You are on page 1of 308
Mastering TD-LTE Air Interface '$Sieéns Avi a eas 2100 Lakeside Blvd, Suite 300 Richardson, Tk 75082 Phone: +1.972.664.0727 Fax +1972.664.0729 Iyou have any questions, concerns or comments regarding this course please write to us at {frlends@awardsolutions.com © 2012 Award Solutions, Inc. All rights reserved, This course book and the material and information contained init (‘course material) are ‘owned oy Award Solutions, Inc. "Award". The course material shall not be modified, reproduced, disseminated, or transmitted by or in any medium, form, or means, electronic or mechanical, including photocopying. recording, or any information retrieval system, in whole or in par, without the prior express ‘written consent of Award. The unauthorized use, modification, reproduction, dissemination or transmission of ‘the course material, in whole or in pat is strictly prohibited This course book is designed to be distributed as a student guide with the courses taught by Award’s authorized employees and contractors. It is not designed to be a standalone text book. Award makes no representations of warranties and disclaims all implied warranties with respect to the information contained herein of products derived from use of such information and undertakes no obligation to update or otherwise ‘modify the information orto notify the purchaser or user of any update or obsolescence. Awards total liability, in connection with the course material is the amount actually feceived by Award from the purchaser/user for the purchase of the course material. BL Ite @ laee Gevenaricn ‘The GPP and LTE logos are the property of Third Generation Partnership Project (SGPP). The 3GPP2 logo Is property of Third Generation Partnership Project (2GPP2) and its organization partners. The content ofthis ‘document is based on 3GPR/LTE and 3GPP2 specifications which are available at www.3g0p.0rg, and www. 3002.0. Award Solutions, Inc. provides exceptional taining and consulting in advanced wireless and Internet technologies. Our proven experience enables us to offer a complete suite of services: Cutting edge technology training, customized ‘raining solutions, and advanced technology consulting, ‘Our products and services provide our clients with innovative, flexible, and costeffective solutions that help rapidly boost workforce productivity and competence to ‘more quickly meet markat demands, Our areas of expertise include’ + Technology for Business + WiMAX + Emerging Trends + te &ANEV-DO + ue + GSM & GPRS/EDGE + IP Convergence &IMS + Wireless Fundamentals + UMTS/HSPA/HSPA+ ‘The level of technical depth in our training courses gives students unique benefits that they can apply immediately. ‘We offer a range of courses appropriate for audiences heeding a high-level overview, as well as engineers looking, Tor technical detals Knowledge Services Asa knowledge-based company, Avard Solutions is. recognized for Being the expert, and equipping each cllent to "become an expert." Our instructors and consultants are bestin-class, having achieved substantial industry ‘experience in areas such as product definition and development, network deployment, and network and systems ongineering. Award Solutions constantly keeps a finger on the pulse ofthe industry, always researching new technologies, fend updating our curriculums to stay on the cutting edge with changes to existing courses and the addition of new ‘Whether you are a training manager looking to train others, ‘ora team lead responsibie for enhancing your team's skis, ‘Award Solutions can meet your technology training needs. Not only do our Subject Matter Experts (SMEs) understand ‘the technology, they know how to teach, emphasize the Overview of Services ey points, repeat what's important, and bring in analogies and examples as needed. They are focused on knowledge transfer and don’t teach just “by the book,” instead ‘adapting tothe students’ needs. They bring invaluable knowledge into the classroom because they can relate the ‘theory to real-world experiences. ‘We offer a multitude of delivery methods and services: On-site Instructor Led Training: Full classroom experience and interactivity that comes with i person training, =) Web-based Instructor Led Training: ‘Acconvenient alternative to on-site taining, without losing the benefits of a live instructor, » __ Mentoring Programs and Performance ‘Workshops: A mi of classroom training and hands-on applications of the concepts. Public Courses: Instructor Led taining for individuals or small groups of professionals. Visit ‘our website forthe full schedule of upcoming sessions. Self-Paced eLearning: A tiexible, cost-effective solution, allowing your tear to take training ‘online at their own pace when their schedule permits Custom Learning Solutions (CLS): Trsining programs created and tallored to your specific needs. Consulting Services: Maximize your investment, ‘augment your team ar receive guidance from Award Solutions’ experts, Ifyou are interested in or have any questions regarding, Award Solutions wraining or services, please visit Award's website at www.awardsolutions.com or contact us at +1- 972-664-0727 ext, 306 or toll fre at +1-877-472-9273 ext 306, ‘Sélinibms © 2012 Aer Solutons hc, worwawan TLATAWHRO Instructor Led Training Technology for Business UMTS (WCDMA)/HSPA/HSPA+ {ioud Computing for Google Apps. Adoy Exploring UMTS (COMA) 2 days The M2M Eoosyten, tay aploring HSPAF (87, RB & RO) 2 days Unified Communications and IMS 1 ay Mastering UMTS Core Networks (399 0 R7) 3 days IP Convergence for Sales ana Marketing sens 08Y Mastering UMTS Raho Prtocels ang Signal in da) LIE Services for Enterprise Customers (EVDO), Loay Mastering HSPA Protocols and Signaling, 3 days LTE Services for Enterprise Customers (UMTS). Loay HPAt Protocals and Signaling. 2 doys — -Mult-Carior HSPA+ (RB & RO), ‘day TT IMS in UMTS (RB) Networks. 3 days Emerging Trends SGP Packet Core Networks (#99 10 R) 2 days (OFDM and MIMO Fundamentals, sone 8 GPP Packet Switched Core Networks and Backed. days $$ LUMIS/HSPRVHSPAE A nte19¢2 3 days FF UMTS Transport Network Planing. 4 days ue LUMTS/HISPA (WCDMA) RF Design Mentorngvnnnnn® GY “The Road t LTE... semanas LOY UMTS (WCOMA) RF Optimization Mentoring, 10 aays LTE Essemias day LUMTS/HSPA# RF Optimization Workshop. 4 cays Mastering LTE. 2 days Exploring IPG for LTE Networks. 2 days Voice and IMS in LTEEPC NetWothS nnn JOYS wimax Exploring TOLTE. 2 days Exploring WMA enn 2 days Mastering LIE Ar interface 2 days + Mastering TOLTE Ar ntrface. LE Protocols and Signaling. 3.days 41x & 1xEV-DO LTE and 45/xEV-00 (eHRPD} Interworkng 2 days ‘Lxand 4x6V-00 Fundamentals rv CYS UTE and GSM/UMTS Intermorking, 2 cays LTE-EPC Networks and Signaling 3 days + LTE Advanced (R10) Technical Overview 2 days GSM and GPRS/EDGE LTE AF Planning and Design Certfcation Workshop .5 days {GSM Performance Workshop, 3 days # TOLTE RF Planning and Design Certffeation Workshop 5 days GPRS and EDGE Performance Werkshon, 3 days LTE-EPC Planning and Design Certication Workshop . Gays Wireless Fundamentals IP Convergence & IMS Wireless and 36 Basics, aay IP Convergence Essentials Lowy xaloring G5M/EGPRS/UMTS/HSPA/HSPAY 5 days Emernet BocknaulEssemtais = Loay Soc ota Tae IP Convergence for Sales and Marketing ‘Says s TL con Pe xplcing Wireless Landscape and IP Convergence. 2a ues wees 7 oda Joting Wireless Technologles and NetWOrkS.exn.-8 0OYS Exploring IMS (RS) Same Fundamentals of RF Engineering 2 days Exploring SIP VoIP and IP Convergence, 4 cays Exploring Ethormet Backnau 2 days Voice and video over IP Protocols and Technologies..2 days > Exploring iP Routing anc Ethernet Briceing. days = new cours) Ethemet Backnau! Planning. 3 days ‘iP Signaling, 2 days 4 IPV6 Networking Workshop for LTE Networks 3 days IP Networking Workshop for 2xEV-00/LTE. 4 cays IP Networking Workshop for HSPA/LTE 4 cays IP Netwotking Workshop for 46 Backns 4 aay Betdudns ©2012 sward Souter, ne. wwnanwardeelutenscom +L87747AWARO Emerging Trends ‘Overview of OFDM (). 2 hours Muttole Antenna Techniques (€) xenon 3 NOUS ue, Welcome to LTE 2) vw NOME LTE Overviw ‘Shours LTE SAE Evolved Packet Core (EPC) Overview (2) ....3 hours LTE Air ntrface $gnaling Overview (2). hours {% Overview of Pv6 for LTE Networks. ‘3 hours ced eLearning UMTS (WCDMA)/HSPA/HSPA+ Welcome to UMTS f) sn 1.5 HOU ‘Overview of UMTS (2), 2 nours LUMTS/WCDMA Ar interface Fundamentals (9) ann 3 ROU'S UMTS Sigraing) ‘hours UMTS Mobily 6). hours HSDPA (RB) ‘Shows HSUPA (RE) (2) san 25 NOUS HSPAt Overview (R7) (0) hours + VOLTE Overview Shours 4x & 4xEV-DO {DEV-00 Networks (Re¥ 0} (2-0 Shows {DEV.DO Networks (Rev A) ) hours ‘wimax Overview of WIMAX () sven NOUS = ss GSM and GPRS/EDGE ‘Welcome to GSM/GPRS) 18 hous IP Convergence & IMS Welcome to P Networking). ‘ hours Wireless Fundamentals 1P Convergence Overview “4 rows iarORneTel a ‘Overview of MPLS fe) 35 nous Welcome to Wireless Networks () nour Overview oF MS fo) 25hours (Overview of 36 Wireless Networks). 15 pours Voice an¢ Video over IP (Val) Overview ), ‘Shows IP Quality of Service (908) ). ‘Shours ‘Session Intltion rotoc! (SP) (e). 2houts Etharnet Backraul Overview (2) Shouts HIP 893165 (2s - ‘hour + IP Routing ) ‘tour % QoS in IP Notworks (6). nc ROUT + To? and Transport Layer Protocals (0). “1 nour + Ethernet Basics) ‘hour + Ethernet VIANS () nour 1 Etnemet BAB On - ‘hour + interconnecting IP Networks (). ‘hour + Welcome to v6 () ‘hour (e) eLeaming Course Riles: ©2022 fart Solutions Ino, wwwawerdsoutions.com 4,877.47 AVARD a a Table of Contents Chapter 4. Introduction... Motivation for TD-LTE Network Architectures and Interfaces. Air Interface. LTE Protocols and Interfaces... LTE Devices. Life of an LTE Mobile.. Chapter 2 ‘TD-LTE Technology OFDMA and SC-FDMA. LTE Frame Structure .. Multiple Antennas.. A Closer Look at PHY Layer Processing, Chapter 3 ‘System Acquisition Overview of System Acquisition... Processing of Synchronization Signals and PBCH. Acquiring SIBs. Version 1.061 Table of Contents Chapter 4 ‘System Access Operation Random Access Process Overview. Random Access Parameters. RRC Connection Establishment. Chapter 5 ‘TD-LTE Call Setup. Security. Default EPS Bearer Setup. Chapter 6 Downlink Operations. Channel Quality. Scheduler . Downlink Transmission .. Hybrid ARQ... Additional Material, Chapter 7 Uplink Operations.. Overview of UL Transmission 193 Request for UL Resources. " 198 UL Grant Allocation . 202 BSR Reporting.. 206 Table of Contents UL Grant for Data Transmission .209 ‘Transmission on the PUSCH .. 244 ULHARQ 218 Additional Material... 225 Chapter 8 Mobility and Power Control Mobility... Cell Selection and Reselection Tracking Area Update. Handover nu 1.248 Power Control 1258 Additional Material. ‘Appendix A OFDM Essentials Appendix 8 Advanced Antenna Techniques ABrief Overview of Advanced Antenna Techniques for LTE DL Trat Operations Using Multiple Antennas... Step 4: Quantifying DL Channel Conditions. Step 2: Scheduling and Resource Allocation.. Step 3: Resource Allocation and Data Transmission... Step 4: HARQ.. Table of Contents Uplink Transmission Acronyms References. 1 Introduction Chapter 1: Introduction 1 | Introduction Objectives After completing this module, you will be able to: Describe the motivation for TD-LTE / TDD LTE Discuss the goals and requirements of LTE Sketch the LTE access and core network architectures and interfaces Compare FDD LTE and TDD LTE/TD-LTE Mention key functions of the layers of the LTE air interface protocol stack Explain the steps of a typical LTE call References: [1) 3GPP TS 36.300 - EUTRA and EUTRAN Overall Description (Stage 2) (2) 3GPP TS 36.211 through 36.214: Physical Layer Folated docurnonts 1| Introduction Motivation for TD-LTE 1 | Introduction ‘EATRA + Downlink: 300 Mbps > Uplink: 75 Mbps + OF OM are MIMO Dm LTE: Long Term Evolution ra Spree The 3G Partnership Project (9GPP) Is responsible for defining the Long Term Evolution program for 3GeP networks, called LTE. 3GP focuses on twee key areas: + Evolved Universal Terestrial Radio Access (G-UTRA): This air interface is based on an OFDM physical layer and ublizes MIMO techniques to increase the data rates. It supports more tran 300 Mbps in the downlink to the Usor Equipment (UE) and more than 50 Mbps in the uplink, using @ scalable channel bbanciwicth of up to 20 MHz + Evolved Univercal Terrostial Radlo Access Network (EUTRAN}: Unlike the Node 8 and Racio Network Controller (RNG) ofthe UTRAN, the E-UTRAN has only fone node: the evolved Node B, oF eNB. The eNB is responsibie for tne physical layer operations of OFOM ‘and MIMO, and is also responsible for echeduling of downlink and uplink resources, handovers, ane Racio Resource Management (RRM, Evolved Packet Core (EPC): 3GPP ROO through RE used circuit (Moblo Switching Center, MSC) and packet (Serving GPRS Support Node, SGSN, and Gateway GPRS Support Node, GGSN) core network smponents. In LTE, the network is moving to simplified Peased networks, replacing the current network comgonents with Mobily Management Enutles and Serving Gateways (MMES/S.GWS) and Packet Data Network Gateways (P-GWS) | Introduction Definition of TD-LTE TODATE/ TATE + Both UL & OL share a common frequency f, + Simple UE Transceiver FODATE + UL& DL requires a par of frequency carers tf, [Haiee00 LTE + UL& DL requires a palr of frequency carriors tf, + ther ULor DL at ven time LTE access technologies support Time Division Duplex (TOD), Frequency Division Duplex (FDD}, and Halt-#DO (H DD) modes. In FOD mode, a pair of spectrum chunks are provided for inthe uplink and downlink. At @ given instant, lwansmission occurs in one spectrum chunk, and reception occurs in another spectrum chunk. in TO-LTE ‘algo known a6 TOD mode, the availabe frame duration is vided into different parts in the time domain for the Uplink and downlink, The number of uplink and downlink subframes are (statically, in practice) configurable in TDD ‘mode. H-FDD is @ special case of FOD where an HED device uses different frequencies to transmit and receive while communicating with an FDD oNB. However, it ‘ransmits and receives at afferent times. OFDMAtased multiple access technology is used for downlink transmission for al the FDD, TDD and H-#DD mades. The SCFOMA multiple access technology is used for uplink tranemission in ali the FOD, TOD and H-FOD modes. 1| Introduction Potentially attractive fe slaue ree Motivation for TD-LTE rome oar e ys The motivations for TDATE are: TDD Spectrum: TDD LTE (or TO-LTE) can be depo using an unpaled bane where both uplink and downlink communication will share 9 common ‘requency spectrum. Like in the case of LTE FDD, TD- LTE supporis scalable bandwidths from 1.4 MHz to 20 MHz depending on the frequency band. The availablity of huge chunks of unpaired spectrum for broadband allows TD-LTE to explolt the avatabie resources ata lower cost when compared with that of the FDD spectrum. Comprehensive Ecosystem: The overall network architecture remeine the came, while very few changes are required in tne protocol stack as smpared to FOD systoms. Both FOD and TDD systems are harmonized using the same OFDMA and SCFDMA access solutions and the protecol stack, ‘except for the minor changes due to the switching between the UL and DL. Potent for Lower Cost eNB and UE: For TDD systems, the devices do nat require duplexer systems tallow simutanoous transmission and recoption like FOD systems. This enables simpler and economical NBs and UES. Efficiency of LTE: TO-LTE uses the same bandwiath ‘and access methods as the FOD systems. This allows TTDALTE to provide high spectral efficiency like FOD, but the maximum date rates achievable willbe less compared to FOD due to the sharing of radio resources betwaen the ULand DL. Potentially Attractive for Asymmetric Services: Since roadoanc communications re datecenvic and ‘essentially asymmetric in nature, TDATE can exalt offiient scheduling schemes to support data Evolution Path for Legacy TDD Systems: TOLTE supports an evolution path for both High Chip Rate (HOR) UMTS TOD and Low Chip Rate (LCR) UMTS TOD systems (or TO-SCDMA). 1| Introduction ‘The Evolved UTRAN (EUTRAN) Is designed to moot a umber of vary challenging performance goals, in order to meet the evolving expectations of the subscribers and the operators. + Scalabiiy: The system must be deployable In markets with dfferent available bandwictns, ranging from 1.4 Mie 020 Miz + Latency: Latency in the Control Plane (Plane) for Idlemode to activemade transitions must be less than 100 ms, while the User Plane (U-ans) dolay must be less than § ms (Ex: one-way eNB to UE olay) + Data Rates: Peak data rates must be at least 300 ‘Mos on the downlink ana 50 Mbps on the uplink. On ‘average, user data rates should be three to four times what HSDPA offers, and two to three times what HSUPA can provide. + InterRAT Handover Delays: Handover of realtime services must take less than 300 ms, while non-real time applications must take less than 500 ms, ‘cel Coverage: Performance targets must be mat out 10.8 cell rads of 5 km. Beyond that, no more than a light degradations slowed out to 30 km. Mobility: The system must be optimized for relatively low speeds (< 15 km/h), but should be able to maintain active connections up to 500 km/h. asicaly, advanced antenna techniques and tink ‘adaptation techniques work well at iower speeds. 1| Introduction Die ‘TDD vs. FOD ‘Simpler UE and eNodeB: Designs due to Potential for reduced UE k due to reciprocity annel Foie en) Ree Mec) aa bis tet rey (Cenc) LTE FDD TD-LTE vs. LTE FDD TDD slightly 3s efficient due Roaecmeruieet) ‘The main differences between TDLTE ang LTE FOD are hignlignted here, A simple, yet also the most significant difference, of course is the duplexing approach that these systems utlize. In general, FOD spectrum is symmetric by nature due to the way regulations are created. In words, the government agencies usuelly have sym bandwiatn for uplink and downlink for FDD such 95 10 MHz in the DL and 10 Miz in the UL From the perspectwe of the standard, though, LTE does support asymmetsic bandwidth in the UL and OL. TO.LTE ean he configured to favor ene link ovar the other. Due to the existence of an ackitional guard time in TO-LTE, TDATE is slighty less efficient than LTE FOD. Since TO-TE uses the same frequency bandwith forthe DL and the UL, the eNB. can potentially observe the UL chennei concitions to infer the DL channel conditions due to channel reciprociy Hence, In theory, frequency and the amount of UE feedback about the DL channel conditions could be lower In TO-LTE. Sinco only transmission ar reception is done at 2 given instant, the designs of the UE and the eNB are ‘much simpler her 1] Introduction Network Architectures and Interfaces 1. Introduction Bay Sioa aes ad econ en eet Sineesnstant ein Sikes elseicsollar GK) GaN eres 2 iia Ke eNB and E-UTRAN The primary difference between the UTRAN end E-UTRAN, architectures isthe abeence of a Reio Network Contrllor (RNC), The functionality of the RNC has now been moved into the eNBs. 'An eNB's responsible forthe following functions: ‘+ Radio Resource Management (RRM) functionalities like radio bearer control and radio admission conta ‘+ IP noador compression and encryption of the user cata seam, + Uplink/dowalinkredio resource location, ‘+ Transfer of paging messages over the ar, + Transfer of Broadcast Control Channel (BCCH) information over tha air, + Selection of tne Mobility Managemer during cal, Entity (MME) + Mobilty control in the active state, The eNBs are connected to the MME and Serving Gateways (MME/S-GW) via the $1 interface. An ENB is ‘able to communicate with mutiple gateways, in order to 10 enable lead sharing and Interconnected by the x2 hhendovere and cata transfer, redundancy, oNBs re Interface, to coordinate 1] Introduction GERAN ETA) Evolved Packet Core (EPC) Optional based on ‘operator configuration Now entities in the Evolved Packet Core (EPC) include the Mobility Management Entity (MME), the Serving Gateway (SW), and the Packet Daca Notwork (PON) Gateway (P ow. + MME: The MME: Is responsible for menaging and storing UE contexts, generating temporary identiirs to the UES, idle-state mobiity control, citributing paging messages to eNBs, secutty control, end Evalved Packet System (EPS) bearer control + Gateways: There are two geteways in LTE, one facing toward the EUTRAN (the S-GW) and one facing toward the extornal packet data network (the P-GW) |A.UE has only one SGW but it may have multiple P ews, + Sonving Gateway: The SGW Is responsibie for ‘anchoring the user plane for inter-eNB handover and inter-3GPP mobily, similar to a GOSN in @ pre-LTE retwark. + PON Gateway: This gateway is responsible for ring the user lane for moblty between 3GRP access systems and nonSGPP access systems, Similar in nature to a Home Agent in Mobile IP, the P. GW allocates che user's IP address, and forwards packets intended for the user to the appropriate & GW. It also provides suppor for charging, lawful interception and policy enforcement. a 1 | Introduction Functional Split / ~ a | | aera | | ‘Evolved Packet Gore 7 | = concton on Ln wie {(_ Snort NAS Security| Leona” _| | [Pitessurement Testa | 1 Lcontiraton nesity__|| | Resoaree aL ml 1 Latccaton contol | I If” Senving Gateway) {PON Gateway i | porpraaes i i 1 Lecatction i oy | | ee | [eset rene i } if In the E-UTRAN architecture, each NE ie now responsible for al of the functions that used to be divided between the [Node 8¢ and the RIC. These include: + Implementation of all of the Layer 4 and Layer 2 sublayers (Physical Layer, Medium Access Control, Radio Link Conttol and Packet Data Convergence Protocol as woll as Racto Resource Control, + Admission contol, ‘+ Allocation and management ofall radio resources, ‘+ Control and processing of RF measurements, + Control of mability while in the connected state, inthe EPC, the MME is responsioe for high-evel security functions (Such as authentication) and manages mobiliy while in the idle state. i also determines the characteristics of the EPS bearer based on the requested service and QoS requirements The S:GW acts as an anchor point for the EPS bearer allowing traffic to low seamlessly between the UE and the network during nter.cell handovers, 2 Te P-GW Is similar to @ Mobile IP Home Agent (HA) allocating IP adaresses for the UES and performing any necessary packet filtering for any necessary firewall and packet routing functions. 1| Introduction Air Interface 13 1 | Introduction LTE-Uu User Plane Header compression, ciphering Same for bath TOD * Minor changes between TOD and FOD_ Duplicate and outoForder detection, segmentation and concatenation, missing packet retransmission serambiing, KARQ MAC | Packt format selection, scheduling, Mullen adding PRY | OFDIA/SCFOMA, Coding, modulation intereaving, cre The LIEU air interface ie divided into a user plane (for user traffic and a control plane (for signaling. The user plane supports the exchange of packets over the radio bearer between the UE and the serving eNB and is divided Into the folowing layers and sublayers, Layer 1 (the PHY or Phyeleal Layer) i responcible for the actual racio transmission and includes coding for forward rection, modulation, bit interleaving, serambiing and other funetions needed to minimize erro radio link. The PHY Layer also manages the operation of Hybrid ARQ (HARQ), which provides a fast error-correction mechanism through incremental redundancy. There are major changes in functioning of the physical layers lke the frame structure, Duplexing, mapping of channe's, and resourge allocations for UL and OL. over the Layer 2s divided into the following sublayers: + The Medium Access Control (MAC) sublayer handles the scheduling of uplink and downlink resources and determines the transport format to be used. I also takes care of multiplexing packets into a single tvansmission and inserts padcing bits as required. 14 MAC layer has some minor mocifcation Ike HARQ bundling and Rancom access to suite the TDD mode of operations. Radio Link Control (RLC) performs segmentation and concatenation to optimize the use of the available resources, and tracks which packets were sont and received. Oupicate packets are clscarded, outot 1, and missing sequence packets ate reorder packets are retransmitted Packet Data Convergence Protocol (PDCP) implements Robust Header Compression (ROHC) and ny required ciphering (encryption) functions. Both LC and PDCP sublayer Functions for both TOD ane FOD LTE are some, 1 user plane terminates atthe eNB, 1| Introduction LTE-Uu Control Plane oi [omen NAS [Non-Access Stratum signaling, RRC | System information broadcast, paging, RAC connection ‘and radio bearer management, handover, UE ‘measurement contro! Tho LTE-Uu contol plane cartes the signaling necessary to set up and manage the racio bearer. In addition to the sublayers described for the user plane, the control plane. also includes Radio Resource Control (RRC), which handles: ‘+ Broadcasting of system information blocks (SIBs) and other evernaad information, + Paging of ile UES, + Setting up anc managing signaling radio bearers, + Setting up and managing atic radio besrers, + UE measurement contol and report processing, and + Handover contol and coordination. In action, the control plane also carries Non-Access Stratum (NAS) signaling destined for the core network, ‘The RAC terminates at the eN2, while NAS signaling Is carried transparently across the oNB to the MME. 15 1 | Introduction LTE Protocols and Interfaces 1] Introduction © One logieal S1AP connection per UE + Multiple UES supported via a single SOTP cru uoP ®. [Data Link Laye| ers $1 Interface One or more GTP tunnels per user + DSCP marking is supported for oS The St interface connects the E-UTRAN to the EPC. The ‘81 is spit into 2 contol plane (Cpiane), called the $1: IMME, and a user plan (U-plane), calles the $1.U. The S1- MME carries signaling messeges between the eNB and the MME, while the S3-U carries user traffie between the NB and the SW, The SLMME carries $1 Application Protocol (S4AP) messages, using Stream Control Trensmission Protocol (SCTP) over IP to provide guaranteed data delivery; each SSCTP association between an eN and a MME can support multiie UES, The S1:MME is cesponsible for EPS bearer setup and rotease procedures, handover signaling, aging, and NAS signaling anspor. ‘The SLU consiste of @ GPRS Tunneling Protocol - User Plane (GTP) tunnel running on the User Datagram Protocol (UDP), which provides nor-gusranteed dolvery, One GTP tunnel is established for each radio bearer in order to cary user trafic between the eNB and the selected SW. data ‘The S1U also implements Differentiated Services Code Point (OSCP) marking of packets. The 6-bi DSCP value ‘ascigned to each IP packet identifies a pre-determined level of service and @ corresponding packet priority, which is used to implement the aporopriate QoS behavior for the Fu 1] Introduction X2 Interface ow + Multicel radio resource ‘management + Handover * Load management + User packet tunneling @ @- ene UDe ® Bata unk tye Uplane So sen SCTP Data Link Layer ‘The X2interface allows eNlBs to communicate drecty with ‘ach other and coordinate their activities. Like St, the X2 is splitinto separate C-lane and Uplane functionality. ‘The X2 Cplane cartios X2 Application Protocol (K2AP) ‘messages between eNVBs, and also uses SCTP for reliable delivery. X2AP is used to manage intraLTE (inter-eNB) rmoblity and handovers, UE context transfers, intereel inerference management, and_ various. ertorhandling functions. The X2 Utane is very similar to S2-U, and uses GTPAUto tunnel user traffic between eNBS. 18 4 | Introduction LTE Devices 1| Introduction LTE Device Capabilities aloe Dota tes Cte ee veligt he a fo fu foe 1 ma 5 [10 2 (2210002020 | gngy aia 14, {ea)2010-2008 | SPS, 3_|'a,| 22+) | (asy eso: too | 49M) 04. | St | 100 “aa (264030. 1900 soe reas 2 (sn s910- 1930, sso , {58)2570: 2620 | oon 2 (20) 1820. 1920 | 2S i 5 ute 1920 | Poa, 75 | s00 tio) 2360-2100 | 1606 “Note: Multiple transmit entennas are Ret: 36PP 1S 36.306 Five diferent categories of LTE devices nave been defined, similar to HSDPA anc HSUPA catagories for UMTS vices. The categories define some of the basic physical capabillies of te UE. The categories difer arimarlly in the peak data rate that ‘each supports, ranging trom § Mops on the uplink and 10 Mops on the downlink fora Catogory 4 dovice, to 75 Mbps fon the uplink and 300 Mbps on the downlink for a Category 5 device, LTE UE categories algo specity the Dandwidth supported, the multiple antenna tecnniaues, frequency band, modulation schemes, soft butfer and the data rate. ‘Support for mutipie transmit antens downlink, ang only @ only applies to the alogory § LTE UE suoports 64QaM modulation on the uplink Note that the actual peak data rates in a given ployment may be lower than shown here, cue to the configuration 20 1 | Introduction Life of an LTE Mobile 1 | Introduction Life of an B Default bearer setup and iP ‘address allocation for always-on once “.uthentication and secur ‘Stach Request from Ueto MME ‘ZRRC signaling connection setup ToL newwore ‘acquisition upon UE power up LTE Mobile 6. Setting up of addtional detaut ‘and/or dedicated EPS bearers (Fneesea) 7. DLand UL resource allocation by eN8 ‘scheduler BUassisted network ‘controled hard handover 40 dle mage for UE in ‘absence of data activity {11 Powerof detach {A typical UE must go through @ numbar of steps before ean even request a service, and setting up and managing the service itself requires several adciional steps, \Wmen a UE arives of powers up In an EUTRAN, must: 1. Acquire the network by scanning for an eNB, synchronizing with the network, and listening for system information over the broadcast channels, 2 Establish | signaling conection in order to communicate witn the eNB. 3. Request an attach to tha core network in order to regster and receive service. 4, Pass authentication with the core network and ‘exchange of securty algorithms and keys, 5. Establish a Default EPS bearer with the default Packet Data Network (Example: Internet PDN or IMS PON) and assign an IP address to provide always-on ‘xperionce to the User 6. Once the Default bearer with the default PON based on the UE subscription is established, one Defauit bearer with each of the other PON subscribed. 22 Dedicated bearer may tien be established If tne oS of Services do not map to that of Dofault bearer Once this intial setup sequence is complete, the UE can then request the resources needed to run one or more ‘plications: 1] Introduction Life of an LTE Mobile (continued) 16 Setting up of additional defaut and/or dedicated EPS bearers (if needea) 5. Defaut bearer setup and ‘aderess allocation for always-on experince 7.DLand UL resource 7 Aare ad ‘location by eNB ‘secur scheduler SUE Beslated neo ‘Br Nttach Request from UE to MME RRC aenaling connection setup 10, dle mode for UE Ta ‘absence of data activly TDL natwor {LL Poworf detach acquisition upon UE powerup as The UE uses the signaling connection to send a corvice request to the care network. UE's capabilities and subscription ‘the core network tells the eNB what sort (of radio bearer to eet up forthe UE. 9. Onco tno radio boarar Is established, the UE can begin sending scheduing requests and receiving scheduling grants, allowing it to sond and receive User traffic and signaling over the radio bearer. 10. If the RF environment changes the UE may request a handover to another eNB in order to maintain the 1L1. When the UE ne longer requires the raclo bearer, it can release the corresponding resources. ‘As long. as the signaling connection romsins in place, the UE can submit addtional service requests at ary time without havingto go through tne inital setup process. 23. 1 | Introduction 24 Summary + Key features of TD-LTE / TOD LTE are: ~ TDATE is deployed using an unpaired spectrum — Potentially efficent for asymmetric data services, and — Economic user devices and eNodes, + Example features of an LTE network are: ~ Air interface based on OFDM and MIMO, = EUTRAN with only eNBs and lack of RNC, and ~ IP-based packot switched EPC and lack ofa circuitswitched core network. + Key features of the air interface are: = Support for TOD, FOD, and H-FDD — OFDMA for high spectral efficiency, — Support for various multile-antenna techniques, = Scalable bandwidth (1.4 to 20 Mii) to achieve data rates greater -iadathan 300 Mbps in the OL and more than 50 Mbps in the UL. 1] Introduction Review Questions 1. What were the motivating factors behind TD-LTE? .. Which functions does the eNB perform? 3. What path does user traffic take through the E- UTRAN and EPC? 4. Highlight the top three key differences among the UE categories. 5. List example functions occurring in the life of a UE. XN 6 25 26 2 | TD-LTE Technology Chapter 2: TD-LTE Technology 2 | TD-LTE Technology Objectives After completing this module, you will be able to: Explain the key characteristics of the LTE TDD downlink and uplink Illustrate LTE frame structure type 2 for TDD and resource blocks Explain subframe patterns and UL/DL configurations in support of TD-LTE. Identify the physical, transport and logical channels in TDD LTE and how they relate to one another Specify the use of multiple antennas in TDD LTE References: [1] 36.300 ~ E-UTRA and E-UTRAN Overall Description (Stage 2) [2] 36.211-36.214: Physical Layer related documents 28 2 | TD-LTE Technology OFDMA and SC-FDMA 2 | TD-LTE Technology ire efficiency no nee (incu LTE Downlink fo) Y/Y Sires e NB Tureen) resource allocation ‘The E-UTRA uses Orthogonal Frequency Multiple Access + (OFDMA) as its fundamental transmission technology on the downlink in order to take advantage of the benefits OFDMA offers: ‘+ High Spectral Efiiency: OFDMA makes better use of ‘the avallable spectrum than CDMA techrologes + providing significantly higner data rates for a gven bandwith, ‘+ Robust Against Multipath Interference: The relatively large OFDM symbol time means that the short delay soreads typically found in wireless networks have ‘minimal Impact on the qualty of the signal. Use of a Qyelle Prefix (GP) furtner reduces the effect of multipath interference, “+ Support for MIMO: OFDMA innarently lends itself to implementing Multiple Input Mulple Output (MIMO) ‘and other multple-antenaa techniques. Resource Allocation: Users can be allocated resources in both the time domain (eymbots) and frequency domain (subcarriers). This provides 3 ‘tremendous level of exbilly for the eNB to maximize the effective use ofthe available resources. Reduced Receiver Complexity: Te use of Fast Fourier ‘Transform (FFT) and laverse Fast Fourier Transform IFFT) processing greatly simplifies the design of the transmitter and receiver. 2 | TD-LTE Technology LTE Uplink SC-FDMA Reduced Peak-to- erect Gee) Ceremeiectd ieee en eae all Meena ‘Tho effective managemant of transmit power, complexity, fang cot are Kay determining factors for handset design. To that end, LTE has chosen a somewhat different solution forthe uplink, Single Cartier Frequency Division [Multipte Recess (SC-FDMA). Although very similar in nature to OFDMA, SCFOMA has a number of unique characteristics which are particulary attectve on the UE side + PeaktosAverage Power Ratio (PAPR) Reduction: Large rumbers of independent symbols are not summed to create the transmitted signal, which greatly reduces the PAPR experience by the UE. + Lower Maximum Power Requirement: Because ofthe lower PAPR, less power backoff is needed, and & ower amplifier with a lower rating (and lower cost) be used, + Better Col-tdge Performance or Large Cells Reduction in PAPR can be exploited to improve the link bude, o to improve colLedge performance. + Complexity: SCFOMA needs more processing blocks. atthe transmitter and receiver. at 2 | TD-LTE Technology SC-FDMA and PAPR Peak High PAPR. ‘SC-FDMA ‘A major challenge associated with OFDM is the high Pek tesAverage Power Ratio (PAPR) of the transmitted signal ‘The very high peaks are a direct consequence ofthe IFFT ‘summing multiple independent symbols, which are all integer number of eyeles over the symbol time; whenever the symbols add constructively, the result is a peak of ower. Signals with a high PAPR either require highly linear power amplifiers (which are expansive) or must be lipped (which intioduces astortion). The transmiters in an SCFDMA system also use multiple subeartiers 10 transmit information symbols; however, they transmit the symbols sequentially rather than in parallel. Relative to OFDMA, this approach reduces the fluctuations n the transmitted wavetorm. 32 2| TDLTE Technology OFDMA vs. SC-FDMA ‘Modulation OFDMA aooio14a ‘SC-FDMA sooto114 in OFDMA systems the ansmitter uses multiple subcarriers to modulate the information in parallel, and than gends them through an lnverse Fast Fourier Transform (FFD), which Isa weighted summation of these independent symbols ‘An SCFOMA gystom uses a single carier to modulate the information symbols sequentialy. On the transmitter side, the adeltlonal block of the SC-FOMA is @ Discrete Fourier Transform (OFT), This block tvansforms @ time-domain madulated symbol stream into the frequency domain. ‘Then, the frequency domain information 's mapped to @ wider range (spreading) and goes through an IFFT, which twansforms the frequency domain information back into the time domain, SCFDMA Is also referred to as DFT- spread OFDMA. Since the individual symbols are serialized and distributed across multiple subcarriers, the PAPR Isques associated with traditional OFDMA \ransmissions are recuced 33, 2 | TD-LTE Technology eon Come 14 | 3 | 5 iret ee og LTE Transmission Parameters FFT aze | 256 | 512 fetedie 6 | is | 25 Comsat Ieee? Error coding 10 | as | 20 ims a 15 som | 536 | 2008 so | 75 | 100 Tor6 BPSK, QPSK (Signaling) PSK, 16QAM, 644M (Data) Rate 1/3 Convolutional (Physical Layer Sraling) Rete 1/3 Turbo (Data and RRC Signaling Messages) Some key OFDMA/SC-FDMA transmission parameters are provided in ths table, LTE is @ scalable systom so the subcartior pacing (15 lz) s tne same regardless of tne ‘amount of spectrum. A 10 MHz system, for example, has a total of 1024 subcarriers, cut of which 50 resource blocks (RBs) (50"12 = 600 subcarers) are for assignment to users, One RB consists of 12 subcartiess. The remaining 1024-600 = 424 subcarriers donot ransmit anything, St fight sida of the center 600 subcarriers. minimizes interference between the LTE system and the adjacent system, Since a 10-ms radio frame hes 10 subframes, rame Is 2 ms long. Furthermore, two slots per subframe, yelcinga 0.5.ms slot. When a normal eyclc prefix (CP) Is used, seven symbols exist in @ slot, and, when an extended CP is used, six symbols exist. The data channels support the madulation schemes of QPSK, 16QAM, and B4QAM for flexibility and higher throughout Control signaling uses BPS& and QPSK for reliably, “nul” subeariers on the lott and a4 2| TDLTE Technology LTE Frame Structure 2 | TD-LTE Technology Frame structure type 2 { Framona ] Framen Fromentt }] Framene2 } 108 2. Te cers a Rig peices ‘The Frame structure tye 2, applicable only to LTE TOD is, fa shown in the figure. The frame duration is 10ms lke in ‘the case of LTE FOD. |A TDD frame is shared among both UL and OL transmissions with a switching period in between them. Switch point periodicty for both ‘supported. The stenderd defines the table for upink and downlink allocations for batn ewitch point periodicity. In case of § ms switch point periodicity, each radio frame of +10 ms lengtn consists of two halftrames of Sms length. Haltttames are indexed 0 of 4 to inform the UES of possible PRACH instance. Each halframe consists of four subframes of length 1ms and three special fields OwPTS, GP, and UsPTS of 4s longth. Subframes 1 and 6 are reserved for uplink transmission, All other subframes are defined as two time slats of 0.5ms each. 5ms and 10 ms is In case of 10 ms switeh-point periodicity, subframe 4 are special fields DwPTS, GP and UpPIS ‘ranemission, Al other subtrames are defined as two ime slots of 0.5ms each, reserved for 36 There are seven different configurations from 0 to 6 supported my TDLTE standards. Each configuration defines subtrames lows. uplink/downlink tranemission snd special folds. wien 2| TD-LTE Technology UL: DL Configuration for TDD LTE | Switching. Periodicity Sms Sms sms | 4a 4oms_| 7:3 a aisaIa aE I s0ms_| 8:2 EUS STOUSTOSNSIED) 45,5 Sms TOLTE suppers seven configuration of different UL/OL letributions. The network broadcasts the support which fone of tase configurations Is supported in the cell torough Ute subframesssignment field in the System Information Block 2 to. Configurations 01,2 and 6 support a Sms snitching periodicity to enable deployment of symmetric and time sensitive apalictions. While configurations 3, 4 & 5 supports switching perioacity of 410ms, These configurations help in further enhancing the spectral efficiency by allowing only one switching betwean DL/UL and back In every 10ms. But the limitation of such 2 system is that these configurations will increase the latency of data substantially making it diffeutt to deploy time sensitve applications. ‘The configuration 0 is @ hesvily loaded UL scheme while Configuration 5 is OL loaded. Configurations 2 and 4 are similar in nature except for the periodicity in switching. (Configuration 6 ie very unique in the sense that first Sms 's UL loaced while second naif frame Is DL loaded. *#Nole the DL/UL distibution assumes. the Special subframe carry DL Data hence accounted along with DL subtrames, 37 2 | TD-LTE Technology Special Subframe (S) Frome n + Bis Switching Pertdiciy * Compatible with WIMAX and UiRATDD + ome Switching Periodicity * Compatible with LTE FOD ‘Siar Period TD.LTE supports an a new type of subframe called the Special subframe to make way for switching between DL. mado to UL mode. This enable both the UE and the oN to adjust itself to either daa remit the data or {0 recelve ‘The Spe eupports two types of switching perogieiy. First Sms periodicity to accommodate delay sensitive (and also symmetic) applications lke voice. Also Sms periodicity makes it feasible for UE to have compatible operations with WIMAX and TOSCDMA/UTRA TDD whien also has 3 frame structure of Sms, The lower sido of using Sms perladicty Is the additional signaling overhead and ‘wastage of resources for preparation to switching between DL to UL and vice versa. jal eubtrame fe denoted a ‘S' eubframe, TDLTE Second a 10ms periodety wil over come the limitations of higher signaling and provide good spectral efficiency But can anly support asymmetric delay insensitive applications. Voice applications will be dificut to implement with tis king of frame structure. 38 ‘The S- subframe is of 1ms duration and consists of 3 fields ~ DL Pilot Time Slot (DWPTS), Guars Period (GP) and UL Plot Time Slot (UpPTS) 2 | TD-LTE Technology Example UL/DL Configurations Example Applications of UL/DL Configurations Conia Pena re eeey hier} Sree ate) Seven uplink/downlink configurations gve significant flexioilty to service operators while deploying a TOLTE system, The operators can choose a specific configuration based on the expected trafic patter. For example, when the majorty of traffic Is symmetric and delay-sensiive configuration ane with the same number of DL and UL ‘subtrames would be quit sultabe. This configuration aiso has a fast § ms switching between the downlink anc the uplink Ifthe downlink trafic is quite significant compared to the uplink trafic and realtime requirements are somewhat relaxed, which is the case for services euch as Web browsing, configuration three with 67 percent DL and 33 percent UL could be sppropriate. Stretching the agymmetty further, configuration five allows 89 percent DL and 21 percent UL. Broadcast and multicast services uch as TV channels can be offered best using such @ configuration. Since uplink trafic Is exzected to be quite light and since bidirectional real-time constraints do not ‘xis. configuration five would work very wal Conia pias Clr Ree aes Seen 39 2 | TD-LTE Technology Special Subframe Configuration efelels| ole elwlofele|mlolals R/Slole S/S) Ref: SGPPTS 36.211 ‘The above slide shows the nine configurations supported by TDD LTE Special subframe, The specific configuration supported in the Cell is broadcast using, specialSubframePatterns field in the System Information Block 2. The DwPTS field ean span any of the folowing: 3, 9, 10,11 & 42 OFDM symbols. DWPTS cartes only contol information when 3 symbo! long and carry both control snd data for other configurations. The UPPTS can be either 1 or 2 OFDM symbois. UpPTS carries either sounding reference signal or PRACH with preamble format 4. While the Guard period (GP) can be 4, 2, 3, 4, 9 or 10, (OFDM symbol long. The GP fields determines the sizeof the cal, 40 2 | TD-LTE Technology DL Pilot Time Slot (DwPTS) ‘S-Subfreme CZ. DweTs (@/9710/11/12 OFDM | GA UpeTS symbols) + Shortened DL subframe + Variable leneth (OFM symbols) + Carries PCFICH, PHICH, POCCH, Primary Syne Signal and POSCH ie ‘The name DwPTS (DL Pilot Time Slot is cartied forward from the LOR UTRA with a difference that this eld is not Just used for OL synchronization but also to camry the regular downlink channels PCFICH, PHICH, POCCH and POSCH channols of the LTE. Hence we can visualize [DWPTS as a short OL subframe with less number of OFOM. symbols. TDLTE specifications supports variable length ‘DwPTS field that can be configured by the operators. The DDL synchronization with the Primary Syne signal that is ahvays sent on the OFDM symbol 2. To exploit the avaliable tesources the POCCH channel occupy @ ‘maximum of 2 OFDM symbols here instead of 3 OFDM ‘symbols in the regular DL subframes. DWPTS field carries both control and traffic data in ‘addition to providing synchronization on the DL an 2 | TDATE Technology UL Pilot Time Slot (UpPTS) $-Subhame i i “) vwers tore | OwPTs: CF OrOM i syne LULeynchronization with RACH “UL channel estimation with SRS 3 w N t i x x y t ‘ sith Legal come! —_ Transport Gham! Pry! Channel Physical channels serve the following purposes: ‘The POCCH carries the Downlink Canto! Information {O0), which includes resource allcations and the corresponding modulation and coding schemes, ower control commands, channel quailty requests, ‘and other commands for the UE. ‘The PCFICH carries the Control Format Incicator (OF, Which Indicates now many symbols the POCCH cocupies in each subframe, ‘The PHICH carries the Hybrid ARQ Indicator (HD, Wich is used to ACK and NACK ongoing uplink data ‘vansmissions. ‘Tne PUCCH carries the Uplinx Contol Information (UC), which includes echeauling requests, channel ‘uality reports, and Hybrid ARQ ACKS ang NACKS for downlink transmissions. 47 2 | TD-LTE Technology eet iin Physical Signals Reference Signals (Channel Estimation and Coherent Demedulaton) ‘Synchronization Signals (Powerup Synchronization) ence Signal (DMRS) eric) We clear the confusion that sometimes obscures the difference between Physical channels and Physical signals by noting thet physical Channels carry upperlayer information and physical signals do not. Prysical Channels carry, for example, vratfic channels, which can carry email or enable an FTP transfer. Physical signels, on the other hand, have nothing in them from outside the Prysical Layer itself. A plot reference or @ souncing reference are examples ofa physica signal + Reference Signals: Reference signals (also known as pilots) provide @ known or predictable pattern that allows the UE to decode the physical channels and estimate cownlink channel conditions. Reference signals may be cell-specific (common to all UES) oF especie, ‘+ Synchronization Signals: Synchronization signals allow UES to detect and identity calls during inital system acquisition and provide an initia! timing, reference. 4a. ‘Tho UE also provides reference or pilot signals to allow the network estimate uplink channe! conditions and to coherently demodulate its transmissions. 2 | TD-ALTE Technology DL Subframe Resource Mapping | porch | Slot 20, | Sot 2n¢ | SdH (Uber Resource Blocks De In every DL subframe, the first one, two, or three OFDM ‘symaols contain one or more PDCCHS, which ceny scheduling assignments and other control informetion. ‘Tho exact number of OFDM symbols used is specified in the PCFICH, which appears in symbol O of the even: humbered slots (in other words, the first slot of each subframe). The PHICH may also appear inthe first symbol, 2 required. The remaining symbols in the two slots, contain the PDSCHs, which carry user data and signaling Information to specific users. 49. 2 | TD-LTE Technology DL Reference Signals \ siot.2n I Siot2net ze a a ile z Z zfs 5 a z z z oz ee SS 238 worn ln TDD LTE ike in FOD mode, one reference signal 1s lwansmitied per antenna port to estimate te channel response for each antenna cn the downlink. The location of each reference signal within a resource block depends fon the rumber of antennas and the siot within the subftame; the reference signals for four-antenna system (antenna ports 0, 1, 2 and 3) are illustrated here. These reference signals are transmitted on beth DL. subtremes ‘and the DwPTS felds of Special Subframe. Colspecifc reference signals play an important role in channel estimation and system acquisition. During channel estimation, the receiver compares the received symbols with known reference symbols and estimates the ‘channel response for channel equalization purposes. 50 2 | TD-LTE Technology | Siot2n UL Subframe Resource Mapping | sotanea 3 8 3 pun g nfo cr wie olslofstalslelolsialslals {nthe uplink, the Physical Uplink Control Channel (PUCCH) ‘cuples one or more resoures blocks at each ond of the system Danowidin and performs. frequency hopping ‘betweon the first and second slots within a subframe. The reeouree blocks between the PUCCHS are used for Physieal Uplink Shared Channol (PUSCH), and may do frequency hopping between slots. The PUSCH carries userpecific vatfic and/or RRC signaling messages. The Phyeical Random Access Channel (PRACH) occupies six ‘esouree blacks over one or more consecutive subframes, ‘adjacent tothe PUCCH on the UL subframes. The PRBs at ‘which the PRACH appears and the number of instances within the UL subtrome is configured as broadcast Information in the System information Btoek (S18). et 2| TO-LTE Technology Special Subframe Resources Porich | Siot 2n i Slot Qn | le rates € x 3 R 8 a e 8 POBCH{Use B) g 5 Be 3 e|s g ® i Jpogcx fading : PpscHl (System proaficast sits) 2 sfelalalsislolilelslaksle D,PTS ‘A Special subtrame (or SSubfeame) carries the PCFICH, POOH, PHICH and PDSCH channels ike the DL subframes. The PDCCH channel spens @ maximum of 2 (OFDM symbols and the POSCH channel the rest of the (OFDM symbols in the OwPTS field to achieve maximum spectral efficioncy on the DL. The UpPTS field aliows for either RACH using preamble format 4 o UL channel estimation through Sounding Reference Signal (SRS) For example, the $ Subframe configuration 4 with normal CP te shown in the above slige. Where DwPTS, GP and LUpPTS occupies 12, 1 and 4 OFDM symbols each. 52 2 | TD-LTE Technology Exercise True or False?: ‘L. The PCFICH informs the UEs in a cell about the number of OFDM symbols used by the PDCCH. -~ 2. The PDCCH can allocate DL resources to a UE; however, it cannot allocate UL resources to the UE. 3. The PDSCH can carry traffic and UE-specific signaling messages. \/ 4. The PHICH enables the UE to improve UL throughput by carrying ACK/NACK. v 53 2 | TD-LTE Technology Multiple Antennas 54 2 | TD-LTE Technology Multiple-Antenna Techniques in LTE Multiple-Antenna Techniques Soe Diversity MIMO/Spatial Multiplexing Beamforring = 1, 1 a Receve —Tansmt SUMING musa ‘SoMa } Speciai Case Dwerety very (Binge User (utp User = (Spatial Dision | oF SUMIMO mano. 4 MIMO) Mame Aces) oe This slide shows the muttiple-antenna techniques used in LTE. The underiying essumption is thatthe signals out of aitferent antennas experience citferent facing + Diversity: versity techniques Increase tn robustness and thus coverage, Including receive diversity and transmit civersity. With transmit diversity, the same data stream is sent to the same ser and experiences independent fading. So, the signal quality is enhances by combining them. + Muttiplenput Muttiple-Outeut (MIMO): Alco knawn as, spatial multiplexing, different deta streams are ser fom different antennas. If the streams are sent to the some user, it is called Single-User MIMO (SU: MIMO) and can inciease the data rate fort the streams are sent to different users, itis called Multiuser MIMO (MUMIMO) and can increase capacity forthe cel. user. + Beamforming: Spatisl Division Multiple Access (SDMA) is the most complicated beamforming and te theoretical foundation of MUMIMO, So, in practice, MU-MIMO Is equlvalent to SDMA and can be Viewed a8 MIMO plus Bearforming (BF). For simple beamforming, it can be implemented as a special case of SU-MIMO, where a single stroam is sent out 55 2 | TD-LTE Technology Two basie forms of diversity aro transmit diversity 56 Generic Diversity Techniques Transmit diversity Receive diversity ‘Multiple antennas atthe i: eee Peet De) aarti Sere) with Receive Diversiy: This form of civersity is implemented at the receiver. Multiple antennas are used at the receiver. The BS transmits just one signal, but multiale copies of the same signal are received because of the multiple antennas. These signals, experience different fading charactonstes, and the probably thet all signals experience a fade at the ame time is low. Hence, the qualty of the combined all signal is kely to be good. The advantage of receive diversity is better performance compared to a single receive antenne, On the other hand, the cisacvantage is increased cost at the terminal whon receive dversity's implemented atthe terminal. Transmit Diversiy: Tris form of diversity is Implemented st the transmitter. The transmitter twansmits @ signal, possibly in diferent forms, from rrultiple antennas at the same time. With transmit Civersity, multile copies of the same data stream are sent to the same user end each stroam experiences Independent fading. Thus, multiple copies of fe diversity and essentially the same signal are recelved at terminal, providing aversity benefits, as ie the ive diversity, Howover, transmit cvorsity has ‘an added benefit, it can be Implemented at the BS without raquiting multiole antennas at the MS. In Single Usor MIMO (SU-MIMO), also known as Spatial “Multptexing (SN), each antenna caries a separate data stream on each frequency assigned to the user. Each receiver picks up the combined signal an each frequency, containing the sum of all symbols sent in each symbol time. The multiple copies of the same received signal, ‘long with the UE's knowledge of the MIMO. matrix chamel (derived from reference signals from each transmit antenna), allow the UE to extract each of the original symbols, This diagram illustrates @ 22 MIMO eystom, with two transmit antennas and two receive antennas. The signal between transmit antenna 1 and receive antenna 4 is quantified by the channel response hy,. Each of the four possible paths has its charactereties. Accurate channel charecterization al each transmit antenna ta independently deliver 8 citforent data stream, potentially increasing the peak data retes linearly with the number of transmit antennas; a 2x2 system can double the data rate, while a 4x4 system can quacrupte i ‘own channel response 2 | TD-LTE Technology Single User MIMO (SU-MIMO) bch antenna transmits a ‘Separate data seam ath receiver detects the combination of al symbols on ‘each frequency Tne net result @ significant higher date rate, since ‘each transmit antenna is sending a separate data stream in parallel using the same frequency and time resources, ‘atthe cost of increased receiver complexity. 87 2 | TD-LTE Technology Arena WY ee ETS phase wt t pela het | i ' j ' Beamforming Concept Stanal 4 After Boamforring, Powar= (2a = axe Beamformingis a signat-processing technique that mimics ‘leer hardware methods that used veriabieengtn cables ong to aifferont antenna elements. The modern signal processing methods are widely used in electronic antenna arrays for the diecuonal vansmission oF reception of Signals. The improvement derived from nacrowed and directional beams, when compared with omnidirectional receptions, Is known as the transmi/receive gain or loss, tranemissions ot Boamforming results in spatial selectivity, which is achieved by using adaptive or fied receive/transmit beam patterns. The beam patterns come from the Gifferent relative phase shits observed antennas at cifferent points in space. A mobile, for example, st @ certain point rolatve to two antennas transmitting the same information at cifferent relative phase offsets wil "see" varying degrees of constructive or structive combing of the two waveforms from each of the two antennas at afferent points ween the 58 When tranemitting. @ beamformer controls the relative phase of the signals from each transmitter antenna in cotder to create a pattern of constructive and destructive interference in the wave front atthe rocover 2 | TD-LTE Technology MU-MIMO: SDMA Implementation Radio channels in cell B: 200 cell throughput: 80 Mbps “Danette rout eee rawbach: Poona high iterternce MUSMIMO in LTE provides mult-stream transmission to ‘muliple users simultaneousy. Tis increases the system ‘throughput. Also, it increases the sum date-rate and Fedduces the latency of mobile users as compared to other multiple access schemes like TOMA, In MU-MIMO inter user interference 's a major challenge and needs to be taken care at the transmitter so as to save UE power consumption and keep them as simple a8 possible, The Mult User MIMO (MU-MIMO) theory is based on SDMA concept, Le, use of epatal sharing ofthe channel by the sor. It Schedules multiple usors in one time frequency Sot. It needs extra hardware but no extra bandwidth 59 2 | TD-LTE Technology PUSCH and UL Antenna Selection Antenna Port 0. . * con oon y ene Pusch Trait) Basie Contents: UL resoute allosation (RAs, hopping, MCS), TPC, DMRS, CQ! Request CRC forthe DCI: 26 bts ‘Maske with (UE ID .e., CANT) (GUE transit antenna selection mask (0 oF for antenns ort Oor 2), When closedttoop antenna selection is enabled the NB tell its UE which ofits antennas to use on its PUSCH with ‘an impli signaling mechanism within the UL scheduling rant on the eNB's DL Contr! Information (OC directes toward the UE. The DCI includes all kinds of information useful to the UE: Radio Bearer (RB) assignments, prescribed hopping sequences {ON ar OFF, intra or intr Subrame frequency hopping in oxpict or predefined patterns), the applicable Modulation and Coding Scheme (Mi), Transmit Power Control (TPC) far the UE, the power of the Demodulation Reference Signal (OMRS) relative to the eNB's carrier power, and the COI requests. The OC's message includes 2 16-it Cyalic Redundancy Count (GRC), a type of biock coding which ie masked with the UE's 1D (]CRNTE oF CeI-ANTH and the eNB's antenna preferences (antenna port 0 or antenna port 4). 60 2 | TD-LTE Technology MU-MIMO in the UL i arte A Teantenna UEL Goals UE2 Breer gat any * Keep terminal cost lowe Miers Pier ore i(reauency tie slot While MU-MIMO can significantly increase capacity and/or ‘throughput in the downlink, it can also be applied in t Uplink. The goal of uplink MU-MIMO is to increase uplink ‘sector throughput with just one transmit antenna at the UE, Note thatthe cost of the UE fs kegt low inthis case. I we start using multisle transmit antennas at Would need to worry about the cost of transit power requirements, processing power, end complexity. antennas, Consider a system in which we want to implement uplink (2x2) MU-MIMO, To have two tansmit antennas in the uplink, we wil use one antenna fom one UE end another antenna ftom another UE. The eNB uses two reooive ‘antennas to receive signa's from two transmit antennas, ‘The basic operation of uplink MU-MIMO is similar to that {or downlink MUMIMO. Basically, one transmit antenna sends out one data stream, and another transmit antenna sends out another data stream. Two UES use the same radio resource Yrequency time sla) In order to use uplink MULMINO, two UES need to locate in goad radio candtion, Uplink MU-MINO can increase UL s example, throughout. For 2 system with one transmit antenna and one receive antenna yields a sector throughput of 10 Mbps in the uplink, uplink (2x2) MUMIMO can provide sector throughout of 20 Mbps in the uplink 61 2 | TD-LTE Technology A Closer Look at PHY Layer Processing 2 | TD-LTE Technology MAC POU Physical Layer Processing Code Block Segmentation A number of steps are required at the PHY layer to prepare packets for transmission over the alr. The exact sequence is slightly different between the uplink and downlink due to the use of SC-FOMA instoad of OFDMA; however, the initial stops are identicet: 4. A checksum (CRO) Is calculated for the MAC layer Packet Data Unit (PDU) which contains the Information to be sent over the alt. This CRC is ‘appended to the end of the bits in the transgort block. 2. ifthe POU is large it may be segmented into smaller blocks to match the assigned transport block size. If 0, 8 separate ORC is caleulated for each transport bioek Channet coding is applied to the block for forward error correction, ether 3 4/3 convolutional coder (for signaling) ora 1/3 Turbo coder (for data), A, Rate matching allows the effective rate of the \vansmigsion to maton the actual channe! conditions, ‘The resutting code blocks aro concatenated into the code word to be tranemited. Note that the contents ofthe original MAC POU may be spread over muitite 6 2 | TD-LTE Technology onthe 1 64 Si Downlink PHY Processing ‘Scrambling Modulation ayer Mapping pyr (OFDM Signat Generation sumo “Transmit Diversity + Spatiat Multiplexing Enna rink the code words are processed as folows: The code word |s scrambled with the appropiate scrambling code. This identifies the source of the \tansmission and randomizes the interference. The bits are then modulated with the appropriate adulation scheme (BPSK or QPSK for signaling, QPSK, 16QAM oF 64QAM for data). The higher the ‘adulation scheme the fewer symbo's are needed to trangeit the data, if muttiple antenna techniques are being used the ‘symbols are mapped to up to 4 layers (one layer for each transmit antenna). Precoding dstibutes the ‘gmools to the appropriate antennas based on feedback ror the UE. (On each antenna the syinbols are mapping to the Individual resource elements (subcarriers) essigned tome UE The contents of all of the subcarriers (in the ‘frequency domain) are combined in an Inverse Fast Fourier Transtorm (IFFT) to create a single wideband signal (in the time domain). A Qyelic Prete (CP) is added 10 aliminste the effects of multipath. The resulting OFDM symbol is transmitted over the designated radio carier and the process begins again with the next set of symbols 2 | TD-LTE Technology Uplink PHY Processing ‘SC-FDMA Signal Generation nen noe ‘The uplink process is simiiar to the downtink process: rmultigath. The resuiting OFDM symbol is transmitted cover the designated radio carrier and the process begins again withthe next set of symoals. 1. The code word is scrambled with the aporopriate soramaling code, This identifies the source of the ‘wansmiseion, and randomizos the interference. 2. The bits are then modulated with the appropriate modulation schome (BPSK or QPSK for signaling QPSK, L6QAM oF 64QAM for date). The higher the ‘modulation scheme tne fewer symoos are needed t rani the data 3, A Discrete Fourier Transform (OFT) function spreads the modulation symbols across a set of frequencies to avoid the PAPR problems associated with normal (OFDMA operations. 4, The output ofthe OFT is then mapped to ino resource clements (subcarriers) assigned to the UE. The contents of all of the subcarriers (in the frequency domain) assigned to the UE are combined In an inverse Fast Fourier Transform (IFFT) to create a single wideband signal (in the time domain). A Cycle Prefix (CP) Is added to eliminate the effects of 65 2 | TD-LTE Technology 66 Summary + Characteristics of the LTE Physical Layer are: = OFDMA in the DL and SC-FDMA in the UL, = Channel bandwidth of 4.4 to 20 MHz, and — Resources are assigned per subframe, + LTE TDD utilizes Frame Structure Type 2 * Frame Structure Type 2 consists of DL, UL and Special subframes + LTE supports multiple antenna techniques, including: = Transmit and receive diversity, = Spatial multiplexing (MIMO), and = Beamforming (Spatial Division Multiple Access). aie. 2 | TD-LTE Technology Review Questions 11. Why was SC-FDMA chosen for the uplink? 2. Describe the relationship among sub-frames, slots, resource blocks (RBS), modulation symbols, and sub- ~ carriers, 3. How much is the overhead of reference signals in LTE?” @ |; 4, How do multiple-antenna techniques Improve coverage and/or throughput? 7° 5. Which physical channels carry user traffic in the UL and DL? Pusch, PDSCH 6. Which physical channel carries the DL and UL resource allocations? PRCCH er 68 3 | System Acquisition Chapter 3: System Acquisition Objectives After completing this module, you will be able to: * Explain the steps involved in system acquisition + Describe how UE achieves DL synchronization * Discuss the roles played by various signals and channels in network acquisition + Summarize the processing of relevant channels + Specify the basic steps of the cell selection procedure References: am 2 8 4 51 (6) 70 SGP TS 36.211 - EUTRA Prysleal enannels and medulation GPP TS 36,213 ~ EUTRA Physical ayer procedures, GPP TS 36.300 - EUTRA and EUTRAN Overall description stage 2 ‘3GPP TS 36.306 ~ EUTRA User Equipment (UE) radio access capablities GPP TS 36.321 ~ E-UTRA Medium Accoss Control (@4AC) Protocol specification GPP TS 36.331 - E-UTRA Radio Resource Control (RRC) Protocel specification . 3 | System Acquisition Overview of System Acquisition 3 | System Acquisition Physical Contol Format Indieaton Channel Pinsical Downlink Contol UE | channet [| Prsica: Downing Sores anne! Downlink Channels UL Powor Control, HARG, ‘Sit Timing Synchronization Frame Timing Synchronization ‘Waster information Book Format of he POCCH ‘ULand OL locations “Trai, Signaling Broadcast, Paging eNB ‘Mer powerup, the UE goes through the process of tying te find an LTE network such that it ean receive services, “Tho frst thing thas todo is synchronize with the downlink \ranemissions of the eNB and follow that up with several ‘other steps. The eNB uses several downlink channels to _ssiot the UE with the overall Network Acquisition process ‘The Primary Synchronization Signal is used to obtain sub framelevel synchronization, The Primary Syne Signal repeatedly broadcasts one of tice possible 62-at codes to help the UE recognize where slot transmissions begin and ene. ‘The Secondary Synchronization Signal is used to obtain frame-level synchronization and the Physical Layer Call dentiy. The Secondary Syne Signal repeatedly broadeaste one of 168 possible 62-bit codes to help the UE recognize where fr transmissions begin and end. The Secondary Syno Signal information carried on the within a frame are different. This difference is used to Identty the beginning of tne frame. wo subtrames 2 Both the primary and secondary sync signals ore transmitted on the conter 62 st nd together Uniquely identify the cell using one of 504 possible Physical Layer igentiies. System information Is periodicaly broadcast by all LTE {eNBs. The Master Information Block {MIB} ype of system Information is ropes 1 NB on the Prysical Broadcast Channel (PECH). The MiB contains very few but very important LTE system parameters that are essential in systern acquisition. The MIB information is packed 2s a System Information Master (SIM) message and broadcast on the PBCH every 40 ms. Four frames ate needed to tranamt one copy of the MIB. edly and poriocically transmitted by 3 | System Acquisition ao Jace Primary Syne Signal ‘Secondary Syne Signal Physical Control Format Indication Chane! Physical Downlink Gantrol Chane Physical Downiink Shared Channel Downlink Channels (Continued) Taster Information Block | Format of the POCcH Cio Frame Timing Synchronization UL Power Contra, RAR, ‘UL end Dl Allocations Traffic, Signaling, areadeast, Paging eNB ‘The Physical Control Format Incieation Channa! (@CFICH) is used by the eNB to inform the LES about the number of (OFDM symbols used for POCCHS. ‘The Physical Downlink Control Channel (POOGH) is the channel used by the eNE to carry eontial Information to ‘the UE, The POCCH channel carries an ACK/NAK response. 10 the uplink channel. Also this channel cartes wansport format allocation, the UL scheduling grant and resource allocation information for the UE. “The Physical Downlink Shared Channel POSCH) is used to carry user data, paging and control signals and broadcast information, 73 3 | System Acquisition ao Process of Network Acquisition Soci fein ‘The UE performs the functions shown in the slide in ‘sequence during inal cell selection. With the completion ‘of call selection procedure the UE will have downlink ‘syncnrorization withthe eNB. Following the power-up, the LUE undergoes a sories of herdware tests to vert intogriy ff memory and other peripherats. It selects a frequency band to acquire an LTE systom based on its configured list, At this point, the UE stil has no knowledge of any ‘operator's presence. It simply tres to acquire the network. Tne UE scans for the syne signals to scquire frequency ‘and ume synenronization. Once the UE sequires primary and secondary syne signal information, it gains knowledge about both synchronization and physical cell identity. Now, the UE Is ready to download the master information broadcast through a broadeact cnanncl to select system banawitn, Now, the UE decodes the contro signal information from the PCFICH channel and reads the POCCH channel to find ‘out the system information resources on the shared ‘channel (PDSCH. 74 ‘Then, the UE decodes the System Information Broadcast (SIB) messages to acquire the PLMN ID of the network. I the PLMIN ID of the network matches withthe PLMN 1D list of the UE, then UE runs the coll selection algorithm. I all ‘election Is successful, tren UE tries to acquire TOD Configurations to know the OLUL subtrames and UL synchronization through the intial aecess procedure, else the UE acquires anather LTE cell and restarts the process eeein. 3 | System Acquisition Processing of Synchronization Signals and PBCH 3 | System Acquisition Downlink Synchronization Seen ‘The UE performs the functions shown in the side in ‘sequence during Physical Layer Cell Identity (Pci ‘2cquisition. After completion of power-up tests, the UE Intates OL synchronization and the PCI acauisition procedure. ‘The first step in the process i the frequency scquisiion procedure, where the UE tres to acquire the center 1 MHz (72 subearrirs * 15 ktHe = 3.08 MHz) bandwith to decode tne primary syne signal, secondary sync signal anc ‘2 set of system information parameters. The eNB transmits this information on the subcarriers within the 4 MHz bandwidth. This mechanism of using only the ‘smallest possitie bandwidth configuration of 1 MHz provides a consistent way for UES of different capebilties to acquite networks that may be operating with ary of the possible bandwidth configurations (1.4 MHz, 3 MHz, 5 ‘Hz, 10 Miz, 25 Miz, 20 Miz) ‘Next, the UE tries to acquire the primary syne signal to get slot synchronization. The primary syne signal repeatedly broadcasts one of three possible 62-bit codes to help the UE recognize where slot transmissions begin and end. ‘Using the primary syne information, the UE tres to acquira 76 ‘the secondary sync signal to acquite frame synchronization. The secondary syne signal repeatedly broadcasts one of 168 possible 62:bit codes to nolp the UE recognize where frame transmissions begin and end, ‘The secondary syne signa information carried on the two ‘sulbframes within a frame are different. This difference is Used to identify the beginning of the frame. Soth the primary and secondary syne signale are transmitted on the conter 62 subcarriers, and together uniquely identify the cell by using one of 504 possible PC. 3 | System Acquisition Frequency Locations for Acquisition _ Syne Signals (62 subcariors) A 4 =a BCH (GRBs) Look t coer 62 subcaties “round progrrimad eareet Heauoney fo setae yz senate ‘The slige shows the UE frequency acquisition procedure in LTE, The EUTRA cell search procedure supports a ‘scalable overall transmission bandwidth of 1.6 MHz to 20, [Mtiz, corresponding to sik of more Resource Blocks (RBs). Each RB consists of 12 subcarriers per OFDM symbol, Te UE first detects te central part of the spectrum rogardiess of recenng bandwidth capability. In this figure, the cell operates at 2 20 MHz bandwidth. ‘The UE detects the center spectrum of the 20 MHz spectrum. The primary synchronization and secondary ‘synchronization signals are carried on 62 subcarriers and Physical Broadcast Channel (PBH) information is always ‘spread over six RBs (72 subcariets). They carry 620i sequences that occupy the center 62 subcarriers wile five subcarriers on either side are reserved for further use, Onee the UE detects primary synchronization and secondary synchronization signals, i acquires all timing related parameters. As the PECK is tmo-aligned with the syne signals, the UE acquires the BCH channel and reads, the system information, One essential piece of Information sent on the BCH is the ansmission Dbandivicth for actual data transmission. 7 3 | System Acquisition Slot Synchronization in TD-LTE Frame ed a Ti Some Holtframes: a a Sms a subtrames of@)?[sl4*lslel714[2 Slots i=0fi=aqiF 2[=3 5 ms ‘OFDM Symbols (for Normaice) — |“ {of 3 Primary She Signal sequancas ave ransmitad on Time Sot 2 and Slot 12 ‘ter power-up, the UE tres to obtain time and frequency ‘synchronization withthe system. For thi, the UE needs to dotoct signals to ceteet where the slot/subtrame/trame begins and ends. LTE defines two types of synchronization, signals: the primsty synchronization signal and the secondary synchronization signal. The primary ‘synchronization signal is used to obtain. slotlovel synchronization and detect GP (normal or extended CP) The primary and secondary synchronization signals, ‘together faciitate TOO frame structure recognition (as ‘opposed to FDD frame structure). Primary synchronization signals consist of one of three 62: eymbo| ZadofF-chu sequences in @ cell, and are always \wansmittes on the third OFDM symeol of slots 2 and 12 (OFDM symbo! 2 ofthe rst slots in subframes 1 and 8) in ‘ TOLTE system. Detection of the primary end secondary synchronization signals during specific OFDM symbols lmplicty informs the UE whether the E-UTRAN is using TDD or FDD in hat cel. n an FOD system, the lat OFDM symbol during slot © and slot 10 contains the primary synceronizstion signal 78 3 | System Acquisition UMTS LCR TDD Frame Structure Frame na a me ‘subframe The Frame structure, applicable for UMTS Low Chip Rate switches from reception to transmission mode slong with (LeR} Time Division Duplex (TDD) Is as shown in the figure. two way propagation dotay. The frome duration i¢ 20me lke In tne case of UMTS/LTE FDD and consists of 2 Suatrames of Sms each ‘A UMTS LOR TDD Subframe is shared among both UL and DL transmissions with a switching point in between them. 1A Subtrame consists of 7 Time slats 0 through 6 each having duration of 675 US that ean be ether used for DL (oF UL tranemigsion, The tlrst time eit © and the second time slot 4 are always used for DL & UL transmissions. respectively. Between those two time slots, Switching point allows the communicating devices (UEs ard NodeBs) to switen from transmission to reception mode or vice ‘Switching point consst of three special fields Downlink Pilot Time Slot (OwPTS), Guard Period (GP), and Uplink Pilot Time Siot (UpPTS), The DwPTS of 7 US duration and UpPTS of 125 US are Used for DL and UL synchronization respectively. The Gusrd period Is of 75 uS duration allows the Node8 to ‘switch from transmission to reception mode, while UE 79 3 | System Acquisition Frame Synchronization in TD-LTE ta tone 5 z ——+ setane a o[t se ole F2 Jorou amon | Crtornermarcr) ma — “+ of 188 Secondary Sync Signal sequences & transmitted during Slots 1 and 14. eaves ners eine es Sustain niss wa oaacn ‘AMter the primary syne signal acquisition, the UE tries to References: detect the secondary synchronization signal. Secondary synehronization signals are found in the ast OFDM symbol in slots 1 and 41 (the thvee OFOM symbols preceding the primary synchronization signal). Secondary signals are one {2} SGPP_ standard contibutlons: 1.062990, RA- of 188 G2bit_msequences. Each msequence 063089, R1-063197, corresponds to a unique Gell Group 1D and is made of two concatenated 32-bit mseauence groups. The groups are mixed diferently in slots 4 and 41, which helps the UE determine the start of a new fame. Again, detection oF the primary and secondary synchronization signs during specific eymbo's imply informs the UE whether the E UTRAN is using TDD o¢ FDD in that eel [2]. In an FOD system, the second tolast OFDM symbol during set O and slot 10 contains the secondery synchronization signal Furthermore, such timing structure provides comoatbilty ‘with legacy UMTS Low Chip Rate TOD (LCR-TOD) networks {also known a6 TD-SCDMA networks) {1} 36 Americes, “3GPP LTE for TDD Spectrum in the “Americas,” Novernber 2009. Physical Cell ID Secondary Sync (No*) Primary Syne (No?) Physical Layer Cell ID LTE defines 604 unique Physical Layer Cell Identties. These identities. are arranged as 168 unique 62bi ‘Sequences representing unique cell group Kentites. Each ‘ofthese sequence is then serambled with one ef three 62: bit zedoffchu sequences to get 168 * 3 = 504 unique cell Identities. Each eN transmits one of the 168 unique 62- bit sequences on the secondary syne signal and one of the tivee unique scrambling sequences on the primary syne ‘signal (.e., secondary syne signals are serambled with one of the thvee unique zadof.chu sequences transmitted on the primary syne signal). The UE first acquires the primary syne signal to know the unique 62-bit zadoff-chu sequence (fiom a set of three sequences) and get time synchronized with the system. Using ths information, the UE tes coherent detection of tho secondary syne ‘information to extract frame timing and the PCI. Hence, ‘the UE can easily decode the secondary sync signal and igontify the unique PCI, 3 | System Acquisition aL 3 | System Acquisition PBCH UE Master Information Block (MIB) Master Information Block {OL System Bandwidth, System Frame Number, ltl Antenna Configuration, PHICH Configuration MiB information repeated in 4 consecutive rames ens _— toms Radio Frames! Slot Subtrame 0 Subtrame 9 aii | Center 72 subcarriers in the Dandwidth used ] SF System Frome Number ‘Tne Master information block (MIB) is important system Information that an eNB broadcasts every 40 ms with 2 repeat broadcast every radio frame (10 ms) on the PBCH. ‘The logical and transport channe! for the MIB broadcast Infoxmation are the BOCH ang BCH respectively. The MIB information and parameters include: + Physical Layer parameters lke bandwidth, MIMO trensmit antennas (MIMO Information is masked with the CRC of MIB), and reference signal help @ UE configuration to receive and transmit messages. the LTE downtink + The system N) helps in synchronization and provides a source of reference to find the system information blocks. Frame Number ( ~ System Frame Number (SFN, mod 4 = 0) starts the tranemission of now MIB information on the Pack = In each of these four radio frames, four symbols x72 subcarriers are used to send the MIB, 82 In each ofthese four radio frames, the came MIB Information is peated IMIB content only changes at SEN mod 3 | System Acquisition BCH Processing | mansport Block 7 - OR ‘GRC Atchment_—) ——_ 4: _ [Transport Block [areRem ee Sie Raya Ker, pS teribi ing i oseners “1 ‘This side shows the BCH processing in sequence. The first step in BCH processing is the CRC’ computation of the lranspert block that contains MIB information, The computed CRC Is then appended to the transport block. Talking convolution coding with the rate 1/3 and constraintiengih seven is used at the channel cocing block. The three output streams of the channel coding forms the data (Party 1 and Party 2 sub packets) where the data packet contains exclusively data bits while parity 1 and 2 eub-packets contain only parity bis essential for, error correction. All three subspackets are of the same length equal to that of the transport block. At the rate ‘matching, combining of the three sub-packets with ‘puncturing yields a single sub-packet that forms a code \word. The code word is now applied to the Physical Layer ‘processing for system informiation broadcast on the PACH. 83 3 | System Acquisition PBCH Processing a 34 rows 5 | Sent econ ie (Moos. =2 | Ce ofowa | Sent | Layee: Ce) ‘yak Procecing Mate ‘This slide shows the PACH processing in sequence. The MIB information contained in the code word Is fst ‘rambled with the cell 1D. The randomization ofthe bits will provide the receiver (UE) with a means to identity the ‘source of transmission (eNB). The scrambled codeword bits are now mapped to complex valued symbols using the (QPSK modulation scheme, This provides & modulation fain of two, The complex value symbols of the code word is then layer mapped and multiplied by a suitable precoding mattix to derive multiple streams for MIMO transmission - 2, multiple copies of the same code word is tranemited on cifferent antennas (mapped on different layers). LTE supports two or four antennas for transmit diversity. Resource-eloment mapping and OFOMA signal generation are pxetormed separately for different layers. ‘The procoded data stream is mapped on the scheduled radio resources by the resource-clement mapper. Final, ‘the MIB information is transmitted on the PBCH after ‘OFDMA signal generation, 84 3 | System Acquisition Exercise: Locate the Signals/Channel * Map the Primary and Secondary sync signals on the LTE resource grid. Map the Physical Broadcast Channel on the LTE resource grid. Questions to ask yourself include: —Which and how many RBs? — Which symbols? as 3 | System Acquisition Acquiring SIBs ‘Ariswors tre How many OFDMA symbols are + Where are SiBs ? POSCH + How to find PUSCH? PDCCH Control Format Indicator (CFI) ‘Why does a UE Need to look at PCFICH here? + How many symbols occupied by POCCH? PCFICH (Once the UE has read the PBCH, it needs to read the FPCFICH, The PCFICH carries the Control Format Indicator (CF) fle, which indleates tothe UE the number of OFDM ‘symbols in the sub‘rame that wil erry the POCCH. The: POCCH eatties information about the radio resourees for the POSCH that will eary the SIB information. The CFI Information s-3.2-bi number, containing a number - one to four - indicating the POCCH channel. LTE supports a ‘maximum of three OFDMA symbols to carry the POCCH ‘when the number of RBs is 10 oF more in cases of FDD. 3 | System Acquisition a7 3 | System Acquisition PCFICH Processing J eave ‘Block Coane goa ode werd (22 is) Seramoior 1b and Sotsrane No} (ape + ee ec 4/2/3 Pecoding Nate (2-2 Se mitseg ea trant | =)-(s)- ‘The PCFICH fs @ physical only signal that carries the CFI. This slide details the PCFICH processing In sequence. Block ceding with rate 1/26 is performed on the nt CFI to generate a 22bit code word. The code word is then serembled with cell ID and the subframe number. The seramibling Sequence enables the UE to identify the eB ‘and the subframe number to which the CF is received. [Modulation converts 32 coded symbols to 36 modulation symbols. 88 3 | System Acquisition Time-Frequency Location of PCFICH MMM Resource Element Group (REG) 4150 subcarrirs for 10 MH2 4 REGS for 16 QPSK modulation symbols (Spocitc subcarrier location of the REGS: function of Physical cel ID (PCH), Bandwidth) ‘The 32 bit CFI information fs transmitted using QPSK rmadulation; therefore, CFI codeword has 16 symbols. Also POFICH is always transmitted on the fist OFDM symbol of the subframe as shown in the slide. Recall that the Resource Element Group (REG) consists of four or sx subcarriers for one OFOM symbol duration (le, 4 or 6 resource elements) snd enables transmission of four ‘medulation symbols. Each REG in the frst OFDM symbol has four subcariers to carry 4 modulation symbols while two subcarriers cary reference signals. Therefore twansmission of 46 symbol CF requires four REGS. These ‘our REGS are distributed aoross the system bandwidth on (OFDM symbol 0. These four REGS present PCFICH, PCFICH is a function of banewidth and the physical cell 1D. in LTE the maximum bandwidth support is. 20MHz with 4100 RBs or 1200 Subcariers. Hence maximum qumber of REGS possible is 1200/6 = 200. But each PCFICH ‘occupies four REGS ina cali 3, more than one cell (eNB) can have tne same PCFICH channel. Care must be taken while system planning to ensure neighooring cells ‘do not hava the same PCFICH channel interfering with one another. thre ‘The four REGS that form POFICH ina collis given by REG 1=pmodn REG-2= (p+ a)modh REGS =(p+2.q)modh REG 4=(p+a.q)modh Were, B= Wgc/2)(Mo¥ Od 2. Ny") = Lower bouns Ng*/2) -Nect/2 = Nga Not Physical Cell identity (0 to 603} Net Resource block size (42 subcarriers Nea Downlink Bandwicth (six to 100 RBS), 29 3 | System Acquisition Resource Element Groups Why? Control channel mapping ‘Sub cartiers 23 OFDM SymmboS + 1 REG: 4 modulation symbols + REGs occupy up to 4 OFDM symbols in DL Subframe + REGs occupy up to 2 OFDM symbols in Special Subtrame ><: Reference Signals Resource oloment groups aro used for defining the mapping of control channels to resource elements. Frequency diversity is obtained for the cantrol channel by distributing mociulation symbols over a larger frequency bandwicth In the first OFDM symbol of the fist slot in 2 subframe, there are two resource element groups in a physical resource block, For PRE 0, the first resource element ‘70Up includes six subcarriers from 0 to 5 and the second resource element group includes sx subcarriers from 6 to 44. AS an example, with one antenna port, reference lgnal will ome on subcarriers 0 and 6, With two of four antenna ports, reference signal could exist on subcarriers 0, 3, 6 and 9. In the second OFDM symbol, two REGS. exits in a PRE in case of four reference signals and three: REGS exst inn @ PRE in case of one or two reference signals. In tho third OFDM symbol of tne frst lot in a sub. frame, there ore three resource element goups in physical resource block. In the fourth OFDM symbol of the fist slat in a sub-rame, there are three resource element, groups in a pkysical resource block in case of normal CP ‘and two REGS in a physical resource block in case of 90 ‘extonded CP. n case of 3 REGS por PRB, the first REG has four subcarriers from 0 to 3, the second REG has four ‘euvcarrirs from 4 to 7, and the third REG also has four subcarriers from 8 to 11, 3 | System Acquisition Based on the information tranemitted on the PCFICH, the UE knows how to read the POCCH channel information. The DL Contol Information (OCH field of the POCCH carries the scheduling information about resources allocated on the PDSCH for carrying SIBs, user signaling information end user traffie. The OC! information is scrambled with a 16-bit Syeteminformation Radio Network Temporary Identity (SERNTI) (OsFFFF) for Identfication of SIBs. Several DCI formats have been ofined to carry resource allocation and packet formats ‘or the POSCH and the PUSCH transmission, DL Control Information (DCI) + Gonveys POSCH resource ‘allocation forSIBs (and user signaliog/tati) + Scrambling: Function of S-RNTI on 3 | System Acquisition PDCCH Processing ay eng cevouton Coy PoccH Codewords PogcH, FOGCH, POCCH, Mutilexod ode rss ate Matching | ca Seema (cou Se No) cae) ~ Layer Mapping: Predetermined ‘Vayk Precoding Matis Muliple Antenna Sonera: ranamit buses —— =) -() (ae 2-2) PDCCH transport block processing is similiar to that for the PBCH transport block, The first step in PDOCH processing 'S the GRC computation of the transport block that contains the OCI, The computed GRCis then appended to the transport bock. Taititing convolution coding with & rate 1/3 and constraintiengin seven is used at the channel coding block. The three output streams of the channel coding forms the data, party 4 and parity 2 sub packets where tho data packet contains exclusively data bits while party 1 and 2 eub-packets contains only parity Bits essential for e1ror correction. All three sub-packets are of the same length equal to that of transport block. At the rate matching, combining of tne tres. sub-packets with puncturing yields @ single sub-packet that forms a code word, The code word is submitted to the Physical Layer processing streams for tansmission is mapped on resource-clement mapper. Muluple POCCH code words are multiplexed and then scrambled. Next, they are mapped to complex valued symbols using the QPSK modulation scheme, This provides @ modulation gain of two. The complex value symbols of the code word is then layermepped and muitipied by a sutable precoding matrix to derive multiple 92 LTE supports. two or four nas for transmit diversity. The precoded data stream e scheduled radio esaurces by the Finally, POCCHs are combined with other channols to generate an OFDMA. 3 | System Acquisition System Information Block Type 1 + 80me TT eNB + Cell, wecking area coae NE + Gell baring status + @Bxievin + ToD configuration + “Scheduling information for ther SiBs a ENT SANE SAND SUNS SANA SPINS SENG SHUT "ae SIB type 4 Is important system informetion that an eNB broadcasts every 80 ms witha repeat broadcast every two rach frames (20 ms) on the POSCH. SIB type 1 messages help the UE in eell selection. The logical and transport channels for the SIB that broadcast information are the BCCH and DL-SCH respactwoly. The parameters in SIBL Inctude: + PLM IDs ofthe network operator, + Cell 1D and tracking area code information useful for the UE on mobility, + Coll barring status to indieate whether the UE can latch on to the cal or not, + Qfxtevmin,a scalar quantity that helps cell selection, + Available UL/DL radio subtrames and the special subframe pattem (DwPTS/GP/UGPTS), and + Scheduling information that indicates when transmission of other SIB6 starts and what the periodicity is. 93 3 | System Acquisition System Information Block Type 2 ‘Access Probability Factor ULBandwidth UL Ole Pref RACH Configuration Ns SIB type 2 holps the UE access a coll, The SIB type 2 parameters are: + Recess Probablity factor: A scalar that indicates the ‘success rate of inital access. + ULEARFON: Indicates the UL LTE carrer frequency. ‘+ ULBandwidth: Indicates the UL bandwiath + UL OVcle Prefix: Indicates the use of Cjtic Profi (Normal or Extended) on the UL when DL uses either ‘Normal of Extended CP. + PRACH Configuration: Indicates the physical resourees for the inital random access in terms of subframe number + RACH Root Sequence: A logical root sequence to generate cell-specific preambles for random access inition oa SIB Mapping T= 80ms SEN . Wa 1a 3 | System Acquisition TE > corirrine oar cr > seine This slide shows tne hysical resource mapping of SIB information on the PDSCH. SiB 1 nas a periodicity of 80 ime (8, overy eight radio frames). Tne SIB 4 inforration Is ‘ranemitted on subframe § of evennumbered radio frames. n subframe 5, the scheduler at the eNB decides ‘where IB information should be waasmites. This, information wi be conveyed in the POCCH. SIBs otter then SIB 1 are scheduled based on the eNB scheduler decsions, 5 HB > serene eres 95 3 | System Acquisition ‘Aeauire acter rece Cell Selection Summary == ) Information aqui ae ib Stay lfermaton seul) Init Asons Probedure ‘This slides shows the flow chert describing the intial cell, selection procedure 4. The Initia! cel) selection process starts with DL symohronization and bandwidth selection. The OL ‘synchronization procedure includes frequency ‘synchronization, slot synchronization with primary sync signal_and PCI acquisition, and frame ‘synchronization with the secondaty syne. signal acquisition. I any of these procedures fal, the UE wil restart the whole procedure with another LTE cel. Once the DL synchronization Is successful, the UE ‘ties to decode the MIB on the PACH. The MIB provides the UE with bandwidth information. The UE will now scale the FFT size in accordance with tre system bandwidth information acquire, 2. Tho second stop inthe cel selection procedure is SiB ‘ype 1 acquisition. with successful bandwiath selection, the UE tries to decade the DCI information +0 know the SIB resources and receive the SIB type 2. Information. For cali selection, the UE requires the PLMIN 10 of the network, cell barring status and Rc levmin threshold from SIB type 4. The UE frst checks 96 the PLMN ID. If i fail, the UE restarts the cell selection procedure again with a new LTE cell Otherwise, ifthe UE found a matching one, it checks the coll-barred status in the SIB typo 4. I tho cll is barred to latch on, the UE restarts the cell selection procedure again with @ new LTE cell. It checks another important parameter, Ri-lovmin threshold. If the measured signal strength is higher than this threshold, the UE proceeds to decade the SIB type 2 message on the PSH. Othenwisa, it repeats the coll soloction procedure once again with a new LTE cel. (On suecessful reception of SiB ype 2 Information, the UE checks withthe accass probably factor. I it finds a favorable value, then the UE will select the coll and Initiate @ random access procedure to register with ‘the network. The UE starts the call selection procedure again with @ new LTE cel 3 | System Acquisition Summary + AUE uses primary and secondary syne signals for timing and frequency synchronization, identification of the Physical Cell ID and for determination Duplexing schemes. + The UE reads the MIB on the PBCH to retrieve critical system information such as system bandwidth, + The PCFICH informs the UE which symbols carry the PDCCHs. ‘+ The PDCCH specifies the PDSCH resources that contain SIBs (among other things). + The cell selection procedure involves the selection of a suitable cell based on the signal strength + System Information Block 4 informs all the UES of TOD Configuration “i 97 3 | System Acquisition 98 Exercise Pretend that you are a UE and you have just experienced Power-up/Power-on. 1. Describe the order in which you will process the following signals/channels: -PDSCH, PCFICH, PDCCH, PECH, Primary Sync, Secondary Sync 2. Specify the main purpose of a given channel during network acquisition. 3 | System Acquisition True or False? 4. Tho UE can easiy figure out the PHY Layer Cel 1D jut by observing the primary and secondary synehronization signals. -V/ 2. The UE learns about the system bandieth based on the way iis programmed or configured. x (MIB) PRCH 3, PBCH cares ll IDs so thatthe UE learns about the system. x 99 4, Resource Element Groupe (REG) are defined so that the UE knows ‘what primary and secondary synchronization sequences to look for «uring network acquisition. \ ° sh 5, SIB2 informs the Ues about the TDD configuration of the cell. - 99 100 4. System Access Operation Chapter 4: System Access Operation 4 | System Access Operation Objectives After completing this module, you will be able to: + Summarize the random access process + Discuss the role of System Information Block 2 * Specify the format and use of a preamble + Show how the PRACH is mapped to radio resources + Explain how collision and contention resolution are managed + List examples of random access characteristics, unique to TD-LTE References: a) 2) 8) coy (5) (9) 102 GPP TS 36.211 ~ EUTRA Pnysical channels and ‘modulation 3GPP TS 36.213 ~ EUTRA Physical layer procedures 3GPP TS 36,300 - E-UTRA and EUTRAN Overall description stage 2 _aGPP TS 36.306 - EUTRA User Equipment (UE) radio access capabilities aGPP TS 3 {MAG} Protocol specication ‘3GPP TS 36.394 {RRC) Protoco! .321 = E.UTRA Medium Access Contrl EUIRA Radio Resource Control pecifeation 4. System Access Operation Random Access Process Overview 4 | System Access Operation Random Access Procedures Contention-Based + UE‘nitiated + Random preamble + Risk of collision Ric eNB Non-Contention-Based + eNBinitiated + Assigned preamble + Guaranteed success an LIE suppons two types of random access procedures. \mich one is used depends on the specifi circumstances. + Cantention-Based access is the “normal” access process, and is used on inital system access when & radio link is lost, when uplink synchronization is lost, ‘and during some handover scenarios. The UE initiates the process by transmitting @ randomly chosen preamble over the RACH, and then waits for a cortesconding uplink assignment from the eNB. ‘fore it ean transmits message. + Non-Contention-Based access is used when the UE is already in communication with the eNB, The network imtiates the process by sending an allocsted ‘preamble to the UE indicating ven it can transmit. Since the eNB controls the process, there are no Ceolisions with ether UES and latency Is significantly reduced. 104 4 | System Access Operation Contention-based Random Access fi Siaticcn) Screen Rao) ena Noncontenon asad + Dedleted Random Assess Preamble sllocatod in Step 0 + Oniysteps 1 and 2 appeabe “The bssic steps involved in contonton-based access are: 4. Random Aecess Preamble Transmission: Once @ UE has eelected a call it listens to the system overhead information transmitted an the downlink. The system Information blocks (SIBs) provide configuration parameters for the network, SIB 2, In particular, includes Key parameters for intial system access, The UE selects a random preamble and! sends it over the PRACH, The transmit opportunity is identified by the RandomAccess Ragia Network Temporary ID, or RARNTI. In LTE FDD, the RA-RNTI identities t frame number and ranges from one to 10. It is fbvious that multiple UES may transmit in the seme ‘eub-rame and thus use the same RANT! e eub- 2. Random Access Response: The eNB all resources for tne UE end sends 3 response on the POCGH identitying which UE group the allocation is for by using the RA RNTI, Within each ARNT) group, the A preamble identifier is used to identiy a specific UE, The random access response contains the timing ‘adjustment, UL resource allocation, and CellSpeciic Radio Network Temporary ID, or GRNT. 108 uplink 105 4| System Access Operation fen eevee Guisiee aaa Scere Bicuresni) Neneontaton Based Random Access: + Dodiotes Random Access Preamble allocate in Step O. + ontystos 4 and 2 applicable Contention-based Random Access '3 Scheduled Transmission: The UE uses the allocated resources to transmit its message (euch as an RRC Connection Request), and includes its assigned C- RNTI and a 48-bit randomly chosen UE Contention Resolution Identity, 4, Contention Resolution: The eNB sends a contention resolution message on the downlink and adaresses to emp C-RNTL if the UE sees its tomp CRNTI and Contention resolution ID in the grant, then its transmission was successfully recelved. The temp C- RNTI is promoted to the GRNT, If the UE has 90 C- NTI yet. If the UE already has @ CRNTI but loses UL synchronization, the UE'S C-RNTI is kept and the temp GRNT ig discarded. Otnerwise, fr other failure and the UE must retry the access attempt Non Contention-based access is used when the UE is ‘already in communication with the eNB. The network intiates the process by sending an allocated preamble to the UE indicating when it can transmit. Since the eNB controls the process, there are no collisions witn othor Es, and latency i eigificamty reduce. 106 4 | System Access Operation Random Access Parameters 4 | System Access Operation Step 0: SIB2 Parameters | Access Parameters * Access probability vet Power Parameters. + Initial target power * Power ramp step + Maximum number of attempts oa + Access barring SIB Type 2 provides @ numoer of detailed parameters needed to generate the preambles and control transmissions on te RACH. These parameters include: +The configuration of the Physical Random Access Channel {PRACH) such as the format to be used for tne random acces preamble, the subframes and tte mupl instances within a subframe that can be Used for access. Multiple instances of PRACH are supported in TOD made to compensate for the less ‘number of UL slats evsilable withthe UES. + Access control settings for managing when UEs can attempt to access the coll, including access protabiities for different access. classes (which determine whether the UE can proceed with the ‘access attempt oF must wait some period of time), ‘and access barring information (which limits which UES can aooess the cal + Information on how to select a valid random access preamble for this cell, based on the roat sequence index and eyetc shit, as well as the number of non: dedicated of sequences, 108 Settings for controling the amount of power to be ‘used wnen transmitting the preamble, starting with the inital target power lovel, and increasing by the power step until either tne access Is cuccesstul or the ‘maximum number of attempts is reached. 4 | System Access Operation Step 1: Transmitting Preamble Petnmencmcomr RACH/PRACH ee ene In te slide above are the steps to process the parameters before the random access preamble is sent. There are five possible formats for the random access preamble, iffering by the length of the felds within the preamble, Bigger preambles take longer to transmit and are better suited for larger cells. The speetic format to be sedis cet in IB 2 SIB 2 also incicates the transmit opportunity, i.e, when (in which Frequency Resources, system frames and sub: frames) the preamble may be sent. ‘The specific preamble sequence to be transmitted is selected randomly using the sequence root index and cyolie shit information from SIB 2. There are a total of 64 different sequences availabe in each coll The initial target power level determines how loud the preamble transmission can be to start. The goal is to estimate the minimum amount of power needed for the preamble to bo successfully recolved by the eNB. If no response is received, the UE will Uy again inereasing its power (by the power step value) until i reaches the ‘maximum number of attemps allowed. 109 4 | System Access Operation co edge) een iis as) E pee en Preamble Format alan [Sequence |r @. ‘Sequence Xms (42,3) (0r2 OFDM symbols This slide explains why different preamble formats are needed. In LTE, & UE has not synchronized with the network in the uplink when it sends out random access preamble. So the random access sequences sent by the LUE at the cel edge and the UE near the eN may arrive at the eNB at citferent moments, But the preamble should ot interfere with the tnformation/sup-rame the eNG receives before and after the preamble, Le., the non: synchronized preambles are received within a window. ‘As shown inthe figure, the preamble from the UE near the NB arrives the earliest and the preamble from the UE at the cell edge arrives the latest. The difference between the artival moments is te guard time, which is equal to te round.ttip delay plus the delay spread. Obviously, the length ofthe rtmines the cell size; a longer guard time supports larger cel size. time In oder to adress altferent coll sizes, five preamale formats are defined for LTE TOD. Depending on the speci forme (formats 0 to 3), 8 preamble may occupy fone, two, oF three consecutive subrames. Preamble format 4 occupies only 2 OFDM symbols in UpPTS field of 110 the special subframe and support a cel size < 1.4 Km of, radius. The cyclic extension or preamble repetition can be used to lengthen the preamble. Note that the preamble format is determined at the network planning stage, and only one format is used for spect coll 4 | System Access Operation Preamble Formats Guard Time oP Sequence Ea Preamble Cod Col [re Sey © | t0as25us | s0o¥e | Asubirame | 96.875 ps | -1¢ km 1 [asaarsys | a00ys | 2subtrames | 518.625 ys | ~75km 2 | 20625us | i600ps* | 2subttemes | 193.755 | -28 km 3 | esaarsus | 1600 ys" | Ssubtrames | 715.625 us | ~103 kn ZOrOM ae 4 | saseus | 2333s | Synto | o4ys | “46 sidayt, 800 vs sequence repeated et. GPP TS 36.241 Here are the details of five supported preamble formats for LTE TDD. A preamble of formats 0 to 3 consists of a cyclic prefix (to handle multipath interference) fellowed by {an 800 ps sequence, The sequence may be repeated in some formats, The taal length ofthe eye pref and the sequence(e} determines haw long it takes to transmit the preamble. Sinea the actual physica transmission occur in ‘nts of eubrames (1 ms), the remainingtime determines how far away the UE ean be without overlapping snother Ue's access attempt (the guard time). Preamble format 4 occupies 2 OFDM symbols and is intonded for use in the UpPTS field of a Special Subtrame, LTE TOD supports more than one PRACHS within @ UL sublrame or UpPTS unlike the FOD system wnere maximum of one PRACH is defined per subframe, For further details, rofer 3GPP TS 36.214 - Physical Channels and Modulstion 4 System Access Operation Radio Frame Info (p,°) +All Radio frames + Even Radio frames only + Odd Radio frames only HALE Frame infotta!) + First Hatt Freme + Second Half Frame PRACH Configuration for LTE TDD Unlike the LTE FOO ease where all the ten subframes, the UL, the LTE TDD has oniy limited rhumber of subtrames for the UL. This leads to a case whore multiple PRACH channels are mapped to the Ssubframes to support equal opportunities for RACH 8s with LTE FOO, Multiple PRACH chennels in each ssubframes are informed ta the UES through @ Quadruple PRACH Configuration. The Quadruple consists of were avaliable Frequency Resource Index ya): Indieates the exact GRBs ina particular subframe time instance, Radio Frame Info hy): indicates whether the PRACH (Channel occurs every radio frame or only in even Radio frames or only in odd Radio Frames. HALF Frame Infotty?) = indicates whether the PRACH ‘occurs inthe first haf frame or the second half frame. Uplink Subtrame number (ty) : Indicates the exact UL ‘subframe number from the start of the UL switching point in a Radia frame. 12 4 | System Access Operation TDD PRACH Configuration lsutrames og gg lg lg lg 7g lot cont nas 7280 DD PRACH Configuration index 48 with :DL Configuration 1 & Preamble format 0. 1 r | i] pea ‘enas/72 80 Fronuoney Oomain $s Rs and mulbe instances within subfome Time Darin Yansrit opportunity fs efned in 36° 36.214 able 713 PRADH configuration” and broadcast a \B2 sila, ‘This slide shows how the PRACH is mapped to the physical _configutaion exemple is ilustrated here, which consumes resource, 418 percent of tre UL resources of a 10 MH system. In LTE TDD, beth UL and OL transmissions share the same andwista, Hence the number of UL subttames avaliable for UE transmission is very less. as compared to FOD version, To support same number of PRACH channels as FDD mode, Each UL subframes support more than one RACH instances. In frequency domain @ PRACH sx consecutive resource blocks, the Frequency location ‘and the number of PRACH instances are determined by the parameter prach-Confignto The times when a random access can determined by the speciic PRACH configuration. SIB 2 Identities whien ane of 64 possible “transmit opportunity patterns will be used In that coll. For exemple, PRACH onfiguration index 18 with UL:DL Configuration of ibe. DL and 2UI subframes per Sms) indicates that preamble format 0 will be used, the random access can be sent in any half frames with in @ system frame, and the access can appear on all UL subrames (2, 3,7 and 8}. On the UL sub‘rames 3 and 8 two instances of PRACH is supported con the ether extremes of the Bandwidth, This gent are 113 4 | System Access Operation meg electro Subcarriers for Preamble Formats 0-3 11.08 MH2/1.25 kll=864 subcartons 6 Bex 12 subearrers 72x15 We 91.08 Miz Fes ya (Guard betweor PRACH. & PUCCH/PUSCH to avoid interference X'S have a close look at the subcarrier mapping of PRACH for Proambie formats O to 3 that occurs only in U Normally, six resource blacks contain (6 * 12 =) 72, 15 ke subcarco ing @ total of 72.4 15 = 1.08 Mi of spectrum, Random access preambles, however, use 864 1.25 kH subcarriers within the same amount of spectrum. The preamble itself uses 839 of those subcarriers in the center of the resource blocks with tre remaining 25 used as glard subcaniers to avoid interference with adjacent sub 4| System Access Oper: Only in UpPTS et Subcarriers for Preamble Format 4 ‘Subcarier spacing7.5 kiiz 1.08 MHa/7.5 kite 6RBsx12 #72 subcarriers 72x18 ue =1.08 Mi 6 For the PRACH, with preamble format 4, Random access. proambies, uso 144 7.8 KHz subcarrier: within the spectrum aguivalont to 6 resource blocks, T ieelf uses 139 of those suocariers in the center of the resource blocks with the remaining § used as guard subcartiers to avoid interference with adjacent subcarriers 4 | System Access Operation PRACH Transmitter Block Diagram e |. Mapping {LTA ovate EH Prefix Further ee) ers processing ‘eam ‘The selected Zadolfchu sequence (le, the random ‘access preamble) Ie processed ike any other uplink channel, using SC-FDMA, The sequence is fist applied to 2 Discrete Fourier Transform (OFT to transform the signal The transformed signal is then mapped onto the appropriate set of 1.25 KHz PRACH subcarriers for preambles formats 0 to 3 while the preamble of format & Is mapped to 7.5 kHz PRACH subcarriers. The modulation mapped subcarriers are then appliod to an Inverse Fast Fourier Transform (IFFT) to generate a wiceband Single carrer lke me domain signal. A cyclic prefix is added to provide protection from mulipatn interference and the resulting signal fs transmitted over the at. 116 4 || System Access Operation Transmit Power Se Preamble Transmission Power ‘Subirames| The rancom access is often the frst transmission from the UE and itis short transmission (less than 3 ms at most). CConsequenty, there is no opportunity to de power contvol of the PRACH from the network. Instoad, the UE must estimate the minimum amount of power it needs to send the access without causing excessive interference. ‘Tho UE receives a number of key parameters for PRACH power control in SIB 2, including + Preamble Initial Received Target Power: The power level the eNB would like to receive for a random ‘access, The default value s-104 dBm, + Power Ramping Stop: The smount of additional power to be used every time the random access is attempted again This can be O, 2,4 or 6 dB, + Preamble Trans Max: The maximum numberof times. 2 random access can be attempted before the UE v0 Up, toa maximum of 20 attempts + RA Response Window Size: The number of sub: frames the UE will wait fora response after a random ‘access, between two and 10 sub frames, The UE will determine the initial power leve! based on the Preamble Infial Received Target Power value end an ‘estimate ofthe uplink path oss (PL) as follows: Peat = erin (Pr Power + PL) Preamble Initial Received Targot Where Paar is the maximum transmit power of the UE, based on its category. If the eNB falls to responc to the random access in the designated time window (RA Response Window Size, then it can repeat the random access (after walting at least four more sub-rames), increasing lis power level by the Power Ramping Step value. If no response Is received attr Preamble Trans Max attempts the UE will return an ‘access failed” indication, a7 4 | System Access Oper: Step 2: Random Access Response PDCCH/PDSCH eNB MAC Random Access Response Cie ese \orabactatineator ‘Timing Adjustment (TA) (24 bits) [Or RA Preamble Identifier} | UL Grant (20 bits) ‘Temporary C-RNTI (46 bits) The random access is carried by the POCCH, which addresses to a group of UES with the same RARNTI, end by tho POSCH, which cartios the MAC random access If tne eNB tells the UE to back of, @ Backoff Indicator MAC header is used. Otherwise, a MAC header carries the RA preamble identifier, which is used to distinguish between LUE® with the came RA-RNTI The MAC PDU contains the timing adjustment, the UL grant, and a temporary CRNTI 18 4| System Access Operation eeu en ra NG No. ZL Reception of RA Response ae ta Identifier Nei eset Yes Backoff and Retransmit ey U Yes ores aut on oe eye Since the UE does not know exactly when to expect @ response from the eNB (it only knows how fong to wait), ‘each random access respanse must identify which access attempt it relates to. Tis is eocorplished by using tne RA. RNTI in the POCCH, and including the received RA preamble identifier In the MAC header, Since the UE kenows when i sent the random access, it knaws which RA NTI to look for. listens to tne RA response until the RA ‘window expires. ‘There are our possible responses from the eNB: 1 The RARNTI and RA preamble identifier in the response match the UE's random access. This is the ‘success case and the UE can proceed to the next step, 2. The RARNTI matches but no RA preamble identifier is, found, Ths is @ colision with another UE and the UE must back off ana ty again ‘3, Nelther the RA-RNT nor the RA preamble mateh. The response is intended for someone else. The UE must continue to wait for te response. If the RA window ‘expires, tho UE wil back off and try again. 4 Note that the eNB can also explicitly tell the UE to back off in the response if there is 2 colision, or even f the random access was otherwise successful. This ‘can be used for access control to soread out inital access attempts overtime. 119 4 | System Access Operation Step 3: Uplink Transmission oo Random Access Response (RAR) ‘POGGH and POSCH [__‘Seheduted ansmission > Transmission it ULSCH/PUSCH In the success case, the random access response from the eNB Includes the additonal information (the uplink gant) that tne UE needs in order to send its transmission (such as an RRC Connection Request message) to the network, ‘The POCCH indicates where the UE can find its Random ‘Access Response (RAR). The POCCH is addressed to the RARNTL, which depends on the subframe the UE nas. sed for sending a preamble. IF the UE needed to use tne random accose procedures to request intial uplink grants, te inital uplink gant Information will be sent in a MAC RAR message as Indieated in the slide. The RAR includes the timing ‘advance command, UL grant, and temporary CRNTL. The uplink grant Gefines the resource black allocation to be used. 120 4 | System Access Operation Step 4: Contention Resolution POCCH and a POSCH eNB Ca atch Yes Yes | Random access process comoiete Yes No Contention, Back off and try again No TT [Waianae ater Te UE will watch for contention resolution from tho eNB. Iti receives one, it verifies thet the temporary CRNTI in the assignment matches its temporary CRNTI, fa UE contention resolution IDis algo included, the UE will check that it matches the one it sent previous. If all ofthe IDs match, the UE knows that its intial access was successful, and its temporary CRINTI becomes its actual CRNTI ifthe UE already has a C-RNTI bofore the random access resumes its CRNT ifthe UE Is unable to match the 1Ds within a given number of subframes (the Contention Resolution Timer, given in SIB 2 set between eight and 64 subframes) the contention resolution process has failed, and the UE must back off and go back to step two of the random access procedure, aaa 4 | Systom Access Operation RRC Connection Establishment ‘ila 4 System Access Operation RRC Connection Establishment Rice esnicnen) Teena Before the UE can receive any services from the LTE network, an RRC connection must be established. The RRC connection is a logical connection betwaen the E: UTRAN and the UE, and is used forall signaling between the UE and the EUTRAN, The EUTRAN can also use the RRC connection to track the location and state of the UE troughout ino ie of ts calls or data sessions. The RRC connection setup process begins with an RRC Connection Request from the UE, This message carries the UE's identity (ts STMS!) and a cause value indicating the reason for the request. Since an idle UE does not have ‘an exsstng connection, this message must be sent using the RACH, The eNB responds with an RRC Connections Setup message, containing the parameters needed to configure the signating radio bearers (SRBs) and data radio bearers (ORB). The setup message wil also include the UE's ‘assigned C-RNTI this 1D wil be used in all future signing ‘to uniquely identity the UE. ‘The UE then acknowledges the successful configuration of ‘the RRC connection with an RRC Connection Setup ‘Complete message, along with an RRC transaction ID and 2 dedicated Non-Access Straturn (NAS) message for the MME. Tne UE may also include the PLMIN ID, MME group ID and MME cade, i it knows the specific MME tnat it reeds to communicate with. A his point, the UE moves to the RRC Connected state. 123 4 | System Access Operation 124 Summary + The Random Access Channel (RACH) is used to support intial network. ~ Multiple UEs can access the network at the same time. — Randomly selected preambles are used to minimize the risk of collisions, + System Information Block 2 (SIB2) provides the parameters the UE. needs lke PRACH configuration, PRACH instances, Access controls, Preamble selection & Power management + LTETDD supports Multiple PRACH Instances within a subframe. + In LTE TDD, Preamble formats 0-3 can occur in any UL subframe while Preamble format 4 will always occur In UpPTS fied. + LTETDD support both 4.25KH2 and 7.5KH? subcarrier spacing for PRACH channel “aie 4 | System Access Operation Review Questions What information does the UE receive from SIB 2? Why is there a need to define multiple preamble formats? Why is there a need to support multiple PRACH instances? How will the UE know the PRACH instance? Which preamble format is suitable for very small size cell? How does the UE know whether its access attempt is successful? 7. Why does the UE increase its PRACH power if the network does not respond? 8. What is the primary reason of non-contention-based random access? OO rONE ae 125 5 | TDLTE Call Setup Objectives After completing this module, you will be able to: * Define an EPS bearer + List the key steps involved in setting up a data session * Illustrate how mobility is handled from a network perspective References: [1] GPP TS 36.331, "Radio Resource Control (RRC) Protocal specification [2] 36° 23.401, “General Packet Radio Service (GPRS) fenhancoments for Evolved Universal Terrestial Radio Access Network (E-UTRAN) access’ [3] 3GPP TS 24.301, "NonAccess'Stratum (NAS) protocol for Evolved Packet System (EPS), Stage 3” 128 |_signatir This picture shows a highlevel view of the main procedures of Network Attachment. Network Altachment 12 UE needs to resieter with the network to receive servicgs. AMter the UE has acquired the network and nas establishes @ Signaling, Radio Bearer (SRB) with the eNB, it performs an initial ‘attach procedure, During the inital attach procecure, the {ENB selects an MME and then establishes a UE-specifc, SL signaling bearer withthe MME. The next step is authentication. Authentication in LTE 1s mutual authentication (Le, te UE and ‘authenticate each other). Then, the serving gateway (5: W) and packet gateway (P-GW) are selected by the MME. The always-on IP connectivity for users of the Evolved Packet System (EPS) Is enabled by establishing a default EPS bearer between the UE and PGW. The attach procedure may tigger ene or muitisle dedicated bearer establishment procedures to establish dedicated EPS bearers for that UE, The IP address can be allocated uring default bearer setup, or it can be allocated after efault beater setup. network Network Attach MME Selection and sa |} ing bearer setup 5 | TD-LTE Call Setup Wit» a successful Attach procedure a established for the UE in the MME, and 2 default bearer is establishes between the UE end the P-GW, thus enabling, always-on IP connectivity tothe UE, 5 | TD-LTE Call Setup We 1A, Attach Request Step 1: Initial Attach Garam) su MME, 40. Initial UE Message 1D. DLNAS Transport 4 SLM Bearer 4A, Attach Request: The UE initistes the attach procedure by the transmission of an Attach Request message, which contains the International Mobile Subscriber Identity (IMS), old Globally Unique Temporary 1 (GUTH, 0° Packet-Temporary Mobile Subseriber 1D (P- ‘TMSI), the UE network eapabily, PON Connectivity request, Protocol Configuration Option (PCO), PLAIN ID and olé tracking atea ID (TAI) to the eNB, UE network capabilities Include security algortnms, Key generation the inter-RAT HO Jpported by the UE. The PDN connectivity procedure is used by the UE to trigger creation of default bearer to a PON. The default bearer creation messages can be transmitted independenty or igeybacked using the Attach-relatod messages. The default bearer creation to the default APN Is done with the Attach procedure. Default bearer creation to thor PONS can be done during Attach or at a later stage. The PCO indicates ifthe UE is requesting fo Iva or IPV6, or IPv4 and IPV6; both address the capability ofthe IP stack associated with the UE. Cerivatives and 1B, MME Selection: Ate recestion ofthe attach request, 130 the eNB selects @ MME. One eNB Is connected to ‘multiple MMEs in a MME Pool Area, soit has a choice to select any MME, A poo! area provides network redundancy. one core network node fails, ts load can be cistributed te another MME. It also provides. load balancing by connecting eNBS to multisie MMES ‘and sharing traffic on these multiple nodes to avoia network congestion. Load balancing between MMES ‘enables the network to ensure equally laced MMES within @ pool area. It also enables UES to be registered with an appropriate MME to balance the load between various MMES. This is achieves by setting a weight factor for each MME such that the probability of the eNB sclocting an MME ic proportional tos weight factor. The wolaht factor 1s, proportional to the capacity of an MME node relative tocther MME nodes, ¢¢, 3 newly installed MME may have a much higher weight set. This alows the new MME to be quickly loaded to its capacity. The MME Load Rebalancing functionality permits registeres UES to be moved from one MME to ancther MME (within @ poo! area) for MME maintonanco periods. the 5 | TD-LTE Call Setup Step 41: Initial Attach (Continued) Lrewu > Gat) ; ‘1A. Attach Request Ne ——1A. Attach Request. _ 40. Initial UE Message 41D. DLNAS Transport TE SEMME Bearer 1G, Initial UE Message: With the successful selection of fan MME the, the UE sends an intial UE message (an SLAP message) to the selected MME containing the eNB SLAP UE Identity. Also, the attach request ‘massage Is plggybacked on this initial UE message. 41D, DL NAS Transport: The MME processes the Attach request message snd sends back a NAS reply, ke an Identty request or Authentication request. The NAS reply from the MME is cartied on the S1-AP DL NAS Transport messege. This message carties the MME SLAP UE Identity. Recestion if the MME S1/AP UE Identity in the 81-AP message comsletes the S1-MME bearer establishment procedure, AE, S1:MME Bearer sotup is complete. 131 5 | TD-LTE Call Setup Security 132 5 | TD-LTE Call Setup E26. authentication Reauest Step 2: Authentication and Security 8 ew ue MME 2A, Authentication Data Request en pera i Steril) and Compares Coie 2A, Authentication Data Request! The network may Intiate the authentication and key agreement procedure (AKA) during the attach and routing area update procecures. In the above scenario, we consider thet the MME is inating the AKA procedure uring the intial attach procedure, The UE sends the first NAS message, Attach Request, 10 the LIE network requesting for registration. This message ‘contains the identity of the UE - 2 referonce number 1 tho last used security parameters called Key Set Idantifiers and UE capabilities, which includes security Information tke the encryption and integrity algorithms supported by the UE. 2B, IMSI-> K: The MME uses the IMSI number of the UE that i received in the Attach Request message to request security perametors from the HSS/AUG. 2, Authentication Data Response: AL the AUC, the IMSI is ‘mapped te a secure parameter called the Subscriber Key (K). The HSS/AUC uses K, 2 randomyy generated number called RAND, in a predefined set of algorithms to generate the secuny parameters: KRES, Kyaye 2nd AUTN. XRES ‘Authentication 20. 26. Is used by the MME to authenticate the UE. MME Stores Kygue and XRES: Kigye is the key parameter to gonorate the otner parameters necessary for eneryation and Integrity procedures. An ‘Authentication Token (AUTN) is used by the UE to ‘authenticate the network, The HSS provides these security parameters to MME in the Authentication Data Response, Authentication Request: The MME stores all the parameters sent by the HS$ and sends the AUTN, KShye 89d RAND to the UE in the NAS ‘Authentication and Ciphering Request message. The MME may have muitile sets of EPS authentication vectors stored, Both the MME and UE share an Identifier called the Key Set Identifier (KSI) to dently the set of Keys being used. The KSI enables the UE ‘and MME to gyno with the security context when tne LUE moves from Idle to active mode. This parameter i similar to Cipnering Key Sequence Number (CKSN) in legacy GSM/GPRS networks. Using S:,AP Downlink NAS Traneport and RRC DL Information transfer messages, the NAS messsgo can be routed to the UE, 133 5 | TD-LTE Call Setup (Continued) ay IME 2A. Authentication Data Request Tea Key (Kane RAN ° 2G. Authentication Response. Step 2: Authentication and Security i pe K EAS and NAS Seouniy procedures > 2F. UE Generates and Compares: At this point, the UE generates a local AUTN and validates the network. Moreover, it also calculates the Kuse end the responce value (RES) 2, Authentication Response: Kysye Is stored in te UE to generate NAS and AS security keys while RES is sent back to the MME in the NAS Authentication Response 0 2H, MME Compares: The MME now compares the RES provided by the UE and the one received by the HSS. In cases of @ successful match, the UE is regarded as authenticated. 21 Securty Mode procedures: After a successful authentication procodure, the network intistes the security procedures for the Access Stratum and the Non-Acoees Stratum, After the successful conclusion of the security procedures, the signaling messages between the UE and the MME/SGW are being ciphered and integrity checked, and the trafic path is also ciphered 134 5 | TD-LTE Call Setup S-GW and P-GW Selection Ba sel we ME gs Update Location Request Update Location Ansner | i 2 Son ai | ey Paw) @ | Mme Update Location Request: Mter successful authentication fond secunty procedures, the MME updates the HSS witn the current location of the UE using tne Update Location massage. The HSS replies back with tho UE's subscristion information in the Insert Subscriber Data message to the MME, The subscription information lists all Information ‘about the services that the UE is registered to with APN configurations. The APN configuration carries tno PDN type, QoS characteristics (Ike QCl, ARP and AMER), PDN connectivity (1PV4,IPv6 or both) and the type of IP address (static or dynamic} supported by that PON, Subscription data also incieates whether the UE is allowed to connect to the P-GWon the visited network fr that service. ava na Update Location Answer: The MME leas about the default APN from tie subscription information, and initiates the ereatlon of the default bearer toward the default APN, The MME maps each APN to a particular P- (GW, The P-GW is selected based an tne subscription dat, In LTE, the P-GW con support either GPRS Tunneling Protocel (GTP) or Proxy MIP (PMIP). The mobilty ‘mechanism supported by the P-GW selected plays a cole in selecting the S.GW. 135 5 | TD-LTE Call Setup Default EPS Bearer Setup ae 5 | TD-LTE Call Setup 8 a UE A LUE Capability Enquiry (DCOH/SRBA) f weccopabinpRequest LUE capability Information (OCCH/SREA) Sas eie ets on Veruca FDD and/or TDD bands) [oecommiiyRarcontttist | ‘ Finding the UE Capabilities ‘After the RRC connection establishment, the network learns about the UEs’ racio cepabilly including the support to TOD (through a specific TDD band) through the UE Capability Enquiry and UE Capebilty. Information messages. The eNB can retrieve the UE's radio capability through tne UE Capabllty Enquiry message. This message is tanemitted on the DCCH/SRBA In the acknowledged mode, Using the capability enguily message, the eNE requests that the UE provide its radio access capabilities for Duplexing mode, radio access technologies supported (og, EUTRA) and the security capabilles such as tne ‘lgorthms supported for integrity heck and encryption. In responee to the UE capability Inquly, the UE returns its capabilties associated with duplex, access and security modes. + LTE TOD euppot Is Indicated through E-UTRA Band into + Italso tists varius air interface protocol parameters supported by the UE + IF the UE supports other RATS, ft lists relevant {frequency band information 437 5 | TD-LTE Call Setup ae 30. Create Session Response Step 3: Default EPS Bearer Setup -| | 30. create Session Response | ooo o Pow ‘Mter selection of the S-GW, the next important step is to create tho default EPS bearer. The EPS bearer has three portions assoc'ated with i: one is the radio bearer ‘bolwaen the UE and the ENB, the second Is the SLU tunnel between the eNB and the SQW, and the third is the 85/88 tunnel between the S-GW and the PGW. The MME keeps track of all the bearers created for a UE through @ bearer idontity. The MME initiates the bearer creation procedure based on the subscription information from the HSS. During the attach procedure, GTP-C control tunnols are set up between the S-GW and P-GW and also between the MME and SGW to vansfer signaling ‘messages. One control tunnel exsts per PON per UE, ‘The order in which the tires portions of the bearer are created is as follows: 1. 85/38 dofaut bearer, $5 control bearer, 2 S11 control bearer, SLU Bearer S-GW endpoint creation, 3. Default radio bearer, 4, SLU bearer completion 138 3A, Create Session Request: The MME sends a Create 38. Session Roquest to the SQW. In this request, the MME sends the GTP.C MME tunnel 1D, APN, APN. AMR, PON type, PCO, default bearer context information and, optionally, other bearer contexts Each bearer context information includes the TFTS, bearer ID, QoS and charging characteristics, Create Session Request: The SGW and P.GW create the §5/S8 default bearer and also the $5 contto| bearer. The S-GW creates endpoints for the bearer and sends them to the P-GW using the Create ‘Session Request message. It alsa sends the UE's PCO parameter at enable the P-GW to decide whether to allocate an IP address during the default bearer creation oF not, and if 0, should it be IPv4,IPv6, oF both fault 5 | TD-LTE Call Setup Step 3: Default EPS Bearer Setup - | (continued) @ re is MME sw Pow | 24. create Session Request ‘__ 36, Greate Session Request : | _38, Create Seosion Reguest___t | 26. create Session Response. 3D. Create Session Response ‘soe 30. Create Session Response: In the above scenario, we consider the case of the PGW all nip ‘adarees to the UE during tne default The PGW rotuns a Greate Session Response message to the SGW. This message contains the P. (GW tunne! IDs for the default bearer, and also the IP adsress. 3D, Create Session Response: The S-GW replies to the IMME with the Create Session Response message. In this response, the SGW transmits tunnel IDs to establish default bearers between the S-GW and the eNB. Note that the creation of the default bearers between the S.GW and the eNB is coordinated by the MME. A GTP tunne! for transfering the signaling messages between the SGW and PGW is also ated her. 138 5 | TD-LTE Call Setup UE | GELARC Connection Reconfiguration (attach Aooopt) Step 3: Default EPS Bearer Setup - Il fq SE BRE Connection Recooligieon 5 @ MME 3E_Intal Context Sotup Request (astach Aecert)| 3E, Initial Context Sotup Request: The MME sends an [tach Accept message, which contains the GUTI and TAI Ist, This also contains the default bearer context request, which, in turn, cari all the bear Information and te IP address given by the PGW. Tne Attach Accept 's embedded in the Iritat Context Setup Request SLAP message, which contains ‘additional information on the radio bearers. that needs to be created by the eNB. A default radio bearer is always created; along wit it, otner bearers may aiso be created. The bearer context information in the Initial Context Setup Request message carries the S1.U S-GW tunnel iD endpoint for the St-U bearer between the S-GW and eNB, 3F, RRC Connection Reconfiguration: The eNB maxes 8 note of the S-GW tunnel IDs and forwards the Attach [Accept message to the UE using the RRC Connection Reconfiguration message. The eNB sends default radio bearerrelated parameters in the ARC connestion reconfiguration message. 140 36. RRC Connection Reconfiguration Complete: The UE now sends the RRC Connection Reconfiguration Complete message to the eNB. This completes the establishment of the default EPS radio bearer. 3H, Intlal Context Setup Response: The eNB informs the MME of the successful set up of the default radio bearer with an Initial Context Setup Response message, 5 | TD-LTE Call Setup Step 3: Default EPS Bearer Setup - Ill we qe ye MME cw Pow on SL UL Information Transfer (Attach Accopt): The UE finishes the process by sending an Attach Complete ‘message to the eNB (caried in an Uptink infrmation Transfer message over the air interface), indicating the successful completion of the network attach. The UE begins using the NAS security mechanisms (encryption and integrity checking), J, Uplink NAS Traneport (Attach Accept; The eNB ‘forwards this messoge to the MME in an Uplink NAS Transport mescage), and provides information about its end of the default $1.0 b 3K, Modify Bearer Request: The MME sends an Undate Bearer Request (eNB address, eNB TEID, EPS 1D) messege to the SGW, L. Modify Bearer Response: Finally, the S-GW acknowledges by sending the Updete Bearer Response (EPS Bearer Mantiy) message to the MME. This completes the establishment of the default S4.U EPS access bearer. The endioend default EFS bearer establishment is complet. aaa 5 | TD-LTE Call Setup Network Mobility ‘Tho endtocens EPS bearer Is maintained rogardless of how far the UE may move during ite data session. Only those portions of the bearer that are directly affected by the UE's mobilty are reconfigured, and segments that are ro longer required are released. When the UE moves to another eNB, a new radio bearer is established, and a new 81. bearer Is sat up to connect ‘back to the S-GW, The provious radio and 1 bearers are released, Ifthe UE moves to 4 location that isnot reachable by the current S-GW, a new 85/88 bearer must be established to connect the new S.GW with the POW. Throughout this process, the UE remains connected to its PGW, and its assigned EPS bearers continue to doliver traffic with the corresponding QoS. The endto-end path is undisturbed and any extemal servers or users are uasfected by the UE's modi 142 5 | TD-LTE Call Setup Summary + Evolved Packet Service (EPS) bearers carry traffic between the UE and the PDN Gateway. — Adefault EPS bearer is always available while the UE is connected. — Additional dedicated EPS bearers may be configured to provide particular QoS capabillties for new services. + After the RRC Connection has been established for signaling, the UE must: = Rogister with the network and be authenticated, and, — Establish a default bearer and receive its IP address. 143 5 | TD-LTE Call Setup Review Questions ‘1. Why do the UE and the network perform mutual authentication? 2. How does network learn about FDD and TDD capabilities of the UE? 3. Why does the EPS bearer not pass through the MME? 4. At what point in the process does the UE learn its IP address? 5. What value does the default EPS bearer provide? | fnss9 Albus Confizmas Thal Ihe VF fs Valid gubsos bbe and Hak gh 2a allowed to Aecelue seinice of Nowak fiom Wok s+ Gommurleatirg eg, lejbmate The OB Con seusice QR prsvz “Tle @mode@ about te Vet duplex Capabilily Througe, vE Capability enguity message 4g Auge Te mmE only Prouldes Contr) fudons, it Ly not Envolued tn aciud dads baffic Dy Mae Duiyy Ht Radio Beaux Configerabon exchange fers get up te deft Zacllo Beat: LPS Geaser powder, bathe ‘alway on! aky © ys, Te Acfaule Corpatatiy hed tte VE Con use a dong as ads Gmmeded Av nett, T4 tte DePaul Gos Paro mele on nd — sider for a farsi abar Applicaton, AdAHon af af 2 6 | Downlink Operations Chapter 6: Downlink Operations 6 | Downlink Operations Objectives After completing this module, you will be able to: ‘Sketch the overall flow of downlink operations in TD-LTE List the TD-LTE techniques that provide flexibility, Discuss how UEs estimate and report channel quality (CQI/PMI/RI) Describe the key factors in downlink scheduling Show the structure of the PDCCH and PDSCH for both regular DL subframes and DwPTS field of special subframes Explain how UEs receive data over the PDSCH Explain the operation and benefits of HARQ Bundling, and HARQ Multiplexing References: [a] 36pP 7S 36.211 rmadulation EVIRA Physical channels and [2] SGPP TS 36.212 ~ EUTRA Multiplexing end channel coding [5] 3GPP TS 36.215 - E-UTRA Physical layer procedures, [4] 36° Ts 26.300 - doscription stage 2 EUIRA and EUTRAN Overall (5] 3GPP Ts 36.321 - EUTRA Meclum Access Control (MAC) Protocol specification 146 6 | Downlink Operations oa Overview of DL Traffic Operations ay @ CQ, PMI, Rr Stain Pu un the ve 2 Soe Scheduling ‘Algorithm Du Resource Scene) DESH) —— Serco >= THARQ ACKs/NACKS — Lets discuss an overviow of the downlink (DL) tratic ‘operation. Multiple UES may be assigned tothe DL-SCH by ‘the eNB shoe it Ie a snared channel. OL-SCH operations are summarized inthe folowing four step procedure: 4. The first step in the sequence is the Channel Quality Indicator (6Qh reporting by ali the UES assigned to the ULSCH, Each device measures its racio conditions ‘and provides the eNB with an accurate Idea of the current recatuing condition. The eNS gathers the CQL reports from all he UEs before proceeding tothe next step. The UES may report the CQI value in subframe units. Other feedback includes the PMI and Rin ‘support of multipleantenna techniques. 2. The scheduler is executed at the NS which user's data should be transmit stanearcs de not specty a scheduling aigorthm. Hence, the scheduling agri and the assignment approach wil differ trom one implementation to another. A suitable multipleantenna technique is chosen for a given UE. nest, The ata fe tansmitted to the selected user. When the scheduler selects @ user, it uses the CQl value reported by the UE end the cata buffer waiting for transmission to decide the resource blocks, data rete, land modulation scheme for the transmission, The eNB uses tho solacted configuration to send the data over the ait. Information on how the data. is trangmitted ie sent on the POCCH, ‘The UE receives the data and verifies the checksum. Irene vansmission was received propery, the UE that received the data ansmits an ACK to the eNB. Ifthe transmitted information was received with enor, the UE sends @ NACK to the oNE, ar 6 | Downlink Operations Flexibility in TD-LTE | Variable Number of HARO. { Salavaing ) | HARQ Bundling | il ARQ Moltplexing IMLTE FDO, UL ACK/NACK feedback was always reported fon the 4th subframe efter each DL transmission on a) subframe, But in TOLTE this may not bo possible due to the unavailabity of subfiames as UL transmission. Hence to maintain low latencies, TO-TE supports the ACK/NACK feedback on the nest available UL subframe leaving a variable gap for UE to process the data, TDLTE uses variable HARQ process (from 4 upto 15 Parallel processes) as eusinst standard 8 HARQ process Used in the FOD system to maximize the network throughput. Here the adeitional HARQ processes aro used to film the gaps created by the asymmetry in the UL/OL. resouree distribution where the UE is stil waiting for the UL slots for transmitting the ACK/NACK feedback, TO-LTE Supports two methods HARQ. bundling ané HARQ ‘multiplexing schemes to exploit this scenano by allowing UE to combined ACK/NACK info for a selected group of DL Subframes and tranemit as a single feedback on the UL. ‘This will enhanco both network throughout and coverage ‘on the UL while Battery power can also be conserved. The logic of HARQ Bundiing/Muliplexing can be extended in [MIMO scenarios by utilizing Spatial Buncling schemes of 148 Toure, Spatial Bundling allows @ UE to send a single ACK/NACK feedback for the mutiple DL streams of data received from multiple antenna ports. 6 | Downlink Operations Channel Quality 6 | Downlink Operations vet Periodic/ Aperodie COI Reporting”) ae @ CQI Measurement and Reporting a CQI Report [PUCCH/PUSCH] > \ \ NB: Sub-bang/Wide Banach) Reporting In LTE the coding and modulation schemes for downlink tranemission are not fed; instoas, they are determines ynamicaly, ased on Channel Quality Incieator (CQN) reports from the UE to which the data is Deing sent While on tho POSCH the UES continuously moni reference signals embedded within the downlink racio, channel. The measured qualiy of these signals determine the largest block size and modulation rate that the UE is capable of receiving, while stil achieving the target error rate (a transport black etror rate of 10% or less). This Information is encoded as a CQ! index which Idertiies a particular enty in the QI modulation and coding table defined inthe standards. Ths index is reported tothe eNB Using either the Physical Uplink Control Channel (PUCCH lorthe Physical Uplink Shared Channel (PUSCH). When and how often the UE reports is determined by the otwork. Periodic reporting causes the UE ta report the (CQl at regular intervals, as specified by the network. Since the UE may not have PUSCH resources allocated when it comes time to send @ report it wil use the PUGCH forall periodic reports, Both widedand CQl and UE-selected sub- band CQI can be reported on a periodic basis. Periodic 150 reports are appropriate for both frequency-selectve scheduling (where the network assigns resources in @ paricular subband) and frequency non-selective scheduling (where the allocated resources may appear ‘anywmrere inthe entire banc), ‘The CQ! reper itze'f consists of the 4 bit CQ! value plus (if needed) 2 1- of 2-bit subsband label indicating which sub: bane the CQl rer elates to, Aperiodie reports are sent only when the network explicitly requests them as part of an uplink scheduling grant, The LUE uses the allocated PUSCH resources to report the CQI Information and can send a report as often as every sub frame (1 me}, Aperiodic reports ean be used for witeband Ql, and UE-selectod subband and higherlayor Configured (networkselacted) subband measurements, but apply only to frequeneyselectiva scheduling, situations 6 | Downlink Operations PUCCH and aperiodic ( acute | (Ceperting on the PUSH: | various transmission modes (cero Feedback Reports Reporting of Conn) ca | "Basie use orreponts: support ane Transmit Dersiy), (Ex wlan tony and | wdebona etoithd t porty ( biterent pe ot nude oo | —— ‘ ‘Specine feedback jee ‘and relevant parameters (Cx-periodicity of reports) configured by RRC UES send their feedback reports in order to support the various vansmission modes open to them, atleast insofar as they are able to support thse modes. The mode, type of feedback and the applicable parameters are part of RRC configurations as isthe frequency af the feedback reports themselves. UES send their feedback to the eNB petiadically on the PUCCH, or non-periodcaly on the PUSCH. PUCCHbased feedback is inherently. periodic (eg, once every few miliseconds), PUSCH-based reporting is inherently aperlace since the reports goto the NB along with the user's data, whenever it occurs. There. are, therefore, different kinds of feedback reports from UES. OI feedoack can be wideband (referring to the entire allocated spectrum, 633, 10 MM, oF they can be sub-band reports in which a particular 00 value applies to ‘each substan CConsi¢er the UE providing subband CQI to an eNB. Upon, receiving this kind of CQI feedback, the eNB can decide \whien subband 1s most favorable for high-speed data ‘wanzmissions and apply the highest order modulation appropriate for the sub-band. This is called frequency: selective scheduling. Likewise, PMI feet wideband or it can be sub vanced. ick can be RI feedback influences Ql Techniques, including open- and closedioop spatial muttiploxing and divers, Ried! inalations, yiels 4bi wideband CQ! reports. Closedioop spatial multiplexing with “RI>4” indications yiale two 4-bt ‘wideband CQl reports, where each of the CQl values refers to diferent code words transmitted from the eNB. A code word is the outout ofa tutbo coder reports. Singjeantenna 151 6 | Downlink Operations CQI Table utot Rane 0 308 ea For a single transmit antenna, there are 16 possible CQ! values, as shown here. The higher the 0QI index the higher the modulation scheme, the lower the effective coding rate, and the higher the spectral efficiency of the corresoonding downlink transmission. The coding rate Indicates. how many “real” data bits are present out of 1024 bits, while the efficiency provides the number of Information bits per mocilation symbol. For example, OQ1 Index 6 means that the UE can recelve 602/1024 = 0.5879 data bite per coded bit, whieh 20.5879 = 1.1758 data bits per symbol, since a single QPSK symbol carries two bits. tranclates & 152 6 | Downlink Operations PMI In Closed-Loop MIMO Reference signals Evaluate options < Preferred codebook index t=] MIMO data transmission Closesoop MIMO uses a predefined codebook (precoding) to allow the receiver to inform she transmitter (of which MIMO parameters or coefficients to use for data ‘Mansmission, This enhencement is quite useful when the channel conditions on the downlink and uplink are very different. This Is often the case in Frequency Division Duplex, or FOD, systems, where the downlink and uplink use frequencies 108 of Mz apart. ‘The UE observes the downlink channel conditons using the reference signals sent over each antenna; each antenna uses a slighty diferent referonce signal, to allow ‘the UE to tell them apart. The UE then evaluates t ‘options in its codebook, and determines which entry best ‘matches the observed conditions, The UE informs the eNB of it recommendation, and the eNB adjusts ts transmicslons accordingly, potentially avoiding the use of antennas exnerieneing significant impairments. in this, ‘example, the UE has indicates that only two of the four ‘antennas should be used for data transmission. 183 6 | Downlink Operations Scheduler 6 | Downlink Operations Inputs for Downlink Scheduler ‘The slgorithm to be used for scheduling downlink resources is nat epecifed in the standarcs; each vendor Is. responsible for implementing their own solution. That sald, any scheduler can take into account 8 number of possible Inputs in order to make optimal use of the available resources, These inpuls may Include: + QoS Requirements: Subscription parameters. and application requirements (euch 98 guaranteed bit rates) determine the amount of resources needed and the scheduling strategy (persistent vs. nom persistent allocations, Intervals between allocations, and s0 on) + Uplink Feedback: The reported COI values and the ACK/NAGK indications from tne UES determine how ‘quickly the UE can receive date and how soon the scheduler can move on tothe next packet. “+ Butfer Status: The size ofthe queues in the eNB, and the age of the gackets, can influence how urgently @ particular UE needs to be served. + TDD Configuration and Special Subframe Pattern: ‘TDD UL/DL Configuration and the Special Subframe Pattern information will ffect the resource avaltabilly ‘and latency due to switching periodic. LUE Capabiities: The physical cazabilties of the UE Itseif establish the types of allocations it can handle. ‘raffie Model: Traffle patterns may influence how resources are allocated by, for exampi limiting the dota rates offered to any single user during busy periods inthe network Radio Resources: The actual radio resources ‘themselves (the subcartiers and symbols grouped into Resource Blocks) are the Key Input into the ‘scheduler function. The more resources there are the ‘mote can be allacated tothe users. 155 6 | Downlink Operations a Downlink Scheduler Outputs Regardless of the actual algorithm used, the outout of the schedblor is the same. The scheduler must decide: + Which users will recetve resources in the next Intoval tan solect one or more users among al the RRC-connected users. +The transport block size {the number of bits) to be ent to each user. It needs to deetde how much of the resources should be given to individual scheduled users. This depends on the QoS of this user, the available resources, the amount of data buffered for this user, the user's radio conditions, the resources required for on-going transmissions (ce-transmission ‘of packets that were NACKed!, etc + The number of resource blocks required. This is, determined based on the transport block size and ‘coding.and modulation scheme used. +The specifi coded bits to be sent. The eNB decides, the actual encoded symbols that It would send among the turbo-encoded symbo's. 156 The modulation scheme to be used. The eNB determines this based on the UF's radio condition, The duration of the allocation (persistent or non- persistent). The eNB supports both persistent and on-persistent scheduling. The duration of non: persistent allocation is only for this subframe. The HARQ Bundling/Multplexing mechanism is decided only for the cell edge UES to improve coverage. 6 | Downlink Operations Resources nba Resource —— [rant ]ra nt]Rena]Re nal (fee a fea n2]aan2]aso2| RB 2] sou Block : i wea [roe & = wea | Fae a wea [re Te basic unit of resource allocation is a resource clement, which consists of one subcarrier for ane symbol A resour 3 holds one modulation symbol that can represent two, four or six bits of data, depending on the ‘modulation schome being used (QPSK, 16QAM, or 4 QAM). Resource elements are organized into resource blocks that contain 12 consecutive subearrors over six or seven, symbols, depending on the 829 of the cycle prefix boing used; thus, @ single resource block holds 72 or 84 symbols. A resource block is the smallest resource that can be assigned toa UE. For efficient allocation purposes, resource blocks may be s7oUped Into resource block groups, each of which holds cone, two, three, or four resource blacks, depending on the system bandwith a57 6 | Downlink Operations Non-Persistent Scheduling a Scheduler performs ynamie scheduling br ieee overhead a are valid for one sub Gee ‘This side illustrates the dynamic resource allocation scheme In the downlink, where the resoutee allocation Interval can be as s location applies only corresponding Dol is re te receive adeitional data fort a one miligecond. The resource the eubrame in which the od (@ allocation). At the end of the sub-frame, the allocated resources nd must wait er the POSCH loses the another DClin order While this epproach allows the transmission format to ‘adapt to current radio conditions on every allacation the ‘addtional signaling overhead and scheduling delays make on-persistent sensitive or bursty applications. 158 locations. suitable only for non-delay- 6 | Downlink Operations Downlink Transmission 159 6 | Downlink Operations PDCCH (QPsk) ver ee OLE 2) UES PDSCH (QPSK, 160%M or 64QAM) $e Oo Generic Downlink Transmission (nce the scneduler has made its decision it wil format the packet for transmission over the PDSCH. Since the POSCH |g a shared channel the UES do not Know when their transmissions will be ent, what radlo resources have been assigned to them, and what formats are being used. ‘The eN8 uses the POCCH to convey this information Each UE was assigned a CellSpecific Radio Network ‘Temporary 1D (C-RNTH when it frst accessed the network This GANT! Is used to identity which usors nave data in the POSCH; each UE scans tne contents of the POCCH for Downlink Control Information (OC) associated with its C- NTI, If there i a maten, the corresponding allocation information tells the UE where to look in the PDSCH and how to decode the data 160 6 | Downlink Operations coe | Aniiome PDCCH and PDSCH The Physical Downlink Control Channel (POCCH) carries control information from the eN8 to the UES. A POCGH is a set of Control Channel Elements (CCES) each of which contains an uplink assignment, a downlink assignment, ‘and uolink power control The content of @ CCE may be common tll UES or may be specific to a pancular UE. snmands, of other information A resource element group Clements (iit appears in sot 0) or four resource elements (in gots 1, 2 and 3}. A CCE occupies nine resource ‘element groups and 8 single POCCH may contain one, two, four or eight CCES, depencing on which of the four possible PDOCH formats is being used. The Physical Control Format Indicator Channel, of PCFICH, tells the UES what the format of the POCCH is, POCCHS aro always found in the fist one to four slots of each sub-trame; the exact numberof siots le determined by the PDCCH format ‘and the number of resource biocks lathe radio channel. cits of altner sx resource Each UE will sean one er more POCCHS looking at t CES to determine whether they contain information that pertains to that UE. In the case of a downlink resource ‘assignment, the OCE will contain DC! associated with the UE's assigned C-RNTL ‘The POSCH contains the actual data and occupies the remaining resource elements in the suoframe thet ere not being used for other purposes (such as reference signals) To maximize the network throughput TDLTE allow data DwPTS field in special subfreme ‘much similar to DL. subtrames. \wensmission on the 161 6 | Downlink Operations Downlink Control Information (DCI) In order for the UE to be able to find and decode its data fon the POSCH, it must fist be told what resources are ‘boing used, which bits are being sent, and how the data, was encoded. The PDCCH contains (among ether things) BCt blocks that provide uplink allocations, downlink allocations and power control commands for specific UES. ‘location DCIs desoribe the specifies of the uplink or downlink recources allocated to a single UE while power contro OCs may include commands for multiple UES. Dols come in multple sizes and formats depending. on the ‘spceiic information being carried: + Format 0: Used for uplink (PUSCH) allocations; + Format 4: Used for type 0 or ype 1. downlink (POSCH) allocations; + Format 4A, 18, 2C and 4D: Used for Type 2 downlink (POSCH)alocations; + Format 2 and 2A: Used for type 0 or type 2 downlink (POSCH) allocations in spatial multiplexing (mutiple antenna) systems: 162 Format 3 and 3 adjustments, Ised for PUCCH and PUSCH power For downlink data transmissions Format 1 is the primary eI format. Formats 1A, 18, 10 and 10 are shorter formats used for specific allocation sconarios (0, ‘assignment of Virtual Resource Blocks and antenna precoding), 6 | Downlink Operations DCI Format 1 — Now oot me Naat} enam>)(iGheeu re Power || ond UE enroy_J Lido hee 2 Tuo | wv [ee | ow es toms ree nea 2) nano) | Wbillara ea ne) | edincany bt resoures verson acsgnant (I Format 4 provides al of the information a UE needs to correctly locate and decode @ covnlink vensmission over the POSCH, The fields include: Resource allocation type: AO" indicates that tno UE + Ie being assigned entire resource block groups (RAGE), whieh nave between one and four resource blocks (depending on the total number of RBS in the ° ay the UE is being assigned specific RBs within the REGS, ne) Ingicates Allocation: A fitmap of the RBGS being assigned (allocation type 0) of of the REGS and RBS within the BGs {allocation type 4). The total number of bits «seo depends on the number of RBGS available. Modulation and coding: The modulation and coding feeheme Is selected by the eNN8, based on the CQ! reponts trom the UE HARQ process: An index to the specific Hybric ARQ (HARQ) process buffer (Mex 15) that this transmission Felates to. This allows tne UE to combine and decode ‘elated parts ofthe same packet transmission. New data Indicator This flag indicates that this twansmission isthe start of a new packet, and that ‘any data in the HARQ buffer should be discarded. Redundancy version: This fleld indleates which s coding bis is being sent (eystematic, parity 4, oF parity 2), so that they can be interpreted correctly by the decoder. ‘Transmit power control: Provides closedoop (up/down) power commands to manage the PUCCH ‘and PUSCH power evel. Downlink Assignment Index: DAI field is very specific to TOD en and is apslicable for TOD configurations 1. to 6, This field indicates qumber of subtrames that were packed in 2 group to allow the UE to verify that the missing during HARQ Bundting/Muplexing. re subtrames 163 6 | Downlink Operations DCI Format 1 (Continued) anes Tages} Tansmil) (iene —— SEE J | noe URE) oe ‘modulation and onto! ‘entity — f 1 | ts) Process fz bn 2b oi | mop of obrdaR® ) (og | \ fedundanoy Dabinink se ee vwesion| Assignment + Padding: An extra “O° bit is added when necessary to ‘ensure thatthe total length of the DCl is correct. + Oyellc redundancy check: This field actually serves two purposes: It provides a verification that the other fields in the OCI are correct and it Is also used to Identity which UE the DC! is for. The calculated CRC value is sorembiea withthe C-RNTI of the UE. Each UE reading the OCI will also calculate the GRC and Sseramble the result with it own C-RNTI If the result ‘matches what is n the ORC fied, then the UE knows. (2) thatthe D1 is fr i, and (2) te felds are correct. 1f the result does not match, the UE will ignore the a + Downlink Assignment indox (DAN: In case of TOLTE, ‘there is @ possibilty that @ UE may provide a wrong ACK/NACK feedback with both HARQ bundling and HARQ multiplexing due to one or more missing DL ssubtrames in @ gjoup. This 2 bt fleld informs the total number of subframes in a group that contained Downlink data to @ UE to ensure at the ACKYNACK will 'be forthe entice DL. subframes in that group. 164 6 | Downlink Operations Downlink Allocations subcarriers. A subframe 022946601234 5 6 Symbols Aslot In each sub-rame, the UE scans the POCCH (located in the frst one to four symbols ofthe frst slot) looking for Deis witn a matching CRNTI. If it finds one, the UE can ead the related allocation Information, including: ‘The allocated resources that will map to one oF more resource blocks, Te modulation and coding scare used, and ‘Tne nature ofthe bits inthe transmission (new data, HARQ process, systematic versus party bits, et). Once the UE processes the DCI, it knows exactly wien and winere to ook for its data, and how to decode it. Note that any other UE could also locate the came data; however, since all transmissions are encrypted, the UE would be Lneble to read the information. 165 6 | Downlink Operations PDSCH on DL Subframe DCI Format 4 wor [epee ‘Number and location of Resource Blocks Resource Blocks ‘Size of Tiansport Block sd Modulation Scheme ‘The allocation fied in the DC! tes the UE which resource blacks nave beon assigned to itwithin the sub-rame. The ‘pectic subcarrors carving the UE's date depends on the ‘ype ofthe allocation (virtual vs. physical resource blocks, localized vs. distributed assignments, frequency hopping, te). Note that tne allocated subcarriers may be different between the fist slot and the second Once the resource blocks have been Identified and mapped to the ptysical subcarriers tne UE can then extract its coded data bits. The modulation and coding scheme field in the DCI is an index into @ table that Identities the modulation scheme used (QPSK, 416QAM or G4QAM) and the transport block size (TBS) index; for example, MCS value 20 corresponds to 64QAM mocuiation and TS indox 18. ‘The actual transport block size is determined from another table, using the TBS index and the numer of physical resource blocks the UE has been assigned; the ‘transport block can range from 16 bits atthe smallest toa maximum of 75,376 bits 166 Note that, although resources are allocated in units of resource blocks (which contain sic or seven symbols), the ‘actual allocation spans the entre subframe (up to 13 ‘symbols, not counting the POCCH} 6 | Downlink Operations PDSCH on DwPTS Field CI Format 1 Special surame Pattern 7 (10:2:2) bie ‘Number and Ele ra slslla)\ee Blocks 1]3 a8 (Ea RSS Block Size supportable na The POSCH transmission on the DWPTS field of Special subframe is a shortened form of the regular DL. subfreme transmission. Due to the limited number of sym avaliable in eubframes 1 and 6, overhead reduction is desirable, Henee, the number of OFOM symbo's that can be consumed by the POCCHS is limited to two in these subtrames. ‘Tne allocation fold in the OCI lists the resource blocks ‘that nave been assigned to it within the DWPTS field. Again ‘spectic subcarriers carrying the UE's data depends on tne ‘ype ofthe allocation (virtual ws, physical resource blocks, localized vs. distibuted assignments, frequency hopping etc). Note that the allocated subcarriers may ge afferent, between the fist sit and the eocond ‘once the resource blocks have bean identified and ‘mapped to the physical subcarriers, the UE tien looks at the MCS schemes to determine the actual vansport block size, The transport block is usually about 60% to 70%{depends on the vendor implementation) of wnat table indicates. Note: 1. although resources are allocated in units of resource blocks (which contain six or seven symbols), tre factual allocation spans the entire OWPTS field (Pattern 7: up to 8 symbols, not counting the Pocet). li. No POSCH wil be carried on DWPTS forthe pattorns (and 6 with Normal GP and 0 and 4 with Extended cr. 167 6 | Downlink Operations Sere) fons In order forthe UE to be able to find and decode its data fon the POSCH it must first be told what resources are bing used, which bits ere being sent, and how the data, was encoded, The POCCH contains (among other things) Downlink Control Information (OCH blocks which provide Uplink allocations, downlink alocations and power control corrmnands for spectic UES. Allocation Otis describe the saectics of tre uplink or downtink resources allocated toa singe UE while power control OCls may include commands for multiple UES. Cis come in multiple sizes and formats depending on the pectic information being cared. Let's review some formate useful with DL resource allocation, + Format 1: Used for Type 0 or Type 2 downlink (POSCH) allocations + Format 4A, 48, 1C and 40: Used for Type 2 downlinis DSCH) allocations. + Format 2 and 2A: Used for Type 0 or Type 4 downlink {POSCH) allocations in spatial multiplexing (multiple antenna) systems with Format 2 for closecoop SM ‘and 2A for open iacp SM. 168, PDCCH and DL Resource Allocation (Weis) 2 ra enna For one codeword: Type 0 or 1 resouros allocation For one codeword: Compact Type 2 resource allocation Like Abt with precoding info Very compact resource allocation Compact resource allocation with precoding info & power offset Type 0 & 4 allocation for two codewords CLSM with precoding Type 0&4 allocation for two codewords OLSM with precoding l For dowalink data transmissions Format 4 i the primary Del forat; Formats 1A, 18, 10 end 1D are shorter mats used for specific allocation scenarios (et, assignment of virtual resource locks and antenna precosing) 6 | Downlink Operations Layer Mapping For MIMO Purpose: Increase throughput by sending different modulation symbols on different “layers.” In LTE’e Spatial Multiplexing (SM), up to two code words, the outouts of channel coders, can be mapped onto ACK/NAGK Bundle (both Subtrames 0&1) | |" Sandie (both Subtrames 5 & 6) TTOLLTE Configuration 1 HARG Bundling is as shown in the slide above. ‘This configuration supports 2 HAR Bundles each of size 2 subtremes (Subframes 081. and Subtrames 5&6). For tne subframes O81 a single HARQ ACK/NACK is transmitted on subframe 7 while for subframes 586 itis at subtrame 2 of the next radio frame. Subframe 4 has no HARQ bundling and the HARQ feedback is on the subframe 8. 1s 6 | Downlink Operations HARQ Multiplexing ‘ODL Data Packet on SubframeT Cal 1 Di Data Packet on Subframe, <2 DL Data Packet on Subframe k ene a "SDL Data Packet Bundle HARQAGK/NAGK on Subframe =k >> oan eore) ACK/NAC tor Subrame en “ranaision AN eieien ACKUNACK fr Sutrame AcwyNAcK tt Subtame y ‘faremison TDLTE supports one more type of HARQ feedback ‘mechanism called HARQ Multiplexing which is very similar to the HARQ bundling. HARQ Multiplexing also uses the grouping of suotrames for bundling but the single HARQ ACK/NACK feedback for the gioup consists of typically {bjt information where each bit represents the ACK/NACK corresponding to each DL subframe transmission. In case of MIMO, each bit of the KARQ multiplexing represont the spatialy bundled ACK/NAGK information rived through logical AND" function of HAR ACK/NACK due to each codeword. 176 6 | Downlink Operations Summary + arable number of HARQ processes, variable HARQ feedback timing, HARQ Bundiing/Muttipiexing provide Mexiity in TOLTE + DL data can be transmitted on POSCH of both DL. subframe and DwPTS fields + Downlink operations occur on a subframe (1.ms) cycle. = UES port channel qually(CQD tothe eNB. The CQ reports provide an estimate of the U's curent rac contin - hi asus tho eNB In dotarmiring the cendn/mecaaton scheme = The oN atoctes avadoba resoucas (resource blocks) based ons propary scheduling agar. = The UES montor the PDCCH or source atlocaton and use te Information to ‘ecace the POSH, = The UEs previ feedback to fform the eX it aona informations needed 2 ‘2eoce the wansmissions. + HARQ Bundling/Multiptexing in TO-LTE supports combining of multiple HARAQ AGK/NACKS fora sat of subtrames into 9 single ACK/NACK feedback report, _ amv 6 | Downlink Operations Exercise Match the information elements to the physical channel (or channels) that can carry them. PUCCH € HAR canal HARE mutt ploxing and Spabal Bundling 7. The VE doe mt knows ohtad Sf He which packet | burdle af. packets the bammission Aeled ed 4 Gnd thaek, wlth procew'y, bu fle tu Bits Should be added- g 2) » v) J 6 | Downlink Operations Review Questions 4. What is the purpose of CQI reporting? 2. How does the UE's CQI report influence its PDSCH allocation? 3. How does the UE know how to decode the PDSCH? 4, Why are there so many ways to allocate resources? 5. What are the differences between dynamic and semi- persistent allocations? 6. What are the different HARQ schemes supported for downlink transmissions in TD-LTE? 7. Why does the eNB include a HARQ process ID and Dal fields in the allocation? 8. What might the eNB do if it receives a HARQ NACK from _, the UE? 54 provider an estimate cf Channel CondiBon hich oll be exed by nods h select transmission format that acheive The pe falmance atau) the CAT Identifies the mare bontfoat Block ancl madulecbion scheint “He ve beled St support of that tint- ha VE munis the PDCCH fot Dz addioned + it ( basedon Hae uigned CRNTL) and les The abla chon Gud mes in ferrrabion zn deternite whith Posc Awoutte elemek conteh St bits Prowides GFlenibl de selrdlblalal , minionize Signal siesta supports ob ffetsl audewna theme, alloiat fp pote pip tcrelolar Loardivesoy 4] Dynande- Cast far Dee seh from Qin adage & chongiy Reckio condttion , higher signeliny ethead - . Semi Reaishusti= Last cuit fot ny» fe farrmence nny cree oucg tin p suitable eX Atal- time oppWoahfon- dhe 6 | Downlink Operations Additional Material 6 | Downlink Operations Packet Processing aes (oe We The number of rest ee blocks and the modulation scheme assigned by the schedular determine the size of the transport block (the numberof its) that will be sent to the UE. Each transport block is procassed a follows: + CRC Attachment: The eNB calculates @ 24-dk checksum and adds it to the end of the transport block + Segmentation: ifthe transpor block ane GRC is larger than the maximum code block size (6144 bits), then the biock is segmented into amaller blocks and an Additional 24-bit CRC is added to each block. + Channel Coding: Each block is coded with 2 4/3 rate turbo coder, which generates thro output streams. (One stream contains the orginal input data (the systematic, ofS, bits) walle the other streams contain the ettor detection and correction bits (the parity, or Pt and P2, bit) + Interteaving Each output separatoly to provide bit transmission eros. interleaved any ‘separation Rate Matching: The interloavea are combined into a circular butter and then pruned (oits Femoved) or padded (bits added) to produce the requires numberof bits fr transmission, Concatenation: The segments are concatensted to create the final code word to be transmitted over the PDSCH, ten 6 | Downlink Operations PDSCH Transmission imino Cena ‘The content of the POSCH consists of all of the code words to be sent to the selected UES in the next subframe. The POSCH is generated as follows: + Multiptexing: The code words to be sent to each UE ‘are muttploxed together. + Scrambling: Each code word 's scrambled using the UE CRNTI, the siot number within the frame, and the Physical Layer Coll 1D. + Modulation: The scrambled bts are modulated using the selected modulation scheme (QPSK, 46QAM, or 64 QAM), creatinga set of modulation symbols. + Layer Mapping: (f multiie transmit entennas are being used, the maduiation symbols are assigned 10 the appropriate layers (one layer per antenn + recoding: Degending on tne antenna scheme being used, the medulation symools may be preceded before transmission. + Resource Element Mapping: The moculation symbols in each layer are assigned to the allocated resource elements (subcariers and symbol). 182 OFDMA Signal Generation: All of the modulation symbols to be transmitted in each symbol interval ‘over all subcarriers are combined in an Inverse Fast Fourier Transtorm (IFFT) operation to create a single \widesand OFOM symbol. A cycle profx Is added to provide protection from multipath interference, and the results vansmitted over the radio channel Virtual Resource Block: VRB Physical Resource Block: PRE, Physical and Virtual Resource Blocks VRB # PRE # 6 | Downlink Operations Without Frequency ] With Frequency Hopping Hopping vaox=PRBX | VRBX=PRBY vrex=prex | VRAX= PREZ 50 PRBS op [2 a9 Tow PRB | sot g Within a given VRB oF PRE | 5.6 yn) subcarriers are consecutive in frequency domain Users find their DL. data on physical resource blocks (Rs), which, In the physical roaim of the 10 MHz allocation, for example, provides 50 PRBS numbered, as shown in the slice, from "0" ‘Transmission Bandwlcth through "49" on the high end. fon the low end of the Fast- or moderately-moving mobiles can enjoy the benefit of a litle gain with froqueney nopping. We Imolement. feequency hoppingin OFOMA by mapping Virtual Resource ‘looks (VRBs) to PRBS in such a way that 2 user's, presenco in the OFDMA signal is notin orderly PRBS; his, presence chenges, the PREs actualy used change, with each slot. Recall that millisecond subframe and that we allow rate changes ‘every millisecond or every subframe. The UE recelving is (OFDMA signal from an eNB "knows" how the assigned DL \VRBs map to a changing azeignment of PRBS that appear to “cance” about in the tranemission bandwisth. In order forthe UE to "know" whieh PRBS actualy carry its VRS, it has to convert the assigned VRES with a formula or algortim that maps VRS to PRBS: the mapping changes with each slot and i influenced by other fact the PCI. Whatever the mapping, the actual PRBS are there are two slots in one fore such as alwys composed of adjacent subcarrier. ‘The notion that a UE might have to “strain” or expena adeitional processing power to recover its VRBS i an ilusion, because a UE has to recover ail the RBs and al the actual PRA in the entire OFOMA signal via FFT. I's rot much effort to sort through all the recovered RBS to fing the designated VRBs that are present in certain PRBS. Slow-maving mobiles do benefits from ‘eequency hopping because channel-selective signaling ts fast enout for slawmovers to distinguieh “good” PRES In ‘one part of the spectrum from "bad" ones in another part ‘here is plenty of timo for the eNB to react appropriately to cheno! condivons mage known tot by the UE's feedback mechanisms. 183 6 | Downlink Operations Type O Resource Allocation located REGS, 10 MHz <—{reco [rae 1 [Rac 2 [Ras 3 }- Ppp —fres 25 ]Res 25] PREG + Allocation fora UE: Bitmap with each bit cortesponding to one Resource Blook Group (RGB) + Number of PRG/RBG: Function of system bandwidtn + Another example: 5 MHz, 25 PAs, two PRBS per RBG, number ‘Of RBGS « cal (25/2) = 13, Resources can be allocated to a UE using different methods depending on the number of resources being allocated, Type 0 resource allocation dlvices tne aval Into Resource Block Groups (REGs}, each one of which contains one, two, three or f ir PRs, For @ 20 MHz system, there are 25 REGS, each containing four PRES; a '5 MHz system has only 12 RBGs, each containing two PRBS. In a Type 0 allocation, the UE receives a bitmap of RBGS assigned it. €aen ‘27 bt indicates that the corresponding REG and all of tie PRBS within tnat RBG have been assigned to the UE. In theory, @ UE can be assigned al of tre downlink resources wit ingle Type 0 allocation. Type 0 resource allocetion is & good choice for ‘small system bandwicth where both the bitmap siza and allocation grenuiartys smal 184 6 | Downlink Operations Type 4 Resource Allocation eG Subcot 2 ae acs] 0G Subset 2 + locaton to UE: One of three RAG cubsets and PRBS wthin an ROG subset 1 Number of RBG evbete~ Number of PRBS in on REG function of estem BM) + Finer reslation than Type 0 1 sat SW ean be alosatod per UE oa ‘Type 4 allocation proves better granularity than Type 0. ‘The RBGs are grouped Into several subsets by putting every K RBG into the same subset. The k Is decidec by system bandwidth. For 10 MHz, Is equal to 3. Within each REG subset, a bitmap is used to allocate resource in tho pranularty of one PRB. For 2 10 MHz bandwith, we begin by configuring REGS, ‘each with their PRBs, of which tnete are 17 as shown in the aide. Then, we define REG eubeets (three in te slice: RBG subsets 0, 1, and 2). AS an example, consider an allocation, described by a bitmap, within REG Subset “0.” if the UE's bitmap Is *100000010000000001," then, according to the slide, only three PRBs were actually assigned tothe UE. ‘The advantage of Type 2 resource allocations is that a UE ‘can get as few as one PRB, The disadvantage is that a UE can never get the entire bandwidth assigned since the assignments are confined toa single RBG subset. 185. 6 | Downlink Operations Virtual Resource Blocks Localized VRB. ‘Distributed VRB [ol CEPEEE : : 4 4 al ° ‘Slot Stot 1 SktO Sita) [A Virtual Resource Block (VRB) is defined for Type 2 resource allocation, which uses a stating point plus length ‘an allocation parameter instead af the bitrnap used by ‘Type O and Type 4. VRBS are mapped to PRAS using predefined slgorthms. There are two types of VRB: localizes and distributed. For te localzed VRB, the LVER ‘number equals the PRE number in both slots of 2 sub- frame. For the distibuted VRB, the DVRB number is mapped to PRB number differently in slot Oand siot 1 ofa subframe. Within each resource block the 12 subcarriers ‘are consecutive for both the PRB and VRB. Distributed VRBs are mapped to PRAS that may be ‘scattered acrees the available spectrum, and the mapping may chenge every slot (frequency hopoing). This istibuted mapping and hopping approach avoids frequencyselective fading and interference. The ‘silojw [(SPS= Persistent new tranamission + Dynamic revanemission + SPS Roloase: Tho SPS roloase in the DL is explicit. It is sent on the POCCH with tie SPS CRINT and NDI = (0. The same as SPS activation, addtional constraints in DCI are set to protect against false release. OC! Format 1A is used for SPS relesse and the OCI constraints Include: the HARQ process number set to "000," MCS is set to "11111," RV's eet to "00," and resource block assignment is set to all"1"s, After the UE detects the SPS release for the OL, it sends an ACK. SPS nas the advantages in reducing control signaling overheads and recueing latency delays. But the link adaptation parameters are saved and ‘modulation and coding remains the same throughout transmission, This makes scheduling unacjustable to the channel concition and, thus, the likelinoed of a transmission fellure wil increase overtime, 190 7| Uplink Operations eae Chapter 7: Uplink Operations 7 | Uplink Operations Objectives After completing this module, you will be able to: * Describe the TD-LTE uplink traffic operation procedure * List parameters in a UL grant + Explain how UL frequency hopping is done + List the characteristics of a UL HARQ + Explain the concept of TTI bundling map them to physical resources * List the TD-LTE characteristics for UL operations * List the UL physical channels and signals, and References: [2] 3GPP TS 36.211 - EUTRA Physical chennels and smadulation [2]. SGPP TS 36.212 ~ EUTRA Multiplexing and channel coding [3] 3GPPTS 36.213 - E-UTRA Physica layer procedures [4] 3GPP TS 36.300 — EUTRA and EUTRAN Overall eccrption stage 2 GPP TS 26,221 - EUTRA Medium Access Control (Mac) protocol specification [6] 3GPP TS 36.331 - EUTRA Radio Resource Contra (RRC) protocol specication 192 7 | Uplink Operations Overview of UL Transmission 193 7 | Uplink Operations Be Cornea ec Ges UL Traffic Operations - Overview 1. Scheduling request PUCCH/PRACH 2. UL grant PDCCH 3, Buffer Status Report and/or data PUSCH 4, Additional UL grants, L 6_HARQ ACK/NACK. or ore fone Uplink tranemiselons igo use a shares channel, the Physical Uplink Shared Channel (PUSCH}.In order to avoid contention between UES attempting to transmit data at the same time, all uplink operations are managed by the eNB as well. In order to send data on the uplink, eact active UE must use @ siesten process. 41. If the UE has data to send, but it has not been allocates PUSCH resources, it must first cond 2 scheduling request to the eNB. In mast cases, the UE will use the Physical Uplink Control Channel (PUCCH) to sond its request; however, if a radio bearer is not active (eg, the UE iS currently idle), it must use a Physical Random Access Channel (PRACH) to start the process, 2. The eNB responds with an uplink grant to the UE POCCH, Note that this initial eran is usually quite small, 3, The UE uses the uplink grant to send its Butfer Status Report (BSR), Indicating how much data it needs to send. Ifthe grant is large enough, the UE may also start sending some data as well 194 4 Based on the &SR and available uplink resources, the eNB determines whether an adeltional (arge*) grant is needed. The new grant is also conveyed on the PoccH “The UE begins transmitting its data on the PUSCH, ‘The eNB receWes the UF's transmissions, and responds with HARQ Acks or Nacks as appropriate on the Physical HARQ Indicator Channel (PHICH), 7 | Uplink Operations Processes Varisbie Number ofFHARQ | f (07) \ TD-LTE UL Differe subframe offset (4t0 7), (from Resource Grant \oriabie UL transmission ) TD-LTE UL Characteristics ‘lyon the next available PHICH {NAC eeabae orion epost J Hof Pal {Multiple Ut Grants fon single OL. Subtrame ICH Groups: J Similar tothe DL. traffic operation differences betwaen LTE FDD and TDLTE, the UL trafic operations undergo changes. Instead of the UL grants being valid four ssubtrames later, tls now valid 8 configurable number of uotrames later in TD.LTE. The number of HARQ ‘processes is no longer fled at eight; it varies from one to Seven to accommodate various UL/DL. configurations. (Once the eNB receives a packet from the UE, it sends a HARQ ACK/NACK after a configu‘able number of ‘subtrames (which 's four in LTE FOD) on the PHIGH. To liminate ambiguity of resource allocation, additional fiolds are present in the OCI formats for TO-LTE, Since the umber of HARQ ACKS/NACKS would be different ‘dopending on the UL/DL configuration and the number of users, @ variable number of PHICH groups as 2 function of LUL/DL configuration are defined, 195 7 | Uplink Operations UL Transport and PHY Channel Mapping Random Aces | PRACH Shennl (RACH) ‘Shared Grannel | [Fsea Ut Shared Choe cny data baer uisem ote epee on etace ie YAR or Seamaster 2PM an PUCGHT | Paes Uk enema cro START uncle) EX/NACK. OPM a ‘wins | Deedulaten erence sal Koon UE wd NB tp oberon dent otc SS | Sooper soa rep chars conor pononngana few Vi sneaang This slide shows the available resources for the UTE Uplink, ft lists LTE uplink transport channels, physical channels/signals, as wel as their mapping, ‘There are two U transport channels, the: 4. Random Access Channel (RACH) maps to the Physical RACH (PRACH), which carries messages (or preamble). random access 2. Uplink Shared Gnannel (ULSCH) maps tothe Physical UL Shared Channel {PUSCH), whichis the channel for UL data tansmission. i also carries Butfer Status Reports (BSR), HARQ.ACKs/NACKS, and Crannel Quality Indicators (COIs). In case of TT bundling supported, the HARQ ACK/NACK refers to te bundle of subframes. ‘The Physical Uplink Control Channel (PUCCH) caries Uslink control information inclusing scheduling requests (SR), HARQ ACKS/NACKS, ang COIs. At any time, @ UE ‘ean tansmit on ether the PRACH, PUSCH, or PUOGH, Dut ‘only on ane of thom. 196 In ation to physical enannls, there are also two types, cof physical Reference Signals (RS). 4. The Demodulation RS (OM RS) is transmitted with data oF contro! messages and helps the eNB with channel estimation ang coherent demodulation. 2. The Sounding RS (SRS) is scheduled by the eNB and transmitted on PUSCH resources. It helps with UL channel condition mantoring and efficient scheduling by resource grants that can optimize the network throughout, 7 | Uplink Operations UE Preparation for UL Transmission Pn Tiree ch logical channel fone When data arrives in the UE butter for transmission, the UE scheduler will process it and propare for UL data transmission. The scheduler frst checks to see if there Is. ‘a UL grant available, IF none is available, the UE needs to end a scheduling request (SR), If on is available, the scheduler considers the data in the buffer for each logical channel with different priorities and their Qos requitemont, then fonns packets for UL transmission. During the UL transmission, SSRs are sent to the eNB to notify it ofthe UL buffer status. The oN will assign more UL grants needed. A.UE maintains the logical channel buffer status for each logical chennel. When @ scheduling request needs to be sent, the UE sends the logesl channel identity of the highest priorty logical channel that nas data waiting in ts buffer to @ higher layer. Whenever a new data transmission happens, @ logical channel with ignor prion is allocated resources frst 197 7 | Uplink Operations Request for UL Resources ae 198 7 | Uplink Operations Step1: Scheduling Request From UE Data arrival in UE buffer, need grant, hheduling request (SR) on th eNB Gere fe \Wnen new data arives in the UE buffer, and there is no UL gant availabe, the LE will end an SR on the PUCCH. The PUCCH resources ere assigned to each UE when transitioning from the RRC Idle to RRC Connected state. if f (8 no SR resource avallaale on the PUCCH, the UE will start a random access process using the PRACH to send af ‘SR. The purposo of the SR is to request the PUSCH for UL data transmission 198 7 | Uplink Operations UL Control Information and PUCCH Transport Channel Coding Format PUCCH Format Wh Indes by = o |resare | pee) [acu [rpmsuesn| * absence HARGESR iat 2 wwe | A? lsseasvs [Egy | oa Eg ‘Reed “witna it) ey cal | ns | sete || Hegel | a gitsete (20, n) “with 2 bits) a The uplink control information Includes an SR, HARQ ACIYNACK, and CQl. This slide shows how UL control information ig channel coded, and which PUCCH format is Used to carry them. There is no coding for an SR; itis indicated by “present” or ‘abseni.” The SR #s carried by PUCCH Format 1 or PUCCH ast. The channel coding for an HAR ACK/NACK i straight forward: "0° for ACK and "1" for NACK. LTE TOD mode can use two HAR ACK/NACK its to support ACK/NACK. bundling and mutislexing. Tne HARQ ACK/NACK is carried by PUCCH Format 12/2. with TTI bundling the ACKYNACKS for the fame ie carried on PUCCH Format 2a/2b. ndiod The CQI uses Reed Miler channel coding and has 20 ‘urput bits. These 20 bits are carried by PUCCH Forat 2 or 22/20. 200 7 | Uplink Operations PUCCH Resource Mapping PUCCH format 1/1a/tb DMRS for PUCCH format 2/22/26 (TK DMRS for 1 | PUCCH PuccH format Format =F Vie/16 2/20/20 nas 1UL Subframe (1. ms) [A PUCCH occupies one resource block in each slot and frequeney hopping between the first and second slots within @ subframe. For exemple, assume 10 MHz of system bandwidth, @ PUCCH with Format 1/ta/tb occupies (slot 0, RB n) and (slot 4, RB 49-n). Another PUCCH with Format 2/24/20 occupies (slat 0, RB 49-0) and (alot 2, RB n), The total number of resource blocks in 2 slot used for PUCCH transmission Is configured by @ igher layer Demodulation reference signals (OM RSs) are transmitted together witn the PUCCH to help demodulation. As shown, In the figure, PUCCH Format 1/12/1b occupies OFDM symbols 2, 3, 4 in the mile of the slot; PUCCH Format 2/2a/2b occupies OFDM symbols 1 and 5 inthe slot. 201 7 | Uplink Operations UL Grant Allocation 7 | Uplink Operations Step 2: UL Grant From eNB CI Format 0 aoe] os er FS ic. RE Poe In order for the UE to be able to find the resource grant for PUSCH, it must frst be told what resources are to be sed, which bits are to be sent, and how the data is to be ‘encoded. The POCCHS contsin (among other things) DCI blocks that provide uplink allocations and power cominands for specific UES. Allocation DCIs describe the specifics of the uplink or downlink resources allocated to & single UE while power control DCls may include commands for multiple UES. (cis come In multiple sizes and formats depending on the specific information being carried. DCI Format 0 is used for uplink (PUSCH) allocations 203 7 | Uplink Operations DCI Format 0 ae New Data MRS Indicator _ [_Cvetig Shit Dowalink Assignment i Farnat] veo eaaea Not ‘wre | oe | Gre rs c2oiy [ae | (ots) hf on ee re | ee 2 |p| (3 bits) | (2 bits) ‘}a bin} Hopping Selected tno | | modulation and coding scheme. Transmit Power Control ‘Only for VL/L Config ‘ter receiving the scheduling request, the eNB sends an uplink grant on the POCCH using DCI Format 0. The UE's 16-bit CRNTIis implicit encoded in the CRC. ‘The resource allocation information includes: + Format Type: a bit value to differentiate OCI format © ‘and 1A. + Hopping flag indicates ifthe frequency hopping is on ore Hopping type ifthe hopping flag is on: there are two types of hopping, via grant or a predefined pattern. ‘The hopping type Indicates which type fs used. + Resource grant assignment: indicates then ‘consecutive physical resource blocks allocated to the UE by starting position and length. + Modulation end coding scheme (MCS): indicates which MICS should be used for the UL transmission, + New Data incicator: a one bit value to inform the eB. ‘bout a new transmission or retransmission. + Transmit Power Command: + DMRS Cyalle Shi two bit power contro Information to increase or decrease the power in steps, three bit information suggesting the gele shit. + UL Index: 2 two bit value to support multiole UL resource grants + DAE @ two bit field indicates mumber of subframes. ‘that were packed in group to allow the eNB to verity that there no missing subframes during subframe bundling + CQI Pol @ one bit value to inform whether aperiodic (QI is solicited from the base station (oN). 7 | Uplink Operations Multiple UL Grants in a subframe re UEL Sins ark {| q corner) ene uE2 arineg ‘sit In case of multiple UL grants being associated with 2 UE ‘on a single subframe, there can be two scenarios: + Two DG! format 0 information associated with a UE's C NTI where each OCI formst © addressing the resource grant, MCS, TPC command, HARQ details se related toa particular subframe transmission. + A single OC! format 0 adcressing the resource grant, MCS, TPC command, HARQ detsils are related to muttiple subframe transmission. ‘The above side shows an examale case where UE 4 Is assigned with DCI format 0 each to inform resources in fone subframe and UE 2 is assigned multiple subtrame resources with a single DOI format 0. This is decoded by ‘the UE through the UL index for UL/OL. Configuration 0. 7 | Uplink Operations BSR Reporting 7 | Uplink Operations Step 3: Buffer Status Reporting prec) oy Bee wth highest priority evening on the amount of UL resources allocated by ‘the eNB, the UE transmits the user data and the BSR to ‘the eN@ on the allocated PUSCH. The BSR is to report the. amount of data in the UE's buffer, Based on the received {8SR, the aN allocates adaltional UL grants to UE. ‘The BSR indicates the number of bis in the butfer and the logeal channel ID of the highest priory data that demands resoure. in adation to the BSR, Ifa UL grant is stl availabe, the UE can sand data as well 207 7 | Uplink Operations Types of BSR ‘tee BSRs eft in MAG POU as MAC Control Eleiment There are three scenatlos for sending. BSR to the eNB: 1, Now UL date arrives ina UE butter or a UE moves toa ew cel this s 8 “Regular BSR. 2. The Periodic BSR timer expres, in which case the SR ig a "Periodic BSR." The Periodic BSR timer is restarted, 3. The number of padding bits in a data message to be transmitted is larger than the size ofthe BSR so that adingit space is used to send a BSR. This is referred to as.a “Padding BSR." 208 7 | Uplink Operations UL Grant for Data Transmission 7 | Uplink Operations UL-SCH Scheduler at the eNB oom erie: Ries Wectia ete ar Was inte Cee As with the downlink, the eNB uses a scheduler mechanism to determine how best to allocate uplink resources; like the downlink, the uplink scheduler is not standardized. The goal of the uplink scheduler is to maximize each UE's performance, while minimizing uplink interference. Typical inputs include the scheduler requests and BSRS recoived from the UES, along with 2 view of each UE's Physical capablitios, including the UE's eategory and the ‘amount of transmit power it has available, The size of the ‘ants previously given to the UE and the success of the results (based on HARQ ACKS and NACKs) should also {actor Into the decision, as will the QoS requirements for ‘the radio bearers. Based on its. internal algorithms, the scheduler determines the eppropriate grants (in torms of resources ‘and power) and transport formats for each UE. 210 7 | Uplink Operations ie Transmission on the PUSCH 7 | Uplink Operations Step 5: Data Transmission on PUSCH pusct All parameters specified by eNB UE (eg, RBS, frequency hopping, and MCS) eNB The eNB sends a UL grant in the POCCH, assigning one or more resource blocks and deciding the Modulation and (Coding Scheme (MCS) the UE needs to use. This grant ‘apples to a sub-rame that is four miliseconds (ms) after the sub-rame thet carries the grant. After getting the UL gant, the UE transmits data (user traffic or signaling) on the PUSCH using the allocated PRBS, frequency hopping, pattern, and MCS, If the UE stil has data to send (the UL buffer isnot empty yet), the UE may decide to send a BSR. Pigevoacked on user data. 212

You might also like