Huawei WCDMA System Overview Course
Huawei WCDMA System Overview Course
Huawei WCDMA System Overview Course
Chapter 1
To solve these fundamental technical defects of the analog systems, the digital mobile
communication technologies emerged and the second generation mobile
communication systems represented by GSM and IS-95 came into being in the middle
of 1980s. The typical examples of the second generation cellular mobile
communication systems are the DAMPS of USA, the IS-95 and the European GSM
system.
The GSM (Global System for Mobile Communications) is originated from Europe.
Designed as the TDMA standard for mobile digital cellular communications, it supports
the 64 kbps data rate and can interconnect with the ISDN. It uses the 900 MHz band
while the DCS1800 system uses the 1800 MHz band. The GSM system uses the FDD
and TDMA modes and each carrier supports eight channels with the signal bandwidth
of 200 kHz.
2014-10-28
HUAWEI Confidential
Page1-1, Total12
The DAMPS (Digital Advanced Mobile Phone System) is also called the IS-54 (North
America Digital Cellular System). Using the 800 MHz bandwidth, it is the earlier of the
two North America digital cellular standards and specifies the use of the TDMA mode.
The IS-95 standard is another digital cellular standard of North America. Using the 800
MHz or 1900 MHz band, it specifies the use of the CDMA mode and has already
become the first choice among the technologies of American PCS (Personal
Communication System) networks.
Since the 2G mobile communication systems focus on the transmission of voice and
low-speed data services, the 2.5G mobile communication systems emerged in 1996 to
address the medium-rate data transmission needs. These systems include GPRS and
IS-95B.
The CDMA system has a very large capacity that is equivalent to ten or even twenty
times that of the analog systems. It also has good compatibility with the analog systems.
Currently some countries and regions such as USA, Korea and Hong Kong have put
the CDMA system into operation to provide services for subscribers. As the
narrowband CDMA technologies come into maturity at a time later than the GSM
technologies, their application far lags behind the GSM ones and currently they have
only found large-scale commercial applications in North America, Korea and China.
The major services of mobile communications are currently still voice services and
low-speed data services. With the development of networks, data and multimedia
communications have also witnessed rapid development; therefore, the target of the
3G mobile communication is to implement broadband multimedia communication.
The 3G mobile communication systems are a kind of communication system that can
provide multiple kinds of high quality multimedia services and implement global
seamless coverage and global roaming. They are compatible with the fixed networks
and can implement any kind of communication at any time and any place with portable
terminals.
Put forward in 1985 by the ITU (International Telecommunication Union), the 3G mobile
communication system was called the FPLMTS (Future Public Land Mobile
Telecommunication System) and was later renamed as IMT-2000 (International Mobile
Telecommunication-2000). The major systems include WCDMA, cdma2000 and
th
UWC-136. On November 5, 1999, the 18 conference of ITU-R TG8/1 passed the
Recommended Specification of Radio Interfaces of IMT-2000 and the TD-SCDMA
technologies put forward by China were incorporated into the IMT-2000 CDMA TDD
part of the technical specification. This showed that the work of the TG8/1 in formulating
the technical specifications of radio interfaces in 3G mobile communication systems
had basically come into an end and the development and application of the 3G mobile
communication systems would enter a new and essential phase.
HUAWEI Confidential
Page1-2, Total12
In January 1999, the 3GPP2 composed of the American TIA, the Japanese ARIB and
the Korean TTA also formally came into being. The cdma2000 and UWC-136
technologies are applied for radio access and the cdma2000 technologies adopt the
Qualcomm patents to a large extent. ANSI/IS-41 is used for the core network.
One formal member of the above two standardization organizations is the China
Wireless Telecommunications Standard Group (CWTS) and two Chinese companies
(Huawei and Datang) are two independent members of the 3GPP organization.
From the perspective of development, the process of evolution from the existing 2G
mobile communication systems to the IMT-2000 is a vital issue. It relates to the reuse of
the existing networks (the construction of new networks should not be the optimal
solution) and the development of multiple 2G digital network systems towards the same
standard.
HSCSD is a feature to allocate multiple full-rate voice channels to the HSCSD structure.
Its purpose is to provide the mixture of multiple services at different air interface
subscriber rates with the single physical layer structure. Its benefits lie in the higher
data rates (up to 64 kbps; the maximum data rate depends on the manufacturers) and
the use of the existing GSM data technologies by slightly modifying the GSM system.
2)
Based on the existing GSM part, the packet switching GPRS network architecture has
the new network function part:
3)
The WCDMA has become a new mature technology aiming at the UMTS/IMT-2000. It
can satisfy all the requirements listed by the ITU to provide very effective high-speed
2014-10-28
HUAWEI Confidential
Page1-3, Total12
data services and high quality voice and image services. In the process of evolution
from GSM to WCDMA, only the core network part is smoothly evolved. As the change
of the air interface is revolutionary, so is the evolution of the radio access network part.
HUAWEI Confidential
Page1-4, Total12
of the 3G systems with the GSM system that also uses the TDMA access mode. This is
quite beneficial for the economics of global roaming and products and it also
implements the coordination protocol between UWCC and ETSI. Whats more
important, it enables the TDMA to player a more important role in the 3G systems.
Network part
In one intermediate meeting of ITU-T SG11 in March 1997, the ITM-2000 Family
Concept put forward in Europe was passed. This concept was based on the existing
networks and involved at least two major standards: GSM MAP and IS-41.
2)
In the ITU-R TG8/1 meeting in September 1997, the discussion on the radio interface
family concept started. In a special meeting of TG8/1 in January 1998, the concept of
suite was put forward and applied and this put the family concept out of use. This
means that there may be more than one radio interface standard but the concept of
more than one standard is not yet accepted, rather, these different standards are
expected to ultimately form a unified standard.
The following two factors have caused various technical differences:
1)
Relationship with 2G
The network part must be compatible with 2G, that is, the 3G networks are gradually
evolved from the 2G networks. There are two major 2G core networks: GSM MAP and
IS-41.
Radio interfaces: The American IS-95 CDMA and IS-136 TDMA operators emphasize
on the backward compatibility (evolutional) while the European GSM and Japanese
PDC operators emphasize on the backward incompatibility of the radio interface
(revolutionary).
The correspondence between the core networks and the radio interfaces is shown in
Figure 1-1 below:
2014-10-28
HUAWEI Confidential
Page1-5, Total12
Core networks
IS-95 CDMA
cdma2000
GSM
W-CDMA
TD-SCDMA
PDC
Figure 1-1 Correspondence between the core network and the radio access network interface
3)
In terms of frequency spectrum, the key issue is that the ITM-2000 frequencies
allocated by ITU have already been applied to the PCS service in USA. Because the
USA requires the sharing of frequency spectrum with 2G systems, the backward
compatibility of the radio interfaces is especially emphasized and technically the USA
requires gradual evolution. In contrast, most of the other countries have new IMT-2000
frequency bands that feature very large flexibility. Whats more, the intellectual property
rights play a very significant role, for example, Qualcomm has its own patent
declaration. Competition is also a major factor to contribute to the technical differences.
Page1-6, Total12
10)
11)
12)
13)
14)
15)
16)
Among these proposals, the first ten are RTT proposals for the IMT-2000 terrestrial
system and the last six reflect the efforts of incorporating the MSS (Mobile Satellite
Service) into the IMT-2000.
These proposals reflect the concern of many countries as to the future mode of
IMT-2000 and their basic wishes to exercise effective influence. However, as viewed
from the market basis, backward compatibility and overall features, the UTRA WCDMA
of ETSI and the cdma2000 of USA are the most competitive; therefore, the key to the
merge of RTT lies in the progress of effectively merging these two proposals.
2014-10-28
HUAWEI Confidential
Page1-7, Total12
2. cdma2000 system
The cdma2000 system is a 3G standard put forward on the basis of the IS-95 standard.
Its standardization work is currently undertaken by 3GPP2.
Circuit Switched (CS) domain: Adapted from the 2G IS95 CDMA network, the circuit
domain has introduced a service platform based on the WIN infrastructure.
Packet Switched (PS) domain: A packet network based on the Mobile IP technology.
Radio Access Network (RAN): Based on the ATM switch platform, it provides abundant
adaptation layer interfaces.
The air interface adopts the cdma2000 technologies and is compatible with the IS95.
The signal bandwidth is N1.25MHz (N = 1, 3, 6, 9, 12) and the chip rate is
N1.2288Mcps. It uses the 8K/13K QCELP or 8K EVRC voice coding mode and its
BTS needs to run in the GPS/GLONESS synchronous mode. The following modes are
applied in the cdma2000 system: Uplink/downlink closed loop power control plus outer
loop power control; OTD and STS transmit diversion in the forward direction to improve
the anti-fading capacity of channels and the signal quality of the forward channels;
pilot-assisted coherent modulation in the reverse direction to improve the demodulation
performance; convolutional coding and Turbo coding; BPSK in the uplink and QPSK in
the downlink.
2014-10-28
HUAWEI Confidential
Page1-8, Total12
3. TD-SCDMA system
The TD-SCDMA standard is put forward by the Chinese Wireless Telecommunication
Standard (CWTS) Group and now it has been merged into the specifications related to
the WCDMA-TDD of 3GPP.
The core network evolves on the basis of and can thus be compatible with the existing
GSM/GPRS networks.
It can be based on the TDM, ATM and IP technologies to evolve towards the all-IP
network architecture.
Logically, the core network comprises two parts: The circuit domain and the packet
domain to complete the circuit-switched services and the packet-switched services
respectively.
Based on the ATM technology, the UTRAN uniformly processes voice and packet
services and evolves towards the IP network architecture.
MAP and GPRS tunneling technologies are the core of the mobility management
mechanism in the WCDMA system.
The air interface adopts the TD-SCDMA mode.
The TD-SCDMA features 3S: Smart antenna, Synchronous CDMA and Software radio.
The key technologies used in TD-SCDMA include Intelligent Antenna + Joint Detection,
Multi-slot CDMA + DS-CDMA, Synchronous CDMA, Channel Coding/Decoding and
Interleaving (the same as in 3GPP) and Baton Handover.
A comparison of the above three systems is given in the table below.
Table 1-1 Comparison among the three major technical systems
System
WCDMA
cdma2000
TD-SCDMA
Using countries
China
Inheritance from
GSM
Narrowband CDMA
GSM
Synchronous mode
Asynchronous/synchronous
Synchronous
Synchronous
Chip rate
3.84Mcps
N1.2288Mcps
1.28Mcps
Signal bandwidth
5MHz
N1.25MHz
1.6MHz
Air interface
WCDMA
TD-SCDMA
Core network
GSM MAP
ANSI-41
GSM MAP
2014-10-28
HUAWEI Confidential
Page1-9, Total12
900
950
1000
1700
China
Japan,
Korea (w/o PHS)
North America
GSM
Cellular
GSM
PDC
Cellular
1750
1800 1850
IMT 2000
GSM 1800
1900
1950
2150
2200 2250
MSS
PCS
A D B EF C
2100
IMT 2000
PHS
2050
MSS
IMT 2000
DECT
2000
A D B EF C
MSS
IMT 2000MSS
IMT 2000MSS
Reserve
MSS
HUAWEI Confidential
Page1-10, Total12
1)
2)
America: Uplink 1850 MHz ~ 1910 MHz and downlink 1930 MHz ~ 1990 MHz.
3)
America: 1910 MHz ~ 1930 MHz in both the uplink and the downlink
In special cases (such as the boundary area of two countries), the TDD mode and the
FDD mode may coexist in the same frequency band and 3GPP TSG RAN WG4 is
currently researching this situation.
There is only the FDD mode in the cdma2000 system and currently there are a total of
seven band classes, of which Band Class 6 is the 1920 MHz ~1980 MHz/2110 MHz ~
2180 MHz band stipulated in IMT-2000.
In China, according to the present radio frequency division, mobile services, fixed
services and spatial services are using the 1700 MHz ~ 2300 MHz band, which is
currently serving plenty of microwave communication systems and a certain number of
wireless location devices. In December 1996, the State Radio Regulatory Committee of
P. R. China re-planned and adjusted some terrestrial radio service frequencies of 2
GHz to adapt to the needs of cellular mobile communication development and radio
access. However, the frequency spectrum still conflicts with the 3G mobile
communication systems, that is, the 1.9 MHz band for public cellular mobile
communications and the radio access band have both taken up some of the IMT-2000
bands.
Therefore, the 3G mobile communication systems have to share the limited frequency
resources with the existing radio communication systems. With the development of
technologies and services, the planning and adjustment of IMT-2000 bands must be
well done to stimulate the operators, scientific research organizations/institutions,
manufacturers and other bodies to actively develop the 3G mobile communication
systems, so as to meet both the short-term and the long-term frequency spectrum
needs in China mobile communication development.
The occupation of the IMT-2000 frequency spectrum in China is illustrated in the
following figure.
1850
1900
ITU
1950
IMT 2000
2000
1880 MHz
TDD
2150
2200
IMT 2000
2025 MHz
1920 MHz
2100
MSS
1885 MHz
China
2050
2110 MHz
2250
MSS
2170 MHz
2010 MHz
1980 MHz
FDD
MSS
MSS TDD
MSS
FDD
2170 MHz
1850
1900
1950
2000
2050
2100
2150
2200
2250
2014-10-28
HUAWEI Confidential
Page1-11, Total12
2014-10-28
HUAWEI Confidential
Page1-12, Total12
WCDMA Services
Basic telecom services, including voice service, emergency call service and SMS.
Supplementary services, the same as the supplementary services defined in
GSM.
Bearer services, including circuit bearer service and packet bearer service.
Intelligent service, an intelligent network service based on CAMEL mechanism
inherited from the GSM system.
Location services, services related to location information, such as charging by
area, mobile yellow page and emergency locating.
Multimedia services, including circuit real-time multimedia service, packet
real-time multimedia service and non real-time store-and-transfer multimedia
message service.
The above services are roughly classified. Actually these services may overlap. For
example, charging by area is not only a location service, but also an intelligent service.
The real-time services such as voice service generally have the QoS requirement.
Compatible backward with all the services provided by GSM.
The concept of multimedia service is introduced.
HUAWEI Confidential
Page2-1, Total10
WCDMA Services
Service category:
In the United States, October 1, 2001 started the provisioning of the Enhanced
Emergency Services. The FCC (Federal Communications Commission) stipulated that
wireless operators should provide an estimated value of longitude and latitude of the
caller. The precision should be within 125 meters (67% of the estimated value) or lower
than the result by root mean square. Mainly driven by national laws, this kind of service
is provided by operators for the public interest. It is available without users application.
To operators, it is a non-profitable service but can promote operators image. And this
service is an inevitable development result of mobile communication technologies.
Besides emergency calls, there is also vehicle rescues: If a vehicle is broken on the
road, a fault locating automatic report is available. If there is an accident, the detection
device will detect it and auto report the related information such as location of the
accident.
Specific user charging: Some location areas (LAs) can be set as discount areas. In
these LAs, calling and answering will be discounted.
Close location charging: If the caller and the called are in the same LA or close LAs,
they will get a discount.
Specific area charging: If one or both of the caller and called are in a specific location,
such as shopping area, a discount will be given. It is to encourage the user to enter this
area.
The ECR enables users calls to be routed to the nearest service point according to the
location. The user can implement corresponding tasks with specific access numbers.
For example, the user can input 427 to have access to the nearest gas station. This
service is available for chain companies, such as Caltex and KFC. The companies can
apply for specific access numbers or preferential access number that will be preferred
for access among the counterparts (such as gas stations). To bank services, the user
can get the latest bank information or ATM information through ECR.
2014-10-28
HUAWEI Confidential
Page2-2, Total10
WCDMA Services
Location
Server
Location Server
Radio network
Return the subscriber
location information
Get the subscriber
location information
Query
SP Web
Web Server
Server
PORTAL
PORTAL
Mobile yellow page is similar to ECR. It provides contact information of the nearest
service point according to users needs. For example, the customer can input an entry
restaurant or more conditions such as Chinese food and within 3 kilometers to
search. The output result can be phone numbers or addresses.
This service is still yet to be defined. At present lawful interception service is available.
Lawful interception is the ability to intercept Content of Communication (CC) and
Intercept Related Information (IRI) of an MS by the 3G system for Law Enforcement
Agency (LEA). The mobile target can be local subscribers, or subscribers roaming from
other 3G systems, or roaming subscribers that can use the 3G system from other
mobile networks, such as GSM subscribers.
2014-10-28
HUAWEI Confidential
Page2-3, Total10
WCDMA Services
Multimedia service in the packet domain is mainly implemented via the SIP protocol.
The major applications include 384 Kbps Video On Demand (VOD) and mobile
teleconference. An example of VOD service is illustrated in Figure 2-2.
Application
server
Intranet
DB
Router
TM
Quidway
S2402
TM
Quidway S2402
Platform
RAS server
Portal
WAP GW
WS
WS
GGSN
Huawei OSS
GPRS/ WCDMA
WIN- CDMA
Still one hour before
boarding, so I can see a
movie with my 3G MS
2014-10-28
HUAWEI Confidential
Page2-4, Total10
WCDMA Services
2014-10-28
HUAWEI Confidential
Page2-5, Total10
WCDMA Services
Home Network
HLR
MAP
gsmSCF
MAP
CAP
GMSC
gsmSSF
VLR
gsmSSF
Incoming line
CAP
MAP
Roaming leg
MS
MSC
MAP
MO call - Outgoing leg
(or Forwarding leg)
Forwarded leg
CAP
Interrogating Network
gsmSRF
Visited Network
Home/Interrogating/Visited Network
2.3.2 LCS
Figure 2-4 shows the network structure of LCS implementation. Here, when
MSC/SGSN supports LCS, new interfaces to various network entities are added: The
Lg interface between MSC/SGSN and GMLC, the Lh interface between GMLC and
HLR, and the Lc interface between GMLC and gsmSCF.
2014-10-28
HUAWEI Confidential
Page2-6, Total10
WCDMA Services
LMU
Type A
CBC
Note 1)
3GSGSN
IuBC
Uu
HLR
Lh
Node B
UE
Iub SRNC
Iu
(SMLC
functionality)
(LMU
Type B)
Lg
Iur
Node B Iub
(LMU
Type B)
3GLg
MSC/VLR
Le
Gateway
MLC
External
LCS client
Lc
Gateway
MLC
RNC
gsmSCF
Other PLMN
LCS Client
LCS Client is the source of sending location requests, and uses the location result to
implement related services based on location. There are four kinds of clients according
to the LCS Client functions.
1)
GMLC is a gateway device in the network connecting to the external LCS Client. After
getting related location request messages through the Le interface, it is responsible for
HLR addressing, and delivering the location requests to the SGSN through the Lg
interface. GMLC is also responsible for delivering related location results to related
LCS Clients, or convents the results into local coordinate information upon request.
MSC/SGSN/VLR
HUAWEI Confidential
Page2-7, Total10
WCDMA Services
processing and control of location procedure, and user privacy protection, and provides
charging information according to the processing.
HLR
HLR stores the subscription data related to LCS, and provides the MSC number of the
located subscriber.
Target UE
The Target UE (also referred as MS) is a target mobile phone located. The network
needs to locate the current or last location of the mobile subscriber according to the
location request. Generally, the target MS is the object to be located. But for MO-LR
(Mobile Originated-Location Request), the target MS is the MS that initiates the location
request.
RNC
In 3G networks, RNC implements the specific locating testing and calculation in LCS
implementation.
LCS client
RNC
SGSN/SGSN Server
Le
GMLC
Lh
RNC
Lg
HLR
MSC/MSC Server
2)
3)
2014-10-28
HUAWEI Confidential
Page2-8, Total10
WCDMA Services
4)
5)
6)
Message Store
2G Mobile
Network
MMSE
MMS Relay
User DB
(Profile/ hlr )
Mailbox
Internet/IP
Network
3G Mobile
Network
A
Mobile
Network
B
MMS User Agent
Roaming MMS User Agent
2014-10-28
HUAWEI Confidential
Page2-9, Total10
WCDMA Services
In terms of physical entities, the MMS Server, the MMS Relay and the MMS User DB
can be integrated to form a Multimedia Messaging Service Center (MMSC). In this way,
the MMSC exists as an independent entity and can be directly superimposed on the
existing GPRS network.
In practice, different manufacturers may adopt different networking modes based on
their own comprehension of the protocols. Next we will introduce a WAP-based
networking mode in the GPRS network. In this mode, the WAP gateway is added
between the MMSC and the wireless network to implement the interconnection
between these two. Figure 2-7 lists the implementation flow of the multimedia
messaging service.
SMTP
IP network
Email
Server
Arrow 1
MMSC
WAP GW
GGSN
1
GPRS backbone network
SGSN1
SGSN2
SMSC
BTS1
BTS2
BSC1
BSC2
MSC/VLR/HLR
2)
3)
4)
2014-10-28
HUAWEI Confidential
Page2-10, Total10
UE
AN
3G CN
3G CS
MSC
VLR GMSC gsmSSF
UTRAN
External network
PSTN
Service application
domain
HLR, SCP
3G PS
Internet
SGSN,GGSN
2014-10-28
HUAWEI Confidential
Page3-1, Total19
Uu
lu
Node B
RNC
USIM
Node B
lub
Cu
ME
MSC/
VLR
lur
GMSC
PLMN PSTN
ISDN,etc
GGSN
INTERNET
HLR
Node B
RNC
SGSN
Node B
UE
UTRAN
CN
External Networks
Node B
Node B is the base station of the WCDMA system (i.e. radio transceiver), and it
interconnects with RNC via the standard Iub interface and processes the physical layer
protocols of the Uu interface. Its main functions include spreading/de-spreading,
modulation/demodulation, channel coding/decoding, and conversion between
baseband signals and RF signals.
Provides the system information broadcast and system access control functions
Provides such mobility management functions as handover and RNC transition
Provides radio resource management and control functions such as macro
diversity combination, power control and radio bearer allocation
3. CN (Core Network)
CN (Core Network) is responsible for connecting other networks as well as
communicating and managing UEs. The core network equipment of different protocol
versions in the WCDMA system differ. Generally, the R99 core network is divided into
the CS domain and the PS domain. The R4 core network is the same as the R99 core
2014-10-28
HUAWEI Confidential
Page3-2, Total19
network, but in the R4 core network, the MSC function of R99 CS is implemented by the
two separate entities: MSC Server and MGW. The R5 core network is the same as the
R4 core network except that R5 has been added with an IP multi-media domain.
The R99 core network has the following function entities:
1)
MSC/VLR
GMSC
GMSC is the gateway node between the CS domain of the WCDMA mobile network
and external networks, and it is an optional functional node. It connects with external
networks (PSTN, ISDN and other PLMN) through the PSTN/ISDN interface, connects
with HLR through the C interface and connects with SCP through the CAP interface. It
implements the routing function of incoming calls in the VMSC function and
inter-network settlement function of such external networks as fixed networks.
3)
SGSN
SGSN (Serving GPRS Support Node) is a functional node of the PS domain in the
WCDMA core network. It connects with UTRAN through the Iu-PS interface, with
GGSN through the Gn/Gp interface, with HLR/AUC through the Gr interface, with
MSC/VLR through the Gs interface, with SCP through the CAP interface, with SMC
through the Gd interface, with CG through the Ga interface and with SGSN interface
through the Gn/Gp interface. And its main functions are route forwarding, mobility
management, authentication and ciphering of the PS domain.
4)
GGSN
GGSN (Gateway GPRS Supporting Node) is a functional node of the PS domain in the
WCDMA core network. It connects with SGSN through the Gn/Gp interface and with
external data networks (Internet/Intranet) through the Gi interface. It provides the
routing and encapsulation of data packets between the WCDMA mobile network and
the external data networks. Its major functions are to provide interfaces to external IP
packet networks. It needs to provide the gateway function for UE to access external
packet networks. From the point of view of external networks, GGSN looks as if it were
a router of all user IP networks in the addressable WCDMA mobile network, and it
needs to exchange routing information with external networks.
5)
HLR
HLR (Home Location Register) is a functional node shared by the CS and PS domains
in the WCDMA core network. It connects with MSC/VLR or GMSC through the C
interface, with SGSN through the Gr interface, and with GGSN through the Gc interface.
And its main functions are to store subscription information for subscribers, support
new services and provide the enhanced authentication function.
HUAWEI Confidential
Page3-3, Total19
can connect RNCs via the direct physical connections among them or connect them
through the transport network. RNC is used to allocate and control the radio resources
of the connected or related Node B. However, Node B serves to convert the data flows
between the Iub interface and the Uu interface, and at the same time, it also
participates in part of radio resource management.
CN
CS
PS
Iu
Iu
RNS
RNS
Iur
RNC
Iub
Node B
RNC
Iub
Iub
Node B
Node B
Iub
Node B
2014-10-28
HUAWEI Confidential
Page3-4, Total19
5. Iu interface
The Iu interface is the interface between UTRAN and CN. Similar to the A interface and
the Gb interface in the GSM system, it is also an open standard interface. It allows
different vendors UTRAN and CN to connect together, and can be divided into the
Iu-CS interface and the Iu-PS interface.
Radio
Network
Layer
Control Plane
User Plane
Application
Protocol
Data
Stream(s)
Transport
Network
Layer
Transport Network
User Plane
Transport Network
Control Plane
Transport Network
User Plane
ALCAP(s)
Signalling
Bearer(s)
Signalling
Bearer(s)
Data
Bearer(s)
Physical Layer
HUAWEI Confidential
Page3-5, Total19
The user plane contains data flows and data bearers to carry these data flows. All
information (such as voice and data) received or sent by UEs is transmitted through the
user plane. The transport network control plane is located between the control plane
and the user plane, and it is just in the transport layer, so it does not contain any
information about the radio network control plane. It contains ALCAP and the signaling
bearer required by ALCAP. ALCAP establishes the transport bearer for the user plane.
By adopting the transport network control plane, the application protocol
implementation of the radio network plane can be independent from the technique
selected for the data bearer of the user plane.
In the transport network, the transport bearer of the data plane in the user plane is built
in such a way: Application protocols in the control plane conduct signaling processing
first, which triggers the establishment of data bearer in the data plane through ALCAP.
However, not all types of data bearers should be established through ALCAP. Without
signaling processing of ALCAP, the transport network control plane is not needed, so
the pre-configured data bearer should be used instead. The signaling bearer of ALCAP
can be the same as or can differ from that of the application protocol. Usually, the
ALCAP signaling bearer is established through O&M operations.
The data bearer of the user plane and the signaling bearer of the application protocol
both belong to the user plane of the transport network. In real-time operations, the data
bearer of the transport network user plane is controlled directly by the transport network
control plane. However, the control operation required for establishing the signaling
bearer of the application protocol belongs to O&M operations.
In conclusion, UTRAN obeys the following principles:
1)
2)
3)
4)
2)
3)
4)
5)
6)
2014-10-28
HUAWEI Confidential
Page3-6, Total19
7)
8)
9)
10)
Serving RNS (SRNS): Managing the radio connection between UE and UTRAN, It
corresponds to the termination point of this UEs Iu interface (Uu interface). All
basic radio resource management is implemented by SRNC in SRNS, for example,
mapping the radio access bearer parameters to the parameters of transport
channels, cell handover and open loop power control. A UE connected with
UTRAN should have one and only one SRNC.
Drift RNS (DRNS): Any RNS except the SRNS used by UE is called the DRNS. Its
corresponding RNC is DRNC. A subscriber can have none, one or several
DRNSs.
Usually, the actual RNC contains all functions of CRNC, SRNC and DRNC.
3.2.5 Node B
Node B is the base station (i.e. radio transceiver) of the WCDMA system, and it
interconnects with RNC through the standard Iub interface to process the physical layer
protocols of the Uu interface. Its main functions include: Spreading/de-spreading,
modulation/demodulation, channel coding/decoding, and conversion between
baseband signals and RF signals. Meanwhile, it implements such radio resource
management functions as inner loop power control. Logically, it corresponds to the
Base Transceiver Station (BTS) in the GSM network.
2014-10-28
HUAWEI Confidential
Page3-7, Total19
R4 3GPP TS 23.002
R5 3GPP TS 23.002
Note:
R means Release.
3GPP began to formulate 3G specifications at the end of 1998 and beginning of 1999.
As scheduled, the R99 version would be completed at the end of 1999, but in fact it was
not completed until March, 2000. After R99, the version was no longer named by the
year. At the same time, the functions of R2000 are implemented by the following two
phases: R4 and R5. In principle, the R99 specification is a subset of the R4
specification set. If R99 is added with new features, it will be upgraded to R4. Similarly,
the R4 specification set is a subset of the R5 specification set. If R4 is added with new
features, it will be upgraded to R5.
For the above three versions, the specific equipment of the PS domain does not
change, but only their protocols are upgraded and optimized. The CS domain and GSM
network of the R99 version do not fundamentally change. In the R4 network, MSC as
the CS domain of the CN is divided into the MSC Server and the MGW, at the same
time, a SGW is added, and HLR can be replaced by HSS (not explicitly specified in the
specification). In the R5 network, the end-to-end VOIP is supported and the core
network adopts plentiful new function entities, which have thus changed the original call
procedures. With IMS (IP Multimedia Subsystem), the network can use HSS instead of
HLR.
2014-10-28
HUAWEI Confidential
Page3-8, Total19
Gi
PSTN
GMSC
GGSN
AuC
C
PSTN
HLR
PSTN
VLR
Gr
Gf
Gs
MSC
Gn
EIR
F
Gc
VLR
SGSN
MSC
Gp
CN
A
Gb
IuPS
IuCS
RNS
BSS
BSC
Abis
BTS
Iur
RNC
RNC
Iubis
BTS
Node B
Node B
cell
Um
Uu
ME
SIM-ME i/f
SIM
or
Cu
USIM
MS
Bold lines indicate the interfaces to support user services while slim lines indicate the interfaces to support signaling
2014-10-28
HUAWEI Confidential
Page3-9, Total19
MSC is specific to the CS domain to connect the radio systems (including BSS and
RNS) and the fixed network. It implements all functions of CS calls, for example,
controlling call proceeding, managing the communication services of MS within this
network or other networks (PSTN/ISDN/PSPDN and other mobile networks), and
providing charging information.
2)
VLR is also specific to the CS domain. It stores the information of the registered
subscribers that enter the control area, so as to provide necessary data of call
connection of mobile subscribers. When an MS roams to a new VLR area, this VLR will
initiate the location registration procedure to HLR and get the necessary subscriber
data; however, when the MS leaves this control area, the subscriber data should be
deleted. Therefore, VLR can be regarded as a dynamic database.
A VLR can manage several MSCs, but usually in implementation, MSC and VLR are
combined.
3)
HLR is a device shared by the CS domain and the PS domain, responsible for
managing the database system of mobile subscribers. PLMN can contain one or more
HLRs, and the detailed configuration mode is determined by subscriber quantity,
system capacity and network structure. All mobile subscriber data of the home location
area, for example, identity flags, location information and subscribed services, are
stored in the HLR.
When a subscriber roams, HLR receives the new location information and requests the
previous VLR to delete all data of the subscriber. When a subscriber is called, HLR will
provide the routing information.
4)
AuC is a device shared by the CS domain and the PS domain to store the entity of
subscriber authentication algorithm and ciphering key. AuC sends authentication and
ciphering data to VLR, MSC and SGSN through HLR, to ensure the legality and
security of communication. Each AuC associates with the corresponding HLR, and it
communicates with others only through this HLR. Usually, AuC and HLR are combined
in the same physical entity.
5)
EIR is a device shared by the CS domain and the PS domain. It stores the International
Mobile Equipment Identity (IMEI) of mobile devices used by the system. The mobile
devices are divided into three levels: white, gray and black, and they are stored in the
corresponding lists respectively. Nowadays, the EIR is not yet used in China.
A minimized EIR can only contain the smallest white list (the device is in the white
level).
6)
SMSC is the specific device of CS domain. GMSC, As the interface between the
system and other public communication networks, has the function of querying location
information. When an MS is called, if the network cannot be sure to which HLR the
subscriber belongs, it should query the HLR through GMSC, and then forwards the call
to the current registered MSC of the MS.
Specifically, operators can decide which MSCs (e.g. part of MSCs or all MSCs) can be
taken as GMSCs,.
7)
2014-10-28
HUAWEI Confidential
Page3-10, Total19
SGSN is a piece of equipment specific to the PS domain, and it provides the connection
between CN and BSS/RNS of the radio access system. In CN, SGSN and
GGSN/GMSC/HLR/EIR/SCP have the corresponding interfaces. SGSN implements
the mobility management and session management of packet data services. It
manages the mobile and communication services of each MS within the mobile
network, and provides the charging information.
8)
GGSN is also a piece of equipment specific to the PS domain. As the interface between
the mobile communication system and other public data networks, it has the function of
querying location information. When an MS is called, first the data is transmitted to
GGSN, then GGSN queries the current location information from HLR and forwards the
call to the current registered SGSN. GGSN also provides the charging interface.
The interface protocols of the R99 core network are shown in Table 3-1.
Table 3-1 Interface names and meanings of the R99 core network
Interface name
Connection entity
A
Iu-CS
B
MSC-BSC
MSC-RNS
MSC-VLR
BSSAP
RANAP
C
D
E
F
G
Gs
H
MSC-HLR
VLR-HLR
MSC-MSC
MSC-EIR
VLR-VLR
MSC-SGSN
HLR-AuC
MAP
MAP
MAP
MAP
MAP
BSSAP+
MSC-PSTN/ISDN/PSPDN
TUP/ISUP
GSN-CG
SGSN-BSC
GGSN-HLR
SGSN-SMS-GMSC/IWMSC
SGSN-SCP
SGSN-EIR
GGSN-PDN
GSN-GSN (Inter PLMN)
GSN-GSN (Intra PLMN)
SGSN-HLR
SGSN-RNC
GTP'
BSSGP
MAP
MAP
CAP
MAP
TCP/IP
GTP
GTP
MAP
RANAP
Ga
Gb
Gc
Gd
Ge
Gf
Gi
Gp
Gn
Gr
Iu-PS
2014-10-28
HUAWEI Confidential
Page3-11, Total19
PSTN
PSTN PSTN
CSMGW
Mc
GMSC
server
GGSN
Gc
HLR
Nc
PSTN
AuC
Nb
VLR
VLR
MSC server
Gn
Gr
EIR
D
G
Gf
Gs
SGSN
MSC server
Nc
Gp
Mc
Mc
CN
CS-MGW
CS-MGW
Nb
A
Gb
IuPS
IuCS
RNS
BSS
BSC
Abis
BTS
Iur
RNC
RNC
Iub
BTS
Node B
Node B
cell
Um
Uu
ME
SIM-ME i/f
SIM
or
Cu
USIM
MS
Bold lines indicate the interfaces to support user services while slim lines indicate the interfaces to support signaling
Note:
(G) MSC Server and MGW can be integrated into a single physical entity - (G) MSC.
In R4 version, the function entities (SGSN and GGSN) of the PS domain remain
unchanged and so do the external interfaces. The function entities of the CS domain
still contain the following devices: MSC, VLR, HLR, AuC, EIR and so on, and the
interrelation between them does not change yet. To meet the development requirement
2014-10-28
HUAWEI Confidential
Page3-12, Total19
of all-IP networks, the entities of the CS domain in R4 version have the following
changes:
1.
When necessary, the MSC can be divided into two different entities: MSC Server
(for processing signaling only) and Circuit Switched Media Gateway (CS-MGW for
processing subscriber data) to implement the MSC function together. The
corresponding GMSC is also divided into GMSC Server and CS-MGW.
1)
MSC Server
The MSC Server is composed of the call control module and the mobility control
module to process calls of the CS domain. It terminates and converts the user-network
signaling into the network-network signaling. It can also contain VLR to process service
data of mobile subscribers and the related CAMEL data.
The MSC Server can control part of call status about the connection control module of
the CS-MGW media channel through interfaces
2)
GMSC Server
The GMSC Server is composed of the call control module and the mobility control
module of GMSC.
2.
HLR can be updated to become a Home Subscriber Server (HSS). For details,
please refer to the R5 network introduction.
3.
There are two kinds of singalling transport methods: TDM based tradictional SS7 and
IP based siganlling transport network SIGTRAN.
A siganlling gateway is needed to convert the transport layer protocol (i.e. between
Sigtran SCTP/IP and SS7 MTP) when two equipments communicate using different
signalling transport method. The SGW does not interpret the application layer (e.g.
MAP, CAP, BICC, ISUP) messages but may have to interpret the underlying SCCP or
SCTP layer to ensure proper routing of the signaling.
In R4 networks, some interface protocols are also added, as shown in Table 3-2.
2014-10-28
HUAWEI Confidential
Page3-13, Total19
Connection entity
A
Iu-CS
B
MSC-BSC
MSC-RNS
MSC-VLR
BSSAP
RANAP
C
D
E
F
G
Gs
H
MSC-HLR
VLR-HLR
MSC-MSC
MSC-EIR
VLR-VLR
MSC-SGSN
HLR-AuC
MSC-PSTN/ISDN/PSPDN
SGSN-CG
SGSN-BSC
GGSN-HLR
SGSN-SM-GMSC/IWMSC
SGSN-SCP
SGSN-EIR
GGSN-PDN
GSN-GSN (Inter PLMN)
GSN-GSN (Intra PLMN)
SGSN-HLR
SGSN-RNC
(G) MSC Server-CS-MGW
MSC Server-GMSC Server
CS-MGW-CS-MGW
HSS-R-SGW
MAP
MAP
MAP
MAP
MAP
BSSAP+
Ga
Gb
Gc
Gd
Ge
Gf
Gi
Gp
Gn
Gr
Iu-PS
Mc
Nc
Nb
Mh
2014-10-28
HUAWEI Confidential
TUP/ISUP
GTP'
BSSGP
MAP
MAP
CAP
MAP
TCP/IP
GTP
GTP
MAP
RANAP
H.248
BICC/ ISUP/TUP
Page3-14, Total19
Legacy mobile
signaling
Network
Applications &
Services *)
SCP
Mh
SGSN
GGSN
Mw
Ms
CAP
Gn
Other PLMN
Gp
CSCF
Um
Iu-ps'
TE
R
Iu
MGCF
T-SGW *)
Mc
GGSN
Gi
Gn
UTRAN
MT
Gi
Gc
SGSN
Iu
Gi
MRF
Gf
ERAN
MT
Mg
Mr
Gi
EIR
TE
Mm
Cx
HSS *)
Gr
Multimedia
IP Networks
CSCF
R-SGW
Iu 2
PSTN/
Legacy/External
MGW
MGW
Uu
Nb
Mc
Mc
Nc
MSC server
Iu = Iu(RANAP)
GMSC server
T-SGW *)
MAP
MAP
Applications
& Services *)
Signalling Interface
Signalling and Data Transfer Interface
Mh
HSS *)
R-SGW *)
*) those elements are duplicated for figure
layout purpose only, they belong to the same
logical element in the reference model
Bold lines indicate the interfaces to support user services while slim lines indicate the interfaces to support signaling
Note:
(G)MSC Server and MGW can be integrated into a single physical entity (G)MSC.
The structure and interface format of R5 version networks is basically the same as that
of R4 networks. However, there are still some differences: In R5, when PLMN includes
the IM subsystem, HLR will be replaced by HSS. Furthermore, the A and Iu-CS
interfaces are supported simultaneously between BSS, CS-MSC/MSC-Server, and the
Gb and Iu-PS interfaces are supported between BSC and SGSN.
For simplicity, R5 interface protocols will not be described here.
Figure 3-8 shows the basic network structure of the IMS in R5 version, where the
function entities and Interfaces of the IMS domain are indicated. All function entities in
the figure can be regarded as independent physical devices. For detail description
please refer to R5 23.002 specification.
2014-10-28
HUAWEI Confidential
Page3-15, Total19
IP Multimedia Networks
Legacy mobile
signalling Networks
PSTN
Mb
Mb
PSTN
BGCF
PSTN
CSCF
Mk
Mm
Mk
Mw
Mj
BGCF
C, D,
Gc, Gr
Mi
Cx
IMSMGW
MGCF
Mr
Mb
MRFP
MRFC
Mb
Dx
Mw
P-CSCF
Gm
Mp
Mb
HSS
CSCF
Mg
Mn
Mb
SLF
UE
IM Subsystem
Go
Bold lines indicate the interfaces to support user services while slim lines indicate the interfaces to support signaling
Note:
The Gm interface between CSCF and UE is also an interface of the IM subsystem. But due to the layout, it
is not indicated in the Figure.
The following function entities are added to R5:
1. Home Subscriber Server (HSS)
With the IM subsystem, the network should use HSS instead of HLR.
HSS is the main database of mobile subscribers in the network and stores the related
service information to support the call/session processing by the network entities. For
example, through authentication, authorization, name/address resolution and location
dependency, HSS supports the call control server to implement smoothly such
procedures as roaming/routing.
Similar to HLR, HSS should maintain and manage such subscriber-related information
as subscriber identity, address, security, location and subscription services. Based on
this information, HSS can support the CC/SM entity of different control systems (CS
domain control system, PS domain control system and IM control system). Its basic
structure and interfaces are shown in Figure 3-9.
2014-10-28
HUAWEI Confidential
Page3-16, Total19
HSS
Subscription
information
Location
information
Gr
SGSN
Gc
Cx
GGSN
CSCF
Controlling part of calling status of the connection control module in the IMS-MGW
media channel
Communicating with CSCF
Selecting CSCF according to the call routing numbers from traditional networks
Converting the call control protocols between ISUP and the IM subsystem
Receiving out-band information and forwarding it to CSCF/IMS-MGW
HUAWEI Confidential
Page3-17, Total19
may support media conversion, bearer control and payload processing (e.g. codec,
echo canceller, conference bridge),.
IMS-MGW implements the following functions:
The IMS-MGW will be provisioned with the necessary resources for supporting
UMTS/GSM transport media. Further tailoring (i.e. packages) of the H.248 may be
required to support additional codecs and framing protocols, etc.
5. Multimedia Resource Function Controller (MRFC)
The MRFC:
Is queried by the I-CSCF during the Registration and Session Setup to get the
name of the HSS containing the required subscriber specific data. Furthermore
the SLF is also queried by the S-CSCF during the Registration.
Is accessed via the Dx interface
The SLF is not required in a single HSS environment. An example for a single HSS
environment is a server farm architecture.
8. Breakout Gateway Control Function (BGCF)
The Breakout Gateway control function (BGCF) selects the network in which PSTN/CS
Domain breakout is to occur. If the BGCF determines that the breakout is to occur in the
same network in which the BGCF is located within, then the BGCF shall select a MGCF
which will be responsible for the interworking with the PSTN/CS Domain. If the break
out is in another network, the BGCF will forward this session signalling to another
BGCF in the selected network.
The functions performed by the BGCF are:
Receives request from S-CSCF to select appropriate PSTN/CS Domain break out
point for the session
Select the network in which the interworking with the PSTN/CS Domain is to occur.
If the interworking is in another network, then the BGCF will forward the SIP
signalling to the BGCF of that network. If the interworking is in another network
and network hiding is required by the operator, the BGCF will forward the SIP
signaling via an I-CSCF(THIG) toward the BGCF of the other network.
2014-10-28
HUAWEI Confidential
Page3-18, Total19
Select the MGCF in the network in which the interworking with PSTN/CS Domain
is to occur and forward the SIP signalling to that MGCF. This may not apply if the
interworking is a different network.
Generation of CDRs.
The BGCF may make use of information received from other protocols, or may make
use of administrative information, when making the choice of which network the
interworking shall occur.
2014-10-28
HUAWEI Confidential
Page3-19, Total19
Source
source coder
channel coder
Modulator
Channel
Destination
source encoder
channel encoder
Demodulator
HUAWEI Confidential
Page4-1, Total12
system. The theory behind is that multi-path signals can be taken as irrelevant ones
when the transporting delay exceeds one chip period.
Baseband
input signal
I
Correlator
with DLL
Local
spread
code
Phase
rotation
Delay
balance
Channel
estimation
Q
Combination
and addition
Path 1
Path 2
Path 3
Time value (path location)
Delay estimation
Correlator
(Pilot channel)
I/Q signal
2014-10-28
HUAWEI Confidential
Page4-2, Total12
Data symbol
Correlator
DMUX
Symbol
judging
LPF
Pilot symbol interpolation
LPF
Figure 4-4 Channel Estimation Based on Interrupted Pilot Condition Using Decision Feedback
Technology
LPF is a low pass filter, filtering the noise in channel estimation output, whose
bandwidth is generally higher than the channel fading rate. When using interrupted pilot,
we should adopt interpolation technology to perform channel estimation in the interval
of pilot. When using decision feedback technology, we should first decide the data
symbols in the channel, and then take the decided results as apriori information (similar
to pilot) to perform complete channel estimation, and accordingly obtain good channel
estimation results through low pass filtering. The shortcoming of this way is low
accuracy of channel estimation and big decoding delay in case of serious noise, due to
non-linear and non-causal prediction technology.
The function of delay estimation is to obtain signal energy distribution in different time
delay locations through matched filter (as shown in Figure 4-5), recognize multi-path
locations with high energy and distribute their time value to different receive paths of
RAKE receiver. The measuring precision of the matched filter can be up to 1/4 ~ 1/2
chip, but the interval in different receive paths of RAKE receiver is one chip. In the
actual implementation, if the speed of updating delay estimation is very fast (such as
once scores of ms), the phase-locked loop of early-late gate is not necessary.
Local spreading codes and scrambling codes
N-1
Serial input
sampling data
N
N-1
HUAWEI Confidential
Page4-3, Total12
The major part used for delay estimation is matched filter, whose function is to correlate
the input data and local codes of different phases and accordingly obtain correlation
energy of different codes and phases. If the sampling data input in serial are the same
as the phases of local spread spectrum code and scrambled code, the correlation
energy is the greatest, with a maximum in the output end of the filter. Depending on
correlation energy, the delay estimator can obtain multi-path arrival time value.
From the perspective of implementation, there are chip level processing and symbol
level processing for the RAKE receiver. For chip level processing, correlator, local code
generator and matched filter are included, while for symbol level processing, channel
estimation, phase rotating and combination are included. Generally, chip level
processing can be implemented with ASIC component, while symbol level processing
can be implemented with DSP. Although the implementation and functions of RAKE
receiver of a mobile station are different from those of a base station, the principles are
just the same.
For several receiver antennas with diversity reception, we can process multiple paths
received by several receiver antennas in the above way. RAKE receiver can receive not
only multiple paths of the same antenna but also multiple paths of different antennas. In
terms of RAKE receiving, the two diversities do not vary essentially. However, the
processing of base-band would get more complex as the data of multiple antennas
requires dividing control processing.
IF demix filter
ADC
I
Digital lower
Q
converter
Power amplifier
Baseband processor
RF AGC
Local
oscillator
Tx filter
Local
oscillator
IF smooth filter
RF AGC
DAC
Data
I/O
I
Digital upper
Q
converter
Upper converter
2014-10-28
HUAWEI Confidential
Page4-4, Total12
Figure 4-6 is a block diagram of CDMA RF and IF principles. For the RF part, it is a
traditional analog structure where valid signals are translated into IF signals. The
downlink channel of RF part mainly consists of automatic gain control (RF AGC),
receive filter (Rx filter) and down-converter. The uplink channel of the RF part mainly
consists of automatic gain control (RF AGC), secondary up-converter, wideband linear
power amplifier and RF transmit filter. The IF part consists of the de-aliasing filter, the
down-converter and the ADC for downlink processing, and the IF, a smoothing filter, the
up-converter and the DAC for uplink processing. Regarding WCDMA digital
down-converter, its bandwidth of output base-band signal is larger than that of the IF
signal by 10%, therefore, called wideband signal, it is different from the general GSM
signal and the first generation signal.
HUAWEI Confidential
Page4-5, Total12
Space Diversity: set several antennas upon the receive end or the transmit end,
and leave enough space (generally exceeding 10 signal wavelength) between
each two antennas to ensure the signals sent/received in each antenna are
mutually independent. Figure 4-7 is an example of dual-antenna transmit diversity
2014-10-28
HUAWEI Confidential
Page4-6, Total12
Antenna 1
Data flow
Transmitting
diversity
processing
Path 2
Antenna 2
Data flow 2
The principle of orthogonal transmit diversity is shown in Figure 4-7. The two antennas
transmit different data: antenna 1 transmits the data in even location while antenna 2
transmits the data in odd location. Owing to the irrelevant transmit data, the data
arriving at receiver antenna via different antenna paths have corresponding diversity,
and accordingly the power of data transmission can be reduced. In the meantime, the
reliability of data transmission is greatly improved due to lower bit rate of single antenna
transmit data. Therefore, transmit diversity can increase the data transmission speed of
the system.
2)
Selective Combination (SC): Select the signal with the best S/N from several
discrete ones as the receive signal.
2)
Equal Gain Combination (EGC): Combine several discrete signals by the same
branch gain and take the combined signal as the receive signal.
2014-10-28
HUAWEI Confidential
Page4-7, Total12
3)
Maximum Ratio Combination (MRC): Control each combined branch gain to make
them in proportion to the S/N of the existing branch, and then combine them to get
receive signal.
The above ways are different between the diversity gains in improving the combined
S/N. Generally, diversity reception is effective to improve the effect of radio channel
reception.
(dB) Improvement (r)
12
10
Equal-gain combination
Optimal choice
0
1
10
Diversity number k
Figure 4-8 shows the improvement of receiving effects of different combinations. As the
diversity number K increases, the improvement of SC is not ideal, while that of EGC
and MRC is better, whose difference is only about 1 dB.
HUAWEI Confidential
Page4-8, Total12
reliability of transmission is increased and error rate is reduced. On the other hand, if
we require the speed of information transmission to remain constant, after supervising
codes are added, the duration of each code in the code block should be reduced. For a
binary code, pulse width should be also reduced. If the normalized width of each code
pulse is 1 before coding, it should be k/n after coding, so channel bandwidth should be
spread by n/k times. In this case, bandwidth redundancy substitutes for reliability of
channel transmission. If the speed of information transmission is allowed to be slower,
the duration of each code after coding can remain the same. In this case, bandwidth
redundancy substitutes for reliability of channel transmission.
As shown in Table 4-1, there are great gaps between coding gains from different coding
methods and the ideal coding gain (up to Shannon limit).
Table 4-1 BPSK or QPSK Coding Gain
Coding Gain
(dB@BER = 10-3)
Coding Adopted
Ideal Coding
Cascaded Code (RS and Convolution
Code Viterbi Coding)
Convolution Code Sequence Coding (Soft
Decision)
Cascaded Code (RS and Group Code)
Convolution Code Viterbi Coding
Convolution Code Sequence Coding
(Hard Decision)
Group Code (Hard Decision)
Convolution Code Threshold Coding
Coding Gain
(dB@BER = 10-5)
Data Speed
11.2
13.6
6.5 ~ 7.5
8.5 ~ 9.5
moderate
6.0 ~ 7.0
8.0 ~ 9.0
moderate
4.5 ~ 5.5
4.0 ~ 5.5
6.5 ~ 7.5
5.0 ~ 6.5
Very High
High
4.0 ~ 5.0
6.0 ~ 7.0
High
3.0 ~ 4.0
1.5 ~ 3.0
4.5 ~ 5.5
2.5 ~ 4.0
High
Very High
It is observed that, for the same modulating, coding gains vary with different coding
schemes. The coding schemes we usually adopt are convolution code, Reed-Solomon
code, BCH code and Turbo code, etc. Convolution code is used for voice and
low-speed signaling in WCDMA, while Turbo code is used for data encoding.
2014-10-28
HUAWEI Confidential
Page4-9, Total12
Convolution encoder 1
Interleafer
Convolution encoder 2
Holing multiplexing
Input m t
Output y t
2014-10-28
HUAWEI Confidential
Page4-10, Total12
The system model of MUD can be shown in Figure 4-10: each user transmits data bit
b1 , b2 ,, bN .
It is observed from the following figure that the performance of MUD depends on
synchronized spread spectrum code word tracing of the correlator, detection
performance of each user signal, relative energy and the accuracy of channel
estimation.
b1
b1
Spreading
code word 1
b1
b1
Spreading
code word 2
b1
b1
b1
b1
bk
b1
Integral
cleaner
b1
b1
Multi-user detection algorithm
b2
Integral
cleaner
Noise n(t)
b1
b 2
b1
b k
Integral
cleaner
Spreading
code word k
b1
b1
b1
b1
According to the uplink MUD, only the intra-cell interference can be canceled. Provided
that the inter-cell interference energy was f times of the intra-cell interference energy,
the capacity in the cell would increase by (1+f)/f without intra-cell interference.
According to the rule that the transmit power attenuates linearly by 4 powers of distance,
the inter-cell interference is 55% of intra-cell interference. Therefore, MUD would
ideally reduce 2.8 times of interference. However in practice, the validity of MUD is
below 100%. The validity of MUD depends on the detection methods, traditional
receiver estimation accuracy and intra-cell user service model. For example, if there
are some high-speed data users in the cell, MUD is adopted to cancel the interference
power caused by these high-speed data users, which obviously can be more effective
to increase system capacity.
But the shortcoming of it is that noise would be increased and demodulation signal
would be greatly delayed. Decorrelator is shown in Figure 4-11.
2014-10-28
HUAWEI Confidential
Page4-11, Total12
S1
H 1(t)
Match filter
S2
H 2(t)
Match filter
SK
R -1
Match filter
H K (t)
Multipath
delay
estimation
R=
Soft judging
Channel
decoder
Soft judging
Channel
decoder
Soft judging
Channel
decoder
Correlation
calculation
[ ]
1
r 1
PIC is, for each user, to cancel signal energy caused by other users at every level of
interference cancellation and demodulate it. The interference caused by other users
can be basically canceled after 3 ~ 5 times of such interference cancellation. Note that
at every level of interference cancellation, not all signal energy caused by other users
can be canceled. We just multiply it by a relatively small coefficient to avoid the growing
error in the traditional receive detection. The advantage of PIC is that it can easily
implement multi-user interference cancellation and the delay of it is better than that of
SIC.
As far as WCDMA uplink MUD is concerned, the present ideal technology is PIC,
because it demands just 3 to 5 times of resources traditional receiver demands, and the
data path delay is also small.
As far as WCDMA downlink MUD is concerned, it focuses on canceling the interference
of downlink common pilot channel, shared channel and broadcast channel and the
interference of common channels in a co-frequency adjacent base station.
2014-10-28
HUAWEI Confidential
Page4-12, Total12
Layer 2
Control/measure
Layer 3
Radio Resource Control (RRC)
Logical channel
Medium Access Control (MAC)
Transport channel
Layer 1
Physical layer
Physical channel
2014-10-28
HUAWEI Confidential
Page5-1, Total35
The physical layer provides data transmission services required by the upper layer.
These services are accessed by using the transport channel through MAC sub-layer.
The physical layer provides services for the MAC layer through a transport channel,
while the proprieties of transmission data determine what kind of transport channel
should be used and how to transmit. The MAC layer provides the RRC layer with
services through a logical channel, while the proprieties of the transmitted data
determine the type of the logical channel. In the Medium Access Control (MAC) layer,
the logical channel is mapped as a transport channel. MAC layer should select proper
Transport Format (TF) for each transport channel, according to the transient source
rate of logical channels. The selection of transmission format relates tightly to the
transport format combination set of each connection (defined by receiver control
module).
RRC layer also provides services for upper layers (non-access stratums) through
Service Access Points (SAPs). The SAPs are used by the upper layer protocol and the
RANAP of the Iu interface respectively on the UE side and the UTRAN side. All
signaling of upper layers (including mobility management, calling control and
conversation management) are compressed into RRC messages, and then are sent
on radio interfaces.
The RRC layer configures such protocol entities of lower layers as physical channels,
transport channels and logical channels by using the control interfaces between it and
lower layer protocols. The RRC layer also uses control interfaces to control commands
in real-time, for example, it requires the lower layers to perform specific measurement,
and asks them to use the same interfaces to report measurement interfaces and error
information.
Logical channel: Carrying user services directly. According to the types of the carried
services, it falls into two types: Control channel and service channel.
Transport channel: It is the interface of radio interface layer 2 and physical layer, and
is the service provided for MAC layer by the physical layer. According to whether the
information transported is dedicated information for a user or common information for
all users, it is divided into dedicated channel and common channel.
Physical channel: It is the ultimate embodiment of all kinds of information when they
are transmitted on radio interfaces. Each kind of channel which uses dedicated carrier
frequency, code (spreading code and scramble) and carrier phase (I or Q) can be
regarded as a dedicated channel.
At the transmitting end, the data flows from MAC and upper layers are transmitted in
radio interfaces, reused and mapped by channel coding, transport channel and
physical channel, spread and modulated by physical channel, and then formed the
data flows of radio interfaces to be transported on the radio interfaces. At the receiving
end, it is a reverse process.
2014-10-28
HUAWEI Confidential
Page5-2, Total35
This chapter gives a brief introduction to logical channels and transport channels, and
focuses on the process of physical channels and layers. By learning the process of
physical channels and layers, we can deeply understand the operating principle of
WCDMA radio interfaces, and get known to the WCDMA network planning.
2014-10-28
HUAWEI Confidential
Page5-3, Total35
2. Scramble
Scramble is used to separate the terminals or BSs, and it is used after spreading
spectrum, so it does not change the bandwidth of signals but only separate the signals
from different sources. After scrambling, the problem that several transmitters use the
same code word spreading spectrum is solved. Figure 5-2 shows the relation between
spreading spectrum and channelization chip rate in UTRA. After the spread spectrum
of channelization code, it already reaches chip rate, so the scrambling code does not
affect the symbol rate.
The table below summarizes the functions and features of the scrambling codes and
channelization codes.
2014-10-28
HUAWEI Confidential
Page5-4, Total35
Table 5-1 Functions and Features of the Scrambling Codes and Channelization Codes.
Channelization code
Scrambling code
chips
Quantity of
code words
Code cluster
Spreading
spectrum
Factor)
2014-10-28
HUAWEI Confidential
Page5-5, Total35
1. Control channel
The following control channels are only used to transmit the information of control
plane:
Broadcast Control Channel (BCCH): Downlink channel used to broadcast system
messages.
Paging Control Channel (PCCH): Downlink channel used to send paging messages.
Common Control Channel (CCCH): Bidirectional channel used to send control
messages between the network and UE. This channel is mapped to RACH/FACH
transport channel. Identifiers of long UTRAN UE (U-RNTI, including SRNC) are
required in this channel, which ensures the uplink messages to be sent to the correct
SRNC.
Dedicated Control Channel (DCCH): Bidirectional channel used to send control
messages between the network and UE. This channel is allocated by the network to
the point-to-point dedicated channel of the UE when RRC is built.
2. Traffic channel
The following traffic channels are only used to transmit the information of user plane:
Dedicated Traffic Channel (DTCH): Bidirectional point-to-point channel dedicated for
one UE and used to transport user information.
Common Traffic Channel (CTCH): Point-to-point down link used to transport the
dedicated user information for all or a group of UEs.
2014-10-28
HUAWEI Confidential
Page5-6, Total35
5.3.4 Indicator
The WCDMA protocol defines a series of indicators for the transport channel. In fact,
an indicator is a fast lower-layer signaling entity. It does not occupy any entity block but
is implemented directly in the physical layer by the physical channel.
There are the following related indicators: Acquisition Indication (AI), Access Preamble
Indication (API), Channel Assignment Indication (CAI), Collision Detection Indication
(CDI), Paging Indication (PI) and Status Indication (SI). Indicators can be either binary
or ternary. Their mapping to the indicator channel is determined by the physical
channel. The physical channel used to transmit indicators is called Indicator Channel
(ICH).
2014-10-28
HUAWEI Confidential
Page5-7, Total35
Figure 5-5 Mapping between the logical channel and the transport channel
2014-10-28
HUAWEI Confidential
Page5-8, Total35
The uplink common physical channel is divided into Physical Random Access Channel
(PRACH) and Physical Common Packet Channel (PCPCH).
1. DPDCH/DPCCH
Figure 5-6 shows the frame structure of the uplink dedicated physical channel. Each
frame is 10 ms long, divided into 15 timeslots. And each timeslot is 2560 chips long,
and corresponds to a power control period.
The DPDCH is a dedicated transport channel. There may be zero, one or more
DPDCHs in a radio link.
SF=256/2 The SF of the DPDCH ranges from 256 to 4. The SF of the uplink DPCCH
is always 256, that is, there are 10 bits for each uplink DPCCH timeslot.
2. PRACH
The physical random access channel is used to transport RACH.
The transmission of the RACH is based on the timeslot ALOHA mode with fast
acquisition indication. The UE may begin to transport in a time offset defined in
advance, indicated as access timeslots. Every two frames have 15 access timeslots,
at an interval of 5120 chips. Figure 5-7 shows the quantity of the access timeslots and
the interval between them. The information about the availability of the access timeslot
in the current cell is provided by the high-layer information.
2014-10-28
HUAWEI Confidential
Page5-9, Total35
Figure 5-7 The access timeslot quantity and interval of the RACHs
The structure of the random access transmission is shown in Figure 5-8. It includes
one or more 4096-chip preambles and a 10-ms or 20-ms message part.
The preamble of the random access transmission is 4096 chips long, and it is 256
times repetition of a signature with the length of 16 chips. Totally, there are 16 different
signatures.
Figure 5-9 shows the structure of the random access messages. The 10-ms message
is divided into 15 timeslots, with T slot=2560 chips. Each timeslot contains two parts:
One is the data part, where the RACH transport channel is mapped; the other is
control part, which is used to transport the control information of layer 1.The data part
and control part are transmitted concurrently. A 10-ms message is composed of one
radio frame, while a 20-ms message is of two 10-ms radio frames. The length of the
message part is determined by the signatures and/or timeslot, which is configured by
the high layer.
k
The data part contains 10*2 bits, where k = 0, 1, 2, 3.For the message data part, they
correspond respectively to 256, 128, 64 and 32 spreading factors.
2014-10-28
HUAWEI Confidential
Page5-10, Total35
The control part includes eight known pilot bits used to support the channel estimation
for the relevant detection and two TFCI bits, which corresponds to 256 spreading
factors for the message control part. In the random access message, the total of TFCI
bits is 15*2=30 bits. The value of TFCI corresponds to a specific transport format of
the current random access information. In case that the PRACH is 20 ms long, the
TFCI will repeat in the second radio frame.
3. PCPCH
The Physical Common Packet Channel (PCPCH) is used to transport CPCH.
The transmission of the CPCH is based on the DSMA-CD (Digital Sense Multiple
Access-Collision Detection) mode with fast acquisition indication. The UE may begin
to transport at the predefined time offset corresponding to the frame border of the BCH
received by the current cell. The timing and structure of the access timeslot is the
same as that of the RACH. The structure of the CPCH random access transmission is
shown in Figure 5-10.The CPCH random access transmission includes the following
parts: One or more 4096-chip-long Access Preambles (APs), one 4096-chip-long
Collision Detection Preamble (CD-P), one 0-timeslot-long or 8-timeslot-long DPCCH
Power Control Preamble (PC-P) and one variable Nx10 ms message.
2014-10-28
HUAWEI Confidential
Page5-11, Total35
Like the RACH preamble part, the feature sequence of the RACH are used here, but
fewer than the RACH preambles. You can select a scramble from different code
segments of the Gold code which consists of the RACH preamble scrambles, and you
can also use the same scramble if the signature is shared.
Like the RACH preamble part, the CPCH collision detection preamble part uses the
feature sequence of the RACH. You can select a scramble from different code
segments of the Gold code which consists of RACH and CPCH preamble scrambles.
The Preamble part of power control is called Power Control Preamble (PC-P) of the
CPCH. The length of the power control preamble (Lpc-preamble) is a high-layer parameter,
and can have zero or eight timeslots.
CPCH messages
Figure 5-11 shows the frame structure of the uplink common physical channel. Each
frame is 10 ms long, divided into 15 timeslots. And T slot = 2560 chips, equal to a power
control period.
Figure 5-11 The frame structure of uplink PCPCH data and control part
2014-10-28
HUAWEI Confidential
Page5-12, Total35
2014-10-28
HUAWEI Confidential
Page5-13, Total35
The parameter k in Figure 5-12 determines the total number of bits in each uplink
DPCH timeslot. It relates to the Spreading Factor (SF) of the physical channel, that is,
k
3. CPICH
The CPICH is a downlink physical channel with fixed rate (30 kbps, SF=256), used to
transport the predefined bit/symbol sequence. Figure 5-14 shows the frame structure
of the CPICH.
2014-10-28
HUAWEI Confidential
Page5-14, Total35
A A A A A A A A A A A A A A A A A A A A A A A A
Antenna 2
-A -A A A -A -A A A -A A -A -A A A -A -A A A -A -A A A -A -A
slot #14
slot #0
Frame#i
Frame Boundary
slot #1
Frame#i+1
Figure 5-15 Modulation mode used for the CPICH (with A = 1+j)
There are two types of CPICH: Primary and secondary CPICH. They have different
purposes in the physical characteristics.
The primary CPICH is the phase reference for the following downlink channels: SCH,
primary CCPCH, AICH and PICH. It is also the default phase reference for other
downlink physical channels.
2014-10-28
HUAWEI Confidential
Page5-15, Total35
has
the following
characteristics:
-
The secondary CPICH may be the reference for the secondary CCPCH and
downlink DPCH. In this case, the high-layer signaling will notify the UE.
4. P-CCPCH
The CCPCH is a downlink physical channel with fixed rate (30 kbps, SF=256), used for
BCH transportation.
Figure 5-16 shows the frame structure of the P-CCPCH. Compared with the downlink
DPCH, it does not have TPC commands, TFCI or pilot bits. Within the first 156 chips of
each timeslot, the P-CCPCH does not transmit. However, in this period, the primary
and secondary SCHs transmit.
2014-10-28
HUAWEI Confidential
Page5-16, Total35
codes exist on the P-CCPCH by receiving the high-layer message, demodulating the
SCH or through the combination of the above two methods.
5. S-CCPCH
Secondary CCPCH is used to transmit FACH and PCH. There are two kinds of
S-CCPCHs: TECI included and TFCI excluded. Whether the TFCI is transmitted is
determined by the UTRAN. Therefore, it is mandatory for all UEs to support the TFCI
using. The possible rate set is the same as that of the downlink DPCH. Please see
Figure 5-18 for the frame structure of the S-CCPCH.
HUAWEI Confidential
Page5-17, Total35
consecutively in the whole cell, however, the S-CCPCH can use the same method as
that of the DCH to transmit in narrow beams (only valid for the S-CCPCH of the
transport FACH).
6. SCH
The Supplemental Channel (SCH) is a downlink channel used for cell search. It
contains two channels: Primary SCH and Secondary SCH. The 10 ms radio frame of
the primary and secondary SCHs is divided into 15 timeslots, each 2560 chips in
length. Figure 5-19 shows the structure of the SCH radio frame.
with cs , of which i = 0, 1,, 63 is the serial number of the scramble group, and k = 0,
1, 2,,14 is the timeslot number. Each SSC is a code selected from 16 different
256-chip-long codes. The sequence of the secondary SCH indicates which code
group the uplink scramble belongs to.
When the transmit diversity is used, the TSTD method will be adopted.
7. PDSCH
The Physical Downlink Shared Channel (PDSCH) is used to transport the Downlink
Shared Channel (DSCH).
One PDSCH corresponds to a root PDSCH channelization code or a channelization
code under it. The PDSCH is allocated within a radio frame, on the basis of a signal
UE. Within a radio frame, the UTRAN can allocate different PDSCHs to different UEs
under the same PDSCH root channelization code, on the basis of code multiplexing.
Within the same radio frame, multiple parallel PDSCHs with the same spreading factor
can be allocated to a signal UE. This is a special example of multi-code transport. The
2014-10-28
HUAWEI Confidential
Page5-18, Total35
frames of all PDSCHs under the same PDSCH root channelization code are
synchronous.
Within different radio frames, the PDSCHs allocated to the same UE can have
different spreading factors.
The structure of the PDSCH frame and timeslot is shown in Figure 5-20.
8. PICH
The Paging Indicator Channel (PICH) is a physical channel with fixed rate (SF=256),
used to transport paging indicators (PIs). The PICH always associates with a
S-CCPCH which is the mapping of a PCH transport channel.
Figure 5-21 shows the frame structure of the PICH.A PICH frame is 10 ms long,
including 300 bits (b0, b1, , b299).Of which, there are 288 bits (b0, b1, , b287) used to
transport the paging indicator. The left 12 bits are not used, which are reserved for the
future.
2014-10-28
HUAWEI Confidential
Page5-19, Total35
9. AICH
The Acquisition Indication Channel (AICH) is a physical channel used to transport the
acquisition indicators (AIs). The AIs correspond to the signatures on the PRACH.
Figure 5-22 shows the structure of the AICH. The AICH consists of 15 consecutive AS
sequences, each 5120 chips in length. Each timeslot is composed of two parts: One is
Access Indication (AI) consisting of 32 real value symbols (a 0, , a31); the other is the
free part of the consecutive 1024 bits, which is not the formal composition of the AICH.
The non-transmit part of the timeslot is reserved for the future CSICH or other physical
channels.
The spreading factor of the AICH channelization code is 256.
The phase reference of the AICH is the P-CPICH.
10. AP-AICH
The Access Preamble Acquisition Indication Channel (AP-AICH) is a physical channel
with a fixed rate (SF = 256) used to transport the API of the CPCH. The API
corresponds to the AP signature transmitted by the UE.
The AP-AICH and the AICH can use the same or different channelization codes. The
phase reference of the AP-AICH is the P-CPICH. Figure 5-23 shows the structure of
the AP-AICH. The AP-AICH uses a 4096-chip-long part to transmit the API, followed
2014-10-28
HUAWEI Confidential
Page5-20, Total35
by a 1024-chip-long free part which is not the formal composition of the AP-AICH. And
this free part of the timeslot is reserved for the future CSICH or other physical
channels.
The spreading factor of the AP-AICH channelization code is 256.
11. CD/CA-ICH
Collision Detection/Channel Assignment Indication Channel (CD/CA-ICH) is a physical
channel with a fixed rate (SF = 256). When the CA is inactive, it is used to transport the
CDI, or when the CA is active, it is used to transport the CDI/CAI. Figure 5-24 shows
the structure of the CD/CA-ICH. The CD/CA-ICH and the AP-AICH can use the same
or different channelization codes.
The CD/CA-ICH uses a 4096-chip-long part to transmit the CDI/CAI, followed by a
1024-chip-long free part which is reserved for the CSICH or other physical channels.
The spreading factor of the CD/CA-ICH channelization code is 256.
12. CSICH
The CPCH Status Indication Channel (CSICH) is a physical channel with a fixed rate
(SF=256), used to transport the CPCH status information.
The CSICH always associates with a physical channel used to transmit the AP-AICH
of the CPCH, and uses the same channelization code and scrambling code as this
2014-10-28
HUAWEI Confidential
Page5-21, Total35
channel. Figure 5-25 shows the frame structure of the CSICH. The CSICH consists of
15 consecutive ASs, each 40 bits in length. Each timeslot is composed of two parts:
One is a 4096-chip-long free point, the other is Status Indication (SI) consisting of 8
bits (b8i,.b8i+7), of which i is the access timeslot number. The CSICH uses the same
modulation as the PICH. And its phase reference is also the P-CPICH.
2014-10-28
HUAWEI Confidential
Page5-22, Total35
Figure 5-26 Mapping relation between transport channels and physical channels
1)
DPCH
Figure 5-27 shows the spreading spectrum principle of the uplink DPCCH and DPDCH.
The binary DPCCH and DPDCH used for spreading spectrum are indicated via real
sequence, that is, the binary 0 is mapped as the real +1, and the binary 1 is mapped
as the real -1.The DPCCH spreads to the dedicated chip rate via the channelization
th
code cc, and the n DPCCH (DPDCHn) spreads to the dedicated chip rate via the
2014-10-28
HUAWEI Confidential
Page5-23, Total35
channelization code cd,n. One DPCCH can transmit simultaneously together with six
parallel DPDCHs.
vi
d.
and DPDCH
After emphasized processing, the power distribution rate of the DPCCH and
2)
PRACH
Preambles for the PRACH
PRACH messages
Figure 5-28 describes the principle of spreading spectrum and scrambling of the
PRACH messages, which include data part and control part. The binary data and
control part used for spreading spectrum are indicated via real sequence, that is, the
binary 0 is mapped as the real +1, and the binary 1 is mapped as the real -1.The
control part spreads to the dedicated chip rate via the channelization code c c, while the
data part spreads to the dedicated chip rate via the channelization code c d.
2014-10-28
HUAWEI Confidential
Page5-24, Total35
and the
c.
After emphasized processing, the code streams of the I and Q channels become those
of the complex value. And then, the signals of this complex are scrambled via S r-msg,n
code. The 10 ms scrambles correspond to the messages part of the 10 ms radio frame,
e.g. the first scramble corresponds to the starting part of radio frame messages.
3)
PCPCH
Preambles for the PCPCH
PCPCH messages
Figure 5-29 describes the principle of spreading spectrum of the PRACH messages,
which is the same as that of the PRACH messages.
HUAWEI Confidential
Page5-25, Total35
Chip sequence of
complex values
generated by
spreading spectrum
Pulse
formed
Pulse
formed
Figure 5-31 Spreading spectrum for all downlink physical channels except the SCH
Figure 5-31 describes how the different downlinks combine. The signals of the
complex value after spreading spectrum (the arrow S in Figure 5-32) are emphasized
via the emphasized factor G. The complex P-SCH and S-SCH are emphasized
respectively by Gp and Gs. All the downlink physical channels are combined together
through complex emphasis.
2014-10-28
HUAWEI Confidential
Page5-26, Total35
Separate the
real part from
the imaginary
part
Chip sequence of
complex values
generated by spreading
spectrum
Pulse
formed
Pulse
formed
2014-10-28
HUAWEI Confidential
Page5-27, Total35
primary synchronization code which is common for all cells. The timeslot timing of this
cell can be got from the wave peak value output by the detection matched filter.
Step 2: Frame synchronization and code set identification
At this step, the UE uses the secondary synchronization code of the SCH to get the
timeslot synchronization, and identifies the cell set found at the first step, which is
implemented by correlating the signals received and all possible secondary
synchronization code sequences, and identifying the maximum correlation value. The
periodical shift of the sequence is unique, so if the code set is the same as the frame
synchronization, it can be confirmed.
Step 3: Scramble identification
At this step, the UE finds the definite primary scramble used by the cell. The primary
scramble is got by correlating all codes in the identified code set on the CPICH
through symbols. After identifying the primary scramble, the primary CCPCH can be
detected, so the specific BCH information of the system and cell can be read.
If the UE has received some related information about the scrambles, step 2 and 3 can
be simplified.
2014-10-28
HUAWEI Confidential
Page5-28, Total35
Paging indication
Paging messages
The UE decodes the BCH so as to find the usable RACH sub-channels and
scrambles as well as signatures.
The UE selects a RACH sub-channel randomly from the usable access group as
well as a signature from the usable signatures.
The UE measures the downlink power level, and sets initial power level for the
uplink RACH.Sending the selected signature in the access preamble
The UE decodes the AICH, views the transmit power of the enhanced preamble
for the 1dB times step length provided by the base station. The preamble will be
resent in the next access timeslot.
After detecting the AICH of the base station, the UE begins to send 10 ms or 20
ms messages transmitted by the RACH.
The RACH procedures are shown in Figure 5-35. The UE keeps sending the preamble
until it receives the confirmation of the AICH, then sends the messages.
2014-10-28
HUAWEI Confidential
Page5-29, Total35
AICH
RACH
PACH
Preamble
AICH
Preamble
PRACH
message
Figure 5-35 Power change of the PRACH preamble and transmission of the messages
When the RACH transmits data, spreading factors and data rates are variable
between frames, which is indicated by the TFCI of the PRACH control part.Usable
spreading factors range from 256 to 32, therefore, a signal frame in the RACH may
have 1200 signaling symbols, which can be mapped as 600 or 400 bits according to
the channel codes.For the maximum bit, its reachable coverage area is smaller than
that transmitted with the minimum rate, especially when the RACH does not use
macro diversity in the dedicated channel.
2014-10-28
HUAWEI Confidential
Page5-30, Total35
CD/CA-ICH
AP-AICH
CPCH
CPCH preamble
AP-ICH
CPCH-CD
CPCH CAI
CPCH message
Before the UE detects the AICH, operations of the CPCH are the same as those
of the RACH, as shown in Figure 5-36.
After that, the UR sends another feature sequence Collision Detection (CD)
preamble with the same power level. This feature sequence is chosen randomly
from the given feature sequence set.
Then, the BS will send the same feature sequence in the CD Indication Channel
(CD-ICH) to respond to the UE. In this way, the collision probability of the first
layer can be reduced.
After receiving the correct response from the BS on the CD Indication Channel
(CD-ICH), the UE will transmit the CPCH messages, which may last several
frames.
Why is the CPCH required to use the collision detection mechanism, while not
required in the RACH?
2014-10-28
HUAWEI Confidential
Page5-31, Total35
First, the long-time transmission requires the collision detection mechanism of the
physical layer. During the RACH procedure, only one RACH message may be lost due
to collision, however, during the CPCH procedure, an undetected collision may cause
several frames lost as well as extra interference.
Secondly, the fast power control of the CPCH helps reduce the interference caused by
data transfer, at the same time, it also emphasizes the importance of adding collision
detection mechanism into the CPCH. If a UE adjusts the power via the power control
command used for other UEs, and sends the data within several frames, it will cause
serious interference in the cell, and more serious during the high rate data
transmission.
Before the transmission of CPCH messages, there is a segment of length-optional
power control preamble for choosing. To quicken the convergence speed of power
control, the power control preambles of eight timeslots use 2dB step length.
The CPCH must restrict the maximum duration for transmission, because the CPCH
does not support soft handoff and compressed mode for measuring within the
frequency and the system. Too long transmission may cause call dropping and strong
interference. The UTRAN set maximum CPCH transmission during service
negotiation.
2014-10-28
HUAWEI Confidential
Page5-32, Total35
Mode 1 uses phase justification: The dedicated pilot symbols (orthogonal) used
by the two antennas to transmit DPCCH are different.
2014-10-28
HUAWEI Confidential
Page5-33, Total35
Figure 5-39 General structure of the downlink transmitter supporting DPCH closed
loop transmit diversity
Table 5-2 summarizes possible modes of open and closed loop transmit diversity
applied in different types of downlink physical channels. The STTD and closed loop
mode are forbidden to be used in the same physical channel at the same time. What is
more, if any downlink physical channel uses a transmit diversity, the P-CCPCH and
the SCH will also use it.
Furthermore, the mode of a transmit diversity used on the PDSCH frame must be the
same as that used on the associated DPCH. Within the duration of the PDSCH frame
and a timeslot before this PDSCH frame, the mode (open or closed loop) of a transmit
diversity used the associated DPCH cannot be changed. However, it is allowed to
convert closed loop mode 1 into closed loop mode 2, or vice versa.
The under the modes of downlink physical channels indicates the mode can be
used, and the indicates it cannot.
Table 5-2 Types of physical channels and modes of transmit diversities
Types of physical channels
2014-10-28
TSTD
STTD
P-CCPCH
SCH
S-CCPCH
DPCH
PICH
PDSCH
AICH
CSICH
HUAWEI Confidential
Page5-34, Total35
2014-10-28
HUAWEI Confidential
Page5-35, Total35
2014-10-28
HUAWEI Confidential
Page6-1, Total67
MO Service Flow
Non Access Stratum : MM/SM/CC/SMS
AS : RANAP
AS :RRC
CN
UTRAN
Switch on
Start Service : Call Control P rocedures of CS , Section Management P rocedures of P S , set up the service bearer
Finish Service : Call Control P rocedures of CS , Section Manage ment P rocedures of P S, release the service bearer
Switch off
Iu Connection Release
2)
3)
4)
5)
6)
The UE is switched on and first enters the signaling exchange of the access
stratum. First the UE selects a PLMN (the network of a certain operator) and a cell,
and camps on an appropriate cell. Then it sets up the RRC connection, and the
signaling connection of the Iu interface. By now, a signaling path has been set up
between the UE and the CN for the non-access stratum signaling procedures
through these access stratum signaling procedures.
Then the non-access stratum mobility management procedure starts between the
UE and the CN. The subscriber attach procedure will be executed, which includes
minor procedures such as authentication, ciphering. The location update
procedure will be executed when the subscriber in idle state change the location.
After passing the procedures such as authentication, the UE enters the
service-related procedures of the non-access stratum, which includes the CS call
connection procedure and the PS session management procedure. These
procedures establish the service bearer for service proceeding. After that, the
subscriber can start to make a call or access the Internet.
When the subscriber ends the service, the CS call connection procedure or the PS
session management procedure will be executed to release the service bearer..
If the subscriber powers off the UE at this time, the UE and the CN will use the
non-access stratum mobility management procedure to detach from the CS
domain or the PS domain.
When the non-access stratum signaling exchange ends, the system will use the
access stratum signaling procedures to clear the previously setup lu signaling
connection and the RRC signaling connection.
2014-10-28
HUAWEI Confidential
Page6-2, Total67
MT Service Flow
Non Access Stratum : MM/SM/CC/SMS
AS : RANAP
AS : RRC
CN
UTRAN
IDLE State:
Iu Connection Setup
Start Service : Call Control P rocedures of CS , or Section Manage ment P roced ures of P S, set up the service bearer
Finish Service : Call Control P rocedures of CS , or S ection Management P roced ures of P S, release the service bearer
IDLE State:
Iu Connection Release
3)
4)
5)
6)
The UE of the subscriber is in the idle state. Now it is paged from the network side.
If there is no available signaling connection between UE and CN, the UE, the RNC
and the CN will enter the access stratum signaling procedures, and set up the
RRC connection and the Iu interface signaling connection.
The authentication and ciphering procedures of mobility management may be
executed.
The service bearer is established through the CS call connection procedure and
the PS session management procedure for service proceeding.
After the service ends, the related service bearer is cleared.
The signaling connections of the access stratum, including the Iu interface
signaling connection and the RRC connection are released.
The above two procedures describe the service proceeding in the case that the
subscriber does not move. The description is simple. Detailed descriptions of the
procedures are given in the subsequent chapters.
Due to the mobility feature of mobile communications, there are a number of
procedures related to mobility processing. For example, if a subscriber changes his/her
location when he/she does not handle any service, mobility management procedures
such as location update will be executed. And if the subscriber changes his/her location
while handling the service, procedures such as handover and SRNS relocation will be
executed.
HUAWEI Confidential
Page6-3, Total67
After establishing an RRC connection, the UE shifts from the idle mode to the
connected mode: CELL_FACH or CELL_DCH state. The connected mode of UE is also
called the RRC state of UE. It reflects the level of the UE connection and the transport
channel that can be used by the UE. When the RRC connection is released, the UE
shifts from the connected mode to the idle mode.
A dedicated physical channel is allocated to the UE in both the uplink and the
downlink.
RNC knows the cell where the UE camps on according the current active set of the
UE.
The UE can use the dedicated transport channels, downlink/uplink shared
transport channels or the combination of these transport channels.
The UE enters the CELL_DCH state in one of the following two ways:
1)
2)
In the idle mode, the UE sets up the RRC connection on the dedicated channel,
thus shifting from the idle mode to the CELL_DCH state.
In the CELL_FACH state, the UE uses the common transport channel and then is
converted to the dedicated transport channel, thus shifting from the CELL_FACH
state to the CELL_DCH state.
2. CELL_FACH state
The CELL_FACH state features the following:
2014-10-28
Page6-4, Total67
Monitors an FACH.
Monitors the BCH channel of the current serving cell to decode the system
messages.
Initiates a cell update procedure when the cell becomes another UTRA cell.
Uses the C-RNTI allocated in the current cell as the UE identification on the
common transport channel unless a new cell is selected.
Transmits uplink control signaling and small data packets on the RACH.
In the CELL_FACH state, if the data service is not activated in a certain time period, the
UE will enter the CELL_PCH state so as to save the power. In addition, if neither the UE
nor the network side has the data transport requirement after the UE temporarily exits
the CELL_PCH state and executes the cell update, the UE will return to the CELL_PCH
state.
3. CELL_PCH state
The CELL_PCH state features the following:
The cell-level location of the UE is known by the UTRAN, specifically, the cell reported
during the last cell update initiated by the UE in the CELL_FACH state.
The UE performs the following operations in the CELL_PCH state:
Monitors the paging time slot based on the DRX period and receives the paging
messages transmitted on the PCH.
Monitors the BCH channel of the current serving cell to decode the system messages.
Initiates the cell update procedure when the cell changes.
The DCCH logical channel cannot be used in this state. To initiate any activity, the
network needs to send a paging request via the PCCH logical channel of the cell where
the UE is.
The UE shifts to the CELL_FACH state in one of the following two ways: By paging from
the UTRAN and by any uplink access.
4. URA_PCH state
The URA_PCH state features the following:
HUAWEI Confidential
Page6-5, Total67
Monitors the paging time slot based on the DRX period and receives the paging
messages transmitted on the PCH.
Monitors the BCH channel of the current serving cell to decode the system
messages.
Initiates the URA update procedure when the URA changes.
The DCCH logical channel cannot be used in this state. To initiate any activity, the
network needs to send a paging request via the PCCH logical channel of the URA
where the UE is.
No resource is allocated for data transport in the URA_PCH state. Therefore, if the UE
has the data transport requirement, it needs to first shift to the CELL_FACH state.
In this paging type, the PCCH (Paging Control Channel) is used to send paging
messages to the UE in the idle mode or in the CELL_PCH or URA_PCH state to page it.
This paging type has the following functions:
To establish a call or a signaling connection, the upper layer at the network side
initiates the paging procedure.
To transit the UE state from CELL_PCH or URA_PCH to CELL_FACH, the
UTRAN initiates the paging to trigger the UE state transition.
When the system message changes, the UTRAN initiates the paging of the UE in
the idle mode or in the CELL_PCH or URA_PCH state so as to trigger the UE to
read the updated system information.
UTRAN
UE
PAGING TYPE 1
2014-10-28
HUAWEI Confidential
Page6-6, Total67
The UTRAN initiates the paging procedure by sending a PAGING TYPE 1 message at
a proper paging time slot via the PCCH. This paging moment is related to the IMSI of
the UE. The UTRAN may page a UE at several paging time slots to let the UE correctly
receive the paging message.
2)
In this paging type, the dedicated paging message is sent to a UE in the CELL_DCH or
CELL_FACH state.
UTRAN
UE
PAGING TYPE 2
2014-10-28
HUAWEI Confidential
Page6-7, Total67
User selection
of PLMN
Indication
to user
Automatic/
Manual selection
PLMN Selection
and Reselection
Location
Registration
response
PLMNs
available
PLMN
selected
NAS Control
Cell Selection
and Reselection
Radio measurements
Registration
Area
changes
CM requests
Location
Registration
After the UE camps on the cell and its registration succeeds, the signal strengths of the
current cell and the neighboring cells keep changing as the UE moves. Therefore, the
UE needs to select the most suitable cell. This is the cell reselection procedure. The
most suitable cell may not be the cell with the best signal quality currently. For example,
the UE is at the border of a cell, and moves between two cells that belong to different
LAs or RAs. In this case, the UE keeps initiating the location update, thus wasting the
network resources and the UEs energy. Therefore, the reselection of a cell from all the
cells shall follow a certain rule that is detailed later.
When finding out that the cell selected during the cell reselection belongs to another LA
or RA, the UE shall initiate the location update procedure so that the network can get
the latest location information of the UE. It detects the change of the LA or RA via the
SIB1 in the system broadcast message.
If the location registration or update fails, for example, the network rejects the UE, or
the UE is outside the coverage of the current PLMN, the UE can conduct the PLMN
reselection to select another available PLMN.
2014-10-28
HUAWEI Confidential
Page6-8, Total67
The cell search aims to find a cell, although the cell may not belong to the selected
PLMN. The cell search procedure is as follows (it is certain that a frequency should be
locked in the first place):
The UE synchronizes the slot via the primary SCH. After that, it shall synchronize the
frame. The frame synchronization is implemented by using the synchronization code of
the secondary SCH. This procedure also determines the scramble group of the cell.
Then the UE finds the scramble with the maximum result value by associating each
scramble in the scramble group with the CPICH. Thus the primary scramble is
determined.
It is obvious that if the UE has already known some information of the cell, such as the
frequency or even the primary scramble, the above procedure can be greatly speeded
up.
2)
The UE obtains the scramble of PCCPCH in Step 1) above. The PCCPCH channel
code is already known and is unique in the entire UTRAN. The UE now can read the
information in the broadcast channel.
2014-10-28
After reading the MIB, the UE can decide whether the PLMN currently found is the
desired PLMN, since the MIB has the PLMN identity field. If yes, the UE will find
the other SIBs and get their contents based on the scheduling information of the
other SIBs in the MIB. If not, the UE has to search for the next frequency and start
the procedure over again (starting from the cell search).
If the current PLMN is the PLMN to be found by the UE, then the UE reads SIB3
and gets Cell selection and re-selection info. It calculates whether the cell
residence standard is satisfied with the acquired information. If the standard is
HUAWEI Confidential
Page6-9, Total67
satisfied, then the UE considers the cell as a suitable cell. It then camps on the cell,
reads other necessary system information, and then initiates the location
registration procedure.
If the above conditions are not satisfied, the UE then reads SIB11 and obtains the
neighboring cell information. Then it can calculate and decide whether the neighboring
cell satisfies the cell selection and residence standards.
When finding any neighboring cell satisfying the cell residence standard, the UE will
camp on the cell, read the other necessary system information, and then initiate the
location registration procedure.
If it does not find a cell satisfying the cell residence standard, it will consider that there is
no PLMN coverage, and proceed with the PLMN selection and reselection procedure.
2. Cell reselection
In the idle mode, the UE needs to monitor the signal quality of the current cell and the
neighboring cell so as to select the best cell to provide the service. This is the cell
reselection procedure. If the cell reselection condition is satisfied within the
Treselection time, the UE will select the cell, camp on the cell, and read its broadcast
message. By now, the cell reselection ends.
3. Cell selection after the UE leaves the connected mode
When transiting from the connected mode to the idle mode, the UE needs to conduct
the cell selection to find a suitable cell. This selection procedure is the same as the
common cell selection procedure. The only difference is that the cell selected at this
time is cell used in the connected mode. If a suitable cell cannot be found from these
cells, the stored information cell selection mode should be adopted.
2014-10-28
HUAWEI Confidential
Page6-10, Total67
SRNC
NodeB
UE
3. RL SESETUP REQUEST
2. Allocate
RNT1, L1 and
L2 parameters
4. RL SETUP RESPONSE
3)
4)
5)
6)
7)
The UE sends an RRC Connection Request message via the uplink CCCH to
request to establish an RRC connection.
Based on the RRC connection request cause and the system resource state, the
SRNC decides to establish the connection on the dedicated channel, and
allocates the RNTI and L1 and L2 resources.
The SRNC sends a Radio Link Setup Request message to Node B, requesting
the Node B to allocate specific radio link resources required by the RRC
connection.
After successfully preparing the resources, the Node B responds to the SRNC with
the Radio Link Setup Response message.
The SRNC initiates the establishment of Iub user plane transport bearer with the
ALCAP protocol and completes the synchronization between the RNC and the
Node B.
The SRNC sends an RRC Connection Setup message to the UE in the downlink
CCCH.
The UE sends an RRC Connection Setup Complete message to the SRNC in
the uplink DCCH.
2014-10-28
HUAWEI Confidential
Page6-11, Total67
SRNC
UE
CN
2)
3)
4)
After the RRC connection is established, the UE sends the Initial Direct Transfer
message to the RNC via the RRC connection. This message carries the NAS
information content sent to the CN by the UE.
After receiving the Initial Direct Transfer message from the UE, the RNC sends the
SCCP Connection Request (CR) message to the CN via the Iu interface. The
message content is the Initial UE Message sent from the RNC to the CN, and
carries the message content sent from the UE to the CN.
If the CN is ready to accept the connection request, then it returns the SCCP
Connection Confirm (CC) message to the RNC. The SCCP connection is
successfully set up. The RNC receives the message and confirms the signaling
connection setup success.
If the CN cannot accept the connection request, then it returns the SCCP
Connection Reject (CJ) message to the RNC. The SCCP connection setup fails.
The RNC receives the message and confirms the signaling connection setup
failure. Then it initiates the RRC release procedure.
After the signaling connection is successfully set up, the message sent by the UE to the
CN is forwarded to the RNC via the Uplink Direct Transfer message, and the RNC
converts it into the Direct Transfer message to send to the CN. The message sent by
the CN to the UE is forwarded to the RNC via the Direct Transfer message, and the
RNC converts it into the Downlink Direct Transfer to send to the UE.
HUAWEI Confidential
Page6-12, Total67
The RAB setup is initiated by the CN and executed by the UTRAN. The basic
procedure is as follows:
First the CN sends the RAB assignment request message to the UTRAN,
requesting the UTRAN to establish the RAB.
The SRNC in the UTRAN initiates the establishment of the data transport bearer
between the Iu interface and the Iub interface (Iur interface).
The SRNC sends the RB setup request to the UE.
After completing the RB establishment, the UE responds to the SRNC with the RB
setup complete message.
The SRNC responds to the CN with the RAB assignment response message and
the RAB setup procedure ends.
When the RAB is successfully established, a basic call is set up and the UE enters the
conversation process.
The RAB setup procedure falls into the following three cases based on the radio
resource utilization (the radio resource states when the RRC connection is set up and
when the RAB is set up):
1)
2)
3)
DCH-DCH: The RRC uses the DCH, while the RAB prepares to use the DCH.
RACH/FACH-RACH/FACH: The RRC uses the CCH, while the RAB prepares to
use the CCH.
RACH/FACH-DCH: The RRC uses the CCH, while the RAB prepares to use the
DCH.
1)
In the synchronous case, after receiving the configuration message from the
SRNC, the Node B and the UE cannot use the new configuration parameters
immediately. Instead, they obtain the synchronization time specified by the SRNC
from the message, and use the new configuration parameters at the
synchronization time.
In the asynchronous case, after receiving the configuration message from the
SRNC, the Node B and the UE immediately use the new configuration
parameters.
Synchronous RL reconfiguration
2014-10-28
After receiving the RL reconfiguration message from the SRNC, the Node B
cannot use the new configuration parameters immediately. Instead, they prepare
the corresponding radio resources, and wait for the reconfiguration commit
message from the SRNC so as to get the synchronization time specified by the
SRNC from the message.
After receiving the configuration message from the SRNC, the UE cannot use the
new configuration parameters immediately. Instead, it gets the synchronization
time specified by the SRNC from the message.
The Node B and the UE use the new configuration parameters at the same time in
the synchronization time specified by the SRNC.
HUAWEI Confidential
Page6-13, Total67
UE
NodeB
SRNC
CN
3. RL RECONFIG PRE
4. RL RECONFIG READY
5.ALCAP establishment and synchronization
6. RL RECONFIG COMMIT
7. RRC: RB SETUP
8. RRC: RB SETUP COMPLETE
2)
The CN sends the RANAP RAB (Radio Access Bearer) Assignment Request
message to the UTRAN to initiate the RAB setup request.
After receiving the RAB setup request, the SRNC maps the QoS parameter of the
RAB as the AAL2 link feature parameter and the radio resource feature parameter.
The ALCAP of the Iu interface initiates the user plane transport bearer setup
procedure of the Iu interface based on the AAL2 link feature parameter (only for
setuping RAB of Iu-CS interface user plane).
The SRNC sends the NBAP Radio Link Reconfiguration Prepare message to its
subordinate Node B, requesting it to prepare to add one (or more) DCH for RAB
bearer on the existing radio link.
The Node B allocates the corresponding resources, and sends the Radio Link
Reconfiguration Ready message to its home SRNC, notifying it that the radio link
reconfiguration is ready.
The ALCAP of the Iub interface in the SRNC initiates the user plane transport
bearer setup procedure of the Iub interface. The Node B and the SRNC establish
synchronization with each other by exchanging the uplink and downlink
synchronization frames of the DCH frame protocol.
The SRNC sends the Radio Link Reconfiguration Commit message to its
subordinate Node B.
The SRNC sends the RRC Radio Bearer Setup message to the UE.
After executing the RB setup, the UE sends the Radio Bearer Setup Complete
message to the SRNC.
After receiving the Radio Bearer Setup Complete message, the SRNC responds
to the CN with the Radio Access Bearer Assignment Response message. The
RAB setup procedure ends.
Asynchronous RL reconfiguration
2014-10-28
HUAWEI Confidential
Page6-14, Total67
UE
NodeB
SRNC
CN
3. RL RECONFIG REQ
4. RL RECONFIG RESP
5. ALCAP establishment and synchronization
6. RRC: RB SETUP
7. RRC: RB SETUP COMPLETE
8. RANAP: RAB ASSIGNMENT RESPONSE
The CN sends the RANAP RAB (Radio Access Bearer) Assignment Request
message to the UTRAN to initiate the RAB setup request.
After receiving the RAB setup request, the SRNC maps the QoS parameter of the
RAB as the AAL2 link feature parameter and the radio resource feature parameter.
The ALCAP of the Iu interface initiates the user plane transport bearer setup
procedure of the Iu interface based on the AAL2 link feature parameter.
In the asynchronous case, synchronization is not required for the radio
reconfiguration. The SRNC sends the NBAP Radio Link Reconfiguration Request
message to its subordinate Node B, requesting it to set up a new DCH on the
existing radio link.
After receiving the Radio Link Reconfiguration Request message, the Node B
allocates the corresponding resources, and sends the Radio Link Reconfiguration
Response message to its home SRNC, notifying it that the radio link
reconfiguration is complete.
The ALCAP of the Iub interface in the SRNC initiates the user plane transport
bearer setup procedure of the Iub interface. The Node B and the SRNC establish
synchronization with each other by exchanging the uplink and downlink
synchronization frames of the DCH frame protocol.
The SRNC sends the RRC Radio Bearer Setup message to the UE.
After executing the RB setup, the UE sends the Radio Bearer Setup Complete
message to the SRNC.
After receiving the Radio Bearer Setup Complete message, the SRNC responds
to the CN with the Radio Access Bearer Assignment Response message. The
RAB setup procedure ends.
Page6-15, Total67
2)
3)
Initiates the release of the user plane transport bearer of the Iu interface.
Releases the RRC connection.
The RRC release is to release the signaling link and all the radio bearers between the
UE and the UTRAN. Based on the resources seized by the RRC connection, the RRC
release can be further divided into two types: Release of the RRC connection
established on a dedicated channel, and release of the RRC connection established on
a common channel.
1. Release of the RRC connection established on a dedicated channel
UE
NodeB
SRNC
The RNC sends the RRC Connection Release message to the UE.
The UE returns the RRC Connection Release Complete message to the RNC.
The RNC sends the Radio Link Deletion message to the Node B to delete the
radio link resources in the Node B.
After releasing its related resources, the Node B returns the Radio Link Deletion
Response message to the RNC.
The RNC initiates the ALCAP release of the user plane transport bearer of the Iu
interface.
In the end, the RNC initiates the local L2 resource release again. By now, the RRC
connection release procedure ends.
2. Release of the RRC connection established on a common channel
During the release of the RRC connection established on a common channel, since the
cell common resources are used, it is only necessary to release the UE directly instead
of releasing the Node B resources and the data transport bearer.
2014-10-28
HUAWEI Confidential
Page6-16, Total67
3)
Active set: The set of cells currently used by the UE. The execution result of the
soft handover indicates the increase or decrease of the cells in the active set.
Observation set: The set of cells that are not in the active set but are being
observed by the UE based on the neighboring cell information from the UTRAN.
The UE measures the cells in the observation set. When the measurement results
satisfy certain conditions, the cells may be added to the active set. Therefore, the
observation set sometimes is also called the candidate set.
Detected set: The set of cells that have been detected by the UE but do not belong
to the active set or the observation set. The UTRAN can request the UE to report
the measurement result of the detected set. Since the cells in the detected set are
not listed in the neighboring cell list, this set is also called the unlisted set.
2)
3)
4)
5)
Based on the measurement control information from the RNC, the UE measures
the intra-frequency neighboring cells, and reports the measurement result to the
RNC after processing.
The RNC compares the reported measurement result with the set threshold to
decide the cells to be added and deleted.
If some cells are to be added, the RNC notifies the Node B to get ready.
The RNC notifies the UE to add and/or delete cells via the active set update
message.
After the UE successfully update the active set, if the cells are deleted, the Node B
will be notified to release the corresponding resources.
The original communication is not affected during the soft handover procedure so that
smooth handover from a cell to another can be successfully completed.
2. Hard handover
In the case the neighboring cells are inter-frequency cells, hard handover instead of
soft handover can be conducted. In the hard handover procedure, the communication
with the previous cells is interrupted first, and then is connected with new cells.
Therefore, the soft handover performance is not as good as soft handover. Generally,
the hard handover is considered only when the soft handover cannot be conducted.
2014-10-28
HUAWEI Confidential
Page6-17, Total67
The target cell of hard handover may not be measured. It is applicable for the hard
handover in emergency, but it has a high failure ratio. In the common hard handover, it
is necessary to measure the target cell. However, the UE is generally configured with
only one decoder, it cannot decode signals of two frequencies simultaneously.
Therefore, to enable the UE to conduct inter-frequency measurement, the compressed
mode technology is introduced into the WCDMA system.
One frame
(10 ms)
Generally, when hard handover occurs between different RNCs, both RNCs have the
Iur interface. Otherwise, the hand handover should be completed via relocation.
There are 5 signaling procedures at the Uu interface to complete the hard handover:
1)
2)
3)
4)
5)
The following figure gives the hard handover signaling procedure of cells in different
Node Bs by taking the physical channel reconfiguration as an example
2014-10-28
HUAWEI Confidential
Page6-18, Total67
UE
Old NodeB
SRNC
3. ALCAP establishment
4. PHYSICAL CHANNEL RECONFIGURATION
5. RADIO LINK
FAILURE INDICATION
6. PHYSICAL CHANNEL RECONFIGURATION COMPLETE
7. RADIO LINK
DELETION REQUEST
8. RADIO LINK
DELETION RESPONSE
9. ALCAP release
6)
7)
8)
9)
The SRNC sends the Radio Link Setup Request message to the Node B where
the target cell is, requesting the Node B to establish a radio link.
The Node B where the target cell is sends the Radio Link Setup Response
message to the SRNC, indicating the radio link is successfully established.
The SRNC adopts the ALCAP protocol to set up the Iub interface transport bearer
between the SRNC and the target Node B, and synchronizes the FP.
The SRNC sends the Physical Channel Reconfiguration message carrying the
target cell information to the UE via the downlink DCCH.
After the UE hands over from the source cell to the target cell, the Node B of the
source cell detects the radio link communication failure and then sends the Radio
Link Failure Indication message to the SRNC, indicating the radio link failure.
After successfully handing over to the target cell, the UE sends the Physical
Channel Reconfiguration Complete message to the SRNC via the DCCH,
notifying the SRNC that the physical cannel reconfiguration is complete.
The SRNC sends the Radio Link Deletion Request message to the Node B where
the source cell is, requesting the Node B to delete the radio link of the source cell.
The Node B where the source cell is deletes the radio link resources, and then
responds to the SRNC with the Radio Link Deletion Response message.
The SRNC adopts the ALCAP protocol to release the Iub interface transport
bearer of the SRNC and the Node B where the source cell is.
3. Forward handover
Forward handover is a part of the RRC connection mobility management. The forward
handover consists of cell update and URA update. It is used to timely update the
UE-related information at the UTRAN side when the UE location changes. It can also
be used to monitor the RRC connection, switch the RRC connection state, and report
errors and forward information. For both the cell update and the URA update, the
update procedure is initiated by the UE.
1)
2014-10-28
Cell update
HUAWEI Confidential
Page6-19, Total67
The UE in the CELL_FACH, CELL_PCH or URA_PCH can initiate the cell update
procedure. There are different cell update causes and cell update procedures for
different connection states.
In the case the cell update cause is periodical cell update, and the UTRAN side
does not allocate CRNTI or URNTI to the UE, the procedure is as follows:
UE
UTRAN
1. CELL
UPDATE
2)
The UE sends the CELL UPDATE message to the UTRAN via the CCCH.
After processing the CELL UPDATE message received from the UE, the UTRAN
sends the CELL UPDATE CONFIRM message to the UE. The cell update ends at
the UTRAN side, and it ends at the UE side after the UE receives the CELL
UPDATE CONFIRM message.
Physical channel reconfiguration will accompany the procedure in the following
two cases: 1) The cell update cause is there is uplink data transport or response to
paging, the UTRAN side does not allocate CRNTI or URNTI to the UE or indicate
the related physical channel information, and the TFS/TFCS saved in the UE is the
same as that in the PRACH/SCCPCH broadcasted by the system message; 2)
The cell update cause is there are uplink data, or response to paging, or cell
reselection, the UTRAN side allocates CRNTI or URNTI to the UE but does not
indicate the related physical channel information, and the TFS/TFCS saved in the
UE is the same as that in the PRACH/SCCPCH broadcasted by the system
message.
Transport channel reconfiguration will accompany the procedure in the following
two cases: 1) The cell update cause is there is uplink data transport or response to
paging, the UTRAN side does not allocate CRNTI or URNTI to the UE or indicate
the related physical channel information, and the TFS/TFCS saved in the UE
differs from that in the PRACH/SCCPCH broadcasted by the system message; 2)
The cell update cause is there are uplink data, or response to paging, or cell
reselection, the UTRAN side allocates CRNTI or URNTI to the UE but does not
indicate the related physical channel information, and the TFS/TFCS saved in the
UE differs from that in the PRACH/SCCPCH broadcasted by the system message.
In the case the cell update cause is periodical update, the UTRAN side allocate
CRNTI or URNTI to the UE but does not indicate the related physical channel
information, the UE will update its identification, that is, the RNTI reallocation will
accompany the procedure.
URA update
The purpose of the URA update procedure is that the UE in the URA_PCH state uses
the current URA to update the UTRAN after the URA reselection. This procedure can
also be used to monitor the RRC connection when there is no URA reselection. Several
different URA IDs can be broadcast in a cell, and different UEs in a cell can belong to
different URAs. There is one and only one valid URA when the UE is in the URA_PCH
2014-10-28
HUAWEI Confidential
Page6-20, Total67
state. When the UE is in the URA_PCH state, if the URA assigned to the UE is not in the
URA ID list broadcast in the cell, the UE will initiate the URA update procedure. Or, if the
UE is in the service area but T306 expires, the UE will also initiate the URA update
procedure.
In the case the UTRAN does not allocate a new CRNTI or URNTI to the UE during
the URA update procedure, the procedure is as follows:
UE
UTRAN
1. URA UPDATE
Figure 6-15 URA update procedure (no new CRNTI or URNTI allocated)
The specific procedure is given as follows:
The UE sends the URA UPDATE message to the UTRAN via the CCCH.
After processing the URA UPDATE message received from the UE, the UTRAN
sends the URA UPDATE CONFIRM message to the UE and ends the URA
update at its end. The URA update procedure ends at the UE side after the UE
receives the URA UPDATE CONFIRM message.
During the URA update procedure, if the UTRAN allocates a new CRNTI or URNTI
to the UE, then there is the RNTI REALLOCATION COMPLETE message sent by
the UE to the UTRAN in the procedure.
4. Inter-system handover
The WCDMA system supports UE handover between the UTRAN and the existing
systems (such as the GSM/GPRS). The inter-system handover falls into two cases:
Handover under network control (such as the GSM) and cell reselection of the UE
(such as GPRS), both of which are further divided into handover-to UTRAN and
handover-from UTRAN cases. The following details the inter-system handover
procedure by taking the handover-to UTRAN under the network control as an example
only. It only covers the signaling in the UTRAN.
2014-10-28
Handover to UTRAN
HUAWEI Confidential
Page6-21, Total67
CN
UTRAN
UE
1.RELOCATION REQUEST
2. RELOCATION REQUEST
ACKNOWLEDGE
3. HANDOVER TO UTRAN
COMPLETE
3)
The CN notifies the UTRAN that a UE is to be handed over to it via the Relocation
Request message.
After getting the resources ready, the UTRAN sends the Relocation Request
Acknowledge message to the CN. This message carries the Handover To UTRAN
Command message that is to be forwarded to the UE by the peer system.
After successfully handed over to the UTRAN, the UE sends the Handover To
UTRAN Complete message to the UTRAN.
CN
SRNC
Old SRNC
DRNC
NODEB
CELL
NODEB
NODEB
CELL
CELL
CELL
SRNC
CELL
NODEB
CELL
CELL
CELL
UE
UE
HUAWEI Confidential
Page6-22, Total67
There are two CN domains in the WCDMA system. When the relocation occurs, if the
UE has connections with both of the CN domains, then the domains must be migrated
at the same time.
2. Associated relocation
Associated relocation refers to that the UE accesses the target RNC from the SRNC via
hard handover, and the Iu interface changes at the same time. Since the relocation
procedure requires the UEs participation, it is also called the UE Involved relocation.
The connection change is shown in the following figure:
CN
SRNC
CN
Target RNC
NODEB
CELL
Old SRNC
NODEB
CELL
CELL
CELL
SRNC
NODEB
CELL
CELL
NODEB
CELL
CELL
UE
UE
2014-10-28
HUAWEI Confidential
Page6-23, Total67
When the UE is switched on or the mobile subscriber roams to cause the change of his
location. The Update Location Type indicates IMSI Attach in the case of UE switch-on
while Normal Updating in the case of subscriber roaming.
The UE compares the LAI in the broadcast message it has received with the LAI stored
in itself. If these two LAIs are the same, the UE will initiate the IMSI Attach procedure;
otherwise it will initiate the Normal Updating operation.
2. Periodic location registration
It is to execute the Update Location operation of MAP and the Update Location Type
parameter in the Update Location Request message indicates Periodic Updating.
Through periodic location registration (location update), the PLMN can keep track of
the current state of each mobile subscriber, especially those subscribers that have no
operation for a long period of time. The location update period and the protection time
can be set and adjusted by the PLMN operator according to the specific traffic and
subscriber habits.
3. Subscriber data deletion
It is to execute the Cancel Location operation of MAP.
Through subscriber data deletion, subscriber records can be deleted from the VLR and
the cases include the subscriber data deletion caused by subscriber roaming, that
caused by no subscriber operation for a long period of time and the deletion of the
invalid subscriber data by system administrators.
The purpose of subscriber data deletion is to enable the HLR to delete the old
subscriber information in the VLR at the time of location update or enable the
independent location deletion triggered by subscriber data modification and allow
operating staff to delete the subscriber location information.
The following figure depicts a typical location update flow that basically comprises the
above three procedures.
2014-10-28
HUAWEI Confidential
Page6-24, Total67
B.
2)
3)
4)
The MSC/VLR receives the location update request initiated by the subscriber with
TMSI. If the TMSI is not known:
If the carried old location information indicates the location area of an adjacent
VLR, the MSC/VLR will initiate the procedure for getting the identification from
PVLR. For details, refer to the SEND IDENTIFICATION procedure indicated in the
above figure.
If the old location area is one of a non-adjacent VLR or the request for identification
from PVLR fails, the MSC/VLR will initiate a procedure (not indicated in the above
figure) to request the UE to provide the IMSI. For details, refer to the subsequent
sections.
If it is the first time for the subscriber to register its location in the current VLR, a
location update request will be initiated to the HLR. Otherwise, the LOCATION
UPDATING ACCEPT procedure will follow directly.
If the HLR finds that the MSC/VLR number involved in subscriber roaming has
changed upon receipt of the location update request from MSC/VLR, it will initiate
the CANCEL LOCATION procedure to PVLR so as to delete the subscriber
information in PVLR.
If the roaming request is rejected, the HLR will directly initiate a location update
response with the reject information to the MSC/VLR; otherwise it will insert
subscriber data to the MSC/VLR before deciding to accept or reject the location
update request according to the result of subscriber data insertion.
6.5.2 Detachment
The detachment procedure is the procedure of IMSI Detach initiated by the UE upon
switch-off, after which the MSC/VLR will set the subscriber state to IMSI detached. It
should be noted that this procedure will not be notified to the HLR. This is different from
the Purge procedure, because the HLR contains no Detach/Attach state indicator bit for
the subscriber but the Purge procedure involves this indicator bit. For details, refer to
the subsequent Purge operation descriptions.
2014-10-28
HUAWEI Confidential
Page6-25, Total67
If the subscriber is called, the HLR will request for a roaming number from VLR through
the Provide Roaming Number procedure. Since the subscriber is detached, the Provide
Roaming Number procedure will fail with the cause value of Absent Subscriber
returned and the calling MSC will play the subscriber switch-off announcement to the
calling UE according to this cause value.
The detachment procedure is shown in the following figure.
6.5.3 Identification
The identification procedure takes place at the Iu interface so that the network can
provide IMEI or IMSI information to the UE. The Identity procedure is executed for
subscriber identification.
There are two types of Identity procedures:
When the VLR does not contain any IMEI of the UE, one Identity procedure will be
forced for execution and the network will initiate a request for the IMEI to the UE
through the Identity Request message while the UE will provide the IMEI to the
network through the Identity Response message.
The typical cases are the first location update of the UE, the invalidity of subscriber
IMEI stored in the VLR (note that this will not affect the subscribers since presently IMEI
authentication is not yet applied).
When the TMSI is unidentifiable during location update, one Identity procedure will
also be forced for execution and the network will initiate a request for the IMSI to
the UE through the Identity Request message while the UE will provide the IMSI to
the network through the Identity Response message.
The typical cases include subscriber roaming and the areas without using the TMSI.
2014-10-28
HUAWEI Confidential
Page6-26, Total67
6.5.4 Purge
The Purge procedure refers to the VLR-initiated purge MS procedure, that is, the Purge
UE procedure in MAP. It is used for the VLR to report its subscriber deletion operation
to the HLR. Different from the IMSI Detach procedure described in the previous section,
the Purge UE procedure should be notified to the HLR, so that the HLR will set the UE
Purge Flag of this UE upon receipt of the Purge UE message to indicate that the
subscriber data have been purged from the VLR.
If the subscriber is called, the HLR will query the UE Purge Flag when the calling UE
queries the HLR in the Send Routing Information procedure. Since the UE Purge Flag
has been set, the HLR will return the cause value of Absent Subscriber to the MSC and
the calling MSC will play the subscriber switch-off announcement to the calling UE
according to this cause value. This procedure does not involve the Provide Roaming
Number operation from the HLR to the VLR.
2014-10-28
HUAWEI Confidential
Page6-27, Total67
Before the network initiates the authentication procedure and if the VLR does not
contain any authentication quintuple, the procedure of requesting an authentication set
from the HLR will be initiated to wait for the return of the authentication quintuple. The
authentication quintuple contains such information as RAND, XRES, AUTN, CK and IK.
After detecting the presence of the authentication quintuple, the network will send an
authentication request message, which contains the RAND and AUTN information of a
certain quintuple. Upon receipt of this message, the UE will have its USIM card check
the AUTN, that is, the UE will authenticate the network. If the network is accepted, the
USIM card will use the RAND to calculate the CK, the IK and the RES. If the USIM card
determines that the authentication succeeds, the RES will be returned in the
authentication response message.
Upon receipt of the authentication response message, the network will compare the
RES in this message with the XRES in the authentication quintuple stored in the VLR
database to verify if the authentication is successful or not. If the authentication is
successful, the subsequent procedures will normally continue; otherwise the exception
handling procedure will be initiated to release the connection between the network and
the UE as well as the occupied network and radio resources.
After the successful authentication, the UE will store the CK and the IK in its USIM card.
In some cases, the UE will report authentication failure upon receipt of the
authentication request message. There are two typical causes of authentication failure:
When authenticating the network, the UE will check the AUTN parameter in the
authentication request message sent from the network. If the MAC information is
incorrect, the UE will report the authentication failure information with the cause value
being MAC Failure.
2014-10-28
HUAWEI Confidential
Page6-28, Total67
Another cause of authentication failure is that the UE detects the SQN error in the
AUTN message with the cause value being Synch failure.
2014-10-28
HUAWEI Confidential
Page6-29, Total67
mobile subscriber. Therefore, the basic purpose of TMSI is to enhance the security of
the MS.
The correspondence between TMSIs and IMSIs is stored in the VLR that manages the
current visited location area of the MS, and the new TMSI is also stored in the SIM card
of the MS. We can see that the TMSI is stored in both the VLR and the SIM card.
The TMSI reallocation procedure may take place during subscriber location update, call
setup and supplementary service procedures. It can be implemented by selecting the
execution of the TMSI reallocation procedure in the MAP functional procedures of
MSC.
The TMSI reallocation procedure during location update is integrated with the location
update accept. The flow chart is shown in the following figure:
2014-10-28
HUAWEI Confidential
Page6-30, Total67
& Note:
Among the mobility management procedures, the procedures of authentication, security mode control and
TMSI reallocation are optional and network operators may decide whether to activate or provision them.
For example, this is implemented by the MAP functional procedure configuration parameters in the
MSC9800.
2014-10-28
HUAWEI Confidential
Page6-31, Total67
3)
4)
5)
2014-10-28
Upon receipt of the RA update request from the MS, the SGSN may initiate the
location update procedure to the HLR when necessary.
If the Gs interface has been configured between the SGSN and the MSC/VLR, the
SGNS will initiate the combined location update procedure to the MSC/VLR;
otherwise the RA Update Accept message will be directly sent.
Upon receipt of the location update request from the SGSN, the MSC/VLR
updates the MS location and stores the relevant data.
Upon receipt of the Location Update Accept message from the HLR, the
MSC/VLR sends it via the Gs interface to the SGSN.
Upon receipt of the Location Update Accept message from the MSC/VLR, the
SGSN sets the relevant data and sends the Routing Area Update Accept message.
If the TMSI reallocation procedure has been executed, the SGSN will send the
TMSI Reallocation Complete message received from the MS to the MSC/VLR to
finish the combined location update procedure.
HUAWEI Confidential
Page6-32, Total67
GMM/PMM
GMM: GPRS Mobility Management (different from CMM Circuit Mobility Management)
PMM: Packet Mobility Management
Here we can simply regard the GMM as mobility management in the GSM system and
the PMM as mobility management in the UMTS system. This document focuses on the
PS domain MM features of the UMTS system.
RANAP
MM CONTEXT
GMM /
SM / SMS
Relay
RRC
RRC
RANAP
RANAP
RLC
RLC
SCCP
SCCP
MAC
MAC
Signalling
Bearer
Signalling
Bearer
L1
L1
AAL5
AAL5
ATM
Uu
MS
ATM
Iu-Ps
RNS
3G SGSN
Figure 6-29 Control plane protocols at the MS side and the network side of the PS domain in the UMTS
2014-10-28
HUAWEI Confidential
Page6-33, Total67
In this state, the MS does not communicate with the 3G-SGSN and there is no valid
location or routing information. The MS is unreachable and the MS location is unknown.
In this state, the MS location is known and the PS signaling connection has been
established.
The specific state transitions of PMM are depicted in the following figure, where we can
see that the SM may be in the active or inactive state when the PMM is in the connected
or idle state, that is, the MM state is only related to the MM state of GPRS and it has
nothing to do with the PDP Context state or quantity.
Note: In the case of errors, the MS state may be not synchronous with the network state
and their synchronization can be achieved through the routing area update procedure.
After the Gs interface association has been established, the system can implement the
following procedures now:
1)
2014-10-28
CS Paging:
HUAWEI Confidential
Page6-34, Total67
The MSC/VLR can send the CS paging information via the SGSN to a subscriber in the
combined attachment procedure.
2)
Non-GPRS Alert
The MSC/VLR will request the SGSN to notify the activity information of the MS to itself
and it will set the NGAF (Non-GPRS Alert Flag) so that the SGSN MM will notify the
subscriber activity once detected to the MSC/VLR and the NGAF will be cleared then.
3)
MS Information Procedure
When the MSC/VLR needs the subscriber identity and location information, it may
obtain such information via the Gs interface from the local SGSN or it may send a
request for such information via the SGSN to get the needed information.
4)
MM Information Procedure
The MSC/VLR may send the network information via the SGSN to a subscriber and the
SGSN will pass on the information.
UTRAN
new SGSN
old SGSN
GGSN
EIR
new
MSC/VLR
HLR
old
MSC/VLR
1. Attach Request
2. Identification Request
2. Identification Response
3. Identity Request
3. Identity Response
4. Authentication
5. IMEI Check
6a. Update Location
6b. Cancel Location
6c. Cancel Location Ack
6d. Insert Subscriber Data
6e. Insert Subscriber Data Ack
6f. Update Location Ack
7a. Location Update Request
7b. Update Location
7c. Cancel Location
7d. Cancel Location Ack
7e. Insert Subscriber Data
7f. Insert Subscriber Data Ack
7g. Update Location Ack
7h. Location Update Accept
C1
8. Attach Accept
9. Attach Complete
10. TMSI Reallocation Complete
2014-10-28
HUAWEI Confidential
Page6-35, Total67
Note: The C1 as indicated in the above figure is a CAMEL point where intelligent
services can be triggered or performed. In the subsequent flow charts such points as
C1, C2 and C3 are all CAMEL points.
1)
2)
3)
4)
5)
6)
The MS sends an Attach Request message to initiate the Attach procedure. The
Attach Request message contains such parameters as IMSI or P-TMSI and old
RAI, Attach Type, old P-TMSI Signature and Follow On Request. If the subscriber
has no legal P-TMSI, the message will carry an IMSI; or if the subscriber has a
legal P-TMSI, it should then carry the P-TMSI and the matched RAI or even the
P-TMSI signature, if any. The Attach Type parameter indicates what kind of Attach
procedure is requested by the MS: GPRS Attach, Combined Attach or
IMSI-attached GPRS Attach. The SGNS may decide whether to release the
packet service signaling connection of the MS upon end of the Attach procedure
according to the Follow On Request indication.
If the MS uses P-TMSI for attachment and the SGSN has been changed since the
last attachment, the new SGSN should send an Identification Request to the old
SGSN and this request should carry the P-TMSI of the MS, the corresponding RAI
and the old P-TMSI signature, if any. The old SGSN should then respond with the
Identification Response message that carries the subscribers IMSI and
authentication set. If the MS is unknown to the old SGSN, the old SGSN shall
return a response message with the related cause value; and if the P-TMSI of the
MS does not match the signature, the old SGSN should return another response
message along with the corresponding cause value.
If the MS is unknown to the old SGSN, the new SGSN should initiate an Identity
Request to the MS with the identity type indicating IMSI and the MS should then
report its own IMSI to the SGSN.
If the MM Context of the MS does not exist in the network, the authentication
procedure is then needed. If P-TMSI reallocation is needed and the network
supports ciphering, the ciphering mode should also be set in this step.
The IMEI check as defined in the identity check procedure takes place. This
function is currently not implemented.
If the SGSN number has changed since the last detachment or if it is the first time
of the MS to attach to the network, the SGSN should notify the HLR of such. The
specific procedure is given as follows:
The SGSN sends an Update Location message (with the SGSN number, SGSN
address and IMSI) to the HLR; the HLR sends the Cancel Location message (with the
IMSI and the Cancel Type) to the old SGSN and sets the Cancel Type to Update
Procedure; the old SGSN acknowledges the Cancel Location received from the HLR
with the Cancel Location Ack message (with the IMSI); the HLR sends the Insert
Subscriber Data message (with the IMSI and GPRS subscriber data) to the new SGSN;
the new SGSN acknowledges the presence of the MS in the new routing area, and the
SGSN should reject the attachment request of the MS with the appropriate cause value
and it may return the Insert Subscriber Data Ack message to the HLR if the subscriber
data do not allow the MS to attach to this routing area. If the subscriber data check fails
due to other causes, the SGSN should reject the attachment request of the MS with the
appropriate cause value and should also return the Insert Subscriber Data Ack
message to the HLR (together with the IMSI and the cause value). If all the subscriber
data have passed the check, the SGSN will construct an MM Context for the subscriber
and at the same time return the Insert Subscriber Data Ack message (together with the
IMSI in it) to the HLR. After deleting the old MM Context and inserting the new one, the
HLR sends the Update Location Ack message to the SGSN to acknowledge the
Update Location message from the SGSN. If the Update Location request is rejected
by the HLR, the SGSN will carry the appropriate cause value to reject the attachment
request of the MS.
7)
2014-10-28
If the Attach Type discussed in Step 1 indicates the IMSI-attached GPRS Attach or
Combined Attach, the VLR should be updated, provided that the Gs interface has
HUAWEI Confidential
Page6-36, Total67
been configured. The VLR number can be exported from the routing area
information, that is, the Location Update procedure may start after the first Insert
Subscriber Data message is received from the HLR. As a result, the subscriber will
be flagged as GPRS Attached in the VLR.
8) The SGSN selects the Radio Priority SMS and sends the Attach Accept message
(with the P-TMSI, VLR number, TMSI, P-TMSI signature and Radio Priority SMS)
to the MS. If another P-TMSI is reallocated, it should also be carried in this
message.
9) If the P-TMSI or TMSI has changed, the MS should send an Attach Complete
message to the SGSN to acknowledge the new TMSI.
10) If the TMSI has changed, the SGSN will send the TMSI Reallocation Complete
message to the VLR to acknowledge the reallocated TMSI.
If the attachment request cannot be accepted, the SGSN should return the Attach
Reject message (together with the IMSI and the Cause) to the MS.
MS
BSS/UTRAN
SGSN
GGSN
MSC/VLR
1. Detach Request
2. Delete PDP Context Request
2. Delete PDP Context Response
3. IMSI Detach Indication
4. GPRS Detach Indication
C1
5. Detach Accept
6. PS Signalling Connection Release
2)
2014-10-28
The MS sends the Detach Request message (with Detach Type, P-TMSI, P-TMSI
Signature and Switch Off) to the SGSN to initiate the detachment procedure. The
Detach Type parameter indicates what kind of detachment procedure is to be
performed: GPRS Detach, IMSI Detach or Combined Detach. The Switch Off
parameter indicates whether the Attach procedure is triggered by the MS
switch-off. The Detach Request message carries the P-TMSI and P-TMSI
signature (to check the legality of the detachment message) of the MS. If the
signature of the MS is illegal or not carried, the SGSN should initiate the
authentication procedure.
In the case of GPRS Detach, the deactivation of the active PDP Context that exists
in the GGSN and belongs to the subscriber is implemented when the SGSN sends
the Delete PDP Context Request message (with the TEID) to the GGSN. The
GGSN should acknowledge it with the Delete PDP Context Response message.
HUAWEI Confidential
Page6-37, Total67
3)
4)
5)
6)
In the case of IMSI Detach, the SGSN should send the IMSI Detach Indication
message to the VLR.
If the subscriber needs to keep IMSI-attached while GPRS-detached, the SGSN
should send the GPRS Detach Indication message to the VLR. The VLR removes
its association with the SGSN and no longer initiates the Paging or Location
Update procedure via the SGSN.
If the Detach procedure is initiated due to other reasons than MS switch-off, the
SGSN should return the Detach Accept message to the MS.
If the MS initiates the GPRS Detach procedure, the SGSN will release the PS
domain signaling connection.
2. SGSN-initiated detachment
MS
BSS/UTRAN
SGSN
GGSN
MSC/VLR
C1
1. Detach Request
2. Delete PDP Context Request
2. Delete PDP Context Response
3. GPRS Detach Indication
4. Detach Accept
5. PS Signalling Connection Release
2)
3)
4)
5)
2014-10-28
The SGSN notifies via the Detach Request message (with the Detach Type
parameter) that the MS has been detached. The Detach Type parameter indicates
whether the MS requests for re-attachment and re-activation of the original active
PDP Context before the detachment procedure. If yes, the Attach procedure will
be initiated upon completion of the Detach procedure.
The SGSN notifies the GGSN of the Delete PDP Context Request message (with
the TEID carried), so as to request the GGSN to deactivate the active PDP
Context of the MS. The GGSN should acknowledge it with the Delete PDP Context
Response message.
In the case of combined attachment, the SGSN should send the GPRS Detach
Indication message (with the MS IMSI) to notify the VLR of such. The VLR
removes its association with the SGSN and no longer conducts paging and
location updating via the SGSN.
The MS may, upon receipt of the Detach Request from the SGSN, send the
Detach Accept message at any time to the SGSN.
Upon receipt of the Detach Accept message from the MS, the SGSN will release
the PS signaling connection if the Detach Type does not indicate the reattachment
request of the MS.
HUAWEI Confidential
Page6-38, Total67
BSS/UTRAN
SGSN
HLR
2)
3)
If the SGSN does not contain any old UMTS authentication quintuple, it will send a
Send Authentication Info message (with IMSI). Upon receipt of this message, the
HLR/AUC shall respond with the Send Authentication Info Ack message that
includes the sequentially arranged quintuples. Each quintuple contains such
information as RAND, XRES, AUTN, CK and IK. For the generation of such a
quintuple, refer to 3G TS 33.102.
During the authentication of the UMTS subscriber, the SGSN will select the next
quintuple and carry the RAND and AUTN parameters of this quintuple in the
Authentication and Ciphering Request message before sending the message to
the MS. The SGSN will also select a CKSN and carries it in this message.
Upon receipt of this message, the MS will have its USIM card authenticate the
AUTN. If the AUTN is accepted, the MS will calculate the signed RES of the RAND
according to the 3G TS 33.102 protocol. If the USIM card determines that the
authentication succeeds, the MS will return the Authentication and Ciphering
Response message (RES) to the SGSN. Meanwhile, the USIM card of the MS will
also calculate the CK and IK. These keys will be stored together with the CKSN
until the CKSN is updated at the next authentication.
If the USIM card determines that the authentication fails (e.g. authentication
synchronization error), the MS will return the Authentication and Ciphering Failure
message to the SGSN.
2014-10-28
HUAWEI Confidential
Page6-39, Total67
new
3G-SGSN
UTRAN
old
3G-SGSN
GGSN
new
MSC/VLR
old
MSC/VLR
HLR
Routing area update, provided that the procedure is caused by routing area changes;
Periodic routing area update, provided that the procedure is caused by expiry of the
periodic routing area update timer;
2014-10-28
HUAWEI Confidential
Page6-40, Total67
Combined routing area update, provided that the MS is IMSI attached and the location
area update needs to be operated in the network operation mode I;
Combined routing area update with IMSI attach, provided that the MS wants the IMSI
Attach procedure to take place in the network operation mode I;
The Serving RNC (SRNC) should add the RAI (including the routing area code and the
location area code) of the subscriber location to the front of the Routing Area Update
Request message before forwarding it to the SGSN.
2)
3)
4)
5)
6)
7)
8)
2014-10-28
In the case of inter-SGSN routing area update and provided that the MS is in the
PMM-IDLE state, the new SGSN will send the SGSN Context Request message
(with the old P-TMSI, old RAI and old P-TMSI signature of the MS) to the old
SGSN, so as to get the MM Context and the PDP Context of the MS. The old
SGSN shall check the P-TMSI and signature of the MS and turn the appropriate
cause value in the case of mismatch. In that case, the new SGSN will initiate the
security procedure. If the MS passes authentication of the security procedure, the
new SGSN should send the SGSN Context Request message (with the IMSI, old
RAI and the MS authenticated flag) to the old SGSN. The MS authenticated flag
indicates that the new SGSN has authenticated the MS. If the signature of the MS
is legal or the new SGSN has successfully authenticated the MS, the old SGSN
will return the SGSN Context Response message (with such parameters as
Cause, IMSI, MM Context and PDP Context). If the MS is unknown to the old
SGSN, the old SGSN should return the appropriate cause value and will start the
timer.
The security procedure may take place here. If the authentication fails, the routing
area update request will be rejected and the new SGSN should send the Reject
Indication to the old SGSN. The old SGSN should continue as if it had never
received the SGSN Context Request message.
In the case of inter-SGSN routing area update, the new SGSN should send the
SGSN Context Ack message to the old SGSN. The old SGSN marks the
MSC/VLR association and the information in the GGSN and HLR as illegal in its
SGSN Context. If the MS initiates the routing area update to the old SGSN again
before the ongoing routing area update procedure is complete, the update of
MSC/VLR, GGSN and HLR will be triggered.
In the case of inter-SGSN routing area update and provided that the MS is in the
PMM-IDLE state, the new SGSN shall send the Modify PDP Context Request
message (with the new SGSN address and the negotiated QoS and TEID
information) to the relevant GGSN. The GGSN shall update its PDP Context and
return the Modify PDP Context Response message (with TEID) to the SGSN.
In the case of inter-SGSN routing area update, the SGSN shall send the Update
Location message (with the SGSN number, SGSN address and IMSI) to the HLR,
so as to notify the HLR of the SGSN change.
In the case of inter-SGSN routing area update, the HLR shall send the Cancel
Location message (with the IMSI and the Cancel Type parameters) to the old
SGSN and the Cancel Type will be set to Update Procedure. The old SGSN shall
return the Cancel Location Ack message (with the IMSI) to the HLR for
acknowledgement.
In the case of inter-SGSN routing area update, the HLR will send the Insert
Subscriber Data message (with the IMSI and GPRS subscriber data) to the new
SGSN. The new SGSN acknowledges the presence of the MS in the new routing
area, and it should reject the attachment request of the MS with the appropriate
cause value and may return the Insert Subscriber Data Ack message to the HLR if
the subscriber data do not allow the MS to attach to this routing area. If the
subscriber data check fails due to other causes, the SGSN should reject the
attachment request of the MS with the appropriate cause value and should also
return the Insert Subscriber Data Ack message to the HLR (together with the IMSI
and the cause value). If all the subscriber data have passed the check, the SGSN
HUAWEI Confidential
Page6-41, Total67
9)
10)
11)
12)
13)
14)
15)
will construct an MM Context for the subscriber and at the same time return the
Insert Subscriber Data Ack message (together with the IMSI in it) to the HLR.
In the case of inter-SGSN routing area update, the HLR will, after deleting the old
MM Context and inserting the new one, send the Update Location Ack message to
the SGSN to acknowledge the Update Location message from the SGSN.
If the Routing Area Update Type indicates the Combined Routing Area Update
with IMSI Attach or if the location area changes, the association between the
SGSN and the VLR must be established. The new SGSN sends the Location
Update Request message (with the new RAI, IMSI, SGSN number and Routing
Area Update Type) to the VLR. If the Routing Area Update Type indicates the
Combined Routing Area Update with IMSI Attach, the Location Area Update Type
should indicate the IMSI Attach. Otherwise, it should indicate the normal location
area update. The VLR number is obtained after the SGSN is queried with the RAI.
At Step 8 described above, that is, upon receipt of the first Insert Subscriber Data
message from the HLR, the SGSN may start the Location Update procedure now.
The VLR creates or updates its association with the SGSN by storing the SGSN
number.
If the subscriber data in the VLR are marked as unacknowledged by the HLR, the
new VLR will notify this to the HLR. And the HLR will delete the old VLR data and
insert the subscriber data to the new VLR.
The new VLR allocates a new TMSI and returns the Location Update Accept (with
the VLR number and TMSI) to the SGSN. If the VLR does not change, the TMSI
allocation here is optional.
The new SGSN acknowledges the presence of the MS in the new routing area. If
the subscriber data do not allow the MS to attach to this routing area or the
subscriber data check fails, the SGSN should reject the attachment request of the
MS with the appropriate cause value. If all the subscriber data have passed the
check, the SGSN shall construct an MM Context for the MS. The new SGSN will
return the Routing Area Update Accept message (with the P-TMSI, VLRTMSI and
P-TMSI signature) to the MS.
The MS sends the Attach Complete message to the SGSN to acknowledge the
new TMSI.
If the TMSI has changed, the SGSN will send the TMSI Reallocation Complete
message to the VLR to acknowledge the reallocated TMSI.
If the attachment request cannot be accepted, the SGSN should return the Attach
Reject message (together with the IMSI and the Cause) to the MS.
Note: Steps 11, 12 and 15 will not take place unless Step 10 takes place.
2014-10-28
HUAWEI Confidential
Page6-42, Total67
SGSN
RNC
HLR
GGSN
If the Service Type parameter indicates data, the signaling connection between the MS
and the SGSN will be established and resources will be reserved simultaneously for the
active PDP Context.
If the Service Type parameter indicates signaling, the signaling connection for
transmitting upper-layer signaling between the MS and the SGSN will be established.
3)
4)
5)
6)
2014-10-28
If the MS initiates a service request in the PMM-IDLE state, the SGSN will initiate
the security procedure.
If the network is in the PMM-CONNECTED state and the Service Type indicates
data, the SGSN will return a Service Accept message to the MS to accept the
service request; if the Service Type indicates data, the SGSN will send a Radio
Access Bearer Assignment Request message that carries NSAPIRAB ID(s),
TEID(s), QoS Profile(s) and SGSN IP Address(es) to re-establish the RAB to each
active PDP Context.
The RNC indicates to the MS that the new RAB has been established (together
with the RAB ID).
The SRNC sends a Radio Access Bearer Assignment Response that carries RAB
ID(s), TEID(s), QoS Profile(s) and RNC IP Address(es). The GTP tunnel has
already been established over the Iu interface. If the RNC returns the Radio
Access Bearer Assignment Response message and the cause value indicates the
required QoS cannot be provided (Requested Maximum Bit Rate not Available),
the SGSN will send another Radio Access Bearer Assignment Request message
that carries a different QoS. The number of retries and the new QoS value are
implementation-dependent.
HUAWEI Confidential
Page6-43, Total67
7)
8)
For the modified QoS in each RAB re-establishment, the SGSN will initiate a PDP
Context modification procedure to notify the MS and the GGSN of the new
negotiated QoS.
The MS sends an uplink PDU.
The Service Accept message does not mean that the RAB(s) reestablishment is
successful.
Whatever Service Type, the network will return a Service Reject message with the
appropriate cause value to the MS if the service request cannot be accepted.
When the Service Type indicates data and if the SGSN fails to reestablish the RAB(s),
the SGSN will initiate a PDP Context modification procedure or deactivates the PDP
Context. The specific conditions depend on the QoS negotiation.
2. Network-initiated service request
MS
RNC
SGSN
HLR
GGSN
1. Downlink PDU
2. Paging
2. Paging
3. RRC Connection Request
3. RRC Connection Setup
4. Service Request
5. Security Functions
5)
6)
2014-10-28
The SGSN receives the downlink PDP PDU from the MS in the PMM-IDLE state.
The SGSN sends a paging message to the RNC and the RNC sends the paging
message to page the MS.
The MS establishes the RRC connection first if there is no existing CS channel.
The MS sends the Service Request message (with P-TMSI, PAI, CKSN and
Service Type) to the SGSN. The Service Type is set as the paging response. At
this time, the SGSN may initiate an authentication procedure. The SGSN knows
whether the downlink PDU needs RAB reestablishment.
The SGSN specifies the ciphering mode.
The SRNC sends a Radio Access Bearer Assignment Request that carries RAB
ID(s), TEID(s), QoS Profile(s) and SGSN IP Address(es) to the RNC if the
resource reestablishment is needed for the PDP Context. The RNC sends the
Radio Bearer Setup message that carries the RAB ID(s) to the MS. In return, the
MS sends the Radio Bearer Setup Complete message to the RNC. The RNC
sends the Radio Access Bearer Assignment Response message that carries RAB
HUAWEI Confidential
Page6-44, Total67
7)
8)
ID(s), TEID(s) and RNC IP Address(es) to the SGSN, indicating that the GTP
tunnel has been established on the Iu interface and the RAB between the RNC
and the MS has also been established. If the cause value carried in the Radio
Access Bearer Assignment Response message returned by the RNC indicates
that the required QoS is not available (Requested Maximum Bit Rate not
Available), the SGSN will send the new Radio Access Bearer Assignment
Request message that carries a different QoS. The number of retries and the new
QoS parameter are related to the product implementation.
For the modified QoS in each RAB re-establishment, the SGSN will initiate a PDP
Context modification procedure to notify the MS and the GGSN of the new QoS.
The SGSN sends a downlink PDU.
If the Service Type is set as paging response, the MS will regard the service request as
having been successfully received by the SGSN upon receipt of the Secure Mode
Control message from the RRC.
If the SGSN fails to reestablish the RAB(s), it will initiate a PDP Context modification
procedure.
2014-10-28
HUAWEI Confidential
Page6-45, Total67
The UE sends a CHANNEL REQUEST message to the network over the random
access channel.
2) The network responds with an IMMEDIATE ASSIGNMENT message so that the
UE can occupy the specified dedicated channel.
3) The UE sends a CM SERVICE REQUEST message to the CN.
4) The network initiates the authentication and ciphering procedures.
5) After sending the SECURITY MODE COMPLETE message, the UE sends the
SETUP message to the CN to initiate the call setup procedure.
6) The CN responds with a CALL PROCEEDING message.
7) In the case of immediate assignment, a communication channel must be assigned
to the UE before the CN initiates the call setup procedure to the fixed network.
8) When the called party rings, the network must send an ALERTING message to the
calling UE upon receipt of the ALERTING message from the called party.
Meanwhile, it also needs to send a ringback tone to the calling party.
9) When the called party answers, it will send a CONNECT message to the network
and the network will forward this message to the calling party.
10) When the calling UE returns a CONNECT ACKNOWLEDGE message, the call
setup procedure is complete.
HUAWEI Confidential
Page6-46, Total67
signaling. When the UE responds with the PAGING RESPONSE message, the CN will
establish a communication channel to the UE upon receipt of this message.
2)
3)
4)
5)
6)
7)
8)
2014-10-28
The CN sends a PAGING message to the RNS and the RNS broadcasts this
PAGING message over the paging channel. For details, refer to the paging
procedure described in Section 6.6.4.
The called UE detects this paging and sends a channel request to the RNS. The
RNS returns an immediate assignment command to indicate the UE to use the
specified signaling channel.
The UE sends a PAGING RESPONSE message on the signaling channel. Upon
receipt of the PAGING RESPONSE message from the UE, the CN initiates the
authentication and ciphering procedures (these two security procedures are
optional and can be configured through the MAP function procedure).
The CN sends a SETUP message to the RNS. The SETUP message carries the
bearer capability of the call and the calling number.
Upon receipt of the SETUP message from the RNS, the UE returns a CALL
CONFIRMED message. If the negotiated bearer capability parameter changes,
the CALL CONFIRMED message shall carry the bearer capability information.
Upon receipt of the CALL CONFIRMED message from the RNS, the CN sends an
RAB ASSIGNMENT REQ message to the RNS to request for radio channel
assignment while the RNS sends an assignment message to the UE so as to
switch the UE to a specified communication channel. After the UE is switched to
the specified communication channel, it sends the RB ASSIGNMENT
COMPLETE message to the RNS.
The RNS sends a RAB ASSIGNMENT RESPONSE message to the CN.
The UE sends an ALERTING message to indicate that the called subscriber
should ring now.
HUAWEI Confidential
Page6-47, Total67
9)
When the called party answers, the called UE sends a CONNECT message via
the RNS to the CN.
10) The CN returns a CONNECT ACKNOWLEDGE message to the UE to end the call
setup procedure.
2014-10-28
HUAWEI Confidential
Page6-48, Total67
CN
RNC
RAB ASSIGNMENT
REQUEST
RAB ASSIGNMENT
RESPONSE
.
.
.
2014-10-28
HUAWEI Confidential
Page6-49, Total67
modification of the RABs and will monitor all the queued RABs. The queued RABs may
have the following results:
Establishment or modification success;
Establishment or modification failure;
Failure due to expiry of the TQUEUING timer.
In the first RAB Assignment Response message, the UTRAN reports the state of all the
RABs involved in the RAB ASSIGNMENT REQUEST message. The UTRAN then
reports the state of the queued RABs in the following RAB Assignment Response
message, except the RABs with TQUEUING expiry. When knowing that the
modification or establishment of all the queued RABs has succeeded or failed, the
UTRAN stops the timer TQUEUING and the RAB Assignment procedure ends at the
CN and the UTRAN simultaneously.
When the CN receives a response indicating that the RABs are queued, it hopes that
the UTRAN can provide the result of RABs queuing before expiry of the timer
TRABAssgt; otherwise, it will regard that the RAB Assignment procedure has ended
and the configuration of those RABs not reported has failed.
Upon expiry of the timer TQUEUING, all the queued RABs in the UTRAN will end the
procedure of queuing and the UTRAN will use an RAB Assignment Response
message to report the states of all the queued RABs. At the same time, the whole
procedure is stopped on the CN side.
4. RAB establishment procedure
The following figure depicts the procedure of RAB establishment via UTRAN between
the CN and the UE.
2014-10-28
HUAWEI Confidential
Page6-50, Total67
Node B
Serving RNS
UE
RANAP
CN
1. RAB Assignment Request
RANAP
[Establishment]
Select L1, L2 and Iu Data
Transport Bearer parameters
2. ALCAP Iu Data
Transport Bearer Setup
Not required towards PS domain
2.1 Establish Request
Q.aal2
Q.aal2
NBAP
NBAP
Q.aal2
Q.aal2
NBAP
NBAP
DCH-FP
Downlink Synchronisation
DCH-FP
DCH-FP
Uplink Synchronisation
DCH-FP
NBAP
RRC
RRC
RRC
RRC
RANAP 4. RAB Assignment Response RANAP
5. Initialization
Iu UP
Iu UP
(RFCI, 0..N + sub- flow size information)
Time
In the CS domain, upon receipt of a service request from the UE (Caller SETUP, called
CALL CONFIRM and CONNECT messages, etc.), the CN sends an RAB Assignment
Request message to indicate that a new AS bearer channel is needed to bear the NAS
subscriber data and thus initiates the procedure of bearer channel establishment.
1)
2014-10-28
Procedure
The CN decides what kind of RABs are to be used according to the subscriber
data, CN service capability and QoS requirements in the service request of the UE.
It sends an RANAP message, i.e. the Radio Access Bearer Assignment Request
(Setup) message, to request the RAB establishment. In the message, the RAB ID
is filled with the SI value. The key parameters of the CS domain include the RAB
HUAWEI Confidential
Page6-51, Total67
2)
parameter, the user plane mode, the ATM address of the local user plane and the
IU BINDING ID.
The Serving RNC uses the ALCAP protocol to initialize the Iu interface data
transport bearer establishment.
In the case of using the AAL2 bearer in the CS domain (this procedure is not needed in
the case of the PS domain), the SUGR parameter will be used in the AAL2 connection
establishment request message to transparently transmit the BINDING ID to the CN, so
as to complete the binding between the RABs and the data transport bearers. This
request message also contains the following key parameters:
Peer ATM address, path ID, Channel ID (CID), path feature and channel feature.
3)
4)
5)
After the Serving RNC reconfigures the radio links with such equipment as Node B
and completes the uplink-downlink synchronization, it uses an RRC message (i.e.
Radio Access Bearer Setup) to carry the subflow and subflow combination
parameters among the RAB parameters as well as the RAB ID before sending the
message to the UE.
Upon receipt of the success acknowledgement RRC message (i.e. Radio Bearer
Setup Complete) from the UE and the establishment success information of the
ALCAP procedure, the Serving RNC acknowledges the RAB establishment
success to the CN. It sends an RANAP message (Radio Bearer Assignment
Response) to the CN.
If the user plane is in the support mode, the UTRAN initializes the Iu interface user
plane via the Initialization message after the result is reported.
& Note:
The procedures of interaction with the Drift RNC and the Drift Node B are not indicated in the above figure.
For the RACH/FACH DCH, RACH/FACH - RACH/FACH and PS domain
non-synchronous modes, the procedures are similar.
2014-10-28
HUAWEI Confidential
Page6-52, Total67
UE
Serving
RNC
RANAP
CN
1 RAB Assignment Request
[Release]
RANAP
RANAP
Q.aal2
Q.aal2
NBAP
RRC
NBAP
NBAP
RRC
Apply new
transport format set
DCCH
DCCH : Radio Bearer Release Complete
RRC
RRC
Trigger time
This procedure is initiated in the CS domain when all the transactions over the RAB in
the CC layer end or the RNC requests to release the RAB.
1)
2)
3)
4)
5)
2014-10-28
Procedure
The CN sends an RANAP message, i.e. Radio Access Bearer Assignment
Request (Release), to initiate the RAB release procedure together with the RAB ID
specified.
The Serving RNC acknowledges the request message with another RANAP
message, i.e. Radio Access Bearer Assignment Response.
The Serving RNC uses the ALCAP protocol. In the case of the AAL2 bearer, it
uses the AAL2 release message to initiate the release procedure of the Iu data
transport bearer between itself and the CN (this procedure is not needed in the PS
domain).
The Serving RNC sends an RRC message (Radio Bearer Release) to the UE to
initiate the bearer release procedure after releasing the link with such equipment
as Node B.
The Serving RNC receives the acknowledgement RRC message (Radio Bearer
Release Complete) from the UE and the whole release procedure thus ends.
HUAWEI Confidential
Page6-53, Total67
Node B
Serving RNS
UE
CN
Request
RANAP 1. RAB Assignment
RANAP
[Modify]
2. Select L1, L2 and Iu Data
Transport Bearer parameters
e.g. for Radio Bearer
reconfiguration.)
3. ALCAP Iu Data
Transport Bearer Modify
(
Q.aal2
Q.aal2
NBAP
NBAP
ALCAP
NBAP
3.2
Modify Request
Modify Confirm
Q.aal2
Q.aal2
NBAP
NBAP
RRC
3.1
RRC
Actualizing Radio Bearer modification (e.g. Apply new transport format set)
5 Radio Bearer Reconfiguration Complete
RRC
DCCH
RRC
RANAP 6 RAB Assignment Response
RANAP
7. Initialization
Iu UP
Iu UP
(RFCI, 0..N + sub- flow size information)
Trigger condition
When the UE is handed over or the UE rate changes, the CN reconfigures the traffic
channel to support the service attribute change.
1)
2)
3)
4)
2014-10-28
Procedure
The CN sends an RANAP message, i.e. the Radio Access Bearer Assignment
Request (Modify), to request the RAB modification. The request message
contains the RAB ID that indicates which RAB is to be modified and such key
parameters of the CS domain as RAB parameters.
The Serving RNC selects which parameters are to be modified and which
programs are to be initiated.
The SRNC uses the ALCAP protocol to modify the channel characteristics of the
Iu interface data transport bearers.
Upon successful modification procedure of the Iu interface transport control plane,
the Serving RNC modifies the radio links together with such equipment as Node B.
It then sends the subflow and subflow combination parameters among the RAB
parameters as well as RAB ID in the RRC message (Radio Bearer
Reconfiguration) to the UE.
HUAWEI Confidential
Page6-54, Total67
5, 6) Upon receipt of the success acknowledgement RRC message (i.e. Radio Bearer
Setup Complete) from the UE, the Serving RNC acknowledges the RAB
modification success to the CN. It sends an RANAP message (Radio Bearer
Assignment Response) to the CN.
7) If the user plane is in the support mode, the UTRAN initializes the Iu interface user
plane via the Initialization message after the result is reported.
CN
RNC
PAGING
1. Paging procedure
After the call request information from the caller is processed by the CN, the paging
procedure starts if the called subscriber information has been successfully obtained.
The CN needs to know the location area information of the called subscriber and get
the sufficient paging information parameters before it can initiate the paging procedure
to the called subscriber.
If the CN does not get the location area information of the called subscriber, it needs to
send the PAGING message through the broadcast procedure to all the RNCs under its
control.
The CN sends the PAGING message via the RANAP interface, which processes the
PAGING message from the CN. The PAGING message includes such parameters as
whether the paging request comes from the CS domain or the PS domain, what reason
caused the paging and the specific location area information of the called subscriber.
The RANAP sends the PAGING message to the RNC where the location area of the
called subscriber resides.
When the PAGING message reaches the RNC, the RNC analyzes the parameters of
the PAGING message to get the location area information of the called subscriber and
then transmits via PCCH the PAGING information to the UE in that location area. If the
called UE detects the PAGING message from the RNC, it starts to execute the NAS
signaling procedure.
2014-10-28
HUAWEI Confidential
Page6-55, Total67
If the paging is successful, the CN will get the paging response message; otherwise the
CN needs to repeat sending the PAGING message via the Iu interface.
2. Paging procedure of the UE in the RRC idle state
When the RRC is idle, the UE may receive paging from the CS or PS domain. Because
the UE is now in the idle state, the CN can learn the Location Area Identification (LAI)
information of the UE. The paging will be sent via this location area and the LA in this
example crosses two RNCs.
2)
3)
The CN initiates the paging information and sends it after passing two RNCs to the
called UE. At this time it can be see from the Iu interface that two PAGING
messages are continuously send by the CN, they carry the same LAI, except that
the DPCs are the two RNCs.
Cell 1 initiates the paging procedure via the Paging Type 1 message.
Cell 2 initiates the paging procedure via the Paging Type 1 message.
The PAGING message reaches RNC1 and RNC2 via RANAP, and the two RNCs
transmit the PAGING message to the UE in the specified location area over the PCCH.
If the called UE detects the PAGING message from RNC1 or RNC2, it then starts
executing the NAS signaling procedure.
3. Paging procedure of the UE in the RRC connected state
When the RRC is in the connected state, the paging procedure of the UE may fall into
two cases: The CS domain or the PS domain of the CN. Due to the independency of
mobility management, there are two possible solutions:
1)
2)
The UTRAN coordinates the paging request over the existing RRC connection;
The UE coordinates the paging request over the existing RRC connection.
The following example shows the paging procedure of the UE in the RRC connected
state (CELL_DCH and CELL_FACH), where the UTRAN coordinates the paging
request over the DCCH in the RRC connected state.
2014-10-28
HUAWEI Confidential
Page6-56, Total67
Figure 6-46 Paging procedure of the UE in the RRC connected state (CELL_DCH and CELL_FACH)
1)
2)
The CN sends the PAGING message via RANAP to UE to page the UE.
The Serving RNC sends the Paging Type 2 to the RRC (UE).
& Note:
Paging Type 1 is sent over the PCCH when the UE is idle while Paging Type 2 is sent over the DCCH
when the UE is in the RRC connected state. The typical case is that the UE uses the Paging Type 2 to
send the PAGING message of the CS domain in the PS service procedure. However, the Paging Type is
controlled by the RNC and the CN does not need to know it.
HUAWEI Confidential
Page6-57, Total67
1)
2)
3)
4)
The PDP context saves all tunnel forwarding information of the user plane, including
user plane IP address of RNC/GGSN, tunnel identifier and QoS.
Each piece of GPRS subscription data comprises one or more PDP addresses, each
PDP address comprises one or more PDP Context descriptions of MS, SGSN and
GGSN, and each PDP Context can exist in one of two states: Inactive and active. The
state transition chart is shown in the following figure. The PDP state indicates whether
the data with the PDP address can be transferred. Inactive sessions do not contain
routing information and cannot complete data transfer. All the PDP Contexts of the
subscriber are associated with his/her MM Context.
2014-10-28
HUAWEI Confidential
Page6-58, Total67
INACTIVE
Activate PDP
Context
ACTIVE
NSAPI
The NSAPI is used in the MS to identify a PDP service access point, and in the
SGSN/GGSN to identify a session. Its value is the RAB ID used by the access layer to
identify the subscriber RAB.
3)
APN resolution
The APN (Access Point Name) is of the standard domain name format. It comprises
two parts: Network Identity (NI) and Operator Identity (OI). It is used in the GGSN to
identify the ISP of a specific external network and a service, and in the SGSN to get the
GGSN address corresponding to it via the DNS resolution.
4)
QoS negotiation
While setting up a packet transport route, the SM must specify the QoS to be satisfied
by the route. During the SM process, the MS, RNC, SGSN and GGSN conduct QoS
negotiation to keep the consistency of the QoSs they provide. The QoS negotiation
algorithm is to get the minimum from the maximum QoS that can be provided by the
subscribed QoS and SGSN and the QoS satisfied by other nodes.
3. Position of SM in the protocol stack
GMM /
SM / SMS
GMM /
SM / SMS
Relay
RRC
RRC
RANAP
RANAP
RLC
RLC
SCCP
SCCP
MAC
MAC
Signalling
Bearer
Signalling
Bearer
L1
L1
AAL5
AAL5
ATM
Uu
MS
ATM
Iu-Ps
RNS
3G SGSN
2014-10-28
HUAWEI Confidential
Page6-59, Total67
RAB management
RABM (RAB Management) is used to establish, modify, release and reestablish the
RAB.
The RAB consists of two parts: The GTP tunnel between the RNC and the SGSN, and
the Radio Bearer between the RNC and the MS. RAB ID uniquely identifies an RAB of
the subscriber.
The RAB establishment, modification, release and reestablishment are completed via
the RAB ASSIGNMENT procedure.
MS
RNC
SGSN
1. RAB Assignment Request
2. RRC:
Establish/Release/Modify
Radio Bearers
3. RAB Assignment Response
.
.
.
The SGSN sends the RAB Assignment Request (SGSN ADDR, TEIDs, and QoS)
to the RNC, requesting it to establish, modify or release the RAB(s). It can specify
the RAB radio priority and whether preemption and queuing are allowed in the
assignment parameters.
RNC establishes, modifies or releases the radio bearer.
The RNC sends the RAB Assignment Response message to the SGSN. If the
assignment fails due to the QoS, then the QoS requirement should be lowered and
the assignment request should be resent.
If the QoS changes during RAB reestablishment, the SGSN-initiated PDP Context
Modification procedure will be executed to notify the QoS to both the MS and the
GGSN.
2)
Tunnel management
The major task of tunnel management is to establish a GTP tunnel between the SGSN
and the GGSN. Tunnel management includes tunnel establishment, modification and
deletion as well as the network-initiated PDP Context activation procedure.
The SM implements session management through the PDP Context activation,
modification and deactivation procedures. The PDP Context activation procedure is to
establish the packet transport routes of the user plane; the PDP Context modification
procedure is to modify the QoS and TFT of the active PDP Context, as well as modify
the tunneling route between the SGSN and the GGSN in the case of RAU changes; the
PDP Context deactivation procedure is to release the active PDP Context.
After the RNC initiates the RAB or Iu release procedure, the SGSN may keep these
active PDP Contexts but not deactivate them. When the subscriber initiates the
2014-10-28
HUAWEI Confidential
Page6-60, Total67
UTRAN
3G-SGSN
3G-GGSN
2)
3)
4)
2014-10-28
The MS sends the Activate PDP Context Request (with NSAPI, TI, PDP Type,
PDP Address, Access Point Name and QoS Requested) to the SGSN. The PDP
Address indicates the dynamic or static address. If it indicates dynamic address, it
is set to null.
The RAB assignment procedure is executed.
The SGSN uses the PDP Type (optional), PDP Address (optional), Access Point
Name (optional) and PDP Context subscriber data to verify the validity of the
Activate PDP Context Request message.
The SGSN assigns a TEID to the PDP Context. If the dynamic address is to be
used, the SGSN requests the GGSN to allocate a dynamic address. The SGSN
selects an APN according to a certain algorithm and then sends the request to
establish a PDP Context to the GGSN.
The GGSN allocates a dynamic address for the PDP Context, as well as the
charging ID and negotiated QoS. If the MS requests that an IP address be
allocated for the external network part, the address will be set to 0.0.0.0. Later
after the external network is allocated with an IP address, the GGSN-initiated PDP
Context modification procedure will then be executed.
Upon receipt of the Create PDP Context Response message (with NSAPI, PDP
ADDR, GGSN ADDR, TEID and QoS) from the GGSN, the SGSN sends the
address and OoS information via the Activate PDP Context Accept message to
the MS.
HUAWEI Confidential
Page6-61, Total67
UTRAN
3G-SGSN
3G-GGSN
2014-10-28
HUAWEI Confidential
Page6-62, Total67
UTRAN
SGSN
GGSN
2)
3)
4)
5)
6)
The SGSN sends the Update PDP Context Request (with TEID, NSAPI, QoS
Negotiated, Trace Reference, Trace Type, Trigger Id and OMC Identity) to the
GGSN for QoS negotiation.
The GGSN conducts the QoS negotiation and sends the Update PDP Context
Response (with TEID, QoS Negotiated and Cause) to the SGSN.
The SGSN selects the Radio Priority and Packet Flow Id according to the QoS. It
then sends to MS the Modify PDP Context Request (with TI, QoS Negotiated,
Radio Priority and Packet Flow Id).
The MS accepts the QoS by sending to the SGSN the Modify PDP Context Accept
message or rejects the QoS by initiating the PDP Context deactivation procedure.
The RAB assignment procedure is executed to modify the RAB.
If BSS tracing is to be started, the Invoke Trace message (with Trace Reference,
Trace Type, Trigger Id and OMC Identity) will be sent.
UTRAN
SGSN
GGSN
HUAWEI Confidential
Page6-63, Total67
1)
2)
3)
4)
5)
The MS sends the Modify PDP Context Request message (with TI, QoS
Requested and TFT) to the SGSN, so as to request for changing the PDP Context.
The SGSN sends the Update PDP Context Request (with TEID, NSAPI, QoS
Negotiated, Trace Reference, Trace Type, Trigger Id and OMC Identity) to the
GGSN for QoS negotiation.
The GGSN conducts the QoS negotiation and sends the Update PDP Context
Response (TEID, QoS Negotiated and Cause) to the SGSN.
The RAB assignment procedure is executed to modify the RAB.
The SGSN sends the Modify PDP Context Accept message to the MS.
UTRAN
3G-SGSN
3G-GGSN
2)
3)
4)
5)
The MS sends the Deactivate PDP Context Request message (with TI and
Teardown Ind) to the SGSN, where Teardown Ind indicates whether to deactivate
the PDP Context and specifies the active PDP Context for the TI shared address.
The SGSN receives the deactivation request from the MS and sends the Delete
PDP Context Request message (TEID, NSAPI and Teardown Ind) to the GGSN to
delete the GGSN PDP Context.
The GGSN sends the Delete PDP Context Response message (with TEID) to the
SGSN.
Upon receipt of the Delete PDP Context Response message, the SGSN sends the
Deactivate PDP Context Accept message to the MS.
The SGSN invokes the RAB assignment procedure to release the RAB.
2014-10-28
HUAWEI Confidential
Page6-64, Total67
MS
UTRAN
SGSN
GGSN
C1
1. Delete PDP Context Request
1. Delete PDP Context Response
2. Deactivate PDP Context Request
2. Deactivate PDP Context Accept
3. Radio Access Bearer Release
2)
3)
4)
5)
The SGSN sends the Delete PDP Context Request message (with TEID, NSAPI
and Teardown Ind) to the GGSN, where Teardown Ind indicates whether to
deactivate the PDP Context and specifies the active PDP Context for the TI
shared address.
The GGSN sends the Delete PDP Context Response message (with TEID) to the
SGSN.
Upon receipt of the Delete PDP Context Response message from the GGSN, the
SGSN sends the Deactivate PDP Context Request message to the MS to delete
the MS PDP Context. If the PDP Context deactivation procedure is triggered by
DETACH, this Deactivate PDP Context Request message will not be sent.
The SGSN receives the Deactivate PDP Context Accept message from the MS.
The SGSN initiates the RAB assignment procedure to release the RAB.
2014-10-28
HUAWEI Confidential
Page6-65, Total67
MS
RNC
SGSN
HLR
GGSN
3)
4)
5)
6)
2014-10-28
HUAWEI Confidential
Page6-66, Total67
RNC
SGSN
HLR
GGSN
1. Downlink PDU
2. Paging
2. Paging
3. RRC Connection Request
3. RRC Connection Setup
4. Service Request
5. Security Functions
2014-10-28
HUAWEI Confidential
Page6-67, Total67
HUAWEI Confidential
Page7-1, Total38
The CDMA network is totally different from the GSM network. Since channels and users
are not separated for consideration, there is tight relation between coverage and
capacity. The cell with more traffic has less coverage area. In the CDMA network, more
traffic means more interferences. This kind of effect of dynamic change of cell area is
called as cell breathing. This can be illustrated through the following visual example.
In a birthday party of a friend, many guests come. More people taking will cause it is
harder to hear the voice of opposite party clearly. If in the beginning, you can talk with a
friend at another end of the room, you can not hear what he is saying at all when the
room is very noisy. It indicates that the cell radius of talking area is shortened. The
UMTS network planning engineer faces a network changing dynamically.
In UMTS network planning, the network expandability should be taken into
consideration first of all. The network planning engineer can not simply add frequency
to the related cell as planning GSM network. In the beginning of network planning, a
determined traffic signal redundancy should be taken into consideration, and this
redundancy will be used as compensation to the interference caused by increased
traffic. This shows that, from the very beginning, it is required to construct the network
with smaller cells or more NodeBs, resulting in higher investment cost. If the traffic
signal surplus is too small, there is only one way: adding NodeBs when expanding.
The network planning engineer should notice the above issues, because enhancing
transmitting power simply can not reduce the receiving signal deterioration caused by
traffic incensement. Enhancing transmitting power can only improve the receiving
signal of a cell but will add interference to the adjacent cells. As a result, the whole
network communication quality will be influenced.
To enhance transmitting power, the valid range or capacity (for the CDMA network, they
are homonymous) of the CDMA cell is limited. When the UMTS network transmitting
power is doubled, the cell capacity is increased by 10%. The enhanced transmitting
power raises the valid range of cell, but to satisfy the requirements of remote mobile
subscribers, it is necessary to enhance transmitting power by multiple times, which will
influence the talking quality of other mobile subscribers. Lets return to the above party
example. You can enhance your voice to continue the conversation with the friend at
another end of the room, but at the same time, other guests also raise voice to talk with
others. As a result, the whole room is submerged in noise.
The corresponding relationship between transmitting power and cell capacity is gradual.
Since the UMTS cell load is subject to saturate, the UMTS network planning engineer
must reduce the full-load ratio. The detailed parameters depend on different services
and how much the network carrier would like to risk. Usually, the full-load factor is
preset as 60% in network design. Here, the cell breathing effect is used. The adjacent
cells can mutually compensate load, called as soft load. Due to cost, the network
capacity can not be increased on a large scale. The mathematical demonstration on the
2014-10-28
HUAWEI Confidential
Page7-2, Total38
UMTS service with large scale data transmission shows that, as data transmission
volume increases, it is more possible for a service cell to borrow capacity from the
adjacent cells. This result is satisfied.
Near-far effect:
Another typical issue of the CDMA network is near-far effect. Since all the subscribers
in the same cell share the same frequency, it is important that each subscriber in the
whole system transmits signal at the minimum power. Lets return to the above party
example. If someone is shouting in the room, the conversation among all the other
guests will be influenced. In the CDMA network, this problem can be solved through
power control. For example, the UMTS network uses closed loop power control at
frequency 1500 Hz. For GSM network, however, the power control works at 2 Hz and is
for uplink only.
This kind of fast power control mechanism has been implemented in the UMTS
hardware. But the network planning engineer will face the other case of this problem.
When a subscriber is far away from the NodeB, he needs a majority of transmitting
power, resulting in power shortage for other subscribers. This means that the cell
capacity is related to the actual subscriber geographical distribution. When subscriber
density is rather large, statistics average value can be used to solve this problem.
When subscriber quantity is small, it is necessary to perform dynamic analysis to the
network through simulations.
Uplink and downlink:
The UMTS network traffic is asymmetrical, that is, the data transmission quantity in the
network uplink differs from that in downlink. The network planning engineer should
calculate values in two directions and then combine them together properly. In this way,
the network planning work will be very complicated. Uplink is a typical limit factor for the
valid coverage range of UMTS cell, or we can say that uplink is coverage-limited and
downlink is capacity-limited. The transmitting power in uplink is provided by UE and the
one in downlink is provided by NodeB.
The above problems also occur in the existing CDMA network. For the UMTS network,
these problems are more complicated. The UMTS network can satisfy different
services with different requirements in communication quality and traffic at the same
time, including simple voice service and packet service up to 2Mbps.
Integrated services:
In fact, the UMTS network should satisfy requirements of different services at the same
time. So, the network planning engineer should take different services into
consideration. For the service with low communication quality requirement, the UMTS
cell has rather large coverage. For the service with high communication quality
2014-10-28
HUAWEI Confidential
Page7-3, Total38
requirement, the cell has very small coverage. So, in the actual work, the network
planning engineer should not just consider UMTS cell radius, because different
services correspond to different cell radiuses. If the minimum cell radius, that is, the
service with highest communication quality requirement, is used as the standard for
network planning, the network establishment cost will be very high and it is not realistic.
The UMTS network planning engineer should start from the cell radius of middle-class
service. As a result, the actual valid range of the cell can only satisfy the requirement of
high-class service partially. At present, many network planning software companies
have started to develop valid algorithms for this kind of new UMTS network integrated
service.
Other differences:
Compared with GSM network, the UMTS network features other differences. The GSM
network solves capacity problem with sector partition method. The cell with too much
traffic is divided into multiple sectors, and antennas are added correspondingly. This
method is also used for the UMTS network, but its effect is not enough. The change of
cell coverage will cause the near-far effect mentioned above, and overlapped sectors
will interfere mutually because they use the same frequency.
The declination angle (mechanical or electronic) of antenna plays an important role in
the UMTS network. It can reduce the interference among adjacent cells and raise cell
capacity implicitly. In the actual application, large declination angle can be chosen to
solve this problem.
In the WCDMA system, multi-path propagation is not a negative factor but an ideal
result, because receiver can combine the signal with delay of at least 1 Chip (the UMTS
network chip transmission rate is 3.84 Mcps, that is, 1 Chip=0.26 microsecond, equal to
78 meters) into valid signal.
In addition, the UMTS network also uses the soft handover. In this case, a mobile
subscriber can connect to several cells. This method solves network signal fluctuation,
but raises network traffic. The traditional Erlang model is not applicable any more.
Compared with 2G traditional GSM network, the UMTS network features many
differences. Especially, the UMTS network can run asynchronously, which causes
non-orthogonality of transmission channel. Lets return to the party example again.
Even if the perfect planning can be made theoretically, that is, planning the person to
talk in the certain time, it is impossible to reach that ideal goal factually, because the
watches of all the guests can not be synchronous exactly.
Through the above analysis, we can clearly see that the UMTS network planning needs
more cost, compared with the current mobile communication network planning. The
UMTS network planning is rather complicated, because many system parameters are
2014-10-28
HUAWEI Confidential
Page7-4, Total38
closely related to each other and should be calculated at the same time. In the current
mobile communication network, however, these parameters are calculated separately.
Preparation Phase
1)
2)
3)
Estimation Phase
1)
2)
3)
4)
5)
6)
7)
Pilot Design
8)
9)
PN Offset Handover
After the above phases, you get to know the radio network features and confirm control
channel allocation and design handover parameters, and then you may analyze the
coverage of base station in detail. As for some cell, inter-cell interference vs. total
interference ratio is unique. During the process of planning, you can continually take an
analysis to the network and evaluate the interference ratio to estimate the coverage in
different cells. Such iterative process may be repeated until the convergence of
2014-10-28
HUAWEI Confidential
Page7-5, Total38
coverage is achieved. Design tools can be adopted to realize the process automation
and in the meantime detect leaks in the coverage. Usually, the coverage in 3G network
service is not equable, which would lower network performance. On the one hand, the
interference in the service-intensive area gets more, resulting in low quality. On the
other hand, it is not necessary to get high quality, for it will result in a waste of resources.
System effectiveness can be improved with the method of self-adapting controlling cell
radius, antenna direction and uplink received power threshold. Cell radius can be
varied with pilot power adjustment. If signal-interference ratio (SIR) is higher than the
required value, cell radius can be increased. If not, cell radius can be decreased. The
uplink/downlink cell radius can be balanced by increasing/decreasing uplink received
power threshold. In the configuration of separate sectors, the communication quality of
the base station can be balanced by changing central angle of each sector.
HUAWEI Confidential
Page7-6, Total38
are unable to be achieved with diversity reception antennas set, saying nothing of that
the antennas are unable to be set in some base stations. In that case, the technology of
dual polarized antennas emerges as the times require.
In 3G phase, as the wireless technology grows and the signal detection varies, the
cellular network should be adjusted and optimized, which demands new base station
antennas, such as self-adapting control antenna and intellectualized antenna.
Section
Sectioncell
cell
Omnidirectional
cell cell
Omnidirectional
For 3G (WCDMA), the channels per carrier are decided together by OVSF code and
scrambling code, so capacity of the channels per carrier is great. You should set the
number of the carriers and traffic channels in each base station based on the
requirements of practical traffic distribution in engineering design.
When implementing multi-carrier, you should pay attention to the followings in
designing radio network:
1)
2)
2014-10-28
HUAWEI Confidential
Page7-7, Total38
3)
Avoid heavy-traffic cells of being edge cells where hard handover occurs.
Properly choosing half-power beam width and gain of antenna based on the
number of base station sectors, traffic density and coverage requirements.
2)
3)
The adjustment of antenna direction is the same as that in 2G engineering. The main
lobe direction and angle of tilt of the directional antennas should be properly adjusted to
the traffic distribution and communication quality requirements. When setting antennas,
you should note that the isolation between antennas should meet the requirements of
horizontal and vertical isolation to avoid interference. The setting height of antenna is
up to the coverage. Therefore, it should be properly considered according to the
coverage, interference, isolation and future development requirements.
The antennas used in 3G network are similar to those used in 2G network, whose
requirements are as follows:
Sector antenna gain: 13-16 dBd
Omnidirectional antenna gain: 9-10 dBd
Sector antenna half-power beam width: 60-65 degrees or 90 degrees
Omnidirectional antenna deviation in roundness: < +/- 1 dB
Voltage standing wave ratio (VSWR): <1.5
Impedance: 50 ohm (unbalanced type)
Maximum input: >500W
Antenna diversity: Space diversity or polarization diversity is taken as standard
configurations.
HUAWEI Confidential
Page7-8, Total38
.......
W11
W12
...
W1N
Wm1
.....
Wm2
Wmn
USERm
USER1
Figure 7-2 SA Pattern
From the Figure 7-2, it can be shown that the array antenna is composed of N antenna
units, each of which has a corresponding weigher, totaling M groups of weighers and
forming beams in M directions. M indicates the number of users, which can be greater
than the number of antenna units. The dimension of array antenna and the number of
antenna units decide the maximum gain and the minimum beam width, which means
that the dimension of array antenna and antenna gain should keep balance with the
antenna side lobe performance. By adjusting the signal phase and amplitude received
from each antenna, SA combines them to a desired beam. This is called beam forming,
which can form all kinds of beams, such as scanning beam, multi-beam, shaped beam
and the beam with zero position controlled. According to the pattern, there are two
types of SA: self-adapting pattern and shaped pattern.
The key technology of SA is to identify the signal angle of arrival (AOA) and the
implement of digit-shaped. The algorithms to identify the signal AOA are MUSIC
algorithm, ESPRIT algorithm, maximum likelihood algorithm, etc. The implementation
of digit-shaped is to choose the optimum weight coefficient to get the optimum beam.
For self-adapting algorithm, the first step is to set rules, which commonly are maximum
likelihood, maximum S/N, minimum mean square error (MMSE), minimum square error.
You should choose one of them according to the specific conditions. Beam forming SA
pattern is shown in the Figure 7-3.
2014-10-28
HUAWEI Confidential
Page7-9, Total38
2014-10-28
HUAWEI Confidential
Page7-10, Total38
2. Applications of SA in 3G
The application example of SA in 2G network indicates that SA can efficiently prevent
from interference. According to the 3G criteria, the SA application is required to improve
the network capacity and performance, and take the technical factors, such as
converged beam, self-adapting beam forming and beam handover, into
consideration.
Converged beam is applied to special areas, aiming at enlarging coverage and
increasing capacity. Such beam does not associate with a user, nor does it trace mobile
users in the coverage. However, by increasing link scope and converging beams, it can
reduce transmission power of mobile users and according increase capacity. If mobile
user enters the area with great transmission attenuation, the converged beam will point
to the mobile user and rest on him. If a mobile user enters the area with good coverage
which converged beams become unnecessary, the mobile user will be in the charge of
common pilot channel.
Self-adapting beam forming, applying to downlink, is in favor of link budget for
individual user and a group of users to improve the system performance. In poor
transmission conditions, such as cell edge (basement), the coverage is required to be
spread to users with an aim to improve link scope.
Beam handover system can switch users between narrow beams to form narrow
sectors without handover loss. Because the capacity in 3G system increases as the
number of sectors increases, four 30-degree beams coverage can substitute one
120-degree one, resulting in increasing capacity by 2 to 4 times. Users are switched
between beams without the requirement of any special auxiliary channel.
There are several options to apply SA in 3G. Beam handover SA is an option in starting
phase. In network design, SA can reduce the external network interference (such as
one frequency interference, adjacent frequency interference and other-system
2014-10-28
HUAWEI Confidential
Page7-11, Total38
interference) and the internal network interference as well. The order of magnitude
depends on the amount of beams.
HUAWEI Confidential
Page7-12, Total38
Inter-system hard handover consists of the handover between FDD mode and TDD
mode, the handover between WCDMA system and GSM system in R99, and the
handover between WCDMA and cdma2000 in R2000.
The startup compress mode is required to measure inter-frequency and inter-system
for inter-frequency hard handover and inter-system hard handover.
According to the purpose, handover can be classified into edge handover, urgent
handover at poor quality, urgent handover at quick level decrease, interference
handover, velocity sensitivity handover, charge handover, layered/leveled handover,
etc.
The typical process of handover is measurement control measurement report
handover decision handover implementation new measurement control.
In the phase of measurement control, the network informs UE of the measurement
parameters through the sent measurement control message. In the phase of
measurement report, the measurement report message is sent to the network by UE. In
the phase of handover decision, the network makes a handover decision according to
the measurement report. In the phase of handover implementation, UE and the
network go along the signalling procedure and make a response to signalling.
inter-RAT
measurements,
traffic
volume
measurements
and
UE-internal measurements.
The same type of measurements may be adopted in different functions or processes of
UTRAN, such as cell reselection, handover and power control. The UE shall support a
number of measurements running in parallel. The UE shall also support that each
measurement is controlled and reported independently of every other measurement.
Cells that the UE is monitoring (e.g. for handover measurements) are grouped in the
UE into three different categories:
1.Cells, which belong to the active set. User information is sent from all these cells.
The cells in the active set are involved in soft handover or softer handover.
2.Cells, which are not included in the active set, but are monitored according to a
neighbour list assigned by the UTRAN belong to the monitored set.
3.Cells detected by the UE, which are neither included in the active set nor in the
monitored set belong to the detected set. Reporting of measurements of the detected
2014-10-28
HUAWEI Confidential
Page7-13, Total38
P-CCPCH RSCP
RSCP, Received Signal Code Power, is a measured received power of a code from
P-CCPCH in TDD cell. The reference point of RSCP is the antenna connector at UE.
SIR
P-CPICH RSCP
Received Signal Code Power is a code power measured in P-CPICH. The reference
point of RSCP is the antenna connector at UE. If transmission diversity is adopted in ,
the received code power from each antenna should be measured separately, then
added, and sequentially be the power of the whole received codes in P-CPICH.
RSSI = Received Signal Strength Indicator, a broadband received power within relative
channel width. The measurement will be taken at the downlink of UTRAN. The
reference point of RSSI is the antenna connector at UE.
2014-10-28
HUAWEI Confidential
Page7-14, Total38
RSSI = Received Signal Strength Indicator, a broadband received power within relative
channel width. The measurement will be taken at the BCCH carrier of GSM. The
reference point of RSSI is antenna connector at UE.
CPICH Ec/No
Ec/No refers to ratio of the received energy of each code to noise power density in a
channel. Ec/No has something in common with RSCP/RSSI. The measurement will be
taken at basic CPICH. The reference point of Ec/No is the antenna connector at UE. If
basic CPICH adopts transmission diversity, the received energy of each code (Ec) from
each antenna should be measured separately. The value of adding the received energy
of each code on basic CPICH will be Ec.
It refers to the evaluation of Block Error Rate (BLER) of transmission channel. The
evaluation of BLER is based on CRC of each transmission block after the combination
of wireless link. Only the transmission channel with CRC requires the evaluation of
BLER. In the connection mode, BLER can be measured in any transmission channel.
In the idle mode, the BLER on the transmission channel PCH should firstly be
measured if BLER needs measuring.
UE transmitting power
It refers to the transmitting power of the whole UE at a carrier. The reference point of
UE transmitting power is the antenna connector at UE.
2. RNC Measurement
RSSI
RSSI, Received Signal Strength Indicator, refers to a broadband received power within
UTRAN uplink carrier channel bandwidth at the access point of UTRAN. The reference
point of RSSI measurement is the antenna connector.
SIR
HUAWEI Confidential
Page7-15, Total38
ISCP, Interference Signal Code Power, refers to a received signal interference. Only
non-orthogonality
of
interference
is
concerned
in
measurement.
SIRerror
The transmitting carrier power is the ratio (0100%) of the whole transmitting power to
the maximum transmitting power, where the whole transmitting power [W] is related to
the average power [W] of a carrier at an access point of UTRAN. The maximum
transmitting power is related to the average transmitting power [W] of a carrier at an
access point of UTRAN under the condition that each cell is on the maximum
power .The measurement may be taken at any transmitting carrier from the access
point of UTRAN .The reference point of measuring transmitting carrier frequency is the
antenna connector. The carrier frequency of each branch should be measured in case
of transmitting diversity.
Transmitting code power goes under the condition of given carrier, given scrambling
and channel code. You can take measurements at DPCCH of any specific wireless link
from the access point of UTRAN, to show the pilot bit power at DPCCH. All time slots
should be involved in the measurement of transmitting power in the compression mode.
For example, the time slot of transmitting interval should be involved. The reference
point of measuring transmit code power is the antenna connector. The transmitting
code power [W] of each branch should be measured and added in case of transmitting
diversity.
BER of transmission channel is to evaluate the mean bit error rate of DPDCH data after
the combination of wireless link. The BER of transmission channel (TrCH) is as a result
of measuring the puncture bits of channel coding input terminal at Node B. The
evaluation of transmission channel BER may be reported at the end of each TTI at
TrCH. The reported transmission channel BER should be a BER evaluation at the latest
TTI of the current TrCH. Only the BER of transmission channel through channel coding
are needed to be reported.
2014-10-28
HUAWEI Confidential
Page7-16, Total38
BER of physical channel is to evaluate the mean bit error rate of DPCCH data after the
combination of wireless link at Node B. BER of physical channel may be reported at the
end of each TTI of all sent transmission channels. The reported BER of physical
channel should be a mean BER evaluation at the latest TTI of each transmission
channel.
Other measurements: round trip time, transmission time delay, leading accesses,
etc.
2014-10-28
HUAWEI Confidential
Page7-17, Total38
HUAWEI Confidential
Page7-18, Total38
2014-10-28
HUAWEI Confidential
Page7-19, Total38
One frame
(10 ms)
Fast power control can not be used during the period of compression mode gap, so
some interleaved gain will be lost; In this regard, during the compression frame, higher
Eb/No is demanded to decrease capacity. The process of typical inter-system handover
is as follows:
The inter-system handover trigger is implemented at RNC, for example MS is out of
WCDMA coverage range;
RNC commands MS to begin with the inter-system measurements in compression
mode;
RNC chooses the target GSM cell based on the MS measurements;
RNC sends a handover command to MS.
The handover from GSM system to WCDMA system sources from the BSC of GSM.
Due to discrete transmission and receiving, the compression mode is not required for
the measurement value of WCDMA from GSM.
HUAWEI Confidential
Page7-20, Total38
2014-10-28
HUAWEI Confidential
Page7-21, Total38
Amount of reporting: The maximum amount of reporting after the event report changes
to the cycle report. It is often used together with the Reporting interval.
Reporting interval: Reporting cycle after the event report changes to the cycle report. It
is used together with the amount of reporting. In using it, we should try to avoid
over-adding the signaling flow.
Reporting Cell Status: It is used to indicate the cell composition principle of the
measured result, including the maximum number of reporting cells and the attributes of
the reporting cell.
HUAWEI Confidential
Page7-22, Total38
Therefore, on the basis of ensuring QoS for subscribers, how to effectively control
power, how to reduce the transmit power as much as possible, and how to reduce the
system interference and increase the system capacity are the key to WCDMA
technologies. The WCDMA system has such functions as forward power control (i.e.
control of the BS transmit power) and reverse power control (i.e. control of the MS
transmit power}, of which the reverse power control is especially important, because
with it, the system capacity and communication quality may be ensured and the fading
and near-far effect may be avoided to a great extent.
2014-10-28
11.3dB
8.5dB
6.8dB
5.5dB
6.7dB
7.3dB
5.8dB
1.8dB
-0.5dB
HUAWEI Confidential
Page7-23, Total38
Another two advantages of fast power control are that it can quickly adjust the power of
the MS to avoid far-near affect to a great extent and the fast adjustment of the power
reduces the interference to other cells and MSs.
2. Power control implementation
In the WCDMA system, power control may be divided into inner loop power control and
outer loop power control.
The inner loop power control is to converge the received SIR to the target SIR by
controlling the transmit power of physical channels. In the WCDMA system, relevant
power adjustment commands are sent out by estimating the received Eb/No (ratio of bit
energy to interference power spectrum density). There is certain mapping relationship
between Eb/No and SIR. For instance, for the 12.2 kbps voice service, the typical value
of Eb/No is 5.0 dB. If the chip rate is 3.84 Mcps, the processing gain will be 10 log10
(3.84M/12.2k) = 25 dB. So, the SIR is -20 dB (= 5 dB-25 dB), that is, the
Carrier-to-Interference Ratio (C/I) is more than 20 dB.
The outer loop control mechanism is to dynamically adjust the SIR target value of the
inner loop control, so as to ensure that the communication quality always meets the
requirements (i.e. the specified FER/BLER/BER value).The outer loop control is
conducted in the RNC. The radio channels are complex, so the power control based
only on the SIR value cannot reflect the real quality of the links. For instance, based on
the same FER, the requirements of static subscribers, low speed subscribers (3 km/H)
and high speed subscribers (50 km/H) for SIR are different. The communication quality
is finally measured with FER/BLER/BER, so it is necessary to dynamically adjust the
SIR target value according to the actual FER/BLER value.
The inner power control may be subdivided into open loop power control and closed
loop power control. The former aims to providing the estimates of the initial transmit
power. It estimates the path loss and the interference level according to the
measurement result, so as to calculate the process of initial transmit power. In the
WCDMA system, the open loop power control is adopted in both the uplink and
downlink.
In the WCDMA-FDD system, the fast fading conditions in the uplink and downlink are
absolutely irrelevant because the frequency spacing between the uplink and the
downlink is large. Therefore, the path loss estimates obtained through the open loop
power control according to the downlink signals are inaccurate for the uplink. The
method to solve this problem is to introduce the fast closed loop power control
mechanism.
The closed loop power control mechanism is to rapidly adjust the power in the
uplink/downlink during the communication period, thus making the link quality
2014-10-28
HUAWEI Confidential
Page7-24, Total38
converged to the target SIR. Two algorithms may be adopted for the closed loop uplink
power control in 3GPP protocol. In the two algorithms, the step length of the uplink
power control is 1 dB or 2 dB. In the DPCCH, the step adjustment of the power control
is dpcch = tpc*TPC_cmd.TPC_cmd is the synthesized TPC command from different
algorithms. The power of DPDCH is set according to the power offset between the
DPDCH and the DPCCH.
Differences between the two modes are: The open loop is not closed. It estimates the
downlink interference according to the uplink interference, or estimates the uplink
interference according to the downlink interference. In comparison, the closed loop is a
closed feedback loop. The initial transmit power of the open loop power control is set by
the RNC (uplink) or the UE (downlink), while the closed loop power control is completed
by Node B with RNC only giving the target SIR value of the inner loop power control.
Transmitting signal
Receiving signal
Receiving signal
parameter (P or SIR)
estimation
Power control
instruction insertion
Via
transmission
channel
Via
transmission
link
Receiving signal
demodulation
Power control
instruction abstraction
WE generation
Adjust transmitting power
according to a certain algorithm
Receiving signal
Transmitting signal
Figure 7-6 Basic structure of the closed loop power control mechanism
HUAWEI Confidential
Page7-25, Total38
the uplink and transmit DPCCH. In this way, the total transmit power and additional
interference may be reduced. SSDT is an optional macro diversity method in the
software handover mode.
The specific SSDT implementation method is as follows: Firstly, the UE selects a cell
from ACTIVE SET as the PRIMARY CELL, and all other cells fall into the NON
PRIMARY CELL. SSDT is to transmit signals from the PRIMARY CELL in the downlink,
so as to reduce the interference resulted from the multi-channel transmission in the soft
handover mode. Secondly, it is required to implement the site address selection
promptly if there is no network intervention, so as to maintain the advantages of the soft
handover. To select PRIMARY CELL, a temporary identity code should be allocated to
each cell. Then, the UE will notify other cells in ACTIVE SET of the identity code of
PRIMARY CELL on a regular basis. NON PRIMARY CELL selected by the UE will turn
off the transmit power, and the identity code of PRIMARY CELL will be transmitted via
the uplink FBI domain of the uplink. The SSDT activation, stopping and ID code
allocation are implemented by the upper signaling.
SSDT is initiated by the network according to ACTIVE SET of the soft handover. Once it
is determined to adopt SSDT, the network will notify the cell and the UE of the message
that SSDT is activated in the period of current soft handover. Otherwise, TPC will still
operate in the usual mode, that is, each cell controls the transmit power according to
the TPC instruction of the uplink. The allocation of temporary identity code should be
implemented by the network and notified to all the cells in ACTIVE SET and the UE for
site address selection.
The UE measures the Received Signal Code Power of Common Pilot Channels (RSCP
of CPICHs) transmitted by the cells within ACTIVE SET on a regular basis to select the
PRIMARY CELL. The cell with highest RSCP of CPICHs is the PRIMARY CELL.
2014-10-28
HUAWEI Confidential
Page7-26, Total38
loop power control can satisfy the requirements for the control accuracy and the control
speed.
Specific parameters involving the outer loop power control are as follows:
Time factor of BLER report: The target BLER value divided by the time factor is the
pieces N to be measured;
Maximum pieces to be observed: This parameter is used to control the upper limit
of the pieces N to be measured;
SIR-converged lagging value: Check the SIR lagging value (one of measurement
report parameters) converged by SIR;
Control parameters of the SIR measurement report: SIR measures the filter factor
used by the SIRerr;
Uplink outer loop power control parameters: SIR variation range, SIR adjustment
factor, SIR target value falling step length, SIR maximum falling step length;
Uplink soft capacity control parameters: voice quality level and corresponding
BLER values;;
Downlink outer loop power control parameters: Trigger and stop the thresholds of
downlink outer loop power control;
Inner loop power control parameters: Initial SIR value, adjustment step length,
algorithm mode selection;
The above parameters are provided by OM, and there is a close link among them.
2014-10-28
1)
Location Areas;
HUAWEI Confidential
Page7-27, Total38
Routing Areas;
Cell Areas.
2)
The classification of location areas and routing areas in the WCDMA system is similar
to that in the GSM and GRPS systems.
2. Cell structure
The Node B of Huawei WCDMA system supports omnidirectional, 31, 32, 34, 61, 62
and 64 (combined cabinet) cell configurations. The cell structure of WCDMA is similar
to that of GSM with different titles. Cell is similar to the BS in the GSM, while
SECTOR is equal to the cell in the GSM system.
For instance: What are 3*1, 3*2, 3*4, 6*1, 6*2 and 6*4?
The first digit is the number of sectors supported by each cell; the second digit is the
number of carrier frequencies supported by each sector. 3*1 means the BS supports 3
sectors, each of which has one carrier frequency; 6*4 means the BS supports 6 sectors,
each of which has 4 carrier frequencies.
The cell structure planning is to evenly provide high bit rate within the cell area, or the
data rate of the cell boundary may be lower than that of the area near the BS, thus the
cell area will be larger.
The number of cells is calculated according to the capacity and the link budget. A
network may be coverage-limited or capacity-limited. Capacity limited means the
maximum cell radius cannot support the total traffic flow. Then, the number of cells may
be calculated according to the number of subscribers supported by the cell per sq.km.
2014-10-28
HUAWEI Confidential
Page7-28, Total38
Coverage limited means there is enough capacity in the cell to support all the traffic flow.
Then, the number of required BSs may be calculated according to the maximum cell
area.
3. Hierarchical structure of the air interface
According to the protocol, the air interface may functionally form a hierarchical structure.
From bottom to top, they are physical layer, link layer and network layer. The physical
layer fulfills the coding, modulation and spread spectrum of the physical channel. The
link layer may be subdivided into two sub-layers: Medium Access Control (MAC) and
Link Access Control (LAC).The former determines the resources provided by the
physical layer, while the latter completes the establishment, maintenance and release
of the logic link connection. The network layer includes such functions as call control,
mobility management and radio resource management.
4. Channel allocation and reconfiguration
The channel allocation includes the following types:
Connection-oriented channel configuration: Fundamental Channel Configuration
(FRC) and Dynamic Channel Reconfiguration (DCCC)
Cell-oriented channel configuration: Cell code resource allocation, cell channel
resource allocation and uplink scramble allocation
Of which:
Fundamental channel configuration: Allocate the channel types and bandwidth
according to the service request; and configure the parameters of each layer of the
channel according to the QoS.
Dynamic channel configuration: During the communication, dynamically change the
channel configurations according to current service status, including the channel types
and the parameters of each layer of the channel
Cell channel resource allocation: Common channel is the resource in the cell, including
RACH, FACH, DSCH and CPCH.
Cell code resource management: Cell downlink code resource allocation policy and
code resource maintenance.
Uplink scramble allocation: The uplink scramble includes the scramble reserved for the
common channels RACH and CPCH, and the scramble allocated to the UE with
dedicated channel.
2014-10-28
HUAWEI Confidential
Page7-29, Total38
If RRC is connected or RAB sets up the request, the fundamental channel configuration
entity determines the channel type according to the service type and rate requirements,
and configures parameters of each layer of the channel according to the QoS. It makes
a request to the call admission control entity for admission control according to the
channel configuration parameter (QoS).If it is permitted, then go ahead; or the process
of the channel setup is failed.
The dedicated channel is used to allocate the uplink scrambles; while the cell code
resource maintenance entity is used to allocate the downlink channel code. The
common channel is used to allocate the common channel parameters.
If the channel is set up successfully, the dynamic channel configuration entity will
monitor the traffic flow for the specific service, and make dynamic adjustment to the
channel parameters.
The cell channel resources are allocated according to the current cell service and the
load conditions, so as to adjust the resource configuration of the cell common channel
and optimize the system performances. The cell code resource management entity is
used to maintain the cell code resources.
HUAWEI Confidential
Page7-30, Total38
on the different bands. The multi-layer structure also can be applied to the
multi-operator environment.
2. Micro cell and macro cell with the same frequency
The frequency reusability factor is 1. The processing gain of the system enables
subscribers to bear the interference from the cells of different layers. The intra-layer
interference is controlled by the power control, while the inter-layer interference is
controlled by the spatial isolation. Generally, the attenuation of the micro cell is larger
than that of the macro cell, because its antenna is lower. Soft handover can offset the
attenuation valley of the boundary of micro cell.
3. Micro cell and macro cell with different frequencies
It is easy to manage when the cells of different layers adopt different frequencies,
because there is no interference among the layers. The disadvantage of this method is
that it needs large spectrum. At least 15 MHz bandwidth is required if the WCDMA
system is divided into three layers. The impact on the total spectral efficiency from the
non-linear power amplifier depends on the neighboring channel interference and the
link performance deterioration. The increase of the neighboring channel interference
will reduce the spectral efficiency.
Although different carrier frequencies are adopted in the multi-layer cells, interference
will occur between neighboring channel carriers if the capacity is high.
4. Antennas selection and parameters setting of the hierarchical network
Similar to the GSM system, the traffic of the hierarchical network should be deployed as
much as possible to the cell with minimum coverage area; that is, the macro cell is used
to satisfy the requirements of the system for wide coverage, while the micro cell and the
pico cell are used to absorb the traffic and the data traffic.
For this purpose, as to the engineering parameters setting, the antenna and the
transmit power of the macro cell are high; while the antenna and the transmit power of
the micro cell are low; as to the software parameters setting, it is easier for the MS to
access the micro cell and the pico cell. Most of the data traffic is convergent in the pico
cell, so higher QoS of the pico cell should be ensured for higher service rate.
MS status
HUAWEI Confidential
Page7-31, Total38
According to the protocol, five statuses are available for the MS (UE): IDLE,
CELL_DCH, CELL_FACH, CELL_PCH and URA_PCH.
In the CELL_DCH status, the cell-crossing is judged by the measurement report, and
the location is updated by the handover process.
In the CELL_FACH and CELL_PCH statuses, the cell-crossing is judged by the UE cell
reselection, and the location is updated by CELL UPDATE.
In the URA_PCH status, the cell-crossing is judged by the UE URA, and the location is
updated by URA UPDATE.
2)
When the UE starts up, it will carry out PLMN selection, cell selection and location
registration.
Upon the completion of the cell selection, the cell re-selection will be carried out. If a
new cell is selected to stay, the location registration will be carried out for the new
location area entry.
If access and immediate cell evaluation are required, then initiate the access in the
optimized cell.
If the MS is in the CELL_DCH status, the UE crosses the cell through the handover
flow.
3)
The stay cell selection by the MS is determined by adjusting the parameters of the cell
reselection, so as to adjust the cell load direction and achieve the load self-adaptive
adjustment.
2. Random access procedure
Random access procedure is a process: A MS requests the access system, then the
network responses and allocates a service channel to the MS. The random access is
carried out when the MS begins to transmit power; or when synchronization loss for
some reasons occurs; or when message packets should be transmitted. The random
access is fulfilled after following steps are completed: 1) synchronization between the
code and frame; 2) search for the cell parameters, such as the random access code; 3)
evaluation of the downlink path loss and random access to the initial power level.
The optimal criterion for the random access procedure is the process rate and the low
transmission power. The requirement for the random access procedure speed is
determined by the requirement for the initial synchronization time. The number of
access channels is depending on the involved access load. In addition, it also will be
affected by the information transmitted in the random access status. Too high
2014-10-28
HUAWEI Confidential
Page7-32, Total38
transmission power will reduce the capacity of the CDMA system, and the transmit
power in the random access status cannot be controlled by the fast closed loop power
control, so it is most important to make the total transmit power in the random access
status minimum. If the initial transmission power is lowest, there is a long time for the
access attempt. On the other hand, the high transmission power in the initial access will
cause interference to other subscribers during the fast synchronization. The least
information that needs to be transmitted in the random access attempt is the identity
numbers of the MSs of some types. A kind of typical random access information
includes the pre-field, the synchronization and the data. The data should include at
least the MS identity number, while the pre-field is the unmodulated wideband spread
spectrum signal.
3. Call Admission Control
Call Admission Control is a part of the load management.
The call admission control algorithm is used to accept new calls as many as possible
on the basis of ensuring the existing QoS. Its principle is: Current Status of the Cell
Resources + Service Request YES/NO.
The current status of the cell resources is depending on the uplink interference and the
downlink load; while the requested service is depending on the QoS.
4. SNRS migration
The structure shown in the left figure may occur for some reasons, such as the
handover, cell update, URA update, RRC reconnection and direct retry. To save Iur
interface resource and reduce the time delay, it is required to migrate the Iu interface as
shown in Figure 7-8, that is, SNRS migration. The SNRS migration may effectively
reduce the traffic of the Iur interface and improve the adaptability of the system.
2014-10-28
HUAWEI Confidential
Page7-33, Total38
2014-10-28
HUAWEI Confidential
Page7-34, Total38
handover parameters and service rates are set for the cells of different layers of the
hierarchical network.
4. Power control
The power control plays an important role in the CDMA network performance and the
network capacity.
5. Coverage
The maximum cell coverage is determined by the link budget. Besides the data rate
and the Eb/N performance, such specific factors as the cable loss, the antenna gain
and the receiver noise should be calculated. In addition, the affects of the soft handover
gain and asymmetric traffic should be taken into consideration. Different service
coverage area has different service rate requirements. The design basis of the
hierarchical network is as follows:
Outdoor in the rural: Terminal speed 250 kmph, 144 Kpbs at least, 384 Kpbs optimal
Outdoor in the urban or suburb: Terminal speed 150 Kmph, 384 Kpbs at least, 512
Kpbs optimal
Indoor or outdoor with a small area: Terminal speed 10 Km, 2 Mbps at least.
Real-time fixed time delay: BER--, time delay 20-300 ms.
Non-real time variable time delay: BER--, time delay 150 ms.
Erl/km2 may be adopted for in a geometrical area. The data traffic may be Mbps/km2.
The BS adopts multi-subscriber detection technology to provide a favorable coverage
and lower the transmit power of the MS. The increase of the data rate will reduce the
coverage area of the uplink. It differs from the narrowband system.
2014-10-28
HUAWEI Confidential
Page7-35, Total38
efficiency, the bandwidth of 15- to 20-MHz is required for each cell to support an
effective 2-Mbps subscriber.
2. Relationship between the resource planning and the network structure
The WCDMA carrier interval is 200 KHz, ranging from 4.2 MHz to 5.4 MHz. The carrier
intervals are adopted according to the interference to obtain proper protection for the
neighboring channels. The bandwidth of 15 MHz may be divided for the use of three
cells. The interval between different operators may be longer to avoid interference
among them.
2014-10-28
HUAWEI Confidential
Page7-36, Total38
in the link budget, including interference margin, fast fading margin, transmit power
increasing and soft handover gain.
Even load
Small
Small
Huge load
Small
Small
Small
If the cell has few channels, that is, there are high bit rate real-time subscribers, then
the average load should be reduced to ensure low congestion. With the reduction of
2014-10-28
HUAWEI Confidential
Page7-37, Total38
average load, there is additional capacity to be provided to the neighboring cell for use.
This part of capacity is borrowed from the neighboring cell, so the interference sharing
provides soft capacity. It is important for the high bit rate real-time subscribers to
connect as shown in the figure.
The soft capacity depends on the transmission environment (i.e. network planning).
The value of is of great importance, and determined by the equipment radio resource
management algorithm.
In the WVDMA system, all subscribers share the interference source in the space
channel, so the analysis cannot be conducted separately. The mutual affects among
subscribers result in the changes of transmit power, which in turn cause further
changes and repeating mutual affects. Forecast processing repeats unless it is stable.
In the WCDMA system, the uplink/downlink fast power control, soft handover/softer
handover and orthogonal downlink channels will affect its performance. Unlike the
GSM, the BS sensitivity is depending on the number of subscribers and the rate of
subscribers. It is constant in the GSM.
The interference planning and capacity planning are even more important in the 3G.
2014-10-28
HUAWEI Confidential
Page7-38, Total38
HUAWEI Confidential
Page8-1, Total20
management
of
telecommunication
networks
and
services
by
transmitting/storing/processing information.
The TMN can manage various types of telecommunication networks and the network
elements such as analog/digital network, the public network/private network, the
switching system/transmission system, the telecommunication software, the network
logic resources (like the circuit/route/service) and auxiliary supporting systems (like the
power system and the air-conditioning system).
The TMN is the telecommunication network management standard presented by ITU-T.
As a part of the telecommunication supporting network, TMN is separate from the
telecommunication service in principle.
2. Basic Model and Features of the TMN
1)
The TMN consists of multiple layers with each layer corresponding to a different
management mode. The basic model of the TMN is shown as the figure below:
2006-12-30
HUAWEI Confidential
Page8-2, Total20
According to the figure above, the TMN consists of different management layers,
interconnected via an interface. The TMN is a bottom-up network system with products
as the core. The layers are described as follows:
Providing support for service-oriented decision functions, such as report statistics and
performance trend analysis.
As the basis of the TMN O&M system, the OM system at the NE side provides NE
operation and maintenance, and upper interfaces with the TMN.
2006-12-30
2)
HUAWEI Confidential
Page8-3, Total20
2006-12-30
HUAWEI Confidential
Page8-4, Total20
Customer
I
N
F
O
R
M
A
T
I
O
N
Fulfillment
Sales
Assurance
Problem
Handling
Order Handling
Customer QoS
Managment
Billing
Invoicing and
Collections
Service
Planning and
Development
Service
Problem
Management
Service
Configuration
Service Quality
Managment
S
Y
S
T
E
M
S
Rating and
Discounting
M
A
N
A
G
E
M
E
N
T
Network
Planning and
Development
Network
Inventor y
Management
Networ k
Provisioning
Network
Mainteneance &
Restoration
Network Data
Ma nagement
P
R
O
C
E
S
S
E
S
In the WCDMA NMS, the O&M layer relies heavily on the building of the TMN
O&M network system (NMF-EMS-NMS), while the accounting management, the
business forecast and the network service provision are based on the TOM
model.
2006-12-30
Page8-5, Total20
To simplify the operation and maintenance with local or remote O&M functions;
To allow for the exchange of the network management and the accounting
information between the network manager and the service provider, and the
exchange of information with different networks, including other UMTS networks
and non-UMTS networks;
To support and control the growth of resources, and with scalability, to satisfy the
requirements of smooth expansion according to the development of network
services;
2006-12-30
HUAWEI Confidential
Page8-6, Total20
within
the Operations
System of aA
UMTS
Organisation
Organisation B
Enterprise
Systems
2
same role
LLA
other role
UMTS Operations
System
Operations
System
1
NE1
NE2
NEn
NE3
Network
Elements
Interface 1: The interface between the NE and the OS. Generally, it means the interface
between the NE and the EML. If the NE itself provides a network management interface,
it also refers to the interface between the EML and the NML.
Interface 2: The interface between the OS and the Enterprise system. It may be
considered as the interface between the OS layer and the service provisioning system,
similar to the interface between the NML layer and the upper layers in TMN.
Interface 3: It means the interface between OSs. It may be the OS interface between
the UMTS networks, or the interface between a UMTS network and a non-UMTS
network, such as the PSTN or other networks;
Interface 4: It indicates the interface among the layers of an OS, similar to the interface
between the EML and the NML.
According to the figure above, the 3G NMS is designed to provide a complete, open
and scalable operation support system to support the UMTS network and develop
services.
2006-12-30
HUAWEI Confidential
Page8-7, Total20
Performance Management
Fault Management
Configuration Management
Accounting Management
Security Management
The architecture of the 3G NMS is more reasonable than that of the 2G NMS
The 2G NMS is designed based on the idea of TMN network management, so the
operation and maintenance layer (O&M layer) is fairly perfect. However, it is deficient in
the entire operation layer (OSS layer), where services are not well integrated.
The 3G NMS is intended to deliver an integrated operation network based on
numerous management theories such as TMN and TOM, combining the features such
as network maintenance, management, service deployment and operation, to develop
an integrated support system solution.
2)
In the 2G NMS, the standards of the interfaces between the NE and the EMS, between
the EMS and the NMS, and among different networks vary largely, making it difficult to
develop an integrated O&M network system. As a result, it is difficult for operators to
keep fully informed about the NMS operation status and deploy services quickly by
establishing an unified O&M network system given multiple equipment vendors,
different standards and complex structures.
The 3G NMS pays more attention to interface standardization and normalization,
guiding the standardization of the interfaces between the NE and the EMS, or between
the EMS and the NMS, and between the O&M layer and the OSS layer, to develop an
integrated O&M solution.
2006-12-30
HUAWEI Confidential
Page8-8, Total20
In addition to the 2G NMS feature, the 3G NMS provides more service features such as
network-wide software management, OoS management and location management.
The details will be described in the introduction below.
4. The 3G NMS serves to manage a diversity of service areas through different layers
Overall management over the operation of 3G services calls for a large amount of
complicated systems engineering. Its features include:
Multiple managed network layers, each of which has a variety of devices, and
these devices may be provided by different vendors;
The business mode of the 3G service is much more complicated than that of the
traditional voice service, involving varied services and service providers and
multi-vendors;
The network structure and the equipment type varies with the network system, and
even the same kind equipment in different systems calls for different services;
The wireless service itself has some complex features, such as cell management,
roaming management and mobility management. All these features make the 3G
service management intricate;
Each network equipment layer of the 3G service environment comprises five parts:
access equipment (i.e. mobile phone/terminal), wireless access network, core
network, service release network and content & service. To fully support the 3G
service operation, we need to manage these devices;
Thus, the 3G NMS manages various service areas through different layers as shown in
the figure below:
2006-12-30
HUAWEI Confidential
Page8-9, Total20
In addition, mobile network management must attain the objectives of greater customer
satisfaction but lower cost:
- Segregating the roles of service provider and network operators between the
home environment and the service network entity.
2006-12-30
Performance management
Roaming management
Fraud management
Position management
Fault management
Security management
Software management
HUAWEI Confidential
Page8-10, Total20
Configuration management
Accounting management
Order management
2006-12-30
HUAWEI Confidential
Page8-11, Total20
Tariff/price
Troubleshooting
The roaming agreement will affect many aspects of the network and the operation
management infrastructure, like the follows such as service implementation, service
assurance and service charging in the operation system.
To classify the subscribers according to the level of fraud risk, which is based on
demographic statistics and credit information;
To revise the risk level according to the utilization and the payment (in real time or
near real time);
To detect and sample the frauds in real time or near real time;
To take measures to suspend the service, even when the customer is roaming on
a network other than the home network;
For visiting customers (the roamer), the roaming service provider may consult the
home network provider or the international knowledge base to assess the potential
fraud, so as to decide whether to allow the roamer to access the network.
The fraud management service addresses the following three areas: fraud detection,
fraud termination and fraud prevention.
2006-12-30
HUAWEI Confidential
Page8-12, Total20
To ensure the configurations will not cause any adverse impact on the NEs that
need no configuration.
In brief, these principles involve security, data validity and consistency as well as
resource maintenance.
2. For configuration management, the system is expected to provide the following
capabilities for the operator:
The management system provides the following capabilities through its service
components:
-Modify system , change the network to meet the operators requirements
- Monitor the system, obtain an overview of current software, equipment and data;
Information inquiry;
Information reporting;
2006-12-30
HUAWEI Confidential
Page8-13, Total20
fault location, fault correct and fault fixing) are mainly located on the NE and the NE
management layer so that the network equipment is capable of self-healing.
Logically, the network data management function is about how to collect and use the
performance and service data. When the NE gets faulty, the fault management feature
of the NE management layer is the leading responder, while the network and the
system management layer makes a preventive response.
Planning and formatting bills of the 3G core network (circuit packet switching and
IP multimedia) node and the service node (multimedia short message service).
Please refer to [14].
For call state data generation, billing event and other service requirements, please
refer to 3GPP TS 22.115.
CDR format and file transfer mechanism formally described in ASN.1 language.
For the specific billing requirements of each 3G area, please refer to 3GPP TS 22.115
and TS 32.105.For the specific billing data of each area, please refer to 3GPP TS
32.205, TS 32.215, TS 32.225 and TS 32.235.
2006-12-30
To deliver the software to the NE/element manager system for local storage
To verify the validity of the software to ensure the software is not misused
To verify the validity of the software to ensure the software can run properly
HUAWEI Confidential
Page8-14, Total20
To accept or reject (in the case of changes to software of previous versions) the
software according to the verification result
HUAWEI Confidential
Page8-15, Total20
operator, all the NEs from various network infrastructure suppliers should be configured
in the same way, adding to the complexity of interaction. NEs must be configured with
many QoS functions, such as admission controller, policy manager, shaper, queue
manager and scheduler. To configure these heterogeneous networks to provide
expected QoS, the operator needs a management solution satisfying the following
high-level requirements:
2006-12-30
HUAWEI Confidential
Page8-16, Total20
To be the master network policy base to store all the network policies of all
domains
The policy base adopts the LDAP-based directory to store the policy information.
2. QoS policy provisioning on the EML layer
The QoS policy provisioning on the EML layer provides NE management function for
the policy management point of the network domain. A domain refers to a network
section that contains devices used to implement logic-related functions. Among
network domains are the access network, the core network and the transmission
network.
QoS policy provisioning on the EML layer provides the following functions:
To be the optional user interface for the policy maintenance of the EML layer
It is clear that the optional EML-level user interface for policy maintenance is necessary
on the small networks without network-level policy provisioning support system.
It should be noted that the EML-level policy base includes the policy used in this
domain, as well as the general network policy across domains.
3. Policy Decision Point (PDP) and Policy Enforcement Point (PEP)
The Policy Decision Point (PDP) is the point to determine the policy of the policy
enforcement point under the networks control. So, the PEP is a function in the network
node, while the PDP may be an independent functional entity that resides in a
standalone policy server (like the application server). The PDP will make decisions
according to the policy information in the policy base.
The Policy Enforcement Point (PEP) is the functional part of the network element that
implements the policies defined in the policy management system. It includes the
following functions:
At the beginning, the PED will request the PED of its parent node to download all the
policy data necessary for the operation.
2006-12-30
HUAWEI Confidential
Page8-17, Total20
4. QoS monitoring
In the 2.5G/3G network, the QoS monitoring functionality is intended to collect/process
such data as performance statistics, utilization data and QoS-related faults. For
end-to-end QoS monitoring, the QoS monitoring process should be included in the NE,
the network element management layer and the network management layer. Alarms
and performance data are collected at the NE layer, while the convergence, reporting
and analysis of alarm data and performance data are performed at the network element
management layer and the network management layer.
The process of QoS monitoring provides the following functions:
In fact, the above service features required in the 3G NMS may not be provided at a
specific service layer. To deliver a specific service feature, several layers or even
various networks must work together, share information and invoke services among
one another, to develop an integrated solution. The principle of 3G network
construction is to build an open, multi-layer and highly scalable network with an
integrated architecture.
The interface between the NE management layer and the network management
layer;
A reference model for common 3G NMS interfaces is shown as the figure below:
The NMS interface Itf-N may be the interface between NM and EM or between the NM
and the NE.
2006-12-30
HUAWEI Confidential
Page8-18, Total20
EM
NM
Itf-N
NE
Notification IRP
Basic CM IRP
Alarm IRP
Performance IRP
Figure 8-6 Network Managing NEs through the Equipment Management Layer
NM
NE
Itf-N
Notification IRP
Basic CM IRP
Alarm IRP
Performance IRP
As NM equipment of EML layer, iManager M2000 provides interfaces with the NE and
the upper NMS. The interface with the NE may be called southern interface, which is
usually an internal MML interface. The interface with the upper NMS may be called
northern interface, which is usually a standard interface or an interface negotiated with
the upper NMS (the third-party NMS). Among the common NMS interfaces are the
CORBA interface and the core database interface.
HUAWEI Confidential
Page8-19, Total20
use the server object methodology, no matter whether the servers are located on the
same computer or accessed via a network. ORB captures and invokes, and then finds
out an object to deliver the request. Then, it transfers parameters and methods and
finally returns the result. When ORB is used, a protocol is defined using the application
interface, which is implemented by the Interface Definition Language (IDL).Customers
neither know where the object is nor what language is used for its implementation, nor
the OS and anything else irrelevant to the object interface.
2)
At present, the telecom NMS tends to embrace integrated technologies. As one of the
leading NMS technologies, TMN gives a good idea for the construction of integrated
NMS. However, TMN does not go into detail when it comes to how to construct a
management system and how to provide interoperability among the management
systems. Luckily, CORBA has now become a mature distributed object-oriented
technology. Given the open telecom market environment, CORBA is tailor-made for
fast service construction and the effective management of resources and services. In
the field of NMS, to integrate the TMN with the CORBA technology is the most ideal
solution up to date to building a comprehensive NMS.
Now, both the International Standardization Organization (ISO) and the International
and Regional standardization Organization have treated the CORBA interface as an
important interface in the filed of telecom NMS.ITU-T takes the CORBA interface as a
way to provide general Q interfaces. The interfaces defined by TMF are basically
CORBA interfaces. The 3G interfaces defined by 3GPP are mostly CORBA interfaces
together with CMIP interfaces. Thus, the CORBA interface may be considered a leader
in the field of telecom NMS.
2. Core Database Interface (Core DB)
The Core Database Interface means that the visited party (like M2000 system) makes
known the structure and fields of related database in the system, allowing a third-party
vendor to visit and access the database directly.
Such interface mode is widely applied to interconnection with the upper NMS.
Third-party vendors usually develop application programs for access according to the
open database. Generally, write operation is not allowed to. The method features fast
interconnection and easy interface negotiation. Its disadvantage is the security problem
with the released undertaking high risks.
Before the CORBA interface standard is fully operational, open core database is also
common for interconnection with the upper NMS.
2006-12-30
HUAWEI Confidential
Page8-20, Total20
2014-10-28
HUAWEI Confidential
Page9-1, Total6
Server
MSC/MSC
MSC/
Internal interface
LAN
FTP/FTAM transmission
protocol
Heartbeat
network cable
Highly-reliable
system design Active server
Disk array
Standby ROUTER
server
IP network
BAU
Large-capacity
storage capability
Billing center
3
Saving original bills: After receiving the bill packets from the host, unpacking and
validating the packets, BAU saves the received original bills in hard disk, then
sends confirmation message to the host and makes the corresponding log record,
and finally carries out sorting and format conversion for the original bills.
Sorting bills: It means classifying bills according to a domain, to process them in
different flows and save them in different physical paths. All data domains in bills
can be used as the criterion for sorting.
Bill format conversion: The format conversion on BAU involves choosing bill
domain, changing the two-digit chronology into four-digit chronology, and
converting into specified text format.
Saving final bill: After sorting and format conversion on the original bills, BAU
saves the final bills in different directories according to their classification.
Billing center: Collecting and processing final CDRs, and generating final subscriber
bills based on tariffs.
2014-10-28
HUAWEI Confidential
Page9-2, Total6
Mobile calling bill: A bill generated when a local mobile subscriber initiates a call.
Mobile called bill: A bill generated when a local mobile subscriber is called.
Roaming bill: A bill generated when a subscriber of another office calls a local
subscriber.
Gateway office outgoing bill: A bill generated when a local subscriber calls a
subscriber of another network.
Tandem bill: A bill generated when the caller and called are not local subscribers
and this office is a TMSC.
Substituting bill: When a non-prepaid subscriber calls prepaid subscriber and it is
an OVERLAY networking, SSP will replace the originating MSC to generate this
bill to charge the non-prepaid calling subscriber.
Forwarding bill: A bill generated when a local subscriber is called and the call is
forwarded.
Call attempt bill: A bill generated when a call is not successful.
SM bill: A bill generated when an SM is originated/terminated.
Special service bill: A bill generated when special service call or special service
emergency call is involved.
2. Bill format
The bill format that MSC/MSC SERVER BAU provides for billing center complies with
Mobile Phone Billing Standard Pre-processing Bill Format. BAU can provide billing
center with bills in binary or text format as required.
A bill mainly consists of the following information:
2014-10-28
HUAWEI Confidential
Page9-3, Total6
Data Network
(Internet)
Inter-PLMN
Network
Gp
Gi
PS Domain
GGSN
G-CDR
CDR
Ga
Gn
CDR
CGF
SCF
Ga
CAP
CDR
M-CDR
S-CDR
S-SMO-CDR
S-SMT-CDR
SGSN
IuPS
Gb
RNS
BSS
BSC
BTS
Billing
System
RNC
BTS
Node B
Um
Node B
Uu
MS
Billing System (billing center) : Processing billing data and generating final bill.
Note: In Ga interface, the billing data is called CDR. CDR that is Call Detail Record.
2014-10-28
HUAWEI Confidential
Page9-4, Total6
As for the same PDP course, there are 2 types of CDRs generated, S-CDR and G-CDR.
Billing center usually calculates the final charge according to G-CDR, while S-CDR is
mainly used for statistics.
CDR generated in SGSN and GGSN mainly records the following information:
Because in the bill finally sent to subscriber, there is only one bill in one PDP context, all
partial CDRs in one PDP context must be integrated. Integration of partial CDRs is
carried out in 2 steps: The integration in the first step is carried out by CGF. This can
reduce the requirement of bandwidth between CGF and billing center and alleviate the
processing operation of billing center. For this reason or that, the integration in this step
may be incomplete. The second step is carried out by billing center, where those CDRs
that are not integrated completely in CGF will be integrated, resulting in final CDRs.
As for each PDP context, GGSN generates one exclusive C-ID. According to
C-ID+GGSN address, it is possible to know whether two partial CDRs belong to the
same PDP context.
As for G-CDR, all partial CDRs with the same C-ID+GGSN address must be integrated.
As for S-CDR, all partial CDRs with the same C-ID+GGSN address and +SGSN
address must be integrated.
9.2.3 CGF
CGF offers a mechanism to send the billing information generated by GGSN and
SGSN to designated billing center. CGF is an abstract functional concept, and CG is a
2014-10-28
HUAWEI Confidential
Page9-5, Total6
In addition, to reduce the transmission amount between CGF and billing center, CGF
should provide some integration function of partial CDRs to minimize the amount of
CDRs transmitted to billing center, thus lightening the bandwidth requirement for the
billing center.
CGF must offer high degree of reliability and redundancy. One GSN should be
corresponding to multiple CGFs in different levels of priority. When CGF in higher
priority can not process the communication with GSN, GSN will redirect it to CGF in
lower priority.
GTP'
UDP
UDP
IP
IP
L2
L2
L1
L1
Ga
GSN/CGF
CGF
2014-10-28
HUAWEI Confidential
Page9-6, Total6
3 GPP R4
3 GPP R99
The core network
inherits the network
system of GSM/GPRS
and uses the TDM
networking mode.
2000/03
The protocol is
further improved with
WLAN in it.
Function-finalized
time point
2001/03
2002/03
Under planning
Compared with GSM and GPRS networks, the most significant change of the WCDMA
system is the change of the radio network. In the WCDMA network, the Radio Access
Network (RAN) is used to replace the Base Station Subsystem (BSS).
2014-10-28
HUAWEI Confidential
Page10-1, Total26
The WCDMA core network in the R99 version can be regarded as a combination of
GSM and GPRS core networks in terms of networking, namely, the R99 core network is
classified into the Circuit Switched (CS) domain and the Packet Switched (PS) domain.
The architectures of the CS domain and the GSM core network are basically the same,
so are the architectures of the PS domain and the GPRS core network.
In contrast to the R99 version, the biggest change of the R4 core network is that the
network element function of MSC in the CS domain of the R99 core network is fulfilled
by the MSC Server and MGW in the R4 version, where the MSC Server processes the
signaling while the MGW processes the voice. There is no change in PS domain. For
details, refer to the architecture description in Chapter 3.
The core network using the R4 protocol has two networking modes: TDM and IP. When
the TDM mode is adopted, the R4 network planning and construction are identical with
that of R99 to a large degree. For example, in constructing tandem and signaling
networks, many considerations are just the same. When the IP mode is adopted, the
R4 network planning and construction are largely different from that of R99.
In contrast to the R4 version, an IMS (IP Multimedia Subsystem) domain is added in the
R5 core network, together with the corresponding equipment and interfaces, but there
is nearly no change in the network structure of CS and PS domains. Meanwhile, some
equipment functions are upgraded due to the enhancement of the network functions.
Alternative
Access
Network
Legacy mobile
signaling
Network
Applications &
Services *)
SCP
Mh
SGSN
GGSN
Mw
Ms
CAP
Gn
Other PLMN
Gp
CSCF
Um
Iu-ps'
TE
Gi
MGCF
T-SGW *)
Mc
GGSN
Gi
Gn
Iu
UTRAN
MT
R
Gi
Gc
SGSN
Iu
Mg
MRF
Gf
ERAN
MT
R
Mr
Gi
EIR
TE
Mm
Cx
HSS *)
Gr
Multimedia
IP Networks
CSCF
R-SGW
MGW
MGW
Uu
Iu 2
Mc
Mc
Nc
MSC server
Iu = Iu(RANAP)
PSTN/
Legacy/External
Nb
GMSC server
T-SGW *)
MAP
MAP
Applications
& Services *)
Signalling Interface
Signalling and Data Transfer Interface
Mh
HSS *)
R-SGW *)
*) those elements are duplicated for figure
layout purpose only, they belong to the same
logical element in the reference model
HUAWEI Confidential
Page10-2, Total26
The IMS domain is overlaid with the original PS/CS domain. It is used to control the
subscribers services. Subscribers can use all kinds of access techniques of the PS/CS
domain to access the IMS domain. In the future, new services based on the 3GPP R5
IMS domain will have nothing to do with the access techniques that subscribers adopt.
At that time, no matter what technique is adopted, the service needs to be developed
only once by the service developers.
The IMS domain adopts SIP as the basic session protocol. As the SIP is used to unify
the session model of voice/data services, the IMS domain provides more flexible and
simple support to multimedia services.
It also provides abundant service development interfaces. Operators can even provide
open session messages to the trusted service providers. Therefore, the services will
become even more open and flexible.
The upgraded MSC should support access of WCDMA and GSM radio network
equipment at the same time.
The MSC should support the lu interface based on ATM and the A interface based
on TDM.
2014-10-28
Page10-3, Total26
Cause the decrease of the existing network capacity, since 3G services are even
more complex and demand better processing capability.
Require high costs of upgrading and large investment. The 3G MSC adopts the
highly-advanced technical platform with large volume and high integration. Its
construction cost is lower than that of the 2G MSC; therefore, it would be not
worthwhile to upgrade the small-capacity 2G MSC.
The upgrading of the original charging system will have a big impact on the
network operation. The interworking and compatibility of multiple manufacturers
and nationwide roaming need to be verified.
This solution will give a full-scale evaluation to the problems such as the impact on the
stability of the existing network, the continuity of service capabilities, service
processing capacity, capacity, level of integration and whether the seamless transition
of GSM-R99-R4-R5-R6 is available after the upgrading. It is hard to know whether the
traditional architecture of 2G switches meets the above requirements, therefore, it is
also impossible to know the investment utilization rate of the original GSM equipment.
Solution 2: Establishing a new WCDMA network
This solution is to establish a new 3G MSC and a new 3G RAN based on the original
GSM network. The GSM and WCDMA networks will coexist in a certain period of time
with service interoperability and the WCDMA network will gradually replace the GSM
network.
Requirements for the core network equipment:
Establish a new WCDMA RAN and a new MSC to support CAMEL2, 3 IN service
and the access of 2G/3G networks simultaneously.
The existing SGSN and GGSN have relatively small traffic and can be upgrade
into 3G equipment. They should be compatible with GPRS access and
applications and support CAMEL3 IN services.
2014-10-28
HUAWEI Confidential
Page10-4, Total26
For the WCDMA HLR, both solutions (upgrading the old one and building a new
one) are available. As there are few HLRs, the upgrading is quite easy.
The backbone and core networks of TMSC and GMSC should be shared. GMSC
upgrading can be disregarded at the initial stage but later they may support 3G
MAP and CAP protocols and the trigger of 3G IN services.
The 2G MSC should stop capacity expansion and BSS should be connected to the
new 3G MSC.
As a new network, it is easier for the entire network to plan the resources and
configurations uniformly in order to have a clear network architecture.
With large capacity and less offices, it can simplify the network architecture to
facilitate centralized maintenance and management.
If the MSC NE of the R99 network has already taken into account the idea of
processing the signaling and voice separately (that is, the MSC based on the design
philosophy of separating bearer from control is adopted to build the R99 network), the
evolution will be very easy no matter upgrading from R99 to the R4 of TDM networking,
or even to the R4 of IP networking and only the equipment needs to be upgraded.
Requirements:
The original R99 should be capable of separating bearer from control to facilitate
the transition to the R4 architecture.
The upgraded equipment should support all the signaling interfaces of the R4
network.
HUAWEI Confidential
Page10-5, Total26
Advantages: It is easy to upgrade the network. You need only upgrade the original
equipment instead of purchasing any MSC Server or MGW. It is also easy to
upgrade the ATM/IP-based network. The most important thing is that it brings very
big flexibility to the construction and planning of the network.
Disadvantages: The R99 network at the initial stage should meet higher
requirements. The R99 network upgraded directly from the GSM network probably
will not meet these requirements. In this regard, you have to establish a new MSC
Server and MGW.
2)
If the MSC of the R99 network fails to take into account the idea of processing the
signaling and voice separately at the later stage (or if this R99 network is upgraded
directly from the GSM network), probably the bearer and control modules cannot be
well separated. In that case, the evolution from R99 to R4 cannot be completed through
upgrading the MSC, or we can say it is not worthwhile. In this regard, we have to
purchase additional MSC Server and MGW.
Following is a comparison between the advantages and disadvantages of this solution:
Advantages: The new network has powerful functions and is capable of smooth
transition to the later all-IP networking as well as R5.
To summarize, it is a continuous evolution process from GSM to R99 and then from
R99 to R4 in terms of the whole version evolution. During the WCDMA network
construction at the earlier stage, if the solution to upgrading the GSM network to the
R99 network is adopted, you need rebuild the MSC Server and MGW NE in upgrading
from R99 to R4. However, if you establish new R99 network with the MSC that is able to
separate bearer from control, the cost at the initial stage may be higher than that of the
upgrade solution, but it is conducive to the later smooth transition to R4 and R5.
Therefore, the comprehensive investment efficiency of the solution for establishing a
new R4 network will be much higher.
3. Evolution from R4 to R5
In R5, an IMS domain is added. The logic block diagram of the IMS domain is shown in
Figure 10-3, where the Go interface is interconnected with the GGSN while the Mb
interface is used for the external network to access the IMS domain.
2014-10-28
HUAWEI Confidential
Page10-6, Total26
IP Multimedia Networks
Legacy mobile
signalling Networks
PSTN
Mb
Mb
PSTN
BGCF
CSCF
Mm
PSTN
Mk
Mk
Mw
Mj
IMMGW
BGCF
Mi
MGCF
Mr
Mb
MRFP
MRFC
PCF
Mb
Mb
HSS
P-CSCF
Gm
Go
SLF
Dx
Mw
Mp
Mb
Cx
CSCF
Mg
Mc
C, D,
Gc, Gr
UE
IM Subsystem
The functional and logic entities of the IMS include BGCF, CSCF, MGCF, IM-MGW,
MRFC, MRFP, HSS and SLF. Some logic entities can be evolved from the R4 function
entities while others must be added.
Therefore, it is better to establish new equipment of the IMS domain for evolution from
R4 to R5 and upgrade the functions of the equipment in the original CS and PS
domains.
HUAWEI Confidential
Page10-7, Total26
different protocols in the WCDMA network. Presented below is about the solution of
establishing a new WCDMA CS domain network.
The network resources of the current operators are abundant: TDM networks, IP
networks and ATM networks. The bearer used for networking is decided by the
condition of the specific bearer resources.
1. Solution 1: Building the CS network in the R99 protocol mode
When this solution is adopted, the original TDM transmission network can still be used
for transmission of the R99 CS domain. As for the gateway and toll tandem equipment,
you can upgrade the original GW or establish WCDMA equipment through stacking.
The advantages and disadvantages of the two modes are already given in the previous
chapter.
With the R99 construction solution, we can make the best of the resources such as
transmission resources, gateway office and tandem office, the good compatibility with
the original network equipment can be well guaranteed, and voice services can be
provided with good QoS. Therefore, this solution is an economical and quick method to
introduce the 3G systems.
2. Solution 2: Building the CS network in the R4 protocol mode
In building the CS domain through the R4 network which separates MGW from the
MSC Server, you can use ATM/IP in the internal core network for transmission and use
the GMSC for the conversion of voice codec as well as the conversion of ATM/IP to
TDM.
The advantages of building the network through R4 are given as follows:
It makes networking very flexible. You can configure the network capacity flexibly
through MGW according to the local traffic and conduct centralized management
and configuration through the MSC Server.
It helps evolve to the future packet-based network. It is also helpful to save the
bandwidth for transmission.
With Trfo technology, the voice quality is improved and the voice codec equipment
can be saved.
It is not easy to reuse the original PSTN equipment, because the ATM/IP
technology is also used in the transmission of the signaling and it is difficult to use
the original signaling network. We need the signaling gateway to interwork with
PSTN.
2014-10-28
HUAWEI Confidential
Page10-8, Total26
With the separate architecture, we need to take the interworking between the MSC
Server and MGW into consideration. However, the test of the compatibility may
lead to the delay of the network construction.
3. Solution 3: Building the R99 network through R4 (with bearer and control separated)
In building the CS domain through the MGW and MSC Server of R4, the MGW and
MSC SERVER are located in the same place when it comes to the construction; and
the MSC Server accesses the MGW via the LAN.Other characteristics are the same as
that of the R99 network. Therefore, solution 3 has the same advantages and
disadvantages as solution 1.
Compared with solution 1, the major advantage of solution 3 is that it facilitates the
transition to the R4 architecture as these facilities have been equipped with ATM/IP
interfaces and the signaling processing capability for the R4 networking. A gradual
transition is available through replacing boards or adding the corresponding MGW to
enable the transition from the R99 to the R4.
Huawei provides products based on the CS domain of all kinds of protocol versions,
including the MSC products based on R99 architecture and the R99 MSC products
based on the architecture of separate bearer and control as well as the MSC Server
and MGW products of R4. The versions used to build WCDMA networks vary with the
construction solution of the operators.
By using the above methods for hybrid networking according to the local
conditions.
Please note that if we use the existing IP network to build the backbone network, we
need VPN and firewall for security, while if we use ATM, the firewall is unnecessary.
Normally in the PS domain of the WCDMA system, we can use the PVC of ATM or IP
for bearing on the Gn interface.
2014-10-28
HUAWEI Confidential
Page10-9, Total26
As for the interconnection with external networks, the IP mode is always needed.
However, for the interconnection with the GPRS backbone network, a firewall
must be set.
SGSN should support the access of the original BSS and the new RAN at the
same time.
SGSN, GGSN and CG should support the relevant procedures and services of
GPRS and WCDMA.
Advantages:
It is not difficult for upgrading. You can save part of your investment.
The original equipment has been tested on the network, so it enjoys higher
stability as compared with the new equipment.
The existing packet network architecture can be maintained to keep the overall
stability of the existing network.
It has little impact on the facilities in the original equipment room. We need not
reconsider building any new equipment room or placing the facilities.
Disadvantages:
Service availability after the upgrading varies with the original GPRS platform.
2014-10-28
HUAWEI Confidential
Page10-10, Total26
In fact, the difficulty of implementing this solution and the upgrading smoothness
depend on the building ability of the GPRS network equipment. If the original GPRS NE
is developed on the basis of the GPRS protocol without considering the subsequent
transition to WCDMA, it will be very difficult to upgrade the GPRS NEs, especially to
upgrade it smoothly. You can do nothing but establish a new suite of WCDMA PS
domain equipment. On the contrary, if the original GPRS NEs have powerful functions
with good foresight and universal architecture, it can be upgraded smoothly and save a
lot of investment.
Solution 2: Establishing a new WCDMA packet network
If the original GPRS network cannot be upgraded smoothly, or it is not worthwhile to
upgrade it, the operators can choose to establish a new WCDMA packet network.
The new WCDMA network can coexist with the original GPRS network at the initial
stage, but it shall gradually switch the GPRS subscribers to the WCDMA packet
network.
The disadvantage of this solution is that investment is needed in building the new
equipment. It does not allow us to utilize the original equipment, and we still have to
consider building new equipment rooms and placing these equipment.
2014-10-28
HUAWEI Confidential
Page10-11, Total26
2014-10-28
HUAWEI Confidential
Page10-12, Total26
M2000 integrate the LMT system of each NE. It allows us to maintain all the NEs
through directly calling the LMT system of each NE on the topo.
M2000 provides centralized management for the entire network, including integrated
fault, integrated performance, and integrated configuration to pulse-diagnose the
running status of equipment in the entire network.
M2000
provides
comprehensive
security
management
mechanism.
The
maintenance of NEs can be verified by two-level authority, i.e., the user logs in to the
M2000 client as a M2000 user to operate and maintain the NEs after passing the
authentication of the BAM.
2014-10-28
HUAWEI Confidential
Page10-13, Total26
The M2000 system can also integrate some tools for the purpose of such as network
optimization, network planning and reporting to perform some special functions.
It provides the remote maintenance method based on a combination of dialing and
Internet to maintain all the NEs remotely.
With the M2000 system as a core, we can provide a mature O&M solution to the entire
WCDMA network, so as to meet the requirements of different users.
3. Application of NMS construction in 3G networks
In general, the NMS construction comes after the network construction. It mainly
connects all the products through computer networks for operation, maintenance and
management.
The above figure shows the construction of the O&M system in the WCDMA system
networks, including the access and management of the CS domain and PS domain
2014-10-28
HUAWEI Confidential
Page10-14, Total26
equipment on the CN side, and the centralized maintenance and management of the
RAN equipment.
From the above figure, we know that iManager M2000 follows the TCP/IP to access
and manage all the NEs. It accesses the OM unit of each NE directly, such as BAM.
The O&M network and each service network are isolated and use different IP
addresses and network segments.
The iManager M2000 connects with the upper-level NMS through the network, using
the agreed protocol such as CORBA and open database interfaces for communication.
High reliability of the equipment to ensure high security of the signaling network.
Supporting dual backup of the network without single point failure to ensure high
security of the signaling network.
Powerful processing capability to adapt to the expansion of network scale and the
growth of services.
Even load distribution to evenly plan the flow of load on the signaling network.
The load of the trunk signaling is light, and if each site has a direct signaling link, there
will be too many signaling links; therefore, in most regions the signaling link is available
only for the interconnection between the TMSC and the STP equipment, while the
interaction between the TMSC and other sites is completed via the STP.
Generally, the dual-net dual-plane networking mode is adopted for the signaling
network to ensure high security of the signaling network. STP equipment should have
powerful processing capability to adapt to the network scale expansion and the service
growth. It also should have low delay to ensure the service connection speed. In
addition, the signaling links in the 3G mobile networks need to be organized carefully to
avoid too many signaling transfer points. At present, the networking modes of the fixed
and mobile signaling networks are the same. A direct signaling link should be set
between two SPs with a large information volume, especially between the MSC/VLR
and the local HLR when the transmission condition permits. There are two SCCP
addressing modes: GT and DPC addressing modes. The GT addressing mode is
adopted for inter-province networks while the DPC + SSN addressing mode for
intra-province networks. In this way, the work amount of GT translation of the STP
equipment can be greatly reduced.
2)
2014-10-28
Difference between the mobile signaling network and the fixed signaling network
HUAWEI Confidential
Page10-15, Total26
The hierarchical signaling network is suitable for the fixed signaling network. At present,
for the fixed signaling network a pairs of independent HSTPs are generally set in the
provincial capital to form a dual-plane mesh network. For each of the local networks, a
pair of LSTPs are available to transfer the PSTN signaling and the intelligent network
information. An important application of the LSTP is to complete the inter-office
conversion from mesh signaling network to hierarchical signaling network, which
greatly reduces the amount of direct signaling links and improves the reliability.
However, the mobile network features high capacity of local SPs, few SP sites and
large signaling flow between local SPs, so it is better to adopt direct links between SPs,
and in that case the signaling link convergence functionality of STP is not applicable to
the mobile network, rather, the signaling networking of mesh topology is recommended
for the local mobile network.
If the STP network of PSTN directly serves as the mobile signaling network, it
functionally makes no difference except the following issues:
The mobile communication system use the GT addressing mode largely and the
processing of GT code is in the SCCP layer, so the STP network of PSTN need to
be upgraded if not support SCCP function.
The signaling of the local mobile network usually adopts direct links and the
signaling to other local networks should pass the STP. However, the LSTP of the
current PSTN is only used to transfer the signaling of the local network, thus all the
signaling information to the LSTP should be transferred from the HSTP, which
increases the load of the HSTP (that is, it has to transfer both the domestic
roaming signaling and the intra-area signaling).
There exist multiple intra-area signaling transfers, which causes time delay of the
connection and affects the QoS to some extent.
3)
Two networking solutions are available for the mobile signaling network:
Solution 1: The mobile equipment of each local network is only connected with the
LSTP, which is used to transfer the intra-province signaling and hand over the
inter-province signaling to the HSTP.
Advantages of solution 1 are simple structure and easy capacity expansion. Its
disadvantage is also obvious: The inter-province signaling passes LSTP and this
increases the load of the LSTP and the time-delay of inter-province roaming and call
signaling processing.
Solution 2: The mobile equipment of each local network is connected with both the
LSTP and the HSTP. The mobile equipment of the local networks recognize the
intra-province signaling and the inter-province signaling to forward the signaling to
different STPs for processing.
2014-10-28
HUAWEI Confidential
Page10-16, Total26
The advantage of solution 2 is that it reduces the load of LSTP and the signaling
processing delay. Its disadvantage is that the capacity expansion is not convenient.
With the increase of the network nodes, the utilization of the signaling links to the HSTP
will be inefficient to some extent.
To fully capitalize on the existing HSTP resources and create new LSTPs to transfer
the inter-province signaling, solution 1 with minimum changes may be adopted for
networking.
4)
At present, the SS7 network of the TDM-based mobile network aims to providing
transmission bandwidth and reliability for the signaling network and further improving
the signaling network management functions. From the perspective of network
development, the capability of 3G signaling networks is much greater than that of GSM.
That is, with the expansion of the signaling network capacity and scale, and the
improvement of the signaling network reliability, the signaling protocol needs to be
upgraded further, so as to enrich the services provided to the subscribers.
At present, the SS7 mobile signaling network generally adopts 64Kbit/s signaling links.
Restricted by the SS7 protocol, the maximum signaling bandwidth between the nodes
of the mobile signaling network is only 1024K (64K16), which cannot satisfy the
requirements for the signaling bandwidth between the MSC and the HLR. The mobile
signaling network needs to adopt 2Mbit/s high speed signaling links as soon as
possible to increase the bandwidth between the nodes.
To further improve the network reliability, the transmission paths of the signaling
network should be dispersed as much as possible and the signaling network
management functions should be enhanced.
2. R4 signaling network construction
In the 3G R4 stage, the bearer of call-independent signaling can only be the
TDM-based SS7. It may be upgraded to the optional IP-based SIGTRAN or still adopt
the TDM-based SS7. According to the 3GPP specifications, the SCCP/TCAP-based
MAP/CAP signaling must adopt the M3UA/SCTP SIGTRAN bearer mode, and M3UA
provides the upper SCCP with the primitive interface completely equal to the MTP3
protocol, so no matter the 3G R4 signaling bearer is TDM/SS7 or IP/SIGTAN, it is
required to construct a hierarchical private roaming signaling network with network
layer signaling transfer capability, that is, the STP network as shown in the following
figure:
2014-10-28
HUAWEI Confidential
Page10-17, Total26
Other PLMN
IP bearer network
If the hierarchical structure matches and the TMSC server processing delay is enough,
the IP STP equipment may be integrated with the TMSC server equipment physically,
so as to effectively reduce the networking investment of the operators.
HUAWEI Confidential
Page10-18, Total26
may also be accessed for this purpose, which is useful for the charging settlement and
the full utilization of EC functions.
The types of the numbers are the same, so such original equipment of PSTN as
the tandem exchange and the toll exchange may be still adopted by only adding
relevant data configurations.
Compared with the network numbering plan, its number length is shorter for the
convenience of dialing by fixed subscribers.
However, the following problems may occur in this kind of numbering plan:
After the separation of North Telecom and South Telecom, this plan may obtain
different number resources from different regions, or be different from the dialing
habits of subscribers. It is not certain whether subscribers can accept such a plan.
The situation of severe competitions among the operators in the China domestic
communication market comes into being. The operators build their independent
networks, which interconnect via gateway exchanges. The adoption of the PSTN
numbering plan will greatly increase the data configuration pressure of some gateway
exchanges, such as the international incoming calls or the international roaming.
With MAP routing analysis and call routing analysis, the adoption of the net numbering
plan is helpful for the network selection with simple data configurations. It is better to
adopt this numbering plan for the call among some international gateway exchanges or
some operators, while the PSTN numbering plan is useful to select the geographical
position of the call or MAP signaling routes.
2014-10-28
HUAWEI Confidential
Page10-19, Total26
2)
3)
Have echo cancellation function to reduce the echo resulting from the
two-wire/four-wire transformation between mobile calls and fixed calls with the
relevant echo canceller configured in the gateway exchange.
4)
Have the built-in SDH to provide the 155M interfaces for implementing the
centralized traffic, few office directions and large trunk groups in the gateway
exchange, so as to reduce the networking cost, the utilization area of equipment
room and the system power consumption.
5)
Have the ability to analyze the calling number of the incoming trunk.
6)
Support flexible networking: For the local network without LSTP or enough LSTP
capacity, the gateway exchange may be served also as LSTP; for the mobile
network providing abundant services, it is required to support 2M signaling or
multi-signaling point technology to satisfy the high capacity requirement of the
signaling links; For the exchange with over 4096 circuits in a single office direction,
the switching equipment must support multi-signaling point technologies.
7)
Have the SSP/IP function, the CAMEL and upgrading capabilities for the
convenience of CAP capability expansion according to the service requirements.
HUAWEI Confidential
Page10-20, Total26
For the operators that own fixed networks, the following solutions are available for the
construction of their mobile gateway exchange:
1)
Solution 1: The fixed gateway exchange is integrated with the mobile GMSC by
upgrading the fixed network gateway exchange
Operator B
Operator A
Gateway
exchange
Gateway
exchange
Gateway
exchange
Operator C
PSTN
Operator C
3G network
Figure 10-8 Position of the upgraded fixed network gateway exchange (fixed/3G integrated gateway
exchange)
The following functional upgrading should be carried out for the fixed gateway
exchange:
If only partial upgrading can be achieved for the current fixed gateway exchange, some
local networks should be set separately and some may be integrated. For the office that
can be upgraded, it is also necessary to check the current traffic load of the gateway
exchange. If the traffic load is heavy, the switch should be checked to find whether
capacity expansion can solve the load problem. For this reason, the following
requirements should be satisfied before carrying out the upgrading:
The current traffic load is heavy but it may be solved through capacity expansion.
2014-10-28
HUAWEI Confidential
Page10-21, Total26
the existing resources of the fixed gateway exchange are utilized to carry out
efficient networking, thus shortening the construction cycle and reducing the
construction cost.
Disadvantages of the solution:
It requires to upgrade the fixed gateway exchange, which may affect the existing
network.
Part of the gateway exchange cannot be upgraded, which makes the networking
structure unclear.
2)
Solution 2: Build a new 3G mobile gateway exchange for the fixed network
This solution is to build a new 3G mobile gateway exchange separated from the fixed
gateway exchange, as shown in the figure below:
Operator A
Gateway
exchange
Gateway
exchange
Operator C
PSTN
Operator B
Gateway
exchange
Gateway
exchange
Operator C
3G network
There is no change to the old gateway exchange, no risks from the upgrading, and
no impact on the existing fixed network from the traffic load.
The networking structure is clear, which is helpful for future network optimization
and upgrading.
The EC allocation and utilization is clear, which is helpful to reduce the EC costs.
At the early stage of construction, it causes the trunk waste; and compared with
the integrated gateway exchange solution, it increases the constructions costs
and operation costs of the office and its auxiliary equipment.
2014-10-28
HUAWEI Confidential
Page10-22, Total26
Although the integrated operators have fixed telephone networks, they treat their
mobile phone networks the same as those of other mobile operators with two GWs
passed, which increases the links of the call and affects the network quality.
HUAWEI Confidential
Page10-23, Total26
as the common call connection with only two switching timeslots occupied: One is
connected to the incoming E1 timeslot, and the other to the outgoing E1 timeslot shown
in the following figure. That is, the independent echo canceller realizes the global
sharing of echo cancellation resources by occupying more system resources than the
embedded echo canceller. In particular, the EC is usually configured on the GMSC
equipment with great capacity. The shared EC will greatly reduce the number of E1s
that can access the GMSC.
RNS
TC
TDM
NET
EC
TDM
PSTN
Occupation of the network resources when the independent echo canceller is adopted
ECP
RNS
TC
TDM
TDM
PSTN
NET
Occupation of the network resources when the embedded echo canceller is adopted
Although the embedded EC can save the switching resources, sometimes the ECs are
wasted. For example, the data services (including dial-up access and multimedia calls)
are converted with IWF equipment and need no EC to cancel echo any more. In such a
case, EC will not affect these services, but it is a waste of the EC processing resources.
The embedded EC is suitable for the GSM network, in which there are few such
services and little waste of EC resources.
In the other case, PSTN calls the mobile subscriber and then forwards the call to
another PSTN subscriber, thus forming an end-to-end PSTN-to-PSTN call and causing
a waste of the embedded EC resources.
The adoption of ECPOOL may cause a waste of EC resources, because the TUP
protocol and ISUP protocol on the network do not support the EC processing. In this
way, the GMSC with ECPOOL resources does not know whether the exchanges in the
call route have applied for EC. Incorrect judgment will cause excessive or insufficient
EC resources to be requested, thus lowering the communication quality.
2014-10-28
HUAWEI Confidential
Page10-24, Total26
Office
direction 1
Voice direction
PSTN
Data direction
Integrated GMSC
Office
direction
PSTN
Integrated GMSC
If the data or multimedia traffic is not large, then data services and voice services may
not be separated. In the current GSM network, they are usually not separated.
However, the 3G multimedia service is considered as a key service with wide
application, so it may be separated to some extent.
2014-10-28
HUAWEI Confidential
Page10-25, Total26
The advantage of this mode is that it may effectively reduce the alternative routes of the
mobile services. Its disadvantage is that it does no good to the fully play of the EC
function when the mobile network calls the toll fixed network.
2. Access to the remote network is recommended for the calls among operators (a
subscriber of the local network calls a subscriber of other networks)
In this mode, the toll service adopts its own toll network, thus achieving the maximum
benefits during internetwork settlement.
10.3.5 R4 Interworking
The 3G R4 network is characterized by the separation of the MSC server from the
MGW and the use of ATM/IP as the transmission bearer. Just like R99, the R4 network
needs the interworking of the bearer connections and the conversion of the user plane
media stream formats, as well as the echo control and the interworking of control layer
protocols. As to the service interworking mode, R99 and R4 are almost the same.
On the whole, the interaction between the 3G R4 core network and the PSTN is
completed via the ISUP signaling and trunk signaling. Just like the traditional core
network, 3G R4 should be configured with a dedicated gateway exchange to fulfill the
interworking requirements as described above, so as to simplify the internetwork
interactive connections and reduce the number of interactive points for the
convenience of internetwork settlement and interworking resources management.
Based on the architecture of separating the 3G R4 core network bearer from control, it
is clear that the GMSC server undertakes the signaling interworking in the application
layer of the control plane. The signaling bearer interworking is completed by the
independent signaling gateway SG equipment or GMSC server, while the interworking
function between the bearer connection and the multimedia layer depends on the
MGW equipment.
In the traditional mobile network and the PSTN interworking model, the interworking
between the signaling control plane and the bearer plane is implemented by the
centralized GMSC with large capacity. In the 3G R4 model where bearer is separate
from control, the same MSC server with large capacity may control several MGWs, so
the interworking may be more flexible according to the MGW capability and the
peripheral networking conditions, for instance, the independent gateway MSC server or
the integrated MSC server (that combines the local exchange and gateway exchange
functions) controls the interworking between the multiple local MGWs that provide TDM
interfaces and the local PSTN network.
2014-10-28
HUAWEI Confidential
Page10-26, Total26