Download as ppt, pdf, or txt
Download as ppt, pdf, or txt
You are on page 1of 74

UMTS Radio Interface Physical Layer

ISSUE 1.0

Wireless Curriculum Development Section

Course Contents

Chapter 1 Physical Layer Overview


Chapter 2 Physical Channels and Channel Mapping

Chapter 3 Physical Layer Processing Procedure


Chapter 4 Physical Layer Procedure

Confidential Information of Huawei. No Spreading without Permission.

Security Level: Internal

UTRAN Protocol Structure

Core Network Iu RNS Iur RNC Iub Node B Iub Node B Iub Node B RNC Iub Node B RNS Iu

Confidential Information of Huawei. No Spreading without Permission.

Security Level: Internal

Air Interface Protocol Structure

Layer 3

Radio Resource Control (RRC)

Control / Measurements

Logical channels Medium (MAC) Access Control Transport channels Physical layer

Layer 2

Layer 1

Confidential Information of Huawei. No Spreading without Permission.

Security Level: Internal

Data Processing at Physical Layer

Data from MAC LayerTB

Channel coding and multiplexing

Spreading and modulation


Confidential Information of Huawei. No Spreading without Permission.

Security Level: Internal

Physical Channel

A physical channel is defined by a specific carrier frequency, code (scrambling code, spreading code) and relative phase.

In CDMA system, the different code (scrambling code or


spreading code) can distinguish the channels.

Most channels consist of radio frames and time slots, and

each radio frame consists of 15 time slots.

Two types of physical channel:UL and DL

Physical Channel

Frequency,code,phase
Confidential Information of Huawei. No Spreading without Permission. Security Level: Internal

Spreading Technology

Spreading consists of 2 steps

Channelization operation which transforms data symbols into

chips. Thus increasing the bandwidth of the signal,.The number of


chips per data symbol is called the Spreading FactorSF.The operation is done by multiplying with OVSF code.

Scrambling operation is applied to the spreading signal .

Data bit

Chips after spreading OVSF code Scrambling code


Security Level: Internal

Confidential Information of Huawei. No Spreading without Permission.

Channelization Code

OVSF code is used as channelizaiton code The channelization codes are uniquely described as Cch,SF,k, where SF is the spreading factor of the code and k is the code number, 0 k SF-1.
Cch,4,0 =(1,1,1,1) Cch,2,0 = (1,1) Cch,4,1 = (1,1,-1,-1) Cch,1,0 = (1) Cch,4,2 = (1,-1,1,-1) Cch,2,1 = (1,-1) Cch,4,3 = (1,-1,-1,1) SF = 1 SF = 2 SF = 4
Security Level: Internal

Confidential Information of Huawei. No Spreading without Permission.

Scrambling Code

Scrambling code GOLD sequence.


Scrambling code period : 10ms ,or 38400 chips. The code used for scrambling of the uplink DPCCH/DPDCH may be of either long or short type, There are 224 long and 224 short uplink scrambling codes. Uplink scrambling codes are assigned by higher layers.

For downlink physical channels, a total of 218-1 = 262,143 scrambling codes can be generated. scrambling codes k = 0, 1, , 8191 are used.

Confidential Information of Huawei. No Spreading without Permission.

Security Level: Internal

Primary Scrambling Code


Primary scrambling code 0
Secondary scrambling code 1

Set 0 Scrambling codes for downlink physical channels Set 1

Secondary scrambling code 15

Primary scrambling code 51116

Set 511

8192 scrambling codes

512 sets

Secondary scrambling code 5111615

A primary scrambling code and 15 secondary scrambling codes are included in a set.
Confidential Information of Huawei. No Spreading without Permission. Security Level: Internal

Primary Scrambling Code Group


Primary scrambling code 0
Primary scrambling code 1

Group 0
Primary scrambling codes for downlink physical channels

Primary scrambling code 7

Groupe1
Primary scrambling code 8*63

Group 63

Primary scrambling code 63*87

512 primary scrambling codes

64 primary scrambling code groups

Each group consists of 8 primary scrambling codes

Confidential Information of Huawei. No Spreading without Permission.

Security Level: Internal

Course Contents

Chapter 1 Physical Layer Overview


Chapter 2 Physical Channels and Channel Mapping

Chapter 3 Physical Layer Processing Procedure


Chapter 4 Physical Layer Procedure

Confidential Information of Huawei. No Spreading without Permission.

Security Level: Internal

Chapter 2 Physical Channels and Channel Mapping

2.1 Physical Channel Structure and Function

2.2 Channel Mapping

Confidential Information of Huawei. No Spreading without Permission.

Security Level: Internal

Downlink Physical Channel

Downlink Dedicated Physical Channel


(Downlink DPCH)

Downlink Common Physical Channel


Common Control Physical Channel (CCPCH) Synchronization Packet Channel (SCH) Physical Downlink Shared Channel (PDSCH) Paging Indicator Channel (PICH) Acquisition Indicator Channel (AICH) Common Pilot Channel (CPICH)

Downlink Physical Channel

Confidential Information of Huawei. No Spreading without Permission.

Security Level: Internal

Uplink Physical Channel

Uplink Dedicated Physical Channel Uplink Dedicated Physical Data Channel (Uplink DPDCH) Uplink Dedicated Physical Control Channel (Uplink DPCCH)

Uplink Physical Channel

Uplink Common Physical Channel


Physical Random Access Channel (PRACH) Physical Common Packet Channel (PCPCH)

Confidential Information of Huawei. No Spreading without Permission.

Security Level: Internal

Synchronization Channel (SCH)


Used for cell search Two sub channels: P-SCH and S-SCH.

SSC specifies the scrambling code groups of the cell.

SSC is chosen from a set of 16 different codes of length 256, there are altogether 64 primary scrambling code
Slot #14 acp acsi,14

SCH is transmitted at the first 256 chips of every time slot.

PSC is transmitted repeatedly

in each time slot.


Slot #0 Primary SCH Secondary SCH acp acsi,0 256 chips 2560 chips acp acsi,1 Slot #1

groups.

One 10 ms SCH radio frame


Confidential Information of Huawei. No Spreading without Permission. Security Level: Internal

Common Pilot Channel(CPICH)


Common Pilot CHannel (CPICH) Carries pre-defined sequence.

Fixed rate 30KBPS SF=256


The CPICH uses the same channel and scrambling code but different sequences in the case transmit diversity is used on downlink channel

Antenna 1

A A A A A A A A A A A A A A A A A A A A A A A A

Antenna 2

-A -A A A -A -A A A -A A -A -A A A -A -A A A -A -A A A -A -A slot #14 Frame#i slot #0 Frame#i+1 slot #1

Frame Boundary

Confidential Information of Huawei. No Spreading without Permission.

Security Level: Internal

Common Pilot Channel (CPICH)

Primary CPICH

Uses the same channel code--Cch, 256,0 Scrambled by the primary scrambling code Only one CPICH per cell Broadcast over the entire cell The P-CPICH is a phase reference for SCH, Primary CCPCH, AICH, PICH. By default, it is also a phase reference for downlink DPCH.

Secondary CPICH An arbitrary channel code of SF=256 is used for S-CPICH S-CPICH is scrambled by either the primary or a secondary scrambling code There may be zero, one , or several secondary CPICH. S-CPICH may be transmitted over part of the cell S-CPICH may be a phase reference for S-CCPCH and downlink DPCH.
Security Level: Internal

Confidential Information of Huawei. No Spreading without Permission.

Primary Common Control Physical Channel (P-CCPCH)


Fixed rate30kbpsSF=256 Carry BCH transport channel The PCCPCH is not transmitted during the first 256 chips of each time slot.

Only data part STTD transmit diversity may be used


256 chips (Tx OFF) Data 18 bits Tslot = 2560 chips , 20 bits

Slot #0

Slot #1

Slot #i 1 radio frame: Tf = 10 ms

Slot #14

Confidential Information of Huawei. No Spreading without Permission.

Security Level: Internal

Paging Indicator Channel (PICH)

288 bits for paging indication b0 b1

12 bits (undefined) b287 b288 b299

One radio frame (10 ms)

Confidential Information of Huawei. No Spreading without Permission.

Security Level: Internal

Paging Indicator Channel

PICH is a fixed-rate(SF=256) physical channel used to carry the Paging Indicators (PI).

PICH is always associated with an S-CCPCH to which a PCH


transport channel is mapped.

Frame structure of PICHone frame of length 10ms consists of 300 bits of which 288 bits are used to carry paging indicators and the remaining 12 bits are not defined. N paging indicators {PI0, , PIN-1} in each PICH frame, N=18, 36, 72, or 144.

If a paging indicator in a certain frame is set to 1, it indicates that UEs associated with this paging indicator should read the corresponding frame of the associated S-CCPCH.

Confidential Information of Huawei. No Spreading without Permission.

Security Level: Internal

Secondary Common Control Physical Channel (S-CCPCH)

Carry FACH and PCH.


Two kinds of SCCPCH: with or without TFCI. UTRAN decides if a TFCI should be transmitted, UE must support TFCI.

SF =256 - 4. FACH and PCH can be mapped

to the same

or separate

SCCPCHs. If mapped to the same S-CCPCH, they can be mapped to the same fame.

Possible rates are the same as that of downlink DPCH

TFCI NTFCI bits

Data Ndata bits Tslot = 2560 chips, 20*2k bits (k=0..6)

Pilot Npilot bits

Slot #0

Slot #1

Slot #i 1 radio frame: Tf = 10 ms

Slot #14

Confidential Information of Huawei. No Spreading without Permission.

Security Level: Internal

Physical Random Access Channel (PRACH)

The random-access transmission data consists of two parts:

One or several preambles each preamble is of

length

4096chips and consists of 256 repetitions of a signature whose length is 16 chips16 available signatures totally

10 or 20ms message part Which signature is available and the length of message part are determined by higher layer

Confidential Information of Huawei. No Spreading without Permission.

Security Level: Internal

PRACH Access Timeslot Structure

radio frame: 10 ms 5120 chips #0 Access slot #0 Access slot #1 #1 #2 #3 #4 #5 #6 #7 #8 #9

radio frame: 10 ms

#10

#11

#12

#13

#14

Random Access Transmission Random Access Transmission

Access slot #7 Access slot #8

Random Access Transmission Random Access Transmission

Access slot #14

Confidential Information of Huawei. No Spreading without Permission.

Security Level: Internal

PRACH Transmission Structure

Preamble 4096 chips

Preamble

Preamble

Message part

10 ms (one radio frame) Preamble Preamble Message part 20 ms (two radio frames)

Preamble 4096 chips

Confidential Information of Huawei. No Spreading without Permission.

Security Level: Internal

PRACH Message Structure

Data Pilot Npilot bits

Data Ndata bits TFCI NTFCI bits

Control

Tslot = 2560 chips, 10*2k bits (k=0..3)

Slot #0

Slot #1

Slot #i Message part radio frame TRACH = 10 ms

Slot #14

Confidential Information of Huawei. No Spreading without Permission.

Security Level: Internal

Acquisition Indicator Channel (AICH)

Frame structure of AICH two frames, 20 ms consists of a repeated sequence of 15 consecutive AS, each of length 20 symbols(5120 chips). Each time slot consists of two parts an Acquisition-Indicator(AI) and a part of duration 1024chips with no transmission. Acquisition-Indicator AI have 16 kinds of Signature. CPICH is the phase reference of AICH.
AI part
a0 a1 a2 a30 a31 a32 a33

Unused part
a38 a39

AS #14

AS #0

AS #1

AS #i 20 ms

AS #14

AS #0

Confidential Information of Huawei. No Spreading without Permission.

Security Level: Internal

Uplink Dedicated Physical Channel

DPDCH and DPCCH are I/Q code multiplexed within each radio frame

DPDCH carries data generated at Layer 2 and higher layer DPCCH carries control information generated at Layer 1 Each frame is 10ms and consists of 15 time slots, each time slot consists of 2560 chips

The spreading factor of DPDCH is from 4 to 256 The spreading factor of DPDCH and DPCCH can be different in the same Layer 1 connection

Each DPCCH time slot consists of Pilot, TFCIFBITPC


Security Level: Internal

Confidential Information of Huawei. No Spreading without Permission.

Frame Structure of Uplink DPDCH/DPCCH

DPDCH Pilot Npilot bits

Data Ndata bits TFCI NTFCI bits FBI NFBI bits TPC NTPC bits

DPCCH

Tslot = 2560 chips, 10*2k bits (k=0..6)

Slot #0

Slot #1

Slot #i 1 radio frame: Tf = 10 ms

Slot #14

Confidential Information of Huawei. No Spreading without Permission.

Security Level: Internal

Functions of Uplink DPDCH/DPCCH

Data bearer at physical layer

DCH Data

DPDCH

Provide control data for DPDCH, such as demodulation, power control, etc

DPCCH
Confidential Information of Huawei. No Spreading without Permission. Security Level: Internal

Downlink Dedicated Physical Channel


DCH consists of dedicated data and control information. Control information includesPilotTPCTFCI(optional). The spreading factor of DCH can be from 512 to 4,and can be changed during connection

DPDCH and DPCCH is time multiplexed. Multi-code transmission within one CCTrCH uses the same spreading factor. In this case, the DPCH control information is transmitted only on the first downlink DPCH.

Different CCTrCH can use different spreading factors in the case there are several CCTrCHs for one UE. In this case information of only one DPCCH needs to be transmitted.

Confidential Information of Huawei. No Spreading without Permission.

Security Level: Internal

Frame Structure of Downlink DPCH

DPDCH Data1 Ndata1 bits

DPCCH TPC NTPC bits TFCI NTFCI bits

DPDCH Data2 Ndata2 bits

DPCCH Pilot Npilot bits

Tslot = 2560 chips, 10*2k bits (k=0..7)

Slot #0

Slot #1

Slot #i One radio frame, Tf = 10 ms

Slot #14

Confidential Information of Huawei. No Spreading without Permission.

Security Level: Internal

Functions of Downlink DPDCH/DPCCH

Data bearer at physical layer

DCH

DPDCH

DCH data

data

DPCCH

Confidential Information of Huawei. No Spreading without Permission.

Provide control data for DPDCH ,such as demodulation, power control,etc.


Security Level: Internal

Chapter 2 Physical Channels and Channel Mapping

2.1 Physical Channel Structure and Function

2.2 Channel Mapping

Confidential Information of Huawei. No Spreading without Permission.

Security Level: Internal

Classification of Transport Channel

Dedicated Channel (DCH)


DCH may be UL or DL Broadcast Channel (BCH) Forward Access Channel (FACH) Paging Channel (PCH) ReverseRandom Access Channel (RACH) Common Packet Channel (CPCH) Downlink Shared Channel (DSCH)

Dedicated transport channel

Common transport channel

Confidential Information of Huawei. No Spreading without Permission.

Security Level: Internal

Channel Mapping

Higher Layer data Logical Channels


(Data Dependent)

Paging

System Info

Signalling

Cell Broadcast Service

Signalling and User data DCCH

PCCH

BCCH

CCCH

CTCH

Decicated Logical Channel


CipherOn {XOR}

DTCH DTCH DTCH

Transport Channels
(L1 Characteristics Dependent)

PCH

BCH

FACH

RACH

DCH

Physical Channels

S-CCPCH

P-CCPCH

PRACH

DPDCH

Confidential Information of Huawei. No Spreading without Permission.

Security Level: Internal

Course Contents

Chapter 1 Physical Layer Overview


Chapter 2 Physical Channels and Channel Mapping

Chapter 3 Physical Layer Processing Procedure


Chapter 4 Physical Layer Procedure

Confidential Information of Huawei. No Spreading without Permission.

Security Level: Internal

Chapter 3 Physical Layer Processing Procedure

3.1 Coding and multiplexing technology 3.2 Spreading technology 3.3 Modulation technology

Confidential Information of Huawei. No Spreading without Permission.

Security Level: Internal

Transport channel multiplexing structure for downlink


TrCH-i
102040 or 80ms

TrCH-i+1

data
0816 or 24bits

data

dataCRC dataCRC
CRC d CRC a t CBL CBL data data

data

dataCRC
512Ktail Conventional code

CRC CBL data

Size Z

5120Ktail Turbo code

CedBL CedBL CedBL Rate Coded matched data data


or

Conventional code or Turbo code

Rate matched data


or
st stinterleaved Data Data before after 1 1 interleaving

DTX

Radio frame

Radio frame

Radio frame

The number frames1 24 or 8

TrCH-1 TrCH-1 TrCH-2 TrCH-2 TrCH-I TrCH-I DTX CCTrCH

10ms 10ms

Ph-1
data1 TPC TFCI data2 pilot

Ph-2

Ph-P

data1 TPC TFCI data2 pilot

data1 TPC TFCI data2 pilot

Spreading Scrambling
Confidential Information of Huawei. No Spreading without Permission.

Spreading Scrambling
Security Level: Internal

Spreading Scrambling

CRC of TB

Error detection is provided on transport blocks through a Cyclic Redundancy Check (CRC)

CRC size is informed by higher layer signal

08121624(optional)

If no TB are input, no CRC bits should be attached. If TB

are input with TB SIZE=0,CRC bits shall be added, i.e. all


parity bits equal to zero.

Confidential Information of Huawei. No Spreading without Permission.

Security Level: Internal

TB Concatenation and Code Block Segmentation


All transport blocks in a TTI are serially concatenated . The maximum size of the code blocks depends on whether convolutional coding or turbo coding is used for the TrCH .

Convolutional code: if TBS SIZE>504,segmented to multiple code block of the same size. Turbo code:if TBS SIZE>5114, segmented to multiple code block of the same size. No coding:no segmentation If codes cannot be segmented evenly, fill in 0 bits at the beginning of the first code block. If the code block length of Turbo code<40, fill in 0 bits at the beginning to keep the code length constantly as 40.

Confidential Information of Huawei. No Spreading without Permission.

Security Level: Internal

Channel coding

The following channel coding schemes can be applied to TrCHs:


Convolutional coding, coding rates 1/3 and 1/2 are defined


Turbo coding, The coding rate of Turbo coder is 1/3 No coding

Usage of coding

BCHPCH and RACH1/2 Convolutional coding CPCH DCH DSCH and FACH1/2or1/3 Convolutional coding ,1/3Turbo coding, no coding

Confidential Information of Huawei. No Spreading without Permission.

Security Level: Internal

Rate Matching
Rate matching means that bits on a transport channel are repeated or punctured.

The number of bits on a transport channel can vary between different transmission time intervals. In the downlink the transmission is interrupted if the number of bits is lower than maximum. When the number of bits between different transmission time intervals in uplink is changed, bits are repeated or punctured to ensure that the

total bit rate after TrCH multiplexing is identical to the total


channel bit rate of the allocated dedicated physical channels.
Confidential Information of Huawei. No Spreading without Permission. Security Level: Internal

Interleaving
Functionreduce the influence of fast fading. Two kinds of interleaving 1st interleaving

interleaving and 2nd

The length of 1st interleaving is TTI of TrCH, 1st interleaving is a inter-frame interleaving

The length of 2nd interleaving is a physical frame , 2nd


interleaving is a intra-frame interleaving.

Confidential Information of Huawei. No Spreading without Permission.

Security Level: Internal

Radio Frame Segmentation

When the transmission time interval is longer than 10 ms, the input bit sequence is segmented and mapped onto

consecutive Fi radio frames.

Following radio frame size equalisation in the UL the input bit sequence length is guaranteed to be an integer multiple of Fi.

Following rate matching in the DL the input bit sequence length is guaranteed to be an integer multiple of Fi.

Confidential Information of Huawei. No Spreading without Permission.

Security Level: Internal

Multiplexing of TrCH

Every 10 ms, one radio frame from each TrCH is delivered to the TrCH multiplexing. These radio frames are serially

multiplexed into a coded composite transport channel


(CCTrCH)

The format of CCTrCH is indicated by TFCI TrCH can have different TTI before multiplexing 2 types of CCTrCH:Common and dedicated

Common CCTrCH should be multiplexed by common TrCH; Dedicated CCTrCH should be multiplexed by dedicated TrCH

There is only one CCTrCH in uplink and one or several CCTrCH in downlink for one user

Confidential Information of Huawei. No Spreading without Permission.

Security Level: Internal

Insertion of discontinuous transmission (DTX) indication bits

In the downlink, DTX is used to fill up the radio frame with bits.

DTX indication bits only indicate when the transmission


should be turned off, they are not transmitted.

1st insertion of DTX indication bits

This step of inserting DTX indication bits is used only if the positions of the TrCHs in the radio frame are fixed

2nd insertion of DTX indication bits

The DTX indication bits inserted in this step shall be placed at the end of the radio frame.

Confidential Information of Huawei. No Spreading without Permission.

Security Level: Internal

Physical Channel Segmentation and Mapping


When multiple physical channels are used, one CCTrCH radio frame can be divided into multiple physical frames multicode transmission Each physical channel of multicode transmission must have the same SF DPCCH and DPDCH of uplink physical channel is code multiplexed. DPCCH and DPDCH of downlink physical channel is time multiplexed Uplink physical channel must be fully filled except when cpmpressed mode is used In downlink, the PhCHs do not need to be completely filled with bits that are transmitted over the air. Values correspond to DTX indicators, which are mapped to the DPCCH/DPDCH fields but are not transmitted over the air.

Confidential Information of Huawei. No Spreading without Permission. Security Level: Internal

Physical Channel Forming Before Spreading

Each TrCH can carry different service data, several TrCHs can be multiplexed into a CCTrCH, so WCDMA support

several service share a physical connection.


CCTrCH mapping to data part of physical channel. TFCI,TPC and pilot bits generated at physical layer mapping

to control part of physical channel ,and then spreading and


scrambling, transmitting at air interface at last.

Confidential Information of Huawei. No Spreading without Permission.

Security Level: Internal

Example of Coding and Multiplexing


Parameters for 12.2kb/s AMR speech
The number of TrChs Transport block size CRC Coding TTI 3 81, 103, and 60 bits 12 bits (attached only to TrCh#1) CC, coding rate = 1/3 for TrCh#1, 2 coding rate = 1/2 for TrCh#3 20 ms

Parameters for 3.4kb/s control channel


Transport block size Transport block set size CRC Coding TTI 148 bits 148 bits 16 bits CC, coding rate = 1/3 40 ms

Confidential Information of Huawei. No Spreading without Permission.

Security Level: Internal

Example of Coding and Multiplexing


Transport block TrCh#1
CRC attachment
81 CRC

TrCh#2
103

TrCh#3
60

Tail bit attachment

81

12 Tail

103 Tail 103 8

60 Tail 60 8

Convolutional coding R=1/3, 1/2 Rate matching

93

303

333

136

1st interleaving

303+NRM1

333 +NRM2

136 +NRM3

Radio frame segmentation

303 +NRM1

333 +NRM2

136 +NRM3

#1a
NRF1

#1b
NRF1

#2a
NRF2

#2b
NRF2

#3a
NRF3

#3b
NRF3

NRF1 = (303 +NRM1)/2 NRF2 = (333+ NRM2)/2 NRF3 = (136+ NRM3)/2

To TrCh Multiplexing

Confidential Information of Huawei. No Spreading without Permission.

Security Level: Internal

Example of Coding and Multiplexing(3.4kbps)


Transport block
CRC attachment
148

CRC
148 16 bits

TrBk concatination

B TrBks (B =0,1)

Tail bit attachment

164*B

Tail Convolutional coding R=1/3 Rate matching Insertion of indication* DTX


164*B 8*B

516*B

(516+NRM)*B

1st interleaving

(516+NRM)*B+NDI

Radio frame segmentation #1


[ (129+NRM)*B+NDI]/ 4

(516+NRM)*B+NDI

#2
[ (129+NRM)*B+NDI]/ 4

#3
[ (129+NRM)*B+NDI]/ 4

#4
[ (129+NRM)*B+NDI]/ 4

To TrCh Multiplexing
* Insertion of DTX indication is used only if the position of the TrCHs in the radio frame is fixed.

Confidential Information of Huawei. No Spreading without Permission.

Security Level: Internal

Example of Coding and Multiplexing

12.2 kbps data


#1a #2a #1b #2b #1c #2c #1a #2a

12.2 kbps data


#1b #2b #1c #2c #1

3.4 kbps data


#2 #3 #4

TrCH multiplexing
#1a #1b #1c #1 #2a #2b #2c #2 #1a #1b #1c #3 #2a #2b #2c #4

2nd interleaving
510 1 2 15 1 2 510 15 1 2 510 15 1 2 510 15

Physical channel mapping

30 ksps DPCH

slot

CFN=4N

slot

CFN=4N+1

slot

CFN=4N+2

slot

CFN=4N+3 Pilot symbol TPC

Confidential Information of Huawei. No Spreading without Permission.

Security Level: Internal

Chapter 3 Physical Layer Processing Procedure

3.1 Coding and multiplexing technology 3.2 Spreading technology 3.3 Modulation technology

Confidential Information of Huawei. No Spreading without Permission.

Security Level: Internal

Uplink DPCCH/DPDCH Spreading


The DPCCH is always spread by code cc = Cch,256,0 When only 1 DPDCH exists,(Cd,1 = Cch,SF,k )k=SF/4

The code used for scrambling of the uplink DPCCH/DPDCH may


be of either long or short type
cd,1 DPDCH1 cd,3 DPDCH3 cd,5 DPDCH5 d Slong,n or Sshort,n I+jQ cd,2 DPDCH2 cd,4 DPDCH4 cd,6 DPDCH6 cc DPCCH c d d d d d

Confidential Information of Huawei. No Spreading without Permission.

Security Level: Internal

PRACH Spreading

Message

part is shown in the following figure the

value of gain factors is the same with DPDCH/DPCCH

cd PRACH message data part PRACH message control part cc

d Sr-msg,n I I+jQ Q

Confidential Information of Huawei. No Spreading without Permission.

Security Level: Internal

Downlink Spreading
Downlink physical channel except SCH is first serial-to-parallel converted , spread by the spreading code, and then scrambled by a complex-valued scrambling code. The beginning chip of the scrambling code is aligned with the frame boundary of P-CCPCH. Each channel have different gain factor
I Data of physical channel except SCH

S P

Sdl,n I+jQ S

Cch,SF,m Q

Confidential Information of Huawei. No Spreading without Permission.

Security Level: Internal

Downlink Spreading

Different physical channel come from point S

G1

G2

P-SCH GP S-SCH GS

Confidential Information of Huawei. No Spreading without Permission.

Security Level: Internal

Chapter 3 Physical Layer Processing Procedure

3.1 Coding and multiplexing technology 3.2 Spreading technology 3.3 Modulation technology

Confidential Information of Huawei. No Spreading without Permission.

Security Level: Internal

Uplink Modulation

The chip rate is 3.84Mbps In the uplink, the complex-valued chip sequence generated by the spreading process is QPSK modulated

cos(t) Split real & imag parts Re{S} Pulse shaping Pulse shaping -sin(t)
Confidential Information of Huawei. No Spreading without Permission.

Complexvalued sequence after spreading

Im{S}

Security Level: Internal

Downlink Modulation

The chip rate is 3.84Mbps In the downlink, the complex-valued chip sequence generated by the spreading process is QPSK modulated

cos(t) Split real & imag parts Re{S} Pulse shaping Pulse shaping -sin(t)
Confidential Information of Huawei. No Spreading without Permission. Security Level: Internal

Complexvalued sequence after spreading

Im{S}

Course Contents

Chapter 1 Physical Layer Overview


Chapter 2 Physical Channels and Channel Mapping

Chapter 3 Physical Layer Processing Procedure


Chapter 4 Physical Layer Procedure

Confidential Information of Huawei. No Spreading without Permission.

Security Level: Internal

Synchronization ProcedureCell Search


UE uses PSC to acquire slot synchronization to a cell

Slot synchronization

Frame synchronization and code-group identification

UE uses SSC to find frame synchronization and identify the code group of the cell found in the first step

Scrambling-code identification

UE determines the primary scrambling code through correlation over the CPICH with all codes within the identified group, and then detects the P-CCPCH and reads BCH information

Confidential Information of Huawei. No Spreading without Permission.

Security Level: Internal

Synchronization Procedure Channel Timing Relationship


Primary SCH Secondary SCH Any CPICH

P-CCPCH, (SFN modulo 2) = 0 S-CCPCH,k PICH PICH for k:th S-CCPCH #0 #1 #2 #3 #4 #5 #6 #7 #8

P-CCPCH, (SFN modulo 2) = 1

k:th S-CCPCH

AICH access slots

#9

#10

#11

#12

#13

#14

Any PDSCH DPCH,n

n:th DPCH

10 ms

Confidential Information of Huawei. No Spreading without Permission.

Security Level: Internal

Synchronization ProcedureCommon Channel Synchronization


Common Channel Synchronization The following physical channels have the same frame timing

SCH(Primary and secondary)


CPICH(Primary and secondary) P-CCPCH PDSCH

P-CCPCHs radio frame timing is acquired by cell searchThe PCCPCH on which the cell SFN is transmitted is used as timing reference for all the physical channels

Confidential Information of Huawei. No Spreading without Permission.

Security Level: Internal

Synchronization ProcedureDedicated Channel Synchronization

Synchronization time relations of DPCH

Different downlink DPCHs timing could be different, the offset

between the frame timing of DPCH and P-CCPCH should be


integer multiple of 256 chips, i.e, tDPCH,n=Tn*256 chips Tn={0,1,...149}

On UE side the transmitting time of uplink DPCCH/DPDCH is T0(1024chips) after the 1st downlink detected path

All UL DPCCH/DPDCHs from one UE have the same framing timing.

Confidential Information of Huawei. No Spreading without Permission.

Security Level: Internal

Random Access ProcedureRACH

Physical random access procedure

1 Derive the available uplink access slots, in the next full access

slot set, for the set of available RACH sub-channels within the given
ASC. Randomly select one access slot among the ones previously determined. If there is no access slot available in the selected set, randomly select one uplink access slot corresponding to the set of available RACH sub-channels within the given ASC from the next access slot set. The random function shall be such that each of the allowed selections is chosen with equal probability

2Randomly select a signature from the set of available signatures within the given ASC.

3 Set the Preamble Retransmission Counter to Preamble_ Retrans_ Max

Confidential Information of Huawei. No Spreading without Permission.

Security Level: Internal

Random Access ProcedureRACH

4 Set

the

parameter

Commanded

Preamble

Power

to

Preamble_Initial_Power

5 Transmit a preamble using the selected uplink access slot, signature, and preamble transmission power. 6 If no positive or negative acquisition indicator (AI +1 nor 1) corresponding to the selected signature is detected in the downlink access slot corresponding to the selected uplink access slot: a Select the next available access slot in the set of available RACH sub-channels within the given ASC bselect a signature cIncrease the Commanded Preamble Power dDecrease the Preamble Retransmission Counter by one. If the Preamble Retransmission Counter > 0 then repeat from step 6. Otherwise exit the physical random access procedure.

Confidential Information of Huawei. No Spreading without Permission.

Security Level: Internal

Random Access ProcedureRACH

7 If a negative acquisition indicator corresponding to the selected signature is detected in the downlink access slot

corresponding to the selected uplink access slot, exit the


physical random access procedure Signature

8 If a positive acquisition indicator corresponding to the selected signature is detected , Transmit the random access

message three or four uplink access slots after the uplink


access slot of the last transmitted preamble

9exit the physical random access procedure

Confidential Information of Huawei. No Spreading without Permission.

Security Level: Internal

Transmit diversity Mode

Application of Tx diversity modes on downlink physical channel

Physical channel type Open loop mode P-CCPCH SCH S-CCPCH DPCH PICH PDSCH AICH CSICH TSTD applied -

Open loop mode STTD applied applied applied applied applied applied applied

Closed loop Mode applied applied -

Confidential Information of Huawei. No Spreading without Permission.

Security Level: Internal

Transmit Diversity-STTD

Space time block coding based transmit antenna diversity(STTD

4 consecutive bits b0, b1, b2, b3 using STTD coding

b0 b1 b2 b3 b 0 b1 b 2 b3

Antenna 1

-b2 b3 b0 -b1 Antenna 2 Channel bits

STTD encoded channel bits for antenna 1 and antenna 2.

Confidential Information of Huawei. No Spreading without Permission.

Security Level: Internal

Transmit Diversity-TSTD

Time switching transmit diversity (TSTD) is used only on SCH channel.


Slot #0 acp
(Tx OFF)

Slot #1 acp acsi,2

Slot #2 acp acsi,14

Slot #14

Antenna 1 acsi,0
(Tx OFF)

(Tx OFF)

Antenna 2
(Tx OFF)

acp acsi,1

(Tx OFF)

(Tx OFF)

(Tx OFF)

(Tx OFF)

Confidential Information of Huawei. No Spreading without Permission.

Security Level: Internal

Transmit DiversityClosed Loop Mode

Closed loop mode transmit diversity


Used in DPCH and PDSCH Channel coding, interleaving and spreading are done as in non-

diversity mode. The spread complex valued signal is fed to both TX antenna branches, and weighted with antenna specific weight factors w1 and w2.

The weight factors are determined by the UE, and signalled to

the UTRAN access point (=cell transceiver) using the D-bits of the FBI field of uplink DPCCH.

The calculation of weight factor is the key point of closed loop Tx diversity.there are two modes with different calculation

methods of weight factor


1mode 1 uses phase adjustmentthe dedicated pilot symbols of two antennas are different(orthogonal) 2mode 2 uses phase/amplitude adjustment the dedicated pilot symbols of two antennas are the same.
Confidential Information of Huawei. No Spreading without Permission. Security Level: Internal

Confidential Information of Huawei. No Spreading without Permission.

Security Level: Internal

You might also like