You are on page 1of 0

Wireless Curriculum Development Section

Wireless Curriculum Development Section Wireless Curriculum Development Section


ISSUE ISSUE
ORG07602 CDMA 1X PN Offset Planning ORG07602 CDMA 1X PN Offset Planning
ORG07602 CDMA 1X PN Offset Planning
2.1 2.1
Confidential Information of Huawei.
No Spreading without Permission.
Security Level: Internal
2
Course Contents
Course Contents
Chapter 1 PN Offset Planning
Chapter 2 PN Assignment
Chapter 3 Neighbor Cell Planning
Confidential Information of Huawei.
No Spreading without Permission.
Security Level: Internal
3
Why PN Offset Planning?
Limited PN offsets. There are 512 sequences with different offsets
available at the most, so it is necessary to plan the applications of PN
offsets in a way that there should not be PN confusion.
Although all BTSs use different PN offsets, but because of
propagation delay (neighbor PN offset interference) and the
insufficient PN offset reuse distance may intervene the original
signal. In this scenario the MS may be handed over to a wrong cell, or
even communication can be dropped in severe cases.
PN
x
PN
y
PN
z
PN
x
PN
y
PN
z
Confidential Information of Huawei.
No Spreading without Permission.
Security Level: Internal
4
In a real network, the number of PN phase offsets available to the system is
determined by the system parameter :PILOT_INC.
Available PN offset Number 512 + PILOT_INC
The smaller the parameter PILOT_INC is, the larger the number of available pilot
phase offsets. That is the reuse distance between pilots in the same phase will
increase, so the interference between reuse pilots in the same phase is decreased.
However, in this case, the small offset values may result in the pilot confusion.
But when PILOT_INC is large:
The number of pilot phase offsets available decreases
The number of pilots in the remain set decreases
The time for MS scanning pilots decreases accordingly
The probability of loss of strong pilot signals decreases
The reuse distance between pilots in the same phase decreases
The interference between reuse pilots in the same phase intensifies
PN Offset Planning
Confidential Information of Huawei.
No Spreading without Permission.
Security Level: Internal
5
Calculation of Lower Limit of PILOT_INC
Suppose there are two cells with different PN offsets, with
time delay from the BTS to the MS, respectively.
Its been proved when , two signals will have the same
offset after they arrive at the MS through the air transmission (although
they have different offset at the point of origination. This cause for the
interference.
Confidential Information of Huawei.
No Spreading without Permission.
Security Level: Internal
6
Calculation of Lower Limit of PILOT_INC
Suppose the pilot in Cell2 does not interfere in Cell1. The strength of pilot signal
received by MS from cell2 in Cell1 is lower than the T (dB), when
P2 dB
P1 dB
r2
chips
r1
chips
Confidential Information of Huawei.
No Spreading without Permission.
Security Level: Internal
7
Suppose P
1
=P
2
and the path loss is
Where d is the distance from BTS to MS. Consider the borders where
interference exists: when the MS is on the border of Cell1, the signals in
the service cell is weakest and most susceptible to interference,
meanwhile, the size of the search window is set in this way that the pilots
in Cell2 go into this search window. It can be concluded by
Where is the attenuation slope of radio wave in the air transmission,
usually = 4.3 for densely populated urban areas, and =3.84 for suburb
areas. T is related to system parameters such as T_ADD and T_DROP,
usually T = 24~27dB; s
1
A
is half the search window of the active set; is
the delay from BTS to MS and =cell radius (chip) in the case of direct
transmission.
P I L O T _ I N C
( 10
T
10

1) 1

s
1
A
64


1
1
Calculation of Lower Limit of PILOT_INC
Confidential Information of Huawei.
No Spreading without Permission.
Security Level: Internal
8
Calculation of Lower Limit of PILOT_INC
In a densely populated urban area, consider R = 500m (approximately 2chips):
Coverage radius (m)
R (chips) Size of search window (chips) S
1
A
(chips) PILOT_INC Lower limit of PILOT_INC Available PN offset
500 2.048 4 2 0.17893832 1 512
500 2.048 6 3 0.19456332 1 512
500 2.048 8 4 0.21018832 1 512
500 2.048 10 5 0.22581332 1 512
500 2.048 14 7 0.25706332 1 512
500 2.048 20 10 0.30393832 1 512
500 2.048 28 14 0.36643832 1 512
500 2.048 40 20 0.46018832 1 512
500 2.048 60 30 0.61643832 1 512
500 2.048 80 40 0.77268832 1 512
500 2.048 100 50 0.92893832 1 512
500 2.048 130 65 1.16331332 2 256
500 2.048 160 80 1.39768832 2 256
500 2.048 226 113 1.91331332 2 256
500 2.048 320 160 2.64768832 3 170
500 2.048 452 226 3.67893832 4 128
Confidential Information of Huawei.
No Spreading without Permission.
Security Level: Internal
9
Calculation of Lower Limit of PILOT_INC
In an open propagation environment, take R =10km (approximately 41chips) for
example. It can be obtained according to the above conclusion
The above table shows that when r =10km, SRCH_WIN_A =6 (the size of search window of the active set is
28chips), PILOT_INC is greater than or equal to 3.5576, that is, PILOT_INC=4.
Coverage radius (km)
R (chips) Size of search window (chips) S
1
A
(chips) PILOT_INC Lower limit of PILOT_INC Available PN offset
10 40.96 4 2 3.370107622 4 128
10 40.96 6 3 3.385732622 4 128
10 40.96 8 4 3.401357622 4 128
10 40.96 10 5 3.416982622 4 128
10 40.96 14 7 3.448232622 4 128
10 40.96 20 10 3.495107622 4 128
10 40.96 28 14 3.557607622 4 128
10 40.96 40 20 3.651357622 4 128
10 40.96 60 30 3.807607622 4 128
10 40.96 80 40 3.963857622 4 128
10 40.96 100 50 4.120107622 5 102
10 40.96 130 65 4.354482622 5 102
10 40.96 160 80 4.588857622 5 102
10 40.96 226 113 5.104482622 6 85
10 40.96 320 160 5.838857622 6 85
10 40.96 452 226 6.870107622 7 73
Confidential Information of Huawei.
No Spreading without Permission.
Security Level: Internal
10
Principle of PN Offset Reuse
The minimal phase spacing of the PN offsets between two pilots
determines the lower limit of PILOT_INC. First, consider the factors
that restrict the minimal phase spacing between two pilots.
There should be some phase spacing between different PN, mainly
based on the following principle:
When a pilot with different PN offset in a different sector appears in the active
search window for this offset, interference on the current sector should be less
than a threshold.
For the reuse distance between two BTSs with same PN, consider:
The interference of the cell with the same PN offset on the current sector should
be less than threshold.
Confidential Information of Huawei.
No Spreading without Permission.
Security Level: Internal
11
Reuse of PN Offsets
Suppose the pilots in Cell3 do not interfere in Cell1. The strength of pilot
signals received by MS from Cell3 in Cell1 is lower than the strength of
T(dB), when
Confidential Information of Huawei.
No Spreading without Permission.
Security Level: Internal
12
Reuse of PN Offsets
Suppose P
1
=P
3
, then,
Consider the borders where interference exists. When the MS is at the edge of Cell1 and is on
the common boundary of Cell1 & Cell3, the signals from the service cell is weakest than the
signals in the remote interference cell this makes MS most susceptible to interference. That is,
d
1
=r
1
, d
3
=D-d
1
, we can obtain
Confidential Information of Huawei.
No Spreading without Permission.
Security Level: Internal
13
Reuse of PN Offset
For densely populated area, 4.3
For urban area, 3.84.
In the typical CDMA system, usually T=24dB.
Considering the same cell radius r, we can obtain:
Where r is the cell radius in chips.

Confidential Information of Huawei.


No Spreading without Permission.
Security Level: Internal
14
Course Contents
Course Contents
Chapter 1 PN Offset Planning
Chapter 2 PN Assignment
Chapter 3 Neighbor Cell Planning
Confidential Information of Huawei.
No Spreading without Permission.
Security Level: Internal
15
PN Assignment Strategy 1
23
8
31
17
2
25
37
30
15
1
24
9
32
7
33
18
4
27
12
35
10
26
11
34
20
5
28
3
37
22
8
31
16
2
14
34
19
5
28
13
36
11
27
12
35
21
6
29
4
25
33
14
20
33
19
6
20
25
14
6
19
2 2
j j i i N + + =
n
n+1
Number Scheme for cell:
2
1
0
INC PILOT N PN _ =
INC PILOT N PN _ ) 43 ( + =
INC PILOT N PN _ ) 86 ( + =
In this strategy, we suppose PILOT_INC=4,
so there are 128 Available PN offsets.1
cluster has 37 cells (i=3 ,j=4 & N=37). The
topology of cell is shown as left figure. If
3-direction BTS is adopted ,PN allocation
is shown as following figure.
Confidential Information of Huawei.
No Spreading without Permission.
Security Level: Internal
16
We suppose PILOT_INC=4, so there are 128 Available PN offsets. Divide the 128 PN offsets
into four (sub-clusters). In the following table a PN assignment scheme is presented
Cluster Sector Group1 Group2 Group3 Group4 Group5 Group6 Group7 Group8 Group9 Group10 Group11
1 4 20 36 52 68 84 100 116 132 148 164
2 172 188 204 220 236 252 268 284 300 316 332 1
2
3
4
3 340 356 372 388 404 420 436 452 468 484 500
1 8 24 40 56 72 88 104 120 136 152 168
2 176 192 208 224 240 256 272 288 304 320 336
3 344 360 376 392 408 424 440 456 472 488 504
1 12 28 44 60 76 92 108 124 140 156
2 180 196 212 228 244 260 276 292 308 324
3 348 364 380 396 412 428 444 460 476 492
1 16 32 48 64 80 96 112 128 144 160
2 184 200 216 232 248 264 280 296 312 328
3 352 368 384 400 416 432 448 464 480 496
PN Assignment Strategy 2
Confidential Information of Huawei.
No Spreading without Permission.
Security Level: Internal
17
The PN offset planning in Sub_cluster is:
PN Assignment Strategy 2
Confidential Information of Huawei.
No Spreading without Permission.
Security Level: Internal
18
Example of PN Assignment
Confidential Information of Huawei.
No Spreading without Permission.
Security Level: Internal
19
Method for PN Offset Planning in Practical Network
During PN assignment, try to separate same PNs as far as possible.
Case1: D=12R & 14R. (D: reuse distance, R: coverage radius of cell, suppose the coverage radius of all
cells are the same)
Confidential Information of Huawei.
No Spreading without Permission.
Security Level: Internal
20
Method for PN Offset Planning in Practical Network
Case2: 15.2R & 12R, nearest distance between neighbor PNs is 6R. That completely meets the
requirement that is the reuse distance D>=6R. (D: reuse distance, R: coverage radius of cell, suppose
the coverage radius of all cells are the same)
Confidential Information of Huawei.
No Spreading without Permission.
Security Level: Internal
21
Method for PN Offset Planning in Practical Network
Case3: D=12R or 13.4R (D: reuse distance, R: coverage radius of cell, suppose the coverage radius of
all cells are the same)
Confidential Information of Huawei.
No Spreading without Permission.
Security Level: Internal
22
Course Contents
Course Contents
Chapter 1 PN Offset Planning
Chapter 2 PN Assignment
Chapter 3 Neighbor Cell Planning
Confidential Information of Huawei.
No Spreading without Permission.
Security Level: Internal
23
Objective
Make sure that the MS on the border of the cell
can be timely handed over to the neighbor cell
where the signals are of high quality to ensure the
call quality and the performance of the entire
network
Confidential Information of Huawei.
No Spreading without Permission.
Security Level: Internal
24
Neighbor Cell Assignment
The geographically adjacent cells are defined as neighbor cells
In general, neighbor cells are mutually defined but for specific cases a
single sided neighbor cell also can be defined
In urban and densely populated areas, more neighbor cells are required.
An IS95 MS supports 20 PNs at most and an IS2000 MS supports 40 PNs
at most. Therefore, during neighbor cell definition, only configure the
necessary neighbor cells.
BTS in a suburb area, the geographically neighbor cells are considered as
neighbor cells to guarantee a timely handoff, even though the distance
between BTS is very long.
Confidential Information of Huawei.
No Spreading without Permission.
Security Level: Internal
25
Priorities of Neighbor Cell
IS95A MS supports 20 neighbor cells, while the IS2000 MS
supports 40, at the most. When there exist many branches during
conversation, the neighbor cell relationship issued to the MS by
BSC will merge the neighbor cell relationships of these branches.
When the number of the merged neighbor cells exceeds the
above limit, the excessive neighbor cells will be discarded.
Therefore, if no priority is set for the neighbor cells, the random
arrangement of neighbor cells may result in the loss of some
important neighbor cells.
Confidential Information of Huawei.
No Spreading without Permission.
Security Level: Internal
26

You might also like