered to the calling subscriber. The calling subscriber will be
intimated by playing the ring-back tone or by playing the caller tune. This
action will not stop until the called party answers the call or a timer expires.
9.4. MOBILE TERMINATED VOICE CALL ESTABLISHMENT 313
2. Once the called subscriber (human being) answers the call, a CONNECT
message is forwarded from Called Party to CN of called party to CN of
calling party to the calling party.
3. The CN of the called party responds with a CONNECT ACKNOWL-
EDGE message to the calling UE.
With this CONNECT ACKNOWLEDGE message, we can say that the call has been
established and voice trac can be transported in both directions.
314 CHAPTER 9. SIGNALLING
9.5 PS Data Session Setup
Source:
Chris Johnson, Radio Access Networks For UMTS ; Principles And
Practice , John Wiley & Sons.
The packet session setup is also similar to voice call setup up to some extent. But
there are some signicant dierences which must be discussed now.
In CS-domain, UE performs IMSI attach to get registered with MSC/VLR. In PS-
domain, UE must perform GPRS ATTACH and register with SGSN. While learn-
ing about the PS session setup, we must dierentiate the 2 cases:
1. UE is not yet registered with SGSN and it performs PS data session setup.
2. UE is already registered with SGSN and it performs PS data session setup.
In CS-domain, UE can make and receive calls as soon as it is attached to MSC/VLR.
But in PS-domain, data transfer is possible only after getting an IP-address.
The signalling shown in this section is valid for UMTS PS sessions, HSDPA
PS sessions and also for HSUPA PS data sessions.
Figure 9.10: Initial NAS message from a registered and non-registered user
There are 4 phases in the session setup signalling and they are listed below:
9.5. PS DATA SESSION SETUP 315
1. Phase 1: RRC Connection Establishment
2. Phase 2: Signalling between UE and PS Core Network: GPRS ATTACH
3. Phase 3: Signalling between UE and PS Core Network: PDP Context Activation
4. Phase 4: RAB Setup (during PDP activation phase)
Phase 1: RRC Connection Establishment: As discussed in the earlier signalling ex-
amples and in the beginning of chapter, RRC connection is established between
UE and RNC to setup a signalling connection for the transfer of signalling radio
bearers. This mechanism is the same as explained earlier except the establishment
cause parameter. These causes are dened in 3GPP TS 25.331 specication. The
terminology used by core network specications and radio specication is slightly
dierent. Fortunately, in Table L.1.2 of 3GPP TS 24.008 the mapping of PS NAS
procedure to establishment cause in RRC connection request is explained. In short,
the establishment cause used in this case will be:
REGISTRATION if UE has not already registered with SGSN,
Otherwise ORIGINATING INTERACTIVE CALL or
ORIGINATING BACKGROUND CALL or
ORIGINATING HIGH-PRIORITY SIGNALLING.
Similarly, when the UE is registered with SGSN (or ATTACHED), there can be
paging with paging causes TERMINATING INTERACTIVE CALL, TERMI-
NATING BACKGROUND CALL or TERMINATING HIGH-PRIORITY SIG-
NALLING. In that case, UE uses the same establishment cause while requesting
an RRC connection.
Phase 2: UE Core Network signalling: GPRS ATTACH: In order to ATTACH
itself to the packet core network, UE sends a GMM: ATTACH REQUEST mes-
sage towards SGSN. This NAS message is carried by the RRC and RANAP protocols
in access stratum. As soon as the rst NAS message arrives at RNC, it triggers the
setup of an SCCP connection between RNC and SGSN. Figure 9.10 shows two
dierent scenarios.
1. In the left sub-gure, the UE is not yet registered in SGSN and it performs
PS data session setup.
2. In the right sub-gure, the UE is already registered in SGSN and it performs
PS data session setup.
Phase 3: UE Core Network signalling: PDP Context Activation: After reg-
istering in SGSN, a mobility management context exists at SGSN and UE side,
but UE does not have an IP address. In order to acquire an IP address and negoti-
ate the QoS, UE requests activation of PDP context.
316 CHAPTER 9. SIGNALLING
The NAS message ACTIVATE PDP CONTEXT REQUEST arrives at SGSN and
it chooses the desired GGSN based on Access Point Name (APN) requested in
this message. If UE does not explicitly ask for some particular QoS, then the
QoS prole from HLR should be used. SGSN obtains this data from HLR while
performing ATTACH in the previous step. UE assigns a Network Service Access
Point Indicator (NSAPI) to this PDP context. Optionally, UE can also specify the
protocol conguration information for external network protocols.
If GGSN agrees on the QoS requested, it sends its response to SGSN. SGSN can
inform the UE about the successful PDP context activation but before that RAB
must be established.
Phase 4: RAB Setup (during PDP activation phase): Depending on the strategies
chosen by equipment vendors, packet session in UMTS and HSPA can be established
in 2 dierent ways.
Option 1: Direct Resource Allocation: One strategy is to directly allocate some
nominal bit rate on DCH or HSPA resources at the time of RAB setup (see
gure 9.11). This scheme reduces the connection establishment delay. In this
strategy, RNC makes the decision about using DPH, HSDPA or HSPA cong-
uration during RAB establishment itself.
Option 2: First Zero Bitrate bearer and later resource allocation: Another
strategy is establish a RAB with radio bearer of only DCH 0 kbps in UL &
DL and allocate the real resources only if RNCs packet scheduler receives a
capacity request from UE or from MAC layer within RNC. This scheme has
an advantage that the resources are allocated only when there is actual need
to send or receive data.
It depends on the equipment vendors to support either one or both the schemes.
Some vendors support both schemes and operators can choose the one, suitable to
their own preference, by RNC level parameters.
Phase 4; Option 1: Direct Resource Allocation
In Direct Resource Allocation (DRA) strategy, the UE will be allocated some nominal bit
rate at the time of RAB setup.
1. The SGSN sends a RAB ASSIGNMENT REQUEST message to RNC. In this
request, a particular RAB is identied by a RAB-id which is exactly the same as
NSAPI used in the PDP context phase. Other important parameters in this message
are:
Trac class,
9.5. PS DATA SESSION SETUP 317
Figure 9.11: PS session setup with direct resource allocation; Source: Radio
Access Networks For UMTS; Principles And Practice by Chris Johnson
318 CHAPTER 9. SIGNALLING
Symmetrical or asymmetrical,
maximum
6
UL & DL bit rate,
Acceptable error ratios,
Trac Handling Priority, (THP) (only for Interactive trac class, value 1, 2
or 3; 1 = highest priority).
Allocation Retention Priority (ARP), which can range from 1 to 15 ; 1 =
highest priority).
Pre-emption Vulnerability and capability, etc.
2. At this moment, the admission control of RNC decides whether the RAB can be
established or not. Packet scheduler decides the transport channel type selection.
HSDPA & HSUPA, HSDPA & DCH or DCH & DCH could be selected for this
particular bearer. The initial bit rates should be decided by the RNCs parameters.
3. NBAP signalling between Node B and RNC takes place to recongure the radio link
at the Node B.
4. ALCAP signalling between Node B and RNC takes place to establish a user plane
Iub data transport bearer.
5. RRC: RADIO BEARER SETUP message informs the UE about the selected
radio bearer conguration for the particular RAB and the activation time. If the HS-
DSCH transport channel has been selected in DL, the HSDPA-specic user identity
H-RNTI is allocated to user. Similarly, if E-DCH transport channel has been selected
in UL, HSUPA specic E-RNTI is also allocated.
6. UE acknowledges by sending an RRC: RADIO BEARER SETUP COMPLETE
message to RNC.
7. Finally, the RAB setup phase is completed when RNC informs SGSN about the
positive outcome of the RAB establishment procedure by sending RANAP: RAB
ASSIGNMENT RESPONSE.
At this moment, a PS data connection exists all the way between UE and some external
server using GGSN as the gateway router. Now, UE can send and receive packets from
the external network to which it just got connected via a specic GGSN. The concepts
about secondary PDP contexts and multiple PDP contexts are not explained further in
this book.
6
Maximum word plays an important role in this message. UE might ask for maximum bit rate
of several Mbps but allocated only few kbps depending on cell load situation and radio conditions.
9.5. PS DATA SESSION SETUP 319
Phase 4; Option 2: First Zero Bit rate bearer and later
resource allocation
As explained earlier, RNC of some equipment vendors act dierently when the RAB
ASSIGNMENT REQUEST message arrives at RNC. In the strategy explained below,
following procedures are postponed until there is a demand for actual resource allocation
from UE or/and from RNC.
1. Postpone bit rate allocation (allocate 0 bit rate)
2. Postpone transport channel type selection (always choose DCH)
3. Postpone radio link reconguration at Node B (use same radio link as used for RRC
connection)
4. Postpone Iub transport bearer setup (use same bearer as used for RRC connection)
It is illustrated in gure 9.12, RNC immediately sends a RRC: RADIO BEARER SETUP
message to UE without performing any checks on the resource availability. The actual
bit rate allocated in this message is only 0 kbps. Therefore, this radio bearer is only of
logical value. The transport channel selected for this conguration is always dedicated
channel (DCH).
Afterwards, UE is informed about the minimum threshold of trac volume that must
be crossed before it can actually request for the resources. Whenever that threshold is
crossed UE informs RNC by sending RRC: MEASUREMENT REPORT. At this moment
the transport channel type selection can take place. RNC can select one of the following
options:
HSUPA & HSDPA; If both cell & UE support HSPA
or DCH & HSDPA; If Either cell or UE does not support HSUPA
or DCH & DCH; If Either cell or UE does not support HSDPA
or RACH & FACH
If there is no Capacity Request in uplink or downlink, RNC will wait some timer expiry.
When this timer expires, UE is shifted from CELL DCH state to CELL FACH state. In
CELL FACH state, UE can send uplink data on RACH and receive DL data on FACH.
320 CHAPTER 9. SIGNALLING
Figure 9.12: PS Call setup with Zero bit rate and later resource allocation;
Source: Radio Access Networks For UMTS; Principles And Practice by Chris John-
son
9.6 Soft Handover
Soft handover is a category of handover procedures where the radio links are added and
deleted in such a manner that the UE always keeps at least one radio link to the UTRAN.
Soft handover is only possible when the source cell and target cell both operate at the same
frequency. Therefore, soft handovers are always intra-frequency handovers. According to
the network topology, we can identify various scenarios. The source cell and the target
cell can:
1. belong to the same Node B (special case of Soft handover, called Softer Handover).
2. belong to two dierent Node Bs but controlled by the same RNC.
9.6. SOFT HANDOVER 321
3. belong to two dierent Node Bs and dierent RNCs & with Iur interface between
the two RNCs.
4. belong to two dierent Node Bs and dierent RNCs but without Iur interface be-
tween the two RNCs.
A more detailed description can be found in 3GPP TR 25.832. From the four options
listed above, in the rst three cases, a Soft Handover is possible but for the option # 4,
only a Hard Handover is possible.
Figure 9.13: Schematic description of Intra-RNC soft handover: Source 3GPP TR
25.832
Figure 9.13 shows the schematic description of an Intra-RNC Inter-Node B soft handover.
The signalling ow for the same example is illustrated in gure 9.14.
The UE connected to Primary-Scrambling code A reports to RNC that it is able to detect
a new cell with scrambling code B with acceptable CPICH Ec/No strength. According to
TS 25.331, this situation is called Event 1A
7
. The signalling scenario is briey explained
in the following paragraph.
1. If UE is able to detect a neighboring cell with acceptable signal strength (CPICH
Ec/No), it informs RNC by sending RRC: MEASUREMENT REPORT mes-
sage. The main parameters in this message are scrambling codes and signal strength
of both active set cells and strong monitored cells.
2. Based on the current load in the target cell, RNCs admission control decides
whether the new radio link can be added to the active set or not.
7
Denition of event 1A: P-CPICH of a neighbour cell enters the reporting range.
322 CHAPTER 9. SIGNALLING
Figure 9.14: Intra-RNC soft handover - Radio Link Branch Addition; Source:
Radio Access Networks For UMTS; Principles And Practice by Chris Johnson
In this example, the SRNC decides to add the radio link from a neigh-
boring cell to the active set. But before that, it needs to do the necessary
arrangements with the new Node B.
2a. Radio Link Setup: When a new DCH is to be set-up, NBAP: RADIO LINK
SETUP REQUEST message is sent to Node B and it responds with the NBAP:
RADIO LINK SETUP RESPONSE message. The new Node B starts UL
reception after this point.
9.7. INTER-RNC HANDOVER WITH IUR INTERFACE 323
2b. Iub Transport Bearer Setup: RNC initiates set-up of Iub Data Transport
bearer using ALCAP protocol using ALCAP: ESTABLISHMENT REQUEST
(ERQ) message. The request for set-up of Iub Data Transport bearer is ac-
knowledged by Node B by sending an ALCAP: ESTABLISHMENT CONFIRM
message.
2c. DCH Frame Synchronization: The Node B and SRNC establish synchro-
nization for the Iub Data Transport Bearer by means of exchange of the ap-
propriate DCH Frame Protocol frames DOWNLINK SYNCHRONIZATION
and UPLINK SYNCHRONIZATION. Then Node B starts DL transmission.
3. New Node B achieves uplink synchronization and noties SRNC with NBAP: RA-
DIO LINK RESTORE INDICATION message.
4. Finally, SRNC sends an RRC:ACTIVE SET UPDATE message to UE. Using
this message, RNC informs UE about the DL primary scrambling code, DL DPCH
channelization code and the DL DPCH frame oset. This message is sent from the
original active set as well as via the recently added radio link although the UE will
only receive it from the original active set cell.
5. UE concludes the soft handover procedure by sending RRC: Active Set Update
Complete message in UL.
9.7 Inter-RNC Handover with Iur Interface
Figure 9.15: Schematic description of Inter-RNC soft handover: Source 3GPP TR
25.832
324 CHAPTER 9. SIGNALLING
Figure 9.15 describes the behaviour of an Inter-RNC Soft Handover. The new radio link
added to the active set belongs to a cell which is controlled by another RNC. In this
scenario, soft handover can take place only if there is an Iur interface between the 2 RNCs
which is capable of carrying user plane data frames. The signalling messages exchanged
between various UTRAN network elements and between UE and UTRAN are shown in
gure 9.16.
Figure 9.16: Inter-RNC soft handover - Radio Link Branch Addition
1. UE transmits RRC: MEASUREMENT REPORT message and informs RNC that
event 1A has triggered. SRNC decides to setup a radio link via a new cell controlled
by another RNC.
9.7. INTER-RNC HANDOVER WITH IUR INTERFACE 325
Radio Link Setup: SRNC requests DRNC for radio resources by sending RN-
SAP: RADIO LINK SETUP REQUEST message. The main parameters
in this message are Cell id, Transport Format Set per DCH, Transport Format
Combination Set, frequency, UL Scrambling code etc. DRNC forwards the
request to the target Node B using NBAP: RADIO LINK SETUP RE-
QUEST message. Then Node B starts the UL reception. Node B allocates
requested resources and informs DRNC about the result in the form of NBAP:
RADIO LINK SETUP RESPONSE message. DRNC, in turn, forwards
RNSAP: RADIO LINK SETUP RESPONSE message to SRNC.
Iub Transport Bearer Setup: Using ALCAP protocol, Iub and Iur data trans-
port bearers are established between the new Node B and DRNC; and between
SRNC and DRNC.
DCH Frame Synchronization: After achieving UL synchronization, Node B no-
ties DRNC and DRNC informs SRNC about it by sending NBAP/RNSAP:
RADIO LINK RESTORE INDICATION message respectively. SRNC and
new Node B exchange control frames of DCH-Frame Protocol (DCH-FP) and
establish DCH frame synchronization. Then Node B starts DL transmission.
2. After successful co-ordination with Node B and DRNC, the SRNC signals RRC:
ACTIVE SET UPDATE message for Radio Link Addition to UE.
3. UE acknowledges with RRC message RRC:ACTIVE SET UPDATE COM-
PLETE.
326 CHAPTER 9. SIGNALLING
9.8 Inter-RNC Handover without Iur Interface
Figure 9.17 shows the schematic description of an Inter-RNC hard handover where the
source cell and the target cell belong to two dierent RNCs and there is no Iur interface
between them. As we can see, there is a hard switching from Source cell to Target cell.
Even in the area of overlapping between the two cells, UE is connected to only one cell.
Along with handover, the functionality of Serving RNC is shifted from source RNC to
target RNC. This procedure is known as SRNS relocation.
Figure 9.17: Schematic description of Inter-RNC Hard handover: Source 3GPP
TR 25.832
The signalling between UE, source RNC, core network and the target RNC is shown in
gure 9.18. In order to simplify the picture, Node Bs and Iub signalling is not shown in
this gure. Lets break down this procedure in several steps.
STEP 1: For UE, its the business as usual. UE detects a neighbouring cell with good
CPICH quality and informs this event to RNC in the form of RRC: MEASURE-
MENT REPORT. In this special case, RNC cannot add the new radio link to the
active set because there is no Iur between the CRNC of source cell and the CRNC
of target cell. Meanwhile, UE keeps on reporting measurement report at regular
periods.
When the target cells Ec/No becomes better than the E/No of the source cell by a
predened margin, RNC decides to perform Hard Handover and SRNS relocation.
Step 2: Since, the 2 RNCs are not directly connected via Iur, they must communicate
via core network. Source RNC informs core network by sending RANAP: RE-
LOCATION REQUIRED message. Core network forwards this message in the
9.8. INTER-RNC HANDOVER WITHOUT IUR INTERFACE 327
Figure 9.18: Inter-RNC Hard Handover and SRNS Relocation
form of RANAP: RELOCATION REQUEST to the target RNC. These steps
are quite clearly shown in gure 9.18.
Finally, the source RNC receives a RANAP: RELOCATION COMMAND
from the core network, which shows that the target RNC has prepared itself and
the target Node B for the hard handover procedure.
328 CHAPTER 9. SIGNALLING
Step 3: Source RNC sends a RRC message PHYSICAL CHANNEL RECONFIG-
URATION to the UE.
For illustration, this step can be considered as if RNC is giving a hard handover
command to UE.
Step 4: In response, UE changes the conguration of physical layer and automatically
starts communicating with the target cell. Target Node B achieves uplink synchro-
nization on the radio interface and informs target RNC about it. At this point, target
RNC informs the core network by sending RANAP: RELOCATION DETECT
message.
Step 5: After establishing the RRC connection with the target RNC and allocation of the
necessary radio resources, UE sends the RRC message PHYSICAL CHANNEL
RECONFIGURATION COMPLETE to the target RNC.
Step 6: As expected, the target RNC informs Core network about the successful handover
and core network, in turn, asks the source RNC to release the Iu Connection for the
UE.
9.9. CS INTER-SYSTEM HANDOVER (3G TO 2G) 329
9.9 CS Inter-System Handover (3G to 2G)
Source:
3GPP TR 25.931 ver. 8.0.0 ;UTRAN functions, examples on signalling
procedures
Chris Johnson, Radio Access Networks For UMTS ; Principles And
Practice , John Wiley & Sons.
This section is also inspired from the book Radio Access Networks For UMTS ;
Principles And Practice by Chris Johnson, where various signalling scenarios
are illustrated with the help of diagrams, signalling traces and elaborative text.
In Lets Learn 3G in 10 Days, the author has tried to explain the same
and skipping some details. The advanced readers should refer to the above
mentioned reference to get more details.
Voice is the most important and most popular circuit switched service. It is quite normal
that while using voice service, subscribers will run into geographical areas where 3G cov-
erage is not strong. But fortunately, GSM coverage can be used to avoid this 3G call drop
by carefully planning for a 3G to 2G handover for CS services. 3G to 2G CS ISHO success
rate is a very important key performance indicator of any 3G network. The signalling ow
of this procedure is broken down into two parts shown in gure 9.19 and gure 9.20.
Let us break down the procedure into several phases and discuss them step-by-step.
1. Phase 1: ISHO triggers
2. Phase 2: Compressed Mode measurements for BCCH RSSI
3. Phase 3: Measurement Reports (UE to RNC)
4. Phase 4: Compressed Mode measurements for BSIC verication
5. Phase 5: Measurement Reports (UE to RNC)
6. Phase 6: HO decision
7. Phase 7: Signalling between SRNC & BSC
8. Phase 8: Communication between UE and GERAN
9. Phase 9: Conrmation about successful HO to RNC
Phase 1: ISHO triggers: There could be several reasons (or triggers) for starting inter-
system measurements e.g., poor P-CPICH RSCP, poor P-CPICH Ec/No, high UL
tx power, high DL radio link power, poor UL quality (or high UL BLER), poor DL
330 CHAPTER 9. SIGNALLING
Figure 9.19: Inter System HO Signalling - UTRAN Part; Source: Radio Access
Networks For UMTS; Principles And Practice by Chris Johnson
quality etc. Other than these critical reasons, there are some non-critical reasons
as well. For example, service-based handover and load-based handover. Opera-
tors can control the reporting due to each mechanism by RNC parameters. These
parameters are given to user either by SYSTEM INFORMATION (BCCH) or by
RRC: MEASUREMENT CONTROL MESSAGE. In chapter 5, we dened event
1F which gets triggered whenever the P-CPICH of an active set cell falls below a
9.9. CS INTER-SYSTEM HANDOVER (3G TO 2G) 331
certain threshold. Please refer to section 5.8.3 and gure 5.21.
Whenever a P-CPICH of an active set falls below the parameter dened by RRC:
MEASUREMENT CONTROL, UE sends a RRC: MEASUREMENT REPORT
message to RNC. If there are more cells in the active set, then RNC does not take
any action. When event 1F is triggered for the last active set cell, RNC decides to
prepare UE and Node B for inter-system measurements.
Phase 2: Compressed Mode measurements for BCCH RSSI: It is RNCs duty to
prepare both Node B and UE for compressed mode measurements in the scheduled
gaps. The compressed mode will not be further explained in this section.
Between Node B & RNC: Using RADIO LINK RECONFIGURATION proce-
dure RNC prepares Node B for compressed mode measurements. This proce-
dure has 3 signalling messages as shown in gure 9.19.
1. NBAP: RADIO LINK RECONFIGURATION PREPARE message con-
tains important parameters related to compressed mode conguration
such as compressed mode method (SF/2, Higher Layer Scheduling or
puncturing), gap length (# slots), gap starting point within a radio frame,
gap pattern etc. With this message up to 3 Transmission Gap Pattern
Sequence (TGPS) can be congured, one for UMTS inter-frequency mea-
surements, one for GSM RSSI measurements and one for GSM BSIC ver-
ication. Each sequence contains its own set of CM parameters.
2. Node B acknowledges the compressed mode parameters by responding
with NBAP: RADIO LINK RECONFIGURATION READY message.
3. Finally, RNC sends NBAP: RADIO LINK RECONFIGURATION COM-
MIT and informs Node B about the Connection Frame Number (CFN),
from which the CM parameters should apply.
Between UE & RNC: The communication between UE an RNC takes place in 2
steps. First, RNC informs the CM parameters and then the parameters related
to GSM RSSI measurements.
1. RRC: PHYSICAL CHANNEL RECONFIGURATION message
is used to inform UE about the compressed mode conguration and the
related parameters. It also contains information about the activation time.
This activation time is exactly the same as RNC sent to Node B in NBAP:
RL Reconguration Commit message.
2. RRC: MEASUREMENT CONTROL message is used to congure
GSM RSSI measurements. In this message, RNC species whether BSIC
verication is required at this stage or not. In our signalling example,
BSIC verication is not performed at this stage. Each neighbour is identi-
ed using a combination of its Absolute Radio Frequency Channel Number
(ARFCN) and its Base Station Identity Code (BSIC)
8
.
8
BSIC = Network Colour Code (NCC) and the Base station Colour Code (BCC).
332 CHAPTER 9. SIGNALLING
3. UE acknowledges by sending RRC: PHYSICAL CHANNEL RECONFIG-
URATION message.
Phase 3: Measurement Reports (UE to RNC): After performing measurements on
GSM RAT, UE reports the condition to RNC in the form of RRC: Measurement
Report messages. In our example, we are using periodic measurement reports
at predened interval. Each report contains information about BCCH RSSI and
non-veried BSIC of 6 strongest GSM neighbours.
Phase 4: Compressed Mode measurements for BSIC verication: There needs to
be some modication in the compressed mode conguration for BSIC verication
which Node B should be aware of.
Between Node B & RNC: Using NBAP: COMPRESSED MODE COM-
MAND RNC instructs Node B to switch from one Transmission Gap Pattern
Sequence (TGPS) to another one. This message has two important parame-
ters:
1. The Compressed Mode Conguration Change CFN : This parameter de-
nes the radio frame during which the Node B stops using the active
TGPS.
2. The Transmission Gap CFN : This parameter denes the radio frame
in which the new TGPS will become active. New means the sequence
dened in this message itself.
Between UE & RNC Well known RRC: Measurement Control massage is used
to switch the compressed mode methods and pattern sequences. RNC may se-
lect the best RF carrier or several RF carriers. In this message, RNC instructs
UE to verify the BSIC of those remaining neighbours which are not explicitly
removed by this message.
Phase 5: Measurement Reports (UE to RNC): After performing measurements on
GSM RAT and verifying the BSIC, UE reports back to SRNC using the same mes-
sage RRC: Measurement Report. Each report contains information about BCCH
RSSI and veried BSIC of the GSM neighbours dened in measurement control
message.
Phase 6: HO decision in SRNC: If a GSM cell is reported by UE whose BSIC has
been veried and whose RSSI level is acceptable, it is considered as a suitable target
cell for inter-system handover.
Phase 7: Signalling between SRNC & BSC: This phase of signalling is illustrated
in gure 9.20. It involves signaling between UTRAN radio controller (RNC) and
GERAN radio controller (BSC). Typically, these 2 are not connected by some direct
interface. Therefore, the communication takes place with the help of core network.
(SRNC 3G-MSC 2G-MSC BSC)
9.9. CS INTER-SYSTEM HANDOVER (3G TO 2G) 333
Figure 9.20: UTRAN to GSM HO Signalling - UTRAN & Core Network Part
(source 3GPP TR 25.931)
1. SRNC contacts 3G-MSC by sending RANAP:RELOCATION REQUIRED
message. 3G-MSC forwards this request to 2G-MSC and 2G-MSC in turn
informs BSC.
2. BSC allocates the radio resources in 2G cell and acknowledges the request for
handover by sending BSSMAP: HANDOVER REQUEST ACKNOWLEDGE
message to 2G MSC. 2G-MSC forwards this message to 3G-MSC. 3G-MSC
sends a RANAP: RELOCATION COMMAND and informs RNC about the
2G radio resources (TCH) allocated for this user.
3. RRC: HANDOVER FROM UTRAN COMMAND message allows the user
to leave 3G resources and start accessing 2G radio resources. This message
provides the UE with sucient information to continue its speech connection
on GSM, such as
BSIC (BCC & NCC) and BCCH Carriers ARFCN
Time slot #, hopping information, channel conguration, training se-
quence code
Handver reference number
Phase 8: Communication between UE and GERAN: In the process of synchro-
nizing with the 2G base station, UE transmits Handover Access burst. In this
burst, UE signals the same handover reference number which was given in the RRC:
HANDOVER FROM UTRAN COMMAND. After this, BSC sends a Handover De-
tect message to the 2G-MSC. Finally, UE transmits a Handover Complete message
to 2G-MSC, which then informs the 3G-MSC.
334 CHAPTER 9. SIGNALLING
Phase 9: Conrmation about successful HO to SRNC: 3G-MSC sends an RANAP:
Iu Release Command to SRNC to release the radio resources, hardware resources,
Iub and Iu-cs transport resources. These resources are released only after UE has
successfully accessed the 2G resources and call is continuing on GSM.
9.10. PS INTER-SYSTEM HANDOVER (3G TO 2G) 335
9.10 PS Inter-System Handover (3G to 2G)
Source:
3GPP TS 23.060 ver. 6.0.0 ;General Packet Radio Service (GPRS);
Service description
CS UTRAN to GERAN handover is commonly called CS ISHO or CS IRAT HO. Similarly
for Packet switched services too, UTRAN to GERAN handover is called PS ISHO or PS
IRAT HO. The signalling for this procedure is quite complicated and a simplied version
of that is illustrated in 9.21. A more detailed description can be found in 3GPP TS 23.060.
According to 3GPP, this mechanism is calledIu mode to A/Gb mode Inter-SGSN
Change. Although some vendors support functionality of 2G and 3G SGSN in the same
network element, in our example, it is assumed that 2G SGSN and 3G SGSN are two
dierent nodes. As we have done with the previous scenarios, we will divide the whole
procedure into several phases. In this discussion, we have 7 phases:
1. Phase 1: 2G Measurement & HO decision by SRNC(UE SRNC)
2. Phase 2: Routing Area Update (UE 2G-SGSN)
3. Phase 3: Core Network Signalling (2G SGSN 3G-SGSN HLR)
4. Phase 4: Updating PDP Context (2G SGSN GGSN)
5. Phase 5: Informing Home PLMN (2G SGSN HLR)
6. Phase 6: Releasing 3G resources ( HLR 3G SGSN RNC)
7. Phase 7: Informing UE about the successful handover (2G SGSN UE)
Phase 1: 2G Measurement & HO decision by SRNC(UE SRNC): Just like cir-
cuit switched ISHO, RNC instructs UE to perform the Inter-RAT measurements on
GSM neighbouring cells. UE reports the BCCH RSSI in RRC: MEASUREMENT
REPORT message. In the example shown, periodic measurement is used. Alter-
natively, event triggered measurement could also be used. After nding a suitable
cell, RNC decides for UTRAN to GERAN cell change and informs UE using RRC:
CELL CHANGE ORDER FROM UTRAN message. The purpose of this
message is to transfer a connection between the UE and UTRAN to another radio
access technology (e.g. GSM). This message contains BSIC of the target 2G cell
and the activation time
9
.
9
Activation time is optional parameter, default is now
336 CHAPTER 9. SIGNALLING
Figure 9.21: PS IRAT (Source: 3GPP TS 23.060)
Phase 2: Routing Area Update (UE 2G-SGSN): UE informs 2G-SGSN about
its presence by sending a ROUTING AREA UPDATE REQUEST message.
In this message, UE includes parameters like old RAI, old P-TMSI, Update Type,
MS Network Capability etc. The BSS shall add the Cell Global Identity including
the RAC and LAC of the cell where the message was received before passing the
message to the new 2G-SGSN.
Phase 3: Core Network Signalling (2G-SGSN 3G-SGSN HLR) The 2G-SGSN
has no information about the UEs MM context and PDP context. Therefore, it
requests for the same from 3G-SGSN. 3G-SGSN requests SRNS Context from the
SRNC. After receiving this message, the SRNC stops sending downlink PDUs to the
9.10. PS INTER-SYSTEM HANDOVER (3G TO 2G) 337
UE and starts buering. SRNC replies with an SRNS CONTEXT RESPONSE
message. The 3G-SGSN responds with an SGSN Context Response (MM Context,
PDP Contexts) message (optionally, security procedure may be used to authenticate
UE by 2G-SGSN).
Phase 4: Updating PDP Context (2G-SGSN GGSN): The new 2G-SGSN in-
forms GGSN about the changes that have taken place using an UPDATE PDP
CONTEXT REQUEST message. This message contains parameters like new
SGSN Address, TEID, QoS Negotiated, etc.
Phase 5: Informing Home PLMN (2G SGSN HLR): The HLR in the Home-
PLMN is informed about the routing area update when it receives an UPDATE
GPRS LOCATION message from 2G-SGSN. This message contains the IMSI of
subscriber, SGSN address and SGSN number.
Phase 6: Releasing 3G resources ( HLR 3G SGSN RNC): HLR informs the
old 3G-SGSN to delete the subscribers data from its register because the user
has been successfully registered in 2G-SGSN. 3G-SGSN instructs SRNC to release
the UTRAN resources reserved for this subscriber by RANAP: IU RELEASE
COMMAND message. When the buered data has been successfully forwarded,
the SRNS responds with an RANAP: IU RELEASE COMPLETE message.
Phase 7: Informing UE (2G SGSN UE): The new 2G-SGSN responds to the MS
with a ROUTING AREA UPDATE ACCEPT message.
338 CHAPTER 9. SIGNALLING
9.11 HSDPA Mobility
Figure 9.22: Inter-Node B serving HS-DSCH cell change (Source 3GPP TS 25.308)
According to 3GPP TS 25.308, a serving HS-DSCH cell change facili-
tates the transfer of the role of serving HS-DSCH radio link from one radio
link belonging to the source HS-DSCH cell to a radio link belonging to the
target HS-DSCH cell.
This concept has already been discussed in Chapter 7 but we did not analyze the signalling
associated with these procedure. Lets do it now.
9.11.1 Serving HS-DSCH Cell Change
During an active HSDPA session, the UE can move from one cell to another. It is also
possible that due to other reasons, the Ec/No of a neighbouring cell becomes better than
that of the serving cell. According to design implementation, the serving cell change can
happen in two methods.
HS-DSCH via DCH Channel: In gure 9.23, Option 1 shows a simple mechanism
where the HSDPA channels are released for the mobility purpose. In the transition
area between A and B, the UE performs a HS-DSCH to DCH channel switching.
The handover takes place between source cell A and target cell B just like a R99
DCH handover (via soft handover mechanism). After reaching the target cell B, a
HS-DSCH can be re-allocated to UE from the target cell.
9.11. HSDPA MOBILITY 339
Figure 9.23: Two Methods for HS-DSCH Serving Cell Change
Direct HS-DSCH Serving Cell Change: As depicted in Option 2 of gure 9.23, dur-
ing the transition period, UE keeps on receiving HSDPA data from source cell A
but the associated-DCH (A-DCH) channels perform soft handover with a radio link
of target cell B. The HS-DSCH channel is still scheduled by the Node B which
controls the source cell. This scheme is more ecient than the one explained as
Option 1.
As readers might have guessed, the option 1 is not the most optimized solution. It has
been implemented by infrastructure vendors as an interim solution if their equipments
do not yet support option 2. Now-a-days, almost all networks support direct HS-DSCH
transition. The source and target cells may or may not belong to the same Node B which
gives rise to two separate discussions:
Intra-Node B serving HS-DSCH cell change: In this scenario, the source and the
target cells are two adjacent sectors of the same site (Node B). Therefore, the
340 CHAPTER 9. SIGNALLING
unacknowledged data which is buered at Node B can be transmitted to the user
using new radio link. There is no need to ush the data in MAC-hs buer. Intra-
Node B SCC has less interruption in service. An example of Intra-Node B SCC is
illustrated in gure 9.24.
Inter-Node B serving HS-DSCH cell change: In contrast to the earlier case, in this
case, the source and the target cells are controlled by two dierent Node Bs. There-
fore, when the user moves into the new cell, the unacknowledged MAC-hs buer
data at the old Node B must be ushed and the new Node B must get the same
from RNC. As expected, this causes delay and increases the service interruption
time. This mechanism is depicted in gure 9.25.
1. Intra-Node B Synchronized Serving HS-DSCH Cell Change
Figure 9.24: Intra-Node B Intra RNC Serving HS-DSCH Cell Change
Figure 9.24 illustrates an intra-Node B serving HS-DSCH cell change while keep-
ing the dedicated physical channel conguration and the active set, using the
PHYSICAL CHANNEL RECONFIGURATION procedure. The transition from source to
target HS-DSCH cell is performed in a synchronized manner, i.e. at a given activation time.
This activation time is decided by RNC and informed to Node B using NBAP: RADIO
LINK RECONFIGURATION COMMIT and RRC: PHYSICAL CHANNEL RECON-
FIGURATION.
9.11. HSDPA MOBILITY 341
In this example, it is assumed that HS-DSCH transport channel and radio bearer param-
eters do not change. If transport channel or radio bearer parameters shall be changed,
the serving HS-DSCH cell change would need to be executed by a TRANSPORT CHAN-
NEL RECONFIGURATION procedure or a RADIO BEARER RECONFIGURATION
procedure, respectively.
2. Inter-Node B Synchronized Serving HS-DSCH Cell Change
Figure 9.25: Inter-Node B Intra RNC Serving HS-DSCH Cell Change
In comparison with the intra-Node B case, the major dierence is that the source
and the target HS-DSCH cells are controlled by two dierent Node Bs, MAC-hs in source
and target Node B need to be released and setup, respectively.
The procedure can be studied in the following steps:
Step 1: SRNC establishes a new radio link in the target Node B. This process is completed
using the classical signalling of DCH soft-handover mechanism. As usual, NBAP
and RRC protocols are used by RNC to communicate with Node B and UE.
342 CHAPTER 9. SIGNALLING
Step 2: The target Node B starts transmission and reception on associated-dedicated
channels (A-DCH).
Step 3: UE sends a measurement report to SRNC and indicates the change of best cell
or Event 1d.
Step 4: RNC prepares the source-Node B for a synchronized reconguration to be exe-
cuted at a given activation time (using a sequence of 3 NBAP messages).
Step 5: RNC prepares the target-Node B for a synchronized reconguration to be exe-
cuted at a given activation time.
Step 6: Finally, SRNC sends a PHYSICAL CHANNEL RECONFIGURATION message
to the UE which indicates the target HS-DSCH cell and the activation time.
Step 7: To conclude, the UE responds with a PHYSICAL CHANNEL RECONFIGU-
RATION COMPLETE message.
If the source cell and the target cell are under the control of 2 dierent RNCs then the
situation becomes even more complex and more interesting. The implementation very
much depends on the vendors support for these advanced procedures.
If HS-DSCH over Iur is supported and soft HO for A-DCH over Iur
is also supported, it is possible to perform a serving HS-DSCH Cell Change to the
cells controlled by DRNC. From UE perspective, there is no dierence between
Intra-RNC and Inter-RNC cell change. Since there are 2 RNCs involved, planners
should take extra care while planning the parameters related to neighbouring cells.
On the contrary, if HS-DSCH over Iur is not supported or not enabled,
then the A-DCH will perform SHO with the target cell of DRNC. After receiving
an RRC: Measurement Report of event 1D, normally SRNC will perform serving
cell change but due to the lack of HS-DSCH support on Iur, a reconguration from
HS-DSCH to DCH is performed, and in the target cell UE maintains service on R99
DCH channel.
9.11.2 HS-DSCH Channel Type Switch
In this discussion, our main focus will be on the DL transport channel switch from DCH
to HS-DSCH and vice-versa. Uplink radio bearers can be congured on DCH or E-DCH
transport channels.
DCH to HS-DSCH Switch
A radio bearer reconguration from DCH to HS-DSCH can be triggered by various reasons.
Some of them are listed below:
9.11. HSDPA MOBILITY 343
If a cell that supports HSDPA and allows current RAB combination on HSDPA is
added to active set.
If the compressed mode measurements triggered a switch from HS-DSCH to DCH
and the handover was not successful, DCH can again be recongured to HS-DSCH.
If earlier HSDPA allocation was not successful due to temporary reasons (e.g., max
number of HSDPA users), and now those reasons are resolved.
If earlier HSDPA allocation was not successful because Guard Timer was running.
These guard times are used to avoid too frequent channel type switch. When the
guard timer expires, RNC tries to switch DCH to HS-DSCH.
When one of the reasons listed above triggers DCH HS-DSCH switch then RNC starts
looking for a suitable HS-DSCH target cell. After nding a suitable cell, the RNC reserves
transport resources and RNC internal hardware resources for HS-DSCH. Later radio links,
transport channel and radio bearer are recongured. Radio bearer is mapped to HS-DSCH.
After successful reconguration, the DCH resources are released and HS-DSCH-specic
measurements are congured in the UE.
HS-DSCH to DCH Switch
A radio bearer reconguration from HS-DSCH to DCH can be triggered by various reasons.
Some of them are listed below:
UE enters a new cell where HSDPA is not enabled.
If the HSDPA resources in target cell can not be allocated.
If a new RAB is established and new RAB conguration is not supported on HS-
DSCH.
If compressed mode measurements are triggered for Inter-frequency and Inter-system
measurements & system does not support CM measurements on HS-DSCH.
HS-DSCH DCH switch procedure also takes place in 2 phases. First, the RNC and
transport resources are reserved for DCH, radio links, transport channel & radio bearer
are recongured and Radio bearer is mapped to DCH. In the second phase, resources for
HS-DSCH are released & DCH-specic measurements are congured to the UE.
9.11.3 HS-DSCH IFHO and ISHO
The triggers for Inter-frequency handover and Inter-system handover are the same as for
R99 DCH channels. HSDPA does not bring any new triggers for the IFHO or ISHO. For
a quick reminder, some of them are listed below:
344 CHAPTER 9. SIGNALLING
CPICH RSCP becomes weaker than an absolute threshold (Event 1F).
CPICH Ec/No becomes weaker than an absolute threshold (Event 1F).
UE transmission power is higher than an absolute threshold (Event 6A).
UL quality is very poor.
DL DPCH Radio link power is very high.
other load based and service based triggers.
The functionality of Inter-frequency handover and Inter-system handover strongly depends
on the 2 following implementation alternatives.
If Compressed Mode for IFHO /ISHO not supported: If RNC features do not al-
low compressed mode measurements during the HS-DSCH session, HS-DSCH chan-
nel will be switched to DCH and IF-measurements/IS-measurements take place just
like in the Rel-99 case.
This method will certainly reduce the HSDPA throughput during measurement
phase. It will also cause extra delay due to unnecessary channel switching.
If Compressed Mode for IFHO/ISHO is supported: If RNC supports compressed
mode measurements during HS-DSCH conguration, it orders compressed mode on
HSDPA so that IF/IS-measurements can be performed on HSDPA without channel
type switching to DCH.
As expected, this alternative does not reduce the user throughput and it causes less
delays which speeds up the handover execution time.
9.12. HSUPA MOBILITY 345
9.12 HSUPA Mobility
9.12.1 E-DCH Soft Handover
When an E-DCH transport channel is congured for a user, its mobility is supported by
soft-handover. The measurement events related to R99 DCH soft handover signalling,
e.g., Event 1A, 1B, 1C, etc. are also valid for HSUPA. In special circumstances, it is
possible to have dierent E-DCH active set and DCH active set. Although the concept
of handover is same but it should be possible to keep dierent parameter sets for intra-
frequency measurements for DCH and E-DCH soft handover. Operators dene dierent
parameter sets and assign one set each for various service. For example, operators can
keep dierent set of parameters to control soft handover procedure for real time (RT)
services, for non-real time (NRT) services, for HSDPA services, and for HSPA services.
In E-DCH active set there is one Serving E-DCH active set and (one or more) non-
serving E-DCH cell(s). A detailed description of these terms is available in Chapter
8.
Serving E-DCH RLS: The serving E-DCH Radio Link Set contains a serving E-DCH
cell and non-serving E-DCH cell(s) under the same Node B.
Non-serving E-DCH RLS: The non-serving Radio Link Set contains those non-serving
active set cells that belong to another Node B.
9.12.2 E-DCH Serving Cell Change
E-DCH serving cell is always the same as HS-DSCH cell change. The triggering of HS-
DSCH serving cell change and the selection of HS-DSCH serving cell described in the
previous section are also valid if the UL MAC-d ows are congured on E-DCH.
9.12.3 E-DCH Channel Type Switch
In this discussion, our main focus will be on UL transport channel switch from E-DCH to
DCH and vice-versa.
If UL radio bearers are congured on E-DCH, DL must be HS-DSCH.
If the UL is on DCH, then DL can be congured on either HS-DSCH or DCH
transport channels.
346 CHAPTER 9. SIGNALLING
DCH to E-DCH Switch
The mechanism of channel type switch from DCH to E-DCH is a tool by which E-DCH
can be allocated if it was not possible in the initial channel allocation. There are several
triggers for this transition. Some of them are listed below:
Channel type switching if the UE enters an HSPA cell.
When DL DCH is recongured to HS-DSCH then RNC tries of the usage of E-DCH
is possible. If possible, then E-DCH is preferred and a transition from DCH
E-DCH is started.
When a DCH/HS-DSCH is congured and UE performs HS-DSCH serving cell
change, the RNC checks whether a DCH to E-DCH channel type switch is needed.
Whenever an E-DCH DCH channel type switch is performed, a guard timer is
set. When this timer expires, it triggers a DCH E-DCH channel type switch.
If at the initial allocation, DCH is selected because E-DCH-capable cell is very
weak compared to a non-E-DCH capable cell. An E-DCH active set can change to
acceptable if the cell not in E-DCH active set becomes weak enough or is removed
from the DCH active set. Weak enough is dened relative to the serving HS-DSCH
cell.
If initial E-DCH allocation fails, RNC can also periodically check if the usage of
E-DCH transport channel has become possible now. This is possible due to varying
cell load conditions.
There are several possibilities for UL/DL combinations for DCH E-DCH.
1. DCH/DCH HS-DSCH/E-DCH
2. HS-DSCH/DCH HS-DSCH/E-DCH
E-DCH to DCH Switch
Channel type switch from E-DCH DCH is required when E-DCH channel cannot be
maintained or its usage become inecient. There are several triggers for this switch. Some
of them are:
When the DL HS-DSCH is switched to DCH, it becomes impossible to maintain
E-DCH in UL. Therefore, a switch from E-DCH rightarrow DCH is required.
When a HS-DSCH serving cell change is triggered, RNC checks whether the target
HS-DSCH serving cell supports E-DCH and whether the proposed E-DCH active
set is acceptable. If any of these 2 checks fails, the channel type switch from E-DCH
to DCH cannot be avoided.
9.12. HSUPA MOBILITY 347
If E-DCH is used and DCH active set contains some cell(s) which are not in E-DCH
active set. If any DCH active set cell becomes stronger than the serving E-DCH cell
by a predened margin, the E-DCH active set becomes unacceptable and a switch
from E-DCH to DCH is necessary.
During HS-DSCH/E-DCH operation if UE moves to a cell where HSDPA or HSUPA
is not supported, the following channel switch are possible.
1. HS-DSCH/E-DCH HS-DSCH/DCH
2. HS-DSCH/E-DCH DCH/DCH
9.12.4 E-DCH IFHO and ISHO
The discussion about E-DCH inter-frequency handover and inter-system handover is very
similar to the one for HSDPA IF/IS HO (see section 9.11.3). Once again, the same
intra-frequency measurement events are used to trigger these hard handovers. The mea-
surements are performed in compressed mode which gives rise to 3 possibilities.
Compressed Mode not supported for HSDPA & HSUPA: If RNC features do not
allow compressed mode measurements during HS-DSCH/E-DCH session HS-DSCH/E-
DCH will be switched to DCH/DCH and IF-measurements/IS-measurements take
place just like in R99 case.
Compressed Mode for HSDPA is supported but not for HSUPA: A channel type
switch from HS-DSCH/E-DCH HS-DSCH/DCH is performed and then com-
pressed mode measurements are carried out as usual.
Compressed Mode is supported for both HSDPA & HSUPA: If RNC supports
compressed mode measurements during HS-DSCH/E-DCH conguration, measure-
ments can be performed without channel type switching to DCH.
348 CHAPTER 9. SIGNALLING
Copyright Notices
In order to create some gures, tables and text-sections, the following reference material
has been used. Information has been interpreted and presented in a simplied manner.
The original references are provided here.
Main reference material for this book has been technical specications (TSs) and technical
reports (TRs) of 3rd Generation Partnership Project (3GPP).
Figure 9.21 on page 336 Figure 54 of 3GPP TS 23.060 v 6.0.0.
Text in section 9.10 on page 335 Section 6.13.2 of 3GPP TS 23.060 v 6.0.0.
c 2003. 3GPP
TM
TSs and TRs are the property of ARIB, ATIS, ETSI, CCSA,
TTA, and TTC who jointly own the copyright for them. They are subject to
further modications and are therefore provided to you as is for information
purposes only. Further use is strictly prohibited.
Figure 9.22 on page 338 Figure 9.1-1 of 3GPP TS 25.308 v 6.3.0.
Figure 9.24 on page 340 Figure 9.3-1 of 3GPP TS 25.308 v 6.3.0.
Figure 9.25 on page 341 Figure 9.5-1 of 3GPP TS 25.308 v 6.3.0.
c 2004. 3GPP
TM
TSs and TRs are the property of ARIB, ATIS, ETSI, CCSA,
TTA, and TTC who jointly own the copyright for them. They are subject to
further modications and are therefore provided to you as is for information
purposes only. Further use is strictly prohibited.
Figure 9.1 on page 297 Figure 8.1.3-1 of 3GPP TS 25.331 v 6.9.0.
Figure 9.3 on page 299 Figure 8.2.2-1 of 3GPP TS 25.331 v 6.9.0.
Figure 9.3 on page 299 Figure 8.2.2.3 of 3GPP TS 25.331 v 6.9.0.
Figure 9.4 on page 300 Figure 24 of 3GPP TS 25.433 v 7.0.0.
c 2006. 3GPP
TM
TSs and TRs are the property of ARIB, ATIS, ETSI, CCSA,
TTA, and TTC who jointly own the copyright for them. They are subject to
further modications and are therefore provided to you as is for information
purposes only. Further use is strictly prohibited.
9.12. HSUPA MOBILITY 349
Text in section RRC Connection
on Dedicated Channels on page
302
Section 7.3.1 of 3GPP TR 25.931 v 8.0.0.
Figure 9.5 on page 301 Figure 7 of 3GPP TR 25.931 v 8.0.0.
Figure 9.6 on page 303 Figure 8 of 3GPP TR 25.931 v 8.0.0.
Figure 9.7 on page 305 Figure 8b of 3GPP TR 25.931 v 8.0.0.
Figure 9.20 on page 333 Figure 36 of 3GPP TR 25.931 v 8.0.0.
c 2008. 3GPP
TM
TSs and TRs are the property of ARIB, ATIS, ETSI, CCSA,
TTA, and TTC who jointly own the copyright for them. They are subject to
further modications and are therefore provided to you as is for information
purposes only. Further use is strictly prohibited.
BIBLIOGRAPHY
[1] 3GPP TR 21.905 ver. 8.0.0 ;Vocabulary for 3GPP Specications
[2] 3GPP TS 23.060 ver. 6.0.0 ;General Packet Radio Service (GPRS); Service descrip-
tion
[3] 3GPP TS 25.301 ver. 7.0.0 ;Radio Interface Protocol Architecture
[4] 3GPP TS 25.308 ver. 7.0.0 ;High Speed Downlink Packet Access (HSDPA); Overall
description;
[5] 3GPP TS 25.319 ver. 7.0.0 ;High Speed Uplink Packet Access (HSUPA); Overall
description
[6] 3GPP TS 25.214 ver. 7.0.0 ;Physical Layer Procedures (FDD)
[7] 3GPP TS 25.331 ver. 7.0.0 ;Radio Resource Control (RRC) protocol specication
[8] 3GPP TS 25.401 Ver. 7.0.0 ;UTRAN overall description
[9] 3GPP TS 25.413 Ver. 7.0.0 ;UTRAN Iu Interface: RANAP Signalling
[10] 3GPP TS 25.433 Ver. 7.0.0 ;UTRAN Iub Interface: NBAP Signalling
[11] 3GPP TS 25.308 ver. 7.0.0 ;High Speed Downlink Packet Access (HSDPA); Overall
description;
[12] 33GPP TR 25.931 ver. 8.0.0 ;UTRAN functions, examples on signalling procedures
[13] H.Holma and A. Toskala, WCDMA for UMTS , 5th Edition, John Wiley & Sons.
[14] H.Holma and A. Toskala, HSDPA/HSUPA for UMTS , 1st Edition, John Wiley
& Sons.
[15] Chris Johnson, Radio Access Networks For UMTS ; Principles And Prac-
tice , John Wiley & Sons.
350
CHAPTER
10
SELF TEST
In the 9 modules of this book, we learnt the essential concepts about UMTS and HSPA.
In this nal module, we should put ourself to a self-test and examine our understanding.
Therefore, I request the readers to try and independently answer these questions and solve
the exercises given in this module. You are free to refer back to the previous modules but
the only condition is do it yourself .
10.1 Module 1
Question 1.1: Arrange the following technologies in the chronological order of
their releases.
1. IMS
2. HSCSD
3. HSUPA
4. TD-SCDMA
5. GPRS
Correct Answer:
1.
351
352 CHAPTER 10. SELF TEST
2.
3.
4.
5.
Question 1.2: In one or two words, explain the highlights of each 3GPP re-
lease. Write your answers in Table 10.1.
3GPP Release Main Features or Improvements
R99
REL-4
REL-5 1.
2.
REL-6
REL-8
Table 10.1: Exercise 1.2: Highlights of few 3GPP releases
Question 1.3: Which of the following SDOs
1
are 3GPP Organizational Part-
ners?
GSMA
ETSI
TIA (USA)
TTC (JAPAN)
ATM Forum
WiMAX Forum
CCSA (China)
ARIB (Japan)
ATIS (USA)
NGMN Alliance
Correct Answer:
1.
2.
3.
1
Standards Development Organizations
10.1. MODULE 1 353
4.
5.
6.
Question 1.4: According to REL-6, the peak bitrates of HSDPA and HSUPA
are:
DL 2 Mbps and UL 2 Mbps
DL 7.2 Mbps and UL 2 Mbps
DL 14.4 Mbps and UL 2 Mbps
DL 14.4 Mbps and UL 5.8 Mbps
DL 21 Mbps and UL 5.8 Mbps
DL 42 Mbps and UL 11 Mbps
Correct Answer:

Question 1.5: All-IP solution means that we do not need to depend on the
legacy circuit switched nodes, e.g., MSC. In history, which was the rst
technology & 3GPP release allowed this scheme?
Technology: Pick one from the following options
GPRS
UMTS
HSPA
IMS
HSPA+
3GPP release: Pick one from the following options
R4
R5
R6
R7
R99
Correct Answer:
Technology:
Release:
354 CHAPTER 10. SELF TEST
10.2 Module 2
Question 2.1: According to the original GSM network architecture, the fol-
lowing subsystems are dened.
Identify the wrong options from the list of subsystems mentioned below.
Mobile station
External networks
Circuit Switched Core Network (Switching Subsystem)
Base Station Subsystem
Packet Switched Core Network (Packet Core)
Correct Answer:

Question 2.2: While in roaming, which network elements are always located
in Home PLMN?
Choose 2 options from the following list
MSC
BSC
GMSC
Transcoding Unit (TRAU)
Home Location Register (HLR)
Correct Answer:

Question 2.3: While in roaming, which network elements are always located
in Visited PLMN?
Choose 3 options from the following list
MSC
BSC
GMSC
Visitor Location Register
Home Location Register (HLR)
10.2. MODULE 2 355
Correct Answer:

Question 2.4: In GPRS roaming scenario, the SGSN of Visited PLMN and
GGSN of Home PLMN are connected via an IP backbone network known
as:
Correct Answer:

Question 2.5: In 2G and 3G, the following interfaces can be considered as


equivalent interfaces for understanding the 3G network.
Name of 2G interface Equivalent Interface
in 3G
1. A
2. Abis
3. Gb
i. Iu-PS
ii. Iu-CS
iii. Iub
Table 10.2: Exercise 2.5: Match the 2G & 3G interfaces
Correct Answer:
A:
Abis:
Gb:
Question 2.6: An IMS subscriber of PLMN A is roaming in the PLMN B.
While inviting another IMS subscriber for a multimedia session, the SIP
INVITE message will be sent to which SIP server rst?
Interrogating-CSCF of PLMN A
Interrogating-CSCF of PLMN B
Proxy-CSCF of PLMN A
Proxy-CSCF of PLMN B
Serving-CSCF of PLMN A
356 CHAPTER 10. SELF TEST
Serving-CSCF of PLMN B
Correct Answer:

10.3. MODULE 3 357


10.3 Module 3
Question 3.1: Identify the UL & DL frequency range used in UTRAN FDD
band I.
Use table 10.3 and choose the right frequency ranges.
Uplink Freq. Downlink Freq.
832 - 862 MHz 791 - 821 MHz
1710-1785 MHz 1805-1880 MHz
1920-1980 MHz 2110 -2170 MHz
1710-1755 MHz 2110-2155 MHz
1850 -1910 MHz 1930 -1990 MHz
1710-1770 MHz 2110-2170 MHz
Table 10.3: Exercise 3.1: Identify UTRAN FDD Band I
Correct Answer:

Question 3.2: The code which provides processing gain is called:


Gold Code
Long Code
Pseudo-Random Noise
Channelization code
Scrambling Code
Correct Answer:

Question 3.3: The spreading principle allows us to get variable bit rate by
using variable spreading factors.
Choose the 2 correct statements from the following list:
1. As SF increases, the required transmission power decreases.
2. As SF increases, the required transmission power also increases.
3. As SF increases, the service bit rate decreases.
4. As SF increases, the service bit rate also increases.
Correct Answer:
358 CHAPTER 10. SELF TEST

Question 3.4: How many scrambling codes are available?


Choose the correct answer from the following list:
1. Millions of codes in UL & DL
2. 256 codes in UL & DL
3. 512 in UL & DL
4. Millions in UL and 512 in DL
Correct Answer:

Question 3.5: 512 DL scrambling codes are organized into 64 SC groups of 8


codes. If two WCDMA cells belong to the same group, which channel
will broadcast the identical information in the 2 cells:
Choose the correct answer from the following list
1. DL DPCH
2. P-CCPCH ( Broadcast channel)
3. P-SCH & S-SCH (Pri- & Sec-Synchronization channel)
4. P-CPICH (Primary Common Pilot channel)
Correct Answer:

Question 3.6: Two Voice users in the same WCDMA cells must use dierent
combination of channelization and scrambling codes.
From the list below, select the two codes that must be dierent?
1. Channelization Codes in UL
2. Channelization Codes in DL
3. Scrambling Codes in UL
4. Scrambling Codes in DL
Correct Answer:

10.3. MODULE 3 359


Question 3.7: The physical layer process which tries to convert a burst of
errors into random errors is called:
1. Segmentation
2. CRC attachment
3. Interleaving
4. Turbo decoding
Correct Answer:

360 CHAPTER 10. SELF TEST


10.4 Module 4
Question 4.1: The mapping of logical channels onto transport channels is
performed by:
1. RLC layer in Node B
2. MAC layer in Node B
3. RLC layer in RNC
4. MAC layer in RNC
5. RRC layer in RNC
Correct Answer:

Question 4.2: Non-real time (NRT) service with very small bit rate can be
transported on the following channels:
Choose the 2 options.
1. P-CCPCH (BCH)
2. PRACH (RACH)
3. DPCH (DCH)
4. PCCH (PCH)
5. S-CCPCH (FACH)
Correct Answer:

Question 4.3: Some channels are unidirectional (either in UL or in DL but not


both) and some channels are bidirectional.
Identify the transport channel which is bidirectional.
1. BCH
2. PCH
3. FACH
4. RACH
5. DCH
Correct Answer:
10.4. MODULE 4 361

Question 4.4: Just before decoding S-CCPCH and reading the paging request,
UE must read following physical channel.
Select one answer from the following list:
1. RACH
2. DPCH
3. PICH
4. FACH
5. CPICH
Correct Answer:

Question 4.5: For the same Spreading Factor (SF), the UL and DL bit rates
are dierent.
What is the reason for it?
1. Channel coding rate is dierent in UL & DL
2. Modulation Scheme is dierent in UL & DL
3. UL & DL use two dierent types of Spreading codes
4. The rate dierence is due to scrambling code
Correct Answer:

Question 4.6: In Cell Search procedure, select the order in which the following
physical channels are used by UE.
1. P-CPICH
2. P-SCH
3. S-CCPCH
4. P-CCPCH
5. S-SCH
6. E-HICH
7. DPCH
Correct Answer:
362 CHAPTER 10. SELF TEST
1.
2.
3.
4.
10.5. MODULE 5 363
10.5 Module 5
Question 5.1: Which RRM algorithms makes sure that the interference in the
cell remains under controllable limits?
Choose 2 answers:
1. Code Allocation
2. BTS Site Manager
3. Admission Control
4. Congestion Control
5. Handover Control
6. Power Control
Correct Answer:

Question 5.2: In CDMA networks, the UL cell load is measured in reference


to the:
1. Max. UL Power of UE
2. Max. DL power of Node B
3. UL noise oor when the cell is unloaded
4. Power received at the receiver of UE
5. UE receivers sensitivity
Correct Answer:

Question 5.3: When does the admission control algorithm in UMTS get in-
voked?
Name any 3 scenarios.
Correct Answer:

364 CHAPTER 10. SELF TEST


Question 5.4: In RF optimization, we often hear about the code congestion
or code blocking.
Which codes are scarce resources and often cause blocking?
1. DL Scrambling Code
2. DL Channelization Code
3. UL Scrambling code
4. UL Channelization Code
Correct Answer:

Question 5.5: Which RRC Connected mode states are the power saving stand
by states?
Choose only one answer.
1. CELL DCH
2. CELL FACH
3. CELL PCH only
4. CELL PCH & URA PCH
Correct Answer:

Question 5.6: Which statements about Open Loop Power Control (OLPC) are
true?
Choose only two correct statements.
1. Open Loop Power Control (OLPC) works on PRACH channel.
2. Node B sends feedback so that UE can adjust its power of RACH preambles.
3. OLPC is also used on DL physical channels.
4. OLPC suggests that initial preamble transmit power should be directly pro-
portional to the path-loss.
5. OLPC takes place 1500 times in one second.
Correct Answer:

10.5. MODULE 5 365

Question 5.7: Which statements about Inner Loop & Outer Loop Power Con-
trol are true?
Choose 5 correct statements.
1. Inner Loop & Outer Loop PC work in parallel.
2. Inner Loop PC tries to adjust the Tx power in order to reach the desired SIR
(Target SIR).
3. Outer loop PC tries to adjust the Target SIR in order to reach the desired
BLER (Target BLER).
4. Inner loop takes place between UE and RNC.
5. Outer loop takes place between Node B and UE.
6. Inner loop takes place between Node B and UE.
7. Outer loop takes place between Node B and RNC.
Correct Answer:

Question 5.8: In response to a PRACH preamble, if UE received no positive


or negative acquisition indicator (AI = +1 nor -1), UE will send the next
preamble with higher power. Will the signature used in next preamble
be the same as original?
Choose 1 correct statements.
1. Same signature will be used.
2. A new signature will be randomly selected.
Correct Answer:

Question 5.9: Which of the following events will trigger an Inter-frequency or


Inter-System HO from an UTRAN cell?
Choose only 1 correct option.
366 CHAPTER 10. SELF TEST
1. Event 1A
2. Event 1B
3. Event 1C
4. Event 1D
5. Event 1E
6. Event 1F
Correct Answer:

Question 5.10: Which event is used to inform RNC that compressed mode
measurements can be aborted because UE is again in suitable 3G cover-
age?
Choose only 1 correct option.
1. Event 1A
2. Event 1B
3. Event 1C
4. Event 1D
5. Event 1E
6. Event 1F
Correct Answer:

Question 5.11: Which compressed mode method suits the requirements of


real-time services like Voice call?
Choose only 1 correct option.
1. SF-halving (SF/2) method
2. Higher Layer Scheduling Method (HLS)
3. Puncturing
Correct Answer:

10.6. MODULE 6 367


10.6 Module 6
Question 6.1: Access Stratum Protocol for the signalling between UE and
RNC is known as:
Choose 1 answer:
1. NBAP
2. RANAP
3. RRC
4. ATM
5. SS7
6. GTP
Correct Answer:

Question 6.2: Access Stratum Protocol for the signalling between RNC and
Core Network is known as
Choose 1 answer:
1. NBAP
2. RANAP
3. RRC
4. ATM
5. SS7
6. GTP
Correct Answer:

Question 6.3: Scope of Radio Access Bearer (RAB) is to dene the Quality of
Service between:
Choose 1 answer:
1. UE & Node B
2. UE & RNC
3. UE & Core Network
4. UE & External Server
368 CHAPTER 10. SELF TEST
Correct Answer:

Question 6.4: Which protocols can be described as NAS protocols:


Choose 1 answer:
1. NBAP
2. RANAP
3. RRC
4. Mobility Management
5. SS7
6. GTP
Correct Answer:

Question 6.5: Which radio protocol is used in IP-based user plane and per-
forms IP header compression?
Choose 1 answer:
1. NBAP
2. RANAP
3. RRC
4. Mobility Management
5. PDCP
6. BMC
Correct Answer:

Question 6.6: RRC is perhaps the most important protocol in UTRAN.


List at least 4 functions of RRC protocol.
Correct Answer:
1.
2.
3.
4.
10.7. MODULE 7 369
10.7 Module 7
Question 7.1: According to Release 6, the following modulations can be used
for DL HSDPA transmission.
Choose only 1 answer:
1. QPSK only
2. QPSK & BPSK
3. QPSK & 16QAM
4. QPSK, 16QAM & 64QAM
Correct Answer:

Question 7.2: RNC forwards the buered MAC-d PDUs to Node B in a con-
trolled manner. This procedure is called:
1. Transmission Control
2. Data Stream Control
3. Overload Control
4. Flow Control
Correct Answer:

Question 7.3: According to the CQI tables A and G, at which CQI, the
modulation is switched to a better modulation scheme?
1. 10 & 18
2. 15 & 23
3. 16 & 26
4. 16 & 21
Correct Answer:

Question 7.4: From network operations viewpoint, which re-transmissions are


more expensive?
1. MAC layer retransmission
370 CHAPTER 10. SELF TEST
2. RLC layer retransmission
3. RRC layer retransmission
Correct Answer:

Question 7.5: Very smart re-transmission techniques are used in HSDPA (&
HSUPA):
Name the two H-ARQ schemes dened for HSDPA.
Correct Answer:

Question 7.6: Match the name of HSDPA-specic physical channel with their
spreading factor.
Name of Physical
Channel
Spreading Factor
1. HS-DPCCH
2. HS-SCCH
3. HS-PDSCH
i. 16
ii. 256
iii. 128
Table 10.4: Exercise 7.6: Match the SF to the channel name
Correct Answer:
1. HS-DPCCH:
2. HS-SCCH:
3. HS-PDSCH:
Question 7.7: In Rel-6 onwards, why 3GPP recommends using F-DPCH in-
stead of DL A-DCH?
Choose only 1 correct answer:
1. F-DPCH uses smart power control.
2. F-DPCH uses 64QAM modulation and improves the bit rates of associated
channels.
10.7. MODULE 7 371
3. F-DPCH allows multiplexing several HSDPA users on one code and solves code
congestion.
4. F-DPCH has no benet compared to DL A-DCH.
Correct Answer:

Question 7.8: Arrange the following HSDPA UEs according to their peak bit
rate capabilities.
1. 10
2. 12
3. 6
4. 14
5. 16
Correct Answer:
1.
2.
3.
4.
5.
372 CHAPTER 10. SELF TEST
10.8 Module 8
Question 8.1: A HSUPA-capable device can use the following combinations
of UL & DL transport channels for sending & receiving user data.
Fill your answers in table 10.5:
Correct Answer:
# UL Transport Channel DL Transport Channel
1.
2.
3.
4.
Table 10.5: Exercise 8.1: Transport channel for carrying DTCH logical channel in
UL & DL
Question 8.2: In an HSUPA-capable UE, the user data is processed by three
MAC layers before being delivered to the physical layer.
Choose the correct sequence. (Note! The question is based on the processing on the
UE side).
1. MAC-e MAC-es MAC-d
2. MAC-d MAC-es MAC-e
3. MAC-d MAC-e MAC-es
Correct Answer:
1.
Question 8.3: In Table 10.6, match the transport channel with their corre-
sponding TTI lengths.
Transport Channel TTI length
1. DCH
2. E-DCH
3. HS-PDSCH
i. 2 ms
ii. 10 to 80 ms
iii. 2 ms & 10 ms
Table 10.6: Exercise 8.3: Match the TTI length to the channel name
Correct Answer:
10.8. MODULE 8 373
1. DCH
2. E-DCH
3. HS-PDSCH
Question 8.4: The set of those cells which are in E-DCH Active Set but not
controlled by the same Node B as the serving E-DCH serving cell are
called:
1. Secondary Cells
2. Interfering Cells
3. Non-serving Radio Link Set Cells
4. E-DCH Diversity Cells
Correct Answer:

Question 8.5: How many E-DCH users can be present in a cell where only
one channelization code is reserved for E-RGCH & E-HICH channels?
Hint! There are only 40 Signature sequences dened by 3GPP.
1. 10
2. 20
3. 40
4. 72
Correct Answer:

Question 8.6: How many E-DPDCH physical channels must be transmitted


from a UE to achieve the peak bit rate of 5.76 Mbps?
1. 2
2. 4
3. 6
4. 8
5. 16
Correct Answer:

374 CHAPTER 10. SELF TEST


Question 8.7: The Absolute Grant channel carries a Grant value which de-
scribes the power of E-DPDCH in reference to:
1. DPCCH Power
2. DPDCH Power
3. HS-DPCCH power
4. E-DPCCH Power
5. Thermal Noise Power
Correct Answer:

Question 8.8: In a cell, the E-DCH Relative Granch Channel (E-RGCH) oc-
cupies a single 2 ms sub-frame:
Choose one correct statement from the following options:
1. This cell belongs to Serving E-DCH Radio Link Set
2. This cell belongs to Non-serving E-DCH Radio Link Set
3. Cannot be answered because information provided is not enough
4. None of the above
Correct Answer:

Question 8.9: In a cell, the E-DCH Relative Granch Channel (E-RGCH) oc-
cupies four consecutive sub-frames:
Choose one correct statement from the following options:
1. This cell belongs to Serving E-DCH Radio Link Set
2. This cell belongs to Non-serving E-DCH Radio Link Set
3. Cannot be answered because information provided is not enough
4. None of the above
Correct Answer:

Question 8.10: In a cell, the E-DCH Relative Granch Channel (E-RGCH)


occupies a ve consecutive sub-frames:
Choose one correct statement from the following options:
10.8. MODULE 8 375
1. This cell belongs to Serving E-DCH Radio Link Set & E-DCH TTI =
2ms.
2. This cell belongs to Non-serving E-DCH Radio Link Set & E-DCH TTI
= 10 ms.
3. This cell belongs to Non-serving E-DCH Radio Link Set & but TTI
cannot be determined from the information provided.
4. This cell belongs to Serving E-DCH Radio Link Set & but TTI cannot be
determined from the information provided.
Correct Answer:

Question 8.11: In a cell, for E-DCH H-ARQ Indication Channel (E-HICH)


Negative Acknowledgement (NACK) is coded as -1:
Choose one correct statement from the following options:
1. This cell belongs to Serving E-DCH Radio Link Set.
2. This cell belongs to Non-serving E-DCH Radio Link Set.
3. It cannot be determined from the information provided.
4. None of above.
Correct Answer:

376 CHAPTER 10. SELF TEST


10.9 Module 9
Question 9.1: An NAS signalling connection between UE and Core Network
is composed of 2 parts.
Choose the two items from the following list which constitute an NAS signalling
Connection.
1. RRC Connection
2. Radio Access Bearer
3. Iu Connection
4. GTP tunnel
5. Active Set
Correct Answer:

Question 9.2: RRC Connection Establishment pushes a UE from RRC IDLE


mode to RRC Connected Mode. From IDLE Mode, UE can enter the following
states of connected mode.(Choose 2 answers):
1. CELL PCH
2. CELL DCH
3. CELL FACH
4. URA PCH
Correct Answer:

Question 9.3: The procedure of getting a UE registered in SGSN is known as:


Choose only 1 answer:
1. PS REGISTRATION
2. PS SIGNUP
3. GPRS ATTACH
4. PDP Context Setup
Correct Answer:
10.9. MODULE 9 377

Question 9.4: The procedure by which a UE establishes a connection to some


external packet data network is known as:
Choose only 1 answer:
1. PS CONNECT
2. IP packet forwarding
3. PDP Context Activation
4. Cell Reselection
5. DIAMETER Routing
Correct Answer:

Question 9.5: Which statement is true for HSDPA and HSUPA mobility:
Choose only 2 answers:
1. HSDPA supports Soft Handover but HSUPA does not.
2. Both HSDPA & HSUPA support Soft Handover.
3. HSDPA supports Hard Handover known as Serving Cell Change.
4. HSUPA supports Soft Handover.
5. In HSUPA, when a user moves to a new cell, it performs cell reselection.
Correct Answer:

INDEX
16QAM, 21, 207, 214, 231, 232, 247
3GPP Releases, 18, 20, 22
R99 to REL-10, 19
3rd Generation Partnership Project (3GPP),
14
3rd Generation Partnership Project 2 (3GPP2),
15
4 Pulse Amplitude Modulation (4PAM, 253,
261, 262
64QAM, 21, 22, 207, 214, 230232, 237
, 20, 39
Absolute grant, 264, 268
Acquisition indication channel (AICH), 76,
99, 102, 146
Adaptive Modulation and Coding, 211, 247
Admission control, 45, 118, 119, 126, 129,
130, 159
ALCAP, 172, 174, 304, 323
AMPS, 4
Authentication Center, 31
Background class, 178
Base Station Subsystem, 26
BCCH, 84, 85, 87, 99
Binary Phase Shift Keying (BPSK), 79, 247,
253, 261, 262, 264
BSS, 27
BTS, 28
Call State Control Function (CSCF), 55
Interrogating - , 56
Proxy - , 56
Serving - , 56
CAMEL, 33
CCCH, 85, 93, 197, 302
Cell search, 109
CELL DCH, 138
Cell DCH, 139
CELL FACH, 138
Cell FACH, 139143
CELL PCH, 138
Cell PCH, 139, 142, 143
Channel Quality Indicator (CQI), 137, 206,
207, 213216, 224, 226, 228
Channelization code, 72, 73, 88, 98, 117,
133, 134, 232, 234, 262, 267, 291,
292, 303
compressed mode, 166
Conversational class, 177
Core Network, 26
CTCH, 85
DCCH, 85, 250, 251, 297, 302, 304, 309
378
INDEX 379
DECT, 17
Dedicated physical channel for HSDPA, 134,
226, 290
DTCH, 85, 86, 93, 135, 250, 251, 309
Dual-Carrier HSDPA, 212
Dual-Carrier HSUPA, 22, 253
E-DCH Absolute Grant Channel (E-AGCH),
264, 268, 277, 292
E-DCH Hybrid-ARQ Indication Channel (E-
HICH), 267, 268, 270, 274, 281, 282,
292
E-DCH Relative Grant Channel (E-RGCH),
266268, 274, 277, 292
E-DCH Transport Format Combination In-
dicator (E-TFCI), 263
EIR, 31
Enhanced Cell FACH, 21
Enhanced Data rates for GSM Evolution (EDGE),
9
Event
1A, 158
1B, 159
1C, 160
1E, 163
1F, 162
2A-2F, 164
3A-3D, 165
First Generation (1G), 4
Frame synchronization, 109
Gateway GPRS Support Node, 39, 41, 58
General Packet Radio Service (GPRS), 9
GMSC, 29
GSM, 5
Handover, 28, 118, 154
Hard, 47, 155
Inter-frequency, 156
Inter-System, 156
Intra-frequency, 155
Soft, 48, 155
Softer, 155
High Speed Circuit Switched Data (HSCSD),
8
High Speed Downlink Shared Channel, 232
High Speed-Physical Downlink Shared Chan-
nel, 228, 229, 232, 292
HSDPA, 1922, 54, 68, 83, 111, 118, 134,
135, 137, 204, 205, 209, 211, 213,
221, 224226, 245248, 251, 273, 292
HSPA, 295
HSUPA, 21, 83, 113, 118, 137, 206, 207, 245,
247, 248, 251, 253, 254, 292
IMEI, 27, 31
IMSI, 27
IMT-2000, 66
Interactive class, 178
IP Multimedia Subsystem (IMS), 55
IS-95, 6
Macro Diversity Combining, 157
MC-CDMA or CDMA2000, 17
MDC, 157
Medium Access Control (MAC), 86
Mobile Station, 26
MSISDN, 27
Open Loop Power Control, 93
P-CPICH, 90
PCCH, 85, 88
Physical Channels, 88
Physical layer, 89
Pilot bits, 154
Primary Synchronization Codes (PSC), 95
Radio Access Bearer, 296
Radio Bearer, 296
Radio Link, 296
Radio Network Temporary Identity
Cell, C-RNTI, 303
E-DCH, E-RNTI, 264
HS-DSCH, H-RNTI, 231
UTRAN, U-RNTI, 303
Radio Resource Management (RRM), 117
RRC Connection, 296
380 INDEX
RRM, 118, 121123, 126, 133, 134, 144, 155,
259
Scrambling code, 73, 75, 76, 79, 88, 96, 98,
109, 110, 117, 125, 132134, 289,
303, 304, 325
scrambling code, 79
Scrambling Code Group, 96
Scrambling code group, 76
Second Generation (2G), 5
Secondary Synchronization Codes (SSC), 96
Serving GPRS Support Node, 37, 38, 41, 58
serving HS-DSCH cell, 239
Shared Control Channel for HSDPA, 225,
227, 230232, 292
SIB, 99
SIM, 27
Slot synchronization, 109
Streaming class, 178
Switching Subsystem, 26
TFCI, 106
Third generation (3G), 11
Trac Class, 177
Transport Format Combination Indicator (TFCI),
107
UE Categories
E-DCH, 251, 252
HS-DSCH, 206, 214
URA PCH, 138, 140, 141
UTRA FDD, 17
UTRA TDD, 17
UTRAN, 82
VLR, 29
WiMAX, 17
WRC-92, 66
Zero
th
Generation (0G), 4

You might also like