Вы находитесь на странице: 1из 67

WCDMA/UMTS

Radio Resource Management


- parts 2 and 3 -

Luis Guilherme Uzeda Garcia


November 2005

Confidential
Chapters Covered in these 3
presentations:
Completely: 1, 3 and 9
Partially: 4,5,6,10
Still worth of attention:
6,10,11,12

L1
HSDPA Performan
Detailed
physical ce
layer info
Packet
Schedulin
g

Confidential
Outline
Introduction to RRM
Load Control
Admission Control
Packet Scheduler
Power Control
Handover Control
Resource Manager

Confidential
Radio Resource Management
Radio Resource Management (RRM) is responsible for
efficient utilization of the air interface resources

Target of RRM is to
Cell
optimize radio
Capacity performance:
Optimization
and Tailoring Ensure planned coverage

Ensure requested link


quality
Cell Coverage Link Quality
Ensure planned capacity

Confidential
Radio Resource Management
RRM logical model split in network architecture
UE
UE NodeBB
Node DRNC
DRNC

AC RM
Uu LC
PC
Iub
PC LC
SRNC
SRNC
AC : Admission Control Iur
PS: Packet Scheduler AC RM
LC: Load Control
PC
RM: Resource Manager LC
Iub LC PS
PC: Power Control Iu
HC: Handover Control HC PC
Core
Network

Confidential
UTRAN Architecture
Consists of one or more Radio Network Sub-
Systems (RNS)
RNC (Radio Network Controller)
Serving RNC (SRNC) for one UE is the RNC that terminates both the Iu link
for the transport of user data and the corresponding RANAP signaling to/from
the CN. The SRNC also terminates the RRC that is a signaling protocol
between UE and UTRAN. It performs the L2 processing to/from the radio
interface and the basic RRM operations, such as map RAB parameters into air
interface transport channel parameters. HO and outer loop PC are executed
in the SRNC . One UE connected to UTRAN has only one SRNC and one RRC
connection.
Drift RNC (DRNC) is any RNC, other than SRNC that controls cells used by
the UE. If needed, the DRNC may perform micro diversity combining and
splitting (softer HO). It does not perform L2 processing of the user data, but
routes the data transparently between the Iub and Iur interfaces, except
when UE is using a common or shared TrCH (transport channel). One UE may
have several DRNCs
Node B
performs the air interface L1 processing (channel coding and interleaving,
rate adaptation, TrCH multiplexing, spreading, scrambling, etc.). In terms of
RRM it also performs inner-loop PC and fast LC
With HSDPA and E-DCH new functionality is moved to Node B !

Confidential
RRM control processes
Admission control: Power Control
Performs the admission control Closed loop PC compares the
for new bearers to enter the measured SIR with SIR-target and
network. accordingly transmits an up/down
PC command at 0.667 ms interval
Predicts the interference caused Open loop PC estimates the
by the bearer and checks
whether there is room for it. needed power based on pathloss +
interference measurements
Initial power allocation for the (RACH/FACH).
new admitted link Outer loop PC sets the SIR target
Packet Scheduler for the fast closed loop PC

Scheduling packets to the radio Handover Control


interface (UL/DL) Soft (intra-frequency)
handovers: softer between cells
Load Control: within one BS, intra-RNC soft, inter-
Takes care of radio network RNC soft
stability
Inter-frequency (hard)
Gathers interference information handovers: Intra-BS, Intra-RNC,
and produces a load vector
Inter-RNC (-MSC)
Resource manager
Inter-system handovers: WCDMA
manages the physical resources <-> GSM
of RAN and maintains the code
allocation
Confidential
Radio Resource Management
RRM logical model
AC : Admission Control
PS: Packet Scheduler
LC: Load Control
RM: Resource Manager
AC PC: Power Control
PS
HC: Handover Control
LC Cell
RM based
functions Deal with radio
resources of one cell
at the same time.
PC
HC RRC
connection Deal with the radio
based resources of one
functions connection

Confidential
Radio Resource Management
An overview
Iu

RAB setup/modify/release request

Active set Packet Scheduler


Handover Control informationAdmission ControlRB information

Active state mobility control


Load change Load information Radio resource
estimation scheduling
RAB admission
Target BLER,
decision BER and SIR Power Control
Producing L2
parameters UL Outer loop
Producing TFS Load change power control
Resource request
Resource information DL power information
Load information
allocation
Resource Manager Load Control
Radio resource information
Code allocation Producing of
Transport resource allocation load information

Confidential
Load Control
Introduction to RRM
Load Control Load Control (LC):
The role of Load Control is to guard
Admission Control that the system is not overloaded
and remains stable; LC
Packet Scheduler continuously updates the load
information of cells controlled by
Power Control RNC and provides this
information to the AC and PS for
Handover Control radio resource controlling
purposes. In overload situations,
Resource Manager the LC
performs the recovering actions
by using the functionalities of PC,
AC, PS and HC

Confidential
Measurement of Air Interface
Load

Confidential
Uplink Load Estimates: 2
Approaches (1/2)
Wideband received power based RRM
PN Noise rise - 1
UL 1
I total Noise rise
Measure
Measuretotal
totalwideband
wideband
received
receivedpower
powerItotal
Itotal
Throughput based RRM
N N
1
UL 1 i L
j 1
j 1 i j 1 1
W
Eb / N 0 j R j j
Calculate
Calculatesum
sumof of
the
thebit
bitrates
ratesininaacell
cell

Confidential
Uplink Load Estimates: 2
Approaches (2/2)
Wideband power based gives soft capacity & constant co

i = other-cell to own-cell interference ratio

Confidential
Load Control
Definition of Non-controllable load
It is insufficient to divide the load between RT and NRT;
Also interference coming from surrounding cells must be
taken into account:
Hence traffic is divided into controllable and non-
controllable load.

Total Non-controllable
load load = Load of RT users in own cell +
load from other-cell users +
other system noise +
load of NRT users operating at minimum bit rate

Controllable load = load of NRT users in own cell that can


be controlled.

Confidential
Wideband power based RRM:
AC,LC,PS

UPLINK ADMISSION DECISION: RAB request is accepted if the estimated non-controllable UL load keeps
below the planned PrxTarget load threshold and the current total load below the overload threshold.
DOWNLINK ADMISSION DECISION: RAB request is accepted if the estimated non-controllable DL load
keeps below the planned PtxTarget load threshold and the current total load below the overload threshold.

Confidential
Overload Control
Main target of overload control is to force the system back to
nominal loading
Overload is encountered if the interference levels exceed the
planned values
Load control function could be distributed between BTS and RNC
Fast load reduction by BS within 10 ... 100 ms
Slower load control by RNC within 100 - 500 ms

Fast load control

Iub Slower load control

Confidential
Overload Control Actions
Node B
Downlink fast load control
Deny downlink power-up commands received from the mobile
Uplink fast load control
Reduce the uplink Eb/N0 target used by the uplink fast power control

RNC
Reduce the throughput of packet data traffic
Handover to another WCDMA carrier
Handover to GSM
Decrease bit rates of real-time users, e.g. AMR speech codec
Drop calls in a controlled fashion.

Confidential
Admission
Control
Introduction to RRM
Admission Control (AC) decides
Load Control whether a request to establish a
Radio Access Bearer (RAB) is
Admission Control admitted in the Radio Access
Network (RAN) or not; AC is used
Packet Scheduler to maintain stability and to
achieve high capacity; the AC
Power Control algorithm is executed during radio
access bearer setup or
Handover Control
reconfiguration
Resource Manager
Summary

Confidential
Admission Control (AC)
If loading gets too high Higher loading
coverage area shrinks -> smaller cell area
quality of existing (=cell breathing)
connections may
suffer
The Admission Control
(AC) function will
guarantee the system
QoS by blocking new
users if loading would
get too high.
Radio network
planning tool will
support AC parameter
setting
A good AC algorithm
should prevent over
load

Confidential
Admission Control
Uplink admission control
UL interference power
Defines the limit (the first UL overload threshold) for
the UL interference power, after which the BTS
starts its load control actions to prevent overload.

Prx_target_BS
Marginal load area Prx_offset
Prx_target

planned uplink
(interference) power
Planned load area

PrxNoise Load

Prx_target defines the optimal operating point of the cell interference


power, up to which the AC can operate. Prx_target is a network
planning parameter - a compromise between coverage and capacity

Confidential
Basic Admission Criterion
Admit if, and only if:
P[rx|tx]Total<P[rx|tx]Target_BS
and
P[rx|tx]nc+P[rx|tx]nc<P[rx|tx]Target
where
P[rx|tx]Total=P[rx|tx]nc+ P[rx|tx]nrt,
P[rx|tx]nrt is estimated by the PS,
and P[rx|tx]nc is the increase in non-controllable power due to
potential admission, i.e. the power rise from the new UE and the power
rise of the existing UEs in the system.

Notice that the AC criterion gives higher priority to RT


compared to NRT.

Confidential
Power Increase Estimation (1/2)
power

max planned power

Prx_nc ? max planned load

load
Accurate prediction of the interference increase Prx_nc caused by
admitting a new user is essential and can use statistical information such as:
Average bit rate of the traffic source (e.g. voice activity factor)
Variance of the traffic source (on/off behaviour, variable rate probabilities,
burstiness characterisation for packet data, etc.)
Environmental parameters such as Eb/N0

Confidential
Power Increase Estimation (2/2)
Estimation of Prx_nc

Load factor definition


R
L
R W
Eb/No for bearer service
R Bit rate
W Bandwidth

L=Lnew-Lold
L is the load factor for the new bearer.

Confidential
Admission Control
Increase of noncontrollable interference power

The increase in the received power is estimated by

L
Prx, nc Prx, total
1 ( Lnrt ) L
L Load increase due to the new bearer
Fractional load provided by load control
Lnrt Controllable load provided by packet scheduler

Confidential
Power Increase Estimation (UL)
The uplink power increase estimator (PIE) is a
function of

PIE=f(PrxTotal;R;EbNo;Beta;Lnrt)

where
PrxTotal is the average measured total received power level.
R is the requested bit rate.
EbNo is the planned EbNo (RNP parameter).
Beta[0;1] is a RNP parameter expressing the relative increase in
other-to-own cell interference ratio. Default value equals 0.5.
Lnrt is the load factor of NRT.

Confidential
Power Increase Estimation (DL)
The downlink power increase estimator (PIE) is a function
of

PIE=f(Ec/Iopilot;Ppilot;Alpha;PtxTotal;R;EbNo)

where
Ec/Iopilot is the a pilot measurement from the UE.
Ppilot is the P-CPICH transmit power (RNP parameter).
Alpha is the downlink orthogonality factor (cell specific RNP parameter).
PtxTotal is the average measured total carrier transmission power.
R is the requested bit rate.
EbNo is the planned EbNo (cell specific RNP parameter).

Confidential
Sub-set of parameters set by AC
AC set the following open loop power control parameters
The block error rate (BLER) target for both uplink and downlink.
The RAB specific planned EbNo for both uplink and downlink.
The initial value of the SIR target for uplink.
Upper and lower limits for the uplink SIR target.
The uplink transport channel BER.
AC set the following closed loop power control parameters
Maximum and minimum downlink transmission power.
Initial downlink transmission power.

AC also calculates
Maximum downlink transmission power for each radio link (RL)
Minimum transmit power and the initial transmission power.

Confidential
Packet Scheduler
Introduction to RRM Packet Scheduler (PS) schedules
radio resources for NRT radio
Load Control access bearers both in uplink and
downlink direction; The traffic load
Admission Control of cell determines the scheduled
transmission capacity; PS
Packet Scheduler
determines the information of load
Power Control caused by NRT bearers and
changes the bitrates of NRT
Handover Control bearers (Both dedicated and
shared channels)
Resource Manager

Confidential
Target of Packet Scheduler
load
planned target
free capacity, which can load
allocated for
be
load on best effort
controllable
basis

Non-controllable real-
time or minimum
bitrate load

time
Packet scheduling fills the unused capacity with NRT traffic

Confidential
RRC States
Two basic operational modes:
Idle
Connected
Connected mode is further subdivided into service states
What kind of physical channels the UE is using

Connected mode
Cell DCH

Cell FACH Cell PCH


Idle
mode URA PCH

Confidential
Transport Channels for Packet
Data
WCDMA packet data flexibility by several channel types
Selection of the channel by RNC algorithms and parameters

Dedicated
Dedicated Shared
Shared
Common
Commonchannels
channels
channel
channel channel
channel

DCH
DCH FACH
FACH RACH
RACH CPCH
CPCH DSCH
DSCH
Uplink
Uplink/ /downlink
downlink Both
Both Downlink
Downlink Uplink
Uplink Uplink
Uplink Downlink
Downlink
According
Accordingtoto Fixed
Fixedcodes
codes Fixed
Fixedcodes
codes Fixed
Fixedcodes
codes Code
Codeshared
shared
Code
Codeusage
usage max.bit
max.bitrate
rate per cell
per cell per cell
per cell per cell
per cell between
betweenusers
users
Fast
Fastpower
powercontrol
control Yes
Yes No
No No
No Yes
Yes Yes
Yes
Soft
Softhandover
handover Yes
Yes No
No No
No No
No No
No
Medium
Medium/ /large
large Small
Smalldata
data Small
Smalldata
data Small
Small/ /medium
mediumMedium
Medium/ /large
large
Suited
Suitedfor
for data amounts
data amounts amounts
amounts amounts
amounts data amounts data amounts
data amounts data amounts

Confidential
Example of downlink packet
scheduling
CELL_FACH state CELL_DCH state

CrQueuingTimeDL
(TrafVolPendingTimeDL)
bit
rate InitialBitRateDL

time

InactivityTimerDownlinkDCH

TrafVolThresholdDLHigh

TrafVolThresholdDLLow

RLC buffer payload


Confidential
Bit Rate Allocation Method in Packet
Scheduling
Bit rate allocation algorithm

Calculate PrxAllowed

YES PrxTotal < PrxTarget NO PrxTotal


Decrease Load
PrxTotal <
YES PrxTarget + PrxOffset
PrxThreshold =
PrxTarget + PrxOffset
NO
Margina
l Load
Decrease loading PrxTarget
Increase loading

Allocate bit rates

Increase load
end

Confidential
PS Increase Load
Increase loading
PrxTarget
Target exceeded,
allocation according
to step 4
256 (2)
256 (2)
128 (2)
128 (2) 384 (1)
Any CRs in queue 256 (1) 256 (1)
128 (1) 128 (1)

Step 1 Step 2 Step 3 Step 4 Step 5

Bit rate = MinAllowedBitRate


PrxTotalNew <
PrxTarget
&&
Start from CR #1 PrxNrtNew <
PrxAllowed NO
&&
PrxTotalChange <
DeltaPrxMaxUp
Estimate PrxTotalNew and
PrxNrtNew
YES
Move to next
CR in queue

More CRs in
YES
queue

NO

Move to next Higher allowed


YES NO
higher bit rate bit rates

end

Confidential
PS Decrease Load
PrxTarget+offset
256 PrxTarget
256
256 Step 1: 384 -> 256
384 Step 2: 384 -> 256
256
Allocation
Allocationaccording
accordingtotostep
step3 3
256

384 384
256

Step 1 Step 2 Step 3

Confidential
Bit Rate Allocation Method in
Packet Scheduling
Example: Minimum allowed peak bit rate is 32 kbit/s
Allowed peak rates are 32, 64, 128, 256, 320, 384 kbit/s No allocation
for this bearer,
CR remains in a queue

PrxTarget
32 (5)
32 (3) 32 (4) 32 (4)
Available 64 (2)
32 (2) 32 (3) 32 (3)
capacity for 128 (1)
scheduling 32 (2) 32 (2)
64 (1) 64 (1)
32 (1) 32 (1)

Non-controllable load

Allocation if 1 Allocation if 2 Allocation if 3 Allocation if 4 Allocation if 5


DCH DCHs DCHs DCHs DCHs
requested requested requested requested requested

Order of capacity request in queue is shown in brackets (1 = best)

Confidential
RRM in Action
Power
A d m is s io n Load Packet
C o n tro l C o n tro l S c h e d u le r P _ C e llM a x
P S d e c re a s e s th e
O v e r lo a d a c tio n s b itr a te s a n d d r o p s
N R T b e a re rs P r x T h r e s h o ld o r
P t x T h r e s h o ld
P S d e c re a s e s th e
A C d o e s n o t a d m it L o a d p r e v e n tiv e L C b it r a te s o f N R T
n e w b e a re rs a c t io n s b e a re rs P rx T a rg e t+ P rx O ffs e t o r
P tx T a rg e t+ P tx O ffs e t
PS does not
A C d o e s n o t a d m it N o a c t io n s in c r e a s e N R T lo a d ,
n e w b e a re rs but can change P rx T a rg e t o r
N R T b itr a te s P tx T a rg e t
P S in c r e a s e s th e
A C a d m its R T N o a c t io n s am ount of N RT
b e a r e r s n o r m a lly b e a re rs
Load

Confidential
Power Control
Introduction to RRM
Power Control (PC) maintains radio
Load Control link quality of a call by adjusting
the uplink and downlink powers;
Admission Control The quality requirements are tried
to be achieved with minimum
Packet Scheduler transmission powers in order to
generate low interference and
Power Control hence high capacity in the radio
access network. The basic
Handover Control functions of PC are:
Open Loop PC (RACH, FACH)
Resource Manager Fast closed loop PC (DCH, DSCH)
Outer loop PC (DCH, DSCH)

Confidential
Power Control Overview
Target of power control is to
provide the required BER/BLER
minimize the required transmission power (=interference)

Outer loop Fast power


power control control
~10-100 Hz 1.5 kHz
BLER
BLERtarget
target Eb/N0
Eb/N0target
target Received
ReceivedEb/N0
Eb/N0

Fast PC commands UE
transmission power so that
Outer loop PC adjusts received Eb/N0 is equal to
Eb/N0 target so that BLER Eb/N0 target
target is obtained.

RNC
RNC BTS
BTS

Confidential
Uplink Fast Power Control
UE1 and UE2 are transmitting in
the same frequency => L1
equalizing received powers at s
BTS is critical to avoid near-far and
mm
o
problems
P Cc
UE1
Closed loop power control: BTS
commands UE to increase or to L2
decrease its transmission power
at 1.5 kHz (1 dB)
BTS
Closed loop power control
follows also the fast fading UE2
pattern at low and medium Fast PC algorithm in BTS:
speeds (< 50 km/h) If Eb/N0 < Eb/N0target,
send "power-up" command.
If Eb/N0 > Eb/N0target,
send "power-down" command.

Confidential
Fast Power Control
3 km/h, 1-tap Rayleigh with antenna diversity
20
Channel
15 Transmitted power
Received power
Peaks in transmission power
10
due to compensation of fading
R e lative p o w e r (d B )

5
[dB] 0
Fast PC keeps the received
-5 power fairly constant
at low mobile speed
-10

-15 Fading channel

-20
0 200 400 600 800
Time (ms) Time

Confidential
Gain of UL Fast Power Control
(2/2)
Slow PC Fast 1.5 kHz
Gain
Gainofof
Slow PC Fast 1.5 kHz fast
fastPC
PC
Required ITU
ITUPedestrian
PedestrianAA33km/h
km/h 11.3
11.3dB
dB 5.5
5.5dB
dB 5.8
5.8dB
dB
Eb/No ITU
ITUVehicular
VehicularAA33km/h
km/h 8.5
8.5dB
dB 6.7
6.7dB
dB 1.8
1.8dB
dB
ITU
ITUVehicular
VehicularAA50
50km/h
km/h 6.8
6.8dB
dB 7.3
7.3dB
dB -0.5
-0.5dB
dB
Gain
Gainofof
Slow
SlowPC
PC Fast
Fast1.5
1.5kHz
kHz fast
fastPC
PC
Relative ITU
ITUPedestrian
PedestrianAA33km/h
km/h 11.3
11.3dB
dB 7.7
7.7dB
dB 3.6
3.6dB
dB
Transmit
power ITU
ITUVehicular
VehicularAA33km/h
km/h 8.5
8.5dB
dB 7.5
7.5dB
dB 1.0
1.0dB
dB
ITU
ITUVehicular
VehicularAA50
50km/h
km/h 6.8
6.8dB
dB 7.6
7.6dB
dB -0.8
-0.8dB
dB

The gain from the fast power control is larger


For low mobile speeds
In terms of require Eb/No rather than in transmitted powers
if only little multipath diversity is available

Note: at the edge of the coverage area, UE transmits with full power =>
no fast power control => power control headroom needed in the link
budget

Confidential
Fast Power Control in Soft
Handover
Base stations detect independently
BTS1 the power control command from
Power mobile to control downlink transmission
drifting
power
Reliability
check

Both BTSs
RNC:
Detect downlink PC command from mobile
Power drifting Adjust downlink transmission power
control

BTS2
UE:
Check reliability of uplink PC command
Adjust uplink transmission power

Independent power control commands


are sent from both BTS to UE to control
uplink transmission power

Confidential
Outer Loop Power Control

Confidential
Outer Loop Power Control
Algorithm
General outer loop algorithm

Estimated
Estimated
Decrease
Decrease Increase
Increase
Yes
Yes quality
qualitybetter
betterthan
than No
No
Eb/N0
Eb/N0target
target Eb/N0
Eb/N0target
target
required?
required?

Example adjustments of Eb/N0 target


for AMR speech service, BLER target
1%
If an error in a frame, increase Eb/N0
target by 0.5 dB
If no errors, decrease Eb/N0 target with
such a rate that BLER=1% on average.
1 minute period

Confidential
Gain of Outer Loop Power Control
Required Eb/N0 target depends on the multipath and the mobile
speed need for outer loop power control to adjust the Eb/N0
target

AMR speech 12.2 kbps BLER=1%

Confidential
Open Loop Power Control (RACH)
Open loop power control relies on the assumption that the
power-loss in the uplink and downlink channel is identical.
The MS Tx power is adjusted as follows:
Measure the received power from the BS (after RAKE finger comb.)
The power-loss in the downlink channel is determined based on
knowledge of the BS Tx power.
Adjust the MS Tx power according to the estimated power-loss.

Notice: The uplink and downlink channels are separated


by 130MHz in the UMTS system, which far exceeds the
coherence bandwidth. Consequently, fading in the two
bands will be uncorrelated and the open loop power
control fails in compensating for fading!

Confidential
Handover
Control
Introduction to RRM Handover Control (HC) controls the
active state mobility of UE in RAN;
Load Control HC maintains the radio link quality
and minimizes the radio network
Admission Control interference by optimum cell
selection in handovers; HC
Packet Scheduler
supports the following HO
Power Control procedures
Soft/Softer HO (intra frequency)
Hard HO (intra frequency, inter
Handover Control
frequency & inter System)
Resource Manager

Confidential
Differences Between Handovers
Intra-GSM handover
Based on RSSI measurements of all cells in neighbour list
Periodic reporting of 6 best neighbours
GSM
GSMf1
f1 GSM
GSMf2
f2
WCDMA soft handover
Based on pilot Ec/I0 measurements of all cells in neighbour
lists on the same frequency (different scrambling codes)
Typically event triggered reporting
Mobile should be connected to the best server(s) RNC
algorithm typically accepts mobile proposals
WCDMA
WCDMAf1
f1 WCDMA
WCDMAf1
f1
WCDMA inter-frequency & inter-system handover
Based on RSCP or Ec/Io (and GSM/RSSI) + load + service GSM
GSM
Measurements with compressed mode, activated only when
WCDMA
WCDMAf1
f1
needed
WCDMA
WCDMAf2
f2

Confidential
WCDMA Handovers

Handover
Handover Handover
Handover Handover
Handovermeasurement
measurement Handover
Handovertrigger
trigger
type
type measurements
measurements reporting
reportingUE->RNC
UE->RNC

WCDMA
WCDMA All
Allthe
thetime
timewith
with Event
Eventtriggered
triggered Mobility
intra-frequency matched filter reporting Mobility
intra-frequency matched filter reporting

Started
Startedonly
onlywhen
when
WCDMA
WCDMA Periodic
Periodicduring
during Coverage (micro->macro)
Coverage (micro->macro)
needed (compressed
needed (compressed
inter-frequency
inter-frequency compressed
compressedmode
mode Load
Load
mode)
mode)
Started
Startedonly
onlywhen
when Coverage (WCDMA->GSM)
Coverage (WCDMA->GSM)
WCDMA->GSM
WCDMA->GSM Periodic
Periodicduring
during
needed (compressed
needed (compressed Load
Load
inter-system
inter-system compressed
compressedmode
mode
mode)
mode) Service
Service

Confidential
WCDMA Handovers
Seamless coverage extension for WCDMA with existing
GSM network
Capacity extension for GSM with load sharing between
WCDMA and GSM
Service control - different services to different
networks.
Urban area Rural area

GSM
GSM GSM
GSM GSM
GSM GSM
GSM

WCDMA
WCDMA WCDMA
WCDMA WCDMA
WCDMA

Handover GSM WCDMA Load reason handover


for capacity extension or Coverage reason handover
service optimisation Service reason handover

Confidential
Softer Handover
Softer handover = UE
Uplink combing
is connected to two from two sectors
sectors of one base in BTS Rake
station receiver (maximal
ratio combining) Sector 1
Softer handover
probability 5 - 15 %
UL/DL: Basically same
Rake combining as for Sector 2
multipath and antenna
diversity (BTS and UE)

RNC

Confidential
Soft Handover
Soft handover = UE is connected
to two base stations
Soft handover probability is 20 -
50 %
Required to avoid near-far
effects
Extra transmission over Iub Uplink combing from
two base stations in RNC
More base band processing (selection combining)
needed (both base stations)
DL: Maximal ratio combining in
UE in the same way as with RNC
softer handover or multipath
diversity
UL : Frame selection combining
in RNC

Confidential
WCDMA Handover Algorithm
T T T

Outside DropWindow
event1B
Pilot Ec/I0 of cell1

Inside AddWindow
event1A
Inside ReplaceWindow
event1C

Pilot Ec/I0 of cell2

Pilot Ec/I0 of cell3

Connected to cell1 Event 1B


Event 1A Event 1C
Active Set: = add cell2 = replace cell1 = remove
with cell3 cell3

Confidential
WCDMA Handover Algorithm (2/2)
The P-CPICH Ec/Io measurements are subject to both
layer 1 and layer 3 filtering in the UE.
Layer 3 filter parameters are controlled by the RNC.
The minimum averaging period equals 200 ms.
The reporting of handover measurements from the UEs
is typically configured to be event triggered.
Nokias HC solution uses two set of handover
parameters, one for RT and one for NRT. This opens for
further network optimization and differentiation.
After reception of radio link branch addition request
from a UE, the RNC determines whether the radio link
branch addition should be initiated.
Downlink admission control determines whether a radio
link branch addition should be granted or rejected.
Uplink admission control is not consulted.
Confidential
Soft Handover Execution (1/2)
Active Set (AS) cells have the knowledge of service used by
UE
RNC informs the new cell (to be added to AS) about the
needed connection forwarding the following:
Coding schemes, number of parallel code channels, the different
transport channel configuration parameters in use by UL and DL
UE ID and uplink scrambling code.

The relative timing information of the new cell,with respect to the


existing connection (as measured by the UE at its location). Based on
this, the new BTS can determine what should be the timing of the
transmission initiated with respect to the timing of the common
channels (CPICH) of the new cell

MS is informed about the channelisation codes to be used in


transmission and relative timing information through existing
connection

Confidential
Soft Handover Execution (2/2)
BS B
BS A

Handover Toffset
command
and Toffset

BS B Measure Toffset PCCCH


channel frame
information Transmision channel
and Toffset DPDCH/DPCCH
UTRAN frame
Network

The relative timing information, which needs to be made


available at the new cell is indicated in the above figure
It makes transmissions capable to be combined in the Rake
receiver from timing point of view
Confidential
Soft HO Gain in Uplink
Soft handover is needed to provide gain against
slow fading = gain against delays in handovers
fast fading = diversity gain
Only the diversity gain is shown here. ITU Pedestrian A channel
assumed. Gain up to 2 dB
Gain = reduction in UE tx power

Gain in uplink transmission power if UE just between


3 two BTS
2
1 Typical handover
[dB]

0 window ~3 dB
-1
-2
-3
Loss in performance due to PC
-10 -6 -3 0 errors (reliability check)
signalling
if clearly
Relative path loss to BTS1 compared to BTS2 [dB] closer to other BTS

Confidential
SHO Gain in Downlink
More gain in downlink than in uplink
Loss up to 3 dB if clearly closer because no antenna diversity in
to other BTS => transmission from downlink assumed => more need
the other BTS wasted for macro diversity

Gain in downlink transmission power

3
2
Gain = reduction in 1
downlink
[dB]

0
Tx power to the UE.
Power -1
of Both BTS taken -2
into account. -3
-10 -6 -3 0
Relative path loss to BTS1 compared to BTS2 [dB]

Confidential
WCDMA Compressed Mode
WCDMA
WCDMA IS-95A
IS-95A GSM
GSM
For
Forinter-frequency
inter-frequency No
Why
Whyinter-frequency
inter-frequency &&inter-system NoIF-IF- For
Forall
allhandovers
handovers
measurements? inter-system measurements
measurements
measurements? handovers
handovers =>
=>utilisation
utilisationofof
multiple
multiple Simple
How Simplesince
since
Howtotomake
makeIF-
IF- Compressed
Compressed frequencies
frequencies discontinuous
measurements mode difficult discontinuous
measurements mode difficult txtx&&rxrx

Measurement
Measurementgap
gap
Compressed
mode
Normal frame Normal frame

More power is needed during compressed mode


=> affects WCDMA coverage
Power control cannot work during compressed frame => higher Eb/N0
=> affects WCDMA capacity

Confidential
Resource
Manager
Introduction to RRM Resource Manager (RM) is
responsible for the management
Load Control of the radio resources of the
Radio Network Controller (RNC)
Admission Control in co-operation with the Admission
Control (AC) and the Packet
Packet Scheduler Scheduler (PS); RM manages the
logical resources of the BTS and
Power Control the code tree as well as the
allocation of transport resources
Handover Control over Iub and Iur interfaces; Also
triggering of code switching
Resource Manager procedure belongs to RM
responsibilities

Confidential
Resource Manager
Code Allocation and Code Tree
Management
Bit rate Chip rate Chip rate

DATA

Channelisation Scrampling
code code
Uplink Downlink
Spreading Separate bearer Separate users/
services bearer services
Scrambling Separate users Separate cells
All physical channels are spread with individual spreading
codes, Cm(n) and subsequently by the scrambling code, C FSCR
RM generates DL spreading codes.
The code layer, m and the code number, n designates each
and every code in the layered orthogonal code sequences.
Confidential
Resource Manager
Code Allocation
Code Allocation Algorithm chooses the proper spreading code
depending on the TFC type.
Below is the code tree C3(0)=()
C2(0)=(1,1,1,1)
C3(1)=()
C1(0)=(1,1)
C3(2)=()
C2(1)=(1,1,-1,-1)
C3(3)=()
C0(0)=(1)
C3(4)=()
C2(2)=(1,-1,1,-1)
Layer 0 C3(5)=()
C1(1)=(1,-1)
C3(6)=()
C2(3)=(1,-1,-1,1)
Layer 1 C3(7)=()
Layer 20 to 11 according to the code type
The codes are layered from Layer 3
(~SF)
Only layers 2 to 8 are available for DL and 2 to 7 for UL

Confidential
Resource Manager
Code Allocation
Examples:
Ordinary DL speech 30ksps channel (AMR 12.2-4.75kbps & control
part with 1/3 channel coding - code type 7 (128 chips/symbol)
C2(1) code layer = 2; code number = 1 code = 11002

120 kbps channel - code type 5 (32 chips/symbol)


C4(5) code layer = 4; code number = 5 code = 11001100
001100112

Code tree is necessary to manage codes to maintain


orthogonality

If a code Cm(n) is in use, all the codes that are below it in


the same branch and the codes that are above it in the
same branch to root are made unavailable

Confidential
Resource Manager
Code Allocation
A code is always allocated from the optimum location in the
code tree
But code tree will be fragmented quickly with other code
allocations and releases if not rearranged
Rearrangements in the code tree is done reallocating the
codes in the bad locations

The above code tree has 4 codes of equal order. The best
locations are in the same branch and very close to one
another. The badly located codes are released and optimally
reallocated allowing the use of upper layer codes

Confidential
Resource Manager
Code Allocation free
partially used

Coding tree reordering algorithm at code allocation failure


used
Used (or blocked)
The algorithm is breath first, move to the side

Spreading factor 2 Spreading factor 2


Reord available ? Yes !!
available ? No! er
SF
1

SF
2

SF
4

SF Confidential
Wont this ever
end?!

Thank you!
Any questions?

Вам также может понравиться