Академический Документы
Профессиональный Документы
Культура Документы
Confidential
Chapters Covered in these 3
presentations:
Completely: 1, 3 and 9
Partially: 4,5,6,10
Still worth of attention:
6,10,11,12
L1
HSDPA Performan
Detailed
physical ce
layer info
Packet
Schedulin
g
Confidential
Outline
Introduction to RRM
Load Control
Admission Control
Packet Scheduler
Power Control
Handover Control
Resource Manager
Confidential
Radio Resource Management
Radio Resource Management (RRM) is responsible for
efficient utilization of the air interface resources
Target of RRM is to
Cell
optimize radio
Capacity performance:
Optimization
and Tailoring Ensure planned coverage
Confidential
Radio Resource Management
RRM logical model split in network architecture
UE
UE NodeBB
Node DRNC
DRNC
AC RM
Uu LC
PC
Iub
PC LC
SRNC
SRNC
AC : Admission Control Iur
PS: Packet Scheduler AC RM
LC: Load Control
PC
RM: Resource Manager LC
Iub LC PS
PC: Power Control Iu
HC: Handover Control HC PC
Core
Network
Confidential
UTRAN Architecture
Consists of one or more Radio Network Sub-
Systems (RNS)
RNC (Radio Network Controller)
Serving RNC (SRNC) for one UE is the RNC that terminates both the Iu link
for the transport of user data and the corresponding RANAP signaling to/from
the CN. The SRNC also terminates the RRC that is a signaling protocol
between UE and UTRAN. It performs the L2 processing to/from the radio
interface and the basic RRM operations, such as map RAB parameters into air
interface transport channel parameters. HO and outer loop PC are executed
in the SRNC . One UE connected to UTRAN has only one SRNC and one RRC
connection.
Drift RNC (DRNC) is any RNC, other than SRNC that controls cells used by
the UE. If needed, the DRNC may perform micro diversity combining and
splitting (softer HO). It does not perform L2 processing of the user data, but
routes the data transparently between the Iub and Iur interfaces, except
when UE is using a common or shared TrCH (transport channel). One UE may
have several DRNCs
Node B
performs the air interface L1 processing (channel coding and interleaving,
rate adaptation, TrCH multiplexing, spreading, scrambling, etc.). In terms of
RRM it also performs inner-loop PC and fast LC
With HSDPA and E-DCH new functionality is moved to Node B !
Confidential
RRM control processes
Admission control: Power Control
Performs the admission control Closed loop PC compares the
for new bearers to enter the measured SIR with SIR-target and
network. accordingly transmits an up/down
PC command at 0.667 ms interval
Predicts the interference caused Open loop PC estimates the
by the bearer and checks
whether there is room for it. needed power based on pathloss +
interference measurements
Initial power allocation for the (RACH/FACH).
new admitted link Outer loop PC sets the SIR target
Packet Scheduler for the fast closed loop PC
Confidential
Radio Resource Management
An overview
Iu
Confidential
Load Control
Introduction to RRM
Load Control Load Control (LC):
The role of Load Control is to guard
Admission Control that the system is not overloaded
and remains stable; LC
Packet Scheduler continuously updates the load
information of cells controlled by
Power Control RNC and provides this
information to the AC and PS for
Handover Control radio resource controlling
purposes. In overload situations,
Resource Manager the LC
performs the recovering actions
by using the functionalities of PC,
AC, PS and HC
Confidential
Measurement of Air Interface
Load
Confidential
Uplink Load Estimates: 2
Approaches (1/2)
Wideband received power based RRM
PN Noise rise - 1
UL 1
I total Noise rise
Measure
Measuretotal
totalwideband
wideband
received
receivedpower
powerItotal
Itotal
Throughput based RRM
N N
1
UL 1 i L
j 1
j 1 i j 1 1
W
Eb / N 0 j R j j
Calculate
Calculatesum
sumof of
the
thebit
bitrates
ratesininaacell
cell
Confidential
Uplink Load Estimates: 2
Approaches (2/2)
Wideband power based gives soft capacity & constant co
Confidential
Load Control
Definition of Non-controllable load
It is insufficient to divide the load between RT and NRT;
Also interference coming from surrounding cells must be
taken into account:
Hence traffic is divided into controllable and non-
controllable load.
Total Non-controllable
load load = Load of RT users in own cell +
load from other-cell users +
other system noise +
load of NRT users operating at minimum bit rate
Confidential
Wideband power based RRM:
AC,LC,PS
UPLINK ADMISSION DECISION: RAB request is accepted if the estimated non-controllable UL load keeps
below the planned PrxTarget load threshold and the current total load below the overload threshold.
DOWNLINK ADMISSION DECISION: RAB request is accepted if the estimated non-controllable DL load
keeps below the planned PtxTarget load threshold and the current total load below the overload threshold.
Confidential
Overload Control
Main target of overload control is to force the system back to
nominal loading
Overload is encountered if the interference levels exceed the
planned values
Load control function could be distributed between BTS and RNC
Fast load reduction by BS within 10 ... 100 ms
Slower load control by RNC within 100 - 500 ms
Confidential
Overload Control Actions
Node B
Downlink fast load control
Deny downlink power-up commands received from the mobile
Uplink fast load control
Reduce the uplink Eb/N0 target used by the uplink fast power control
RNC
Reduce the throughput of packet data traffic
Handover to another WCDMA carrier
Handover to GSM
Decrease bit rates of real-time users, e.g. AMR speech codec
Drop calls in a controlled fashion.
Confidential
Admission
Control
Introduction to RRM
Admission Control (AC) decides
Load Control whether a request to establish a
Radio Access Bearer (RAB) is
Admission Control admitted in the Radio Access
Network (RAN) or not; AC is used
Packet Scheduler to maintain stability and to
achieve high capacity; the AC
Power Control algorithm is executed during radio
access bearer setup or
Handover Control
reconfiguration
Resource Manager
Summary
Confidential
Admission Control (AC)
If loading gets too high Higher loading
coverage area shrinks -> smaller cell area
quality of existing (=cell breathing)
connections may
suffer
The Admission Control
(AC) function will
guarantee the system
QoS by blocking new
users if loading would
get too high.
Radio network
planning tool will
support AC parameter
setting
A good AC algorithm
should prevent over
load
Confidential
Admission Control
Uplink admission control
UL interference power
Defines the limit (the first UL overload threshold) for
the UL interference power, after which the BTS
starts its load control actions to prevent overload.
Prx_target_BS
Marginal load area Prx_offset
Prx_target
planned uplink
(interference) power
Planned load area
PrxNoise Load
Confidential
Basic Admission Criterion
Admit if, and only if:
P[rx|tx]Total<P[rx|tx]Target_BS
and
P[rx|tx]nc+P[rx|tx]nc<P[rx|tx]Target
where
P[rx|tx]Total=P[rx|tx]nc+ P[rx|tx]nrt,
P[rx|tx]nrt is estimated by the PS,
and P[rx|tx]nc is the increase in non-controllable power due to
potential admission, i.e. the power rise from the new UE and the power
rise of the existing UEs in the system.
Confidential
Power Increase Estimation (1/2)
power
load
Accurate prediction of the interference increase Prx_nc caused by
admitting a new user is essential and can use statistical information such as:
Average bit rate of the traffic source (e.g. voice activity factor)
Variance of the traffic source (on/off behaviour, variable rate probabilities,
burstiness characterisation for packet data, etc.)
Environmental parameters such as Eb/N0
Confidential
Power Increase Estimation (2/2)
Estimation of Prx_nc
L=Lnew-Lold
L is the load factor for the new bearer.
Confidential
Admission Control
Increase of noncontrollable interference power
L
Prx, nc Prx, total
1 ( Lnrt ) L
L Load increase due to the new bearer
Fractional load provided by load control
Lnrt Controllable load provided by packet scheduler
Confidential
Power Increase Estimation (UL)
The uplink power increase estimator (PIE) is a
function of
PIE=f(PrxTotal;R;EbNo;Beta;Lnrt)
where
PrxTotal is the average measured total received power level.
R is the requested bit rate.
EbNo is the planned EbNo (RNP parameter).
Beta[0;1] is a RNP parameter expressing the relative increase in
other-to-own cell interference ratio. Default value equals 0.5.
Lnrt is the load factor of NRT.
Confidential
Power Increase Estimation (DL)
The downlink power increase estimator (PIE) is a function
of
PIE=f(Ec/Iopilot;Ppilot;Alpha;PtxTotal;R;EbNo)
where
Ec/Iopilot is the a pilot measurement from the UE.
Ppilot is the P-CPICH transmit power (RNP parameter).
Alpha is the downlink orthogonality factor (cell specific RNP parameter).
PtxTotal is the average measured total carrier transmission power.
R is the requested bit rate.
EbNo is the planned EbNo (cell specific RNP parameter).
Confidential
Sub-set of parameters set by AC
AC set the following open loop power control parameters
The block error rate (BLER) target for both uplink and downlink.
The RAB specific planned EbNo for both uplink and downlink.
The initial value of the SIR target for uplink.
Upper and lower limits for the uplink SIR target.
The uplink transport channel BER.
AC set the following closed loop power control parameters
Maximum and minimum downlink transmission power.
Initial downlink transmission power.
AC also calculates
Maximum downlink transmission power for each radio link (RL)
Minimum transmit power and the initial transmission power.
Confidential
Packet Scheduler
Introduction to RRM Packet Scheduler (PS) schedules
radio resources for NRT radio
Load Control access bearers both in uplink and
downlink direction; The traffic load
Admission Control of cell determines the scheduled
transmission capacity; PS
Packet Scheduler
determines the information of load
Power Control caused by NRT bearers and
changes the bitrates of NRT
Handover Control bearers (Both dedicated and
shared channels)
Resource Manager
Confidential
Target of Packet Scheduler
load
planned target
free capacity, which can load
allocated for
be
load on best effort
controllable
basis
Non-controllable real-
time or minimum
bitrate load
time
Packet scheduling fills the unused capacity with NRT traffic
Confidential
RRC States
Two basic operational modes:
Idle
Connected
Connected mode is further subdivided into service states
What kind of physical channels the UE is using
Connected mode
Cell DCH
Confidential
Transport Channels for Packet
Data
WCDMA packet data flexibility by several channel types
Selection of the channel by RNC algorithms and parameters
Dedicated
Dedicated Shared
Shared
Common
Commonchannels
channels
channel
channel channel
channel
DCH
DCH FACH
FACH RACH
RACH CPCH
CPCH DSCH
DSCH
Uplink
Uplink/ /downlink
downlink Both
Both Downlink
Downlink Uplink
Uplink Uplink
Uplink Downlink
Downlink
According
Accordingtoto Fixed
Fixedcodes
codes Fixed
Fixedcodes
codes Fixed
Fixedcodes
codes Code
Codeshared
shared
Code
Codeusage
usage max.bit
max.bitrate
rate per cell
per cell per cell
per cell per cell
per cell between
betweenusers
users
Fast
Fastpower
powercontrol
control Yes
Yes No
No No
No Yes
Yes Yes
Yes
Soft
Softhandover
handover Yes
Yes No
No No
No No
No No
No
Medium
Medium/ /large
large Small
Smalldata
data Small
Smalldata
data Small
Small/ /medium
mediumMedium
Medium/ /large
large
Suited
Suitedfor
for data amounts
data amounts amounts
amounts amounts
amounts data amounts data amounts
data amounts data amounts
Confidential
Example of downlink packet
scheduling
CELL_FACH state CELL_DCH state
CrQueuingTimeDL
(TrafVolPendingTimeDL)
bit
rate InitialBitRateDL
time
InactivityTimerDownlinkDCH
TrafVolThresholdDLHigh
TrafVolThresholdDLLow
Calculate PrxAllowed
Increase load
end
Confidential
PS Increase Load
Increase loading
PrxTarget
Target exceeded,
allocation according
to step 4
256 (2)
256 (2)
128 (2)
128 (2) 384 (1)
Any CRs in queue 256 (1) 256 (1)
128 (1) 128 (1)
More CRs in
YES
queue
NO
end
Confidential
PS Decrease Load
PrxTarget+offset
256 PrxTarget
256
256 Step 1: 384 -> 256
384 Step 2: 384 -> 256
256
Allocation
Allocationaccording
accordingtotostep
step3 3
256
384 384
256
Confidential
Bit Rate Allocation Method in
Packet Scheduling
Example: Minimum allowed peak bit rate is 32 kbit/s
Allowed peak rates are 32, 64, 128, 256, 320, 384 kbit/s No allocation
for this bearer,
CR remains in a queue
PrxTarget
32 (5)
32 (3) 32 (4) 32 (4)
Available 64 (2)
32 (2) 32 (3) 32 (3)
capacity for 128 (1)
scheduling 32 (2) 32 (2)
64 (1) 64 (1)
32 (1) 32 (1)
Non-controllable load
Confidential
RRM in Action
Power
A d m is s io n Load Packet
C o n tro l C o n tro l S c h e d u le r P _ C e llM a x
P S d e c re a s e s th e
O v e r lo a d a c tio n s b itr a te s a n d d r o p s
N R T b e a re rs P r x T h r e s h o ld o r
P t x T h r e s h o ld
P S d e c re a s e s th e
A C d o e s n o t a d m it L o a d p r e v e n tiv e L C b it r a te s o f N R T
n e w b e a re rs a c t io n s b e a re rs P rx T a rg e t+ P rx O ffs e t o r
P tx T a rg e t+ P tx O ffs e t
PS does not
A C d o e s n o t a d m it N o a c t io n s in c r e a s e N R T lo a d ,
n e w b e a re rs but can change P rx T a rg e t o r
N R T b itr a te s P tx T a rg e t
P S in c r e a s e s th e
A C a d m its R T N o a c t io n s am ount of N RT
b e a r e r s n o r m a lly b e a re rs
Load
Confidential
Power Control
Introduction to RRM
Power Control (PC) maintains radio
Load Control link quality of a call by adjusting
the uplink and downlink powers;
Admission Control The quality requirements are tried
to be achieved with minimum
Packet Scheduler transmission powers in order to
generate low interference and
Power Control hence high capacity in the radio
access network. The basic
Handover Control functions of PC are:
Open Loop PC (RACH, FACH)
Resource Manager Fast closed loop PC (DCH, DSCH)
Outer loop PC (DCH, DSCH)
Confidential
Power Control Overview
Target of power control is to
provide the required BER/BLER
minimize the required transmission power (=interference)
Fast PC commands UE
transmission power so that
Outer loop PC adjusts received Eb/N0 is equal to
Eb/N0 target so that BLER Eb/N0 target
target is obtained.
RNC
RNC BTS
BTS
Confidential
Uplink Fast Power Control
UE1 and UE2 are transmitting in
the same frequency => L1
equalizing received powers at s
BTS is critical to avoid near-far and
mm
o
problems
P Cc
UE1
Closed loop power control: BTS
commands UE to increase or to L2
decrease its transmission power
at 1.5 kHz (1 dB)
BTS
Closed loop power control
follows also the fast fading UE2
pattern at low and medium Fast PC algorithm in BTS:
speeds (< 50 km/h) If Eb/N0 < Eb/N0target,
send "power-up" command.
If Eb/N0 > Eb/N0target,
send "power-down" command.
Confidential
Fast Power Control
3 km/h, 1-tap Rayleigh with antenna diversity
20
Channel
15 Transmitted power
Received power
Peaks in transmission power
10
due to compensation of fading
R e lative p o w e r (d B )
5
[dB] 0
Fast PC keeps the received
-5 power fairly constant
at low mobile speed
-10
-20
0 200 400 600 800
Time (ms) Time
Confidential
Gain of UL Fast Power Control
(2/2)
Slow PC Fast 1.5 kHz
Gain
Gainofof
Slow PC Fast 1.5 kHz fast
fastPC
PC
Required ITU
ITUPedestrian
PedestrianAA33km/h
km/h 11.3
11.3dB
dB 5.5
5.5dB
dB 5.8
5.8dB
dB
Eb/No ITU
ITUVehicular
VehicularAA33km/h
km/h 8.5
8.5dB
dB 6.7
6.7dB
dB 1.8
1.8dB
dB
ITU
ITUVehicular
VehicularAA50
50km/h
km/h 6.8
6.8dB
dB 7.3
7.3dB
dB -0.5
-0.5dB
dB
Gain
Gainofof
Slow
SlowPC
PC Fast
Fast1.5
1.5kHz
kHz fast
fastPC
PC
Relative ITU
ITUPedestrian
PedestrianAA33km/h
km/h 11.3
11.3dB
dB 7.7
7.7dB
dB 3.6
3.6dB
dB
Transmit
power ITU
ITUVehicular
VehicularAA33km/h
km/h 8.5
8.5dB
dB 7.5
7.5dB
dB 1.0
1.0dB
dB
ITU
ITUVehicular
VehicularAA50
50km/h
km/h 6.8
6.8dB
dB 7.6
7.6dB
dB -0.8
-0.8dB
dB
Note: at the edge of the coverage area, UE transmits with full power =>
no fast power control => power control headroom needed in the link
budget
Confidential
Fast Power Control in Soft
Handover
Base stations detect independently
BTS1 the power control command from
Power mobile to control downlink transmission
drifting
power
Reliability
check
Both BTSs
RNC:
Detect downlink PC command from mobile
Power drifting Adjust downlink transmission power
control
BTS2
UE:
Check reliability of uplink PC command
Adjust uplink transmission power
Confidential
Outer Loop Power Control
Confidential
Outer Loop Power Control
Algorithm
General outer loop algorithm
Estimated
Estimated
Decrease
Decrease Increase
Increase
Yes
Yes quality
qualitybetter
betterthan
than No
No
Eb/N0
Eb/N0target
target Eb/N0
Eb/N0target
target
required?
required?
Confidential
Gain of Outer Loop Power Control
Required Eb/N0 target depends on the multipath and the mobile
speed need for outer loop power control to adjust the Eb/N0
target
Confidential
Open Loop Power Control (RACH)
Open loop power control relies on the assumption that the
power-loss in the uplink and downlink channel is identical.
The MS Tx power is adjusted as follows:
Measure the received power from the BS (after RAKE finger comb.)
The power-loss in the downlink channel is determined based on
knowledge of the BS Tx power.
Adjust the MS Tx power according to the estimated power-loss.
Confidential
Handover
Control
Introduction to RRM Handover Control (HC) controls the
active state mobility of UE in RAN;
Load Control HC maintains the radio link quality
and minimizes the radio network
Admission Control interference by optimum cell
selection in handovers; HC
Packet Scheduler
supports the following HO
Power Control procedures
Soft/Softer HO (intra frequency)
Hard HO (intra frequency, inter
Handover Control
frequency & inter System)
Resource Manager
Confidential
Differences Between Handovers
Intra-GSM handover
Based on RSSI measurements of all cells in neighbour list
Periodic reporting of 6 best neighbours
GSM
GSMf1
f1 GSM
GSMf2
f2
WCDMA soft handover
Based on pilot Ec/I0 measurements of all cells in neighbour
lists on the same frequency (different scrambling codes)
Typically event triggered reporting
Mobile should be connected to the best server(s) RNC
algorithm typically accepts mobile proposals
WCDMA
WCDMAf1
f1 WCDMA
WCDMAf1
f1
WCDMA inter-frequency & inter-system handover
Based on RSCP or Ec/Io (and GSM/RSSI) + load + service GSM
GSM
Measurements with compressed mode, activated only when
WCDMA
WCDMAf1
f1
needed
WCDMA
WCDMAf2
f2
Confidential
WCDMA Handovers
Handover
Handover Handover
Handover Handover
Handovermeasurement
measurement Handover
Handovertrigger
trigger
type
type measurements
measurements reporting
reportingUE->RNC
UE->RNC
WCDMA
WCDMA All
Allthe
thetime
timewith
with Event
Eventtriggered
triggered Mobility
intra-frequency matched filter reporting Mobility
intra-frequency matched filter reporting
Started
Startedonly
onlywhen
when
WCDMA
WCDMA Periodic
Periodicduring
during Coverage (micro->macro)
Coverage (micro->macro)
needed (compressed
needed (compressed
inter-frequency
inter-frequency compressed
compressedmode
mode Load
Load
mode)
mode)
Started
Startedonly
onlywhen
when Coverage (WCDMA->GSM)
Coverage (WCDMA->GSM)
WCDMA->GSM
WCDMA->GSM Periodic
Periodicduring
during
needed (compressed
needed (compressed Load
Load
inter-system
inter-system compressed
compressedmode
mode
mode)
mode) Service
Service
Confidential
WCDMA Handovers
Seamless coverage extension for WCDMA with existing
GSM network
Capacity extension for GSM with load sharing between
WCDMA and GSM
Service control - different services to different
networks.
Urban area Rural area
GSM
GSM GSM
GSM GSM
GSM GSM
GSM
WCDMA
WCDMA WCDMA
WCDMA WCDMA
WCDMA
Confidential
Softer Handover
Softer handover = UE
Uplink combing
is connected to two from two sectors
sectors of one base in BTS Rake
station receiver (maximal
ratio combining) Sector 1
Softer handover
probability 5 - 15 %
UL/DL: Basically same
Rake combining as for Sector 2
multipath and antenna
diversity (BTS and UE)
RNC
Confidential
Soft Handover
Soft handover = UE is connected
to two base stations
Soft handover probability is 20 -
50 %
Required to avoid near-far
effects
Extra transmission over Iub Uplink combing from
two base stations in RNC
More base band processing (selection combining)
needed (both base stations)
DL: Maximal ratio combining in
UE in the same way as with RNC
softer handover or multipath
diversity
UL : Frame selection combining
in RNC
Confidential
WCDMA Handover Algorithm
T T T
Outside DropWindow
event1B
Pilot Ec/I0 of cell1
Inside AddWindow
event1A
Inside ReplaceWindow
event1C
Confidential
WCDMA Handover Algorithm (2/2)
The P-CPICH Ec/Io measurements are subject to both
layer 1 and layer 3 filtering in the UE.
Layer 3 filter parameters are controlled by the RNC.
The minimum averaging period equals 200 ms.
The reporting of handover measurements from the UEs
is typically configured to be event triggered.
Nokias HC solution uses two set of handover
parameters, one for RT and one for NRT. This opens for
further network optimization and differentiation.
After reception of radio link branch addition request
from a UE, the RNC determines whether the radio link
branch addition should be initiated.
Downlink admission control determines whether a radio
link branch addition should be granted or rejected.
Uplink admission control is not consulted.
Confidential
Soft Handover Execution (1/2)
Active Set (AS) cells have the knowledge of service used by
UE
RNC informs the new cell (to be added to AS) about the
needed connection forwarding the following:
Coding schemes, number of parallel code channels, the different
transport channel configuration parameters in use by UL and DL
UE ID and uplink scrambling code.
Confidential
Soft Handover Execution (2/2)
BS B
BS A
Handover Toffset
command
and Toffset
0 window ~3 dB
-1
-2
-3
Loss in performance due to PC
-10 -6 -3 0 errors (reliability check)
signalling
if clearly
Relative path loss to BTS1 compared to BTS2 [dB] closer to other BTS
Confidential
SHO Gain in Downlink
More gain in downlink than in uplink
Loss up to 3 dB if clearly closer because no antenna diversity in
to other BTS => transmission from downlink assumed => more need
the other BTS wasted for macro diversity
3
2
Gain = reduction in 1
downlink
[dB]
0
Tx power to the UE.
Power -1
of Both BTS taken -2
into account. -3
-10 -6 -3 0
Relative path loss to BTS1 compared to BTS2 [dB]
Confidential
WCDMA Compressed Mode
WCDMA
WCDMA IS-95A
IS-95A GSM
GSM
For
Forinter-frequency
inter-frequency No
Why
Whyinter-frequency
inter-frequency &&inter-system NoIF-IF- For
Forall
allhandovers
handovers
measurements? inter-system measurements
measurements
measurements? handovers
handovers =>
=>utilisation
utilisationofof
multiple
multiple Simple
How Simplesince
since
Howtotomake
makeIF-
IF- Compressed
Compressed frequencies
frequencies discontinuous
measurements mode difficult discontinuous
measurements mode difficult txtx&&rxrx
Measurement
Measurementgap
gap
Compressed
mode
Normal frame Normal frame
Confidential
Resource
Manager
Introduction to RRM Resource Manager (RM) is
responsible for the management
Load Control of the radio resources of the
Radio Network Controller (RNC)
Admission Control in co-operation with the Admission
Control (AC) and the Packet
Packet Scheduler Scheduler (PS); RM manages the
logical resources of the BTS and
Power Control the code tree as well as the
allocation of transport resources
Handover Control over Iub and Iur interfaces; Also
triggering of code switching
Resource Manager procedure belongs to RM
responsibilities
Confidential
Resource Manager
Code Allocation and Code Tree
Management
Bit rate Chip rate Chip rate
DATA
Channelisation Scrampling
code code
Uplink Downlink
Spreading Separate bearer Separate users/
services bearer services
Scrambling Separate users Separate cells
All physical channels are spread with individual spreading
codes, Cm(n) and subsequently by the scrambling code, C FSCR
RM generates DL spreading codes.
The code layer, m and the code number, n designates each
and every code in the layered orthogonal code sequences.
Confidential
Resource Manager
Code Allocation
Code Allocation Algorithm chooses the proper spreading code
depending on the TFC type.
Below is the code tree C3(0)=()
C2(0)=(1,1,1,1)
C3(1)=()
C1(0)=(1,1)
C3(2)=()
C2(1)=(1,1,-1,-1)
C3(3)=()
C0(0)=(1)
C3(4)=()
C2(2)=(1,-1,1,-1)
Layer 0 C3(5)=()
C1(1)=(1,-1)
C3(6)=()
C2(3)=(1,-1,-1,1)
Layer 1 C3(7)=()
Layer 20 to 11 according to the code type
The codes are layered from Layer 3
(~SF)
Only layers 2 to 8 are available for DL and 2 to 7 for UL
Confidential
Resource Manager
Code Allocation
Examples:
Ordinary DL speech 30ksps channel (AMR 12.2-4.75kbps & control
part with 1/3 channel coding - code type 7 (128 chips/symbol)
C2(1) code layer = 2; code number = 1 code = 11002
Confidential
Resource Manager
Code Allocation
A code is always allocated from the optimum location in the
code tree
But code tree will be fragmented quickly with other code
allocations and releases if not rearranged
Rearrangements in the code tree is done reallocating the
codes in the bad locations
The above code tree has 4 codes of equal order. The best
locations are in the same branch and very close to one
another. The badly located codes are released and optimally
reallocated allowing the use of upper layer codes
Confidential
Resource Manager
Code Allocation free
partially used
SF
2
SF
4
SF Confidential
Wont this ever
end?!
Thank you!
Any questions?