Professional Documents
Culture Documents
WCDMA Fundamentals by Dr. Hatem MOKHTARI
WCDMA Fundamentals by Dr. Hatem MOKHTARI
WCDMA Fundamentals by Dr. Hatem MOKHTARI
1
Spread Spectrum Modulation
n(t)
Narrow-Band Narrow-band
Signal Signal
SW
Sn ε( ) Radio Propagation ε−1( ) S’n
Channel
2
Digital Modulation in WCDMA :
QPSK for DL and BPSK in UL
PSK or Phase Shift Keying is advantageous compared to
other modulations :
Constant Amplitude
Data information is “hidden” in the Phase component
Robustness to Noise and Interference because Noise in
general affects the Amplitude and not the Phase
Component
3
BPSK Modulation
Binary Phase Shift Keying Modulation is a two-state Modulation scheme
In BPSK the signal can take two states :
A binary digit is mapped to high frequency carrier sinusoidal waveform
of a given phase as given below :
For a 1 Transmitted symbol :
2 Eb
s1 (t ) = A cos(2πf c t ) = cos(2πf c t )
Tb
2 Eb
s2 (t ) = A cos(2πf c t + π ) = − cos(2πf c t )
Tb
2 Eb
Where A = T the Amplitude, 0 ≤ t ≤ Tb ,
b
Eb is the transmitted Energy per bit
The duration of this sinusoidal waveform is Tb
© Cirta Consulting LLC 1999-2004
4
BPSK Modulation Example
Tb = nc*Tcarrier
1 0 0 1
Tcarrier = 1/fc
To ensure that each transmitted binary digit contains an integer number of cycles, the
n c
carrier frequency fc has to fulfill the condition : f c = where nc is a fixed
integer number. For the above example nc = 2 T b
5
Modulation Example : BPSK
BPSK Modulation shifts the PHASE of the DATA modulated carrier by 180 degrees.
Assume data modulated carrier of power P and frequency ω0 and phase modulated θd(t)
2 P cos(ω 0t ) c(t )
BPSK DS SS Transmitter
© Cirta Consulting LLC 1999-2004
6
Modulation Example : BPSK
The Wideband Signal is transmitted througha channel having a delay td
Despreading is done by remodulating the wideband signal with ad-hoc delayed spreading
code as shown bellow
c(t − τ d' )
BPSK DS Receiver
© Cirta Consulting LLC 1999-2004
7
Modulation Example : BPSK
The re-modulation or correlation of the received signal with the delayed spreading code
is a critical function in all SS Systems
Since c(t) equals +1 or -1 the product c(t −τ d )c(t −τ 'd ) will be +1 if the delays
τd = τ’d that is, if the spreading code and the despreading code are SYNCHRONIZED.
8
BPSK Spectral Density
Before Spreading and for Tb as a bit duration the two-sided power spectral
Density is given by :
Sn ( f ) =
1
2
{ }
PTb sin c 2 [( f − f 0 )Tb ] + sin c 2 [( f + f 0 )Tb ]
S n' ( f ) =
1
2
{ }
PTc sin c 2 [( f − f 0 )Tc ] + sin c 2 [( f + f 0 )Tc ]
9
BPSK Power Spectral Density
1
0.8
0.6 sin( x)
sin c( x) =
x
SIN(x)/x
0.4
0.2
0
-900
-800
-700
-600
-500
-400
-300
-200
-100
0
100
200
300
400
500
600
700
800
900
-0.2
-0.4
x (DEGREES)
1
0.9
0.8
0.7
(sinx/x)^2 0.6
0.5
0.4
2
sin( x) 0.3
sin c 2 ( x) = 0.2
x 0.1
0
-900
-800
-700
-600
-500
-400
-300
-200
-100
0
100
200
300
400
500
600
700
800
900
x (DEGREES)
10
QPSK Modulation
* QPSK is very similar to BPSK, except that now one of four possible waveforms is
transmitted through the channel.
2 Es π
si (t ) = cos 2πf c t + (2i − 1) where i = 1,2,3,4
Ts 4
* Ts is the Symbol Duration. Note that each symbol can represent 2 binary digits unlike
BPSK in which each symbol was just a sungle binary digit
11
QPSK Modulation
BASIS Functions
In this case we use ORTHONORMAL basis functions as follows :
2 2
φ1 (t ) = cos(2πf c t ) φ2 (t ) = sin (2πf c t )
Ts Ts
The Coordinates on the signal Constellation (or Space) diagram are given
by :
Ts Ts
12
QPSK Modulation : Constellation
The signal Constellation
diagram for QPSK is shown
bellow.
The signal points are mapped
to a pair of binary digits as
shown
The Decision boundaries are
shown as solid Horizontal
Vertical lines
Notice how this mapping has
been chosen so that
neighboring signal points differ
in only a SINGLE BINARY
DIGIT
13
QPSK Modulation
For example, signal B(11) and D(10) differ in only binary digit position
If for example, the signal point A is transmitted and a Symbol Error occurs,
it is very likely that the received symbol will be either C or D.
This Type of Mapping is called GRAY ENCODING
The gray encoding scheme used will mean that on average, we can expect
the probability of an error in a binary digit to half of the probability of an
error in a symbol
Example
Under the conditions of no noise, the coordinates of a signal point are given
by :
π
x1 = Es cos (2i − 1)
4 Test : Verify the above formulas for i=1
and
π
x2 = − Es sin (2i − 1)
4
© Cirta Consulting LLC 1999-2004
14
QPSK Modulation :
Answer
Ts Ts
2 Es π π
x1 = ∫ r (t )φ1 (t )dt = ∫ cos(2πf t )cos(2πf t ) cos( 4 ) − sin(2πf t ) sin( 4 ) dt
c c c
0
Ts 0
Ts T
x1 = ∫ r (t )φ1 (t )dt =
2 Es
Ts
×
2 s
2 0∫ (
cos 2 (2πf c t ) − sin( 2πf c t ) cos( 2πf c t ) dt )
0
1 1
cos 2 θ = (1 + cos(2θ ) ) sin θ cos θ = sin( 2θ )
2 2
Es Es
x1 = x2 = −
2 2
© Cirta Consulting LLC 1999-2004
15
QPSK Coherent Receiver
16
CDMA Multiple Access : Principal of Spread Spectrum (SS)
Each User encodes its signal
Code Signal Bandwidth (W) > Information Bandwidth
Transmission
Spread Spectrum
f f
f f
17
CDMA Multiple Access Advantages : Multiple Access Features
RECEIVER of USER 1
S1xC1
p S1 = S1 X C1 X C1
f f
p
S2 X C2 X C1
p p
S2
f f
S2xC2
f f
18
CDMA Multiple Access Advantages : Interference Rejection
p p
S1
S1xC1
f f
p
S1
p p
I I IxC1
f f
19
CDMA Principles : Multiplexing
m’1(t)
A B1
∫ D/A
m1(t)
c1(t) Radio Propagation
c1(t)
Channel
B2 m’2(t)
∫ D/A
A
m2(t)
c2(t) c2(t)
Transmitter Receiver
T
c1(t) and c2(t) are Orthogonal Codes : ∫ c (t )c (t )dt = 0
1 2
0
20
Walsh Codes (1/6)
Since all the WCDMA users use the same RF Band in the DL, to
avoid mutual interference Walsh codes are used.
Hadamard Matrix is a recursive Matrix :
H HN
H 2N = N
H N H N
0 0
Where H2 =
0 1
0 0 0 0 W0
H 2 0
H 2 1 0 1 W1
Example : N=2 H4 = = =
H 2 0 0 1 1 W2
H 2
0 1 1 0 W3
© Cirta Consulting LLC 1999-2004
21
Walsh Codes (2/6)
Walsh codes are thus given by :
W0 = [− 1 − 1 − 1 − 1]
W1 = [− 1 1 − 1 1]
W2 = [− 1 − 1 1 1]
W3 = [− 1 1 1 − 1]
Afterwards, replacing 0 by -1 we obtain the real Walsh codes used in
WCDMA
Note : Except W0 all the codes satisfy orthogonality and dot product
conditions to be used in WCDMA.
22
Walsh Codes : Example (3/6)
Assume three different users with three different data sequences :
m1 (t ) = [+ 1 − 1 + 1]
m2 (t ) = [+ 1 + 1 − 1]
m3 (t ) = [− 1 + 1 + 1]
Assume we have a Spreading factor of 4 then :
The Spread Spectrum Signal would be for user1 :
W1(t) -1 1 -1 1 -1 1 -1 1 -1 1 -1 1 -1 1 -1 1 -1 1 -1 1 -1 1 -1 1
×
m1(t) 1 -1 1 -1 1 -1
=
S1(t) -1 1 -1 1 1 -1 1 -1 -1 1 -1 1 1 -1 1 -1 -1 1 -1 1 1 -1 1 -1
23
Walsh Codes : Example (4/6)
The Resulting SS Signal for the three users can be written as follows :
C (t ) = w1 (t ) m1 (t ) + w2 (t ) m 2 (t ) + w3 (t ) m 3 (t )
And the bit sequence would be :
C (t ) = [− 1 − 1 − 1 3 −1 −1 3 −1 −1 3 − 1 − 1]
If no error is encountered each user decodes its signal using the despreading function,
for user j for example :
m2(t) = w2(t)C(t) = [4 4 -4] and using an integrator m2(t) is fully recovered which
yields the original signal : [+1 +1 -1]
m3(t) = w3(t)C(t) = [-4 4 4] and using an integrator m3(t) is fully recovered which
yields the original signal : [-1 +1 +1]
24
Walsh Codes : Example (4/6)
m1' (t )
C(t) W1(t) Tb 1 or -1
C(t) ∫ C (t )W (t )dt
0
1
W1(t)
C (t )W1 (t ) = [1 − 1 1 3 1 − 1 − 3 − 1 1 3 1 − 1]
4 -4 4
m1' (t ) = [4 − 4 4]
The forward link of the CDMA system modeled uses orthogonal Walsh codes to
separate the users. Each user is randomly allocated a Walsh code to spread the data
to be transmitted.
The transmitted signals from all the users are combined together, then passed
through a radio channel model. This allows for clipping of the signal, adding multipath
interference, and adding Guassian noise to the signal.
The receiver uses the same Walsh code that was used by the transmitter to
demodulate the signal and recover the data. After the received signal has been
despread using the Walsh code, it is sub-sampled back down to the original data rate.
This is done by using an integrate and dump filter, followed by a comparator to decide
whether the data was a 1 or a 0.
The received data is then compared with the original data transmitted to calculate the
bit error rate (BER).
The RMS amplitude error is also worked out. The signal level after it has been
demodulated and filtered, is compared with the expected amplitude of the signal
based on the transmitted data. The RMS amplitude error directly relates to the bit
error rate, so is a useful measurement to make.
25
Walsh Codes : Self-Test
Compute the Hadamard Matrix for N=4
26
Walsh Codes Self-Test : Answer
0 0 0 0 0 0 0 0
0 1 0 1 0 1 0 1
0 0 1 1 0 0 1 1
H H 4 0 1 1 0 0 1 1 0
H8 = 4 =
H 4 H 4 0 0 0 0 1 1 1 1
0 1 0 1 1 0 1 0
0 0 1 1 1 1 0 0
0 1 1 0 1 0 0 1
First row is not considered as an orthogonal code, all the remaining rows are Walsh
codes by replacing each 0 by -1. Basically 7 Walsh codes are thus generated.
27
Walsh Codes Self-Test : Answer
m1=[-1 1]
m2 = [1 -1]
m3 = [1 1]
m1 -1 -1 -1 -1 -1 -1 -1 -1 1 1 1 1 1 1 1 1
W1 -1 1 -1 1 -1 1 -1 1 -1 1 -1 1 -1 1 -1 1
S1 = W1*m1 1 -1 1 -1 1 -1 1 -1 -1 1 -1 1 -1 1 -1 1
m2 1 1 1 1 1 1 1 1 -1 -1 -1 -1 -1 -1 -1 -1
W2 -1 -1 1 1 -1 -1 1 1 -1 -1 1 1 -1 -1 1 1
S2 = W2*m2 -1 -1 1 1 -1 -1 1 1 1 1 -1 -1 1 1 -1 -1
m3 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1
W3 -1 1 1 -1 -1 1 1 -1 -1 1 1 -1 -1 1 1 -1
S3 = W3*m3 -1 1 1 -1 -1 1 1 -1 -1 1 1 -1 -1 1 1 -1
C=W1*m1+W2*m2+W3*m3 -1 -1 3 -1 -1 -1 3 -1 -1 3 -1 -1 -1 3 -1 -1
W1*C 1 -1 -3 -1 1 -1 -3 -1 1 3 1 -1 1 3 1 -1
After Integrator -8 8
After Threshold Decision -1 1
W2*C 1 1 3 -1 1 1 3 -1 1 -3 -1 -1 1 -3 -1 -1
After Integrator 8 -8
After Threshold Decision 1 -1
W3*C 1 -1 3 1 1 -1 3 1 1 3 -1 1 1 3 -1 1
After Integrator 8 8
After Threshold Decision 1 1
28
CDMA Principles
T
Cross-Correlation Rxy(τ) : R xy (τ ) = ∫ x (t ) y (t − τ ) dt
0
T
Cross-correlation if τ=0 : Rxy (0) = ∫ x(t ) y (t )dt
0
Rxy ( 0 ) = X T .Y = ∑x y
1≤ i ≤ I
i i
29
CDMA Principles
To be used in DS-SS CDMA Codes must satisfy the
following conditions :
Zero Cross-correlation
Number of +1s and -1s must be the same
Dot Product must be equal to 1
Example :
Dot product of the previous example is :
X T . X / 4 = (1 + 1 + 1 + 1) / 4 = 1
© Cirta Consulting LLC 1999-2004
30
CDMA Principles
m1(t) M1(f) Tc : Chip Rate of the PN Code
1 -1 1 Tb : Information rate (voice/data)
f
1/Tb
Tb 2Tb 3Tb
c1(t) C1(f)
f
1/Tb 1/Tc
Tc 4Tc
m1(t).c1(t) C1(f)* M1(f)
f
1/Tb 1/Tc
31
CDMA Fundamentals
W/R : Defined as the system processing gain
Eb
No
M : The Number of simultaneous users a CDMA
cell can support
© Cirta Consulting LLC 1999-2004
32
CDMA Multiple Access : Principal of Spread Spectrum (SS)
Processing Gain
Example :
Given a Demodulator Performance Eb > 6dB
No
Bit rate Rb = 8 kpbs
Bandwidth W = 1.2 Mcps => G = W/Rb = 150 = 21 dB
S E W
= b − > 6 dB − 21dB = − 15 dB
N dB N o dB Rb dB
© Cirta Consulting LLC 1999-2004
33
CDMA Fundamentals : Capacity
If other users from other cells are considered, the actual cell becomes
loaded and :
Eb 1 W 1
= . .
No M −1 R 1+η
34
CDMA Fundamentals : Capacity
B1 Cell A
Cell B C2
B2
C1
Cell C
35
CDMA Fundamentals : Capacity
Cell A
Unwanted interferers
rejected by antenna
pattern of Cell A
Cell B
Cell C
36
CDMA Fundamentals : Capacity
Sectorization Gain :
6-Sectors : λ= 6 (5 in practice)
∫ I (θ )dθ
λ= 2π
0
G (θ )
∫0 G(0) I (θ )dθ
© Cirta Consulting LLC 1999-2004
37
CDMA Fundamentals : Capacity
Voice Activity Factor : Interference is reduced when the
user is not transmitting
Eb 1 W 1 1
= . . .λ.
No M −1 R 1 + η v
38
Shannon-Hartley Theorem
Generic Model
2. For a given Signal Level the capacity tends to a constant value as the
bandwidth increases.
39
CDMA Multiple Access Principle
Shannon Theorem
Channel Capacity C (Bit/s) given by Shannon Theorem :
S
C = W × log 2 1 +
N
W : System Bandwidth (Hz)
S/N : Signal to Noise Ratio (numerical value)
C : System Capacity (bit/s)
40
Shannon-Hartley Theorem
C can also be written as : S
ln1 +
N oW S
× x ln1 +
1
C =W × = 1.44 ×
ln 2 No x
where WN o
x=
S
assuming W to be infinite :
t2 t3
S S t− + + ...
ln( 1 + t ) 2! 3! S
lim C = 1 . 44 × lim = 1 . 44 × lim = 1 . 44 × W ×
x→ ∞ N
0 t→0 t N
0 t→0 t N
Thus for any degrading S/N we can transfer data with low BER if we increase
the bandwidth used to transfer the data.
Numerical Example :
For a data rate of 10kbps, and SNR of -20 dB then W = 694.4 kHz
41
Bandwidth Efficiency
Bandwidth Efficiency is a measure of how well a particular modulation and
error-control coding scheme is making use of the available bandwidth
Example :
If a system requires 4 kHz of bandwidth to continuously send 8000
binary digits/sec, the bandwidth efficiency = 8000/4000 = 2 bits/s/Hz
Notice that to double the rate at which binary digits are sent over the
given communication channel, we would require a bandwidth efficiency
= 16000/4000 = 4 bits/s/Hz
In this case of an ideal system, rb = 1/Tb = C, where C is given by the
Shannon-Hartley theorem :
S E C
C = W × log 2 1 + = W × log 2 1 + b .
N N0 W
Or equivalently : C C
Eb 2 −1
W E 2W −1
= ⇒ b = 10 log 10
N0 C N0 dB C
W W
© Cirta Consulting LLC 1999-2004
42
Bandwidth Efficiency
10
Bandwidth Efficiency, R/W
1
-7.1
-5.9
-4.5
-2.7
-0.7
1.76
4.49
7.48
10.7
14
17.5
0.1
Eb/No (dB)
43
Bandwidth Efficiency
Self-Test
* A Digital Cellular Phone System is required to work at a bandwidth efficiency of
4 bits/s/Hz to ensure sufficient users to make it profitable.
44
CDMA Principles
Amplitude
distance
λ/2
Mobile λ
The MS crosses 2 fades in : 2
v
Example : @ 900 MHz and v = 90 km/h (25 m/s)
MS crosses fades every 6.67 ms
@ 1800 MHz MS crosses fades every 3.335 ms
© Cirta Consulting LLC 1999-2004
45
CDMA Principles : Delay Spread
Tb
Propagation Time T1
Propagation Time T2 τ
Here τ < Tb implies Interference
Example :
D1 = 150 m and D2 = 200 m => T1 = 150/3*108 = 0.5 µs
BTS and T2 = 0.66 µs => τ = 0.16 µs
Assume we have a UMTS Service R = 3.84 Mchps =>
Tb = 0.26 µs
τ < Tb => INTER-SYMBOL INTERFERENCE PRESENT
Multipath Immunity
WCDMA is inherently tolerant to multipath delay spread signals as any signal which is
delayed by more than one chip time becomes uncorrelated to the PN code used to
decode the signal. This results in the multipath simply appearing as noise. This noise
leads to an increase in the amount of interference seen by each user subjected to the
multipath and thus increases the received BER.
46
CDMA Principles : Delay Spread
Received Power
τ1= 3µs
τ2= 4µs
τ3
Time (µs) t
Inter Symbol Interference can occur if the delay spread τn is greater than
one symbol period : The higher the bit rate, the more ISI occur
© Cirta Consulting LLC 1999-2004
47
CDMA Principles : Delay Spread
Example 1:
Let us consider a Mobile Communications System that uses Rb = 270.83 kbps
The bit period is thus Tb = 1/270830 = 3.69 µs
Conclusion : bit period almost equal to 4 µs as shown on the delay spread power
profile => ISI would normally exist ! Without use of Viterbi-based EQUALIZER such
as in GSM
Example 2:
Let us consider a Mobile Communications System that uses Rb = 1.2288 Mbps =
1228800 bps
The bit period is thus Tb = 1/ 1228800 = 1 µs
Conclusion : bit period is much LESS than 4 µs as shown on the delay spread power
profile => ISI would not normally exist !
Important note : CDMA Rake Receive uses a special form of Time Diversity to
recover the signal. CDMA Rake receiver combines multipath components and
suppresses phase differences provided that delays are not very small
© Cirta Consulting LLC 1999-2004
48
The Principal of Maximum Ratio Combining in CDMA Rake Receiver
θ
θ
θ
Figure #1
θ
Figure #2
θ
Figure #3
49
Block Diagram of CDMA Rake Receiver
I Phase Delay
Correlator Q Rotator Equalizer
Input RF Signal
Code Channel
Generator Estimator
Finger # 1
I
Correlator
Phase Delay ∑I
Rotator Equalizer
Code Channel
∑Q
Generator Estimator
Finger # 2
Correlator
Phase Delay Q
Rotator Equalizer Combiner
Code Channel
Generator Estimator
Finger # 3
Timing (finger allocation)
Matched Filter
50
CDMA Rake Receiver : Components
Digitized input samples are received from RF Front-end in the form of I and Q components
Code Generator and Correlator : Perform despreading and integration to user data symbol
Channel estimator : Uses the Pilot symbols to estimate the channel state
Phase Rotator : aligns the symbols to the initial phase (phase cancellation)
Delay Equalizer : Compensates the Delay in the arrival times of the symbols in each finger
Matched Filter : Determines and Updates the Current Multipath Delay Spread. This is used
to assign the Rake fingers to the largest Peaks (Maximum Combining)
51
CDMA Principles: Delay Spread
In Multipath Environment :
Received power can be written as :
N N
r (t ) = ∑ a n s (t − τ n ) → R ( f ) = S ( f ) ∑ a n exp( − j 2π f .τ n )
n =1 n =1
N
R( f )
H(f ) = = ∑ a n e − j 2πf .τ n
S ( f ) n =1
52
CDMA Principles : Delay Spread
Example with two-equal amplitude paths : a1=a2=A
H ( f ) = 2 cos( π fτ )
H(f)
2A
1 1 3 2
f
2τ τ 2τ τ
1. Frequency-Selective Fading is evident in the nulls of the Magnitude Spectrum
2. WCDMA is more advantageous than CDMA when the delays are small such
as 0.4 ms (Dense Urban and Urban Environments)
3. WCDMA using 5 Mbps (bit period of 0.2 ms) better than IS-95 CDMA using only
1.2288 Mbsp (bit period 1 ms) when ISI are to be considered in Dense Urban areas
© Cirta Consulting LLC 1999-2004
53
CDMA Fundamentals : Power Control
Near-Far Problem
Pr,1 = EIRP(MS1) - PL1 = 21 - 100 = -79 dBm
Pr,2 = EIRP(MS2) - PL2 = 21 - 90 = -69 dBm PL2 = 90 dB
Pr,2
Pr,2
P = 21 dBm
P = 21 dBm
PL1 = 100 dB
MS1 MS2
(S/N)1 = Pr,1 - Pr,2 = -10 dB MS2 must be Power Controlled by -10 dB to have
(S/N)2 = Pr,2 - Pr,1 = +10 dB the same S/N for both users MS1 and MS2
© Cirta Consulting LLC 1999-2004
54
CDMA Fundamentals : Power Control
What is the initial MS power to be used ?
Maximum MS Power :
) Advantage : High likelihood to reach the BTS
Minimum MS Power :
) Advantage : Low Uplink interference
55
CDMA Fundamentals : Power Control
OPEN-LOOP Power Control:
MS Transmits its first access probes at relatively low power
MS waits for a response back from the BTS
If after a Random time the MS has no acknowledgment from the BTS, a
second Access Probe is performed (at a slightly higher power)
Process is repeated until the MS receives a response from the BTS
MS
Transmit Power
Random Time
Second Intervals
Acces
First Probe
Acces Correction
Probe Initial Transmit Power
Correction
56
CDMA Fundamentals : Power Control
OPEN-LOOP Power Control: Purely Mobile-Controlled Operation
Step Size for a Single Access Probe is Specified by the System Parameter PWR_STEP
(equivalent to BSS RF Parameters in GSM)
The Standard Specifies that the MS uses initially the Received power from the BTS :
If the MS receives strong DL level => MS assumes BTS close and then transmit at
low level
Alternatively MS transmits at high level if the initial DL Level is low
57
CDMA Fundamentals : Power Control
During a call :
MS continues to calculate Pr
Path Loss changes as the MS moves and Pr also
Open-Loop PC adjusts the MS Transmit power using :
58
CDMA Fundamentals : Power Control
CLOSED-LOOP Power Control : Involves BOTH the MS and the BS
BS Monitors
Eb/No > Threshold
UL Eb/No
BS Commands MS
to
No Power-Up
© Cirta Consulting LLC 1999-2004
59
CDMA Fundamentals : Power Control
CLOSED-LOOP PC
60
CDMA Fundamentals : Power Control
INNER LOOP
OUTER LOOP 1. Measure Eb/No
2. Compare Eb/No
Adjusting Eb/No to Threshold
Threshold Eb
Threshold 3. Decide which PCB
No to send
61
CDMA Fundamentals : Handover
SOFT-HANDOVER
During the communication, the MS simultaneously maintains connection with
two or three Base Stations,
A Traffic Channel is maintained with both cells,
BS2 (Target Cell)
RNC
DOWNLINK
62
CDMA Fundamentals : Handover
SOFT-HANDOVER
UPLINK
BS2 (Target Cell)
63
CDMA Fundamentals : Handover
SOFTER-HANDOVER
Softer Handover is considered when two cells (or sectors) of the same site are
involved
on the UL, two sectors of the same site simultaneously receive two signals from
the mobile
The signals are demodulated and combined inside the Site, but only ONE
frame is sent back to the RNC
64
CDMA Fundamentals : Handover
65
CDMA Fundamentals : Handover
HARD-HANDOVER
Hard-Handover occurs from CDMA carrier to another CDMA Carrier or CDMA
to Analog Carrier. CDMA to CDMA HO is sometimes called D-to-D Handover.
BS1 BS2
f1 f2
MS f2
f1
© Cirta Consulting LLC 1999-2004
66
HANDOVER PROCESS in WCDMA
Each Sector is distinguished from one another by its PILOT channel : 4 Logical
Channels on the DL are Defined : Pilot, Paging, Synch., and Traffic Channels
Power
PILOT CHANNEL
Frequency
© Cirta Consulting LLC 1999-2004
67
HANDOVER PROCESS in WCDMA
Each Sector uses a different PILOT and is assigned a different PN
Code with an offset to distinguish it from other Sectors
3-Sector Site
6-Sector Site
© Cirta Consulting LLC 1999-2004
68
HANDOVER PROCESS in WCDMA
For Traffic(Voice and Data) we use Eb/No, but for PILOT a special term to
describe the SNR is the Ec/Io
Ec/Io : Energy per chip per interference density
Ec : related to the spreading code, hence the term “chip”
69
HANDOVER PROCESS in WCDMA
MS is an intimate in the SHO in WCDMA :
MS Measures the Ec/Io and report it the the BTS
BTS transmits a PN Sequence using different offsets for each sector
Ec/Io gives a good indication on whether or not a sector should the serving
cell
Highway or Road
PN2
PN1
PN3
Example with 3 PILOTS
70
HANDOVER PROCESS in WCDMA
During HO Management Process :
MS maintains in its Memory four exclusive lists of
Sectors
Sectors stored in the form of PN offsets
71
HANDOVER PROCESS in WCDMA
Active Set (A) :
Contains all Sectors communicating with the MS on traffic channels
If the Active Set contains only one Pilot : NO SHO
If the Active Set contains more than one Pilot : the MS is maintaining
communication with all the Active Set Sectors with Different Traffic
Channels
Active can contain 6 Pilots : UL Diversity maximized
A Pilot enters the (A) only if the RNC decides and then sends a “handover
Direction Message” to the message to add that pilot into (A)
72
HANDOVER PROCESS in WCDMA
A Pilot is removed from (C) if its Ec/Io drops below T_DROP threshold for more
than duration specified by T_TDROP : „Handover Drop Timer Expiration
Value“ and put in (N) set
The (C) Set can contain at least 6 Pilots
T_DROP
73
HANDOVER PROCESS in WCDMA
The Neighbor Set (N) : contains those Pilots that are in the Neighbor List of
the MS´s Serving Cell
Initially :
(N) contains Pilots sent to the MS in the ´Neighbor List Message´ by the
Serving Cell
To keep current Pilots in the (N), MS keeps an aging counter for each Pilot in
(N) : NGHBR_MAX_AGE
Counter incremented for each Pilot in (N) whenever a Neighbor List update
message is received
74
HANDOVER PROCESS in WCDMA
The Remaing Set (R) : Contains all possible Pilots in the System for this UMTS
carrier Frequency, except pilots in (A), (C) or (N)
75
HANDOVER PROCESS in WCDMA
T_ADD
T_DROP
76
HARD HANDOVER in WCDMA
Hard HO includes inter-frequency HO :
) Cells with multiple Carriers with high load
) WCDMA GSM
f1 GSM
f1 f1
f1, f2
f1 f1
f1
WCDMA
77
HARD HANDOVER in UMTS
A
HO Quality Measure (dB)
78
Cell Breathing Concept in UMTS
The Cell Size Shrinks due to Loading
LOAD
79
Cell Breathing : RF Propagation Environment
HIGHER LOADING
50 %
Loading
75 %
Loading
80
Cell Breathing : RF Propagation Environment
Suburban : Lp = 123 + 33*log10(r)
MAPL = 133.7 dB using η = 0.5 (50 % loading)
r = 2.1 km and reduces to r = 1.7 km @ η = 0.75
19 % Range Loss in SUBURBAN
Path Loss (dB)
Dense Urban
Suburban
MAPL (η = 0) Ideal Case
3 dB
6 dB
MAPL (η = 50%) or Noise Rise = 3 dB
Log(d)
© Cirta Consulting LLC 1999-2004
81
Soft Capacity
WCDMA System is limited by interference sharing between neighbor cells
Capacity is dynamically changing due to different traffic variation
Hard Capacity is limited by Hardware Limitation : TRX namely
Soft Capacity = (Erlang Capacity with Soft Blocking / Erlang Capacity with Hard Blocking) - 1
82
Soft Capacity
i is defined by :
i = Other Cell Interference / Own Cell Interference
) i = 0.55 for Omni Cell
) i = 0.55 for 2-sector cell
) i = 0.65 for 3-sector cell
) i = 0.75 for 4-sector cell
) i = 0.85 for 6-sector cell
Soft Capacity Calculation Procedure :
1. Compute the Number of Channels N in equally loaded case based on Uplink
Load Factor : W
N =η R
(1 + i )v Eb
N
o
2. Npool = N*(1+i)
3. Use Erlang B table to compute the Offered Capacity
) Offered Capacity (Erlang) = ErlangB(Npool, 2%)
4. Soft Capacity (Erlang) = Offered Capacity(Erlang) / (1+i)
5. Soft Capacity (%) = (Soft Capacity (Erlang)/Offered Capacity (Erlang)) -1
© Cirta Consulting LLC 1999-2004
83
Soft Capacity
Example
Assumptions
PARAM ETER VA LU E
B it R a te S p e e c h @ 1 2 .2 k b p s
V o ic e A c tiv it y F a c to r 67 %
E b /N o S ppech : 4 dB
i 0 .5 5 a s s u m in g a n O m n i C e ll
N o is e R is e 3 d B (5 0 % L o a d F a c to r )
G oS 2 %
84
CAPACITY in UMTS : Uplink Capacity
- Sensitivity is affected by interference (Loading)
− IUL
M1 M2 M3
ηUL = 1 − 10 10
= + + + ...
M 1,max M 2,max M 3,max
Mn : The Number of simultaneous users for the n th service
85
CAPACITY in UMTS : Uplink Capacity
Maximum UL Capacity figures
1
M max = 1 +
C
(1 + F ) ×
I numerical
Eb
−
W
No dB R dB
C
= 10 10
I
F Values are :
0.67 for Omni,
) 0.93 for 3-sector,
) 0.4 for Micro-cells (without the presence of Fast Fading)
86
CAPACITY in UMTS : Uplink Capacity
F Values on the UL
S ite P ed estrian A P ed estrian B V eh icu la r A 120
C o n fig u ra tio n 3 k m /h w ith o u t 3 k m /h w ith k m /h w ith F ast
F a st F a d in g F a st F a d in g F a d in g
O m ni 0 .8 4 / 0 .6 7 0 .6 7 0 .6 7
3 -S ecto r 1 .1 6 / 0 .9 3 0 .9 3 0 .9 3
M icro cell 0 .5 / 0 .4 0 .4 0 .4
87
CAPACITY in UMTS : Uplink Capacity
Example of Computation of Mmax
88
CAPACITY in UMTS : Downlink Capacity
In the DL, each user is subjected to different interference levels
Therefore, no single interference level is valid in the DL
For dimensioning purposes, the current solution is to use simulation. Mostly, researchers do use
Monte Carlo Random Number Generation Algorithms
90
80
Relative Loading (%)
70 0 dB
60 5 dB
50 10 dB
40 15 dB
30 20 dB
20 25 dB
10
0
0 0.5 1 1.5 2 2.5 3 3.5 4
Cell Range (km)
89
CAPACITY in UMTS : Downlink Capacity
90
CAPACITY in UMTS : Downlink Capacity
100
Relative Loading (%)
80 0 dB
5dB
60 10dB
40 15dB
20dB
20 25dB
0
0 5 10 15 20 25 30 35 40 45 50
Cell Range (km)
91
CAPACITY in UMTS : Downlink Capacity
Example
Estimate the Number of Speech Users supported in an Urban Environment :
Cell Range : 1 km
18 dB Building Penetration Loss
4 dB Feeder Loss
18 dBi Antenna Gain
Answer
1. Take the Mmax value for Speech 12.2 kbps
) It would be 86.4 users
Find at which relative load the 25 dB curve crosses the 1 km range
) It would be 40%
Calculate the supported relative Load :
) It would be 86.4 X 0.4 = 34 simultaneous users
92
CAPACITY in UMTS : Mixed Services (1/2)
Total Loading :
Loading = M1/M1max + M2/M2max + M3/M3max + …
Within a Cell, one service may have higher loading than another
which leads to :
1 >= M1/(L1*M1max) + M2/(L2*M2max) + M3/(L3*M3max) +…
Li : is the Maximum Load of Service i that a cell is able to support
at a given range
93
CAPACITY in UMTS : Mixed Services (1/2)
A) For Speech, find the Relative Load the 8 dB (BL + BPL + Lf+j) Curve
Crosses the 20 km Cell Range
Ans. 65%
B) For Packet Data, find at which Relative Load the 5 dB (BPL + Lf+j ) Curve
Crosses the 20 km Cell Range :
Ans. 75%
Note 1: This examples confirms that some Services may have higher relative
load than others
Note 2 : The above Loads are the Maximum Allowed Loads for Each Service,
when offered as a Single Service
C) Determine M1 and M2 that fulfill the following Equations :
1 >= M1/(0.65*64.1) + M2/(0.75*16.4) (Cell Range Limitation)
0.65 >= M1/64.1 + M2/16.4 (Total Load Limitation)
At this stage it is necessary to determine the capacity distribution between
Service Types : We assume Speech Traffic approximately 10 times
Packet Data Traffic, hence : M1 = 10*M2
This Leads to M1 = 29 and M2 = 3 ; we verify that Loading = 63 % < 65%
94
Concluding Remarks : CDMA System Capacity
95