Академический Документы
Профессиональный Документы
Культура Документы
Wireless Networks
CDMA 3G-1X RF Engineering Guidelines
401-614-040
Issue 2
February 2003
This material is protected by the copyright and trade secret laws of the United States and other countries. It may not be reproduced, distributed, or altered in
any fashion by any entity (either internal or external to Lucent Technologies), except in accordance with applicable agreements, contracts, or licensing, without
the express written consent of Lucent Technologies and the business management owner of the material.
Notice
Every effort was made to ensure that this document was complete and accurate at the time of printing. However, information is subject to change.
Security statement
In rare instances, unauthorized individuals make connections to the telecommunications network through the use of remote access features. In such event,
applicable tariffs require the customer to pay all network charges for traffic. Lucent Technologies cannot be responsible for such charges and will not make
any allowance or give any credit for charges that result from unauthorized access.
Trademarks
Ordering information
The ordering number for this document is 401-614-040. To order this or other Lucent Technologies information products, see “To obtain documentation,
training, and technical support or submit feedback” on the 401-010-001 Flexent®/AUTOPLEX® Wireless Networks System Documentation CD-ROM or the
documentation web site at https://wireless.support.lucent.com/amps/rls_info/rls_doc/cd_docs/.
Technical support
For technical support, see “To obtain documentation, training, and technical support or submit feedback” on the 401-610-010 Flexent®/AUTOPLEX® Wireless
Networks System Documentation CD-ROM or documentation web site at https://wireless.support.lucent.com/amps/rls_info/rls_doc/cd_docs/.
............................................................................................................................................................................................................................................................
About
Purpose i
Reason for reissue ii
Related information products iii
Related training iii
To obtain technical support, documentation, and training or
send feedback iv
Notations used iv
............................................................................................................................................................................................................................................................
...........................................................................................................................................................................................................................................................
401-614-040 Lucent Technologies - Proprietary C O N T E N T S
Issue 2, February 2003 See Notice on first page i
General Erlang model 3-5
Special cases: Erlang B and Erlang C 3-7
Applications of Erlang C to 3G-1X data 3-10
Data capacity 3-13
Introduction 3-13
Data link budgets 3-19
Reverse link 3-19
Forward link 3-22
Resource management: RF scheduling 3-36
Introduction 3-36
Scheduling algorithm 3-36
Conclusions 3-43
............................................................................................................................................................................................................................................................
5 Handoff 5-1
Introduction 5-3
Soft handoff definition 5-3
Procedure 5-3
IS-95B soft handoff algorithm 5-6
Signal combining 5-8
Coverage contour 5-8
Discussion 5-12
Soft handoff costs on channel elements and packet pipe 5-12
Soft handoff cost on forward link 5-12
Soft handoff advantages 5-13
Qualitative description of forward link soft handoff benefit 5-22
IS-95B parameters 5-25
SOFT_SLOPE, DROP_INTERCEPT, ADD_INTERCEPT 5-30
SCH anchor transfer vs. SHO 5-31
Hard handoffs 5-36
References 5-37
............................................................................................................................................................................................................................................................
...........................................................................................................................................................................................................................................................
C O N T E N T S Lucent Technologies - Proprietary 401-614-040
iv See Notice on first page Issue 2, February 2003
About this information product
............................................................................................................................................................................................................................................................
............................................................................................................................................................................................................................................................
401-614-040 Lucent Technologies - Proprietary i
Issue 2, February 2003 See Notice on first page
is accomplished through application of familiar IS-95 principles such
as fast power control, variable-rate voice coding, and careful network
optimization.
Reason for reissue Starting from Issue 2, the information in this document is divided into
two parts. Part I includes the updated information for Issue 1 of this
document. Part 2 introduces the following new chapters.
• Chapter 5: Handoff
• Chapter 6: Power Control
• Chapter 7: Extended Carrier
• Chapter 8: Fixed Wireless Voice Networks
Intended audience This document is intended for engineers who will be responsible for
system design and performance analysis of a Lucent Technologies
3G-1X system.
...........................................................................................................................................................................................................................................................
ii Lucent Technologies - Proprietary 401-614-040
See Notice on first page Issue 2, February 2003
– Chapter 4, “System Deployment,” describes deployment
issues, with focus on transition from 2G to 3G-1X
• Part II, which consists Chapters 5 through 8, provides more
specialized discussions on individual topics such as power control
and soft handoff.
– Chapter 5, “Handoff,” discusses the soft handoff procedures,
algorithms, coverage, cost and benefit for the CDMA 3G-1X
voice and packet data calls
– Chapter 6, “Power Control,” describes the power control
functions for both the forward link and reverse links for the
CDMA 3G-1X voice and packet data calls
– Chapter 7, “Extended Carrier,” provides guidelines for RF
planning for “extended” carrier deployment
– Chapter 8, “Fixed Wireless Voice Networks,” provides a
detailed analysis of the system performance of 2G and 3G-
1X CDMA fixed wireless voice networks.
Related training Lucent Technologies offers the following training products that relate
to CDMA RF design and operation:
• CL3715, Understanding CDMA
• CL8301, CDMA IS-95 and 3G-1X RF Design and Growth
Engineering for Cellular System
• CL8302, CDMA IS-95 and 3G-1X RF Design and Growth
Engineering for PCS System
...........................................................................................................................................................................................................................................................
401-614-040 Lucent Technologies - Proprietary iii
Issue 2, February 2003 See Notice on first page
• CL8303, CDMA IS-95 and 3G-1X Base Station Call Processing
• CL8304, 3G-1X RF Design Engineering and Base Station Call
Processing.
https://wireless.support.lucent.com
ε g = gi / η g
i
...........................................................................................................................................................................................................................................................
vi Lucent Technologies - Proprietary 401-614-040
See Notice on first page Issue 2, February 2003
1 Discussion of CDMA 3G-1X RF
engineering
Overview
............................................................................................................................................................................................................................................................
............................................................................................................................................................................................................................................................
401-614-040 Lucent Technologies - Proprietary 1 - 1
Issue 2, February 2003 See Notice on first page
Introduction Discussion of CDMA 3G-1X RF engineering
Introduction
............................................................................................................................................................................................................................................................
The 3G-1X Packet Data feature(s) enable mobile users with laptop
computers or other data devices conforming to the IS-2000 and
IS-707A1 standards to access various data applications, such as
Internet access, Intranet access, Database access, e-mail, and file
transfer at higher speed.
The assignment of the SCH, along with its data rate, is controlled by
the infrastructure based on system load and interference conditions.
Static allocation of multiple codes to a small number of users can result
in inefficient use of CDMA air interface capacity. Dynamic
infrastructure-controlled burst allocation makes it possible to
efficiently share the bandwidth among several high-speed packet data
mobiles. Efficient algorithms to support dynamic burst allocation have
been developed by Lucent. The burst allocation scheme is designed to
maximize utilization of CDMA channel bandwidth and system
resources. As has been determined during the extensive design process
for Lucent Technologies’ HSPD (High Speed Packet Data) Service, the
potential risks and issues that arise in designing the packet data service
(especially risks of voice quality impact) are minimal, and are easily
manageable with minimal impact on voice or data capacity.
The data rate and duration of the burst (i.e., the supplemental channel)
will be dynamically determined by the infrastructure, depending on
load, interference, and resource availability conditions. Therefore, the
supplemental channel does not offer any guaranteed bit rate. However,
the data rate offered by the fundamental channel with raw data rate of
9.6 kbps is always guaranteed to the 3G-1X data user. For the forward
direction, the burst allocation is triggered when data gets backlogged in
the network side of the system. For the reverse direction, data builds up
at the mobile, which in turn sends a supplemental channel request
message to the system, triggering the burst allocation procedure.
The new service can be asymmetric, i.e., the high speed packet data
mobile, at any given instant, may be assigned different bandwidths on
the forward and reverse links. This helps to maximize the efficient use
of bandwidth in both directions, still meeting the bandwidth demand of
the end-user in each direction. The 3G-1X CDMA HSPD product is
built on the 2G/3G CDMA Low Speed Packet Data (LSPD) software
since the operation of the fundamental channel and packet data call
setup and tear-down procedures are almost identical to the LSPD
service when there is no data burst in progress. To end users, the most
visible advantage of HSPD over LSPD releases is speed.
...........................................................................................................................................................................................................................................................
401-614-040 Lucent Technologies - Proprietary 1 - 3
Issue 2, February 2003 See Notice on first page
Capacity and coverage for voice applications Discussion of CDMA 3G-1X RF engineering
Spectrum requirements Spectrum requirements for 3G-1X are modest and identical to those for
an IS-95 carrier. 3G-1X requires a 1.23 MHz carrier in the cellular band
or a 1.25 MHz carrier in the PCS band, with a recommended guard
band of 270 kHz between the CDMA and AMPS carriers in the cellular
band, and a guard band of 625 kHz (~ ½ carrier) on either side of the
PCS block. The guard band recommended is typical, and may be
relaxed or expanded depending upon the specific wireless applications
in contiguous spectrum. In most cases, it is anticipated that the 270 kHz
for the cellular band or 625 kHz for the PCS band should be sufficient.
Link budget 3G-1X voice coverage is essentially determined via link budget
analysis, which follows a strategy comparable to that pursued in IS-95
applications. The cell footprint is first sized using the reverse link,
which properly takes into account the impact of limited mobile transmit
power. Forward link budget analysis focuses on ensuring that sufficient
forward power is available to support operations within the footprint
dictated by the reverse link.
The link budgets used for voice coverage follow a format similar to that
for IS-95; however, key parameters differ in value and meaning. For
example, the receiver Eb/Nt requirement used to determine cell site
receiver sensitivity is based on the total mobile transmit power, rather
than the fraction of mobile power dedicated to the traffic channel
(unlike IS-95, the uplink consists of both a traffic channel and a pilot
channel). In addition, a more aggressive loading with respect to the
pole point is allowed due to the inherently greater number of users
within a single carrier. These topics are discussed in greater detail in
Chapter 2, "Voice coverage, capacity and link budget", which derives
both forward and reverse link budgets. A comparison is also drawn
between 3G-1X and IS-95 coverage. The slight improvement offered
by 3G coverage is key to a 2G to 3G (i.e., IS-95 to 3G-1X) migration
strategy, as discussed in Chapter 4, "System deployment".
...........................................................................................................................................................................................................................................................
1 - 4 Lucent Technologies - Proprietary 401-614-040
See Notice on first page Issue 2, February 2003
Capacity and coverage for voice applications Discussion of CDMA 3G-1X RF engineering
Voice capacity The analysis of 3G-1X voice capacity is also similar to that of IS-95,
albeit with different values of key parameters. In particular, relaxed Eb/
Nt requirements on both links drive Erlang capacity/Hz up to twice the
value available for IS-95, i.e., up to 26.4 Erlangs per 1.23 MHz carrier
for an 8 kbps vocoder. The improved Eb/Nt requirements derive from a
number of air interface features, such as enhanced convolutional
coding, faster power control, and a reverse link pilot channel that
provides a reference signal to aid in signal demodulation. The analysis
of 3G-1X capacity is coupled to that of 3G-1X coverage, since both are
ultimately driven by Eb/Nt requirements on each link. This analysis is
presented in some detail in Chapter 2, "Voice coverage, capacity and
link budget".
...........................................................................................................................................................................................................................................................
401-614-040 Lucent Technologies - Proprietary 1 - 5
Issue 2, February 2003 See Notice on first page
RF engineering for data Discussion of CDMA 3G-1X RF engineering
Overview of traffic theory IS-95 has typically employed a circuit-switched analysis of traffic,
since this body of theory is based on a dedicated resource (channel) per
user. The resource is held exclusively by the user for the duration of
service (i.e., for the duration of the call) and released upon call
completion.
Data link budget The data link budget serves two primary purposes. First, the analysis
dictates coverage by establishing a minimum data rate available at the
cell edge. Second, the analysis verifies that the system has sufficient
power to support the mix of fundamental and supplemental channels
that are required within this design footprint in order to achieve
performance (e.g., data throughput).
The forward link budget analysis is more complex, in the sense that
forward power must be appropriately shared between fundamental
(voice and low-speed data) and supplemental (high-speed data)
channels in order to provide coverage within the footprint. In addition,
the forward link supplemental channel does not enter soft handoff at the
boundary. This design strategy limits forward link interference by
ensuring that only one high-rate burst is simultaneously active to the
mobile. Supplemental channel performance at the cell edge is enhanced
by anchor transfer (essentially a fast hard handoff to the best serving
cell), which exploits the fact that the supplemental channel is bursty
rather than continuous in nature. The anchor transfer allows the mobile
to be served by the best cell for the burst duration.
...........................................................................................................................................................................................................................................................
401-614-040 Lucent Technologies - Proprietary 1 - 9
Issue 2, February 2003 See Notice on first page
RF engineering for data Discussion of CDMA 3G-1X RF engineering
...........................................................................................................................................................................................................................................................
1 - 10 Lucent Technologies - Proprietary 401-614-040
See Notice on first page Issue 2, February 2003
2 Voice coverage, capacity and link
budget
Overview
............................................................................................................................................................................................................................................................
Purpose This chapter describes the essential coverage and capacity issues for
voice applications.
............................................................................................................................................................................................................................................................
401-614-040 Lucent Technologies - Proprietary 2 - 1
Issue 2, February 2003 See Notice on first page
Introduction Voice coverage, capacity and link budget
Introduction
............................................................................................................................................................................................................................................................
In 3G-1X, all users share the same wideband carrier; i.e., the frequency
reuse is 1. Transmissions within this channel are distinguished by
coding. This approach stands in contrast to other approaches such as
frequency division multiple access (each user occupies a distinct
narrowband channel) or time division multiple access (each user
occupies a distinct time slot).
The simultaneous use of the same wideband carrier means that all users
interfere with one another. On both forward and reverse links, this
interference is tolerated but mitigated through means such as
processing gain, fast power control, variable-rate coding, and soft
handoff. Interference from other users is suppressed by the processing
gain (typically about 20 dB), which derives from the manner in which
each traffic channel is uniquely coded to allow ready identification.
Power control dynamically adjusts each traffic channel power to the
minimum required to maintain performance. Variable-rate coding
further suppresses the background interference level by powering down
the link (i.e., reducing the voice coding rate) whenever the user is not
speaking. Finally, soft handoff reduces overall interference levels by
allowing the call to be simultaneously supported by multiple base
stations, thereby introducing a diversity gain that lowers the net traffic
power required per mobile.
...........................................................................................................................................................................................................................................................
2 - 2 Lucent Technologies - Proprietary 401-614-040
See Notice on first page Issue 2, February 2003
Introduction Voice coverage, capacity and link budget
...........................................................................................................................................................................................................................................................
401-614-040 Lucent Technologies - Proprietary 2 - 3
Issue 2, February 2003 See Notice on first page
Analysis Voice coverage, capacity and link budget
Analysis
............................................................................................................................................................................................................................................................
Reverse link The key to reverse link analysis lies in assessing the receiver
sensitivity; i.e., the minimum power (usually expressed in dBm)
required per receive diversity branch at the cell site receiver input. This
input (the J4 port) lies at the end of the cable connecting receiver to
antenna; i.e., at the point where the incoming signal has already
suffered cable loss.
...........................................................................................................................................................................................................................................................
2 - 4 Lucent Technologies - Proprietary 401-614-040
See Notice on first page Issue 2, February 2003
Analysis Voice coverage, capacity and link budget
In this equation, the letter i is the index of the mobile in question. The
left-hand side is the achieved Eb/Nt at the cell site receiver (J4 port);
the right-hand side is the required median Eb/Nt corresponding to the
particular mobile’s condition (speed, multipath) at the design FER
(e.g., 1%).
Eb α i S i / Ri (W / R )α i S i gα i S i
α i = = = = αidi
i FN + 1 ∑ α S FN oW + ∑ α j S j FN oW + ∑ α j S j
N N N
Nt
o
W j =1 j j j =1 j =1
J ≠i J ≠i J ≠i
This expression is the heart of system analysis for reverse link coverage
and capacity; accordingly, we consider it in some detail.
In the above, the energy per bit (numerator) is determined by the ratio
of received power Si to channel bit rate Ri. The spectral density of
receiver interference plus receiver noise (denominator) is determined
by the sum of receiver noise density (the thermal noise density No
scaled by the receiver noise figure F) and the sum of power received
from the other N-1 mobiles.
In voice applications, the channel bit rate is constant for all users
provided that a single vocoder, either 8 or 13 kbps speech, is employed
within the mobile population; hence Ri=R. This is not the case in data
applications, where the channel bit rate can vary per user. Additionally,
a voice network may contain a mixed population of 8 and 13 kbps
vocoders. These points are explored later on in this document.
...........................................................................................................................................................................................................................................................
401-614-040 Lucent Technologies - Proprietary 2 - 5
Issue 2, February 2003 See Notice on first page
Analysis Voice coverage, capacity and link budget
Solution--Exact
g / d1 − α2 . . − αN
S1 1
−α S
− αN
1
g / d2 . .
2 1
. . . . . = FN oW .
.
. .
. . . . .
− α1 − α2 . . g / d N S N 1
...........................................................................................................................
1 The ½ and ¼ are transitional rates (from speak to listen), and are not always employed.
...........................................................................................................................................................................................................................................................
2 - 6 Lucent Technologies - Proprietary 401-614-040
See Notice on first page Issue 2, February 2003
Analysis Voice coverage, capacity and link budget
g / d1 − α2 . . −αN a1 x1 1
−α
g / d2 . . −αN a2 x2 1
1
. . . . . . . = FN W .
. o
. . . . . . .
− α1 − α2 . . g / d N a N x 1
N
Note that the matrix containing the attenuations (a) is diagonal, with 0’s
in all nondiagonal entries.
Although the analysis outlined by Equation 2-4 has been pursued, the
results are generally not applicable to network performance unless the
model is expanded in two ways: The incorporation of the impact of
moving (non-fixed) mobiles, and the incorporation of the effects of
other sectors. For completeness, these are described below.
In the above, we have presumed that the mobiles are fixed. This
concept lends itself readily to the steady-state assumption, where
position, fade, multipath, and voice activity do not change with time. In
each trial, the required Eb/Nt, di, for each mobile was obtained solely
as a function of the random choice made for multipath since the speed
was fixed at 0. The situation for moving mobiles is assessed by using a
randomly assigned value of speed as well as multipath to determine the
required Eb/Nt, (di) in Equation 2-4. The performance of a system with
moving mobiles is thus determined by applying mobile Eb/Nt
requirements to an otherwise static situation. This approach, which
approximates the more complex situation where the mobile positions
are changing from instant to instant, is sometimes referred to as
analysis via a series of static snapshots.
particular, the size of the matrix increases from N×N to Ntotal × Ntotal,
where Ntotal is the number of mobiles in all sectors. The analysis
proceeds similarly but with considerably more computational
complexity, since for each trial the Ntotal × 1 vector of transmit
strengths, representing the transmit strengths of all mobiles within the
network, must be solved for.
Solution--Approximate
...........................................................................................................................................................................................................................................................
401-614-040 Lucent Technologies - Proprietary 2 - 9
Issue 2, February 2003 See Notice on first page
Analysis Voice coverage, capacity and link budget
Eb α i Si / Ri (W / R )α i Si gα i S i
= = = = α i di
N o i FN + 1 ∑α S FN oW + ∑α j S j FN oW + ∑α j S j
N N N
o
W j =1 j j j =1 j =1
J ≠i J ≠i J ≠i
Eb gS i
= = di
N t i FN W + (1 + β )∑ α S
N
o j j
j =1
J ≠i
...........................................................................................................................
2 The two-path existence is also guaranteed in some other diversity schemes such as
slant polarized diversity branches; however, these schemes are not applicable at all frequen-
cies.
...........................................................................................................................................................................................................................................................
2 - 10 Lucent Technologies - Proprietary 401-614-040
See Notice on first page Issue 2, February 2003
Analysis Voice coverage, capacity and link budget
gS
= d max
FN oW + (1 + β ) S ∑ α j
N
j =1
J ≠i
Equation 2-6: Reverse link Eb/Nt assuming worst case required Eb/Nt
This expression is readily solved for the single value of the key
parameter S, the required signal strength per diversity branch at the J4
port of the cell site receiver:
FN oW
S=
− (1 + β )∑α j
g N
d max j =1
J ≠i
g − (1 + β )( N − 1)η
d α
= E {S }=
FN oW
S min E max
g − (1 + β )( N − 1)η g − (1 + β )∑ α
N
d max α
d max j =1
j
J ≠i
E{S }=
FN oW
g − (1 + β )( N − 1)η
d max α
g 1
N max = +1
ηα d max (1 + β )
g
>> ηα (1 + β )
d max
...........................................................................................................................................................................................................................................................
2 - 12 Lucent Technologies - Proprietary 401-614-040
See Notice on first page Issue 2, February 2003
Analysis Voice coverage, capacity and link budget
dmax 1
E{}
S = FN W
g 1−u o
Equation 2-13: Simplified reverse link receiver sensitivity
Equation 2-11 suggests that any integer value of N less than Nmax (i.e.,
any value of u less than 1) is permissible provided that one is willing to
pay the penalty of reduced cell coverage associated with very high pole
loadings (e.g., u=0.95). In practice, loadings approaching u=1 are
avoided due to the possibility of associated instabilities. Such
instabilities exist regardless of the nature or form of power control, as
can be demonstrated by a sensitivity analysis that relates relative
changes in loading u to relative changes in required receiver sensitivity.
dS min u du
=
S min 1 − u u
...........................................................................................................................................................................................................................................................
401-614-040 Lucent Technologies - Proprietary 2 - 13
Issue 2, February 2003 See Notice on first page
Analysis Voice coverage, capacity and link budget
Sensitivity Factor
20
15
mu/(1-mu)
10
0
0 0.2 0.4 0.6 0.8 1
mu
Link budget
link can support performance at the same loss (See "Forward link"
section on Page 2-20), the loss can be used on a market-by-market basis
to perform RF design. This process employs algorithms that map loss
into cell radii via consideration of local variables such as tower height,
terrain, and clutter.
Figure 2-2 Components of net path loss from mobile to base station
The terms characterizing the net loss are captured in the following
relation, which requires that at maximum mobile transmit power the
signal power achieved at the J4 port must equal or exceed 10log(Smin):
where:
Xmax= Maximum mobile EIRP (Effective Isotropic Radiated Power) (in dBm)
HL = dB head (body) loss
Fade = dB fade at mobile location
BL/VL = dB building or dB vehicle penetration loss, whichever is applicable
PL = dB point to point (average) path loss between mobile antenna and cell
site antenna
AG = dBi cell site antenna gain
CL = dB cell site cable loss.
...........................................................................................................................................................................................................................................................
401-614-040 Lucent Technologies - Proprietary 2 - 15
Issue 2, February 2003 See Notice on first page
Analysis Voice coverage, capacity and link budget
Table 2-2 shows PCS link budgets for second generation (2G) voice
coded at 13 kbps (total rate with overhead bits is 14,400) and at 8 kbps
(total rate with overhead bits is 9600). These are included for reference.
The 3G-1X budget for 8 kbps is shown in the right-hand column. The
2G budgets are created from parameters (e.g., noise figure) applicable
to the IS-95 Minicell and the ASIC 1.0 chip. The 3G-1X budget uses
parameters appropriate to the Flexent® Modular Cell.
In all cases, the format of the link budget is essentially obtained from
Equation 2-16, with Equation 2-13 used to create the value of Smin. As
discussed above, the approximation Equation 2-13 is not always valid;
hence, in spite of the format the spreadsheet uses an embedded form of
Equation 2-11 to obtain the Smin.
...........................................................................................................................................................................................................................................................
2 - 16 Lucent Technologies - Proprietary 401-614-040
See Notice on first page Issue 2, February 2003
Analysis Voice coverage, capacity and link budget
Table 2-2 Reverse PCS link budget for IS-95 9.6 kbps, IS-95 14.4 kbps, and 3G-1X 9.6 kbps voice,
mobility application
(i) Receiver Interference Margin dB 3.4 3.6 5.5 72% loading for 3G-1X
(j) Total Effective Noise plus Interfer- dBm/Hz -165.6 -165.4 -164.5
ence Density = (g + h + i)
(p) Log-normal Fade Margin dB 10.3 10.3 10.3 For 90% edge coverage
with 8dB log-normal stan-
dard deviation
(p') Building/Vehicle Penetration Loss dB 0.0 0.0 0.0 For outdoor coverage
...........................................................................................................................................................................................................................................................
401-614-040 Lucent Technologies - Proprietary 2 - 17
Issue 2, February 2003 See Notice on first page
Analysis Voice coverage, capacity and link budget
Note that the link budget creates the fade margin in Equation 2-16 as a
sum of two terms: The single-link (simplex) fade margin and the soft
handoff gain.
The fade margin required for 90% edge coverage is actually less than
the simplex value, since a CDMA mobile at the cell edge is in a soft
handoff state with at least two legs. The full simplex margin would
only be required if both legs faded simultaneously and equally. Since
the leg-to-leg fading is at least partly uncorrelated, the net fade margin
required to achieve a given probability of coverage is less. The soft
handoff gain is the difference between the simplex and actual fade
margin. The exact value is a weak function of probability of edge
coverage and is determined by offline calculations that are supported
by field data. Recommended values are tabulated, below. These values
correspond to a 60% correlation between soft handoff legs in a
lognormal fading environment (8 dB standard deviation).
Table 2-3 Reverse link soft handoff gains
75% 3
90% 4
...........................................................................................................................
3 This is true for lognormally distributed fades with 8 dB standard deviation, this distri-
bution is common and often observed in path loss measurements
...........................................................................................................................................................................................................................................................
2 - 18 Lucent Technologies - Proprietary 401-614-040
See Notice on first page Issue 2, February 2003
Analysis Voice coverage, capacity and link budget
The differences between the 3G-1X and the IS-95 voice reverse link
budgets must be emphasized. They include the following:
• For 2G, the mobile transmitted power consists solely of traffic
channel power; however, for 3G-1X, the mobile transmitted the
power includes the traffic channel and reverse pilot channel
power. The analysis described in the "Solution--Exact" and
"Solution--Approximate" sections applies in either case since the
Eb/Nt requirements di are adjusted appropriately. It is simply a
matter of interpretation of the transmit power x.
• The required Eb/Nt d (i.e., the traffic channel Eb/Nt requirements
for the 2G, and the total traffic plus pilot Eb/Nt requirement for the
3G-1X) to achieve 1% target Frame Erasure Rate (FER) differ. For
the 9.6 kbps voice, mobility application and 1% FER target, the
requirement for the 3G-1X is 4 dB, less than the 7 dB required for
the IS-95 system (ASIC 1.0 chip).
• The pole loading factor for 3G-1X is higher than the pole loading
factor for IS-95, due to a larger user base and slightly improved
power control (see the "Solution--Approximate" section). This
difference is reflected within the interference margin. The
example budgets employ the maximum loading recommended for
the scenarios chosen. Lower loadings are allowed, increasing
coverage at the expense of reducing capacity.
• The air interface capacity of the 3G-1X 8kbps voice application is
26.4 Erlangs per sector per carrier (corresponding to 35 channels
at 2% blocking) while that of the IS-95 8kbps voice is 13.2
Erlangs per sector per carrier (corresponding to 20 channels at 2%
blocking). This difference arises due to the 3G-1X reduced Eb/Nt
requirement, as well as the increased 3G-1X maximum pole
loading.
• The base receiver noise floor of the PCS CDMA Minicell is 5 dB
while that of the PCS CDMA Flexent Modular Cell is 4 dB. The
former has been extensively deployed within the field, and was
therefore used as a 2G reference in Table 2-2.
The examples above indicate that 3G-1X can tolerate more path loss
than IS-95 under identical (“normalized”) conditions; i.e., equal values
of antenna gain, fade margin, building penetration loss, etc. This
difference allows an IS-95 system to be upgraded to 3G-1X on a 1:1
basis without loss of coverage performance. Overlay strategies are
discussed in more detail in Chapter 4, "System deployment".
...........................................................................................................................................................................................................................................................
401-614-040 Lucent Technologies - Proprietary 2 - 19
Issue 2, February 2003 See Notice on first page
Analysis Voice coverage, capacity and link budget
Forward link Reverse link analysis is used to establish the cell footprint. This
analysis can be viewed as driven by the limit on mobile transmit power.
This limit is a key constraining factor in cell size, driven by market
demands for more compact subscriber units and longer battery life.
The objective of forward link analysis is to ensure that the forward link
has sufficient power to support performance within the footprint
dictated by the reverse link. Accordingly, the dB design path loss
determined by reverse link analysis is an input to the forward link
analysis process, which assesses whether the forward link has sufficient
resources to deliver adequate power to each mobile receiver within the
design path loss.
This analysis differs in three important ways from that of the reverse
link:
• First, the link transmitter power (forward link amplifier power)
considered in analysis is shared amongst multiple users. In
contrast, the transmit power employed in reverse link analysis (the
mobile transmit power) is dedicated to a single subscriber.
• Second, the effect of other sectors at the receiver is more
important, as a mobile receiver near the cell boundary can be
subjected to a significant amount of interference broadcast by
nearby neighbor sectors. In contrast, the other-cell interference
considered in reverse link analysis consisted of power from
modest transmitters at a greater distance from the cell site receiver.
• Third, the available link level information does not consist
(directly) of receiver Eb/Nt requirements; rather, the fractional
forward link power (“Ec/Ior”) as a function of mobile geometry is
used in analysis. The ‘geometry’ is defined as the ratio of the total
power within the active set to the sum of receiver noise and total
power received from all sectors not within the active set. A sector
is in the mobile’s active set when it is supporting the mobile call;
i.e., providing a signal or leg that the mobile is demodulating.
...........................................................................................................................................................................................................................................................
2 - 20 Lucent Technologies - Proprietary 401-614-040
See Notice on first page Issue 2, February 2003
Analysis Voice coverage, capacity and link budget
x = Ec / Ior; x < 1
x = f (G)
Equation 2-17
For example, x may be 0.05, indicating that 5% of the total forward link
power broadcast by a sector is required to maintain forward link FER.
Note that this relationship says nothing about the total power broadcast
by the sector, but simply indicates what fraction of the power being
broadcast is required by the mobile in question.
The geometry must be defined with care. For a mobile not in soft
handoff, the numerator of the geometry consists only of the power
received from its host sector. For a mobile in soft handoff, the
numerator consists of the power received from the host as well as all
other sectors supporting the call. In each case, the denominator consists
of the sum of receiver noise and the received power from all other
sectors not supporting the call.
I1 + I 2
G= all sec tors
; mobile in soft handoff with sec tors 1 and 2
FN t + ∑I i
i =3
Note the contrast between the first (no soft handoff) and last (soft
handoff) definition of geometry. In the former case, only sector 1
supports the call; accordingly, only the received power from sector 1 is
in the numerator. In the latter case, both sectors 1 and 2 support the call.
In this case, the received power from sector 2 is removed from the sum
in the denominator and placed within the numerator.
...........................................................................................................................................................................................................................................................
401-614-040 Lucent Technologies - Proprietary 2 - 21
Issue 2, February 2003 See Notice on first page
Analysis Voice coverage, capacity and link budget
In all cases, the I represents the received spectral density from all
multipath reaching the mobile receiver from the sector in question. For
clarity, some sample mappings of x = Ec/Ior vs. geometry G are shown
below. The mapping is from an early study examining the impact of
power control, which, as expected, improves the link performance by
lowering the x required. The study per se will not be discussed further
here; the chart is used only to demonstrate the general shape of the
curve x = f(G).
Qmax − Oover
Y = ∑α j x j ≤
N
j =1 Qmax
Equation 2-19: Sum of powers less than available traffic power
In the above, αj represents the channel activity of the jth forward link,
and xj represents the fractional power required to support this link. The
values Qmax and Qover are the maximum average available power and
the average power assigned to overhead channels (e.g., pilot),
respectively. This inequality must be satisfied for each sector within the
system.
For clarity, we write the value xj more completely to show its functional
dependence:
x j = x j ( speed , multipath, geometry[ all sec tor powers , fading , location, handoff state])
...........................................................................................................................................................................................................................................................
401-614-040 Lucent Technologies - Proprietary 2 - 23
Issue 2, February 2003 See Notice on first page
Analysis Voice coverage, capacity and link budget
Increasing links
Max allowed
...........................................................................................................................................................................................................................................................
2 - 24 Lucent Technologies - Proprietary 401-614-040
See Notice on first page Issue 2, February 2003
Analysis Voice coverage, capacity and link budget
Solution--Exact
The list above summarizes the general steps to be taken in forward link
analysis. This process can be implemented in several ways; in
particular, it is possible to obtain a set of solutions for a normalized
network (e.g., unity power, unity coverage, etc.) and then scale these
solutions in a simple way to address a wide variety of design scenarios.
This strategy obviates the difficulty of running a computationally
intensive model for every design scenario; rather, solutions for a
normalized scenario can be scaled to a variety of other scenarios
through straightforward adjustments of antenna gain, cell radius, fade
margin, etc.
Distribution
of mobile
position
Distribution
of shadow µ(xN)
µ(xI)
fading
CDMA
Forward σ(xN)
Distribution
Link Solver σ(xI)
of soft E(xNxI)
handoffs
Ec/Ior vs.
Geometry
curves
...........................................................................................................................................................................................................................................................
401-614-040 Lucent Technologies - Proprietary 2 - 27
Issue 2, February 2003 See Notice on first page
Analysis Voice coverage, capacity and link budget
Forward Link Budget for 3G PCS 3 Sector 8 kbps CDMA with ASIC 1.1 and Mobility Applications (on Street)
B C D E F G
5 Nominal available power at J4 point 10.5 W 40.2 dBm Max power available
9 Power available for the traffic Channel 8.2 W 39.1 dBm 78.2% total power
11 Overhead factor to convert from mobiles to the 1.75 2.4 dB IS-95B new handoff
number of active power channels
14 Propagation loss
...........................................................................................................................................................................................................................................................
2 - 28 Lucent Technologies - Proprietary 401-614-040
See Notice on first page Issue 2, February 2003
Analysis Voice coverage, capacity and link budget
µ(xN) 0.0107
µ(xΙ) 0.0200
E(xNxI) 0.0003
σ(xN) 0.0368
σ(xΙ) 0.0064
µ(Ξ) 0.01025894
σ2(Ξ) 0.00008474
µ(Ψ) 0.64631291
σ2(Ψ) 0.00533881
Solution--Approximate
Additional means may be used for forward link analysis. These are
simpler but approximate. Since the time required to obtain a solution by
extrapolating from a normalized baseline (see the "Solution--
Approximate" section) is usually comparable to the time required to
obtain an approximate solution, the former is preferred. Nevertheless,
approximate methods can provide useful insight. For completeness, we
briefly outline several methods below.
...........................................................................................................................................................................................................................................................
401-614-040 Lucent Technologies - Proprietary 2 - 29
Issue 2, February 2003 See Notice on first page
Analysis Voice coverage, capacity and link budget
...........................................................................................................................................................................................................................................................
2 - 30 Lucent Technologies - Proprietary 401-614-040
See Notice on first page Issue 2, February 2003
3 RF engineering for data
Overview
............................................................................................................................................................................................................................................................
Purpose This chapter offers a discussion of RF data issues for 3G-1X, including
a contrast between the Erlang B (voice) and Erlang C (data) models,
analysis of capacity and coverage, and an examination of resource
management.
...........................................................................................................................................................................................................................................................
3 - 2 Lucent Technologies - Proprietary 401-614-040
See Notice on first page Issue 2, February 2003
Introduction RF engineering for data
Introduction
............................................................................................................................................................................................................................................................
...........................................................................................................................................................................................................................................................
401-614-040 Lucent Technologies - Proprietary 3 - 3
Issue 2, February 2003 See Notice on first page
Traffic theory RF engineering for data
Traffic theory
............................................................................................................................................................................................................................................................
Introduction The 3G-1X air interface is packet-switched in the sense that a limited
number of high-speed RF data channels are shared across many users.
The “sharing” on the 3G-1X air interface does not entail the sharing of
a physically tangible resource; rather, the sharing concept derives from
the fact that users transmit high-speed data bursts only when cued to do
so by the network. Since channels at higher data rates produce more
interference, the network manages these bursts in a way that ensures
only a limited number of high-speed data bursts are simultaneously
active. This process prevents the interference background from rising
above acceptable levels while still allowing users to experience high
data rates. This resource management (see "Resource management: RF
scheduling" section on Page 3-36) can be viewed as time-sharing a
limited number of high-speed data channels amongst the users, and is
thereby characterized as a packet-switching process. The restricted
availability of the data channel for the duration of the user session
would be unacceptable for a real-time application such as voice, but is
an efficient means for data support since the user need for transmission
is at most intermittent for many data applications (e.g., web-browsing).
For our purposes, the packet-switched nature of the air interface can be
captured through use of the Erlang model. This model can also be used
to illustrate the differences between the more familiar circuit-switched
(voice) and packet-switched approaches, as well as to develop the
performance metrics that are relevant to a data network. Although this
model is well documented in a number of references,4 it is overviewed
below in order to establish a framework for the performance
discussions that follow. A variation of this model shall be used to
estimate network performance, below (see "Data capacity" section on
Page 3-13).
...........................................................................................................................
4 See for example Mischa Schwartz; “Telecommunication Networks”
...........................................................................................................................................................................................................................................................
3 - 4 Lucent Technologies - Proprietary 401-614-040
See Notice on first page Issue 2, February 2003
Traffic theory RF engineering for data
General Erlang model The Erlang model applies to the following general scenario, applicable
to either voice or data:
Completions µ
N
servers
Arrivals λ
Queue (length M)
Completions µ
The assumptions and results associated with this model are absolutely
essential in characterizing data performance. We review these briefly,
below.
If all servers are busy, the arrivals wait in the queue. The number of
arrivals waiting in the queue is therefore variable. The maximum size
accommodated by the queue, or queue length, is M arrivals. If the
queue reaches a size of M, further arrivals are turned away or blocked
until at least one arrival can exit the queue and enter a non-busy server.
dedicated channel that holds the voice call for its entire duration; in the
latter case, the server is a transmission channel that transmits the burst.
In either case, once service for the arrival is complete, the resource is
then freed up for the next arrival.
Within these very general assumptions, the model in Figure 3-1 can be
solved analytically for the probability of all possible states, where the
state is determined by the total number of arrivals within the system;
i.e., the sum of all arrivals being served as well as any arrivals waiting
in the queue. The possible states, therefore, range from 0 to (M+N).
The last state is the blocking state, since in this state no more arrivals
can enter the system. The probability of the state (M+N) is therefore the
probability of blocking.
The probability states are found to depend upon the ratio of λ /µ, rather
than the value of either alone. This ratio is a system load parameter
measured in Erlangs. Since 1/µ is the average inter-completion time,
this load measure may be viewed as the arrival rate weighted by the
average “stress” (average hold or average transmit time) each arrival
places on the system.
...........................................................................................................................................................................................................................................................
3 - 6 Lucent Technologies - Proprietary 401-614-040
See Notice on first page Issue 2, February 2003
Traffic theory RF engineering for data
Length of queue M
Average system completion (of service) rate nµ, where n = current system state
Special cases: Erlang B In any situation, the collection of state probabilities depends upon the
and Erlang C Erlang load as well as the values of M (queue length) and N (servers).
Two limiting cases are of especial interest.
In the first case, the queue length is set to 0. Arrivals are therefore
blocked as soon as all servers are busy; i.e., the probability of blocking
is probability of the state N. The blocking probability is entirely
determined by the Erlang load and the number of servers N. The
relation between the three is captured in an Erlang B table, which
allows computation of any one (e.g., Erlangs) from specification of any
other two (e.g., probability of block, number of servers).
...........................................................................................................................................................................................................................................................
401-614-040 Lucent Technologies - Proprietary 3 - 7
Issue 2, February 2003 See Notice on first page
Traffic theory RF engineering for data
The Erlang B table is widely used for voice calls, since its underlying
model captures the scenario where voice users make a single call
attempt (a single arrival) and are either immediately served or blocked.
In the latter case, the user may try again at a later time, but the elapsed
time is sufficient to ensure that the next attempt resembles a new,
independent arrival to the system.
In the second case, the queue length is presumed infinite. Arrivals are
therefore never blocked; however, there is a probability of delay. The
probability of being delayed (i.e., of waiting some nonzero time in the
queue for service) is the probability of the state N, where all servers are
busy. The delay probability is entirely determined by the Erlang load
and the number of servers N. The relation between the three is captured
in an Erlang C table, which allows computation of any one value (e.g.,
Erlangs) from specification of any other two (e.g., probability of delay,
number of servers). Since the average wait time in the queue can be
determined from the probability of delay (and vice-versa), an alternate
3-way relation of Erlangs, average wait, and number of servers may be
tabulated.
The Erlang C table may also be used for voice calls, since its
underlying model captures the scenario where voice users make
repeated, multiple attempts as necessary to be served. In this
interpretation, each arrival is a single voice user attempting to access
the system. The user is either served on the first attempt, or not; in the
latter case, the user continues to attempt to access the system until
served. These continuous reattempts place the user in the system queue,
“waiting” for service. Note that the queue in this application is
conceptual, representing the collection of users attempting but not yet
achieving access.
The use of this model for voice calls is less prevalent than that of
Erlang B, since it requires that each user continuously attempt access
until finally served; in contrast, Erlang B requires a single access
attempt per user. Neither model can therefore accommodate scenarios
where each user may execute 1 or 2 immediate re-access attempts
before being served or blocked, but Erlang B is frequently considered
to be a better approximation of this situation than Erlang C.
The Erlang C model is more typically used for packet data, since the
presence of a queue lends itself to modeling the management of data
resources over shared channels. In this application, a large number of
data sources time-share a modest number of transmission channels N.
The data sources send brief data transmissions (bursts) as permitted by
...........................................................................................................................................................................................................................................................
3 - 8 Lucent Technologies - Proprietary 401-614-040
See Notice on first page Issue 2, February 2003
Traffic theory RF engineering for data
The random nature of the arrival process into the queue is driven by the
fact that the data source does not require the sending of continuous
messages; rather, the arrival of messages is randomized by the bursty,
interactive nature of the data application (e.g., web-browsing). Indeed,
this randomness is exploited in order to efficiently serve the data users
with a number of servers that is less than the total number of active data
sessions. The random nature of the service process at each server
derives from the random variations in message length. For a server of
fixed transmission rate, these random variations in length randomize
the service or hold time for each arrival.
In Erlang C, the net rate at which arrivals exit the system after being
served depends upon the number of busy servers. For n busy servers,
the net rate is n×µ, where n can vary from 0 to N. Since the probability
of all states is known, the average net rate at which arrivals exit the
system (the throughput) can be computed as:
N −1
throughput = ∑ n ⋅ µ ⋅ p (n) + N ⋅ µ ⋅ p delay
n=0
...........................................................................................................................................................................................................................................................
401-614-040 Lucent Technologies - Proprietary 3 - 9
Issue 2, February 2003 See Notice on first page
Traffic theory RF engineering for data
Applications of Erlang C to We now consider specific use of the Erlang C model for 3G-1X data.
3G-1X data Identity of the model components, as well as specific measures of
performance for planning and analysis, are discussed below.
For this queue and these servers, a three-way relation between Erlang
load, number of servers, and average wait time in the queue is readily
determined from the Erlang C model. Once these values are
determined, the throughput can also be calculated (see Equation 3-1).
Accordingly, the load that can be accommodated by a sector can be
obtained by specifying the number of servers and the average wait
time.
...........................................................................................................................................................................................................................................................
3 - 10 Lucent Technologies - Proprietary 401-614-040
See Notice on first page Issue 2, February 2003
Traffic theory RF engineering for data
...........................................................................................................................
5 This addition property for multiple sources holds provided that each source has iden-
tical hold time statistics. This assumption holds well for voice users.
...........................................................................................................................................................................................................................................................
401-614-040 Lucent Technologies - Proprietary 3 - 11
Issue 2, February 2003 See Notice on first page
Traffic theory RF engineering for data
λtotal λi L
∑ ∑ ∑λ L
1
Total Erlangs = = = λi =
µ data subscribers i µ data subscribers i
C C data subscriberi s i
Equation 3-2: Total Erlang calculation
In the above equation, the expression within the final sum has the units
of messages/sec * bits/message or bits/sec. This measure represents the
total data transmission load (usually expressed in kbits/sec) or
throughput offered by the subscriber population. This measure of load
is proportional to the Erlang load via the transmission capacity C as
shown above, and is a property of the subscriber population alone.
Since the throughput accommodated by the network can be readily
computed from the Erlang C model (see Equation 3-1), this value can
be compared to the throughput offered by the subscriber population in
much the same way that the Erlang load possible on a voice network
can be compared to the Erlangs offered by the subscribers.
For example, if a sector can accommodate 100 kbps satisfying the wait
time constraint specified, 10 sectors are needed to address an area
offering a total 1000 kbps. More sectors might be needed to address
other requirements, such as RF coverage throughout the area.
...........................................................................................................................................................................................................................................................
3 - 12 Lucent Technologies - Proprietary 401-614-040
See Notice on first page Issue 2, February 2003
Data capacity RF engineering for data
Data capacity
............................................................................................................................................................................................................................................................
Within the coverage area, one of the possible 3G-1X supplemental data
rates (e.g., 19.2 kbps) is selected and fixed. Given a presumed average
message size, the average supplemental channel hold time required per
message is computed. The number of channels accommodated by the
air interface at this rate is a random function depending upon a number
of variables including mobile position, speed, multipath, and fade.
Monte Carlo analysis is therefore employed to produce a probability
distribution function of the number of channels at this rate.
The process is repeated for each 3G-1X data rate of interest, yielding an
average throughput for each rate. Using estimated average throughput
per subscriber (where the averaging interval includes delays between
transmissions required to read or think about a downloaded message),
the number of subscribers accommodated at each rate is calculated.
The results for each data rate are tabulated and then combined in a
weighted fashion that reflects the anticipated mix of users at different
data rates. The thoughputs calculated are then compared to offered
subscriber loads to determine how many sectors are required.
IS-2000 STANDARD
Physical
Layer Channel Data
User Mobility
Structure Protocols
Specs.
LINK LEVEL
SIMULATION
Power Requirements
per Channel
SYSTEM LEVEL
SIMULATION
Number of Channels
End User
Traffic Model
QUEUING MODEL
QoS
Requirements
CAPACITY
Estimation of data capacity From an air interface perspective, we anticipate that the 3G-1X packet
data capacity and throughput will be governed by several interlocking
factors including:
• The number of users (fundamental and supplemental channels)
that can be supported
• The number of users that share the supplemental channels
...........................................................................................................................................................................................................................................................
3 - 14 Lucent Technologies - Proprietary 401-614-040
See Notice on first page Issue 2, February 2003
Data capacity RF engineering for data
• The relative position of the users within the cell site coverage area.
This information is key since the maximum data rate supported by
the link can clearly increase when the user is closer to cell center.
• The average throughput per data user
• The associated FER target
• The Automatic Repeat Request (ARQ)
• The link channel activity and packet call size.
In the following, we will provide the average throughput and data user
capacity in terms of simultaneous data sessions for the case where
5 sec is selected as the queuing delay per packet. To characterize the
data session fully, some additional assumptions are made:
• Exponentially distributed packet call (web page) size with a mean
of 41.1 kBytes
• Exponentially distributed “think” time between packet calls (page
downloads) with a mean of 40 sec
• Packet Call Inter-Arrival Time = Access & Network Delay (3 sec)
+ Target Queuing Delay (5 sec) + Download Time (dependent on
the channel rate) + Think Time
• Average number of packet calls per session = 20
• “Equal user throughput” scheduling policy
...........................................................................................................................................................................................................................................................
3 - 16 Lucent Technologies - Proprietary 401-614-040
See Notice on first page Issue 2, February 2003
Data capacity RF engineering for data
Supplemental
Channel
Bursts
First
Data
153.6 153.6 153.6
Arrived SCH SCH SCH
at IWF
76.8 76.8 76.8
SCH SCH SCH
38.4
9.6 kbps FCH 9.6 FCH
Access
Time
Download Dormancy Timer
Network Time Duration
Delay
Queuing Delay "Think" Time
( incl. SCH Setup Delay)
Figure 3-3 Data traffic model for web browsing application with the
3G-1X packet data users
Feeding the system level simulation results into the queuing model
with the data traffic scenario, we obtain that average throughput per
user for 3G-1X packet data. The packet data capacity is shown in
Table 3-2 as a function of supplemental channel data rate. In the table,
the average total delay per page is defined as the sum of the access
time, network delay, queuing delay, and download time. The average
number of simultaneous data sessions can be calculated by dividing the
average sector throughput by the average user throughput. It is
observed that as the supplemental channel data rate decreases, the
average total delay increases but the average sector throughput and the
average number of simultaneous data sessions are comparable.
...........................................................................................................................................................................................................................................................
401-614-040 Lucent Technologies - Proprietary 3 - 17
Issue 2, February 2003 See Notice on first page
Data capacity RF engineering for data
Note that the above values indicate that the throughput per sector is
robust with respect to the data rate. This result indicates that an
anticipated throughput of 109 to 112 kbps is robust with respect to
whatever weighting is employed to combine the results at individual
data rates into an overall estimate. This observation is useful in
planning, but could change as components of the underlying traffic
model or requirements (e.g., think time and the average wait in queue)
are altered.
...........................................................................................................................................................................................................................................................
3 - 18 Lucent Technologies - Proprietary 401-614-040
See Notice on first page Issue 2, February 2003
Data link budgets RF engineering for data
Reverse link The reverse link data budget for 3G-1X data is readily obtained by
recognizing that coverage is dictated by the data rate desired at the
edge of the data coverage; i.e., the edge of the coverage of the reverse
link supplemental channel used to transmit high-speed data bursts. This
edge may or may not correspond to the physical edge of the cell, which
could for example be designed to support voice rate at its perimeter and
higher data rates only within its interior. With the data rate desired at
the edge of data coverage specified, the data coverage footprint is
determined by presuming that all users within this footprint operate at
this data rate when transmitting on a supplemental channel. The
analysis outlined in Chapter 2, "Reverse link" section on Page 2-4, for
voice therefore applies directly with only a few simple modifications.
These are:
• The voice activity for the supplemental channel is presumed to be
1. This high usage reflects the assumption that the few
supplemental channels supported by the air interface will be
almost continuously busy as they are shared from user to user.
• The information rate is higher, corresponding to the data rate (e.g.,
19.2 kbps) selected for cell edge
• A voice user certainly requires a body (head) loss; e.g., 2 dB. A
data user employing a data device may encounter little or no loss.
In the below, a 0 dB loss for data users is assumed.
• The Eb/Nt requirement is lower for the data application due to the
relaxed target FER. The relaxed FER is permissible since the data
application is not real time; i.e., frames received in error can be
retransmitted.
The PCS Modcell reverse link budget examples for 3G-1X 19.2 kbps to
153.6 kbps packet data, mobility applications and 9.6 kbps voice
application are shown in Table 3-3. Note that the target FER relaxation
for the data application is used to increase the maximum path loss (or
cell coverage). Simulation results indicate that the increased FER does
not cause significant TCP/IP throughput degradation.
...........................................................................................................................................................................................................................................................
401-614-040 Lucent Technologies - Proprietary 3 - 19
Issue 2, February 2003 See Notice on first page
Data link budgets RF engineering for data
Table 3-3 Reverse link budget for PCS 3G-1X 9.6 kbps voice, 19.2 kbps to 153.6 kbps packet data,
mobility applications
...........................................................................................................................................................................................................................................................
3 - 20 Lucent Technologies - Proprietary 401-614-040
See Notice on first page Issue 2, February 2003
Data link budgets RF engineering for data
...........................................................................................................................................................................................................................................................
401-614-040 Lucent Technologies - Proprietary 3 - 21
Issue 2, February 2003 See Notice on first page
Data link budgets RF engineering for data
alpha
beta
gamma Cell Cite
Forward link Analysis of the forward link is best conducted by numerical simulation;
however, the computational load associated with such calculations
drives the need for simpler planning tools. In the following, we briefly
consider several alternatives for simplified forward link analysis. The
relative merits of each are discussed.
...........................................................................................................................................................................................................................................................
3 - 22 Lucent Technologies - Proprietary 401-614-040
See Notice on first page Issue 2, February 2003
Data link budgets RF engineering for data
The data rate to be supported at the cell edge is chosen. This rate is the
rate desired for the supplemental channel. A path loss to the cell
boundary is computed (e.g., from reverse link considerations), or
simply presumed as a starting point for analysis. All forward links are
presumed to burst at this data rate, and the mobile receivers are
symmetrically arranged in a worst-case situation at the cell edge. The
analysis then determines whether the available forward link power is
...........................................................................................................................................................................................................................................................
401-614-040 Lucent Technologies - Proprietary 3 - 23
Issue 2, February 2003 See Notice on first page
Data link budgets RF engineering for data
We first establish the path loss corresponding to the data cell edge by
noting the sensitivity required for the uplink at the data rate of interest
(e.g., 76.8 kbps):
S min = E{S }=
FN tW
g − (1 + β )( N − 1)η
d α
max
S min
a=
wmax g net ( fade)
Equation 3-3
...........................................................................................................................................................................................................................................................
3 - 24 Lucent Technologies - Proprietary 401-614-040
See Notice on first page Issue 2, February 2003
Data link budgets RF engineering for data
We now proceed by placing all mobiles at the data cell edge. Mobile
receiver Eb/Nt requirements and total forward power constraints are
then used to produce the governing relationship that must be satisfied
with high probability.
αidi βi
[1 + η (1 / β i − d i / g i ) ] ≤ (1 − γ )Q max
N links
∑ gi Q total
i =1
Equation 3-4
ηd
N links
∑ α
εd i β [1 + ξ (1 / β − η / η )]= η ∑ α new β [1 + ξ (1 / β − η / η )]≤ η (1 − γ )
N links
( )
i =1
i
ε gi i i d g d
i =1
i i i d g g
...........................................................................................................................................................................................................................................................
401-614-040 Lucent Technologies - Proprietary 3 - 25
Issue 2, February 2003 See Notice on first page
Data link budgets RF engineering for data
where:
di = ε d E d = ε d ηd
i i
gi = ε g E g = ε g η g
i i
and
(α )= α ε
new di
i
i
ε gi
Equation 3-5
Presuming that the total number of links Nlinks is composed of Nsuppl and
Nfund links, the means of d and g are readily computed by using constant
values of d and g for supplemental links and constant values of d and g
for fundamental links:
N sup pl N
ηd = d sup pl + fund d fund
N total N total
N sup pl N
ηg = g sup pl + fund g fund
N total N total
where
N total = N fund + N sup pl
Equation 3-6 Composite means over fundamental and
supplemental channels for processing gain and required Eb/Nt
( −1)
σ α2σ β2 σ β2 σ α2
ηg
(1 − γ )
1 +
k
+ + [1 + ξ (1 / η β
− η d / η g ) −1 ≥ η d ]
N linksηα η β N links ηα2η β2 η β2 ηα2
Equation 3-7 Forward link budget statement
...........................................................................................................................................................................................................................................................
3 - 26 Lucent Technologies - Proprietary 401-614-040
See Notice on first page Issue 2, February 2003
Data link budgets RF engineering for data
expression, and ensures that it is greater than or equal to the right hand
side. This analysis, encapsulated in the spreadsheet, can be used to
solve for alternate values, given others.
For example, the current format uses an assumed path loss and total J4
power to assess the Eb/Nt that can be achieved with high probability in
order to compare this value to the right hand side requirement in
Equation 3-7. Alternatively, the required Eb/Nt and J4 power can be
used as inputs to solve for the path loss that can be tolerated while still
satisfying Equation 3-7 with high probability.
dsup pl /ηd
α new = (1)
gsup pl /ηg
d fund / ηd
α new = (1/ 8)
g fund / ηg
...........................................................................................................................................................................................................................................................
401-614-040 Lucent Technologies - Proprietary 3 - 27
Issue 2, February 2003 See Notice on first page
Data link budgets RF engineering for data
Note that the former is simply the value of new channel activity for a
supplemental channel. The latter is the value of new channel activity
for a fundamental channel. The Equation 3-8 completely characterizes
the statistics of the newly defined channel activity; accordingly, mean
and variance can be computed in the standard fashion.
These considerations are illustrated in Figure 3-6 and Figure 3-7 below.
...........................................................................................................................................................................................................................................................
3 - 28 Lucent Technologies - Proprietary 401-614-040
See Notice on first page Issue 2, February 2003
Data link budgets RF engineering for data
Other Cell
X mob X
Host Other
...........................................................................................................................................................................................................................................................
401-614-040 Lucent Technologies - Proprietary 3 - 29
Issue 2, February 2003 See Notice on first page
Data link budgets RF engineering for data
Other Cell
mobile
...........................................................................................................................................................................................................................................................
3 - 30 Lucent Technologies - Proprietary 401-614-040
See Notice on first page Issue 2, February 2003
Data link budgets RF engineering for data
An example forward link spreadsheet for the 3G-1X fixed 153.6 kbps
data application is shown below. The spreadsheet uses the approaches
described above, but with symmetric terms (e.g., antenna gain) added
for example completeness. The example is conservative in that:
• The embedded configuration is employed. As described above,
the embedded configuration establishes the data cell edge as the
physical cell boundary. The symmetric arrangement of mobiles at
this cell edge maximizes the interference from surrounding cells
while minimizing host signal power.
• The chosen rate of 153.6 kbps minimizes the spread spectrum
channel processing gain (W/R). The ability of the supplemental
channel to reject interference from surrounding cells is therefore
reduced.
• No gains are allowed for anchor transfer.
...........................................................................................................................................................................................................................................................
401-614-040 Lucent Technologies - Proprietary 3 - 31
Issue 2, February 2003 See Notice on first page
Data link budgets RF engineering for data
Table 3-4 Example forward link budget for PCS 3G-1X 3-sector Melodizes with fixed 153.6 kbps
packet data application
...........................................................................................................................................................................................................................................................
401-614-040 Lucent Technologies - Proprietary 3 - 33
Issue 2, February 2003 See Notice on first page
Data link budgets RF engineering for data
In this example, a 128 dB path loss (line 33) has been analyzed. This
path loss corresponds to the reverse link budget for a 153.6 kbps
reverse supplemental link under the conditions of:
• 0 dB head loss
• 16.5 dBi antenna gain
• 3.0 dB cable loss
• 4.0 dB noise figure
• 0.8 dB Eb/Nt requirement
• 10.3 dB fade margin
• 15 dB building penetration margin
• 5.5 dB interference margin.
The average forward link Eb/Nt requirements for all data rates are
tabulated below for reference. These values can be used in symmetric
forward link analysis (embedded or concentric) for any rate chosen.
Note that the values employed can be used for mobile or fixed
applications; in the latter case; improvements in power control relative
to 3G suggest that any Eb/Nt advantage for a fixed user may be
negligible.
Table 3-5 Average Eb/Nt requirements for forward link budget data
channel analysis (8 kbps RC3)
...........................................................................................................................................................................................................................................................
401-614-040 Lucent Technologies - Proprietary 3 - 35
Issue 2, February 2003 See Notice on first page
Resource management: RF scheduling RF engineering for data
Introduction In the above sections, the essential strategy of the network in managing
RF resources has been used in order to assess performance. Such
strategies include the sharing of high-rate supplemental channels and
the exploitation of “bursty” subscriber behavior (e.g., idle think time
between web page downloads) to maximize the number of data
sessions served. In the followings, we consider the aspects of resource
management in greater detail.
...........................................................................................................................................................................................................................................................
3 - 36 Lucent Technologies - Proprietary 401-614-040
See Notice on first page Issue 2, February 2003
Resource management: RF scheduling RF engineering for data
Supplemental
Channel
Bursts
First
Data
153.6 153.6
Arrived SCH SCH
at IWF 76.8 76.8
76.8
SCH SCH SCH
38.4
9.6 kbps FCH 9.6 FCH
Access
Time
Download Dormancy Timer
Network Time Duration
Delay Queuing Delay
"Think" Time
( incl. SCH Setup Delay)
Figure 3-8 Data traffic model for web browsing application with 3G-
1X packet data
FCH assignment
FCHs are assigned to users on a first come, first served basis. User
admission algorithms are designed to maximize the number of
simultaneous active users while protecting the system from overload.
To achieve this goal, the system continuously monitors performance
and resource availability and takes appropriate corrective measures
when resource utilization becomes sub-optimal. A set of admission
thresholds is designed to provide acceptable level of service to all
existing and incoming users. A decision whether to establish the FCH
is based, among other things, on current power (forward) and
interference (reverse) loading, frame error rate performance,
...........................................................................................................................................................................................................................................................
401-614-040 Lucent Technologies - Proprietary 3 - 37
Issue 2, February 2003 See Notice on first page
Resource management: RF scheduling RF engineering for data
FCH assignment and resource allocation for both voice and data calls
takes precedence over the Supplemental Channel allocation to ensure
coverage for signaling and minimum rate data traffic over the same cell
area as voice. If resources needed for setting up an FCH are unavailable
due to their utilization by an existing SCH, the system releases the SCH
to make room for the incoming FCH (early SCH release is discussed in
"Early F-SCH termination" section on Page 3-40). The probability of
this scenario can be made low by providing sufficient margins when
allocating SCH resources such that in the majority of cases, there are
enough resources to admit a new FCH during SCH operation without
triggering the early SCH termination.
The FCH is used for transmitting signaling information and may also
be used for transmitting data traffic. For example, if the Supplemental
channel is not active, the data traffic is transmitted on the Fundamental
channel. On the forward link, the system prefers transmission of new
traffic data on the high-rate Supplemental channel. However, the
retransmit data may be sent over the Fundamental channel even if the
Supplemental channel is active. On the reverse link, it is left up to the
mobile station to decide whether to send data over FCH and SCH
simultaneously.
F-SCH continuation
If, at the end of current F-SCH transmission, the user still has data in
the transmit buffer, the F-SCH burst may be continued using the same
rate. This happens only if the system determines that the available
...........................................................................................................................................................................................................................................................
401-614-040 Lucent Technologies - Proprietary 3 - 39
Issue 2, February 2003 See Notice on first page
Resource management: RF scheduling RF engineering for data
Note that F-SCH operation will not be terminated early if soft handoff
adds or soft handoff drops occur, or some combination of them. This is
because the F-SCH resides on only one leg and is not effected by
changes in the mobile’s active set unless the serving cell itself drops.
...........................................................................................................................................................................................................................................................
3 - 40 Lucent Technologies - Proprietary 401-614-040
See Notice on first page Issue 2, February 2003
Resource management: RF scheduling RF engineering for data
...........................................................................................................................................................................................................................................................
401-614-040 Lucent Technologies - Proprietary 3 - 41
Issue 2, February 2003 See Notice on first page
Resource management: RF scheduling RF engineering for data
Load Balancing
Overview
...........................................................................................................................................................................................................................................................
401-614-040 Lucent Technologies - Proprietary 3 - 43
Issue 2, February 2003 See Notice on first page
Resource management: RF scheduling RF engineering for data
...........................................................................................................................................................................................................................................................
3 - 44 Lucent Technologies - Proprietary 401-614-040
See Notice on first page Issue 2, February 2003
4 System deployment
Overview
............................................................................................................................................................................................................................................................
Purpose This chapter describes the deployment issues, with focus on transition
from 2G to 3G-1X.
............................................................................................................................................................................................................................................................
401-614-040 Lucent Technologies - Proprietary 4 - 1
Issue 2, February 2003 See Notice on first page
Introduction System deployment
Introduction
............................................................................................................................................................................................................................................................
...........................................................................................................................................................................................................................................................
401-614-040 Lucent Technologies - Proprietary 4 - 3
Issue 2, February 2003 See Notice on first page
Spectrum use: Carrier assignments and guard System deployment
band
Carrier assignments and guard band remain the same as in 2G. The
recommendations for carrier assignments are provided for two band
classes: Band Class 0 (i.e., the cellular band) and Band Class 1 (i.e., the
PCS band) defined by the IS-2000. For detailed information, please
refer to Lucent documents 401-614-012, AUTOPLEX® Cellular CDMA
RF Engineering Guidelines, and 401-703-201, PCS CDMA RF
Engineering Guidelines.
Cellular band This section will address frequency planning considerations in dual
mode systems, which support AMPS and IS-95 standards as well as
3G-1X. This section assumes that the reader is familiar with the
frequency planning considerations and techniques used in AMPS, and
is not intended to be a tutorial in basic frequency planning. It will
address only those frequency-planning issues that are the result of dual
mode system operations.
General considerations
Table 4-1 lists the five bands of 832 channels available to the A- and B-
Band service providers. Valid channels for 3G-1X assignments are
designated by “CDMA” in the “Valid CDMA Frequency Assignments”
column, and invalid assignments by “//////////”. This information is
taken from the IS-2000 and provided here for convenience. Note that
Band Class 0 is also referred to as the cellular band in North America.
...........................................................................................................................................................................................................................................................
4 - 4 Lucent Technologies - Proprietary 401-614-040
See Notice on first page Issue 2, February 2003
Spectrum use: Carrier assignments and guard System deployment
band
Mobile Base
///////////////// 22 991 824.040 869.040
A''
(1 MHz) 1012 824.670 869.670
A'' CDMA 11 1013 824.700 869.700
(1 MHz)
1023 825.000 870.000
A CDMA 311 1 825.030 870.030
(10 MHz)
311 834.330 879.330
A ///////////// 22 312 834.360 879.360
(10 MHz)
333 834.990 879.990
B ////////////// 22 334 835.020 880.020
(10 MHz)
355 835.650 880.650
B CDMA 289 356 835.680 880.680
(10 MHz)
644 844.320 889.320
B ////////////// 22 645 844.350 889.350
(10 MHz)
666 844.980 889.980
A' ///////////// 22 667 845.010 890.010
(1.5 MHz)
688 845.640 890.640
A' CDMA 6 689 845.670 890.670
(1.5 MHz)
694 845.820 890.820
A' ///////////// 22 695 845.850 890.850
(1.5 MHz)
716 846.480 891.480
B' ///////////// 22 717 846.510 891.510
(2.5 MHz)
738 847.140 892.140
B' CDMA 39 739 847.170 892.170
(2.5 MHz)
777 848.310 893.310
B' ///////////// 22 778 848.340 893.340
(2.5 MHz)
799 848.970 893.970
...........................................................................................................................................................................................................................................................
401-614-040 Lucent Technologies - Proprietary 4 - 5
Issue 2, February 2003 See Notice on first page
Spectrum use: Carrier assignments and guard System deployment
band
Because of the need for guard bands and/or channels in dual mode
systems, it should be understood that allocations of spectrum channels
to a specific standard should be done as much as possible in terms of
contiguous channels/bands for each (AMPS/3G-1X) technology. By
using contiguous channels/bands for one standard, there is only a single
guard band penalty for the overall spectrum allocation given to the
standard in question. For example, if an A-Band, dual mode, 3G-1X
application required two 3G-1X channels, a good first 3G-1X channel
selection would be channel 283. In the case of a dual mode (AMPS/3G-
1X) system, this is the highest available channel in the 10 MHz
A-Band that could be selected without concern for interference in the
A-Band setup channels (313-333). This channel selection already
provides a 0.27 MHz guard band of channels between the nominal 1.23
MHz 3G-1X channel band and the AMPS setup channels (313-333)
required for the A-Band service provider.
The logical choice for the second 3G-1X channel would be channel
242, which that is 41 channels away from 283 for a carrier frequency
separation of 1.23 MHz. Any selection resulting in a carrier frequency
separation of less than 41 channels would result in the two 3G-1X
carriers being separated by less than the nominal 1.23 MHz 3G-1X
channel bandwidth and would cause excessive interference between the
two carrier bands. Using a separation of greater than 41 channels
results in inefficient use of the spectrum.
If the 3G-1X mobile supports the preferred roaming list feature defined
by the IS-683, then any valid channel assignment can be used by the
mobile station for initial acquisition. Otherwise, an operational CDMA
system must use at least one of the two channels, primary and/or
...........................................................................................................................................................................................................................................................
4 - 6 Lucent Technologies - Proprietary 401-614-040
See Notice on first page Issue 2, February 2003
Spectrum use: Carrier assignments and guard System deployment
band
secondary in every CDMA cell, and therefore, the selection for CDMA
frequencies in any start up system requiring only one CDMA channel
per cell is quickly narrowed to one of these two preferred channels.
It is recommended that for the 3G-1X and AMPS operating in the same
cellular band (A Band or B Band), the guard band of 270 kHz be
implemented on both sides of the consecutive 3G-1X carriers and no
guard band between the 3G-1X carriers be required. For the derivation
of the 270 kHz guard band, please refer to Lucent document 401-614-
012, AUTOPLEX® Cellular CDMA RF Engineering Guidelines.
Table 4-2 and Table 4-3 below show frequency assignments for dual
mode AMPS and 3G-1X operations in the A- and B-Band spectrums.
These assignments are given for various numbers of 1.23 MHz
bandwidth 3G-1X channels. As highlighted by the asterisks (*) in the
AMPS columns, the frequency assignments and number of available
channels includes the 21 setup channels.
Table 4-2 Recommended A-Band 3G-1X center frequency
assignments for Band Class 0
6 384, 425, 466, 507, 548, 589 151 334-354, 620-666, 717-799
7 384, 425, 466, 507, 548, 589, 630 110 334-354, 661-666, 717-799
In both the A- and B-Band cases, the Secondary Setup Channel was the
last 3G-1X channel added. The reason for this is that this channel
incurs the greatest AMPS channel loss because it requires its own
guard band penalty in addition to the 0.54 MHz guard band penalty for
the other 7 CDMA channels. If added setup channel capacity is needed,
this channel may have to be implemented sooner than assumed here.
PCS band Although the 3G-1X channel numbering algorithm with 50 KHz
channel spacing implies the availability of 1200 of 50 kHz for 3G-1X
carriers, not all 1200 are actually usable. Table 4-4 indicates the
availability of the channels by classifying them as valid (usable)
channels, conditionally valid, or not valid.
Looking at it another way, all channels are valid for use as 3G-1X
carriers except for the 25 lowest channels and the 25 highest channels
in each block. Thus, there are 251 channels unconditionally available
...........................................................................................................................................................................................................................................................
4 - 8 Lucent Technologies - Proprietary 401-614-040
See Notice on first page Issue 2, February 2003
Spectrum use: Carrier assignments and guard System deployment
band
Not all of the valid and conditionally valid channels can be used
simultaneously as carriers in a given system. Once a channel number
has been specified for use as the first carrier in a system, there are
minimum spacing rules for carriers in use, which limit how close the
new carrier can be above or below the previously existing carrier(s).
While the classification of channels as valid and conditionally valid is
...........................................................................................................................................................................................................................................................
401-614-040 Lucent Technologies - Proprietary 4 - 9
Issue 2, February 2003 See Notice on first page
Spectrum use: Carrier assignments and guard System deployment
band
Preferred channels The preceding subsection specified the channels which are valid, or at
least conditionally valid, carrier frequencies that the service provider
can specify for use in the system's frequency plan. The selection of
these frequencies might be dictated by issues dealing with inter-system
or intra-system interference. If these issues are not significant factors in
the system performance, the number of channels that the service
provider might consider for carrier frequencies can be reduced
significantly to the list of “preferred channels” in the table below.
These are the channel numbers that a personal station will “scan” when
looking for service. Thus a system must use at least one (or more) of
these carriers at each site in the system if the sites are to be capable or
providing (CDMA) access to the system.
Table 4-5 Preferred CDMA channels for Band Class 1
A 25, 50, 75, 100, 125, 150, 175, 200, 225, 250, 275
B 425, 450, 475, 500, 525, 550, 575, 600, 625, 650, 675
C 925, 950, 975, 1000, 1025, 1050, 1075, 1100, 1125, 1150, 1175
Conditionally valid channels 300, 400, 700, 800, and 900 are excluded
from the above list because they can only be used if the service
provider has licenses for both the frequency block containing the
channel and the immediately adjacent frequency block, e.g., Channel
300 is a likely carrier channel if the service provider has licenses for
both Blocks A and D. If conditionally valid channels are used, they
should be used for traffic only and not access.
...........................................................................................................................................................................................................................................................
4 - 10 Lucent Technologies - Proprietary 401-614-040
See Notice on first page Issue 2, February 2003
2G/3G-1X spatial and frequency design System deployment
Coverage (spatial) design: A PCS Modcell reverse link budget example for 3G-1X 9.6 kbps voice
overlay and greenfield application was presented in Chapter 2, "Link budget" section on Page
2-14. This example indicates a fundamental governing principle in
deployment planning for 3G-1X, that the 3G-1X voice coverage
(footprint) is (slightly) better than or equal to the 2G footprint.
Accordingly, a new or “greenfield” 3G deployment will have
essentially the same cell count as a greenfield 2G deployment. In
addition, upgrade or migration of a 2G network to a 3G network can be
accomplished through a 1:1 overlay of 3G on 2G, i.e., 3G voice
coverage is obtained by upgrading each 2G cell to 3G functionality.
The resulting 3G coverage will match or slightly better that of the
underlying 2G network.
This comparison applies to the situation where 3G-1X and 2G are each
fully loaded. A lighter design loading on 3G-1X will expand the voice
coverage at the expense of cell capacity. This design trade-off is
identical to the coverage-capacity trade-off that exists in 2G systems.
Since full 3G-1X loading is required to reach the full 3G-1X voice
capacity (see Table 2-1, "Air interface capacity" on Page 2-9), we
presume a fully loaded system in the following discussions.
Link budgets for the 19.2 kbps - 153.6 kbps packet data applications
have also been presented in Chapter 3, "Data link budgets" section on
Page 3-19. These examples show that the radio coverage (footprint) for
3G high-rate packet data can be considerably less than that of (2G or
3G) voice. This difference is fundamental, and a straightforward
consequence of the higher rates at which the supplemental channel
must operate.
mobile moves closer to the cell edge. This reduction will be controlled
by the radio resource management algorithms (see Chapter 3,
"Resource management: RF scheduling" section on Page 3-36), which
assign data rates based on reported RF conditions as well as other
factors, e.g., mobile history. Similarly, the data rate will dynamically
increase as the mobile moves closer to the cell center.
Now consider the scenario where the overlaid 3G-1X system must
provide an ubiquitous coverage for the high-rate 3G-1X data. In this
case, the link budget based on the high-rate supplemental channel is
used for 3G cell layout since the design coverage of the high-rate data
channel must extend out to the 3G cell edge. The footprint of these cells
is modest compared to a voice footprint. A 1:1 overlay would not be
feasible since the high data rate could not be supported at all locations
between the cells. Additional 3G cells must be added to obtain
ubiquitous high-rate data coverage. The overlay would increase from
1:1 to N:1 (i.e., N 3G cells required for each 2G cell). The N:1
restriction could be relaxed under several conditions. These include
scenarios where:
• High-rate data subscribers possess an additional advantage, such
as a directional antenna, to compensate for the lack of coverage.
This advantage must be symmetric, i.e., applicable to both link
directions; for example, the provision of higher mobile transmit
power to the high-rate subscribers would not be effective since
this change would not provide a forward link benefit as well.
• The underlying 2G system is not coverage but capacity-driven. In
urban or dense urban areas where the cell count is driven by the
capacity, the actual path loss between a 2G mobile and the serving
base station in the existing 2G network could be less than the
maximum allowable value dictated by the 3G link budget. Under
such a circumstance, the 1-to-1 overlay of CDMA2000 on the IS-
95 may still be a feasible migration.
• The design restriction of extending high-rate data coverage to the
3G cell edge is removed. If voice rate coverage to the 3G cell edge
is acceptable, then a 1:1 overlay becomes feasible (see above). In
this case, mobile data rates would be dynamically adjusted,
depending upon their location within the coverage area.
...........................................................................................................................................................................................................................................................
4 - 12 Lucent Technologies - Proprietary 401-614-040
See Notice on first page Issue 2, February 2003
2G/3G-1X spatial and frequency design System deployment
Frequency design The implementation of 3G-1X within available radio spectrum offers a
rich array of possibilities. 3G-1X can be deployed as 1.23 MHz
wideband carriers within spectrum cleared for this purpose.
Alternatively, 3G-1X can be deployed within an existing 2G carrier,
yielding a net per-carrier capacity that lies between that achieved by
3G-1X alone and that achieved by 2G alone.
E3G = Total voice Erlangs per carrier per sector for 3G-1X
E2G = Total voice Erlangs per carrier per sector for 2G
N2G = Total number of 2G carriers per sector
N3G = Total number of 3G carriers per sector.
...........................................................................................................................................................................................................................................................
401-614-040 Lucent Technologies - Proprietary 4 - 13
Issue 2, February 2003 See Notice on first page
2G/3G-1X spatial and frequency design System deployment
In scenarios where 2G and 3G are mixed within each carrier, the total
Erlangs are best determined by simulation but can be approximated in
the following manner. The total number of 2G voice Erlangs is an
upper bound that cannot be exceeded when the subscriber population
consists of 2G users alone. Trivially:
Etotal ≤ E2G
Equation 4-2
Let fraction x of the total Erlangs be 2G, and fraction (1-x) of the total
Erlangs be 3G. Assume that the Erlang values E2G and E3G that can be
achieved by each population alone are proportional to the total
interference that can be tolerated. The equivalent 2G Erlangs generated
by each 3G user is therefore the 3G Erlangs scaled by the ratio E2G/E3G.
For example, a 3G user generates about half the interference as a 2G
user; accordingly, the 3G usage must be scaled by a factor of ½ in
totaling equivalent 2G usage. The total 2G Erlangs can therefore be
computed and limited by the upper bound E2G:
E2G
xEtotal + (1 − x) Etotal ( ) ≤ E2G
E3G
Equation 4-3
In Equation 4-3, the first term on the left hand side is the number of 2G
Erlangs, which is a fraction x of the total. The second term is the
number of 3G Erlangs (a fraction 1-x of the total) scaled to an
equivalent number of 2G Erlangs. The sum of (equivalent) 2G Erlangs
is then limited to the same upper bound as a population consisting
entirely of 2G users. Equation 4-3 can be solved for Etotal:
...........................................................................................................................................................................................................................................................
4 - 14 Lucent Technologies - Proprietary 401-614-040
See Notice on first page Issue 2, February 2003
2G/3G-1X spatial and frequency design System deployment
1
Etotal =
x / E2G + (1 − x) / E3G
The E3G employed within the above calculation therefore must be the
3G Erlangs that can be achieved when a 3G carrier is loaded to the
lower (55%) point, rather than its maximum of 72%. The restriction of
3G to a lower loading in a mixed carrier scenario influences the
decision of deploying 3G in a mixed or dedicated mode, as described
below.
...........................................................................................................................................................................................................................................................
401-614-040 Lucent Technologies - Proprietary 4 - 15
Issue 2, February 2003 See Notice on first page
2G/3G-1X spatial and frequency design System deployment
For example, suppose that only two carriers are available and the
principle of dedicated carriers is employed. Further suppose that the
anticipated subscriber Erlangs are 2/3 3G voice and 1/3 2G voice. This
mixture of total Erlangs is readily addressed by devoting one carrier to
2G voice and one carrier to 3G voice, since the 3G voice carrier
handles twice as many Erlangs as the 2G voice carrier. However, this
solution would not be adequate if the anticipated mix was 60% 2G
voice and 40% 3G voice. Within the two-carrier limit, there is no
combination using dedicated carriers that would support these
proportions when both carriers were fully loaded.
In contrast, this mix could be achieved within each of the two carriers
individually if non-dedicated carriers are allowed (see Equation 4-4).
The sum across the two carriers would then match the design 60/40
target.
Conclusions
...........................................................................................................................................................................................................................................................
4 - 18 Lucent Technologies - Proprietary 401-614-040
See Notice on first page Issue 2, February 2003
Mixed 3G-1X voice/data capacity and coverage System deployment
When the 3G-1X packet data service is introduced into the voice
network, the high speed data will have an impact on the voice capacity
and coverage. Analysis of the 3G technology indicates that the
requirement of ubiquitous high rate packet data coverage is generally
more stringent than that of voice coverage for comparable assumptions
on RF parameters. This difference mainly comes from the decrease in
processing gain. As mentioned in Chapter 3, “Data link budgets” and
“Coverage (spatial) design: overlay and greenfield” sections of this
chapter, if the design goal of a 3G-1X system is to provide an
ubiquitous coverage for a high-rate data service, then the link budget
based on the supplemental channel rate should be used for cell layout.
If the voice link budget is used, then the high-rate data service will be
available in an inner circle of the cell coverage. In this case, the
supportable data rate will reduce when the mobile moves close to the
cell edge.
...........................................................................................................................................................................................................................................................
401-614-040 Lucent Technologies - Proprietary 4 - 19
Issue 2, February 2003 See Notice on first page
Mixed 3G-1X voice/data capacity and coverage System deployment
The total capacity for the mixed voice and data system is expressed as
two numbers, the data throughput capacity and voice Erlang capacity.
The higher data subscriber percentage, the more data throughput and
the fewer voice erlangs. Data throughput and voice Erlang capacity will
clearly vary depending upon the mix of voice and data users. Based on
the voice and data traffic projection for a service area, a service
provider can calculate the percentages of voice Erlang and data
sessions, and then determine the trade-off between voice capacity and
data throughput.
Calculating the capacity values for the mixed voice and data capacity is
a somewhat involved process. In both cases, capacities are calculated
from maximum number of channels from the traffic (Erlang) model.
The general model is described in Chapter 3, “General Erlang model”
section, and is characterized by random arrivals at a system with finite
queues and fixed number of channels (servers).
For voice, the Erlang B (a.k.a, blocked calls cleared) version of the
traffic model is typically used. The Erlang B version is the General
Erlang model with no (zero length) queue. No queue implies no
waiting. When a call arrives it is either served or turned away
(blocked). The carried load on N channels is measured in Erlangs
(average active channels). The associated performance is measured by
probability of blocking, i.e., all channels busy.
For data, the Erlang C (a.k.a., blocked calls delayed) version of the
traffic model is typically used. The Erlang C version is the General
Erlang model with infinite length queue. An infinite length queue
implies that all arrivals are (eventually) served: hence, there is no
blocking in the Erlang C model. The carried load on N channels (N data
pipes) is measured by throughput (kbits/sec). The associated
performance is measured by average wait in queue.
...........................................................................................................................................................................................................................................................
4 - 20 Lucent Technologies - Proprietary 401-614-040
See Notice on first page Issue 2, February 2003
Mixed 3G-1X voice/data capacity and coverage System deployment
...........................................................................................................................................................................................................................................................
401-614-040 Lucent Technologies - Proprietary 4 - 21
Issue 2, February 2003 See Notice on first page
Mixed 3G-1X voice/data capacity and coverage System deployment
...........................................................................................................................................................................................................................................................
4 - 22 Lucent Technologies - Proprietary 401-614-040
See Notice on first page Issue 2, February 2003
5 Handoff
Overview
............................................................................................................................................................................................................................................................
...........................................................................................................................................................................................................................................................
5 - 2 Lucent Technologies - Proprietary 401-614-040
See Notice on first page Issue 2, February 2003
Introduction Handoff
Introduction
............................................................................................................................................................................................................................................................
Soft handoff definition In soft handoff, multiple cells simultaneously support the mobile's call.
In softer handoff, the mobile's call is simultaneously supported by
multiple sectors of the same cell. The mobile continuously scans for the
pilot signals transmitted by each cell/sector (site), and establishes
communication with any site/sector (up to 6 6) whose pilot power
exceeds a given threshold. Communication with the site/sector is
terminated when the pilot power drops below a threshold for a time
period.
Procedure The soft and softer handoff procedures dictate the way in which a call is
maintained as a mobile crosses boundaries between CDMA cells. In
soft handoff, multiple cells simultaneously support the mobile's call; in
softer handoff, multiple sectors of the same cell simultaneously support
the mobile's call. The distinction between soft and softer handoff is
important since the same Channel Element (CE) is shared to support
the handoff legs in the softer handoff case, but a separate CE is required
to support each handoff leg in the soft handoff case. Each sector
transmits a pilot signal of sufficient power to be detected by mobiles
within its vicinity. The mobile continuously scans for pilots, and
establishes communication with any sector (up to six) whose pilot
exceeds a given threshold. Similarly, communication with sectors
whose pilot drops below a threshold is terminated. The identification of
distinct pilot signals by the mobile relies on the fact that each pilot
exhibits a different time offset within the same PN code.
...........................................................................................................................
6 Typically, mobiles only have three “fingers” that demodulate three different
signals (soft handoff legs or multipaths of a single leg). In six-way soft handoff,
signals are transmitted from six different sectors. The mobile chooses the best
three to demodulate, so not all signals are used by the mobile. Previously, only
three-way soft handoff hand been supported. Even in three way soft handoff the
mobile’s three fingers might demodulate different multipaths of the same trans-
mission and not use a signal from one of the transmitting sectors. The six-way
handoff feature is useful in pilot pollution areas. The feature needs to be carefully
optimized so as to not compromise system capacity - see CDMA Translation Application
Note #4: Handoff.
...........................................................................................................................................................................................................................................................
401-614-040 Lucent Technologies - Proprietary 5 - 3
Issue 2, February 2003 See Notice on first page
Introduction Handoff
The mobile's search for pilots is facilitated by the fact that these offsets
are in integer multiples of a known time delay. The pilots identified by
the mobile, as well as other pilots specified by the serving sector(s), are
categorized by the mobile as follows:
• The Active Set consists of those pilots whose sites are currently
supporting the mobile's call
• The Candidate Set consists of those pilots whose sites, based on
the received strength of their pilots, could also support the
mobile's call
• The Neighbor Set consists of those pilots whose sites are not in the
active set or the candidate set, but are nevertheless likely
candidates for soft handoff; for example, these sites may be in
known geographic proximity. Each sector in the network has an
associated “neighbor list” provisioned. As sectors are added to the
active set the network sends a Neighbor List Update message with
the “best” 20 neighbors from the combined neighbor lists of all
active set participants. The mobile uses the information from the
network, as well as the normal movement of pilots (i.e., pilots in
the candidate for longer than T_TDROP seconds), to populate the
neighbor set.
• The Remaining Set consists of those pilots within the CDMA
system but not within the other three sets. The mobile may move
pilots from the remaining set to the candidate set. However, the
mobile typically uses more resources on the neighbor set than the
remaining set; hence, it is less likely for pilots in the remaining set
to move into the candidate set, than it is for the pilots in the
neighbor set. Furthermore, because of the possible confusion
about the unique identification of a sector by PN offset, the
network does not add pilots from the remaining set to the active
set that do not appear on the neighbor list. The undeclared
neighbor list feature can be used to track these occurrences so that
neighbor lists can be optimized. Note that provisioning of
neighbor lists is one of the most important optimization activities
to assure system performance.
...........................................................................................................................................................................................................................................................
5 - 4 Lucent Technologies - Proprietary 401-614-040
See Notice on first page Issue 2, February 2003
Introduction Handoff
Ec µ ⋅ Pi
=
Io i FNoW + ∑ Pj
all _ j
where:
...........................................................................................................................................................................................................................................................
401-614-040 Lucent Technologies - Proprietary 5 - 5
Issue 2, February 2003 See Notice on first page
Introduction Handoff
Active
Active set not full and
Pilot exceeds T_ADD Pilot replaced
Or by Candidate
Active set full but swap pilot
criteria met (see text)
Pilot is below T_DROP for
Candidate T_TDROP seconds
T_TDROP
expires
Pilot exceeds
T_ADD
Neighbor
Remaining
Figure 5-1 Simplified Pilot Set transactions (diagram does not show
all possible transitions)
IS-95B soft handoff The field data shows that under some conditions there may be more
algorithm soft handoffs occurring than are necessary when using the current IS-
95A handoff algorithm. Such handoff overheads may also overuse
system resources, thereby degrading total system capacity. An
improved soft handoff algorithm was defined in IS-95B and will be
used for 3G-1X. The new soft handoff algorithm is intended to improve
these situations by introducing the dynamic handoff threshold
determined by combining the pilot strengths from all pilots in the active
set. IS-95B added the following three new parameters to the soft
handoff algorithm:
• SOFT_SLOPE
• ADD_INTERCEPT
• DROP_INTERCEPT.
...........................................................................................................................................................................................................................................................
5 - 6 Lucent Technologies - Proprietary 401-614-040
See Notice on first page Issue 2, February 2003
Introduction Handoff
ADD _ THRESH = max SOFT _ SLOPE × 10 × log ∑ PSi + ADD _ INT , T _ ADD
i∈A
DROP _ THRESH = max SOFT _ SLOPE × 10 × log ∑ PS i + DROP _ INT , T _ DROP
i∈A
where PSi is the mobile's measure of pilot Ec/Io and the sum is
performed over all pilots in the active set. The threshold is plotted as
function of combined active set pilot strength below.
Add IS-95B
Pilots not added
Threshold
in IS-95B that
would have been
added in IS-95A
T_ADD
IS-95A
Under this algorithm, the mobile will send out a PSMM message to
request the base station to add a pilot into the active set only when the
pilot is worthy of being added. This benefit can be seen in the figure as
the gray area of pilot strengths that are not added in IS-95B that would
have been added to the active set in IS-95A. The better the pilots the
mobile is currently using (further to the right on combined active set
pilot strength axis), the less likely is that a pilot will be added to the
...........................................................................................................................................................................................................................................................
401-614-040 Lucent Technologies - Proprietary 5 - 7
Issue 2, February 2003 See Notice on first page
Introduction Handoff
active set (higher add threshold). A similar figure can be drawn for the
drop threshold. The mobile will request the base station to drop a pilot
from the active set if the pilot contributes little. These improvements
will reduce the time a call is in soft handoff and also filter out
unnecessary handoffs from each call; therefore, the average number of
legs for each call is reduced and the forward link capacity is increased.
Intuitively this makes sense since additional base station power should
not be spent on a mobile that is receiving strong signals elsewhere.
Improving forward link power utilization efficiency will lead to
increased system capacity. Simulations have shown a range of
improvements for the soft handoff power overhead factor used in
forward link budgets. For forward link budget planning purposes, a
reduction from the typical value of 1.85 for IS-95A to 1.75 for IS-95B
is recommended.
On the forward link, all of the signals from the sectors in soft and softer
handoff are combined in the mobile in a Maximum Ratio Combining
(MRC) technique (see CMDA Systems Engineering Handbook, Jhong
Sam Lee & Leonard E. Miller). In MRC, each of the soft handoff legs,
in addition to any discernible multipaths, are added together with a
weighting for the channel quality, which for IS-95 based systems is the
pilot channel Ec/Io.
Reverse link
For sectors involved in softer handoff the signals from the mobile are
combined in the Channel Element in a MRC fashion as described for
the forward link.
For cells involved in soft handoff, the signals from the mobile are not
actually combined, but a “frame selector” at the MSC chooses the
“best” signal. The CRCs for the physical layer frames are examined,
and the frame without an error is chosen as the best. If neither packet
has an error, the decision is made randomly.
Coverage contour Mobiles evaluate base stations' suitability for providing a serving
traffic channel by measuring the base stations' pilot signal strengths
relative to total forward link power, or Ec/Io, as described above.
One criteria for determining a coverage contour is that the mobile have
at least one pilot with Ec/Io that is equal to the value of T_ADD: Values
of Ec/Io within the contour will be greater than T_ADD; values outside
the contour will be less. Accordingly, a mobile crossing the boundary
...........................................................................................................................................................................................................................................................
5 - 8 Lucent Technologies - Proprietary 401-614-040
See Notice on first page Issue 2, February 2003
Introduction Handoff
into the cell will add that cell's pilot to its active set. (A mobile crossing
the boundary out of the cell will not necessarily drop the pilot, as this
function depends on the values of T_DROP and T_T_DROP.)
Coverage areas also change with varying T_ADD.
X Mobile in X
Cell 1 soft Cell 2
T_DROP - Cell 2 T_DROP - Cell 1
T_ADD - Both
Consider the sequence shown in Figure 5-3 (note the figure is drawn so
that the T_ADD boundary for both cells exactly coincides. In practice
the boundaries overlap given the geometry of the cell layout). As a
mobile moves from Cell 1 to Cell 2, it will go through the following
sequence:
1. As the mobile moves past the T_DROP boundary for Cell 2,
nothing happens
2. When the mobile reaches the T_ADD boundary, it will add Cell 2
to its active set and will be in soft handoff with Cell 1 and Cell 2
3. When the mobile moves past the T_DROP boundary for Cell 1, it
will drop Cell 1 from its active set and leave the soft handoff state.
A mobile moving in the opposite direction, from Cell 2 to Cell 1, goes
through the following sequence, as shown in Figure 5-4.
Mobile in
X soft handoff X
Cell 1 Cell 2
T_DROP - Cell 2 T_ADD - Both T_DROP - Cell 1
Note that designing coverage contours for pilot channel Ec/Io values of
T_DROP will lead to coverage holes. Consider the following
Figure 5-5:
X No pilot!!! X
Cell 1 Cell 2
T_ADD - Cell 1 T_DROP - Both T_ADD - Cell 2
For networks with fixed subscribers, the soft handoff areas will be
solely the areas of overlapping pilot strength above T_ADD. The areas
of soft handoff in a mobile with one pilot below T_ADD (but above
T_DROP) and another above T_ADD will not be soft handoff areas in
a fixed network.
Note that this discussion uses IS-95A terminology (i.e., T_ADD and
T_DROP) but is applicable to IS-95B as well. As discussed earlier
(“IS-95B soft handoff algorithm” section), the add and drop thresholds
in IS-95B are a function of aggregate pilot Ec/Io. However, the IS-95B
...........................................................................................................................................................................................................................................................
5 - 10 Lucent Technologies - Proprietary 401-614-040
See Notice on first page Issue 2, February 2003
Introduction Handoff
thresholds will equal the IS-95A fixed thresholds for areas without
strong pilot coverage, i.e., low aggregate pilot Ec/Io. The cell edge is
expected to fall into this category of low aggregate pilot Ec/Io, and
hence, the thresholds for an IS-95B network at the cell edge are
expected to be T_ADD and T_DROP.
...........................................................................................................................................................................................................................................................
401-614-040 Lucent Technologies - Proprietary 5 - 11
Issue 2, February 2003 See Notice on first page
Discussion Handoff
Discussion
............................................................................................................................................................................................................................................................
Soft handoff cost on The cost of soft handoff is forward link capacity in that the soft handoff
forward link legs on the forward link require power that cannot be used to support
other users. This cost is captured in the forward link budget with the
line item “Overhead factor to convert from mobiles to the number of
active power channels”, commonly referred to as the “power overhead
factor”. The value used is a function of soft handoff algorithm (IS-95A
vs. IS-95B), terminal mobility, and cell site antenna configuration. The
following table captures values typically used for planning purposes,
which are rounded to nearest 5/100ths.
...........................................................................................................................................................................................................................................................
5 - 12 Lucent Technologies - Proprietary 401-614-040
See Notice on first page Issue 2, February 2003
Discussion Handoff
Table 5-1 Soft handoff overhead factors for voice link budgets
The soft handoff legs also consume Walsh codes. The power overhead
factor is slightly different than the overhead for Walsh codes. However,
the Walsh code overhead is only an issue when there are insufficient
Walsh codes. Typically, Walsh codes are not a limiting factor. Networks
with fixed subscribers that have high capacities are cases where the
Walsh codes may be limiting.
Note also that the power overhead factor is not the same as the Channel
Element (CE) overhead factor. Since softer handoff does not require
extra CEs, the CE overhead factor is less than the power overhead
factor.
Soft handoff advantages Further insight into soft handoff operation can be gained by contrasting
this process with the hard handoff process used in an analog system. In
an analog system, each cell is assigned a set of narrowband channels
for use in communication links. Co-channel interference is controlled
by not reusing the same channels in adjacent cells. A mobile
proceeding out of one cell into another must switch to an available
channel in the new cell. This switch requires a brief interruption of the
communication link. In a CDMA system, the same wideband channel
is reused in every cell. Co-channel interference is accepted but
controlled so as to achieve greater capacity. Accordingly, soft/softer
handoff does not require channel switching and its associated link
interruption.
Soft handoff provides a diversity gain without which some areas at the
cell boundary (the locations furthest from base stations) would be
regions of poor link quality because of shadow fading. The mobiles in
these fringe areas would also be more susceptible to base station
interference (see Chapter 2). Furthermore, the soft handoff state assures
that the mobile is in a two-path channel. Two-path channels generally
have lower Eb/Nt requirements relative to own-path channels.
These effects increase the probability that a call will be dropped, since
a hard handoff procedure would typically not be initiated until a mobile
reached this area; that is, until the mobile noted a drop in signal
strength from its host cell. In addition, the use of power control without
soft handoff could create a situation where a mobile generates
considerable amounts of interference to neighbor cells. Such
interference would reduce capacity.
The last situation arises because the mobile would detect a drop in
received signal strength before it requested a handoff. Since cell
boundaries overlap, this reporting point could be well into the boundary
of the neighbor cell. Within this area, power control would boost the
mobile's transmit signal strength in an attempt to maintain the link with
the (distant) serving cell. This call-dragging phenomenon reduces the
capacity of the neighbor cell because the mobile 's transmissions
increase the level of interference at the neighbor cell. In contrast, if the
mobile were in soft handoff, power control commands from both cells
would ensure that the mobile did not produce undue interference; in
fact, the reverse link could be maintained at a lower level of mobile
transmit power due to the gain involved in combining the signals
received at the two base stations.
...........................................................................................................................................................................................................................................................
5 - 14 Lucent Technologies - Proprietary 401-614-040
See Notice on first page Issue 2, February 2003
Discussion Handoff
The mobile must generate enough signal (Smob) to overcome the path
loss (Lp) and provide the required signal (Sreq which accounts for
interference from other users) at the base station. This can be expressed
mathematically as:
Smob = Sreq + Lp
Clearly, as the path loss increases, the required power from the mobile
will increase. In an ideal case, the path loss profiles would look
something like the following.
Figure 5-7 Mobile required power with and without soft handoff
• The heavy solid line shows the required mobile power for a
system with soft handoff.
The system with soft handoff decides frame by frame which path is the
better one, allowing the switch from base station A to base station B to
happen immediately. The switch can be immediate since both base
stations, A and B, are receiving and processing the signal from the
mobile and the MSC is deciding which signal is best - hence the “soft”
part of the handoff. In a system without soft handoff, the switch will be
made later since it needs to have some hysteresis and has delay
associated with signaling, etc. The difference in power during the delay
in switching is not the gain claimed for soft handoff, but demonstrates
the critical factor of a soft handoff: the fact that the decision of the best
path is done frame by frame allowing the best path to always be chosen.
The specific gain for soft handoff is shown in the following example
that shows the effect of a fade.
Figure 5-8 Mobile required power during fade with soft handoff
The figure demonstrates the benefit of soft handoff. As the mobile goes
into a fade to base station A, it does not have to increase its power to
the level of the fade, even for a short period. The mobile only has to
increase its power to the level to reach base station B, which is unlikely
to be also faded with respect to the mobile. The difference between
...........................................................................................................................................................................................................................................................
5 - 16 Lucent Technologies - Proprietary 401-614-040
See Notice on first page Issue 2, February 2003
Discussion Handoff
...........................................................................................................................................................................................................................................................
401-614-040 Lucent Technologies - Proprietary 5 - 17
Issue 2, February 2003 See Notice on first page
Discussion Handoff
The mobile was then put through this simulated path loss environment
and the mobile transmit power was measured. The following figure
focuses in on the area called “Jump #6” in Figure 5-9 (note that the
time scales are different).
As one would expect, the mobile power increases by 12 dB, the same
magnitude as the fade (increase in path loss).
A second path loss profile for a different sector was also created as
shown in the following figure.
...........................................................................................................................................................................................................................................................
5 - 18 Lucent Technologies - Proprietary 401-614-040
See Notice on first page Issue 2, February 2003
Discussion Handoff
Figure 5-11 Additional path loss profile for second soft handoff leg
The test was rerun with the mobile receiving from and transmitting to
the two separate base stations through the two path loss profiles shown
above. The mobile power transmit power was measured and is plotted
in the figure below.
...........................................................................................................................................................................................................................................................
401-614-040 Lucent Technologies - Proprietary 5 - 19
Issue 2, February 2003 See Notice on first page
Discussion Handoff
In this case with soft handoff, the mobile power only increases by 6 dB.
As can be seen from the two plots, the soft handoff case reduces the
mobile power by the difference between the fade magnitude and the
difference in path loss to the two base stations.
Equation 5-2
Where:
...........................................................................................................................................................................................................................................................
5 - 20 Lucent Technologies - Proprietary 401-614-040
See Notice on first page Issue 2, February 2003
Discussion Handoff
case. Consider the scenario when a AT is in two way soft handoff. Link
outage will occur in this case only if attenuation to both soft handoff
sectors is greater than the margin γ. Hence,
Equation 5-3
Due to the soft handoff feature, excess link margin requirement has
dropped by 4 dB, from 10.3 dB to 6.3 dB. The soft handoff gain for the
case of fading standard deviation equal to 8 dB, but probability of edge
coverage of 75% (probability of area coverage of 90%) works out to
approximately 3 dB. Due to the soft handoff feature, the excess link
margin requirement has dropped by 3 dB from 5.4 dB to 2.4 dB. This
reduction in link margin is the advantage due to soft handoff that results
in increased coverage. Reverse link budgets typically contain the fade
margin entered for the no-soft handoff case. Then, a separate line called
soft handoff gain is included to capture the effect of soft handoff. The
values typically used in the reverse link budget are conservatively
rounded down from the values calculated by the methodology above,
since the precise correlation is not known. The values used in the
reverse link budget for fading standard deviation of 8 dB are shown in
the following table.
...........................................................................................................................................................................................................................................................
401-614-040 Lucent Technologies - Proprietary 5 - 21
Issue 2, February 2003 See Notice on first page
Discussion Handoff
75 5.4 3.0
80 6.7 3.3
85 8.3 3.5
90 10.3 4.0
For standard deviations other than 8 dB, the required margin to achieve
a specified outage (probability of edge coverage) criteria can be
numerically determined using the methodology outlined in Reference
[1] of this chapter. The soft handoff gain to be entered in the link
budget is just the difference between the computed required margin and
fade margin.
Qualitative description of The co-channel nature of CDMA makes soft handoff critical for the
forward link soft handoff forward link. A mobile at the cell edge will see equal strength signals
benefit from at least two base stations. In a non-CDMA system, the adjacent
base station would not be using the same frequency channel. In CDMA
the adjacent will be using the same frequency channel. Soft handoff
allows for these co-channel signals that would be interferers to
contribute to supporting the call. Consider this simplified case of a
mobile receiving equal signals from two different base stations, no
thermal noise and perfect orthogonality.
...........................................................................................................................................................................................................................................................
5 - 22 Lucent Technologies - Proprietary 401-614-040
See Notice on first page Issue 2, February 2003
Discussion Handoff
Eb µ ⋅ g ⋅ S1
=
No S2
where g is the processing gain and µ is the fraction of power from base
station 1 required to support the traffic channel for the mobile. If we
assume that the signals from the two base stations of are equal strength,
we can solve for µ as follows:
1 Eb
µno _ sho =
g No
In the soft handoff case, we know from the theory of maximum ratio
combining that the achieved Eb/No is the sum of the Eb/No's (linear)
from the different soft handoff legs. Therefore, the combined Eb/No at
the mobile is:
If we assume that the total power (Si) from each base station is the same
and the power fraction for the two base stations are equal, i.e., µ1 equals
µ2, µ can be solved as:
1 Eb
µsho =
2 ⋅ g No
Therefore, the power required from each base station in the soft
handoff case is half of what would have been required without soft
handoff. Of course, Base Station 2 is now transmitting power (utilizing
its forward link capacity) to support the call, which it was not doing in
the no soft handoff case; however, the net power received by other
mobiles in the vicinity is unchanged since each base station is
transmitting half of the original power.
The benefit of soft handoff on the forward link comes from the fact that
the mobile receives signals from different base stations that provide a
diversity gain against fading. When a mobile enters a fade with respect
to one base station, it is unlikely that it will be also be in the same fade
with respect to the other base stations in its active set. Hence, the base
...........................................................................................................................................................................................................................................................
401-614-040 Lucent Technologies - Proprietary 5 - 23
Issue 2, February 2003 See Notice on first page
Discussion Handoff
station will not require power to overcome the deepest fade a mobile at
the edge may enter, since during that fading period the mobile can rely
on signals from other base stations in its active set.
We can consider the same example with the mobile entering a fade (F)
to Base Station 1, the benefit of soft handoff becomes very clear.
S1 µ ⋅ g ⋅ S2
Eb µ1 ⋅ g ⋅ F
Eb
= 2
= and
No 2 S1
No 1 S2
F
S2
µ1 ⋅ 1 2 + µ2⋅ ⋅ S22
Eb F
=
No S1
F⋅ 2
S
...........................................................................................................................................................................................................................................................
5 - 24 Lucent Technologies - Proprietary 401-614-040
See Notice on first page Issue 2, February 2003
Discussion Handoff
other soft handoff legs. Of course, the faded leg will benefit from
having the self-interference reduced by the same fade amount as the
traffic signal.
The forward link budget contains a term for the soft handoff power
overhead factor. This term increases the number of traffic channels the
forward link is supporting. For IS-95A, empirical data shows that a
value of 1.85 to be a good estimate. No empirical data exists for IS-
95B. However, simulations suggest a reduction in this value to 1.75 as
a good estimate for planning purposes.
IS-95B parameters IS-95B added the following three new parameters to the soft handoff
algorithm. Lucent's 3G-1X system supports the IS-95B handoff
algorithm and hence has these parameters.
• SOFT_SLOPE
• ADD_INTERCEPT
• DROP_INTERCEPT.
...........................................................................................................................................................................................................................................................
401-614-040 Lucent Technologies - Proprietary 5 - 25
Issue 2, February 2003 See Notice on first page
Discussion Handoff
ADD _ THRESH = max SOFT _ SLOPE × 10 × log ∑ PSi + ADD _ INT , T _ ADD
i∈A
DROP _ THRESH = max SOFT _ SLOPE × 10 × log ∑ PS i + DROP _ INT , T _ DROP
i∈A
where PSi is the mobile's measure of pilot Ec/Io , and the sum is
performed over all pilots in the active set.
Add IS-95B
Pilots not added in
Threshold
IS-95B that would
have been added
in IS-95A
T_ADD IS-95A
These thresholds are also applied when applying the T_COMP (see
"Procedure" section on Page 5-3) criteria.
T_ADD, T_DROP
...........................................................................................................................................................................................................................................................
5 - 26 Lucent Technologies - Proprietary 401-614-040
See Notice on first page Issue 2, February 2003
Discussion Handoff
Second, the faster forward link power control in 3G-1X allows the
sectors involved in soft handoff to realize a greater gain from soft
handoff. When a soft handoff leg is added in 3G, the mobile will see an
immediate improvement in Eb/No and ask for less power from all base
stations involved in the handoff. The base stations can quickly reduce
the power for those links. In IS-95, the impact of adding a soft handoff
leg was realized much more slowly as the power control is EIB based.
The power is reduced slowly while no errors are reported from the
mobile.
...........................................................................................................................................................................................................................................................
401-614-040 Lucent Technologies - Proprietary 5 - 27
Issue 2, February 2003 See Notice on first page
Discussion Handoff
...........................................................................................................................................................................................................................................................
5 - 28 Lucent Technologies - Proprietary 401-614-040
See Notice on first page Issue 2, February 2003
Discussion Handoff
T_TDROP
...........................................................................................................................................................................................................................................................
401-614-040 Lucent Technologies - Proprietary 5 - 29
Issue 2, February 2003 See Notice on first page
Discussion Handoff
T_COMP
Insight into the initial settings for the new IS-95B parameters can be
gained by plotting the improvement in aggregate pilot channel Ec/Io
(i.e., the linear sum of Ec/Io's of pilots in the active set) for a given
initial aggregate pilot channel Ec/Io and additional leg Ec/Io.
Pilot
10.0 Strength
9.0 (dB)
8.0 -6
7.0 -7
Improvement (dB)
6.0 -8
-9
5.0
-10
4.0
-11
3.0 -12
2.0 -13
1.0
0.0
-18 -16 -14 -12 -10 -8 -6 -4 -2 0
Aggregate Ec/Io (dB)
...........................................................................................................................................................................................................................................................
5 - 30 Lucent Technologies - Proprietary 401-614-040
See Notice on first page Issue 2, February 2003
Discussion Handoff
SCH anchor transfer vs. While soft handoff is clearly beneficial for voice communications, the
SHO cost benefit trade-off is not as clear for bursty data transmissions on the
SCH (see Chapter 3, "RF engineering for data"). For this reason,
Lucent has chosen not to implement soft handoff for the SCH forward
link. Lucent instead has implemented an optimized fast switching
algorithm (i.e., anchor transfer) that provides similar performance to
soft handoff without the drawbacks. In contrast, soft handoff is
provided for the fundamental channel that serves voice and provides a
continuous support link for the supplemental channel bursts. More
detail is provided below.
An FCH for data provides underlying support for data bursts on the
supplemental channel (SCH), as well as to transmit low speed data.
Similarly to voice calls, the FCH for data may stay active for durations
of several seconds to durations of hundreds of minutes. The FCH is
used to reliably deliver signaling and to guarantee minimum rate data
services throughout the coverage area. Therefore, Lucent has
implemented soft handoff for the FCH for both voice and data.
...........................................................................................................................................................................................................................................................
401-614-040 Lucent Technologies - Proprietary 5 - 31
Issue 2, February 2003 See Notice on first page
Discussion Handoff
High rate packet data transmissions are bursty in nature. SCHs are set
up for durations expected to be much shorter than the typical voice call,
in the range from hundreds of milliseconds to a few seconds.
Additional reliability for SCH is provided by the RLP protocol that
automatically retransmits physical layer frames in error. Therefore, the
SCH does not have the same requirement for a continuous, low error-
rate channel.
Supporting forward link soft handoff would increase the setup time for
the channel, and hence the latency any given transmission would see.
TCP flow control is very sensitive to round trip delay. At high data
rates, even if the pipe is large (i.e., high bandwidth channel), it will not
be fully utilized unless the end-to-end latency is minimized. Providing
higher rate channels provides no advantage unless latency is controlled.
But setting up a data burst in soft handoff would necessarily take longer
and introduce more delay. Soft handoff requires coordination among
the different base stations for the following:
• Channel element availability
• Backhaul facility availability
• RF resource availability
• Time synchronization of the transmission of the burst.
The first plot shows the average SCH power, relative to total power, as
a function of RF environment and SCH channel rate. Lower values are
clearly better, as less power per user means that more users can be
...........................................................................................................................................................................................................................................................
401-614-040 Lucent Technologies - Proprietary 5 - 33
Issue 2, February 2003 See Notice on first page
Discussion Handoff
supported. From the plot, it is clear that handoff does not provide a
capacity advantage, and in many cases, provides a capacity
disadvantage.
The second plot shows the SCH coverage area, relative to FCH
coverage, as a function of RF environment and SCH channel rate. In all
cases, the no handoff case provides equal or better coverage compared
to the handoff case.
K= 2 K=5 AWGN K=2 K=5 AWGN K=2 K=5 AWGN K= 2 K=5 AWGN
19.2 19.2 19.2 38.4 38.4 38.4 76.8 76.8 76.8 153.6 153.6 153.6
0.0
Average Supplemental Channel Ec/Ior(dB
-2.0
-4.0
-6.0
-6.3
-6.4
-6. 9
-8.0 -8.0 Handoff
-8. 0
-8.1
-8.2
-8.9
-10.0 No Handoff
-9.6
-9.5
-9.6
-10.0
-9.9
-11.2
-11.5
-12.0
-11.7
-11.7
-12.2
-12.4
-14.0
-13.9
-14.2
-14.3
-15.1
-16.0
-16. 5
-18.0
0% 0% 0% 0% 0% 0% % % 0% 0% 0% 0% 94 96 % % 0% 0%
90% % 92 91 %
% 87 % %
85
80% 81 % %
%
70%
60%
Handof
50% No
40%
30%
20%
10%
0%
...........................................................................................................................................................................................................................................................
5 - 34 Lucent Technologies - Proprietary 401-614-040
See Notice on first page Issue 2, February 2003
Discussion Handoff
R-SCH
...........................................................................................................................................................................................................................................................
401-614-040 Lucent Technologies - Proprietary 5 - 35
Issue 2, February 2003 See Notice on first page
Hard handoffs Handoff
Hard handoffs
............................................................................................................................................................................................................................................................
...........................................................................................................................................................................................................................................................
5 - 36 Lucent Technologies - Proprietary 401-614-040
See Notice on first page Issue 2, February 2003
References Handoff
References
............................................................................................................................................................................................................................................................
...........................................................................................................................................................................................................................................................
401-614-040 Lucent Technologies - Proprietary 5 - 37
Issue 2, February 2003 See Notice on first page
References Handoff
...........................................................................................................................................................................................................................................................
5 - 38 Lucent Technologies - Proprietary 401-614-040
See Notice on first page Issue 2, February 2003
6 Power control
Overview
............................................................................................................................................................................................................................................................
Purpose This chapter describes the power control functions for both the forward
link and the reverse link for the CDMA 3G-1X voice and packet data
calls.
............................................................................................................................................................................................................................................................
401-614-040 Lucent Technologies - Proprietary 6 - 1
Issue 2, February 2003 See Notice on first page
Introduction Power control
Introduction
............................................................................................................................................................................................................................................................
This chapter describes the power control functions for both the forward
link (base station transmitting signal to mobile) and the reverse link
(mobile to base station) for the CDMA 3G-1X voice and packet data
calls.
The reverse power control (RPC) is more complex than that of the
forward link. The RPC consists of an open loop and a closed loop. The
latter consists of an inner loop and an outer loop. The open loop power
control algorithm primarily resides in the mobile. This serves to adjust
the mobile transmit power level to compensate for larger scaled, slow
varying effects such as propagation loss and shadow fading. The closed
loop algorithm involves both the base station and the mobile, and
mainly serves to compensate for fast power fluctuation such as
Rayleigh fading. The outer loop algorithm continuously updates the
appropriate target Eb/Nt value required to maintain a desired average
reverse FER for signals received at the serving cell. The inner loop then
compares the measured Eb/Nt value with the target value. As the base
station examines each reverse traffic frame reported by the mobile via
the inner loop with each frame subdivided into 16 power control groups
(PCG) having 1.25 msec time duration. The reported FER value is used
as a reference in the outer loop to determine a new Eb/Nt target value.
Both 2G and 3G RPC algorithms support the same basic open and
closed loop functions, although the 3G algorithm offers significant
enhancement over the 2G. The 2G average reverse link output power
...........................................................................................................................................................................................................................................................
6 - 2 Lucent Technologies - Proprietary 401-614-040
See Notice on first page Issue 2, February 2003
Introduction Power control
The forward link power control (FPC) algorithm is less complex than
that of the reverse link. The mobile measures the FER statistics over a
time frame and reports that to the base station. The measured FER is
then compared with the FER target value. Upon comparison, the base
station increases the forward link output power level if the measured
FER is higher than the target, and vice versa.
...........................................................................................................................................................................................................................................................
401-614-040 Lucent Technologies - Proprietary 6 - 3
Issue 2, February 2003 See Notice on first page
Reverse power control Power control
level per frame. For example, for half-rate frames, eight PCGs are
gated off. For ¼-rate frames, twelve PCGs are gated off. As the 2G
mobile outputs the same power level for each non-gated PCG, the base
station only measures the traffic channel Eb/Nt for the non-gated PCGs.
Although the average reverse link power is regulated as required, such
gating reduces the closed loop operating speed. In lieu of such PCG
gating, the baseline 3G RPC algorithm applies a continuous
transmission scheme by reducing power level per PCG, and avoids
reducing the power control speed during sub-rate frame transmission.
If the R-FCH gating is enabled for the 1/8-rate frame transmission, the
FPC inner loop at the base station only receives half the PCGs in the
reverse PC sub-channel. For the gated PCGs, the base station receives a
noisy signal without any knowledge of the frame rate and gating
situation. This prevents the CMS-5000 ASIC from locking the finger
energy for those gated PCGs, but rather maintaining the previous
F-FCH gain and thus preventing the FPC inner loop function from
being impaired. In this case, the effective FPC inner loop speed for the
1/8-rate frame R-FCH is reduced by half.
In the RPC inner loop, up power control commands will be sent to the
mobile as the base station measures noisy finger energy for the gated
PCGs. The frame rate information being available, the mobile will
execute only the PC commands associated with non-gated PCGs and
ignore those gated while the gated PC commands are discarded. This is
based on information concerning the relative delay between the
R-PICH PCG number and the F-FCH PCG carrying the PC commands
associated with the R-PICH measurement, as per the IS-2000 standard.
Reverse power control for For 3G-1X voice service, the RPC algorithm consists of an open loop,
voice traffic and nested inner and outer closed loops. The details for the open loop
and the closed loops are provided below.
...........................................................................................................................................................................................................................................................
401-614-040 Lucent Technologies - Proprietary 6 - 5
Issue 2, February 2003 See Notice on first page
Reverse power control Power control
The primary algorithm for the open loop resides in the mobile. This
serves to adjust the mobile transmit power level to compensate for
larger scaled, slow varying effects such as propagation loss and shadow
fading.
As per IS-2000.2, for voice calls, two equations are used for computing
the open loop mean R-PICH and R-FCH output power levels from
mobile respectively.
The mean output power of the R-FCH can then be computed based on
the mean R-PICH power and other parameters as per the IS-2000
standard. These parameters include the band class constant, channel
power adjustment parameters, and a parameter that is set by the base
station and a power offset parameter, RLGAIN_TRAFFIC_PILOT.
...........................................................................................................................................................................................................................................................
6 - 6 Lucent Technologies - Proprietary 401-614-040
See Notice on first page Issue 2, February 2003
Reverse power control Power control
Forward
Power Control
INNER Sub-Channel MO BILE STATIO N
LO OP in F-FCH REVER SE
POW ER CONTROL
CONVERT
R-FCH E b /N t INNER LOO P OUTER LOOP
SETPO INT
TO
REVERSE
PILOT ENERG Y
THRESHOLD MEASURE
RECEIVED S/N O F REVERSE
REVER SE PILOT PILO T
CHANNEL REVERSE PILO T
O UTER
AND R-FCH
LOO P
CHANN EL
R-FCH FER R-FCH TRANSMITTER
ESTIMATION
As shown in the above diagram, the reverse outer loop computes a new
R-FCH Eb/Nt set point iteratively based on the base station detected
reverse frame errors at full rate. The base station then converts this
Eb/Nt set point value to a R-PICH signal-to-noise ratio (Ec/Io) set point
value. This updated R-PICH Ec/Io set point is mapped to an R-PICH
energy threshold provided in a lookup table in the ASIC. As an
embedded ASIC function, the inner loop algorithm compares the
measured R-PICH pilot energy with the above threshold and
determines the reverse power control bits to be sent to the mobile via
the forward power control sub-channel.
As a voice call is initially set up, the F-FCH is assigned prior to the
R-PICH and R-FCH assignments and this F-FCH also carries the
forward power control sub-channel. During this initial period, the
forward power control sub-channel sent to the mobile from each leg
alternating up and down commands to maintain a zero net gain in
mobile transmit power in the inner loop. If the call starts in multiple
legs, the first leg acquiring the R-PICH sends special preamble frames
to the frame selector, which echoes the best frame to all active legs. The
outer loop is initialized upon the cell receiving the first R-FCH with a
good frame, and meanwhile, the inner loop stops sending the
alternating PC commands to the mobile. Consequently, upon
...........................................................................................................................................................................................................................................................
401-614-040 Lucent Technologies - Proprietary 6 - 7
Issue 2, February 2003 See Notice on first page
Reverse power control Power control
receiving the R-PICH measurement, the inner loop begins its normal
routine. For Simplex calls, the inner loop starts as soon as the R-PICH
is measured.
The R-PICH Ec/Io set point value used in the voice R-FCH inner loop
is determined as follows:
where:
EbF
ξ = 10 log10
Nt
ξ is the R-FCH set point in dB, as R-FCH outer loop output,
GF = 1228800/R-FCH (full information rate),
GF is the R-FCH processing Gain,
EF
η F = 10 log10 CP
EC
ηF is the R-FCH power to R-PICH power offset at the mobile.
F in the above equation denotes the R-FCH at full rate with the data
rate equal to 9.6 kbps for RC3 and 14.4 kbps for RC4. The frames are
each 20 msec in length, with convolution coding.
RPC for packet data traffic The reverse power control algorithm for packet data traffic is capable
of performing power control functions on the R-FCH and the R-SCH
separately. When the data session is an active mode, the base station
regulates the mobile output power levels for the R-FCH and R-SCH
when assigned. During the dormancy periods, the RPC function is
disabled.
Similar to that for voice services, the RPC algorithm for packet data
services consists of an open loop and a nested inner/outer closed loop.
The R-FCH power control open loop algorithm for packet data is
analogous to that for voice service. During the R-SCH bursts, the open
loop algorithm determines and regulates the R-SCH output power.
For 3G-1X packet data services, there is only one inner loop in the
reverse power control algorithm. This inner loop is controlled by the
R-FCH RPC outer loop. Similar to that for the R-FCH, an R-SCH outer
loop is designed to meet the R-SCH target frame error rate. The R-SCH
outer loop detects the R-SCH frame errors and generates an updated R-
SCH Eb/Nt set point value according to the correlation between the
target R-SCH FER set point and that measured. Although the output
from the R-SCH outer loop does not affect the reverse inner loop and
the R-FCH outer loop, the R-SCH outer loop function depends on the
performance of the inner loop and the R-FCH outer loop.
The detailed R-SCH outer loop algorithm is implemented via two steps.
In the first step, if the based station is in soft or softer handoff, it detects
the R-SCH frame quality and sends a quality indicator to the FCH
frame selector in the switch via R-FCH. The frame selector determines
the best R-SCH frame and sends back to the base station via F-FCH.
Based on this frame quality, the R-SCH outer loop algorithm
determines an updated R-SCH Eb/Nt set point value. If in simplex
mode, the R-SCH outer loop directly uses the frame quality bit for
deducing a new Eb/Nt set point and bypasses the frame selector
process.
In the second step, the R-SCH Eb/Nt and R-FCH Eb/Nt set point values
are compared in a frame-by-frame basis. If the difference for a frame
relative to the difference for the previous frame is greater than an offset
threshold, a signaling message will be sent to the mobile to adjust for
the R-SCH mean output power relative to the R-FCH mean output
power.
Reverse SARA for 3G-1X The R-SCH bursts typically transmit much higher power than that of
packet data calls the low-rate R-FCH for voice or for low speed packet data traffic. As
the base station receives much greater RF power from such SCH bursts
than that from weaker mobiles, the reverse links for the latter may
possibly be impaired. The reverse supplemental air resource allocation
(R- SARA) mechanism functions to assess the impact of admitting a
new R-SCH burst on the current system performance and regulate any
possible new R-SCH assignments.
considering the impact of adding this new R-SCH. To assess the impact
of adding a new R-SCH, the RF loading must be evaluated. The
contribution to the loading from active R-SCH bursts can be
significant, and this is greatly dependent on how strongly it is received
at the sector.
Contrary to using the assumed constant receive Eb/Nt for RC3 for the
active fundamental channel, an actual measurement of the received
reverse link pilot signal strength is used to estimate the loading
contribution from an active R-SCH burst at each of the active legs.
Such estimate is based on the number of the current active Walsh codes
on the sector under consideration. Also included are the reverse
fundamental active channels along with any R-SCH bursts.
...........................................................................................................................................................................................................................................................
6 - 10 Lucent Technologies - Proprietary 401-614-040
See Notice on first page Issue 2, February 2003
Forward power control Power control
As per IS-2000, the FPC algorithm for 3G-1X voice and packet data
traffic is designed for the mobile station to support up to two inner
loops. One is the “primary inner loop” that controls operation of the
F-FCH for voice and the low speed packet data (at 9.6 kbps data rate);
the other is the “secondary inner loop” that controls the F-SCH packet
data traffic with data rates of 19.2 kbps, 38.4 kbps, 76.8 kbps and 153.6
kbps. Additionally, if a forward link dedicated control channel
...........................................................................................................................................................................................................................................................
401-614-040 Lucent Technologies - Proprietary 6 - 11
Issue 2, February 2003 See Notice on first page
Forward power control Power control
In the forward link, the base station configures the mobile and passes
the following information to the traffic channel:
• Forward Target FER values for the F-FCH and the F-SCH
• Initial, minimum and maximum Eb / Nt set point values
• Ratio of PCB power in primary channel over primary channel
traffic power at full rate (denoted as FPC_SUBCHAN_GAIN)
• Primary channel (F-FCH or F-DCCH) and secondary channel (F-
SCH) with possible inner loop rates at (800,0), (400, 400) Hz or
(200, 600) Hz.
Forward power control for The FPC functional diagram for voice service is illustrated in
voice traffic Figure 6-1. As shown in this diagram, the main functionality of both
inner and outer loops resides in the mobile. The key functional blocks
include the following:
• The F-FCH Eb/Nt detector
• The primary inner loop block that generates the PC commands
sent to the base station
• The F-FER detector
• The main outer loop block, which adjusts the Eb/Nt target value at
the mobile.
More detailed description for the voice FPC inner and outer loops are
provided below.
...........................................................................................................................................................................................................................................................
6 - 12 Lucent Technologies - Proprietary 401-614-040
See Notice on first page Issue 2, February 2003
Forward power control Power control
Forward Power
FORWARD Control Sub- MEASURE F-FCH FER
Channel RECEIVED E b/N t OF
FUNDAMENTAL ESTIMATION
in F-FCH
CHANNEL FUNDAMENTAL
TRANSMITTER CHANNEL
The following initial parameters are required for executing the voice
FPC inner loop algorithm:
• Forward power control initial gain, FPC_INI_GAIN
...........................................................................................................................................................................................................................................................
401-614-040 Lucent Technologies - Proprietary 6 - 13
Issue 2, February 2003 See Notice on first page
Forward power control Power control
The units of the initial, minimum, and maximum gain values are in dB,
relative to the forward pilot power. The initial gain setting is not as
critical because the inner loop operates at a speed of 800 Hz which is
sufficient for adjusting the forward gain to meet the updated Eb/Nt set
point without much delay. However, the values for the minimum and
maximum gains are critical. The values required for achieving optimal
capacity are dependent on the radio configuration and the number of
soft handoff legs of the call. In soft handoff, the primary leg passes the
above four parameters to each active leg thus allowing for different
gain constrains and power control steps for different calls in the same
cell/sector.
Because the primary objective for the FPC for voice traffic is to
maintain an acceptable voice quality while maximizing the system
capacity, and FER is a performance measure that well characterizes the
voice quality, maintaining an acceptable FER is an important part of the
FPC. However, given that there is no direct close mapping between
FER and the measured Eb/Nt, some adjustment in the inner loop is
required in order to maintain an acceptable averaged forward link FER.
Specifically, the F-FCH Eb/Nt target value used in the inner loop
function must be continuously adjusted based on the detected FER
value. This FER detection is performed in the outer loop. In addition,
the outer loop algorithm also includes estimating FER and dynamically
determining the appropriate Eb/Nt target value. These outer loop
functions are implemented in the mobile on a per-frame basis at a rate
of 50 Hz.
...........................................................................................................................................................................................................................................................
6 - 14 Lucent Technologies - Proprietary 401-614-040
See Notice on first page Issue 2, February 2003
Forward power control Power control
At the time a call is just being set up, the outer loop is configured by the
cell via layer 3 signaling via the paging channel and continuously
updated via the F-FCH. The following are the required parameters for
configuring the outer loop:
• Forward target FER
• Initial Eb/Nt target value
• Minimum Eb/Nt target
• Maximum Eb/Nt target.
These parameters are passed to the mobile during call setup via the
ECAM signaling messages, the service connect messages, and the
forward power control message when the mobile is assigned an F-FCH.
In handoff, the outer loop parameters are updated to reflect the new
number of soft and softer handoff legs that affects the minimum and
maximum Eb/Nt target values.
Forward power control for In 3G-1X packet data mode, the forward traffic data is transmitted via
packet data traffic the F-FCH and F-SCH channels, where the F-FCH transmits signaling
and low rate data (at 9.6 kbps) and F-SCH transmits packet data at
higher rates as discussed above. A data session consists of one or more
active periods where data is transmitted over the air interface. These
active periods are separated by periods of inactive mode, or dormant
mode. In dormant mode, neither the F-FCH nor the F-SCH is assigned
and thus any information stored in the base station associated with the
previous data call is erased. When in active mode, the F-FCH is on at
all times, while F-SCH may be on or off, depending on the availability
of the air interface resources and the amount of data in the buffer
awaiting to be sent. For trouble shooting and/or optimization, the 3G-
1X F-FCH and F-SCH FPC functions can be disabled separately by
setting the inner loop power control step sizes to 0 dB.
...........................................................................................................................................................................................................................................................
401-614-040 Lucent Technologies - Proprietary 6 - 15
Issue 2, February 2003 See Notice on first page
Forward power control Power control
When the 3G-1X packet data calls are in active mode, the F-FCH
power control algorithm follows the same closed loop process, which
consists of nested inner and outer loops as that for the 3G-1X voice
calls. However, some of the required translation parameter values must
be set differently because of the following reasons:
• The FER target for a voice call is dictated by the voice quality
requirement, while the FER target for a packet data call is
established by signaling traffic requirements (delay and reliability)
as well as the radio link protocol (RLP) performance.
• The minimum and maximum gain values are dependent on the
rate at which the power control operates. The F-FCH forward
power control (FPC) for voice calls operates at 800 Hz, while for
packet data calls only operates at 800 Hz when the F-SCH is off.
The F-FCH FPC rate reduces to 400 Hz during an F-SCH burst.
As per IS-2000, the closed loop may operate in several modes. The
base station selects the mode and configures the mobile via the layer 3
messages at the instance when the F-FCH is first assigned. It also
updates the mobile configuration via an in-band signaling during the
F-FCH operation. The packet data FPC algorithm is designed such that
the base station may configure up to two reverse power control
sub-channels via the R-PICH and this closes up to two independent
inner loops. When there is no F-SCH assigned, mobile is configured to
support only one reverse power control sub-channel, operating at 800
Hz. During an F-SCH burst, two reverse power control sub-channels
are configured in a time-multiplexed fashion via the single R-PICH,
such that the combined speed of these two inner loops becomes 800 Hz.
At a data rate of 9.6 kbps, the packet data FPC algorithm is basically
operating with F-FCH inner/outer nested power control loops, similar
to that for the voice FPC. The packet data also F-FCH supports soft
handoff. As an F-SCH is assigned (with a data rate higher than 9.6
kbps), for Release 20 and below, it only operates in a simplex mode so
...........................................................................................................................................................................................................................................................
6 - 16 Lucent Technologies - Proprietary 401-614-040
See Notice on first page Issue 2, February 2003
Forward power control Power control
as to optimize the burst setup time. The packet data FPC algorithm
consists of two inner loops and two outer loops, whether the F-FCH is
in the simplex mode or in handoff.
Forward P ower
FORW AR D Control Sub- M EASU RE F-FCH FER
Channel REC EIV ED E b /N t O F ESTIMATIO N
FUN DAM ENTAL in F-FC H
CH AN N EL FU NDAM ENTAL
TRANSMITTER C HANN EL
INN ER LO O P O U TER
LO O P
F-FCH
O U TER
BA SE STATIO N LO O P
FORW AR D Reverse P ower PRIM AR Y
Control Sub- INNER LO O P
POW ER Channel in
CO NTRO L Reverse Pilot
Channel
F-FCH E b /N t S ETPO IN T
F RO M BAS E ST AT IO N
Figure 6-3 Forward packet data primary closed loop for FCH FPC
...........................................................................................................................................................................................................................................................
401-614-040 Lucent Technologies - Proprietary 6 - 17
Issue 2, February 2003 See Notice on first page
Forward power control Power control
Forward Power
FORWARD Control Sub-Channel MEASURE RECEIVED F-SCH FER
in F-FCH Eb/Nt OF ESTIMATION
SUPPLEMENTAL
CHANNEL SUPPLEMENTAL
TRANSMITTER CHANNEL
F-SCH
OUTER
BASE STATION LOOP
FORWARD POWER Reverse Power SECONDARY
Control Sub-Channel INNER LOOP
CONTROL in Reverse Pilot
Channel
Figure 6-4 Forward packet data secondary closed loop for SCH FPC
...........................................................................................................................................................................................................................................................
6 - 18 Lucent Technologies - Proprietary 401-614-040
See Notice on first page Issue 2, February 2003
Forward power control Power control
...........................................................................................................................................................................................................................................................
401-614-040 Lucent Technologies - Proprietary 6 - 19
Issue 2, February 2003 See Notice on first page
Forward power control Power control
...........................................................................................................................................................................................................................................................
6 - 20 Lucent Technologies - Proprietary 401-614-040
See Notice on first page Issue 2, February 2003
7 Extended carrier
Overview
............................................................................................................................................................................................................................................................
Purpose This chapter provides guidelines for RF planning for “extended” carrier
deployment.
............................................................................................................................................................................................................................................................
401-614-040 Lucent Technologies - Proprietary 7 - 1
Issue 2, February 2003 See Notice on first page
Extended carrier
Summary 7-33
...........................................................................................................................................................................................................................................................
7 - 2 Lucent Technologies - Proprietary 401-614-040
See Notice on first page Issue 2, February 2003
Introduction Extended carrier
Introduction
............................................................................................................................................................................................................................................................
The use of higher (i.e., typically 5.5 dB) nominal interference margins
in 3G-1X opens several new possibilities for design. These include:
• Single extended carrier. This concept embodies the standard
design trade-off of capacity for coverage. This trade-off can be
more extensive, since there is more dB of interference margin
(loading) to trade for coverage.
• Concentric extended. This configuration uses a modest number of
large, lightly loaded single carrier cells for initial deployment. The
expanded footprint of the cells is achieved by trading off capacity
(interference margin) for coverage. Traffic growth is
accommodated by adding fully loaded carriers (of smaller
footprint) to each cell as needed. The first (extended) carrier
provides ubiquitous coverage, whereas the additional (smaller
footprint) carriers provide localized capacity relief.
...........................................................................................................................
7 Note that reverse link will be left off the name of the interference margin
throughout the rest of this chapter. The interference margin referenced here is al-
ways a reverse link term.
...........................................................................................................................................................................................................................................................
401-614-040 Lucent Technologies - Proprietary 7 - 3
Issue 2, February 2003 See Notice on first page
Introduction Extended carrier
...........................................................................................................................................................................................................................................................
7 - 4 Lucent Technologies - Proprietary 401-614-040
See Notice on first page Issue 2, February 2003
Introduction Extended carrier
...........................................................................................................................................................................................................................................................
401-614-040 Lucent Technologies - Proprietary 7 - 5
Issue 2, February 2003 See Notice on first page
Single extended carrier Extended carrier
Reverse link The design trade-off for capacity and coverage in the reverse link is
embedded in the interference margin term. The interference margin is
defined as:
1
Rim =
1− µ
(see Lucent document 401-703-201, PCS CDMA RF Engineering
Guidelines, equation 7.6)
where:
µ is the ratio of the planned number of RF channels to the “pole
capacity”.
where the Rs are the respective cell radii, Ps are the respective
maximum allowable path losses (in dBs), and S is the path loss slope
(in dB/decade).
...........................................................................................................................................................................................................................................................
7 - 6 Lucent Technologies - Proprietary 401-614-040
See Notice on first page Issue 2, February 2003
Single extended carrier Extended carrier
...........................................................................................................................................................................................................................................................
401-614-040 Lucent Technologies - Proprietary 7 - 7
Issue 2, February 2003 See Notice on first page
Single extended carrier Extended carrier
30
25
Erlang Capcity
20
15
10
5
0
100% 120% 140% 160% 180% 200%
Area Relative to Nominal Case
100%
80%
60%
40%
20%
0%
100% 120% 140% 160% 180% 200%
Area Relative to Nominal Case
Forward link It is necessary to verify that the forward link will support the extended
coverage area by examining the impact on the forward link pilot and
traffic channels.
...........................................................................................................................................................................................................................................................
7 - 8 Lucent Technologies - Proprietary 401-614-040
See Notice on first page Issue 2, February 2003
Single extended carrier Extended carrier
As the maximum allowable path loss increases, pilot power must also
be increased to maintain a constant pilot channel Ec/Io at the cell edge.
Pilot Ec/Io is defined as follows:
Ec δ ⋅ Pi
=
I o i FNoW + ∑ Pj
all _ j
where:
Ec = The time chip energy received at the mobile
Io = The total noise and interference from all sectors
δ = The fraction of sector power allocated to the pilot channel
Pj = The power received from the jth sector
i = Index of serving sector
F = Mobile receiver noise figure
No = Thermal noise density
W = The carrier bandwidth.
Intermediate cases (the most likely scenario) require the pilot channel
power to be increased somewhere between zero and the increase in
maximum allowable path loss.
18.0%
As can be seen from the graph, the pilot percentage only increases from
the standard value of 15 percent at full loading of 26.4 Erlangs (72% of
pole capacity) to a little less than 18 percent at no loading. The
additional amount of power required for the pilot channel can be
calculated on a case-by-base basis and will reduce the power available
for the traffic channels. The impact on capacity is examined in the next
section.
The traffic channel is more complicated than the pilot channel since
two effects of lighter loading must be accounted for: The increase in
path loss, and the decreased number of users. In our analysis, we
assume that all mobiles have an equal share of total base station power,
which can be interpreted as all mobiles are located at the cell edge.
Pi′
Eb n ⋅ Lp
=
N o FNoW + ∑ Pj + γ ⋅ Pi
j ≠i
Where:
Again, for insight, we can consider two simple cases analytically: The
completely interference-limited case, and the completely noise-limited
case.
Eb P2′
N L ⋅n P′ L n
o 2
= p 2 2 = 2 ⋅ p1 ⋅ 1
P1′
Eb
N
P1′ L p 2 n2
o 1 L p1 ⋅ n1
If the overhead fraction is δ, then power available for all the traffic
channels is:
...........................................................................................................................................................................................................................................................
401-614-040 Lucent Technologies - Proprietary 7 - 11
Issue 2, February 2003 See Notice on first page
Single extended carrier Extended carrier
As stated above, the overhead fraction for this noise limited case
increases by an amount equal to the increase in path loss:
Lp 2
δ2 = ⋅ δ1
Lp1
Eb Lp2 L p1
N 1 − ⋅ δ − δ1
P′ L n L p1 n1 L p 2 n1
1
o 2
= 2 ⋅ p1 ⋅ 1 =
L p1
⋅ =
Eb P1′ L p 2 n2 1 − δ1 ⋅
L n − δ ⋅ n
N p2 2
1 1 2
o 1
Eb 1 − µ1
N − δ1
o 2 1 − µ2 ⋅ n1
=
Eb 1 − δ 1 n2
N
o 1
For 3G-1X, the loading for the nominal case is 72%, or µ is 0.72. Also,
the pilot fraction for the nominal case (δ) is equal to 15%, or 0.15.
...........................................................................................................................................................................................................................................................
7 - 12 Lucent Technologies - Proprietary 401-614-040
See Notice on first page Issue 2, February 2003
Single extended carrier Extended carrier
Eb 1 − 0.72 − 0.15
N
o 2 1 − µ2 ⋅ 0.72 ⋅ nmax = 0.33 − 0.18 ⋅ 0.72
=
Eb 1 − 0.15 n2 1− µ
µ
2
N
2
o 1
5
Eb/No relative to nominal case
3
2
(dB)
1
0
-1
-2
0 0.2 0.4 0.6 0.8
Loading (mu)
From the above figure it can be observed that the achieved Eb/No for
the extended carrier case will be less than for the nominal case for
loadings between nominal (0.72) and about 0.16. Therefore no general
conclusion that the traffic channel will achieve the required Eb/Nt for
the noise limited case can be drawn. Therefore a full link budget
analysis is required to examine real scenarios that fall between the
noise limited and interference limited cases.
The actual achieved forward link Eb/No at cell edge was computed (via
spreadsheet) for a typical case (i.e. not either extreme of interference or
noise limited) with the results shown in the following figure.
...........................................................................................................................................................................................................................................................
401-614-040 Lucent Technologies - Proprietary 7 - 13
Issue 2, February 2003 See Notice on first page
Single extended carrier Extended carrier
25
15
10
0
100% 120% 140% 160% 180% 200%
Area Relative to Nominal Case
As can be seen from the above figure, the achieved Eb/Nt grows with
the decrease in Erlang capacity, which is to say that the required Eb/Nt
is achieved, and the forward link should close.
Forward Data Capacity One would also expect that as the cell radius is increased, the data
capacity of the cell would decrease. There is no simple analytical
approach to deriving a data capacity versus cell radius relation; hence,
simulations were run to model the behavior. The simulations focused
on the impact to the forward link since data applications are expected to
be asymmetric and have much lower reverse link demands relative to
forward link demands. The simulations assumed a typical link budget.
The simulation was a set of single rate simulations, whose outputs (per
rate throughputs) were combined with a standard rate distribution. The
single rate distribution was a typical forward link simulation where the
number of users was increased until a certain probability of outage
(defined as exceeding max amplifier power) was exceeded. The results
of the simulation are shown in Figure 7-6.
...........................................................................................................................................................................................................................................................
7 - 14 Lucent Technologies - Proprietary 401-614-040
See Notice on first page Issue 2, February 2003
Single extended carrier Extended carrier
112
110
...........................................................................................................................
8 The capacity growth versus number of carriers is slightly greater than strictly
linear due to trunking efficiency. The trunking efficiency is not the full value pre-
dicted by Erlang B, but is greater than 0.
...........................................................................................................................................................................................................................................................
401-614-040 Lucent Technologies - Proprietary 7 - 15
Issue 2, February 2003 See Notice on first page
Single extended carrier Extended carrier
4 3
2
0 5 1 2
-1
-2
6 7
-3
-3 -2 -1 0 1 2 3
To fill the coverage holes would require on the order of 6 new cells, as
shown in heavy red on the following figure.
...........................................................................................................................................................................................................................................................
7 - 16 Lucent Technologies - Proprietary 401-614-040
See Notice on first page Issue 2, February 2003
Single extended carrier Extended carrier
Cell/Mobile Map
3
4 3
2
0 5 1 2
-1
-2
6 7
-3
-3 -2 -1 0 1 2 3
This method of cell addition can clearly be inefficient in the sense that
coverage overlay inevitably occurs; however, from a traffic
perspective, this method of adding cells allows selective focus on areas
where traffic demand is highest. Accordingly, the net cell count for a
coverage-driven area with isolated hot traffic spots is likely to be less
than the number required if an initial dense array of cells were
uniformly deployed.
Another issue associated with adding cells is that the network may
require reoptimization. However, the costs of reoptimization maybe
minimized through the use of Lucent's Ocelot tool. Ocelot uses a
general nonlinear optimization procedure to adjust certain parameters
(e.g., antenna tilts, forward powers) of cellular networks in order to
maximize a particular “objective function”. The current objective
function is various combinations of coverage (the percentage of the
served area where a call can be made from) and capacity (how much
traffic can be carried simultaneously). When Ocelot runs an
optimization, the user sees a Trade-off Curve window with different
coverage/capacity points; clicking any point affords a detailed
examination of the proposed design in a graphical display of the market
area. It is expected that the original design and optimization will
provide a baseline set of data that will allow Ocelot to generate
accurate predictions of the revised optimization settings appropriate for
additional cell sites.
...........................................................................................................................................................................................................................................................
401-614-040 Lucent Technologies - Proprietary 7 - 17
Issue 2, February 2003 See Notice on first page
Single extended carrier Extended carrier
If traffic grows beyond the planned capacity coverage holes will occur
unless steps (e.g., added cell count) are taken. Of course this statement
is true regardless of whether the carrier is “extended” or not. However,
the lower capacity of an extended carrier means that the planned
capacity is lower than frequently employed, and hence, extra attention
must be paid to traffic growth to ensure the extended carrier does not
suffer overload.
Building penetration
...........................................................................................................................................................................................................................................................
7 - 18 Lucent Technologies - Proprietary 401-614-040
See Notice on first page Issue 2, February 2003
Concentric carriers Extended carrier
Concentric carriers
............................................................................................................................................................................................................................................................
Core Carrier
Extended Carrier
...........................................................................................................................................................................................................................................................
401-614-040 Lucent Technologies - Proprietary 7 - 19
Issue 2, February 2003 See Notice on first page
Concentric carriers Extended carrier
Core carrier reverse link As explained in the Lucent documents 401-614-012, AUTOPLEX®
Cellular CDMA RF Engineering Guidelines and 401-703-201, PCS
CDMA RF Engineering Guidelines, the pilot Ec/Io at the edge of a cell
should be equal to T_ADD9. The handoff zone is the area where one
cell's pilot is above T_ADD and another cell’s pilot is above T_DROP.
Therefore, it is expected that handoff zone is an area where the pilot Ec/
Io changes by the difference between T_ADD and T_DROP, which is
typically 2 dB. Changes in pilot Ec/Io are not precisely equal to
differences in path loss, but can be taken as an approximation. The
difference between the core and extended carriers is expected to be
greater than 2 dB. Therefore, little soft handoff is expected in the core
carrier coverage area. The impact of no soft handoff on the link budget
is to shrink the reverse link coverage by an amount equal to the soft
handoff gain. The actual carrier coverages will look something like the
following figure, where:
• The extended carrier coverage is increased by reducing the
interference margin and maintaining full soft handoff gain
• The nominal carrier coverage is the coverage of a carrier with
nominal interference margin (i.e., corresponding to 72% loading)
and full soft handoff gain
• The core carrier coverage is the coverage of a carrier with nominal
loading (i.e., corresponding to 72% loading) but with no soft
handoff gain.
Extended Carrier
Nominal Carrier
Difference in
Core Carrier Interference
Margin
Loss of
Soft
Handoff
Gain
...........................................................................................................................
9 For simplification the IS-95A terms are used here, but the same discussion ap-
plies to networks utilizing the IS-95B soft handoff algorithm.
...........................................................................................................................................................................................................................................................
7 - 20 Lucent Technologies - Proprietary 401-614-040
See Notice on first page Issue 2, February 2003
Concentric carriers Extended carrier
Since the coverage areas of the core carriers do not overlap or even
touch the expected interference ratio is less. The reduced interference
ratio will lead to an increase in reverse link capacity. This increase can
be advantageous since the core carrier by design services localized
areas of high traffic demand.
Rext
Rcore Rc-c
Therefore the ratio of the radius of the extended carrier in terms of the
radius of the core carrier is:
Pec−Pcore
Rext = Rcore⋅10 S
where Pec is the maximum allowable path loss for the extended carrier,
Pcore is the maximum allowable path loss for the core carrier, and S is
the path loss slope. The difference between extended carrier and core
carrier maximum allowable path losses is 7.3 dB, as stated above.
Therefore, the extended carrier radius is 1.55 times the radius of the
core carrier (assuming a path loss slope of 38.5 dB per decade). The
distance between the centers of the cells, Rc-c, is 3.10 times the core
carrier (twice the radius of the extended carrier). Therefore, the path
loss from the center of one cell to the other cell in terms of the path loss
to the edge of the core carrier is:
...........................................................................................................................................................................................................................................................
401-614-040 Lucent Technologies - Proprietary 7 - 21
Issue 2, February 2003 See Notice on first page
Concentric carriers Extended carrier
R
Pc−c = Pcore + S ⋅ log c−c = Pcore + 38.5 ⋅ log(3.1) = Pcore + 18.9
Rcore
For the nominal case (72% loading), the center-to-center distance is
simply twice the core carrier distance and hence the center-to-center
path loss is:
R
Pc′−c = Pcore + S ⋅ log c−c = Pcore + 38.5 ⋅ log(2) = Pcore + 11.6
Rcore
Therefore, the extended carrier case has 7.3 dB more path loss between
a cell and its first tier interferers. The reverse link interference ratio, β,
is defined as the ratio of the other cell to same cell interference. As a
first order approximation, we can treat the interference from other cells
as coming from a point at the center of the other cells. By increasing the
path loss by 7.3 dB to those other cells from the nominal case, the
interference from those other cells should be reduced by 7.3 dB. So the
interference ratio, β, should also be reduced by 7.3 dB. For the 3-sector
case the interference ratio would then be reduced from 0.85 to 0.16.
g 128
nmax = +1 = (4 )
+ 1 = 77 RF channels
α ⋅ d ⋅ (1 + β ) 0.58 ⋅ 10 ⋅ (1 + 0.16)
10
If the typical 3G-1X loading of 72% is assumed, the core carrier will
support 55 RF channels. Since no soft handoff is expected on the core
carrier, this number of channels needs to be increased by only a factor
to account for the softer handoff links, which is 1.3. Therefore, the
number of channels is 72. This value exceeds the number of Walsh
codes available, which is 59. Given the 1.3 factor for softer handoff
links, the Walsh code limit translates to a limit of 45 “primary” RF
channels per sector. The loading cannot simply be reduced to the value
associated with this number of channels since as the loading, as a
percentage of pole capacity is reduced, the interference margin is
decreased. However, this will change the coverage of the core carrier,
and hence, our computed interference ratio. Therefore, the optimum
solution can only be found through an iterative trial and error process.
A solution was found for the following conditions.
...........................................................................................................................................................................................................................................................
7 - 22 Lucent Technologies - Proprietary 401-614-040
See Notice on first page Issue 2, February 2003
Concentric carriers Extended carrier
Parameter Value
Pole capacity 73
Loading 61%
RF channel capacity 45
Core carrier forward link The core carrier forward link must be assessed on a case-by-base basis
to ensure link balance. The issues affecting the ability of the forward
link to support the reverse link are discussed below.
The forward link traffic channel coverage of the core carrier will also
suffer due to the loss of soft handoff gain. Soft handoff gain is not
explicitly listed in the forward link Eb/Nt analysis, but instead is
...........................................................................................................................................................................................................................................................
401-614-040 Lucent Technologies - Proprietary 7 - 23
Issue 2, February 2003 See Notice on first page
Concentric carriers Extended carrier
embedded in a reduced fade margin for the forward link. The fade
margin listed in the forward link is actually reduced fade margin. The
reduction is due to both soft handoff gain and other effects. The
reduction for 95% area coverage is 6.0 dB. While the Eb/Nt analysis
does not state what proportion of this is due to soft handoff and what is
due to other effects (independence of fading within the cell, limited
dynamic range of forward link transmit power), it is expected that the
soft handoff gain would be no greater than the value for the reverse link
soft handoff gain, which is 4.0 dB.
However, the forward link benefits from the lack of soft handoff in that
no power must be allocated for the soft handoff legs. The impact of the
lack of soft handoff is manifested in the forward link Eb/Nt analysis by
setting the soft handoff overhead factor to 1.3 (value for softer handoff)
instead of 1.75 typically used for 3G-1X. This difference in soft
handoff overhead factor leads to a corresponding increase in traffic
channel power of 1.3 dB. The net impact of no soft handoff on the
received traffic channel signal in the Eb/Nt analysis is a loss of 2.7 dB
(4.0 -1.3).
The forward link of the core carrier also benefits in terms of forward
link interference ratio. The lack of soft handoff increases the
interference ratio since the power from all the sectors involved in the
soft handoff are excluded from the interference term. However, the fact
that the border of the core carrier is within the cell border reduces the
interference ratio more than the lack of soft handoff increases it. The
reduction in interference ratio for the case considered here (no soft
handoff on inner border and inner border 5 dB inside outer border) is
believed to be up to 6 dB. The reduction in the interference ratio
reduces the other cell interference term.
The overall effect on the core carrier forward link depends on to the
ratio of the other cell interference to the thermal noise. In a
noise-limited system, the reduction in other cell interference will
provide little benefit and the forward link will fall short of power. In an
interference-limited system, the reduction in other cell interference will
more than make up for the reduced received traffic channel signal. The
typical case considered here was analyzed, and the forward link did
balance.
...........................................................................................................................................................................................................................................................
7 - 24 Lucent Technologies - Proprietary 401-614-040
See Notice on first page Issue 2, February 2003
Concentric carriers Extended carrier
The forward link pilot channel does not have a soft handoff gain. So the
loss of soft handoff gain does not penalize the core carrier pilot
coverage. The reduced interference ratio will benefit the core carrier
pilot channel, and hence the pilot channel coverage in the core carrier
area is not an issue.
Traffic density By design, the traffic density in the extended carrier coverage area must
be less than the traffic density of the core carrier area. The difference
depends upon the extent to which the extended carrier capacity has
been lowered in design in order to expand coverage. The plot below
shows the design traffic density, relative to the design density in the
core carrier coverage area, versus the design area of the extended
carrier relative to the nominal carrier design area. As coverage of the
extended carrier grows, the traffic density between the core and
extended carriers becomes more imbalanced.
1.00
0.80
Carrier
0.60
0.40
0.20
0.00
1.00 1.20 1.40 1.60 1.80 2.00
Extended Carrier Area Relative to Nominal
Carrier
Determining mobile To make the concentric carrier approach work, it is necessary to avoid
location violating the design capacities of the core and extended carrier. To keep
the extended carrier lightly loaded, all mobiles in the coverage area of
the core carrier need to be served by the core carrier. Also, mobiles
outside the core carrier coverage area need to be served by the extended
carrier or they will suffer degradation (e.g., high FER, call drop, etc.).
...........................................................................................................................................................................................................................................................
401-614-040 Lucent Technologies - Proprietary 7 - 25
Issue 2, February 2003 See Notice on first page
Concentric carriers Extended carrier
The same measurement of path loss would also be used for triggering
inter-frequency handoffs at the boundaries between the core and
extended carriers.
Currently, the capability to make this estimate of path loss does not
exist in the Lucent products. A new feature is required to support this
capability.
Growth strategies As traffic demand grows in the core carrier region, clearly the growth
path is to add carriers. As traffic demand grows in the extended carrier
region the same alternatives (adding carriers or adding cells) and trade-
offs apply as in the simple extended carrier case, as discussed in
"Growth strategies" section on Page 7-15. Note that since the core
carriers are placed at traffic hot spots, the pattern of growth could well
dictate that multiple additional core carriers are added well before a
second extended carrier is required.
Applications The concentric carrier approach makes sense for regions of low traffic
density punctuated by localized hot spots, such as scattered small towns
or villages surrounded by a rural area. The town would have to be small
enough to fit within the footprint of the core carrier. The traffic demand
...........................................................................................................................
10 One caveat to this approach is that IS-98 does not specify how accu-
rately the mobile must measure Io.
...........................................................................................................................................................................................................................................................
7 - 26 Lucent Technologies - Proprietary 401-614-040
See Notice on first page Issue 2, February 2003
Concentric carriers Extended carrier
...........................................................................................................................................................................................................................................................
401-614-040 Lucent Technologies - Proprietary 7 - 27
Issue 2, February 2003 See Notice on first page
Amplifier sharing - Quasi omni Extended carrier
Splitter
LA
Radio Combiner
In the reverse link budget, the increased noise figure directly translates
to a decrease in maximum allowable path loss. In the forward link, as
shown previously, the decrease in capacity will be sufficient to offset
the loss in power (i.e., the link will balance), typically with some
margin.
...........................................................................................................................
11 Note that no insertion loss is considered here since values of insertion loss
may vary widely. Once hardware is chosen and the insertion loss is known, it
should be considered as well.
...........................................................................................................................................................................................................................................................
7 - 28 Lucent Technologies - Proprietary 401-614-040
See Notice on first page Issue 2, February 2003
Amplifier sharing - Quasi omni Extended carrier
In the case analyzed here, the forward achieved Eb/No is 7.1 dB higher
than the nominal case (note that the pilot was increased to 16.8% of
total power); clearly, the forward link has more than enough power.
This asymmetry can be reduced by the use of Tower Top Low Noise
Amplifiers (TTLNA). As discussed in Chapter 8 of the PCS CDMA RF
Engineering Guidelines, TTLNAs reduce the reverse link noise figure.
The reduction depends on the value for cell site cable loss. Taking 2 dB
as a typical value for cell site cable loss, the typical reduction in reverse
link noise figure is 1.9 dB. Thus, the net increase between the signal
combiner and TTLNA is 2.9 dB (4.8 - 1.9). To achieve this reduction in
interference margin requires that the cell capacity be reduced to 14
Erlangs per face, or 42 Erlangs per cell. The forward link shows that
there is sufficient power to achieve the same pilot channel Ec/Io and
traffic channel Eb/No as the nominal case. Again, as traffic demand
increases past the capacity of the cell, the combiner/splitters can be
removed, as well as the TTLNA. The degree to which this approach is
advantageous depends on the relative cost of a single TTLNA versus
the cost of 2 amplifiers and radios.
Growth strategies The benefit of this approach is that it delays the cost of the second and
third amplifiers and radios until they are needed, while maintaining the
same cell footprint. Thus, a network provider can “pay as they grow”,
by simply adding hardware to existing sites.
As traffic increases on the cell the network operator can either grow to
two amplifiers (see next section) if the traffic demand is asymmetric
among the three sectors or to three amplifiers if the traffic demand is
roughly equal among the sectors. This decision requires some
knowledge of the traffic distribution amongst the sectors. Since all
three sectors are served by the same radio, they have the same PN code,
and hence, traditional service measurements will not capture per-sector
traffic information. However, a network operator can use the Lucent
...........................................................................................................................................................................................................................................................
401-614-040 Lucent Technologies - Proprietary 7 - 29
Issue 2, February 2003 See Notice on first page
Amplifier sharing - Quasi omni Extended carrier
...........................................................................................................................................................................................................................................................
7 - 30 Lucent Technologies - Proprietary 401-614-040
See Notice on first page Issue 2, February 2003
Amplifier sharing - Asymmetric cell Extended carrier
Tx Rx Rx Tx Rx Rx Tx Rx Rx
Radio LA
Splitter
LA
Radio
Combiner
The splitter splits the power from the linear amplifier two ways,
reducing the power per antenna by 1/2 or -3.0 dB in the lightly loaded
beta and gamma sectors. The remaining amplifier services the fully
loaded alpha sector. The combiner combines the signals from the two
lightly loaded faces (beta and gamma) and hence increases the reverse
link noise figure by a factor of 2 or 3.0 dB. In this configuration, the
coverage footprint of all three sectors is the same. In beta and gamma,
the coverage advantage gained by reducing capacity can be used to
overcome the combiner and splitter disadvantages instead of extending
the cell radius.
...........................................................................................................................................................................................................................................................
401-614-040 Lucent Technologies - Proprietary 7 - 31
Issue 2, February 2003 See Notice on first page
Amplifier sharing - Asymmetric cell Extended carrier
Growth strategies If traffic demand grows in the same pattern, i.e., the busy sector
remains significantly higher loading than the other two sectors, then the
logical growth path is to add carriers in the same arrangement of
amplifier sharing. If traffic grows and the sectors are more uniformly
loaded, then a third amplifier should be deployed with each sector
being supported by its own amplifier. The penalty for the splitters and
combiners is removed from the link budget, so there is no longer any
need to reduce capacity. The cell can then run at full capacity of 26.4
Erlangs per sector, or 79.2 Erlangs per cell, in the same footprint.
...........................................................................................................................................................................................................................................................
7 - 32 Lucent Technologies - Proprietary 401-614-040
See Notice on first page Issue 2, February 2003
Summary Extended carrier
Summary
............................................................................................................................................................................................................................................................
...........................................................................................................................................................................................................................................................
7 - 34 Lucent Technologies - Proprietary 401-614-040
See Notice on first page Issue 2, February 2003
8 Fixed wireless voice networks
............................................................................................................................................................................................................................................................
401-614-040 Lucent Technologies - Proprietary 8 - 1
Issue 2, February 2003 See Notice on first page
Introduction Fixed wireless voice networks
Introduction
............................................................................................................................................................................................................................................................
...........................................................................................................................................................................................................................................................
8 - 2 Lucent Technologies - Proprietary 401-614-040
See Notice on first page Issue 2, February 2003
Parameters for fixed wireless analysis Fixed wireless voice networks
Reverse link interference For indoor applications, the interference ratio is the same as the mobile
ratio (βr) case because omnidirectional antenna is used at the subscriber unit. It is
well known that the reverse link interference ratio of a mobile system is
0.6, 0.85, and 1.2 for omni cell, 3-sector, and 6-sector, respectively.
+
+ +
+
+ +
+
Required reverse link Eb/Nt Reverse link required Eb/Nt is used both in capacity calculations (pole
for 3G capacity equation) and in coverage calculations (link budgets).
Required Eb/Nt is a function of channel condition. One of the main
...........................................................................................................................................................................................................................................................
8 - 4 Lucent Technologies - Proprietary 401-614-040
See Notice on first page Issue 2, February 2003
Parameters for fixed wireless analysis Fixed wireless voice networks
Eb E TrafficPower + PilotPower Eb
= b = (1 + 0.42) = 100.393
t total t traffic
N N TrafficPower t traffic
N
As stated previously, the AWGN value may not properly reflect the
subscriber conditions since the receiver sees some apparent motion due
to movement of its surrounding environment. For example, Qualcomm
2G ASIC simulations indicated that the per-branch Eb/No for 0
velocity AWGN was 3 dB. Later field measurements indicated that the
value for fixed subscribers was higher: 4.6 dB. This difference suggests
that the AWGN model underestimates the fixed receiver requirements.
A line can also be fit to the data from the CSM5000 in the same
manner, since the endpoints for 0 relative mobility (AWGN) and full
relative mobility (1) are known. Since x=0.3 or 30% relative mobility
appears from the above to be the proper choice for a fixed receiver in a
moving environment, the appropriate Eb/Nt requirement for 3G fixed
wireless can be estimated by substituting x=0.3 into this equation.
Table 8-3 Eb/No values and mobility index for 3G ASIC
Walsh code overhead Each soft/softer handoff leg requires a Walsh code. Based on IS-95A
handoff probabilities in Reference [1] of this chapter, we can calculate
the Walsh code overhead factors for 3-sector and omni configurations.
...........................................................................................................................................................................................................................................................
8 - 6 Lucent Technologies - Proprietary 401-614-040
See Notice on first page Issue 2, February 2003
Parameters for fixed wireless analysis Fixed wireless voice networks
Table 8-5 Walsh Code limitation to primary traffic channels for max
of 60 available
...........................................................................................................................................................................................................................................................
401-614-040 Lucent Technologies - Proprietary 8 - 7
Issue 2, February 2003 See Notice on first page
Parameters for fixed wireless analysis Fixed wireless voice networks
For the 3G-1X system, the Walsh code limit can be greatly increased
(more than doubled) by using Radio Configuration 4 (RC4) on the
forward link. Note that RC3 is still used for the reverse link, so any
reverse link air interface limit still exists. The cost of the extra Walsh
codes for the forward link is an approximate 1 dB penalty in required
Eb/Nt. The impact of the increase in required Eb/Nt will be examined
later in "Power requirements of forward link" section on Page 8-17. A
single 3G-1X carrier can support both RC3 and RC4 on the forward
link. Lucent has developed proprietary algorithms (FID 3747.2) that
maximize forward link capacity optimizes the system capacity based
on the instant value of multiple parameters such as RF Power, RC3
Walsh code usage, voice vs. data call, etc. The feature will make the
RC3/RC4 assignment decision at call setup time.
Recommended loading In a fixed wireless system, the recommended loading factors (relative
factor to pole capacity) are:
• 72% for 3G-1X systems (the standard 3G value)
• 65% for 2G systems with pole capacities greater than or equal to
69 (the higher values of channels allows for higher loadings
without risk of system instability since the larger number of
subscribers tends to smooth potential instabilities)
• 55% loading otherwise (the standard 2G value).
Channel activity factor The channel activity factor for 2G voice systems is 0.40. The value for
3G-1X must also account for the reverse link pilot and is 0.58. The
Selectable mode vocoders (SMV) will result in lower channel activity
factors. The following values are used by Lucent for estimating
capacities of a SMV system:
Table 8-6 Reverse link channel activity factors for different SMV
modes
Mode 1 0.51
Mode 2 0.47
...........................................................................................................................................................................................................................................................
8 - 8 Lucent Technologies - Proprietary 401-614-040
See Notice on first page Issue 2, February 2003
Reverse link coverage Fixed wireless voice networks
For a typical indoor fixed wireless system, the coverage advantage over
a mobile network will be just the difference in Eb/Nts, which is 1.2 dB
for 3G-1X. For outdoor fixed wireless systems, the coverage advantage
can be quite large, since it includes both the gain of the directional
subscriber antenna as well as the gain due to not having a building
penetration loss.
...........................................................................................................................................................................................................................................................
401-614-040 Lucent Technologies - Proprietary 8 - 9
Issue 2, February 2003 See Notice on first page
System capacity calculation Fixed wireless voice networks
g
n pole = +1
α ⋅ d ⋅ (1 + βr )
where:
g is the processing gain (bandwidth divided by channel rate)
α is the channel activity factor
βr is the reverse link interference ratio
d is the required Eb/Nt expressed as a linear ratio (as opposed
to dB)
2. Choose a loading factor, which is a relative amount of the pole
capacity to determine maximum number of simultaneous RF
channels. This loading factor is directly related to the predicted
coverage through the interference margin term (sometimes called
noise rise). The higher the loading, the higher the interference
margin and the smaller the coverage area.
3. This maximum number of channels must be checked against the
forward link Walsh Code limit. If the Walsh Code limit is less than
the computed value, the Walsh Code limit is the maximum
number of channels.
4. Choose a grade of service and use that to translate maximum
number of channels to voice capacity in terms of Erlangs. Erlang
B tables are typically used for this mapping.
5. The forward link air interface capacity is then verified by
checking that the forward link has sufficient power to support the
number of users.
For a fixed system, two parameters (reverse link interference ratio and
required Eb/Nt) of the pole capacity equation are different than the
mobile case, as explained below.
...........................................................................................................................................................................................................................................................
8 - 10 Lucent Technologies - Proprietary 401-614-040
See Notice on first page Issue 2, February 2003
System capacity calculation Fixed wireless voice networks
Reverse link based The capacities considering just reverse link air interface limits and
capacity calculations Walsh code limits (to Step 4 in the 5-step process described above) are
presented below.
Indoor
Table 8-7 2G ASIC 1.0 reverse link capacity of indoor fixed application
Table 8-8 2G ASIC 1.1 reverse link capacity of indoor fixed application
Table 8-10 3G-1X RC4 Reverse Link capacity of indoor fixed application
...........................................................................................................................................................................................................................................................
8 - 12 Lucent Technologies - Proprietary 401-614-040
See Notice on first page Issue 2, February 2003
System capacity calculation Fixed wireless voice networks
Table 8-11 3G-1X RC4 with SMV Mode 1 reverse link capacity of indoor fixed application
Table 8-12 3G-1X RC4 with SMV Mode 2 reverse link capacity of indoor fixed application
...........................................................................................................................................................................................................................................................
401-614-040 Lucent Technologies - Proprietary 8 - 13
Issue 2, February 2003 See Notice on first page
System capacity calculation Fixed wireless voice networks
Outdoor
Table 8-14 2G ASIC 1.1 reverse link capacity of outdoor fixed application
...........................................................................................................................................................................................................................................................
401-614-040 Lucent Technologies - Proprietary 8 - 15
Issue 2, February 2003 See Notice on first page
System capacity calculation Fixed wireless voice networks
Table 8-17 3G-1X RC4 with SMV Mode 1 reverse link capacity of indoor fixed application
Table 8-18 3G-1X RC4 with SMV Mode 2 reverse link capacity of indoor fixed application
...........................................................................................................................................................................................................................................................
8 - 16 Lucent Technologies - Proprietary 401-614-040
See Notice on first page Issue 2, February 2003
Power requirements of forward link Fixed wireless voice networks
3G-1X RC3 To assess the forward link, we begin with the fundamental forward link
equation that conserves power at the J4 (antenna connector) port at the
base station (see "Forward link" section on Page 2-20):
∑α
all links
j x j Qmax + µQmax ≤ Qmax
where α and x are the forward link voice activity and forward link
power allocation, respectively, for the jth link (user). The allocation is
the fraction of total transmit power allocated to the link, and is
frequently referenced as Ec/Ior. Qmax is the maximum power (e.g., 16
watts for PCS Modcell) broadcast at the J4 port. The fraction µ is the
(fixed) percentage of maximum power provided for overhead functions
(e.g., pilot, page). At full power, the expression above reduces to:
all
∑αlinks
j x j ≤ 1− µ
Accordingly:
...........................................................................................................................
12 These curves are found in the document “Simulation Study of the OTD Mode for the
Voice Service Case in IS-2000”, by Qi Bi, Yung-Fang Chen, and Raafat Kamel; March
2000.
...........................................................................................................................................................................................................................................................
8 - 18 Lucent Technologies - Proprietary 401-614-040
See Notice on first page Issue 2, February 2003
Power requirements of forward link Fixed wireless voice networks
pilot = ηI or1W
pilot
= 10THRES / 10
FNtW + I or1W + I or 2W + I ocW
I or1W + I or 2W
geometry G =
FNtW + I ocW
1
G=
η
10−THRES/ 10 − 1
2
...........................................................................................................................
13 For example, a speed of 100 km/hr. at 2 GHz is roughly equivalent to a speed of 400
km/hr. at 450 MHz: each achieves the same fast fading rate, since the wavelength at 450
MHz is approximately 4 times greater than that at 2 GHz. The value of -15.9 dB would
therefore be excluded from the 450 MHz case.
...........................................................................................................................................................................................................................................................
401-614-040 Lucent Technologies - Proprietary 8 - 19
Issue 2, February 2003 See Notice on first page
Power requirements of forward link Fixed wireless voice networks
Table 8-19 Ec/Ior for 2-path, d=0 (equal strength handoff legs),
geometry is 2.3 dB, frequency=2GHz
Velocity x = Ec/Ior
For the full mobility case, presuming that each velocity is equally
probable, the mean and standard deviation of the random variable x is
0.028 and 0.0058, respectively. In contrast, for the fixed wireless case
the single constant value of x is 0.021 (equivalently, a mean of 0.021
and a standard deviation of 0).
y = ∑α j x j ≤ 1 − µ
N
j =1
η + 2σ y ≤ 1 − µ
y
η y = E[y ]= Nηαηx
σ y = N σ x2σ α2 + ηα2σ x2 + η x2σ α2
Accordingly,
Nηαη x + 2 N σ x2σ α2 + ηα2σ x2 + η x2σ α2 − (1 − µ ) ≤ 0
...........................................................................................................................................................................................................................................................
8 - 20 Lucent Technologies - Proprietary 401-614-040
See Notice on first page Issue 2, February 2003
Power requirements of forward link Fixed wireless voice networks
3G-1X RC4 In several cases, Walsh codes are the capacity limiting resource.
Forward link RC4 allows for twice the number of Walsh codes relative
to RC3 (128 vs. 64). However, the cost of the extra Walsh codes is
higher, required power requirements to support RC4 subscriber units.
The power fraction (Ec/Ior) versus Geometry curves show about 1 dB
power penalty for RC4. This 1 dB can be directly applied as an Erlang
capacity reduction. Thus, the 37 Erlangs for RC3 is reduced by 1 dB to
29.4 Erlangs for 1% blocking and from 39.3 to 31.2 Erlangs for 2%
blocking. In this case the limiting resource is forward link air interface
capacity.
3G-1X with SMV The 1 dB Eb/Nt penalty from utilizing RC4 typically leads to the
forward link air interface being the limiting resource. The SMV
(Selectable Mode Vocoder) provides capacity gains for the forward
link. The capacity gains for SMV in the forward link are expected to be
as follows.
...........................................................................................................................................................................................................................................................
401-614-040 Lucent Technologies - Proprietary 8 - 21
Issue 2, February 2003 See Notice on first page
Power requirements of forward link Fixed wireless voice networks
Mode 0 0%
Mode 1 34%
Mode 2 64%
Mode 3 80%
Thus the increase in forward link capacity relative to the RC4 case for
Mode 1 is to 39.3 Erlangs for 1% blocking, or 41.8 Erlangs for 2%
blocking. For Mode 2, the capacity increases to 48.2 Erlangs for 1%
blocking, and 51.2 Erlangs for 2% blocking.
...........................................................................................................................................................................................................................................................
8 - 22 Lucent Technologies - Proprietary 401-614-040
See Notice on first page Issue 2, February 2003
Conclusions Fixed wireless voice networks
Conclusions
............................................................................................................................................................................................................................................................
Capacities for fixed wireless 3G-1X data networks are currently being
studied.
...........................................................................................................................................................................................................................................................
401-614-040 Lucent Technologies - Proprietary 8 - 23
Issue 2, February 2003 See Notice on first page
References Fixed wireless voice networks
References
............................................................................................................................................................................................................................................................
[1]. “Range vs. number of subscribers for the forward and reverse
links,” Qualcomm, July 18, 1995.
...........................................................................................................................................................................................................................................................
8 - 24 Lucent Technologies - Proprietary 401-614-040
See Notice on first page Issue 2, February 2003