Академический Документы
Профессиональный Документы
Культура Документы
Confidential
Version Introduction
Version
V1.0 V2.0
Date
2009-06-30 2009-11-13
Writer
Hou Shuai Hou Shuai
Assessor
Zheng Hao Zheng Hao
Translator
Amendment Records
None
V3.0
2010-01-18
Hou Shuai
Zheng Hao
1 Relevant PS parameters of V6.20.200 series are added; 2 The introduction to PDTCH allocation algorithm based on the idle threshold of TRX is added.
The optimization of ResourceAdjustThs is modified The optimization of Interval number of Packet Downlink/Uplink Ack/Nack, TBF_EST, and T3192/T3193 is modified.
V1.3
2010-03-31
Hou Shuai
Zheng Hao
Feng Xiaoying Lu Yan Wang Hangyan Feng Xiaoying Lu Yan Wang Hangyan
V2.0
2010-07-21
Hou Shuai
Zheng Hao
This material contains information about research & development trend of ZTE Corporation, and is open only to internal employees!
Confidential
Course Objectives
This material classifies radio parameters related to PS service according to functional modules, and describes in detail the following aspects: the principle of parameters, application context of functions, suggestions for network P&O adjustment, and etc. It is hoped that this may be helpful to daily work in network planning and optimization.
Important Statement: Please be informed that functions such as NCCR, PS preemption/queuing, PFC, PBCCH, C31/32, and PS power control, etc. are not mature in development, and therefore will not be described in this PPT!
Contents
Confidential
Chapter 1 Introduction to Coding Mode Adjustment Algorithms Chapter 2 Introduction to Link Quality Control Function Chapter 3 Introduction to UL TBF Access Mode Chapter 4 Introduction to Window in Data Transmission Chapter 5 Introduction to Functions, Timers and Counters Related to TBF Establishment & Release Chapter 6 Introduction to EDA and Algorithms of UL/DL Timeslot Allocation Decision Chapter 7 Introduction to Cell Reselection Algorithms Based on C1 & C2 Chapter 8 Introduction to BVC & MS Flow Control Algorithms Chapter 9 Introduction to DTM & Paging Coordination Function Chapter 10 Introduction to NACC Function Chapter 11 Introduction to Suspend/Resume Functions Chapter 12 Introduction to Functions & Algorithms Influencing PDTCH Planning Chapter 13 Introduction to Parameters of PDTCHTCH Conversion Chapter 14 Introduction to PreemptiveTrans Bit Function Chapter 15 Introduction to CS Move Function Chapter 16 Introduction to Granularity for UL Block Allocation of GPRS Handset Chapter 17 Introduction to Parameters of Maximum UL/DL Users Allowed Chapter 18 Introduction to Relevant Poc Parameters Chapter 19 Quick Search for PS-related Radio Parameters
Confidential
Confidential
1
1 1 1 1 1 1 1 1 1 2 2 2
8,000
12,000 14,400 20,000 8,800 11,200 14,800 17,600 22,400 29,600 44,800 54,400 59,200
C B A C B A B A A
8-PSK
Confidential
ZTE Default
CS2CS2
GPRS phones init GPRS InitAttachExc code can be Yes/No h_0 changed 116 kbpsMCS1MCS2 216 kbpsMCS1MCS2 MCS3MCS4MCS5 EGPRS Phone 316 kbpsMCS1MCS2 EGPRS Init Coding MCS3MCS4MCS5MCS6 416 kbpsMCS1MCS2 MCS3MCS4MCS5MCS6 MCS7MCS8MCS9 EGPRS phones EGPRS InitAttachExc init code can be Yes/No h_1 changed
Yes
Yes
Cn and Nn could be set a little higher to improve the stability in raising coding mode when GPRS service is increased.
Confidential
Initial coding mode and its dynamic adjustment (V6.20.100e and later versions)
In versions before V6.20.100e, only the initial coding mode of GPRS and EGPRS is defined, without setting the upper limit. But considering: 1) Regarding signaling TBF, there is no need to use the highest coding scheme, as there are few bits; 2) Some operators request to disable the highest coding scheme. This aims mainly at GPRS. Some operators worry that the PS may not be used as some MSs do not support CS3/4 coding scheme. So, 1) In V6.20.100e, the meanings of GPRSInitAttSelt and EGPRSInitAttSelt are modified. After the modification, each of thes e two parameters contains four bits, which mean: uplink initial coding scheme, downlink initial coding scheme, uplink highest coding scheme, and downlink highest coding scheme respectively. 2)In V6.20.100e, the parameter Highest coding scheme of signal TBF is added (the main function is realized in V6.20.200e) t o limit the using of the highest coding scheme during the process of transmitting uplink signaling (e.g. PDP activation, routing area update, and etc.)
Parameter Code
ZTE Default
MCS6 5,5,8,8 1,1,3,3
Highest coding scheme of signal SigTBFMaxCode TBF EGPRS EGPRS Phone Init EGPRSInitAttSelt Coding GPRS GPRS init attach GPRSInitAttSelt select
Confidential
ZTE Default
0MEAN_BEP_TNx0-7and I_LEVEL_TN 0-7will not reportedwhich means TBFMEAN_BEP and CV_BEP of TBF will be reported LinkQuam 1only I_LEVEL_TN0-7will be reported 2 eaMode 2only MEAN_BEP_TNx0-7will be reported 3both MEAN_BEP_TNx0-7and I_LEVEL_TN0-7will be reported.
If mode 1, 2 and 3 are adopted, in which the report is made according to timeslot and may be missed in a few terminals, the dynamic adjustment of coding mode may be affected greatly. The measure mode based on MEAN_BEP and CV_BEP is more reasonable. The value 0 indicates reporting in TBF mode. The measurement values reported include C_Value, Mean_BEP, and CB_BEP. To sum up, mode 0 is recommended: report in TBF mode.
Confidential
ZTE Parameter Range & Parameter Name (EN) Defaul Code Unit t
10 10 10 8
Gprs TBFRRBP Interval number of GPRS TBF GPRSDIRrbpInt 3 ~ 20 downlinks RRBP erVal Egprs TBFRRBP Interval number of EGPRS TBF EGPRSDIRrbpI 6 ~ 60 downlinks RRBP nterVal Gprs TBF Interval number of GPRS TBF GPRSUIAckInte 3 ~ 20 uplinks ACK rVal Egprs TBF Interval number of EGPRS TBF EGPRSUIAckInt 3 ~ 20 uplinks ACK erVal
It indicates the time interval used in transmitting Packet Downlink/Uplink Ack/Nack (Block as the unit ) ; If the parameter is set too low, uplink and downlink resource waste may occur; Too high the value may cause delayed confirmation, which will affect speed, even lead to abnormal TBF release; If GPRS window is fixed to 64, it tends to stagnate. But in EDGE service, the window is relatively large, and is related to the timeslot allocated (please refer to Chapter 4 for details). To sum up, higher value should be set for these parameters to improve the retransmission rate on RLC layer.
Confidential
ZTE Defaul t
4
Defined the forgetting factor e in BEP calculation formula. If the parameter is set higher, it will help to increase the weight of previous reports, and the BEP thus calculated is more reliable; The unit of the parameter is Block. To sum up, it is recommended to set this parameter as about 10.
Confidential
Parameter Code
Ulmeasureperiod
ZTE Default
800
It indicates the period BSC needs to process uplink measure report from BTS. It needs to guarantee that coding mode will not change too frequently; It needs also to guarantee the flexibility of the coding mode; To sum up, the default value in system is reasonable.
Contents
Chapter 1 Introduction to Coding Mode Adjustment Algorithms Chapter 2 Introduction to Link Quality Control Function Chapter 3 Introduction to UL TBF Access Mode Chapter 4 Introduction to Window in Data Transmission Chapter 5 Introduction to Functions, Timers and Counters Related to TBF Establishment & Release Chapter 6 Introduction to EDA and Algorithms of UL/DL Timeslot Allocation Decision Chapter 7 Introduction to Cell Reselection Algorithms Based on C1 & C2 Chapter 8 Introduction to BVC & MS Flow Control Algorithms Chapter 9 Introduction to DTM & Paging Coordination Function Chapter 10 Introduction to NACC Function Chapter 11 Introduction to Suspend/Resume Functions Chapter 12 Introduction to Functions & Algorithms Influencing PDTCH Planning Chapter 13 Introduction to Parameters of PDTCHTCH Conversion Chapter 14 Introduction to PreemptiveTrans Bit Function Chapter 15 Introduction to CS Move Function Chapter 16 Introduction to Granularity for UL Block Allocation of GPRS Handset Chapter 17 Introduction to Parameters of Maximum UL/DL Users Allowed Chapter 18 Introduction to Relevant Poc Parameters Chapter 19 Quick Search for PS-related Radio Parameters
Confidential
Confidential
Confidential
Introduction to IR principles
Initial send
First Retransmission
Second Retransmission
MCS_4 MCS_4 MCS_4 MCS_4 MCS_4 MCS_4 MCS_4 MCS_5 MCS_5 MCS_5 MCS_5 MCS_6 MCS_6 MCS_6 MCS_6 MCS_7 MCS_7 MCS_7 MCS_7 MCS_7 MCS_7 MCS_7 MCS_8 MCS_8 MCS_8 MCS_8 MCS_8 MCS_8 MCS_9 MCS_9 MCS_9 MCS_9
MCS_4 MCS_4 MCS_4 MCS_4 MCS_4 MCS_4 MCS_5 MCS_5 MCS_5 MCS_5 MCS_5 MCS_6 MCS_6 MCS_6 MCS_6 MCS_7 MCS_7 MCS_7 MCS_7 MCS_7 MCS_7 MCS_7 MCS_8 MCS_8 MCS_8 MCS_8 MCS_8 MCS_8 MCS_9 MCS_9 MCS_9 MCS_9
MCS_4 MCS_4 MCS_4 MCS_4 MCS_4 MCS_4 MCS_5 MCS_5 MCS_5 MCS_5 MCS_6 MCS_6 MCS_6 MCS_6 MCS_7 MCS_7 MCS_7 MCS_7 MCS_7 MCS_7 MCS_7 MCS_8 MCS_8 MCS_8 MCS_8 MCS_8 MCS_8 MCS_8 MCS_9 MCS_9 MCS_9 MCS_9
MCS_4 MCS_4 MCS_4 MCS_4 MCS_4 MCS_5 MCS_5 MCS_5 MCS_5 MCS_6 MCS_6 MCS_6 MCS_6 MCS_6 MCS_7 MCS_7 MCS_7 MCS_7 MCS_7 MCS_7 MCS_7 MCS_8 MCS_8 MCS_8 MCS_8 MCS_8 MCS_8 MCS_8 MCS_9 MCS_9 MCS_9 MCS_9
MCS_4 MCS_4 MCS_4 MCS_4 MCS_5 MCS_5 MCS_5 MCS_5 MCS_6 MCS_6 MCS_6 MCS_6 MCS_6 MCS_7 MCS_7 MCS_7 MCS_7 MCS_7 MCS_7 MCS_7 MCS_7 MCS_8 MCS_8 MCS_8 MCS_8 MCS_8 MCS_8 MCS_8 MCS_9 MCS_9 MCS_9 MCS_9
MCS_4 MCS_4 MCS_4 MCS_5 MCS_5 MCS_5 MCS_5 MCS_6 MCS_6 MCS_6 MCS_6 MCS_6 MCS_7 MCS_7 MCS_7 MCS_7 MCS_7 MCS_7 MCS_7 MCS_7 MCS_7 MCS_8 MCS_8 MCS_8 MCS_8 MCS_8 MCS_8 MCS_8 MCS_9 MCS_9 MCS_9 MCS_9
MCS_4 MCS_4 MCS_4 MCS_5 MCS_5 MCS_5 MCS_6 MCS_6 MCS_6 MCS_6 MCS_6 MCS_7 MCS_7 MCS_7 MCS_7 MCS_7 MCS_7 MCS_7 MCS_7 MCS_7 MCS_7 MCS_8 MCS_8 MCS_8 MCS_8 MCS_8 MCS_8 MCS_8 MCS_9 MCS_9 MCS_9 MCS_9
MCS_4 MCS_4 MCS_4 MCS_5 MCS_5 MCS_6 MCS_6 MCS_6 MCS_6 MCS_6 MCS_7 MCS_7 MCS_7 MCS_7 MCS_7 MCS_7 MCS_7 MCS_7 MCS_7 MCS_7 MCS_7 MCS_8 MCS_8 MCS_8 MCS_8 MCS_8 MCS_8 MCS_8 MCS_9 MCS_9 MCS_9 MCS_9
MCS_1 MCS_1 MCS_1 MCS_1 MCS_1 MCS_1 MCS_1 MCS_1 MCS_1 MCS_1 MCS_1 MCS_2 MCS_2 MCS_2 MCS_2 MCS_3 MCS_3 MCS_3 MCS_3 MCS_3 MCS_3 MCS_3 MCS_4 MCS_4 MCS_4 MCS_4 MCS_4 MCS_4 MCS_4 MCS_5 MCS_5 MCS_5
MCS_1 MCS_1 MCS_1 MCS_1 MCS_1 MCS_1 MCS_1 MCS_1 MCS_1 MCS_1 MCS_1 MCS_2 MCS_2 MCS_2 MCS_2 MCS_3 MCS_3 MCS_3 MCS_3 MCS_3 MCS_3 MCS_3 MCS_4 MCS_4 MCS_4 MCS_4 MCS_4 MCS_4 MCS_4 MCS_5 MCS_5 MCS_5
MCS_1 MCS_1 MCS_1 MCS_1 MCS_1 MCS_1 MCS_1 MCS_1 MCS_1 MCS_1 MCS_2 MCS_2 MCS_2 MCS_2 MCS_3 MCS_3 MCS_3 MCS_3 MCS_3 MCS_3 MCS_3 MCS_4 MCS_4 MCS_4 MCS_4 MCS_4 MCS_4 MCS_4 MCS_5 MCS_5 MCS_5 MCS_5
MCS_1 MCS_1 MCS_1 MCS_1 MCS_1 MCS_1 MCS_1 MCS_1 MCS_1 MCS_2 MCS_2 MCS_2 MCS_2 MCS_2 MCS_3 MCS_3 MCS_3 MCS_3 MCS_3 MCS_3 MCS_3 MCS_4 MCS_4 MCS_4 MCS_4 MCS_4 MCS_4 MCS_5 MCS_5 MCS_5 MCS_5 MCS_5
MCS_1 MCS_1 MCS_1 MCS_1 MCS_1 MCS_1 MCS_1 MCS_1 MCS_2 MCS_2 MCS_2 MCS_2 MCS_2 MCS_3 MCS_3 MCS_3 MCS_3 MCS_3 MCS_3 MCS_3 MCS_3 MCS_4 MCS_4 MCS_4 MCS_4 MCS_4 MCS_4 MCS_5 MCS_5 MCS_5 MCS_5 MCS_5
MCS_1 MCS_1 MCS_1 MCS_1 MCS_1 MCS_1 MCS_1 MCS_2 MCS_2 MCS_2 MCS_2 MCS_2 MCS_3 MCS_3 MCS_3 MCS_3 MCS_3 MCS_3 MCS_3 MCS_3 MCS_3 MCS_4 MCS_4 MCS_4 MCS_4 MCS_4 MCS_5 MCS_5 MCS_5 MCS_5 MCS_5 MCS_5
MCS_1 MCS_1 MCS_1 MCS_1 MCS_1 MCS_1 MCS_2 MCS_2 MCS_2 MCS_2 MCS_2 MCS_3 MCS_3 MCS_3 MCS_3 MCS_3 MCS_3 MCS_3 MCS_3 MCS_3 MCS_3 MCS_4 MCS_4 MCS_4 MCS_4 MCS_4 MCS_5 MCS_5 MCS_5 MCS_5 MCS_5 MCS_5
MCS_1 MCS_1 MCS_1 MCS_1 MCS_1 MCS_2 MCS_2 MCS_2 MCS_2 MCS_2 MCS_3 MCS_3 MCS_3 MCS_3 MCS_3 MCS_3 MCS_3 MCS_3 MCS_3 MCS_3 MCS_3 MCS_4 MCS_4 MCS_4 MCS_4 MCS_5 MCS_5 MCS_5 MCS_5 MCS_5 MCS_5 MCS_5
There is slight difference between ZTE algorithms and those stipulated in the protocols, which is helpful to the service stability.
Confidential
MCS8
MCS7 Last MCS MCS6 MCS5 MCS4 MCS3 MCS2 MCS1
MCS8
MCS7 MCS6 MCS5 MCS4 MCS3 MCS2 MCS1
MCS8
MCS7 MCS6 MCS5 MCS4 MCS3 MCS2 MCS1
Confidential
When Last MCS and Command MCS are the same as those under LA, higher rate will be adopted in retransmission.
Confidential
The selection rule: when MCS are of the same type, select the MCS lower by one grade; MCS9 is an exception; the highest coding mode in retransmission is MCS6, but not MCS8.
Confidential
Example of LA application
PCU MS
Last MSC =
MCS9
NACK
command MSC =
MCS9 according to
MEAN_BEP and CV_BEP
command MSC =
MCS6
MCS6
MCS7 according to
MEAN_BEP and CV_BEP, so Re-trans MCS = MCS6
Note: according to BEP-based MCS selection algorithm and MCS selection algorithm in retransmission under LA, we can obtain the MCS used in retransmission under LA
Confidential
Example of IR application
Confidential
When MS or BTS doesnt have enough memory, they will notify each other to change to LA mode through Packet Ul/Dl Ack/Nack message.
Confidential
Related parameters
ZTE Default
DL default: enabled;
The UL switch is displayed on the interface, but the function can not be supported yet; the codes are being written.
Confidential
Chapter 17 Introduction to Parameters of Maximum UL/DL Users Allowed Chapter 18 Introduction to Relevant Poc Parameters Chapter 19 Quick Search for PS-related Radio Parameters
Confidential
One-phase access & two-phase access Introduction to EGPRS Packet Channel Request on CCCH Introduction to selection of access mode (twophase access is not forced) Related parameters
Confidential
RACH
EGPRS_PACKET_CHANNEL_REQUEST
AGCH
IMMEDATE_ASSIGNMENT_COMMAND
AGCH
PACKET_UPLINK_ASSIGNMENT
PACKET_RESOURCE_REQUEST
PACCH
PDTCH
DATA BLOCK
PACKET_UPLINK_ASSIGNMENT
PACCH
Phase 2 access
Phase 1 access
When one-phase access is adopted, the access delay is short; The signaling message of TBF establishment success rate is Packet Uplink Assignment. The two-phase access is carried out through sending packet resource request. If the request is not received by BSC, TBF establishment will fail. However, even though the first UL block is not received in one-phase access, MS still has several chances to send UL blocks and BSC has several chances to receive UL blocks. As long as the UL block is received by BSC within specific time (T3156, 5s) and number of blocks (N3104: (3*BS_CV_MAX+9)*number of channels), TBF establishment will succeed. Therefore, TBF establishment success rate is higher when one-phase access is used. In sum, choose not to use the forced two-phase access; decide TBF access mode according to the number of data blocks to be transmitted and whether the TBF type is signaling TBF.
Confidential
MS
PCU
RACH
EGPRS_PACKET_CHANNEL_REQUEST
Compared with the common Channel requests, this signaling carries more information about EGPRS support ability.
DATA BLOCK
PDTCH
Sending of a PACKET PAUSE CHANNEL REQUEST with establishment cause = 'Single block packet access' (note 2) message NOTE 1: The number of blocks shall be calculated assuming channel coding scheme MCS-1. NOTE 2: Upon sending the first CHANNEL REQUESTmessage the mobile station shall start timer T3204. If timer T3204 expires before an IMMEDIATE ASSIGNMENT message granting a single block period on an assigned packet uplink resource is received, the packet access procedure is aborted. If the mobile station receives an IMMEDIATE ASSIGNMENT message during the packet access procedure indicating a packet downlink assignment procedure, the mobile station shall ignore the message.
Confidential
Related parameters
ZTE Default
Yes
Support EGPRS packet channel EgprsPacket Yes/No request access program Chreq
No
Its suggested to set No to Two-phase access; When EDGE service is enabled, it suggested to Yes to Support EGPRS packet channel request access program.
Contents
Chapter 1 Introduction to Coding Mode Adjustment Algorithms Chapter 2 Introduction to Link Quality Control Function
Confidential
Confidential
Introduction to the support ability of GPRS & EDGE service windows Introduction to the selection of windows for ZTE EDGE service
Confidential
Confidential
ZTE choice
3GPP range
ZTE's WS
128
192
256
352
448
512
640
704
Contents
Chapter 1 Introduction to Coding Mode Adjustment Algorithms Chapter 2 Introduction to Link Quality Control Function Chapter 3 Introduction to UL TBF Access Mode Chapter 4 Introduction to Window in Data Transmission
Confidential
Chapter 5 Introduction to Functions, Timers and Counters Related to TBF Establishment & Release Chapter 6 Introduction to EDA and Algorithms of UL/DL Timeslot Allocation Decision Chapter 7 Introduction to Cell Reselection Algorithms Based on C1 & C2
Introduction to Functions, Timers and Counters Related to TBF Establishment & Release
T3168
Confidential
Confidential
T3168
Function: This timer is used for MS to decide when to stop waiting for the Packet UL Assignment message after it sends Packet Resource Request or PACKET CONTROL ACKNOWLEDGEMENT to apply for new TBF. Beginning: When applying for new TBF, MS sends PACKET RESOURCE REQUEST, which carries channel request message unit PACKET DOWNLINK ACK/NACK or PACKET CONTROL ACKNOWLEDGEMEN. The timer begins. Cessation: when PACKET UPLINK ASSIGNMENT is received, the timer ceases. Expiration: When Packet access flow is restarted or PACKET RESOURCE REQUEST / PACKET DOWNLINK ACK/NACK is retransmitted, the timer expires. At most 3 times of retransmission is allowed.
T3168 value has an impact on TBF establishment success rate. The smaller the value is set, the less time is left for TBF establishment, which means lower TBF establishment success rate, especially when radio environment is poor. Whereas, larger timer value leads to longer period for MS to judge TBF establishment failure, which means longer delay of packet access and lower system performance. Its suggested to set the timer a value between 1000ms2000ms according to the radio environment in the cells.
Confidential
Initial TBF establishment means : When uplink TBF is released, the CTRL_ACK in the last Packet Control Acknowledgement will indicate whether a new uplink TBF needs to be established immediately. Theoretically, enabling this function can avoid the situation that uplink TBF must be released before resource allocation requests are initiated again to establish uplink TBF. Thus, uplink throughput can be improved. As most MSs (BlackBerry, and fake phones)are not completely compatible with this function, those that do not fully support initial TBF establishment may not access network. It is not recommended to enable this function in versions before iBSC V6.20.200f.p005; As this function might be enabled in the field by mistake, it has been disabled on OMCR for iBSC V6.20.200f.p005 and later versions, but it can still be seen on OMCR.
Confidential
The function of extended uplink TBF is to immediate enable data transmission again, if new data needs to be transmitted when the countdown process starts. Otherwise, new uplink TBF can only be established after the present TBF is totally released. Besides, it helps to maintain the establishment of uplink TBF when the last block (CV=0) has been acknowledged by the network. In this way, this function helps to speed up the transmission of uplink data, the establishment of downlink TBF. According to data or signaling, the extended uplink TBF can be configured separately. It is suggested that both are enabled so as to improve uplink/downlink throughput capacity.
Packet UL Data Block(CV=0) Timer Packet Uplink Dummy Control Block Packet UL Data Block(CV=0xff) Packet UL Data Block(CV=0xff) Stop Timer
When no payload is contained in Uplink Data block the PCU starts the timer
PCU receive UL data block with payload before timer expired, Stop timer and return to normal transfer mode.
Packet UL Data Block(CV=0) Timer Packet Uplink Dummy Control Block When no payload is contained in Uplink Data block the PCU starts the timer again
Expiry
Packet UL Ack/Nack( FAI=1 ) Packet Control ACK
Rel
Rel
Confidential
Expiry Packet uplink ack/nack(FAI=1)) Packet Control ACK Rel Rel PCU release the TBF when Timer expired.
With uplink TBF, when the data block CV=0 is received, if there is no downlink TBF, then uplink delay time occurs. At this time, if there is no transmission of downlink data, downlink is established on PACCH, and uplink TBD is released. In other words, it does not need Polling or Paging to establish downlink TBF. When the uplink delay time is out according to the timer, the uplink TBF should be released. If the terminal and the system support extended uplink TBF, the timer ceases to be effective. So only one of the two functions can be chosen.
The configuration of time is relatively long, which helps to establish downlink TBF when there is no transmission of uplink data. However, this function is not as good as extended uplink TBF. That is, even if it is needed to transmit the uplink data during this time, the transmission will not happen until the Timer expires and the uplink TBF is newly established. This situation affects the uplink throughput. In summary, it is suggested that the default value of this parameter should be 1000ms.
Confidential
To avoid the repetitive release and re-establishment of downlink TBF, when downlink data TBF is established, the timer for downlink delay time is added. In this way, during the downlink delay time, if LLC frame of the upper layer needs to be transmitted, the downlink data is still transmitted by the original TBF, and it does not need to re-establish TBF. Therefore, the establishment of downlink TBF needs less time.
Re l
Packet DL Data Block Packet DL Data Block(FBI = 0) Packet DL Ack/Nack Packet DL Data Block(LLC DUMMY) Packet DL Ack/Nack
PC U
Tim er
Expir y
Re l
The bigger the parameter is configured, the longer TBF related resources (including TFI and timeslot) is reserved. If the configuration of the parameter is not big enough, it is not good for the discontinuous transmission of downlink data. Therefore, the configuration of this data should take the service load of the cell into full consideration. Under the circumstance that network resources are rich, the configuration of the time should be longer so as to reduce the time for establishing TBF and enhance the transmission data of downlink data.
Confidential
T3191/T3192/T3193
Timer
Function
T3191 is used to calculate the time before network can use the TFI again after it sends the final RLC data block. This timer helps the network side to confirm that the resources allocated to MS are invalid so as to reuse the TFI.
Start
After network sends a RLC data block whose Final Block Identifier (FBI) domain is 1
1.
Stop
T3191
T3192
T3193
When the final PACKET DOWNLINK ACK/NACK or PACKET CONTROL ACKNOWLEDGEMENT message is received; 2. It is restarted when network sends an RLC data block whose FBI=1. T3192 initializes the release of 1. In acknowledged mode, the 1.It restarts when the MS sends downlink TBF after the final data MS sends PACKET DOWNLINK ACK/NACK message block is received. PACKET DOWNLINK whose FBI domain is 1. This timer is used when MS receives ACK/NACK message 2. In unacknowledged mode, it restarts when all RLC data blocks. whose FBI domain is 1. MS sends PACKET CONTROL ACK message 2. In unacknowledged mode, MS as the response for the final RLC data block. sends the 3. It stops when MS receives PACKET DOWN PACKET CONTROL LINK ASSIGNMENT message. ACKNOWLEDGE 4. It stops when MS receives PACKET message as the TIME SLOT RECONFIGURE response for the final RLC data block. After network receives the final The final PACKET PACKET DOWN- LINK DOWNLINK ACK/NACK or 1. The network establishes a new downlink ACK/NACK from MS, the timer PACKET CONTROL TBF calculates the time before network ACKNOWLEDGE message is 2. It is restarted when the final PACKET reuses TFI. This timer helps the received. DOWNLINK ACK/NACK or PACKET network side to confirm that T3192 CONTROL ACKNOWLEDGEMENT message expires so as to reuse the TFI. is received
The higher the value of T3192, the longer time TBF resources will be reserved (including TFI and timeslot); lower value of T3192 will hinder the discontinuous transmission of downlink data. If T3192 has expired, but there is new downlink data in network, network will need to initiate paging or immediate assignment (if MS is in ready state), thus, downlink TBF establish will take a longer time. However, if T3192 does not expire when there is downlink data in network, network can send packet downlink assignment message to establish a new downlink TBF and shorten the time for TBF establishment. Therefore, the traffic of the current cell should be taken into full account for the setting of T3192/T3193, which should be set to a higher value when there is sufficient network resource, so as to shorten the time for TBF establishment and to improve data transmission rate. T3193 should be set to a higher value than T3192 In many sites, BlackBerry mobiles and some fake mobiles do not completely support T3192/T3193. Sometimes, network connection of these mobiles will be interrupted, or they can not access network, in this case, please set a lower value to T3192/T3193.
Confidential
ZTE Default
Definition: It configures the maximum duration for MS to implement non-DRX mode when MS enters packet idle mode from packet transmission mode. When MS enters packet idle mode from packet transmission mode, it needs to keep nonDRX mode for a period of time. When TBF is released, with the non-DRX mode, MS will monitor all the CCCH blocks and PCU will reserve the context related to MS. When PCCCH channel is not configured for the network, with the non-DRX mode, the Immediate assignment command can be sent on all PCH and AGCH channels and the process only lasts for dozens of ms. However, with the DRX mode,
MS can only monitor the paging messages within the paging group it belongs to. Then the message of immediate
assignment message is received by all the paging blocks and AGCH reserved blocks. Besides, the process for receiving the paging message lasts for a relatively long time (It is related to the configuration of some parameters like the number of multiframes of paging channel and the number of reserved blocks of AGCH). However, with the non-DRX mode, the power consumption of the battery is increased. In general, it is suggested that the configuration of the parameter should be larger, for example, 4 6s.
Confidential
N3101/N3103/N3105/T3169/T3195
MS
USF=n USF=n
BS S
MS
CV=0 CV=0 PACKET UPLINK ACK/NACK
BS S
MS
Data BlockRRBP Data BlockRRBP
BS S
. .
USF=n
N3101max
. .
. .
N3103max
Data BlockRRBP PACK DLLINK ACK/NACK
N3105max
RlacMac_T3169
RlcMac_T3195
RlcMac_T3169
Release USF and TFI
Release USF and TFI
Release TFI
Counter N3101
N3103
Description of functions For a USF, if the network receives correct data form a specified uplink block, N3101 clears for that TBF. If the number of losses in specified uplink block exceeds N3101(N3101max), then T3169 timer starts. The network uses the TFI and USF resources when T3169 stops. When the last PACKET UPLINK ACK/NACK message (FAI=1) of a TBF is sent, N 3103 is reset. If the PACKET CONTROL ACKNOWLEDGEMENT message is not received by the specified block of the network side, N3103 will have an increment and sent the PACKET UPLINK ACK/NACK again. If the counter N3103 exceed the limiting N3103max, the network will start T3169. The network uses TFI and USF resources when T3169 stops.
N3105
During the packet downlink transmission, BSS will configure RRBP domain on downlink RLC data block at set intervals so as to notify MS to send the RLC/MAC control message on corresponding uplink blocks (e.g., packet downlink confirmation message and the like). For a TBF, if the number of losses of RLC/MAC control message in specified uplink block exceeds N3105 (N3105max), T3195 starts. The network uses TFI resources when T3195 stops.
According to the definitions of N3101/N3103/N3105, it can be seen that if the configuration of these counters and Timers is a bit larger than the default value, TBF failure rate can be reduced to some extent.
Confidential
N3102
Parameter Name (CN)
N3102 N3102 N3102
ZTE Default
When MS detects the stall condition of the window (V(S) = V(A) + WS), MS will start T3182. When PACKET UPLINK ACK/NACK is received, which enables V(S) < V(A) + WS, T3182 stops. When T3182 expires, MS will subtract PanDec from N3102 , and will implement the abnormal release of the TBF and make it accessed and have a retry. When MS receives the PACKET UPLINK ACK/NACK message from the network which allows the increase of V(S) or V(A), MS will add PanInc to N3102. However, N3102 can not exceed the value defined by PanMax. When N31020, MS will implement the abnormal release of the TBF, and will trigger the cell reselection. If the configuration of PanDecPanInc and PanMax is 0, N3102 is invalid. The configuration of T3182 is fixed, that is 5s, and it can be changed.
In summary, the addition of PanInc and PanMax, or the subtraction of PanDec can make it less possible that when
MS does not receive Packet Uplink Ack, TBF is released in an abnormal way and the cell is reselected. On the other hand, when the send window stops, and can not send data, MS will occupy the radio resources for a relatively long time. In this way, the utilization ratio of resources is not high. If possible, it is suggested that it should be avoided that TBF is released in an abnormal way and the cell is reselected. Besides, the default value should be reserved.
Confidential
T3142/T3172
Timer Function Start Stop Timeout
Initiate new packet access request.
Wait for the time to initiate The timer is used during The timer expires new packet access after packet access on CCCH, after IMMEDIATE the receipt of an IMMEDIATE
T3142
ASSIGNMENT REJECT
T3172
Before T3172 expires, MS shall not initiate new packet access attempt in the same cell. It could attempt packet assess in the new cell after cell reselection succeeds.
The timer is started after the PACKET UPLINK MS returns to idle packet receipt of the PACFKET ASSIGNMENT message is mode. The packet access in ACCESS REJECT message, this cell is prohibited no more. received. which corresponds to one of But Channel Request message the latest three packet channel could not be sent as the paging request messages response before the receipt of Paging request message.
This is realized in V6.20.100e. The T3122 value is used in previous versions. Too high the setting may influence the overall access performance into the network, affecting customers satisfaction. Too low the setting tends to block further the channels when the radio channel is heavily loaded. ZTE default value is recommended.
Confidential
ZTE Default
10
In V6.20.100e and later versions, this parameter, which is fixed in the system of previous versions, is visible on the EMS interface. The ZTE default value 10 is used when this parameter is not enabled; It is used to define the single block assignment offset allowed in the first single block assignment in two phase access.
Confidential
ZTE Default
7
In V6.20.100e and later versions, this parameter, which is fixed in the system of previous versions, is visible on the EMS interface. The ZTE default value 7 is used when this parameter is not enabled; In some versions before V2, this parameter was enabled sometimes; It defines, when polling has not been received by MS after it was sent out by network, the maximum number of sending pollings This parameter should be set a higher value in order to improve the abnormal TBF failure rate.
Confidential
Relevant parameters
Category Parameter Name (CN) Parameter Name (EN)
BSC level BSC level BSC level BSC level BSC level BSC level BSC level BSC level BSC level Support signal extended uplink TBF TBF TBF release time of downlink transmission TBF TBF release timer MAX allowed number of continuous losses of uplink data blocks / Times of packet uplink ACK/NACK retries TFIUSF TFI and USF release timer MAX allowed number of RLC/MAC continuous losses of uplink RLC/MAC control message TBF TBF protect time when radio link failure Support TBF establish TBF Is the cell support TBF extendable uplink TBF Downlink delay time TBF Extend uplink TBF time
Parameter Code
ZTE Default
No 51 500 10 10 500 10 500 No
SIGNAL_EUTBF Yes/No T3193 T3191 N3101 N3103 T3169 N3105 T3195 TBF_EST 0 ~ 65535, 10ms 0 ~ 65535, 10ms 9 ~ 255 0 ~ 255 0 ~ 65535, 10ms 0 ~ 255 0 ~ 65535, 10ms Yes/No
Cell level
Cell level Cell level
EXT_UTBF
DLDelaytime ExtULTBFTime
Yes/No
500 ~ 4000, ms 0 ~ 3000, ms
Yes
2000 1500
Confidential
Relevant parameters
Parameter Name (CN) Parameter Name (EN)
N3102 decrease step
Category
Parameter code
PanDec
ZTE Default
Cell level N3102 Cell level N3102 Cell level N3102 Cell level
DRX DRX mode holding time T3192 Uplink delay time T3168
DrxTimeMax 0, 1, 2, 4, 8, 16, 32, 64, s 2 T3192 500, 1000, 1500, 0, 80, 120, 160, 200ms 500 1000 4
Confidential
Chapter 5 Introduction to Functions, Timers and Counters Related to TBF Establishment & Release Chapter 6 Introduction to EDA and Algorithms of UL/DL Timeslot Allocation Decision Chapter 7 Introduction to Cell Reselection Algorithms Based on C1 & C2 Chapter 8 Introduction to BVC & MS Flow Control Algorithms Chapter 9 Introduction to DTM & Paging Coordination Function Chapter 10 Introduction to NACC Function Chapter 11 Introduction to Suspend/Resume Functions Chapter 12 Introduction to Functions & Algorithms Influencing PDTCH Planning Chapter 13 Introduction to Parameters of PDTCHTCH Conversion Chapter 14 Introduction to PreemptiveTrans Bit Function Chapter 15 Introduction to CS Move Function Chapter 16 Introduction to Granularity for UL Block Allocation of GPRS Handset Chapter 17 Introduction to Parameters of Maximum UL/DL Users Allowed Chapter 18 Introduction to Relevant Poc Parameters Chapter 19 Quick Search for PS-related Radio Parameters
Confidential
Relevant parameters
Confidential
Advantages of EDA
DL PDC H0 PDC H1 PDC H2 PDC H3 PDC H4 PDC H5 PDC H6 PDC H7
USF
USF
UL
PDC H0
PDC H1
PDC H2
PDC H3
PDC H4
PDC H5
PDC H6
PDC H7
Dynamic Allocation
DL
PDC H0
PDC H1 USF
PDC H2
PDC H3
PDC H4
PDC H5
PDC H6
PDC H7
UL
PDC H0
PDC H1
PDC H2
PDC H3
PDC H4
PDC H5
PDC H6
PDC H7
As to dynamic allocation, each uplink PDCH should have a corresponding downlink PDCH to schedule it. Therefore, the number of uplink PDCH should be no more than that of downlink PDCH. In this case, some defects exist for those services which mainly center around uplink services (e.g., uploading, sending EMAIL and so on). It is supported by extend dynamic allocation that one downlink PDCH can schedule several uplink PDCH. In this case, it can better support the services which center around uplink services. It is suggested that this function should be enabled.
Confidential
In versions before V6.20.100f, only the algorithm involved in parameter Resource adjust threshold is available. This will be dealt with in the next page.
Confidential
Principle Example: multislot class 12 (4d + 4u < 5 Sum) EDA enabled Example: multislot class 12 (4d + 4u < 5 Sum) EDA disabled
1d + 1u
no adjust
1d + 1u
1d + 4u
3d + 2u
4d + 1u
no adjust
1d + 1u
3d + 2u
3d + 2u
4d + 1u
no adjust
Adjust opportunities
The periodic check is once per 5s. At present, when the link of TBF is set up, the uplink/downlink only have one chance to be adjusted. 5KBytes is easy to be satisfied, so it is suggested that the configuration of this parameter should be 5KBytes.
Confidential
Relevant parameters
Parameter Name (CN) Parameter Name (EN)
Parame ter Range & Unit Code
ExUpDynS Yes/No upport No
ZTE Default
Support extended uplink dynamic allocation (Cell Level) Resource adjust threshold Support extended uplink dynamic allocation (BSC Level)
No
ZTE Default
0: support;1:not 0 support.
Contents
Chapter 1 Introduction to Coding Mode Adjustment Algorithms Chapter 2 Introduction to Link Quality Control Function
Confidential
Chapter 3 Introduction to UL TBF Access Mode Chapter 4 Introduction to Window in Data Transmission
Chapter 5 Introduction to Functions, Timers and Counters Related to TBF Establishment & Release Chapter 6 Introduction to EDA and Algorithms of UL/DL Timeslot Allocation Decision Chapter 7 Introduction to Cell Reselection Algorithms Based on C1 & C2 Chapter 8 Introduction to BVC & MS Flow Control Algorithms Chapter 9 Introduction to DTM & Paging Coordination Function Chapter 10 Introduction to NACC Function Chapter 11 Introduction to Suspend/Resume Functions Chapter 12 Introduction to Functions & Algorithms Influencing PDTCH Planning Chapter 13 Introduction to Parameters of PDTCHTCH Conversion Chapter 14 Introduction to PreemptiveTrans Bit Function Chapter 15 Introduction to CS Move Function Chapter 16 Introduction to Granularity for UL Block Allocation of GPRS Handset Chapter 17 Introduction to Parameters of Maximum UL/DL Users Allowed Chapter 18 Introduction to Relevant Poc Parameters Chapter 19 Quick Search for PS-related Radio Parameters
Confidential
Relevant parameters
Confidential
Introduction to algorithms of cell reselection decision before and after the ready state
=RXLEV-RXLEV_ACCESS_MINMAX(MS_TXPWR_MAX_CCHP,O)+CRO-TEO*H(PT-T)+CRH When PT<640 or =RXLEV-RXLEV_ACCESS_MINMAX(MS_TXPWR_MAX_CCHP,O)-CRO+CRH When PT=640
For terminals which are not at ready state (that is at standby state of CS), under the same LA, reselection will not be triggered until C2 of the non-serving cell surpasses C2 of the serving cell for 5 seconds. After one reselection, if another reselection is needed within 15 seconds, C2 of the new cell should be larger than C2 of the serving cell by 5dB for 5 seconds. For terminals at ready state, reselection will not be triggered unless C2 of the new cell is at least larger than C2 of the serving cell CELL_RESELECT_ HYSTERESIS dB for 5 seconds. In these two situations, after the cell reselection, MS will not return to the original cell in the following 5 seconds.
Confidential
Confidential
Relevant parameters
ZTE Default
No No 0 4 1 0
attached reselection parameter indication Cell reselection parameter indication Reselection offset Cell reselecting hysteresis level Temporary offset Penalty time
ReselOffset 0~63, 2db ReselHysteresi 0~7, 2db s TemporaryOffse 0~7, 10db t PenaltyTime 0~31, 20s
Contents
Confidential
Chapter 1 Introduction to Coding Mode Adjustment Algorithms Chapter 2 Introduction to Link Quality Control Function Chapter 3 Introduction to UL TBF Access Mode Chapter 4 Introduction to Window in Data Transmission Chapter 5 Introduction to Functions, Timers and Counters Related to TBF Establishment & Release Chapter 6 Introduction to EDA and Algorithms of UL/DL Timeslot Allocation Decision Chapter 7 Introduction to Cell Reselection Algorithms Based on C1 & C2 Chapter 8 Introduction to BVC & MS Flow Control Algorithms Chapter 9 Introduction to DTM & Paging Coordination Function Chapter 10 Introduction to NACC Function Chapter 11 Introduction to Suspend/Resume Functions Chapter 12 Introduction to Functions & Algorithms Influencing PDTCH Planning Chapter 13 Introduction to Parameters of PDTCHTCH Conversion Chapter 14 Introduction to PreemptiveTrans Bit Function Chapter 15 Introduction to CS Move Function Chapter 16 Introduction to Granularity for UL Block Allocation of GPRS Handset Chapter 17 Introduction to Parameters of Maximum UL/DL Users Allowed Chapter 18 Introduction to Relevant Poc Parameters Chapter 19 Quick Search for PS-related Radio Parameters
The relation between BVC and MS flow control Introduction to flow control algorithm Introduction to flow control mode Relevant parameters
Confidential
The transmission of downlink BSSGP DL_UNITDATA PDU from SGSN is controlled by BSS, which uses flow control to adjust leak bucket so that the memory data in it will be reduced to the maximum without interrupting downlink TBF transmission. More memory data in leak bucket consumes resource and will be discarded when the life circle of this memory data expires, which is informed to SGSN by LLC_DISCARDED PDU and will trigger off data retransmission at Gb interface. An LLC PDU could be sent out, only after MS flow control and BVC flow control are implemented by SGSN. BVC leakage ratio is the sum of all MS leakage ratios within the cell. It is recommended that MS flow control and BVC flow control be enabled simultaneously.
Confidential
B*=B+L(p)-(Tc-Tp)R
B*<Lp?
B=L(p)
no no B=B* Tp=Tc
B*>Bmax?
yes
Confidential
Confidential
Relevant parameters
Parameter Parameter ZTE Parameter Name (EN) Range & Unit Name (CN) Code Default
BVC MS BVC MS BVC flow control period MS flow control period BVC flow control supported MS flow control supported Flow control mode Parameter of Flow control 1 mode 1 Parameter of Flow control 2 mode 2 BVC flow control R MIN BVCR value CellFcPer 0 ~ 65535, 10ms MsFcPer 0 ~ 65535, 10ms BVCFlowCtrl Yes/No MSFlowCtrl Yes/No FlowCtrlMode 1 ~ 3 FlowCtrlMode1P 1 ~ 100 ara FlowCtrlMode2P 10 ~ 1000, ara 100bps BVCFlowCtrlRM 10 ~ 300, 100bps in MSFlowCtrlRMi MSR MS flow control R MIN value 10 ~ 300, 100bps n 3000 3000 Yes No 1 1 214 80
80
Contents
Chapter 1 Introduction to Coding Mode Adjustment Algorithms Chapter 2 Introduction to Link Quality Control Function Chapter 3 Introduction to UL TBF Access Mode Chapter 4 Introduction to Window in Data Transmission Chapter 5 Introduction to Functions, Timers and Counters Related to TBF Establishment & Release Chapter 6 Introduction to EDA and Algorithms of UL/DL Timeslot Allocation Decision Chapter 7 Introduction to Cell Reselection Algorithms Based on C1 & C2 Chapter 8 Introduction to BVC & MS Flow Control Algorithms Chapter 9 Introduction to DTM & Paging Coordination Function Chapter 10 Introduction to NACC Function Chapter 11 Introduction to Suspend/Resume Functions Chapter 12 Introduction to Functions & Algorithms Influencing PDTCH Planning Chapter 13 Introduction to Parameters of PDTCHTCH Conversion Chapter 14 Introduction to PreemptiveTrans Bit Function Chapter 15 Introduction to CS Move Function Chapter 16 Introduction to Granularity for UL Block Allocation of GPRS Handset Chapter 17 Introduction to Parameters of Maximum UL/DL Users Allowed Chapter 18 Introduction to Relevant Poc Parameters Chapter 19 Quick Search for PS-related Radio Parameters
Confidential
Confidential
Supported by DTM function, both CS and PS could be conducted simultaneously in MS type A. DTM function consists of two modes: GTTP and TBF. In CS, if there is few PS signaling needs to be transmitted, it will be transmitted in GTTP message on SACCH. If there is a large amount of packet data, it will need to establish TBF and allocated packet channel to carry out transmission. Maximum number of GTTP Lapdm frame: it defines the maximum number of GTTP Lapdm frames when the TCH allocated in CS finishes PS signaling interaction service; the value 3 could satisfy common data services such as RAU, and ATTACH, and etc.; if it is set too high, user perception will be influenced a little. For requirements that could not be met by maximum number of GTTP Lapdm, TBF is the only way out. In current V6.20 series version (001 series and 100 series), handover between data service and CS under DTM mode has been possible, so DTM function could be enabled.
Confidential
If there is no Gs interface, MS type B will not monitor CCCH when it is in data. In this case, if paging coordination function is enabled, BSC will check whether this MS is in PS service when it receives CS paging messages from A interface. If the MS is in PS service, it will send the CS paging message to MS on the PDTCH the MS is transmitting data so as to make the MS responds to the paging and suspend the ongoing data service to conduct CS. For MS type A, DTM function could be enabled so that PS and CS could be conducted simultaneously.
Confidential
Relevant parameters
Parameter Code
DTMSupport PagCoordination GttpLapdmNum
Contents
Confidential
Chapter 1 Introduction to Coding Mode Adjustment Algorithms Chapter 2 Introduction to Link Quality Control Function Chapter 3 Introduction to UL TBF Access Mode Chapter 4 Introduction to Window in Data Transmission Chapter 5 Introduction to Functions, Timers and Counters Related to TBF Establishment & Release Chapter 6 Introduction to EDA and Algorithms of UL/DL Timeslot Allocation Decision Chapter 7 Introduction to Cell Reselection Algorithms Based on C1 & C2 Chapter 8 Introduction to BVC & MS Flow Control Algorithms Chapter 9 Introduction to DTM & Paging Coordination Function Chapter 10 Introduction to NACC Function Chapter 11 Introduction to Suspend/Resume Functions Chapter 12 Introduction to Functions & Algorithms Influencing PDTCH Planning Chapter 13 Introduction to Parameters of PDTCHTCH Conversion Chapter 14 Introduction to PreemptiveTrans Bit Function Chapter 15 Introduction to CS Move Function Chapter 16 Introduction to Granularity for UL Block Allocation of GPRS Handset Chapter 17 Introduction to Parameters of Maximum UL/DL Users Allowed Chapter 18 Introduction to Relevant Poc Parameters Chapter 19 Quick Search for PS-related Radio Parameters
Confidential
Outside NACC is applicable to V6.20.100e and above. LLC frame transfer function in the same CMP module is applicable to V6.20.200e and above. LLC frame transfer function in different CMP modules is not supported temporarily.
Confidential
Range
ZTE Default
Not support NACC No
Not Support NACC;Support NACC, not NACCSuppor LLC Frame Transfer;Support NACC and t LLC Frame Transfer RIMSupport Yes/No
Range
ZTE Default
No No No
Confidential
ZTE Defaul t
No
Confidential
Parameter Name(EN)
PSI status supported
Parameter code
PsiStatInd
Range
Yes/No Yes/No
ZTE Default
No No
Confidential
When MS meets the condition for cell reselections, and supports CCN mode, it will transmit on PACCH the PACKET CELL CHANGE NOTIFICATION message, which contains BCCH and BSIC of the target cell for cell reselection. After received this message, BSC will send PACKET NEIGHBOUR CELL DATA message, which contains system message in the needed target cell during cell reselection. Then, BSC will send PACKET CELL CHANGE CONTINUE message to inform MS to continue cell reselection.
Confidential
Comparison between the signaling flow of MScontrolled cell retransmission and that under NACC
According to the above figure, after NACC is enabled, in data transmission mode, network provides the SI1SI3 and SI13 of the target cell of MS on PACCH, so as to reduce the procedures for MS to monitor these system messages of the target cell in cell reselection process (NC0 mode). Thus, the time of interrupted data transmission caused by cell reselection is reduced.
Confidential
Introduction to Timers and Counters related to obtaining inter-BSC NACC neighbor cell (P)SI
TRIR: this timer is started when service BSC requires system message from target BSC, and is stopped when service BSC receives system message from target BSC. If this timer expires, message request flow will be regarded as failed, and service BSC will initiate another message request; TRI: this timer is started when target BSC waits for ACK response after it sends system message to service BSC, and is stopped when target BSC receives the ACK response from service BSC. TRIAE: this timer is started when service BSC waits for ACK response, after it initiates RAN Information Application Error flow when receiving incorrect system message. It is stopped when service BSC receives ACK response from target BSC.
As the minimum value for these three Timers is 5s, even though the maximum RIMRetryTimes is set as 1, the reselection process will cost a long time; therefore, it would be better for MS to restart cell reselection when it discovers another suitable candidate cell that satisfy the condition for cell reselection after the above timer expires. This helps to select the best candidate cell. RIMRetryTimes is recommended to be set as 0.
Parameter Name(EN)
RIM Retry times RIR timer RI timer RIAE timer
Parameter code
RIMRetryTimes TRIR TRI TRIAE 0~3
Range
50 ~ 300,100ms 50 ~ 300,100ms 50 ~ 300,100ms
ZTE Default
0 50 50 50
Confidential
Parameter Name(EN)
Paramete r code
Range
NC0, NC1, NC2
ZTE Default
NC0
Contents
Chapter 1 Introduction to Coding Mode Adjustment Algorithms Chapter 2 Introduction to Link Quality Control Function Chapter 3 Introduction to UL TBF Access Mode Chapter 4 Introduction to Window in Data Transmission Chapter 5 Introduction to Functions, Timers and Counters Related to TBF Establishment & Release Chapter 6 Introduction to EDA and Algorithms of UL/DL Timeslot Allocation Decision Chapter 7 Introduction to Cell Reselection Algorithms Based on C1 & C2 Chapter 8 Introduction to BVC & MS Flow Control Algorithms Chapter 9 Introduction to DTM & Paging Coordination Function Chapter 10 Introduction to NACC Function Chapter 11 Introduction to Suspend/Resume Functions Chapter 12 Introduction to Functions & Algorithms Influencing PDTCH Planning Chapter 13 Introduction to Parameters of PDTCHTCH Conversion Chapter 14 Introduction to PreemptiveTrans Bit Function Chapter 15 Introduction to CS Move Function Chapter 16 Introduction to Granularity for UL Block Allocation of GPRS Handset Chapter 17 Introduction to Parameters of Maximum UL/DL Users Allowed Chapter 18 Introduction to Relevant Poc Parameters Chapter 19 Quick Search for PS-related Radio Parameters
Confidential
The signaling flow of data service resumption through RAU The signaling flow of data service resumption through Resume Advantages of Suspend/Resume Functions and their implementation methods in ZTE Relevant Parameters
Confidential
In the FTP downloading process, MS initiates CM service request, which is reflected in MS sending short messages MS initiates GPRSSuspension request. From the specific suspension cause, it could be learnt that the suspension is caused by MS initiating short message service.
Confidential
In the FTP downloading process, MS initiates CM service request, which is reflected in MS sending short messages
MS initiates GPRSSuspension request. It could be learnt from the specific suspension cause that the suspension is caused by MS initiating short message service.
After MS receives the channel release, to which the RR cause is GPRSResumption, it will initiate uplink channel request to establish TBG and resume GPRS service.
After CM service is ended, system will sends channel release to MS. It could be learnt from the specific RR cause that the resume from PCU to SGSM has been responded normally. And system will inform MS to conduct GPRS resume through channel release.
Confidential
Confidential
Relevant parameters
MAX times of resume retry ResumeMax Suspend retry time Resume retry time Resume set option BssgpT3 BssgpT4 ResumeSetOpt
Contents
Confidential
Chapter 1 Introduction to Coding Mode Adjustment Algorithms Chapter 2 Introduction to Link Quality Control Function Chapter 3 Introduction to UL TBF Access Mode Chapter 4 Introduction to Window in Data Transmission Chapter 5 Introduction to Functions, Timers and Counters Related to TBF Establishment & Release Chapter 6 Introduction to EDA and Algorithms of UL/DL Timeslot Allocation Decision Chapter 7 Introduction to Cell Reselection Algorithms Based on C1 & C2 Chapter 8 Introduction to BVC & MS Flow Control Algorithms Chapter 9 Introduction to DTM & Paging Coordination Function Chapter 10 Introduction to NACC Function Chapter 11 Introduction to Suspend/Resume Functions Chapter 12 Introduction to Functions & Algorithms Influencing PDTCH Planning Chapter 13 Introduction to Parameters of PDTCHTCH Conversion Chapter 14 Introduction to PreemptiveTrans Bit Function Chapter 15 Introduction to CS Move Function Chapter 16 Introduction to Granularity for UL Block Allocation of GPRS Handset Chapter 17 Introduction to Parameters of Maximum UL/DL Users Allowed Chapter 18 Introduction to Relevant Poc Parameters Chapter 19 Quick Search for PS-related Radio Parameters
Relevant parameters
Confidential
TCH allocation strategy-from the two ends to the middle according to timeslot number
For V6.00.100a series, all sub-versions of 6.10, and all sub-versions of 6.20, one algorithm is added for the allocation strategy of TCH. According to this algorithm, TCH is allocated on basis of the timeslot number from high to low, that is, 0/7>1/6>2/5>3/4. TSID TsChannelComb TSID Group B TsChannelComb TSID Group C TsChannelComb Group A 0 14 0 0 0 0 1 14 1 0 1 0 2 0 2 0 2 0 3 0 3 0 3 14 4 0 4 0 4 14 5 0 5 0 5 0 6 0 6 14 6 0 7 0 7 14 7 0
If this algorithm is added, it can be seen that strategy C is the best among the three planning methods of PDTCH, that is, A, B, and C. The reasons for this are as follows
For strategy A, when the voice service occupies the third or fourth timeslot, the data service can not occupy 4 continuous Tsl. For strategy B, when the voice service occupies the third or fourth timeslot, the data service can not occupy 4 continuous Tsl. For strategy C, when the voice service occupies the fifth timeslot, the data service can not occupy 4 continuous Tsl.
Confidential
PDCHPrecedence function
If there is the parameter of PDCHPrecedence in timeslot parameters, it indicates that the function of absolute preference of PS service is added to this version. If this parameter is enabled (The configuration is Yes.), data service can compete for the channel which is being used for voice service. However, it is not the other way round. At present, all GSM networks give priority to voice service, so this funciton has not been used in the work field yet. However, some aspects need to be paid attention to when static PDTCH is configured or static PDTCH is changed into dynamic PDTCH: If the parameter TsChannelComb of timeslot level is manually modified as the type of PDTCH+PACCH+PTCCH, the parameter of PDCHPrecedence will be automatically modified as Yes. However, if it is modified by batch operation or the Template (NetworkPlan) is used to import directly, PDCHPrecedence of the static PDTCH channel must be configured as Yes.
If the dynamic channel is not configured as absolute preference for PS service, PDCHPrecedence
must be configred as No when static PDTCH is changed into dynamic channel. The purpose for this is to give absolute priority to CS service.
Confidential
EDGE exclusion(EE)
EDGE preference(EP)
Confidential
Note: The following figure is supposed to help to understand these 2 parameters, and it does not take into consideration the multislot processing capability of MS.
1. EDGE service occupy EDGE prior PDCH as EDGE user quotas is below V1.
2. EDGE service occupy GPRS prior PDCH as EDGE user quotas is over V1.
3. EDGE service move back to EDGE prior PDCH as GPRS user quotas is over V2. V1= SfPreferBusyThs; V2=OpPreferBusyThs
Confidential
For SDR, the capacity planning for each BSC HR should not exceed 15000Erl.
The default value of HRTsPercentage is smaller than 50%, which limits the largest usage ratio of HR. So it should be adjusted flexibly according to the actual application of HR.
Confidential
Confidential
Relevant parameters
Parameter Name (CN)
PSCS PDCH
Parameter Code
PSPrmpCSSupport
PDCH Priority Support of subscriber occupying other preference channel Support of PS subscriber moving out of other preference channel Congeneric service threshold for PS-moving Un-congeneric service threshold for PS-moving PS
PDCHPrecedence HybridOccuSupp
AllowPsMove
Yes/No
No
SfPreferBusyThs OpPreferBusyThs
100 0 900
Contents
Chapter 1 Introduction to Coding Mode Adjustment Algorithms Chapter 2 Introduction to Link Quality Control Function Chapter 3 Introduction to UL TBF Access Mode Chapter 4 Introduction to Window in Data Transmission
Confidential
Chapter 5 Introduction to Functions, Timers and Counters Related to TBF Establishment & Release Chapter 6 Introduction to EDA and Algorithms of UL/DL Timeslot Allocation Decision Chapter 7 Introduction to Cell Reselection Algorithms Based on C1 & C2 Chapter 8 Introduction to BVC & MS Flow Control Algorithms Chapter 9 Introduction to DTM & Paging Coordination Function Chapter 10 Introduction to NACC Function Chapter 11 Introduction to Suspend/Resume Functions Chapter 12 Introduction to Functions & Algorithms Influencing PDTCH Planning Chapter 13 Introduction to Parameters of PDTCHTCH Conversion Chapter 14 Introduction to PreemptiveTrans Bit Function Chapter 15 Introduction to CS Move Function Chapter 16 Introduction to Granularity for UL Block Allocation of GPRS Handset Chapter 17 Introduction to Parameters of Maximum UL/DL Users Allowed Chapter 18 Introduction to Relevant Poc Parameters Chapter 19 Quick Search for PS-related Radio Parameters
Confidential
Parameter Code
ZTE Default
2
300
For cells of small sites, if the static PDTCH is not configured, CsChansThs should be configured as 0, if possible. In this way, it can be avoided that the normal data service can not carry on when the voice service is busy. As to PSRelDelay, if possible, the dynamic channel should keep the type of TCH since priority is given to the voice service. Besides, since the minimum value of this Timer is 20s, it is suggested that 20s should be the minimum value.
Contents
Chapter 1 Introduction to Coding Mode Adjustment Algorithms Chapter 2 Introduction to Link Quality Control Function Chapter 3 Introduction to UL TBF Access Mode Chapter 4 Introduction to Window in Data Transmission
Confidential
Chapter 5 Introduction to Functions, Timers and Counters Related to TBF Establishment & Release Chapter 6 Introduction to EDA and Algorithms of UL/DL Timeslot Allocation Decision Chapter 7 Introduction to Cell Reselection Algorithms Based on C1 & C2 Chapter 8 Introduction to BVC & MS Flow Control Algorithms Chapter 9 Introduction to DTM & Paging Coordination Function Chapter 10 Introduction to NACC Function Chapter 11 Introduction to Suspend/Resume Functions Chapter 12 Introduction to Functions & Algorithms Influencing PDTCH Planning Chapter 13 Introduction to Parameters of PDTCHTCH Conversion Chapter 14 Introduction to PreemptiveTrans Bit Function Chapter 15 Introduction to CS Move Function Chapter 16 Introduction to Granularity for UL Block Allocation of GPRS Handset Chapter 17 Introduction to Parameters of Maximum UL/DL Users Allowed Chapter 18 Introduction to Relevant Poc Parameters Chapter 19 Quick Search for PS-related Radio Parameters
Confidential
Parameter Name ZTE Parameter Code Range & Unit (EN) Default
Take "Preemptivetrans bit" function PreemptiveRans Yes/No No
of
PACKET UPLINK ACK/NACK message, the network can indicate whether the handset can send the RLC data of PENDING-ACK when there are no NACK state data and no new RLC data blocks need to be sent, or when the send window is full. If the function of preemptiveTrans bit is enabled, the throughput can be improved to some extent.
Contents
Chapter 1 Introduction to Coding Mode Adjustment Algorithms Chapter 2 Introduction to Link Quality Control Function Chapter 3 Introduction to UL TBF Access Mode Chapter 4 Introduction to Window in Data Transmission
Confidential
Chapter 5 Introduction to Functions, Timers and Counters Related to TBF Establishment & Release
Chapter 6 Introduction to EDA and Algorithms of UL/DL Timeslot Allocation Decision Chapter 7 Introduction to Cell Reselection Algorithms Based on C1 & C2
Chapter 8 Introduction to BVC & MS Flow Control Algorithms Chapter 9 Introduction to DTM & Paging Coordination Function Chapter 10 Introduction to NACC Function Chapter 11 Introduction to Suspend/Resume Functions Chapter 12 Introduction to Functions & Algorithms Influencing PDTCH Planning Chapter 13 Introduction to Parameters of PDTCHTCH Conversion Chapter 14 Introduction to PreemptiveTrans Bit Function Chapter 15 Introduction to CS Move Function Chapter 16 Introduction to Granularity for UL Block Allocation of GPRS Handset Chapter 17 Introduction to Parameters of Maximum UL/DL Users Allowed Chapter 18 Introduction to Relevant Poc Parameters Chapter 19 Quick Search for PS-related Radio Parameters
Confidential
ZTE Default
No
In theory, if this function is enabled, it can largely prevent subscribers of voice service from occupying the dynamic PDTCH channel. However, at present, if this function is enabled, the indicators like handover and call drop will be greatly influenced. So it is suggested that it should not be enabled.
Contents
Chapter 1 Introduction to Coding Mode Adjustment Algorithms Chapter 2 Introduction to Link Quality Control Function Chapter 3 Introduction to UL TBF Access Mode Chapter 4 Introduction to Window in Data Transmission
Confidential
Chapter 5 Introduction to Functions, Timers and Counters Related to TBF Establishment & Release Chapter 6 Introduction to EDA and Algorithms of UL/DL Timeslot Allocation Decision Chapter 7 Introduction to Cell Reselection Algorithms Based on C1 & C2 Chapter 8 Introduction to BVC & MS Flow Control Algorithms Chapter 9 Introduction to DTM & Paging Coordination Function
Confidential
ZTE Defaul t
0~1 USFGranularit (0: uplink block allocation 0 y granularity is 1; 1: uplink block allocation granularity is 4)
It is sent to the handset in PACKET UPLINK ASSIGNMENT message. It indicates that when the cell adopts the media control method of dynamic allocation, the network will allocate uplink block granularity to the GPRS handset. A smaller configuration can avoid the waste of resources. A smaller configuration can make the allocation of resources more flexible. If 4 granularities, which are not continuous, are chosen to be allocated at one time, the allocation will fail. Therefore, it is suggested that the configuration of this parameter should be 0, and each time one granularity should be allocated to subscribers.
Contents
Chapter 1 Introduction to Coding Mode Adjustment Algorithms Chapter 2 Introduction to Link Quality Control Function
Chapter 3 Introduction to UL TBF Access Mode Chapter 4 Introduction to Window in Data Transmission
Confidential
Chapter 5 Introduction to Functions, Timers and Counters Related to TBF Establishment & Release Chapter 6 Introduction to EDA and Algorithms of UL/DL Timeslot Allocation Decision Chapter 7 Introduction to Cell Reselection Algorithms Based on C1 & C2 Chapter 8 Introduction to BVC & MS Flow Control Algorithms Chapter 9 Introduction to DTM & Paging Coordination Function
Confidential
ZTE Default
4
MaxPsUserPerTs_1
2 ~ 16
To guarantee that there is no artificial constraint on USF high limit and TFI high limit on a PDCH. So these two parameters are open. A low rate can be allowed. However, it can not be allowed that resources are available but subscribers can not have the access because of human factors. It is suggested that the configuration of uplink is 7, and the configuration of downlink is 16 or a little bit lower.
Contents
Chapter 1 Introduction to Coding Mode Adjustment Algorithms Chapter 2 Introduction to Link Quality Control Function
Confidential
Chapter 3 Introduction to UL TBF Access Mode Chapter 4 Introduction to Window in Data Transmission
Chapter 5 Introduction to Functions, Timers and Counters Related to TBF Establishment & Release Chapter 6 Introduction to EDA and Algorithms of UL/DL Timeslot Allocation Decision Chapter 7 Introduction to Cell Reselection Algorithms Based on C1 & C2 Chapter 8 Introduction to BVC & MS Flow Control Algorithms Chapter 9 Introduction to DTM & Paging Coordination Function Chapter 10 Introduction to NACC Function Chapter 11 Introduction to Suspend/Resume Functions Chapter 12 Introduction to Functions & Algorithms Influencing PDTCH Planning Chapter 13 Introduction to Parameters of PDTCHTCH Conversion Chapter 14 Introduction to PreemptiveTrans Bit Function Chapter 15 Introduction to CS Move Function Chapter 16 Introduction to Granularity for UL Block Allocation of GPRS Handset Chapter 17 Introduction to Parameters of Maximum UL/DL Users Allowed Chapter 18 Introduction to Relevant Poc Parameters Chapter 19 Quick Search for PS-related Radio Parameters
Confidential
Confidential
Relevant parameters
Category Parameter Name (CN) Parameter Name (EN) Parameter code Range & Unit ZTE Default
BSC level
BSC level
BSC level
BSC level
Optimized PoC POCSUPPORT Yes/No service support Maximal users of POC service on PSCAPATHS_U 26 shared PS channel L 0 Maximal users of POC service on PSCAPATHS_D 26 shared PS channel L 1 Highest coding CS1CS2CS3 scheme of POC PocAttSelt_0 CS4 service in GPRS Highest coding scheme of POC PocAttSelt_1 MCS1 ~ MCS9 service in EGPRS Maximal resource POCSrcThs 0~100,% for POC service
No
CS3
MCS6 50
Contents
Chapter 1 Introduction to Coding Mode Adjustment Algorithms Chapter 2 Introduction to Link Quality Control Function Chapter 3 Introduction to UL TBF Access Mode Chapter 4 Introduction to Window in Data Transmission
Confidential
Chapter 5 Introduction to Functions, Timers and Counters Related to TBF Establishment & Release Chapter 6 Introduction to EDA and Algorithms of UL/DL Timeslot Allocation Decision Chapter 7 Introduction to Cell Reselection Algorithms Based on C1 & C2 Chapter 8 Introduction to BVC & MS Flow Control Algorithms Chapter 9 Introduction to DTM & Paging Coordination Function Chapter 10 Introduction to NACC Function Chapter 11 Introduction to Suspend/Resume Functions Chapter 12 Introduction to Functions & Algorithms Influencing PDTCH Planning Chapter 13 Introduction to Parameters of PDTCHTCH Conversion Chapter 14 Introduction to PreemptiveTrans Bit Function Chapter 15 Introduction to CS Move Function Chapter 16 Introduction to Granularity for UL Block Allocation of GPRS Handset Chapter 17 Introduction to Parameters of Maximum UL/DL Users Allowed Chapter 18 Introduction to Relevant Poc Parameters Chapter 19 Quick Search for PS-related Radio Parameters
Confidential