UMTS - The Fundamentals
UMTS - The Fundamentals
UMTS - The Fundamentals
UMTS
The Fundamentals
B. WALKE R SEIDENBERG M. P. ALTHOFF
All of Communications Networks, Aachen University (RWTH), Germany
WILEY
First published under the title UMTS - Ein Kurs. Universal Mobile Telecommunications System. Copyright 2001 Schlembach Verlag, Weil der Stadt, Germany Copyright 2003 John Wiley ft Sons, Ltd, The Atrium, Southern Gate, Chichester, West Sussex, P019 8SQ, England Telephone International 01243 779777 (+44)1243779777
E-mail (for orders and customer service enquiries): [email protected] Visit our Home Page on www.wileyeurope.com or www.wiley.com All Rights Reserved. No part of this publication may be reproduced, stored in a retrieval system or transmitted in any form or by any means, electronic, mechanical, photocopying, recording, scanning or otherwise, except under the terms of the Copyright, Designs and Patents Act 1988 or under the terms of a licence issued by the Copyright Licensing Agency Ltd, 90 Tottenham Court Road, London W1T 4LP, UK, without the permission in writing of the Publisher. Requests to the Publisher should be addressed to the Permissions Department, John Wiley Et Sons Ltd, The Atrium, Southern Gate, Chichester, West Sussex, P019 8SQ, England, or e-mailed to [email protected], or faxed to (+44) 1243 770620. This publication is designed to provide accurate and authoritative information in regard to the subject matter covered. It is sold with on the understanding that the Publisher is not engaged in rendering professional services. If professional advice or other expert assistance is required, the services of a competent professional should be sought. Other Wiley Editorial Offices John Wiley ft Sons, Inc., 111 River Street. Hoboken, NJ 07030, USA Jossey-Bass, 989 Market Street, San Francisco, CA 94103-1741, USA Wiley-VCH Verlag GmbH, Boschstr. 12, D-69469 Weinheim, Germany John Wiley ft Sons Australia Ltd, 33 Park Road, Milton, Queensland 4064, Australia John Wiley ft Sons (Asia) Pte Ltd, 2 dementi Loop f02-01, Jin Xing Distripark. Singapore 129809 John Wiley ft Sons (Canada) Ltd, 22 Worcester Road, Etobicoke, Rexdale, Ontario, Canada M9W 1L1 Wiley also publishes its books in a variety of electronic formats. Some content that appears in print may not be available in electronic books. Library of Congress Cataloging-in-Publication Data Walke, Bernhard. UMTS : the fundamentals / B. Walke, P. Seidenberg, and M. P. Althoff. p. cm. Includes bibliographical references and index. ISBN 0-470-84557-0 (alk. paper) 1. Universal Mobile Telecommunications System, i. Seidenberg, P. (Peter) ii. Althoff, M. P. (Marc Peter) iii. Title. TK5103.4883.W35 2003 621.3845-dc21 2002193374 British Library Cataloguing in Publication Data A catalogue record for this book is available from the British Library ISBN 0-470-8455-7 Produced from PostScript files supplied by the author. Printed and bound in Great Britain by Antony Rowe Ltd, Chippenham, Wiltshire. This book is printed on acid-free paper responsibly manufactured from sustainable forestry in which at least two trees are planted for each one used for paper production.
Contents
Preface 1 Digital Data Transmission IX 1
Digital modulation QPSK modulation Spectral characteristics of modulated signals Noisy transmission First-generation mobile radio systems The cellular concept Frequency reuse and cluster formation Propagation attenuation Interference and co-channel interference Range, interference and capacity-limited systems Handover and location update From 2G to 3G The IMT-2000 family Standardisation of UMTS Timetable for the introduction of UMTS Release 99, Release 4 and Release 5 Frequency spectrum for UMTS Questions Basic system architecture Functional units in UMTS Types of switching Architecture of the access plane 4.4.1 Mobile Services Switching Centre (MSC) 4.4.2 Home Location Register (HLR) 4.4.3 Visitor Location Register (VLR) 4.4.4 Serving GPRS Support Node (SGSN) 4.4.5 Gateway GPRS Support Node (GGSN) 4.4.6 GPRS Register (GR)
1 2 4 7
11
11 12 13 15 16 18 21
23
23 28 33 37 38 42 45
47
47 48 50 53 54 55 55 56 56 56
VI
Contents 4.4.7 Radio Network Controller (RNC) 56 4.4.8 NodeB 60 4.4.9 User Equipment (UE) 61 Handover in UMTS 63 4.5.1 The role of RNC in a handover 64 4.5.2 Handover types in UMTS 66 Location management 68 Circuit-switched and packet-switched connections 71 Protocols in the fixed network 75 Protocols at the lu-interface 75 4.9.1 Radio Access Network Application Part (RANAP) . . . 76 4.9.2 Radio Network Subsystem Application Part (RNSAP) . 77 4.9.3 Protocol stack for circuit-switched services 79 4.9.4 Protocol stack for packet-switched services 80 Pure IP core network architecture 82 4.10.1 Session Initiation Protocol (SIP) 84 4.10.2 IP core network - pros and cons 86 Questions 89
91
4.10 4.11
5
5.1 5.2 5.3 5.4 5.5 5.6 5.7 5.8 5.9 5.10 5.11 5.12
6
The ISO/OSI reference model The UTRA protocol stack The physical layer The MAC layer The RLC layer The BMC layer The PDCP layer The RRC layer Transport channels Transport formats Logical channels Questions The UTRA radio interface Duplex procedures The frequency-division duplex technique The time-division duplex technique Multiple-access procedures Direct-sequence CDMA Spectral characteristics of CDMA signals Reception of CDMA signals Processing gain A CDMA transmission system Spreading codes
6.1 6.2 6.3 6.4 6.5 6.6 6.7 6.8 6.9 6.10 6.11
Ill Ill 112 113 114 118 119 120 123 125 126
Orthogonal spreading codes in UMTS Modulation in UMTS CDMA receivers The near-far effect Questions
7.1 The physical layer in the UTRA protocol stack 139 7.2 Mapping transport channels to physical channels 139 7.3 Multiple access in UMTS 141 7.3.1 Multiple access in FDD mode 142 7.3.2 Multiple access in TDD mode 143 7.3.3 Multiple access in the TDD mode low chip rate option . 145 7.4 Power control 146 7.4.1 Power control in FDD mode 146 7.4.2 Power control in TDD mode 149 7.5 Channel coding, multiplexing and interleaving 151 7.5.1 TDD mode and FDD uplink 151 7.5.2 FDD downlink 153 7.5.3 Summary 156 7.6 Mapping of 12.2 kbit/s voice transport channel 156 7.7 Questions 158
8 Physical Channels and Procedures at the Radio Interface 159
8.1 Physical channels in the UTRA protocol stack 8.2 Physical channels in FDD 8.2.1 Dedicated transmission on the FDD uplink 8.2.2 Dedicated transmission on the FDD downlink 8.2.3 Compressed mode 8.2.4 Random access procedure in FDD 8.2.5 Cell search procedure in FDD 8.3 Physical channels in TDD mode 8.4 Physical channels in TDD mode low chip rate option 8.5 Mapping of transport channels to physical channels 8.6 Questions
9 Cellular CDMA Networks
159 159 163 165 168 169 172 173 178 180 186
187
Interference Cell breathing Traffic capacity in cellular CDMA networks Soft handover . Questions
VIII 10 Service Architectures and Services in UMTS 10.1 Virtual Home Environment (VHE) 10.2 MExE 10.3 SIM Application Toolkit (SAT) 10.4 Open Service Architecture (OSA) 10.5 Services and mobile applications 10.6 The voice service in UMTS 10.7 Questions 11 The Next Generation of Mobile Radio Systems 11.1 Cordless, wireless and mobile radio systems 11.2 Asymmetric traffic in mobile radio systems 11.3 Spectrum issues 11.4 Mobile radio and television frequencies 11.5 Electromagnetic compatibility 11.6 UMTS traffic capacity 11.7 Developments with W-LANs 11.8 W-LANs in integrated radio networks 11.9 The wireless media system ll.lOMulti-hop and Ad-Hoc Communication 11.11 Conclusion Answers to questions List of UMTS Release 4 specifications Acronyms Index
Contents 201 201 206 208 209 211 216 217 219 220 225 226 229 233 234 237 243 246 254 257 261 279 293 303
Preface
UMTS is a so-called Third Generation (3G) mobile radio system and is seen as the successor to Second Generation (2G) systems such as GSM and to evolved 2G systems such as the General Packet Radio Service (GPRS). It has a completely different air interface that is based on Code Division Multiple Access (CDMA), whereas most of the 2G and evolved 2G systems in use in most parts of the world use Time Division Multiple Access (TDMA). The expert knowledge on the functioning and behaviour of 2G networks can only be of limited use in 3G systems. As a consequence, people working in UMTS development, marketing, operation and teaching have to update the knowledge to be able to fulfil their duties. The introduction of UMTS in the field as the next generation technology requires knowledge of its concepts, architecture, procedures and techniques as a prerequisite for all those involved in the introduction of UMTS in one way or another. This book presents the valuable experience gained by the authors from teaching university courses on UMTS graduate students and teaching continuing education courses to engineers and management personnel in industrial companies. The material contained is based on the authors' research work on UMTS and the implementation and traffic performance evaluation of the complete UMTS protocol stack [35]. In presenting the course in form of a book we are acceding to the requests of companies and professional teaching organizations to make the material available to the public. The material has not been selected with the intention of providing developers of UMTS with the detailed knowledge necessary to design and improve a real system but to enable those working with UMTS to be able to understand the relevant concepts and their impact on the roll-out, operation, usability and capabilities of the system. The comprehensive introduction to UMTS is aimed at teaching the basics, functions and ways of operation of UMTS to those working in development departments and to operators of UMTS in an easy-to-follow manner. Since it is planned to introduce two versions of UMTS, namely one frequency and one time division duplexing based system, both are covered here. To ease the study of the material and to allow for a common basis of understanding, we open the book with two chapters on the basic functioning of cellular mobile radio systems and digital transmission of information via radio channels. After that, chapters on the transmission technique and the protocols of the UMTS air interface follow. Later sections of the book are devoted UMTS: The Fundamentals B. Walke, P. Seidenberg, M. P. Althoff 2003 John Wiley & Sons, Ltd
Preface
to the system architecture, the various network elements and the protocols used in the UMTS fixed core network. The keys to the commercial success of UMTS are new services that are not available with the existing mobile radio systems. This is why we introduce future service architectures and services for UMTS that have already been experimented with in the GPRS. Further, we describe the development paths to evolved 3G systems and as well as discussing spectrum availability, we evaluate the suitability of Wireless Broadband Systems based on Local Area Networks (LAN) to supplement 3G mobile radio systems. UMTS: The Fundamentals is primarily aimed as a course book for self-study and as background material for course teaching. Beyond what is available from the textbook we offer additional teaching material that can be ordered using the URL http://www.umts-thefundamentals.com. Based on their knowledge of GSM, GPRS and UMTS, the authors have started a consulting company called P3 Solutions, which offers courses, consulting services and testing in the field of 2G and 3G (http://www.p3-solutions.com). Our warm thanks go to Ingo Forkel, PhD student at the chair for Communication Networks at Aachen University of Technology (RWTH) for his valuable input and his assistance in the completion of the book. The text has been gradually expanded from a first version published in German. Our thanks go also to Hedwig Jourdan von Schmoeger for the careful translation into English. Thanks are also due to Mark Hammond of Wiley & Sons for his excellent co-operation during the preparation of this book. Aachen, March 2003 Bernhard Walke, Peter Seidenberg, Marc Peter Althoff
Addresses:
Homepage for chair: http: //www. comnets. rwth-aachen. de Errata: http: //www. comnets. rwth-aachen. de/~mf n/errata. html E-Mail address for corrections: walkeQcomnets.rwth-aachen.de Address of chair: Communication Networks RWTH Aachen University of Technology D-52074 Aachen. Germanv
Figure 1.1: Digital modulation A message transmission system generally consists of a message source, a transmitter, a channel, a receiver and an information sink. Digital modulation is the modulation of messages represented by characters that takes place in the transmitter (see Figure 1.1). This means that by digital modulation a character sequence supplied by an information source is transformed so that it can be transmitted over a channel and be reconstructed again in the receiver. In UMTS: The Fundamentals B. Walke, P. Seidenberg, M. P. Althoff 2003 John Wiley & Sons, Ltd
Figure 1.2: QPSK modulation the case of mobile radio systems, a channel is the mobile radio channel with its typical characteristics, such as multipath propagation, time dispersion and Doppler distortion.
Figure 1.3: QPSK demodulator other sine oscillation, the phase of which now depends on the bit pair mapped in it. The carrier wave experiences a symbol-dependent phase shift as a result. Figure 1.2 shows the 4-level complex signal space constellation with an arrow representing an oscillation with a particular phase. The phase corresponds to the angle between the abscissa and the respective arrow. One can see, for example, that the symbol representing the two bits 00 is implemented with a 45 degree shift phase with regard to the reference phase. A look at only one branch of the modulator shows that each branch alone implements two-phase shift keying, with the phase of the fundamental wave of the two branches shifted against each other by 90 degrees. There are different ways in which QPSK-modulated signals can be received and the transmitted bit sequence recovered. A simple example is shown in Figure 1.3. The modulated signal is multiplied into two separate branches, once with a sine and once with a cosine signal. Both signals have the same frequency as the oscillation of the QPSK modulator and run cophasal with regard to the reference phase. This multiplication produces higher frequency parts that can be eliminated through a lowpass filter. The signal is then sampled in each branch, and the sampled values are used to reach a decision on the value of the transmitted bits. Finally, the two bit streams created this way are joined again into a serial bit stream.
For example, operating a light switch generates an abrupt change in the voltage signal on a circuit. Due to this abrupt change, a theoretically infinite broad spectrum is needed to transmit this signal. In fact, the usable frequency bandwidth of a power supply circuit for signal transmission is limited so that a measurement of the voltage at the end of the circuit shows that changes are slower rather than abrupt. The circuit then has the effect of a pulse former, the signal is changed when it is transmitted over the circuit. If this change is to be prevented, then only those signals that require a restricted frequency bandwidth should be transmitted. As already explained above, the transmission of a character stream requires at least a frequency bandwidth corresponding to the rate of the character stream. The required frequency bandwidth cannot be made arbitrarily small through pulse forming. Because bits can only have the values zero or one, the signal form specified by a bit sequence is rectangular. The signal increases and decreases abruptly, which results in an abrupt change to the phase of the carrier wave in the QPSK modulator. The aim is to reduce the frequency bandwidth needed to transmit such signals. Consequently, in the modulator the rectangular signal forms of the bit sequences are transformed into slow changing signal forms in so called pulse formers. This prevents an abrupt change to the phase of the modulated signal (see Figure 1.6).
Figure 1.6: Pulse forming in QPSK modulator A theoretically infinitely wide frequency spectrum is required for the transmission of rectangular signals. Only very few finite bandwidths are available for mobile radio telephone services. Therefore, the generated and formed pulses must have a theoretically infinite time spread. Signals that are not time-limited inevitably overlay each other. As Figure 1.7 shows, interference-free data transmission can also occur with such infinitely long signals if the signals have zero values at intervals of one symbol duration. In this case, only one signal contributes to the sample result at each sampling instant because all the others have a zero value there. It is clear from Figure 1.7 that the sampling instant for the represented signal form must be adhered to precisely if values from neighbouring symbols are to be avoided. Because such perfect synchronisation is practically impossible to achieve, signal forms are used that fade more quickly timewise and overshoot to a lesser degree. Since sampling at the wrong time means sampling the overshoots of the neighbouring signals this measure allows to tolerate errors in the sampling time without loosing much of the orthogonality of the signals. However, the quicker fading inevitably results in a widening of the signal spectrum.
For the bit transmission case described, which is noisy due to additive Gaussian noise, the probability density of the sampling values can be represented as shown in Figure 1.9. The sampling values for a transmitted "one" produce the value of a one, albeit coincidentally corrupted by the noise. In this case, the probability density therefore takes on the form of a Gaussian distribution with the medium value one. In the same way, the probability density for the sampling value for a transmitted zero produces a Gaussian distribution with the medium value zero. In the receiver the sampler is followed by a decision stage that decides on a transmitted one or a transmitted zero based on the sampling value. In the simplest case scenario, this includes comparing the sampling value with the value of a decision threshold. If the sampling value is higher, it is assumed that a one has been sent; otherwise the decision is that it was a zero. A transmission error occurs when either a one was sent but the sampling value is smaller than the decision threshold or, vice versa, if a zero was sent and the sampling value is higher than the decision threshold. Mathematically, the error probability for a non-recognised one corresponds to the area below the probability density for the sampling value of a sent one left of the decision threshold. The larger this area is, the greater the probability that a sent one is interpreted as a zero [17].
The distance between the two Gaussian distributions is proportional to the power of the received signal. This means that the greater the received signal strength, the smaller the chance of error frequency. The width of the Gaussian distribution is proportional to the noise power. This means that the greater the noise power, the higher is the error probability and vice versa. Thus, the error probability increases proportional to the noise power and decreases proportional to the signal power. One measurement of the quality of a message transmission, i.e., for the error frequency, is therefore the ratio of the received signal strength to the noise power, also referred to as S/N ratio. The greater this ratio, the smaller the probability of transmission error; thus achievable throughput is proportional to the S/N ratio. In network engeneering, the ratio between the received wanted carrier signal power and the sum of all received interference power is an indicator of the received signals quality. For the so-called carrier-to-interference ratio C/I applies the same as for the signal-to-noise ratio: the higher the wanted signal's power (carrier) and the lower the interference power the lower is the bit error probability, see Chapter 2. If data transmission is only noisy due to Gaussian noise, then the transmission capacity of such a channel is dependent on the frequency bandwidth and the signal-to-noise ratio. The formula by Shannon for the calculation of channel
10
capacity presented in Figure 1.10 shows that a lower S/N ratio can be permitted for a given capacity if there is an increase in the frequency bandwidth. Since noise power increases with the bandwidth when constant noise power density exists at the output of a channel, channel capacity is also limited for an infinitely wide frequency spectrum. If the signal-to-noise power ratio is very low, i.e. if the noise power is much greater than the signal power, the channel capacity is zero.
12
handsets could not be implemented and terminals had to be built into the boot of vehicles. It was a real luxury to be able to make a mobile phone call [3].
13
Figure 2.2: The cellular concept and longer operating times. On the other hand, the subscriber capacity of such a network, i.e. the maximum number of active users per area element, is considerably higher due to the reuse of frequency channels. All modern mobile radio systems are based on this approach.
14
The distance between two cells that are allocated the same frequency is called the reuse distance. The smaller the reuse distance, the closer the cell in which the frequency is reused. This cell is also called co-channel cell The closer co-channel cells are located to a cell, the more they will cause interference to communication in the cell. Network operators therefore have a considerable interest in making clusters as small as possible. The reason: the smaller the cluster is, the more frequencies are available per cell and the higher the capacity of the cell. On the other hand, interference increases as clusters become smaller and the quality deteriorates. Network operators therefore always have to find the right trade-off between capacity (clusters as small as possible) and quality (clusters as large as possible). In reality, base stations are not equally distributed and therefore cells have different sizes. Furthermore, the traffic is higher in some cells than in others; consequently, the same number of frequency channels is not selected for all cells but capacity is allocated depending on subscriber density and topology of the area.
16
17
to as the S/N ratio. It is normally also indicated in decibels (dB) because in this representation a division becomes a simple subtraction. The CIR is calculated as follows:
The value C in the equation represents the carrier power occurring in the receiver. For example, a typical value for C in Global System for Mobile Communications (GSM) is in an average coverage situation about -78dBm or converted as w 1.5 10~~8mW. This example illustrates that the received signal strengths in mobile radio networks of the second and third generations are very low and that receivers have to be appropriately sensitive. The / in the denominator of the equation is the total interference / that occurs in the receiver from other stations. If one considers the uplink (mobile station sends, base station receives), the sources of interference are mobile stations that are active in other cells and transmit from there. The radio waves transmitted there are also received as interference at base stations outside the cell (see Figure 2.5). On the downlink (base station transmits, mobile station receives) the sources of interference are other base stations that are also transmitting on the same frequency and the radio waves of which are being received by the considered mobile station. This shows that the CIR for the uplink of a connection can be different from the one for the downlink. The CIR is limited even if no sources of interference exist. The term N represents the thermal noise in the receiver that practically always exists. In GSM thermal noise is typically below -115 dBm and therefore negligible in our example. As a rule of thumb, receivers in GSM can receive with sufficient strength up to CIR from 8dB. If the CIR values are any lower for a longer time, the connection is cut off. The 8 dB approximately correspond to a factor 6 in the linear representation. This means that the carrier has to be received at six times the strength of the aggregate of the interference signals. The minimum values for the CIR are dependent on many factors, such as the type of receiver used, the modulation method, and the channel coding. The aggregate of the carrier signal of power C and the interference signal of power I arrive at the receiver. The higher the interference power, the more errors the receiver makes. So it is not the sum of C and / but the ratio between carrier and interference power that makes the difference, as already explained in Section 1.4. Therefore, the aggregate receive signal strength as indicated on the display by almost all 2G telephones used today is not necessarily a guarantee of interference-free reception.
18
19
Depending on the geometric constellation, the mobile and base stations can have a different CIR. Anyone who has used a mobile telephone will recognize the effect: one can hear the person on the other end, but one's own words are not reaching the partner. This situation is illustrated in Figure 2.7. Interference occurring at the base station is the reason why data transmitted by the mobile stations is not reaching the called party. In this example, the downlink could be totally free of interference. The third situation in which communication is not possible is when all resources (e.g., channels) in a cell are in use. In this case, a connection is possible from the CIR point of view. However, the connection is rejected because no unused channels are available (Figure 2.8). When a new connection is originating within a fully loaded cell, this connection is usually blocked. When this happens, the user usually makes another attempt to make the call a short time later. The typical dimensioning threshold of blocked calls tolerated in cellular networks is a 1-2% blocking probability. A less favourable situation is one in which active users from neighbouring cells move into the respective cell. If no radio resources are available in this cell, the call is maintained as long as possible in the old cell. The reason why this is possible is because cells partially overlap each other. If the mobile station continues operating in the interior of the respective cell and no channel
20
Figure 2.8: Capacity-limited systems is available for a handover, the connection will disconnect. This is called a dropped call. Because customers are more negatively affected by dropped calls than by blocked calls, network operators often reserve some channels in each cell for handover purposes. When GSM was introduced in 1992, network operators focused on metropolitan centres. No radio coverage was provided outside these areas. Because so few users were active, the system did not experience any capacity bottlenecks and interference also was minimal. These were clearly range-limited systems. Today, the GSM900 networks are often interference-limited. Although the networks provide good radio coverage, the high number of users create a high level of interference. Methods such as power control and frequency hopping can lower interference, thereby creating more capacity in a system. The GSM1800 systems are often allocated considerably larger frequency spectrums and thus a larger number of frequency channels. At the same time the user numbers for these newer networks is lower. This enables the network operators to implement large clusters in order to maximise the signalto-interference ratio and to minimise transmission errors. Interference in these networks is therefore not a capacity-limiting factor. The capacity limits are
21
not reached until all channels in a cell are occupied, i.e., in this case these networks are capacity-limited. The gateways between these boundaries are fluent and can also change.
22
Figure 2.10: Handover and location update Based on the system information transmitted by each base station, the mobile station detects the location area in which it is located. If it moves into a new location area, it registers with the network. The network in turn stores the new location of the user in a database so that incoming calls can be routed to the right cell or location area. Figure 2.10 shows both mechanisms, handover and location update. These two mechanisms were essential for making the implementation of second generation small-cell mobile radio networks possible. Cell changeover procedures in UMTS are of an even greater significance since the aim in UMTS networks is to make the average cell sizes even smaller.
24
Japan also developed its own standard: Personal Digital Cellular (PDC). PDC also uses TDM A technology (3 time slots, 25kHz channel bandwidth) and operates at 800MHz and 1500MHz. The modern mobile telephones are small, sophisticated and offer long operating times. In June 2000 over 50 million Japanese people were using PDC. PDC-P is an enhancement that enables packet-switched data transmission with PDC at a transfer rate of up to 28.8kbit/s. This technology is the basis for Japan's very successful i-Mode service, which offers access to Internet pages, emails and local information. Compared to other regions, Japan has a smaller distribution of Internet access than Europe or the US. Consequently, many subscribers use the service to call up information found elsewhere on the Internet. However, PDC had no success in expanding beyond the borders of Japan to other countries (see Figure 3.2). The i-Mode service, however, has been introduced in several European countries and is now competing against WAP Next Generation (WAP-NG) and MMS-based information services. Probably the best-known system is one that originates in Europe and the use of which has spread from there to all parts of the world. Global System for Mobile Communications (GSM) was designed in the late 1980s by the state-owned national telecommunication companies and harmonised for use throughout Europe. The first systems started operating at 900 MHz (GSM900) in the early 1990s. This was followed by systems operating at 1900MHz (GSM1900)
3.1 From2Gto3G
25
in America and 1800MHz (GSM1800) in other counties. GSM also employs TDMA technology and uses 8 time slots on a 200 kHz wide carrier frequency. GSM900 has a total of 124 frequency channels and GSM1800 even has 374. GSM is used by over 400 operators in more than 171 countries in Europe, Asia, Australia, North and South Africa, and America. The projection of the GSM Association is that approximately one billion subscribers will be using this technology by the end of 2003. These systems are currently competing for the mobile communication market. Each system incorporates its advantages and disadvantages, but one thing is common to all three: the systems were initially designed for narrowband speech telephony with bitrates between 5 and 15 kbit/s [24]. Now the emphasis is being shifted towards data services. Although the user numbers for wireless access to the Internet are still relatively low, this is an area where the next growth spurt is anticipated, especially considering that in some countries, more than 60% of the population are already using mobile telephones [33]. Even though multi-band and multi-mode devices are available, the different 2G systems are not compatible with one another, i.e., it is difficult and complicated to use different 2G systems worldwide. If one looks at the reasons for the success of GSM, the main one is the open standardisation that was responsible for its initial success. Many of the ideas
26
it incorporates show an incredible vision that has kept the system open for further enhancement and development. This has enabled GSM to adapt to new developments without becoming incompatible with existing products. Because of the early entry of GSM to Europe, there was also an early market for infrastructure and terminals. This resulted in cost reductions that in turn contributed towards GSM's rapid growth. Today, the technology is being produced in very high quantities and therefore is extremely cost-effective. Due to the wide distribution of GSM, the number of qualified personnel with experience in the set-up and operation of GSM networks has grown. Since its introduction to the market, GSM has continued to develop. The Half Rate Codec (HRC) increased capacity and the Enhanced Full Rate Codec (EFRC) improved voice quality considerably. Interference reduction methods, such as frequency hopping and power control, are being employed and with increasing traffic, network operators are introducing new hierarchical cell structures. The next segment attracting development will involve the evolution of data services. These factors will ensure that existing systems will not be switched off because of the new third generation systems (see Figure 3.3). The opposite is the case: the plan is that GSM, IS-95 and PDC will coexist with their successor systems
3.1 From 2G to 3G
27
for a long time. In Germany, all 2G licences have been assigned until 2009 and some even until 2016. Until 1995 the operation of GSM networks was concentrated on voice telephony. Use of the circuit-switched data service at 9.6kbit/s and the fax service did not catch on to any noticeable degree until about 1996. The data service was subsequently enhanced with High Speed Circuit Switched Data (HSCSD) that enabled channel coding to be adapted to the quality of the radio channel (9.6 kbit/s/time slot or 14.4 kbit/s/time slot) and permitted the bundling of several time slots. HSCSD is currently enabling data rates of up to 57.6kbit/s (4 time slots per each 14.4kbit/s). In Germany the service has been introduced by D2 Vodafone and E-Plus. The next step will be the introduction of packet switching at the radio interface. The General Packet Radio Service (GPRS) protocol dynamically allocates a physical channel (time slot) to various users so that they can alternately transmit data. This process benefits from the typical characteristics of data connection and allows the existence of terminals that are essentially permanently linked to the network. GPRS also continuously uses coding schemes to adapt channel coding to the quality of the radio channel (CS1: 9.05kbit/s, CS2: 13.4 kbit/s, CSS: 15.6kbit/s, CS4: 21.4kbit/s) and is able to use several time slots per connection. GPRS will allow a maximum of 171.2kbit/s (8 time slots with CS4) to be achieved; in practice typical values are currently slightly over 30kbit/s with 3 time slots per frame and CS2. All German network operators have introduced GPRS and, along with Wireless Application Protocol (WAP) over GPRS, are offering mobile Internet access over GPRS. Tariffs are normally based on volume but can also involve some time components. EDGE is currently being standardised as a development of GPRS. Along with the channel coding, Enhanced Data Rates for GSM Evolution (EDGE) can also switch the modulation schemes at the radio interface between Gaussian Mean Shift Keying (GMSK)(Standard GSM) and 8PSK. The 8PSK modulation takes 3 bits to form a modulation symbol (see Chapter 1). This capability enables the transmission of up to 59.2kbit/s with one time slot per time frame. Bearer services with a data rate of 384kbit/s are being planned for EDGE. This makes EDGE very suitable as a gateway or alternative to UMTS. However, it is still not certain whether vendors will be able to provide E)GEenabled infrastructure and terminals in sufficient numbers and whether there are network operators that want to introduce this technology. Since EDGE is closely related to GPRS, no problems are anticipated in this technology being mastered.
28
29
to them irrespective of the network they visit or which terminal they use. These applications will appear in the same way as usual in their home network. This concept of a Virtual Home Environment (VHE) is examined in detail in Chapter 10. After the catalogue of requirements was drawn up (Figure 3.6), there were 15 different proposals worldwide on how a system based on these requirements should look. Ten of them related to the terrestrial segment; the other five were satellite systems. The system proposals were tested and evaluated by the ITU and finally six different systems were incorporated into the International Mobile Telecommunications at 2000 MHz (IMT-2000) family. The six proposals for the terrestrial segment can be divided roughly into four categories (see Figure 3.7): W-CDMA systems: These include the Frequency Division Duplex (FDD) components of the UMTS standard in Europe and Japan as well as the US cdma2000. TD-CDMA: This group contains the Time Division Duplex (TDD) components of UMTS as well as the Chinese TD-SCDMA, which has now also been integrated into the UMTS-TDD mode. TDMA: As a further development of IS-136 and GSM, the UWC-136 system has been incorporated into the IMT-2000 family.
30
Figure 3.6: Characteristics IMT-2000 systems FDTDMA: The further development of the European cordless telephone standard Digital Enhanced Cordless Telecommunications (DECT) has also been adopted for applications with low mobility. Thus IMT-2000 is a whole range of different systems (Figure 3.7) that have been closely coordinated with one another during the course of standardisation for the purpose of facilitating the development of multi-mode terminals. These terminals should function in different IMT-2000 systems and should guarantee global access. The term UMTS auction has often been wrongly used in connection with the auction of third generation mobile radio licences in Europe. In fact, these are usually licences for the deployment and operation of UMTS/IMT-2000 compatible systems. This means that a network operator is not obliged to set up a UMTS network but certainly can select a different system from a range of IMT-2000 systems. The operator has to comply with some parameters of the regulatory authorities such as population coverage and spectrum issues, but otherwise has freedom of choice. This is especially true for the European Union, where EU law now avoids the narrowing of licences onto a single technology but rather encourages the competition between different standards. In other countries such as Switzerland, the operators are bound to the UMTS-standard for their 3G-licences.
31
Since the GSM advancement EDGE is also a member of the IMT-2000 family through the UWC-136 path, German operator could definitely operate an EDGE network instead of UMTS in the new spectrum. The delays with UMTS mentioned below and the potentially smaller number of base station locations required with EDGE are aspects that support a thorough check of the options available. Various migration scenarios to 3G systems exist based on the 2G systems introduced in the various regions of the world (see Figure 3.8): 1. TDMA (IS-136) has a large number of users in the USA and in other North and South American countries as well as in Asia. These users will mainly be utilising 3G services through UWC-136/EDGE. It is possible that en route packet-switched services through GPRS will also be introduced to offer higher data rates in the short term. 2. Packet-switched services based on GPRS are currently being introduced in a large number of GSM networks. To provide full-value 3G services, these operators can either develop the networks into full EDGE networks that work within the existing GSM spectrum or that use the new 3G spectrum. Still, the most probable path is that 2G-GSM networks will also be using WCDMA technology, thus UMTS, in the long term. The equipment vendors keep most of the migration paths open for the oper-
32
Figure 3.8: Possible migrations from 2G to 3G mobile radio systems ators, since some modern base stations can support all three standards. GSM, EDGE and also W-CDMA/UMTS. 3. Japan was a trailblazer in the standardisation and introduction of WCDMA. No 3G system other than UMTS is being planned in Japan. Currently, the number of subscribers in the so called FOMA is behind expectations, but data rates of up to 384kbit/s are available. 4. Networks already using N-CDMA based on IS-95 (cdmaOne) will be able to use higher data rates on the downlink (cdma2000-lX) as a first step. A later step is that these data rates will be increased even more and developed into cdma2000-3X. Although also UMTS is an alternative, the use of cdma2000 is more likely since cdma2000 is backward compatible with IS-95 and current 2G terminals can be re-used. Because individual network operators have already invested large sums in existing networks, system decisions always depend on given requirements. It is even probable that in some countries all three technologies will be in use at the same time by different operators.
33
34
The 3GPP interacts with political bodies such as the World Trade Organisation (WTO) and the European Commission. At the same time the requirements of the local regulatory authorities, in Germany the Regulierungsbehorde fur Telekommunikation und Post (RegTP), participate in the ongoing standardisation efforts, i.e. on issues such as spectrum coordination at country borders. 3G systems use many technologies that are already supported by their own standardisation groups. This includes the Internet technologies (IETF) and ATM (ATM Forum). The 3GPP also maintains contact with these groups. Finally, lobbyist groups from GSM and UMTS operators also influence the standardisation activities. Their interest is motivated by the commercial impact of technical decisions. For example, the UMTS Forum pursues the idea of large frequency blocks for the operators of UMTS networks because this could help reduce the investment needed in infrastructure. In the meantime the 3GPP is not only standardising UMTS but also has taken responsibility for the support of the GSM, GPRS and EDGE standards, which are used globally as well. Figure 3.10 shows the 3GPP structure as of autumn 2002. Within the 3GPP the Project Coordination Group (PCG) assigns existing tasks and resources to the five different Technical Specification Group (TSG). There the results of the various working groups (Working Group (WG)) are processed and adopted as Technical Specification (TS). The Technical Specification Group (TSG) Core Network (CN) deals with the fixed network infrastructure, i.e. it is focused on the protocols and the distribution of tasks between the different network nodes. The Technical Specification Group (TSG) SA designs the system architecture and the mechanisms that can be used to provide services in the network. Also security issues and the management of 3G networks as well as source coding are addressed. The Technical Specification Group (TSG) Radio Access Network (RAN) is in charge of the radio access network, i.e., it deals with the radio interfaces, the fixed network protocols between the elements of the radio access network and the protocol stack at the radio interface. The Technical Specification Group (TSG) T handles the aspects of terminals that require standardisation. For example, this includes the interfaces over which a terminal communicates with a SIM card or other external units. An important aspect of this TSG is the conformance testing, which designs the test suits for harmonised testing of 3G terminals and sets the minimum requirements a terminal must fulfil. The Technical Specification Group (TSG) GSM/EDGE Radio Access Network (GERAN) formally has taken over responsibility for the standardisation and maintenance of the GSM, GPRS and EDGE standards. Figure 3.11 shows the principal sequence of standardisation. The standardisation process of UMTS began with basic research [18]. Immediately after GSM was introduced, countries in the European Union researched technologies that seemed important for 3G systems. Within the framework of the Research.
35
Analysis, Communication, Evaluation (RACE)-l programme, the European Union (EU) promoted basic research on cellular concepts, radio propagation, handover, dynamic resource allocation, modulation, coding, channel management and fixed network architectures for future systems. The programme ran from 1989 to 1992. Based on the results of RACE-1, the RACE-2 programme followed from 19921995 focusing on the development of full-scale system concepts. This included a comparison of the CDMA and TDMA technologies by the Code Division Testbed (CODIT) and the Advanced TDMA (ATDMA) projects. Subsequently to RACE-2, the fourth framework programme Advanced Communications Technologies & Services (ACTS) designed radio interfaces and evaluated them in terms of their performance. The FRAMES Multiple Access (FMA) subprojects of this programme again saw a competition between TDMA (FMA1, broadband TDMA technique without a splitting algorithm) andCDMA (FMA2: broadband CDMA technique). Five candidates were evaluated at the end of the design phase. At the historic ETSI conference in January 1998 a decision was made on the system design ETSI would be submitting as an IMT-2000 candidate to the ITU. The ETSI members agreed on a compromise: The ETSI design was to have two modes, one based on the W-CDMA proposal and one based on the TD-CDMA design.
36
These two modes are reflected in the ETSI submission to the ITU and today are the two UMTS modes FDD and TDD (see Section 7.3). ETSI first standardised UMTS at the European level. The other international standards bodies, above all ARIB in Japan, simultaneously developed comparable standards. In December 1998 the various activities were bundled into the 3GPP to ensure coordination of the standardisation efforts. Modifications of certain parameters were also carried out in cooperation with other organisations to ease harmonisation between different ITU family members. For example, the initial chip rate for UMTS of 4.096 MChip/s was reduced to 3.84MChip/s to enable simpler and more cost-effective Application Specific Integrated Circuit (ASIC) designs usable both for UMTS and for cdma2000. The ultimate aim of all these standardisation activities is worldwide recognition of a set of standards with a high level of acceptance so that the vision of global mobile access can become a reality and in turn spawns a huge market for 3G services. The far-sighted decision of researchers and companies in Europe to start research for 3G immediately after the introduction of the first GSM systems is remarkable and allowed Europe to play a leading role in mobile communications for 2G and 3G.
37
38
announced that they could not find the additional money needed to deploy the network infrastructure for 3G. To ease the burden of the high licence fees, the Germany Regulierungsbehorde fur Telekommunikation und Post (RegTP) [Regulatory Body for Post and Telecommunications] gave the licensees permission to share the use of antenna sites (called site sharing) when building their networks - so long as they retain authority over their networks and services. This could reduce the number of sites needed considerably, at least in the lead-in phase of 3G. There is talk about related cost savings of 20 per cent and more. Parallel to these activities, the UMTS standard is undergoing further development. Whereas until now activities have focussed on the radio interface and the basic system architecture, efforts are now being concentrated more on the mechanisms required to provide sophisticated services (such as OS A. SIP, see Chapter 10). Some operators were planning to commence commercial operations in time for CeBIT 2002. However, it proved that neither terminals nor sufficient infrastructure was available by then so a network start of late 2002/early 2003 appears more realistic. The first terminals commercially available in Europe are expected to arrive throughout 2003. Because of the enormous development and licensing costs, the new technology must be introduced as quickly as possible. Due to the high level of complexity involved, it is not possible to anticipate all the technical problems that can occur, so vendors and network operators are constantly fighting delays in the tightly staggered timetables.
39
Figure 3.13: UMTS Standard, Release 99 capabilities of their fixed networks at the same time as they are building the new radio networks. The first terminals available will be based on R99 but they will not yet offer the expected high data speeds of 2Mbit/s, but will more likely offer 128kbit/s. Moreover, these data speeds are only achievable in special cases (see Sections 8.2.2 and 11.6). Announcements from terminal vendors indicate a talk time of about 2 hours and an increased size when compared with small 2G terminals. The reason for this is the larger display, but also the larger space needed for the battery due to the higher power consumption. Figure 3.14 presents the structure of the UMTS standard R99. The first column shows the categories into which the standard is divided. The next column has the familiar numbering of the GSM standard prior to Release 2000. The integration of the GSM standard into the domain of the 3GPP has also caused a change in the numbering: for Phase 2+, release 4, of the GSM standard, the old GSM numbers are increased by 40 before the comma, there are now three digits after the comma. Thus, the standard GSM 01.Ox now becomes GSM 41.00x. The UMTS standards correspond to those of the GSM standard but in each case are 20 numbers lower in the document numbering. The places after the commas are also three digits. So as of now there is only one series of
40
Figure 3.14: Overview of the structure of UMTS Standard, Release 99 documents. The series 21-35 deal with UMTS and the series 41-53 encompass the newer GSM standards. The version numbers 3.x.y of the document series describe R99. As it became evident that the successor version R2000 would not be completed on time in 2000, a decision was made in September of that year to change the numbering scheme and split R2000 into two parts: Release 4 (R4) and Release 5 (R5). Consideration is currently being given to renaming R99 as R3. R4 comprises the version numbers 4. x. y, and version numbers 5. x. y are being provided for R5. For June 2003, Release 6 of the 3G standards is planned. The further development of the standard is implemented in Releases 4. 5 and 6 (Figure 3.15). The following summary will give an impression of the architectural changes of the different releases. A more detailed and up-to-date summary is available on the website of 3GPP. In R4 the ATM connections in the fixed network are to support quality of service control, i.e., Quality of Service (QoS) control will not only be supported at the radio interface but also in the fixed network. In addition, execution environments such as SIM Application Toolkit (SAT) and Mobile Execution Environment (MExE) as well as the service architecture OSA will be developed to enable them to provide new services. Further support for Location Services is integrated and to improve speech quality, certain calls can be connected through network without speech transcoding.
41
Figure 3.15: Further development of UMTS Standard The Chinese proposal for IMT-2000, Time Division - Synchronised Code Division Multiple Access (TD-SCDMA), is integrated in R4 as a Low Chip rate Option (1.28 Mchips/s) in TDD mode. A totally new fixed network concept is being planned with R5: the previous architecture, which is similar to the GSM fixed network, could be replaced by a completely Internet Protocol (IP)-based fixed network. This architecture, discussed in Chapter 4, requires a full set of new protocols in the fixed network. Additionally, also IP-transport within the RAN is considered. Other evolutionary steps in all other segments of the standard are planned. The features of Release 6 are not fixed yet. Support of Multiple Input Multiple Output (MIMO) antenna systems can increase the radio channel capacity in rich scattering environments, i.e. in indoor environments. The algorithms for radio resource management across the areas controlled by a single radio network controller and between GSM and UMTS will be improved. The interworking between wireless LANs and UMTS as well as Hiperlan/2 and UMTS is addressed. On the service side, Multimedia Broadcast/Multicast Service (MBMS) and Digital Rights Management (DRM) are added. It should be noted, however, that it takes some time after the specifications of a given release are frozen, until network elements and terminals supporting the new features become available. Some features of Release 6 are still far ahead.
42
Figure 3.16: Frequency spectrum for 3G systems Because R4 and R5 will entail changes to systems architecture, in practice UMTS networks based on R99 (or R3) will coexist with systems based on R4 and R5. In addition to Inter-Network-Roaming (in which a user changes over to another UMTS network of the same type), it is therefore also necessary to offer Inter-System-Roaming (user changes to GSM [2G] or to another EVtT2000 system [3G]) and Inter-Release-Roaming (user changes to another UMTS network with a different version release).
43
In Europe, parts of the spectrum are already occupied by existing 2G systems. For example, 1880MHz to 1900MHz is the frequency band used for digital cordless telephones operating in accordance with the DECT standard. Directly below DECT operates the GSM1800 system. UMTS systems use a channel bandwidth of 5 MHz. A total of seven unpaired channels are available within the bands 1900MHz to 1920MHz and 2010MHz to 2025 MHz. This means that one 5 MHz channel has to implement the transmission direction mobile station-base station (uplink) as well as the opposite direction base station-mobile station (downlink) (see Section 6.4). In the range 1920MHz to 1980MHz 12 channels of paired spectrum are available, i.e., for each 5 MHz channel in this band, another channel between 2110MHz and 2170MHz exists. These bands are called paired bands (see Section 6.3). The paired satellite bands have not yet been allocated to a system or even operator. In the licence allocation, up to six licences were sold for systems operating in the paired bands. This means that each of the six licensees may use 10 MHz for the uplink between 1920MHz and 1980MHz as well as the 10 MHz in the corresponding downlink range between 2110MHz and 2170MHz. In addition to these frequencies, licences were issued for one of the seven unpaired 5 MHz blocks. Asymmetric Internet services are to be offered eventually in this additional spectrum. In certain areas, some of the unpaired blocks are also foreseen for unlicensed use with applications similar to cordless telephony. In Japan the 1900MHz to 1920MHz band is already occupied by Personal Handyphone Service (PHS), which means this frequency range is not available for 3G. In the US the spectrum is already being used by a variety of 2G systems, including GSM1900. Consequently, it will not be easy for the European or Japanese 3G systems to be operated in the US. No definitive allocation has yet been made although the government has instructed the regulatory authority to deal with this problem as quickly as possible. The 3G spectrum should be allocated by mid-2002, but is still delayed. Three bands are currently being discussed: 698 MHz to 960 MHz, 1710MHz to 1885MHz and 2500MHz to 2690MHz. As a result of the events of llth September 2001, relocation of the military and governmental systems using the spectrum between 1710-1770MHz and 2110-2170MHz could be delayed resulting in a further delay of the introduction of 3G into the US [1]. Figure 3.17 shows the existing allocation of spectrum for 2G systems as well as the allocation of terrestrial 3G systems in Europe. The plan is to use additional extended bands as of 2005. In this connection the UMTS Forum is discussing the advantages and disadvantages of existing candidates. The band that looks most probable at this point is the one from 2520MHz to 2670MHz. Although other systems are operating in this spectrum, it would be relativly easy to transfer them to other bands. This block of another 150 MHz would
44
Figure 3.17: Extended spectrum for 3G systems enable the implementation of most of the planned applications and is located close to a second candidate band (2700 MHz to 2900 MHz) that could also be used for 3G during a third stage (also see Chapter 11). Still, relocation of existing systems into another band is a difficult, costly and enduring task and might well take much longer to complete than until 2005. The various bodies at the same time are already contemplating making use of existing 2G spectrum for 3G systems. Thus 3GPP is already standardising UMTS for the operation in the bands previously reserved for GSM. Thought is also being given to the operation in television bands below 800 MHz. Studies undertaken by the chair for communication networks at Aachen University of Technology indicate that it may even be possible under certain conditions to operate narrowband 2G systems such as GSM together with broadband 3G systems such as UMTS in the same band. If this were the case, network operators could either also operate UMTS in their existing GSM band or, instead of UMTS, use GSM/EDGE technology in the new 3G bands. This could possibly result in a more cost-effective way to build and develop the networks.
3.7 Questions
45
3.7 Questions
3.1 3.2 3.3 3.4 3.5 3.6 3.7 3.8 3.9 Which second-generation systems are being used worldwide? Why is the i-Mode service in Japan more successful than WAP in Europe? List three reasons for the great success of GSM. Outline the development stages from GSM to UMTS. Comment on the following statement: "GSM will become obsolete as a result of UMTS." How long will the GSM licences run in Germany? List three requirements of IMT-2000 systems. List examples of IMT-2000 systems other than UMTS. Why will cdma2000 play a particularly important role in the USA?
3.10 The different versions of the standard are summarised in so-called releases. Which release will form the basis for the first commercial systems? What happens to the installed infrastructure when a change is made to a new release? 3.11 When is a commercial start for UMTS anticipated in Europe?
3.12 What are the risks you foresee that could affect the timetable for introducing UMTS? Name at least two. 3.13 3.14 Which frequency bands are being provided for UMTS in Europe? For which extension bands does the UMTS-Forum have a preference?
48
49
Figure 4.2: Division into domains All functions implemented in the home network of the user fall under the Home Network domain. These three domains are combined into the Core Network domain. Together with the Access Network domain they form the Infrastructure domain. Interfaces are defined between the domains: The Cu interface occurs between the USIM domain and the mobile equipment domain. The definition of this interface comprises the electrical and physical specifications as well as the protocol stack between the USIM card and the terminal. This guarantees that the USIM cards of different network operators can work together with all terminals. Between the terminal and the RAN is the Uu interface that is described at length in Chapters 6-8. The lu interface, described below, is located at the gateway from the access network domain to the serving network domain. The interfaces to the home network domain and the transit network domain are logical interfaces that will not be dealt with here. If one considers the communication processes between the individual network elements, it is possible to combine this communication and the participating partners into something called a stratum. The access stratum encompasses the terminal and the radio access network (RAN). The protocol stack at the Uu interface, which is described in Chap-
50
Figure 4.3: Functional division in UMTS ter 5, works within the access stratum. Above these protocols is the signalling between the USIM or the UE and the CN. This communication is merged together in the Non-Access-Stratum (NAS). There are other ways of combining p recesses (see Figure 4.3). For example, the exchange of keys for user authentication takes place within the home stratum. Unlike domains that are divided up, non-functional units are separated and bundled as communication partners together with the appropriate protocols.
51
Figure 4.4: Circuit switching any addressing information. The selection of channels is enough to provide unique identification of the receiver. This type of communication is familiar from voice telephony. User access to the Internet is also normally implemented through a modem connection over which the access node is dialled. This way of switching data between users is called circuit switching, or CS for short. Figure 4.4 shows circuit-switched transmission over a UMTS network. The UE communicates over a fixed line either with another voice user (top right) or is connected with another data terminal (bottom right). The initial telephone exchanges were exclusively dominated by circuit switching. It is easy to form a mental picture of how the operators at the exchange had to plug in a cable to set up a connection for transmission before a call could be made. Circuit switching is sufficient for most applications but has one disadvantage: if circuits are not used in the intervals, they remain blocked anyway for the entire duration of the connection. This reduces the capacity available to other users who could be transmitting data during the pauses. This disadvantage can be avoided through packet switching (or PS for short). A data stream is subdivided in the transmitter into small data packets. Each
52
Figure 4.5: Packet switching individual packet is provided with a destination address so that it can be transmitted individually through the intermediate stations. The major advantages of this switching technology are its robustness in the event of a failure of the individual network nodes and its favourable utilisation of existing transmission paths. When a node breaks down in a packet-switched network, the other network nodes, depending on the availability of appropriate protocols, can identify a different route for incoming packets and still maintain end-to-end transmission. Since individual users are no longer exclusively using the circuits, this is referred to as a statistical multiplexing of several connections. This type of transmission mainly functions with data transmission. The traffic volumes are typically bursty in character rather than steady. Phases in which there is an intensive use of a connection are offset by long pauses in which other users can use the gradually available resources for their own transmission needs. The best-known example of a packet-switched network is the Internet. The Internet was developed to remain largely intact even in the event of a massive failure of many network nodes. Transmission is over IP packets that carry both the transmitter and the destination addresses.
53
Figure 4.5 shows transmission over a packet-switched UMTS network. The mobile station is transmitting individual data packets that are sent along with other packets over the circuits in the fixed network. Ultimately they either reach a computer that is also transmitting on a packet-switched basis (bottom right) or the data is converted into a circuit-switched connection in an intermediate node (top right). A typical application would be the transmission of voice over an IP network (Voice over IP (VoIP)). Since the user being called possibly only has a normal telephone, the incoming voice packets have to be converted into the Pulse Code Modulation (PCM) representation normally used in telephone networks. One problem with packet switching is that jams can easily occur on the path from sender to receiver if too many data streams are being routed over a section at the same time. This effect is familiar from the Internet: the average transmission speed falls during the day when large numbers of users are surfing on the WWW. This is especially critical for applications that have a sensitive reaction to variable delays, e.g., audio and video transmission. The current Version 6 of the IP protocol (Internet Protocol Version 6 (IPv6)) introduces quality of service control that users can utilise to request a certain quality of service. This requires priority control on the network nodes. The data transmission techniques familiar from GSM, High Speed Circuit Switched Data (HSCSD) and General Packet Radio Service (GPRS) (see Chapter 3), are effective examples of the two types of switching. With HSCSD a channel or several channels are reserved for the entire duration of a connection, irrespective of whether data is being transmitted. In GPRS, on the other hand, the physical channel is already divided up between the various users at the radio interface. This means that a user can retain a constant connection with the network without incurring connection costs.
54
The RAN contains two types of nodes: the Radio Network Controller (RNC), which controls resource management in one or more base stations (Node B). Node B in turn supplies one or more radio cells. The interface between RNC and Node B is called the lut-interface. A new feature, and not available in this form with GSM, is the direct connection of RNCs over the Iur-interface. The UE is connected with Node B over the Uu-interface. The individual elements of a UMTS network have totally different tasks, which will be described below (Figure 4.7).
55
The Gateway Mobile Services Switching Centre (GMSC), which also offers interfaces to various external networks, e.g., the Integrated Services Digital Network (ISDN), is a special variant of an MSC. The MSC is the central element of the circuit-switched part of the CN.
56
information has to be interrogated in the central database, and this prevents considerable overloading of the latter. The interaction of HLR and VLR and the way data is stored are explained in detail in Section 4.7. Figure 4.8 presents the elements of the CN that are used for packet switching. These elements are described below.
57
Figure 4.8: Tasks of SGSN, GGSN and GR Figure 4.10 lists the tasks of an RNC. An RNC autonomously performs all tasks related to data transmission over the radio interface. These tasks are combined in the concept of Radio Resource Management (RRM). The RNC essentially is responsible for the following: 1. Call admission control: Unlike the situation in GSM, the transmission technology CDMA provides a large number of possible channels at the radio interface, although not all of them can be used at the same time. The reason is the problem of interference that increases as more channels are used (see Chapter 9). Consequently, the RNC must calculate the current traffic load for each individual cell. On the basis of this information, Call Admission Control (CAC) then decides whether the interference level after the channel requested is occupied is acceptable and, if necessary, rejects the call. 2. Radio resource management: The RNC manages the radio resources in all attached cells. In addition to planning channel use, this includes calculating interference and utilisation levels and priority control. 3. Radio bearer set-up and release: In UMTS the user data channel within the access stratum above the Radio Link Control (RLC) sublayer (see Chapter 5) is called the radio bearer. The RNC is responsible for setting up, maintaining and ultimately releasing radio bearers as required.
58
Figure 4.9: Tasks of RNC, Node B and UE The set-up of a radio bearer is comparable to the establishment of a logical data connection and does not indicate whether packet-switched or circuit-switched data is being transmitted over the radio bearer. 4. Code allocation: CDMA codes in UMTS are managed hi what is called a code tree (see Chapter 6). The RNC allocates part of this code tree to each mobile station and can also change the allocation during the course of a connection. 5. Power control: It is important for the efficient operation of a CDMA network that the transmitter power of all users is controlled. The actual fast control process takes place in Node B but the target control values are established in the RNC (see Section 7.4). Along with the measured interference values, information from other cells and hi some cases even beyond RNC boundaries are included in the control. 6. Packet scheduling: With packet-switched data transmission several mobile stations share the same resources at the radio interface. The RNC has the task of cyclically allocating transmission capacity to the individual stations, at the same time taking into account the negotiated quality of service. 7. Handover: Based on the measurement values supplied by Node B and UE, the RNC detects whether a different cell is better suited for a current
59
Figure 4.10: Tasks of RNC connection. If the RNC decides on a handover, it takes responsibility for the signalling with the new cell and informs the mobile station about the new channel. The different types of handover and the concepts of combining/splitting will be examined below. 8. SRNS relocation: It is possible that a mobile station will move out of the area managed by the RNC. In this case, another RNC has to assume control for the connection (see Section 4.5.1). 9. Encryption: Data arriving from the fixed network for transmission over the radio interface is encrypted in the RNC. 10. Protocol conversion: The RNC must handle the communication between CN, neighbouring RNCs and connected Node Bs. 11. ATM switching: The communication paths between Node Bs and RNC, between RNCs and between the RNC and the CN are normally based on ATM routes. The RNC must be able to switch and connect ATM connections to enable communication between the various nodes. 12. O&rM: This abbreviation encompasses the administrative functions involved in network management. Available data must be transmitted over defined interfaces to an Operations and Maintenance Centre (OMC).
60
4.4.8
Node B
The name Node B is an unfortunate choice: During standardisation this name was planned as a temporary solution until the introduction of a more appropriate term. However, the name stuck nevertheless during the course of the standardisation activities and therefore the base station in UMTS is called Node B. This node corresponds to the Base Transceiver Station (BTS) familiar from GSM (see Figure 4.11). The tasks directly connected to the radio interface are handled in the BTS. The inputs comes from the RNC. A Node B can manage one or several cells and is connected with the RNC over the lut,interface. Node B is the counterpart of BTS in GSM. It supplies one or several cells. Along with the antenna system, Node B includes a CDMA receiver that converts the signals of the radio interface into a data stream and then forwards it to the RNC over the lub-interface. In the opposite direction the CDMA transmitter prepares incoming data for transport over the radio interface and routes it to the power amplifier. There are three types of Node B corresponding to the two UTRA modes: UTRA-FDD Node B, UTRA-TDD Node B and Dual-mode Node B. which can use both UTRA modes simultaneously.
61
Currently, the Node B is linked over an ATM link to the RNC. Due to the possible large distance between Node B and RNC and the length of the processing times, certain particularly time-critical tasks cannot be stored in the RNC: this includes Inner Loop Power Control that in a CDMA network ensures that all users receive at the same signal strength. The RNC has to have as exact a picture as possible of the current situation in a cell so that it can make sensible decisions on handover, power control and call admission control. Consequently, mobile stations and Node B periodically carry out measurements of the connection quality and interference levels and transmit the results to the RNC. In the special case of softer handover, the splitting and combining of data streams of the various sectors are also already handled in Node B. It is estimated that approximately 100,000 antenna sites are needed for a national UMTS network in Germany. This number will be reduced if antenna systems are shared by different operators. The project stages extend from macro-Node B, which supplies large cells through the use of high antenna masts, to a smaller micro-Node B, which broadcasts individual traffic movements below roof edges, and a pico-Node B, which is responsible for the interior supply to buildings. The smallest pico-Node Bs should achieve a volume of below two litres. Figure 4.11 shows a Node B that is experimentally installed on a roof.
62
This long list of tasks handled in a UE is accompanied by the users' request for larger displays that also support the decoding of video data. It is also planned that a camera with an accompanying MPEG codec will be integrated into the equipment. Since a terminal should also enable the playing of games, an efficient processor with substantial memory is to be used. The most important thing, however, is that the equipment should remain small and easy to handle. What is obvious is that these requirements are in partial conflict with one another. Above all, the power requirements of the efficient components necessary could result in short operating times of the equipment. This is something customers who are used to the operating times of GSM that last several days will only accept to a point. Consequently, the initial UMTS terminals are expected, for example, to be integrated into a notebook computer because, first, a larger battery will be available and, second, customers are used to and accept lower operating times of several hours when working with computers. The complexity of UE is very high and it will take a masterstroke on the part of the developers involved to accommodate all the requirements and still develop attractive terminals.
63
64
4 UMTS System Architecture data streams again and transfers the data to the CN. The soft handover gets its name from the fact that there is no fixed switchover point and instead a soft connection is transferred from one base station to the next one. The new base station initially only contributes very little to the transmission; however, the further the UE moves into the new cell, the more responsibility the new base station assumes. Finally, the connection to the old station is terminated and the mobile station leaves the soft handover state. This technique is also called macro-diversity and offers several advantages: a) The connection becomes more resistant to shadowing due to the reduced probability that, considering all supplying base stations, the mobile station will end up in shadowing. If an interference object cuts off a connection to a base station in a soft handover, there is the possibility the connection will function over the second station and the communication will not be cut off. b) When the minimum received power is calculated, a small reserve against fast fading through multipath propagation can be incorporated. Since the drop in received power through multipath propagation is almost static in the case of static transmitters and can amount to up to 30 dB, it is possible that a static mobile station will not be supplied adequately. Soft handover offers the option of transmitting data over the second Node B and thus maintaining the communication. c) Furthermore, a soft handover offers the possibility of reducing the near-far effect. This effect is described in Chapter 9. 3. Softer handover is a special version of soft handover in that transmission can also run in parallel over different sectors of the same Node B. The advantages mentioned in conjunction with soft handover also apply to softer handover, although the Node B can already be entrusted with the task of combining the two data streams and only transferring one data stream to the RNC.
The two methods of soft handover and softer handover along with their advantages for the operation of cellular CDMA networks are described in detail again in Chapter 9.
65
Figure 4.14: The role of RNC in a handover be aware of problems that occur in the RAN or take over any tasks that are directly connected to the radio interface. However, this would be necessary if the two RNCs were not able to communicate directly with one another over the Iur-interface. Let us play through the process using an example: The mobile station shown in Figure 4.14 is supplied by the left cell 1. The RNC shown on the left controls the connection and maintains it with the fixed network over the lu-interface. Consequently, this RNC is also called a Controlling RNC (CRNC). If the mobile station moves towards the right to the edge of cell 1, a soft handover occurs. The mobile station is supplied by two Node Bs (1 and 2). In this case, Node B 2 is controlled by a different RNC in which the CRNC is reserving radio resources (Radio Resource (RR)) for the mobile station. However, control over the connection remains with the RNC on the left. It remains the Serving RNC (SRNC), whereas the RNC on the right is controlled remotely over the Iur-interface with regard to this connection. It becomes the Drift RNC (DRNC). It is the task of the SRNC to handle the combining of the data that is transmitted from the mobile station on the uplink. The DRNC forwards the data unprocessed to the SRNC. On the downlink the SRNC sends a copy of the data arriving from the CN to the DRNC (splitting), which then forwards it over the attached Node Bs to the mobile station.
66
The role of Node B 1 gradually decreases as the mobile station moves more deeply into the supply area of Node B 2. Ultimately the connection over the old Node B can be terminated. Resources are now occupied in two RNCs although the connection could exclusively be handled by the RNC on the right. There is a technique in this case that is called SRNS relocation in the standard. The lu-reference point where data is transferred from RAN to CN is shifted from the left RNC to the right RNC. This is the only type of handover in UMTS that incorporates the CN into the handover process. The DRNC thus becomes the CRNC and now manages the connection on its own. (There is another scenario: if the Iur-interface is not implemented in a UMTS network, connections have to be hard-switched from one RNC to the other. The CN is also involved in this case. The connection to the network is briefly interrupted and then immediately set up with the new RAN.) The terms SRNC and DRNC relate to an individual connection. Thus, in regard to another connection, the right RNC can assume the task of the SRNC while the left RNC functions as DRNC.
67
1. The new RAN can occur in the area of a new MSC. In this case, the connection is hard-switched over the CN to the new Serving Radio Network Subsystem (SRNS). The CN does not support a soft handover in this case. 2. When a connection leaves a region supplied by UMTS, it is important that it can be operated over GSM networks if they exist. This capability is mandatory for achieving satisfactory customer acceptance, because especially during the development phase UMTS will mainly only be operated in small, regional islands. The reverse route of a handover from GSM to UMTS is less critical since wide-area GSM coverage already exists (Inter-System-Handover). 3. It is conceivable that different systems of the IMT-2000 family could border each other geographically. Consequently, handover between different 3G systems will be defined later so users can change seamlessly between networks (Inter-System-Handover). 4. Figure 3.16 in Chapter 3 shows that 30 MHz is reserved twice for satellite-supported components of UMTS. Although it is still not clear which technique will be used in these bands, there are plans for handover from terrestrial UMTS to satellite-supported UMTS(S-UMTS) (InterSegment-Handover) .
68
Figure 4.16: Handover types in UMTS Thus there are various handover types with totally different requirements for signalling at the radio interface in the RAN and the CNs (see Figures 4.16 and 4.17).
69
Figure 4.17: Handover types in UMTS soon as the mobile station makes contact in a cell, the communication only still needs to be carried out over this Node B. This shows that consideration has to be given to what is the optimal size of a location area: A very large location area ensures that users only seldom move beyond the boundary of the location area. This reduces the signalling needed for location updates. On the other hand, the number of cells in which users are paged during connection set-up is very high. Thus radio resources are needed in many cells although they are not used productively. These factors resulted in the need to define separate areas for circuit-switched and packet-switched services in location areas (Figure 4.18). The more often a new connection is established with a mobile station, the more difficult it is to balance the factor that the UE is unnecessarily being paged in some cells. In contrast to circuit-switched services, with packet-switched services users frequently receive short data packets. Consequently, an effort is needed to define small area sizes for packet-switched services, whereas large areas are sufficient for the comparatively seldom activated circuit-switched services (e.g., voice) (Figure 4.19).
70
The Routing Area (RA) concept has been introduced in connection with packet-switched data transmission in GPRS. The principle is the same as with location areas, the only difference being that routing areas are used for PS services. As soon as a mobile station leaves the area of a Routing Area, it executes a Routing Area Update with the SGSN. Thus the SGSN is able to locate a mobile station more accurately in the event of incoming packets. During an active data transmission the SGSN knows the position of the mobile station down to the level of the individual cell. After a certain period of inactivity a timer runs out, and the SGSN again has to page the mobile station in the entire routing area and commence with new data transmission. Figure 4.20 clarifies the division of the network into routing areas and location areas. The smallest unit considered here is the UTRAN Registration Area (URA). A URA consists of one or more UMTS cells that are combined in order to avoid a surplus of cell-changing procedures on the edge of cells. The routing area and location area boundaries do not overlap but a routing area is always completely surrounded by a location area. A routing area consists of one or more UTRAN Registration Area (URA) that in turn consists of one or more cells. As a result of this concept, there is a guarantee of optimal accuracy in the localisation in the network for each type of service. Location area and routing
71
Figure 4.19: Location management area are partly used congruently in existing GPRS networks, i.e., the areas are identical. This solely depends on the configuration by the network operator.
72
Figure 4.20: Localisation areas ing node determines the database (HLR) in which the user data is stored. The HLR knows which area of the network the customer is located in and sends a query for a roaming number to the VLR responsible for this area. The VLR responds with the appropriate number and the HLR supplies this number, indicating the destination switching node within the UMTS network responsible, to the GMSC. From there the call is routed to the destination switching node (called MSC in Figure 4.21). Through the attached VLR the MSC knows the RNC responsible for the current location area and requests that this RNC sets up a channel to the mobile station. The RNC pages the mobile station in its last known location area and sets up a connection to the mobile station over the Node B used by the mobile station when it responded to the page. As soon as the transmission link is established at the Uu-interface, end-to-end signalling takes place and the telephone begins to ring. The connection is switched through as soon as the user picks up the phone. The use of packet data services is a more complicated process. Figure 4.22 shows the section of the UMTS network that is responsible for packet-switched data transmission. The procedure is somewhat different: The user of the mobile station on the left-hand side of the illustration wants to exchange data with a computer on the Internet (far right). Before the mobile
73
Figure 4.21: Routing an incoming call station can access the Internet, it must activate what is called a Packet Data Protocol (PDF) context in the GGSN. A PDF context is a range of settings that defines which packet data networks a user may use for exchanging data. The list of permitted PDF contexts is stored in the HLR. For example, a possible context could be access to the Internet. Another context could be access to an in-house Intranet that is not open to all customers but only to a small group of associates. Each user can use several contexts and activate them simultaneously. When it wants to activate a PDF context, a mobile station establishes a connection over the RNC to the SGSN and sends a message that the user would like access to the Internet. The SGSN forwards the query to the responsible GGSN. A query to the HLR checks whether the user is authorised for access to the external data network. If the reply is positive, the GGSN activates the context and informs the mobile station accordingly. Through this process the mobile station is allocated a temporary IP address that allows it to be reached from outside the UMTS network. The activation of the context creates an IP tunnel. Incoming data packets from the Internet are sent to the tunnel by the GGSN and over the SGSN to the RNC. The RNC unpacks the packets and forwards them over a second tunnel to the mobile station (see Figure 4.29). This procedure separates the traffic within the UMTS network from the user traffic.
74
Figure 4.22: Routing a packet-switched connection The tunnel remains active until the mobile station deactivates the context. During this time the SGSN is constantly informed about the current location area of the mobile station (micro-mobility management). If the user changes the location area for which the original SGSN was responsible, the route in the GGSN is adapted to the new SGSN. In the case of a longer period of inactivity, a timer runs out in the mobile station, the mobile station no longer makes contact with each cell change and the local information in the SGSN with regard to the location area is only at the routing area level. However, the logical connection between GGSN and mobile station continues to be maintained. The tunnel is not released until the context is deactivated or the mobile station disconnects from the SGSN. Afterwards the IP address can be used for another connection. The transmitted data is calculated and recorded in the CN for later billing. The RN informs the CN if data packets could not be transmitted as far as the mobile station due to problems in the RAN. The quality of service required by the application from the network is negotiated in the request for the PDP context. In addition to the priority, this includes the tolerated delay, the maximum throughput required and the configuration of the transmission security within the CN and at the radio interface. Thus users who need access to their corporate networks can receive a guaranteed minimum quality of service for
75
little additional cost. On the other hand, users who only want to surf the Internet have to tolerate a lower quality of service at a lower cost.
76
Figure 4.23: SS7 Signalling network transmission of data that reacts very sensitively to changing delay, such as voice and video data. 4.9.1 Radio Access Network Application Part (RANAP)
The functions of RANAP are listed in Figure 4.25. This is an application used by the SS7 network to transport its messages. Approaches now also exist involving the use of IP-based protocols as the basis for the transport of RANAP messages. The protocol establishes a separate logical connection between RAN and CN for each individual mobile station being controlled. RANAP supports the functions necessary for connecting the RAN to the CN: 1. RANAP provides for the relocation of Serving RNC (SRNC) due to mobile station mobility. 2. RANAP sets up and releases connections to mobile stations. This also includes releasing the corresponding RANAP connection. 3. The RAN can use the RANAP to inform the CN of data packets that were not transmitted so that they either will not be billed or will be retransmitted over a different route to the mobile station.
77
Figure 4.24: Protocol stack for circuit-switched services at the lu-interface 4. RANAP offers functions for paging mobile stations in a location area in order to instigate a connection set-up. 5. RANAP also offers functions for direct signalling between UE and CN, for example, for mobility management (location update, routing area update, etc.). 6. Ciphering on the route to mobile stations takes place in the RNC. MSC and SGSN can use RANAP functions to control encryption. 7. The protocol also allows management functions occurring in conjunction with the operation of RANAP to be handled over the RANAP. This includes overload protection and defined restart of the protocol in the case of error. However, all connections affected by restart are cut off. RANAP also supports the activation of traces in which all activities of a particular mobile station within the RAN are recorded for diagnostic purposes. 4.9.2 Radio Network Subsystem Application Part (RNSAP)
The protocol stack used at the Iur-interface between various RNCs has a similar structure, except that the Radio Network Subsystem Application Part (RNSAP) application is used instead of a RANAP.
78
The range of RNSAP functions are divided into four groups, only parts of which can be implemented by vendors (Figure 4.26): 1. Basic functions: The first group of functions provides the basic functions absolutely necessary for operation of the Iur-interface. The functions for SRNC relocation are based on these functions but due to the complexity of their tasks they are difficult to implement. The basic functions are only used for signalling. No user data flows over the Iur-interface. 2. Support for dedicated channels: A network operator can also use the functions of the second group to transmit circuit-switched data for soft handover over the Iur-interface. This is essential for soft handover between two RNCs. Dynamic AAL2 connections can be established over the Iur-interface for this purpose. 3. Support for shared-use channels: The third group of functions also enables support for packet-switched services over the Iur-interface. This prevents the need for a change of the lu-reference point during a current packet-switched data transmission. The mobile station moves into the area of a new RNC and continues to be supplied with data over the Iur-interface. Since the MAC layer in the protocol stack (see Chapter 5) has to be split between SRNC and DRNC for the support of this function, this function was not uncontroversial in the standardisation. It
79
Figure 4.26: Radio Network Subsystem Application Part is contained in the current version of the standard but is not critically necessary for the support of packet-switched services, since SRNC relocation can be implemented in the pauses between the individual data packets without a noticeable interruption to the user. 4. Global resource management: For the efficient planning of radio resource allocation it can be helpful if information about the current situation in neighbouring RNCs is available. Consequently, RNCs can exchange measurement values, for example on the interference levels measured in certain cells, over the Iur-interface. Information can also be exchanged with regard to the timings of Node Bs for the implementation of smooth handover. Figure 4.27 shows function groups 3 and 4 and the Iur-interface.
80
The protocol stack at the radio interface is partially implemented in the RNC (MAC sublayer and RLC sublayer) and partially in Node-B (PHY layer). Time-critical tasks associated with CDMA transmission technology can be directly implemented in Node B PHY layer. The sublayer AAL2SAR splits up data packets arriving from the RLC layer into small blocks for transmission in ATM cells and reassembles the ATM cells arriving from the opposite direction into the original data stream for transmission over the RLC layer. The tasks of the layers in the protocol stack at the radio interface are explained in Chapter 5. The receding in the RNC is transparent for the application, for example, a circuit-switched data transmission or a voice telephone call.
81
transports the data through the UMTS network to the RNC. In addition to IPv4, GTP can also transport other packet data protocols, such as IPv6 and OSP. For transport through the UMTS network GTP uses an internal IP network that is logically totally independent of the external IP network. The transport protocol is the User Datagram Protocol (UDP). There are plans also to use the Transport Control Protocol (TCP) for transmission although it reacts very sensitively to variable packet delays. Since TCP is already usually employed for reliable end-to-end connection at the application level, the User Datagram Protocol (UDP) is used in normal circumstances. In the RNC data is transferred to the Packet Data Convergence Protocol (PDCP) sublayer that compresses the IP header data and then transmits the data packets over the RLC, MAC and PHY layers in the UTRAN protocol stack over packet data channels to the mobile station. The IP tunnel shown in Figure 4.29 is actually two tunnel connections that are directly coupled together in the RNC: The PDCP layer provides a transmission medium for IP packets over the radio interface up to the RNC. The RNC packs the data directly into the GTP protocol for transmission to the GGSN.
82
Figure 4.29: Protocol stack for packet-switched services This protocol architecture is similar in structure to the one in GPRS, although the GTP protocol in UMTS is used up to the point of communication with the RNC. In GPRS, the SGSN is responsible for packing the data out of the GTP protocol into the Sub-Network Dependent Convergence Protocol (SNDCP), and the BSC is not required to convert any IP protocols.
83
Figure 4.30: Pure IP core network architecture forwarded to the Internet. Voice data is converted Voice over IP (VoIP) voice data and forwarded from the GGSN to a Media Gateway (MOW). There the voice packets are converted into conventional voice data that can be transmitted in the ISDN/PSTN networks. For the transition to mobile radio networks without IP signalling, the protocols for call set-up, mobility management, and so forth also have to be converted into internal IP signalling. This task is handled by the Roaming Signalling Gateway (R-SGW). Mobile radio networks also based on this architecture can be attached without additional gateways. The pure IP-CN is shown in more detail in Figure 4.31. The solid lines represent the channels over which signalling and user data can be transmitted, whereas the dotted lines are only used for signalling. The new central signalling node is what is called a Call State Control Function (CSCF). This node communicates with other CSCF nodes and the mobile station over what is the currently standardised Session Initiation Protocol (SIP) protocol for the switching of services over IP signalling. Yet the CSCF accesses the databases of the home subscriber server in which all user-specific and service-specific data is filed. The switching functions for circuit-switched services - for example, the telephone network - are provided over the MGW node. The signalling is trans-
84
Figure 4.31: Pure IP core network architecture ferred to the Mobile Services Switching Centre (MSC) servers that also communicate with the HSS. The SGSN and the GGSN nodes are already familiar to us from R99. They are necessary for setting up IP connections over the RAN to the UE. In the process, the SGSN handles the communication with the RNC in the RAN and ensures that the mobility of the mobile stations is dealt with. The GGSN routes the traffic to the regional SGSN responsible, checks authorisations and routes the traffic between UE and the Internet.
85
Figure 4.32: Session Initiation Protocol this CSCF forwards the data to the user's home network, it is also called a Proxy Call State Control Function (P-CSCF). 2. The P-CSCF forwards the request to the Interrogating Call State Control Function (I-CSCF) in the home network of user A. This node represents a gateway to neighbouring networks over which such requests have to be filtered and processed. 3. The I-CSCF interrogates the central database HSS to find out how to continue with the connection set-up request. It is here that the authorisations of user A are checked. If the requested telephone number of user B is a special number (abbreviated dialling, emergency call, and so forth), the HSS can modify the destination information that is being supplied to the I-CSCF. This would, for example, allow the implementation of an 0800 number. 4. The response of the HSS is transmitted back to the I-CSCF. The I-CSCF can now forward the call to an available node that then continues with the call set-up procedure. 5. This available node is called a Serving Call State Control Function (SCSCF). This function in the home network becomes immediately responsible for the further connection sequence. Using the destination telephone number sent by the I-CSCF, the S-CSCF identifies the home
86
4 UMTS System Architecture network of the user being called and establishes a connection with the relevant gateway, the I-CSCF. 6. The I-CSCF receives the call and also has to send a database query to the local HSS with regard to the current location area of the user being called. 7. This query from the I-CSCF reaches the HSS. The database checks the authorisations of user B. 8. If the results of the check are positive, the HSS transmits the current location area of the called user back to the I-CSCF. 9. For its part the I-CSCF can now identify an S-CSCF and forward the call to it for further processing along with the results of the database interrogation.
10. The transmitted data enables the S-CSCF to detect the current location area of user B and it then sets up a connection to the local signalling node in the network being visited. 11. The P-CSCF in the network being visited by user B receives the query. Since user B is already registered in the network, a logical connection exists to this user. The user then receives the connection request over this logical connection. 12. The response (acceptance/rejection of connection request) together with the IP address of the user called is transmitted back over the same route (12, 13, 14, 15, 16, 17, 18) to user A. 13. Based on the identified address of user B, user A can establish a direct IP connection to this user and exchange data. Thus the CSCF can assume three roles in the signalling: P-CSCF, I-CSCF and S-CSCF. However, physically the same node is involved. The signalling between UE and P-CSCF as well as between the various CSCF is handled over the SIP. 4.10.2 IP core network - pros and cons There is some controversy among the standardisation bodies about the new CN architecture. The industry, however, is split into two minds: one view is that the upgrade is neither fast enough nor does it go far enough. The other view is suspicious of IP and the fear is that the high expectations cannot be met. There are solid arguments to support both views (Figure 4.33). The pros of the new architecture: Many networks are currently being converted to an IP basis. A large number of experts consider this architecture to be modern and forwardlooking.
87
Figure 4.33: Pros and cons of a pure IP core network architecture An integrated network for voice and data services is what is needed to enable the offering of services. For example, one could imagine augmenting an instant-messenger service (e.g., ICQ) with voice and video telephony that could be linked up as necessary. But it would also be easy to see Computer Telephony Integration (CTI) with such a concept. Many company telephone systems are currently going down a similar path. Telephones are directly linked to a LAN and can communicate with the computers. A reduction in the cost of switching technology is anticipated due to the large number of routing technologies for IP that exist. However, many products still do not support all IPv6 possibilities. The price levels could be brought in line with the introduction of these performance features. New services are easy and convenient to introduce due to the flexible layout of the signalling technology and the easy scalability of the bandwidth of the direct connection between terminals. A multitude of network monitoring options already exist for the current Internet technology. These can easily be integrated into a new architecture. On the other hand, the following arguments stack up against a new CN architecture:
88
4 UMTS System Architecture The new architecture requires new nodes on the outer boundaries for the implementation of gateways to existing networks. The existing second generation networks were not designed for this architecture and consequently cannot easily be integrated into it. Furthermore, the initial UMTS networks were based on GSM so that operators will be required to make a higher investment for CN since large parts of the network will no longer be usable in the future. The issue of security arises as a result of the direct coupling of networks with the Internet. In comparison with classic signalling systems, many more people in the world will try to gain access to IP networks. Consequently, the security systems will have to be established and developed with precise specifications. Many consider the transmission of voice over VoIP technology as being unsophisticated and of poor quality. The traffic-related changes possible to data transmission speed (jitter) are already creating problems in existing networks. The upgrade to IPv6 could be helpful.
Overall, experts say that most of the new possibilities offered by the enhanced CN more than make up for the associated risks and problems. Since this area of the standard changes particularly quickly, the most current version of the standard should be used for any further questions.
4.11 Questions
89
4.11 Questions
4.1 4.2 4.3 What is the purpose of the separation between the permanently installed infrastructures in RAN and CN? Give two advantages for dividing a mobile unit into UE and USIM. What are the advantages of packet-switched transmission? Which effect is made use of? Which problem arises with packet-switched transmission when services require a certain quality of service? Which elements make up a RAN? What are the functions of the different nodes? Explain what the tasks are of the different databases in a CN. Explain the difference between an MSC and an SGSN. List the three basic handover types in UMTS. What are the advantages of using the new handover types? Explain the roles of an SRNC and a DRNC during a handover. Why is there a difference in the accuracy of how the position of a mobile station is stored in a network depending on whether the services are packet-switched (PS) or circuit-switched? When does a location area update or a routing area update occur?
4.10
4.11 Between which network nodes is the GPRS Tunnelling Protocol (GTPII) used? What is its function? 4.12 Comment on the following statement: Using a completely IP-based fixed network infrastructure makes it easier for a network operator to introduce new services. List three problems that can occur when an IP-based fixed network is introduced. What is the Session Initiation Protocol (SIP) used for? How does user data flow in the case of an SIP-switched connection?
4.13 4.14
92
it. Only the Indian post office, which is responsible for the physical transport of the letter, has direct contact with other postal agencies. Although the OSI protocol stack has not generally established itself vis-a-vis the TCP/IP architecture, it is an excellent reference model that facilitates the understanding, representation and classification of protocols. The seven layers have different tasks that are briefly explained below: 1. The physical layer is responsible for direct communication with a partner over a common physical medium. In the example of the two philosophers, the letter corresponds to the physical layer. 2. The data link layer above it is often divided into two sublayers: the Medium Access Control (MAC) sublayer is responsible for coordinating access to a common medium, whereas the Logical Link Control (LLC) layer above it handles error correction. 3. Above the data link layer is the network layer, which is responsible for transmitting messages over several intermediate stations. 4. Above these three lower layers are the layers where logical connections already run from one end to another. The transport layer guarantees a secure end-to-end connection.
93
Figure 5.2: Separation of protocol stack into c-plane and u-plane 5. Above it is the session layer that is responsible for opening and terminating communication. 6. The presentation layer converts the information being transmitted so that the remote station can understand the presentation. The translator in our example works within the presentation layer. 7. At the top of the protocol stack is the application layer that represents the interface to the user. The personal secretary of the philosopher is a component of the application layer, whereas the philosopher himself works as a user outside the protocol stack. The protocol stack at the Uu-interface between the UE and the UTRAN comprises only layers 1-3. All higher functions are negotiated directly between UE and CN based on the communication paths provided by these layers. Three different types of tasks can be distinguished that are handled by the protocol stack (see Figure 5.2): Exchange of control information: Before direct communication can take place between participating partners, the partners must agree on common parameters. In our example the two translators both talk English so this language can be used in the presentation layer. If a new philosopher should start to participate in the discussion in Paris, the translators will again have to agree on a common language. This communication
94
5 The Protocol Stack at the Radio Interface is totally invisible to the philosophers and takes place in the control (control plane). Exchange of user information: The actual user data is transmitted in this plane. The exchange of information from our example was totally restricted to the user (user plane). Configuration of individual layers: Whereas in the other two planes both communication partners communicate with one another, the management plan includes the functions necessary for the internal configuration of the protocol stack. Back to our example: the personnel department that hires the translators belongs to the management plane.
The individual layers of the protocol stack demarcate different task areas, whereas the planes categorise the information flow.
95
96
In summary, it should be noted that all tasks that are directly related to the radio interface are located in the Physical Layer (PHY) layer(see Figure 5.4). Consequently, the physical layer is structured differently in UTRA-TDD than it is in UTRA-FDD.
97
With common channels, in other words, channels the use of which is shared by several stations, addressing has to be built into the data stream. The addressing enables receiving stations to identify whether a transmitted data packet is destined for the respective station. This address, called Radio Network Temporary Identifier (RNTI), is used by the MAC layer to make this selection. The RLC layer delivers the data to the MAC layer over logical channels. A logical channel describes which type of data should be transmitted. The MAC layer maps these logical channels to the transport channels that represent the interface to the physical layer. The transport channels are configured over socalled transport formats that are explained in Section 5.10. The MAC layer is thus responsible for the multiplexing of several parallel data streams from the logical channels to the transport channels (see Figure 5.5).
98
In acknowledged mode the RLC layer sends a new request for data blocks detected to have errors. Since this delays the delivery of data already received until missing data packets are redelivered, this procedure is not suitable for error-tolerant video or audio data, but is suitable for data transmission. Through error correction the RLC layer can guarantee that data is delivered error-free only once and in the right sequence. In contrast, the RLC layer provides no error correction in unacknowledged mode. Instead it discards data packets that are detected as having errors or selects them as being defective before they are delivered. Data is always provided with a sequence number. Consequently, the RLC layer can ensure the uniqueness of the transmitted data in unacknowledged mode. In transparent mode the RLC layer does not add a separate header to the data. Instead it simply forwards the data to the MAC layer. This mode is especially suitable for the transmission of stream data such as video and audio data. In all cases the RLC layer can segment data packets delivered by higher layers so that the MAC sublayer receives data packets of the right size over the logical channels. This simplifies the queue management in the MAC layer.
99
Figure 5.7: Tasks of the BMC layer The RLC layer is also responsible for the encryption of data. This task is only taken over by the MAC layer in transparent mode. It carries out flow control for the application working above it so that no overflow occurs within the UTRA protocol stack. The RLC layer is thus responsible for transmitting data from the higher layers with the necessary security. The RRC layer already selects the appropriate mode for a connection at the time of connection set-up and configures the necessary parameters in the RLC layer. The service provided by the RLC layer to an application working above it is also called a radio bearer. However, this does not apply if the data is still being routed through the PDCP or BMC sublayers.
100
101
Figure 5.9: Tasks of the RRC layer RLC, MAC and the physical layers in accordance with the required quality of service parameters. The RRC layer is also entrusted with the mobility management for active connections. Consequently, it carries out the necessary updates of the data structures in the RAN (location update), roaming and handover. Since the information from all connections in all attached cells merges together in the RRC layer in the RAN, the RRC layer can allow complex algorithms to be executed for an optimal distribution of radio resources. This results in a target value for the transmitter power (outer loop power control) of each connection. These values are transmitted to the respective Node Bs and mobile stations. There an attempt is made to achieve and maintain this value (inner loop power control). To carry out its tasks, the RRC layer collects measured values from all other layers in order to generate configuration instructions for other layers using suitable algorithms. Due to the large number of functions, the documentation for the protocol between RRC layers is very extensive and almost 600 pages long. Since the algorithms within the RRC layer have a direct effect on the performance of a network, different vendors can be differentiated by the performance of their algorithms and consequently the networks based on them.
102
103
precisely the reverse: The data is transferred from the physical layer over the MAC and RLC layers to the RRC layer. As the name implies, shared channels are used jointly by several stations, including mobile stations. The Radio Network Temporary Identifier (RNTI) mentioned earlier is always included in the transmission to clarify who the recipient is of the traffic being transmitted over these channels The normal transmission of user and signalling data takes place over the Dedicated Channel (DCH). This channel can be set up on the uplink as well as on the downlink. In this case the sender and receiver are fixed, so no further addressing is required within the connection.
104
Figure 5.11: Transport blocks and transport block sets the TFS is dependent on the requested application. A service that requires a constant data rate can only contain a single transport format in the transport format set. A service with a variable data rate possibly has a choice of a large number of transport formats, thereby always enabling it to adapt the parameters of the physical layer quickly to the current data rate. To review, a data block that is transmitted over a transport channel is called a transport block. Transport block sets are formed since several of these blocks can be transmitted simultaneously at one time. This set is described by a transport format that is selected from a group of permissible transport formats. This group is called a transport format set. Transport formats cannot, however, be combined in any combination. Take the following example: an application that transmits data over a transport channel is guaranteed a high maximum data rate through the acceptance of a particular transport format into the associated transport format set. The same guarantee cannot then be given for this same point in time to a second application that is using another transport channel. The different transport formats that are used by the different transport channels at a particular point in time are not compatible (see Figure 5.13), because the available resources are limited. As a result, Transport Format Combinations (TFCs) that specify which transport formats are compatible with one another were introduced.
5. JO Transport formats
105
Figure 5.12: Transport formats and transport format sets A transport format combination specifies, for example, that if transport channel 1 requires 80% of the resources at a particular time, the other two transport channels 2 and 3 can jointly use a maximum of the remaining 20%. The Transport Format Combination Set (TFCS) groups several compatible transport format combinations together. These groups describe the possible transport format combinations from which the MAC layer can make a selection of one at a particular point in time (see Figure 5.14). This complicated interface offers a big advantage: when a connection is set up, the RRC layer specifies which transport format combinations can be used for the connection. Depending on the data volume in the individual channels, in active operation the MAC layer can dynamically distribute the capacity easily and quickly between the different transport channels. It notifies the physical layer of this distribution over the Transport Format Combination Identifier (TFCI). This field is transported over the physical layer to the receiver. There the arriving data stream can be distributed among several transport channels again with the help of the TFCI field. Since the receiver also knows the list of possible transport format combinations, the index TFCI suffices for executing the demultiplexing. To explain the tasks of the MAC layer in detail: the MAC layer receives data blocks over the logical channels from the RLC layer that divides them into transport blocks and transport block sets on the downlink and transmits them
106
Figure 5.13: Transport format combinations over the transport channels. On the uplink the received transport block sets are distributed over the different logical channels. The TFCI field from which the transport format to be used is produced for each transport channel is always the one transferred to the physical layer. It is important that the RRC layer is able to detect the threat of any overflows within the UTRA protocol stack early enough. Consequently, the MAC layer supplies the following as measured values to the RRC layer: the achieved throughput, the TFCS used and the filler state of the individual queues.
Figure 5.14: Transport format combination sets mapped to the transport channel BCH. Since this channel only exists on the downlink, the illustration only shows an arrow pointing downward. The same applies to the paging channel Paging Control Channel (PCCH). There are several transport channels in UMTS over which the user data channel DTCH and the signalling channel Dedicated Control Channel (DCCH) can be transmitted: over a dedicated transport channel Dedicated Channel (DCH) small data packets can be transmitted efficiently and without complicated signalling over the Random Access Channel (RACK) on the uplink and the Forward Access Channel (FACH) on the downlink over jointly used channels (Downlink Shared Channel (DSCH) on the downlink and Uplink Shared Channel (USCH) or Common Packet Channel (CPCH) on the uplink) The Common Control Channel (CCCH) is used for signalling outside an existing connection and is transmitted over the transport channels RACE and FACH.
108
5.12 Questions
5.1 5.2 5.3 5.4 5.5 5.6 5.7 5.8 5.9 5.10 Explain the concept of the ISO/OSI layer model. What are the advantages to dividing a protocol stack into layers? Why does a logical connection exist between the philosophers in Section 5.1? Protocol stacks are also divided into planes. What is the purpose of the division C/U/M planes? Which layers are comprised in the protocol stack at the Uu-Interface? Describe the functions of the physical layer in an UTRAN. Which types of channels are available to the MAC layer at the upper edge of the physical layer? Name three tasks handled by the MAC layer. Which functions are embedded in the RLC layer? Explain the differences between the three transmission modes in the RLC layer. Name three mechanisms that can basically be used for dealing with transmission errors.
5.12 Questions
Figure 5.16: Mapping logical channels to transport channels 5.11 5.12 5.13 In which layer does data encryption take place? Describe the functions of the PDCP sublayer. With which services are these functions used? Describe the functions of the RRC layer.
5.14 Wrhy is there a difference in the performance of a UTRAN depending on the vendor? 5.15 5.16 5.17 5.18 5.19 Allocate the different layers (PHY, MAC, RLC, RRC) to the network elements of a RAN. Why were transport channels developed with the complicated mechanism of transport formats, etc.? What distinguishes logical channels from transport channels? Over which transport channels can user data (logical channel DTCH) be transported in UMTS? Estimate how much higher the factor of complexity is of a UMTS terminal vis-a-vis a GSM terminal.
UMTS: The Fundamentals B. Walke, P. Seidenberg, M. P. Althoff 2003 John Wiley & Sons, Ltd
112
113
Figure 6.2: Duplex procedures this type of spectrum separation is used in almost none of the commercially operated mobile radio systems today. A paired frequency band is required for the implementation of an FDD system. Paired means that for each frequency block in the transmitting band a frequency block of the same size must exist in the receiving band, which generally has the same bandwidth. It is obviously more difficult to make two frequency ranges of the same bandwidth available in the spectrum than unpaired ones. GSM is a typical representative of FDD systems.
114
Figure 6.3: Frequency-division duplex selected arbitrarily within a period. It is also possible for the uplink and the downlink to be switched back and forth several times during a period. Through the possibility of varying the distribution of transmission capacity between uplink and downlink, the time-division duplex technique is suitable for the efficient mapping of asymmetric data traffic. In contrast to the FDD technique, all that is then needed in the frequency spectrum is a frequency block. It is obviously easier to find individual frequency blocks in the spectrum than paired ones. However, the potentially different signal runtimes with TDD have to be taken into account to prevent the transmitter signals of different stations overlapping at the receiver. Therefore, the time available for a transmission direction cannot usually be totally used for data transmission due to the need for guard times. These times can also be necessary for transferring the transceiver from a transmitting state to the receiving state and vice versa. A DECT system is a typical representative of a TDD system.
115
Figure 6.4: Time duplex munication of the uplink and the downlink to these frequency bands, thereby separating the transmitting and receiving signals of the communicating stations. Within a transmission direction a multiple access technique distributes the available transmission bandwidth among the individual users or connections. The multiple access technique defines the so-called physical channels. A physical channel is characterised by different physical parameters, e.g., by a period of time or a frequency range. Two stations communicate over a physical channel. These physical channels should be defined so that various connections do not cause mutual interference. The multiple access technique should therefore implement an efficient, flexible and equitable distribution of the total throughput of a transmission direction among many users. A multiple access technique only divides up the available transmission capacity among physical channels. The theoretical total capacity remains unaffected by the multiple access technique (see Figure 6.5). The technique itself does not create capacity! The three most common techniques for the separation of user signals of the same transmission direction are shown in Figure 6.6. They define the physical channels in the frequency domain, in the time domain or through the use of bipolar orthogonal carrier signals, called codes.
116
Frequency-division multiple access technique (FDMA) separates the user signals in a frequency range, i.e., it divides the frequency spectrum into frequency channels. A user can transmit or receive within a frequency channel. Since the bandwidth of a frequency channel is narrower than the overall bandwidth of a system, the transmission speed attainable in a channel is correspondingly lower than the overall transmission speed. Therefore, only a fraction of the overall capacity is available to each user. Time Division Multiple Access (TDMA) is another technique that separates user signals. With TDMA, users do not transmit simultaneously in different frequency channels, as is the case with FDMA, but instead successively in the same frequency range. Users then use the entire frequency bandwidth of the system, and the transmission speed is correspondingly high. However, transmission in time segments called time slots has the effect that the effective transmission rate of a user is less than that of the overall transmission speed. Thus here too each user is only provided with a fraction of the overall capacity. Mathematically, a multiple access technique is always based on the use of orthogonal carrier functions by which the signal of the individual participants is multiplied in order to orthogonalise the user signals, i.e., separate them from one another. With FDMA, these carrier functions are sine or cosine waves of different frequencies. In the case of TDMA, these are window functions that activate and deactivate the transmitter. It is easv to see that these window
Figure 6.6: Frequency division, time division and code division multiple-access
functions are orthogonal: two periodic functions are orthogonal when the integral of the product of two functions produces a zero over a period of time. If two window functions are considered, then their product already equals zero and consequently the integral also. Thus the functions are orthogonal. It is easy to imagine that other two-valued carrier functions could also be orthogonal to one another. Code Division Multiple Access (CDMA) is a technique that most often uses two-valued carrier functions to separate user signals. The carrier functions are bipolar sequences, called code sequences. These code sequences should be orthogonal to one another, i.e., the integral through the products of two sequences over a period of time should be zero. If such carrier functions are used, then the individual user signals can be multiplied by these sequences and transmitted in the same frequency range simultaneously. As will be explained later, the received signals in the receiver can be correlated with the code sequence, thus resulting in the recovery of the user signals. The energy necessary for the representation and transmission of a bit is independent of the multiple access technique. In FDMA systems users transmit in a frequency channel with no time limitation. The energy is thus distributed over a relatively long period of time and the power is correspondingly low. In a TDMA system the same energy is transmitted within a time slot and the relevant power is high compared to an FDMA system. However, because
118
a TDMA user has the entire frequency bandwidth available for transmission but the FDMA user only has a frequency channel, the spectral power density of a user signal is theoretically the same in both cases. In a CDMA system users transmit simultaneously in the entire frequency bandwidth. Due to the long transmitting duration the transmitter power is correspondingly low; due to the large frequency bandwidth the spectral power density is also low. If the resources frequency, time and power density were applied to a diagram, one would notice that FDMA users share the frequency, TDMA users share the time and CDMA users share the power density. The respective volume of the blocks covered by the dimensions frequency, time and power density is equal, i.e., the individual multiple access techniques only share the overall transmission bandwidth available.
119
in-phase by the code sequence to generate the chip stream 1011010001001011. What is obvious is that the multiplication of the two bits has generated 16 chips that can now be transmitted over the mobile radio channel through an appropriate digital modulation procedure. The bits of the data stream can be recovered in the receiver from the chip sequence received through a repetition of the multiplication procedure. The chip stream with the same code sequence that was already used in the transmitter is multiplied in-phase again producing the transmitted bit sequence 10 (see Figure 6.8).
120
Figure 6.8: Mapping a bit stream to a chip stream and bit stream recovery the spectrum spreads through multiplication by the bit sequence against the spectrum without multiplication. Therefore, one also talks about a spread spectrum technique in conjunction with CDMA. The factor by which the spectrum spreads is called the spreading factor. It is calculated from the ratio of the bandwidths or the transmission rates of the bit and created chip stream. Since a bit is multiplied by the number N of chips, the chip rate is larger than the bit rate by exactly the factor N. The number of chips per bit therefore exactly corresponds to the spreading factor. The code sequence that is multiplied by each bit is called a spreading code.
121
Figure 6.9: Spectral characteristics of CDMA signals The influence of all other user signals has to be eliminated. Consequently, the product generated from the receive signal and spreading code is periodically integrated for the duration of a bit and the originating signal is sampled at the end of a period. In terms of the sampling time at the end of the duration of a bit, this architecture with multiplier and integrator represents a matched filter. A matched filter forms the correlation function of the received signal with a pattern function, here the code sequence. The value of the correlation function is a measurement of the similarity of the received signal to the pattern function. Figure 6.10 shows that the value of the correlation function is obtained over a period through the integration of the product consisting of signal and pattern function. This mathematical operation was mentioned earlier in the introduction to multiple access techniques. There it was used to establish whether two carrier functions are orthogonal to one another. They are orthogonal when the integral is zero. If the received signal corresponds to the pattern function, then the Autocorrelation function (ACF) of the pattern function is obtained at the output of a matched filter. The autocorrelation function reaches its maximum when the phase-shift between the received signal and the pattern function equals zero. If the received signal does not correspond to the pattern function, then the Cross-correlation function (CCF) of the pattern function appears with
122
the received signal at the output of the matched filter. With phase-correct multiplication the integration exactly corresponds to the orthogonality test between received signal and pattern function mentioned above, in this case the spreading code. The receiver receives the sum of all spread user signals. Consequently, the sum, which consists of the autocorrelation of the spreading code of a user and the cross-correlations of the spreading codes of all other users, is obtained along with the pattern spreading code at the end of a period at the output of the branch of the correlation filter receiver shown in Figure 6.10. It is easy to understand that individual user signals can be received without mutual interference when the effects of cross-correlation disappear. Based on the above definition, this is the case when the spreading codes of the various users are orthogonal to one another. With CDMA, as with the other multiple access techniques presented, orthogonal carrier functions, in this case spreading codes, also ensure that the overall bandwidth can be distributed among individual users.
123
124
interference signals and are thus often used in military technology. This is where the CDMA technique originated. With a broadband interferer, e.g., other user signals, the broadband signal remains a broadband signal even after multiplication by the spreading code. The code sequence of an interference-producing user is multiplied by a different spreading code. However, this produces yet another code sequence but the rate does not change. A CDMA receiver thus makes a broadband interferer out of a broadband interferer. However, the user signal is de-spread at the same time, thus increasing the power density of the carrier signal. The amount by which the power density of the carrier signal is increased in the receiver is called processing gain. The value of the processing gain corresponds to the spreading factor and therefore the number of transmitted chips per bit. The narrowband interferer is attenuated in the receiver by the amount of the processing gain. White noise appears in the receiver as broadband interference. Broadband interference remains broadband. As shown in Figure 6.11, with a sufficiently large spreading factor, it is possible to transmit the user signal with lower spectral power density than that of thermal noise and to hide the user signal in the thermal noise so that it is only detectable with knowledge of the spreading code. This also explains why CDMA is used in military technology. In the case of correlation filter reception, the ratio of the energy allotted to a bit during signal transmission to the noise power density equals the signalto-noise ratio multiplied by the ratio of user bandwidth and data rate (see Figure 6.12). This relationship is generally valid, even with systems that do not use CDMA. As described above, in CDMA systems the user signal is spread to a bandwidth that is larger by the spreading factor than would be necessary in transmission without spreading. Bandpass systems require at least one frequency bandwidth that corresponds to the data rate in order to transmit data. Thus with correlation filter receivers the bit energy-to-noise power density ratio is equal to the product of signalto-noise interval and processing gain, with the processing gain ideally equal to the spreading factor. In CDMA systems the Eb/No is thus typically larger than the S/N by the amount of the spreading factor. This is also why communication is possible in CDMA systems even though the S/N for a connection at the receiver is typically much smaller than the value one. In UMTS the QPSK modulation scheme is used. Since this scheme takes two bits to form a modulation symbol the signal power with respect to one bit equals half of the signal power with respect to the modulation signal.
125
126
nel would be structured the same way but would use the second spreading code in the multiplication. The power density spectrum of the overlapping signals indicated in Figure 6.13 shows that the transmitter uses the spreading process to produce broadband signals from the original narrowband signals. Both signals are transmitted together at the same time in the same frequency band; the S/N at the receiver input is therefore smaller or equals one. Due to de-spreading the power of the signal of the first channel is again concentrated on a narrower bandwidth; the power density of the de-spread signal within this narrower bandwidth is higher by the spreading factor than the power density in a spread situation. The signal part of the second code channel appears as a broadband interferer to the receiver for the first code channel. Broadband interferers remain broadband in character so that the ratio Eb/NQ is finally greater by the spreading factor than the S/N at the receiver input.
127
the different user signals interfere very little with one another. In this case the codes are called quasi-orthogonal codes. The codes most suitable for detection, synchronisation and channel evaluation are those that have a distinctive impulse form in the zero point of their autocorrelation function and are low in all other places. A set of codes, the elements of which are all orthogonal or quasi-orthogonal to one another, is also called a code family. Large code families, i.e., families with a large number of spreading codes, are suitable for mobile radio use. When the chip rate on the radio transmission link is constant, the bit rate of a user signal represented in the chip sequence is only dependent on the spreading factor, since the chip rate is higher by the spreading factor than the bit rate. At the same time the spreading factor corresponds to the number of chips per bit. If the same code sequence is used to spread each user bit, it then makes sense to use code families that contain code sequences of different lengths to enable the implementation of variable data rates. An example of this can be seen in Figure 6.15 (see Section 6.12). UMTS uses the DS-CDMA technique in which a distinction is made between spreading individual bit streams and scrambling the sum signal of a station. Different bit streams that are to be transmitted simultaneously from the transmitter are multiplied by different, orthogonal spreading codes and then added together, shown already as a general procedure for CDMA systems. The aggregate signal is then scrambled, which occurs through a chip-by-chip multiplication of the aggregate signals by a scrambling code (see Figure 6.14). The scrambling code has the same rate as the spread chip streams of the individual channels. Therefore, the scrambling does not cause the user signal to be spread again, and the chip rate remains the same. Instead the preliminary sign of the aggregate signal is systematically changed at certain places through the scrambling. Scrambling codes are basically transmitter-specific. Through scrambling the chip sequences of different transmitters lose their orthogonality to one another and become only quasi-orthogonal. Although this is accompanied by a talkover of the various code channels, the signals of the different transmitters do not have to be synchronised simultaneously or arrive chip-synchronous in the receiver. The quasi-orthogonal signals remain quasi-orthogonal even with time shift. In the case of asynchronous reception, orthogonal codes lose their orthogonality. A CDMA receiver therefore uses orthogonal codes to compensate for the runtime-associated delay of the individual user signals. The amount of decoding required increases with the rise in the number of user signals. As a result of scrambling, in UMTS the entire family of orthogonal codes is available to each transmitter that uses its own scrambling code. Two different transmitters can use the same spreading codes, because the different
128
Figure 6.14: Spreading and scrambling scrambling codes ensure that the signals on the radio transmission link are quasi-orthogonal. Since the quantity of orthogonal codes is basically limited, a system would lose its flexibility if the spreading codes used in a transmitter could not be used simultaneously in another station. In FDD mode of UMTS the scrambling code is station-specific, i.e., each base station and each mobile station uses a different scrambling code. In TDD mode the scrambling code is cell-specific, i.e., mobile stations in the same cell use the same scrambling code as the base station. Different base stations use different scrambling codes. The data streams in a cell are thus transmitted with the same scrambling code on the downlink and are therefore orthogonal. This difference essentially has to do with the fact that in TDD mode only up to sixteen mobile stations per cell can transmit at the same time, but a considerably higher number is possible in FDD mode (see Section 6.14).
129
Variable Spreading Factor (OVSF) codes) used in UMTS form such a family. This family will be discussed in detail later. The principle covering the implementation of different transmission rates is illustrated in Figure 6.15. Three data streams are transmitted simultaneously in three different code channels. At the same time the bit rates of the data streams are different. The bit streams are spread so that the resulting chip streams have the same rate. This involves the multiplication of each bit of the first data stream by a spreading code of eight chips. The transmission rate of the resulting chip stream is therefore eight times that of the bit stream. The same thing happens with the second and third data streams, the only difference being that each bit is multiplied by a spreading code of four or two chips, respectively. The chip rate is then four times or twice as great as the corresponding bit rate. The receiver that receives the sum of all chip streams must be in a position to reconstruct through correlation the transmitted bit stream as shown. This is only possible if the code sequences of different chip streams are orthogonal to one another. Since the third code sequence is used exactly four times during the first code sequence, four copies of the third code sequence have to be orthogonal to the code sequence of the first channel. The same applies to two copies of the second code sequence. In the end two copies of the third code sequence must be orthogonal to a code sequence of the second code channel.
130
Figure 6.16: OVSF code tree Codes that meet the conditions described and are used in UMTS are the ones with a variable spreading factor (Orthogonal Variable Spreading Factor (OVSF) codes). As shown in Figure 6.16, these codes can be created through the use of a code tree. Each node of the tree exactly has two branches, each representing a double-length code. The codes of a level (vertical) have the same length N and thus the same spreading factor. Each code with a spreading factor N is created from a code with the spreading factor N/2. Consequently, a set of 2* spreading codes with a length of 2* chips are available at the fc-th level. For example, there are four codes with the spreading factor four and eight codes with the spreading factor eight. A code is basically created through the multiplication of a code of the next lower level of a code tree. The code being multiplied is called the mother code. Exactly two double-length codes are created from a mother code through the chaining of two copies of the mother code or the chaining of the mother code with a copy multiplied by -1. Codes of different levels are only orthogonal if the shorter one is not found again in the longer one, which, based on the construction rule described above, can happen. This means that two codes of different levels of the code tree are orthogonal to one another as long as one of the two codes is not the mother code of the other one. Because of this limitation the number of simultaneously usable codes depends on the bit rate and spreading factor.
131
If a connection uses the spreading factor one, then there is no other code that does not have this code as the mother code. In this case, the connection has exclusive use of the channel. However, if, for example, a connection uses the spreading factor two, another participant can use the spreading factor two or two other connections can use the spreading factor four.
132
Figure 6.18: Structure of a CDMA receiver The gross chip rate is therefore double the modulation rate. For the low chip rate option of TDD the modulation rate is 1.28Mchip/s. A root-raised cosine is used for pulse forming.
133
cases transmission is asynchronous and, moreover, the spreading codes are only quasi-orthogonal. Consequently, multiple-access interference caused by channel talkover has a considerable bearing on the capacity and the efficiency of CDMA systems. If the number of users rises, the noisy contribution of multiple-access interference will also increase. In the case of reception with joint detection, the data of all users is detected in one single step. All specific code sequences in the receiver have to be known o priori. Depending on the detection algorithm, other parameters, such as signal energy or amplitude and delay time, must also be known. The basic principle covering receivers with joint detection is shown in Figure 6.18. A joint detector follows a bank of correlators. This joint detector applies the respective detection algorithm to the sampled output signals of the correlators and determines the estimated values of the data bits. Joint user detection thus uses knowledge about other user signals being received at the same time in order to suppress multiple-access interference. According to the principle of interference cancellation, an estimated value is produced from each user's contribution to multiple-access interference so that it can be subtracted from the received signal and thus reduce the overall interference. This can either take place step-by-step in several detection stages switched one after the other or be carried out for all users simultaneously. The interference cancellation approach is not optimal, because the effects not yet
134
Figure 6.20: The near-far effect cancelled when some of the transmitted data symbols are detected are treated as noise. In summary, CDMA receivers can be classified as follows. If the presence of other code channels is ignored during the decoding of a code channel, this is referred to as single detection; otherwise it is called multi-user detection. Single detection is currently used in the FDD mode of UMTS, because multiuser detection would require a considerable amount of computing due to the length of the scrambling codes, the asynchronicity and the large number of simultaneously active users. Multi-user detection can be used in TDD mode due to the shorter scrambling codes and low number of simultaneously active users.
effect
135
noisy contribution of multiple-access interference increases as the number of users rises. This negative influence is clearly increased when the received signal strength of other users is considerably higher than the signal strength of those users being considered. In Figure 6.20 the different received signal strengths are indicated by the weighting factors o and b. If all code channels in a system are considered, it can be determined that the a of one is the b of the other. As a result, if the crosscorrelation is the same, the multiple-access interference for all participants is equal. In other words, the multiple-access interference is distributed fairly when the received signal strength of all user signals at the receiver is equal. This can only be guaranteed through control of the transmitter power. When mobile stations have the same transmitter power, the signal of one of the users close to the base station is received considerably stronger than the signal of a user who is further away. Hence, the bit error ratio of the remote user is much greater than that of the closer user. This is called the near-far effect. It only occurs if channel talkover also exists between code channels for example, through a lack of synchronisation or only quasi-orthogonal codes. Multiple-user detectors can eliminate multiple-access interference or reduce it and in ideal circumstances are resistant to the near-far effect. Figure 6.21 shows the significant impact the near-far effect can have on system performance. Here the frequency of detection errors on the uplink is shown
136
as a function of the bit energy-to-noise power density ratio for a cell with ten users. The solid line represents the bit error ratio for a situation in which the received signal strength of all user signals is exactly the same. An extreme difference in the bit error ratios for near and far users becomes evident when the assumption is made that the received signal strength of user signals can differ up to 3dB, i.e., the weakest signal has exactly half the power of the strongest signal. The bit error ratio for the far user can be magnitudes greater than that of the near user. With the bit error ratio shown for a weak user in the example, communication is basically no longer possible. CDMA systems with a single detector therefore absolutely require power control for a fast and precise adaptation of the received signal strength. This is the reason why CDMA systems often incorporate their own physical channels that mainly transmit power control commands at a high rate. FDD mode in UMTS uses single detectors. The transmission rate for the power control commands is at 1500 commands per second.
6.16 Questions
6.1 6.2 Explain the difference between a duplex and a multiple-access technique. What is an asymmetric service and why is it easier to implement asymmetric services with a TDD duplex technique than with an FDD duplex technique? What is the maximum transmission speed D that can be achieved in a bandwidth B = 5 MHz with a signal-to-noise ratio of S/N = 15? [Tip: lo&(x) Which multiple-access technique basically enables the highest capacity in a mobile radio system? You want to distribute the total transmission rate D among 10 users. How is this done in a FDMA, a TDM A and a CDMA system? How should the parameters transmission rate DT, bandwidth BT and signalto-noise ratio S/NT be selected for each user and why? What effect does the modulation scheme have on the transmission rate? Why is it that the signal-to-noise ratio S/N at the receiver can be 5/7V < 1 in a CDMA system? What is the difference between a bit and a chip? Why is DS-CDMA a "spread spectrum" method?
6.3
6.4 6.5
6.16 Questions 6.10 6.11 6.13 6.14 What does "orthogonality" stand for in CDMA? How is orthogonality ensured in TDMA and FDMA?
137
6.12 What is the difference between spreading and scrambling? How are variable transmission rates achieved with a constant bandwidth? A system has an overall throughput of 2Mbit/s. Orthogonal Variable Spreading Factor (OVSF) codes are used. Two subscribers are using the spreading factor SF = 4. How many subscribers with SF = 16 can transmit data simultaneously? What is the transmission rate for the subscribers when a constant chip rate is assumed? What is Multiple Access Interference (MAI)? How does the transmitter power of users have to be controlled to keep multiple-access interference to a minimum?
6.15 6.16
140
Figure 7.1: The physical layer in the UTRA protocol stack Within the physical layer several transport channels, the transport blocks of which require the same coding, interleaving and puncturing within the physical layer, can be multiplexed to an internal channel of the physical layer, called the Coded Composite Transport Channel (CCTrCH). The data stream that is formed this way is then transmitted over one or over several physical channels simultaneously. Only one CCTrCH is permitted on the uplink, i.e., the transport blocks of different transport channels are always transmitted at the same time and with the same channel coding, and so forth. Compared to second-generation systems (e.g., GSM), an UTRAN enables very flexible and efficient data transmission of different data streams due to this concept of mapping transport channels to physical channels. Since the transmission capacity of the physical channels can be changed every 10ms, e.g., through a change of the spreading factor, the transmission rate can be adapted to cope with bursty-type or fluctuating traffic. The transmission capacity of the radio channel is then used efficiently although intelligent algorithms are needed for allocating and changing transmission capacities.
141
142
Figure 7.3: Time structure in multiple access of UMTS subdivided into 2 sub-frames. Each sub-frame contains 7 normal timeslots and additionally 3 time slots for synchronisation purposes, see Section 7.3.3.
143
Figure 7.4: Multiple access in FDD mode In FDD mode, therefore, the division of time frames into time slots is not designed to separate user signals but instead exclusively to implement periodic functions, such as power control. As explained in Section 6.15, a CDMA system requires fast and precise power control in order to prevent near-far effects. In FDD mode, therefore, a power control command is transmitted in each time slot.
144
Whereas in FDD mode the entire duration of one or more time frames is available to a physical channel for data transmission, a physical channel in TDD mode only receives the duration of one time slot per time frame. Since the bit rate drops as the spreading factor increases, in TDD mode only spreading factors between 1 and 16 are used so that about the same transmission rates can be achieved for a physical channel as with FDD mode. As is the case with FDD, TDD can also use an FDMA component when the network operator has more than one frequency channel available. The modulation type, modulation rate, frame duration and frequency channel distance are the same in FDD mode and in TDD mode. Whereas in FDD mode the distribution of traffic capacity to the uplink and the downlink cannot be changed because of the fixed frequency channel bandwidths, in TDD mode the portion of the time frame available to the uplink and the downlink can be varied. This occurs through the selection of a switching point within a time frame. A distinction is essentially made between four different types of configuration, shown in Figure 7.6. Arrows pointing upwards indicate a time slot that is reserved for the uplink; arrows pointing downwards indicate a time slot for the downlink. Basically it is possible to switch several times between the uplink and the downlink within a time slot; in an extreme situation, after each time slot. Also, the number of time slots configured within a frame
145
does not have to be the same for both the uplink and the downlink. This enables an efficient implementation of asymmetrical services, for example. A configuration of several switching points within a time frame reduces the time between two transmission possibilities in one transmission direction. This can minimise the transmission delay since data packets for transmission have to wait for the next transmission possibility. Quick switching between uplink and downlink places high demands on the transmitting and receiving units of the base and mobile stations. It is therefore advisable to select only one switching point within a time frame if the transmission delay that occurs is tolerable, which is the case with most services in UMTS. However, even a configuration with one switching point offers the possibility of selecting a different capacity for the uplink and the downlink.
7.3.3 Multiple access in the TDD mode low chip rate option
In Release 4 of the UTRA standard a so-called low chip rate option with a modulation rate of 1.28Mchip/s is specified for the TDD mode. As in the normal TDD mode the time frame has a length of 10ms but is divided into 2 sub-frames of 5 ms with 7 traffic time slots each. The uplink and downlink directions are separated by two switching points per sub-frame. Between the first and the second time slot of a sub-frame two synchronisation slots
146
Figure 7.7: Multiple access in the TDD mode low chip rate option Downlink Pilot Tone Slot (DwPTS) and Uplink Pilot Tone Slot (UpPTS) as well as one guard period are located. Figure 7.7 shows the multiple access scheme of the TDD low chip rate option. The first slot of each sub-frame is always allocated to the downlink while the second time slot is always allocated as uplink. The position of the second switching point can be arbitrarily chosen from the remaining time slot boundaries. Thus, the slot configuration can be adjusted to asymmetric traffic as in the high chip rate TDD mode. Since more than one frequency channel can be used by one operator, the multiple access of low chip rate TDD comprises FDMA with a carrier spacing of 1.6MHz.
As explained earlier, power control in UMTS is a particularly important mechanism for preventing near-far effects . Figure 7.8 illustrates the principle behind power control in FDD mode. The control mechanism basically consists of two loops, an outer one and an inner one. The inner loop controls on the time basis of time slots. A power control command can be transmitted in
147
each time slot, i.e., 1500 commands are transmitted per second. An appropriate signalling channel is used for this purpose. The outer loop works on the time basis of frame lengths, thus 10ms intervals. The outer loop is always implemented in the Radio Network Controller (RNC) of the UTRAN. It is responsible for establishing the target value for the inner loop. The controlled variable of the power control in UMTS is the C/I (Carrierto-interference Ratio). The RNC sets a C/I target value and can change it at 10ms intervals. The receiver, irrespective of whether it is a base station or a mobile station, estimates the C/I actual value and using a prescribed algorithm generates a power control command for the transmitter. Taking into account conditions such as technological limitations, the receiver then changes its transmitting power. This mechanism is executed for all connections within the network. The interference power experienced by the receiver depends on many parameters, particularly on the traffic load in the network. The changing interference power and changing transmitter power of the transmitter produce a changeable C/I ratio that in turn leads to appropriate power control commands. The estimation of the C/I value uses a characteristic of CDMA systems, which can extract the desired signal from the aggregate signal of user and interference signals through correlation with the associated code sequence. This enables a relatively exact identification of the signal-to-interference ratio. Second-
148
generation TDMA/FDMA systems, such as GSM, do have this possibility. A GSM receiver cannot decide how much of the received power is a user signal or how much is an interference signal. Power control in these systems is therefore usually based on an estimation of the bit error rate. The Cfl target value depends on a multitude of factors and is determined by the RNC. The bit error rate, along with the spreading factor, the channel coding, the speed of the users and many other factors, has a considerable influence on the C/I target value. The capacity of the physical channels that transmit user and control data is always controlled at the same level, i.e., only one power control exists for each connection, even if several different physical channels are used. Although the C/I target value in the outer loop is adjusted in 10 ms intervals, the transmitter power can be altered in intervals of one time slot. On the uplink a period of three time slots, on the downlink a period of five time slots, is also possible. The transmitter power is matched in fixed steps, typically in steps of one decibel. Since the mobile station generates commands for changing the transmitter power of the base station, reference is also made to mobile-controlled power control. This procedure differs from GSM power control where the base station controls its own transmitter power on the basis of measured values supplied by the mobile station.
149
150
Figure 7.11: Structure and principles of the physical layer on the FDD uplink B, and the mobile station is notified of the amount of interference power and the C/I target value. The mobile station measures the carrier signal power and, using an instruction described in the standard, calculates the transmitter power it needs. Depending on the switching points selected within a time frame between uplink and downlink, the transmitter power can be changed once or even several times in a time frame, i.e., within 10ms. Power control on the downlink in TDD mode follows the same principle as in FDD mode with two closed loops interleaved in one another (compare Figure 7.10). For the reasons mentioned above, power control on the TDD downlink is considerably slower than on the uplink, for example, with a period of 10 ms. To summarise: on the TDD uplink the inner loop is open, the transmitter power is calculated by the mobile station on the basis of measured and received parameters. The downlink uses what is referred to as mobile-controlled closed loop power control, the same as in FDD mode. The control interval varies, depending on the division of timeslots on the uplink and the downlink. The power control stepsize on the downlink is IdB, 2dB or 3dB; no spacing is used on the uplink. According to the standard, the difference between the lowest and the highest transmitter power of the dedicated physical channels of a downlink time slot is
151
Figure 7.12: Handling of transport blocks on the FDD uplink and in TDD mode permitted to be a maximum of 20 dB to guarantee the functioning of receivers with joint detection.
152
Figure 7.13: Structure and principles of the physical layer on the FDD downlink for the duration of an entire time frame, which helps to prevent the type of audible interference that occurs in GSM [10]. Since each mobile station uses a specific interleaving code in FDD mode, the entire family of OVSF codes is available to it. Spreading codes and the spreading factor can therefore be changed at short intervals, i.e., every 10ms. The aim is that as few physical channels as possible should be occupied simultaneously (see Figure 7.11). In FDD Uplink (UL) and in TDD mode each transport block passes through the chain of protection and matching functions shown in Figure 7.12. First a check sum is added to each block for the detection of transmission errors that cannot be corrected by forward error correction. Depending on the size of the transport block, these checksums are 8 bits, 12 bits, 16 bits or 24 bits long; there is also the option of dispensing with the checksum. Data blocks of a certain size are then created through segmentation, attachment or padding as demanded by the appropriate channelling coding scheme. The channel coding technique can either be convolutional coding with the rate 1/2 or turbo coding with the rate 1/3. Uncoded transmission is also possible as an option. A data block is always transmitted in one or more time frames with the same rate. The number of bits in the coded block must therefore be a multiple of
153
the data set that can be transmitted within a time frame. If the length of the coded data block is not appropriate, the data block is equalised. The coded data blocks are then interleaved with a depth of at least one frame length. Each transport block of a transport channel passes through this chain of protection and matching functions. The coded data blocks are systematically increased or reduced through puncturing to match the resulting data streams to the transmission capacity of the physical channel(s). In the latter case of puncturing, individual bits of the coded data block are removed according to a prescribed algorithm. This lowers the effective coding rate. 7,5.2 FDD downlink The problem of audible interference is not relevant on the downlink. This is essentially due to two reasons: first, the distance between a base station and a noisy device is typically much greater than the same distance in an uplink situation. Second, there is less of a variance in the transmitter power of a base station because several users are typically served at the same time [10]. A base station uses a specific scrambling code (according to the standard up to three different scrambling codes are permitted). Consequently, the family of OVSF spreading codes is available only once to the physical layer on the
154
downlink. Since a base station communicates with more than one user, the number of codes available for communication with a user is limited. The selection or the changing of a spreading code directly affects the quantity of spreading codes available for other communication. Consequently, on the downlink the spreading code and, as a result, the spreading factor, of a physical channel is changed at intervals of more than 10 ms based on negotiation by Radio Resource Control (RRC). Since there is no commitment to transmit a burst in each slot of a downlink frame, the transmitter can be switched to mute at times when no data has to be transmitted over a transport channel. This technique, called Discontinuous Transmission (DTX), reduces interference and is used for voice transmission because users typically only really talk during half the talk time and otherwise are listening to the other person. Since, as a general rule, a physical channel is not exclusively allocated to a transport channel, DTX occurs through the insertion of so-called DTX indicators in the data stream at an appropriate place in the chain of channel protection and matching functions (see Figure 7.13). These DTX indicators are characters that exist in a data stream but are not transmitted. The data stream can be envisaged as a bipolar representation in this case. The insertion of zeros at the appropriate places in the data stream ensures that a modulator anticipating either a 4-1 or a -1 will not transmit anything in the case of a zero.
155
Figure 7.16: Mapping of transport channels to physical channels in FDD mode and TDD mode
The chain of protection and matching functions that each transport block passes through on the downlink is, as illustrated in Figure 7.14, very similar to the chain for the uplink. The attachment of the checksum and the channel coding are the same; the matching of the data set to the transmission capacity of the physical channels occurs on the downlink before the addition of the DTX indicators, the interleaving and the segmentation in equal-sized data blocks for transmission within a time frame. On the downlink the rate matching function is also responsible for the implementation of variable transmission rates when the spreading factor cannot be changed or cannot be changed quickly enough. On the uplink this is possible every 10ms; on the downlink it is only possible at considerably larger intervals. The physical layer on the downlink, which is implemented in Node B, contains partner instances of entities in the physical layers of several mobile stations. A Coded Composite Transport Channel (CCTrCH) exists for each dedicated connection on the downlink. Segmentation, second interleaving as well as mapping to physical channels occur separately for each connection (see Figure 7.15). A dedicated physical channel therefore also only contains the transport blocks of one connection.
156
7.5.3
Summary
Figure 7.16 summarises the functions of the physical layer in FDD and TDD modes. It is noticeable that the physical layers in TDD mode are structurally the same as those on the uplink in FDD mode, whereas individual functions, such as mapping to physical channels, are different in TDD and FDD mode based on the respective multiple-access technique used.
157
layer. At the same time signalling in the higher layers is transmitted over a second transport channel at intervals of 40ms in data blocks the length of 100 bits. In the physical layer the transport blocks pass through the chain of protection measures described above and are multiplexed and segmented accordingly so they can be transmitted over the same physical channel. Half a transport block of the first transport channel and a quarter of the second transport channel are transmitted per 10ms radio frame. Depending on the operating mode, TDD or FDD, physical channels that provide the required transmission capacity are selected. In FDD mode this could be a physical channel with the spreading factor 64, which transmits at a gross rate of 60 kbit/s. Since this transmission rate of the physical channel is higher than is necessary for the transport of coded transport blocks, the data set is artificially increased by 23% through repetition in the physical layer. On the other hand, a physical channel with the spreading factor 8 and one time slot per time frame could be selected in TDD mode. This channel can transmit at 48.8 kbit/s, which is too little for the coded transport blocks. Therefore, in this case 5% of the bits are removed systematically from the coded code blocks in the physical layer in order to match the gross data rate. The physical channels and corresponding gross transmission rates will be covered in detail in a later chapter.
158
7.7 Questions
7.1 Sketch multiple access in FDD and TDD mode of the UTRA radio interface (if possible, using numerical values). Mark the resource used by a subscriber. What are the transmission bandwidth, the chip rate and the maximum and minimal data rates on the UTRA radio interface (in FDD and TDD)? What are advantages and disadvantages of a multiple switching point configuration in TDD mode? What are the functions of the physical layer in the UTRA protocol stack? What are the reasons for using power control (PC) methods? How do the PC methods for UL and DL differ in FDD mode? How does power control differ between TDD and in FDD mode? What is the purpose of the outer control loop of FDD power control? What is a CCTrCH and what are its distinguishing characteristics? What does DTX stand for? How is the DTX function realised on the FDD DL and why are there differences compared to the FDD UL? In what way does the physical layer basically ensure that data can be transmitted over transport channels with variable data rates?
7.2
7.3 7.4 7.5 7.6 7.7 7.8 7.9 7.10 7.12 7.13
160
channels that every mobile station can receive. There are also common physical channels that are used for packet data transmission. The use of a common channel always requires separate addressing for the identification of sender and receiver. The physical layer maps transport channels to physical channels. Figure 8.3 shows the transport channels and their mapping to physical channels in FDD mode. In addition to physical channels, so-called indicators also exist in FDD mode. These are one or two-bit messages that are spread with a code sequence and transmitted at a specific time. Code, frequency and time characterise an indicator. Indicators are used for the notification and indication of certain events. For instance, a user is paged over an indicator. With 10ms long time frames per each 15 time slots, indicator channels are generally subject to a different time structure than dedicated physical channels. As is evident in Figure 8.3, not every transport channel can be mapped to a physical channel. The physical channels are as follows: Dedicated Physical Data Channel (DPDCH): The Uplink Dedicated Physical Data Channel (DPDCH) only exists on the uplink and is used to transmit user and signalling data from the higher layers. A layer 1 connection can have one, several or no DPDCH.
161
Dedicated Physical Control Channel (DPCCH): The Dedicated Physical Control Channel (DPCCH) is a physical channel that controls data transmission between partner entities of the physical layer for the uplink. Only information of the physical layer is transmitted over this channel. This includes power control commands, transport format indicators or pilot bits. Each layer 1 connection has exactly one DPCCH. Dedicated Physical Channel (DPCH): On the downlink the DPDCH and the DPCCH are implemented in a physical channel, the Dedicated Physical Channel (DPCH). Physical Random Access Channel (PRACH): Messages of the random access channel (RACH) are transmitted over the Physical Random Access Channel (PRACH). The RACH can be used for call set-up as well as for the transmission of small data packets. Physical Common Packet Channel (PCPCH): Packet data of the CPCH is transmitted over the Physical Common Packet Channel (PCPCH) through use of a Carrier Sense Multiple Access with Collision Detection (CSMA/CD) technique. Common Pilot Channel (CPICH): A Common Pilot Channel (CPICH) supports macro diversity on the downlink.
162
Common Control Physical Channel (CCPCH): Distribution services are implemented over a Common Control Physical Channel (CCPCH) on the downlink. The CCPCH separates into two subchannels: information of the BCH is transmitted over the Primary Common Control Physical Channel (P-CCPCH) and the FACH and PCH are mapped to the Secondary Common Control Physical Channel (SCCPCH). Synchronisation Channel (SCH): The Synchronisation Channel (SCH) is a downlink channel and is used in the search for cells and the synchronisation of mobile stations. It is divided into two subchannels, see Section 8.2.5. Physical Downlink Shared Channel (PDSCH): The Physical Downlink Shared Channel (PDSCH) is used to transmit data over the DSCH on the downlink. A DPCH is always allocated to the PDSCH. Several mobile stations share this channel. The four most important physical channels are explained in detail in the following sections: DPDCH, DPCCH, DCH and PRACH.
163
164
control command (increase, maintain or reduce power). There are six different possible configurations of a DPCCH burst, each differing by the length of the individual fields. For instance, the TFCI is valid for the duration of an entire frame and therefore only has to be transmitted once every 10ms. There is exactly one DPCCH for each connection on the uplink. One or several DPDCH can be used simultaneously for transmission. A DPCCH always has the spreading factor 256 and is always transmitted over the quadrature branch of modulation. If more than one DPDCH is used simultaneously, then all DPDCH must have the same spreading factor between four and 256, with a maximum of six DPDCH able to transmit at the same time. The DPDCHs are distributed as evenly as possible over the in-phase and quadrature branches. As pointed out in Section 6.13, BPSK modulation is also mentioned in connection with a DPDCH. Variable transmission rates can thus be implemented on the uplink by a variation of the spreading factor and through multicode transmission (see Figure 8.5). The coded, interleaved and multiplexed transport blocks are segmented in the physical layer and distributed over the DPDCHs. Each DPDCH data stream is spread with a spreading code Cd and then, based on their spreading factors, the individual physical channels are weighted against each other with the factor 0. The resulting chip streams are added, scrambled and transmitted over the in-phase or the quadrature branch of QPSK modulation. The gross bit transmission rates realisable with the various spreading factors for an individual DPDCH are shown in Figure 8.6. Depending on the spreading factor, a DPDCH burst transmits between 10 bits and 640 bits per slot. Based on 15 slots per frame and a frame duration of 10ms, with a maximum spreading factor of 256 this equates to a minimal transmission rate of 15kbit/s. The maximum transmission rate of a DPDCH is 960kbit/s; at 12.2kbit/s gross the standard-compliant reference channel for voice transmission has a spreading factor of 64 and a gross transmission rate of 60 kbit/s. The spreading factor 256 is used for the DPCCH. It is noticeable that the DPCCH, which is solely necessary for signalling between the physical layers, requires a transmission capacity of 15kbit/s. Of this amount, at least one bit per burst are power control commands, i.e., the power control constantly requires a transmission rate of at least 1.5kbit/s. Data rates of more than 960 kbit/s are only possible through the parallel use of several DPDCH. The set of OVSF codes is available one time only in the in-phase branch as well as in the quadrature branch of modulation, because a DPDCH is determined not only by code and frequency but also by the phase position of the carrier wave. A maximum of six DPDCH can be implemented simultaneously, which theoretically results in a maximum transmission rate of 5740kbit/s gross. However, the standard only describes mobile stations that can achieve a maximum gross transmission rate of 1920kbit/s.
165
166
Figure 8.6: Some possible transmission rates for a DPDCH Since two bits per symbol are transmitted on the downlink, the symbol rate always corresponds to half the bit rate. Figure 8.8 shows two bits being combined for each bit pair as well as the subsequent code spreading with the code Cch and scrambling with the scrambling code Sdi- If the transmission speed of an individual DPCH is not sufficient for transmitting a CCTrCH. then several DPCH can be operated in parallel. Such a parallel operation is also necessary on the downlink for the simultaneous communication with different mobile stations. With multicode transmission, which is the parallel use of several DPCH for a connection, layer 1 information between the physical layers only has to be exchanged once per connection and not once per DPCH. The respective fields of the DPCH burst are therefore only occupied in one physical channel; in all other channels they remain empty. In these time periods the transmitter power for the channel is zero (see Figure 8.9). If a CCTrCH is mapped to several DPCH. then these must have the same spreading factor. Since each physical channel also represents a transmitter power, the total power available to a connection using multicode transmission is higher according to the number of DPCH channels. For achieving even transmitter power timewise. the DPCCH fields of the DPCH burst can be sent with increased power (see Figure 8.9). Another reason is to increase the detection
167
Figure 8.7: Structure of DPCH security of the important layer 1 information, particularly of the power control commands. The maximum achievable transmission rates are shown, along with each appropriate burst configuration, in Figure 8.10, for each spreading factor of a DPCH on the FDD downlink. The spreading factor 4 results in a gross transmission rate of 1920kbit/s for the DPCH, with only 1872kbit/s allotted to transmission of the transport blocks. The minimum gross user data throughput of 6 kbit/s is achievable with the spreading factor 512; the reference configuration for voice transmission at 12.2 kbit/s gross provides a spreading factor of 128, corresponding to a gross user data rate of 51 kbit/s. The maximum achievable transmission rate for a connection depends among other things on a mobile station's ability to decode several DPCH at the same time. Since some spreading codes of the OVSF code are used by other physical channels, e.g., the CPICH, and since all DPCH must have the same spreading factor with multicode transmission, a maximum transmission rate is achievable with three parallel DPCH, each with a spreading factor of four. Such a configuration is also planned in the standard for the implementation of a 2 Mbit/s bearer service. It is easy to understand that a 2 Mbit/s bearer service, therefore a net user data rate of 2 Mbit/s, can only be realised with a code rate far higher than 1/3. The reason is that even with multicode transmission the gross rate is
168
lower than 6Mbit/s, and signalling also has to be transmitted along with the user data. A higher code rate automatically means less error protection, which only suffices with good propagation and interference conditions. The set of OVSF spreading codes is available only once to base stations that use a scrambling code. It is clear from the restrictions described in the selection of a spreading code from the code tree that the maximum overall transmission rate of a base station for user data is the same as the maximum transmission rate per connection, which is based on the mobile station having appropriate multicode capabilities. This means that all mobile stations in a cell share the maximum user data rate of around 2 Mbit/s. It is possible for more than one scrambling code to be used simultaneously on the downlink. Although this would increase the number of available OVSF codes, the orthogonality of the signals with different interleaving codes would be lost. 8.2.3 Compressed mode
In FDD mode, if a mobile station wants to switch to other frequency channels or to GSM, it has to receive and decode pilot signals on other frequency channels. A mobile station should not receive on different frequency channels
169
Figure 8.9: Multicode transmission on the FDD downlink simultaneously. Therefore, it must be able to interrupt the reception of its own UMTS signals without losing any information for the period while it is receiving the pilot signals on other frequencies. Here, the so-called compressed mode is used to create a transmission pause, as shown in Figure 8.11. The transmission pause can be up to seven time slots long and occur either within a time frame or symmetrically at the end of one frame and at the beginning of the next frame (see Figure 8.11). There are two possibilities to ensure that no information is lost in compressed mode: One is to halve the spreading factor before and after the transmission pause; the other is to reduce the data being transmitted through puncturing or through disposition in higher layers. 8.2.4 Random access procedure in FDD
The Physical Random Access Channel (PRACH) is used for random access on the uplink. Random access can occur at defined times called access slots. An access slot corresponds to the duration of 5120 chips, which means that an access slot is twice as long as a normal time slot - for instance, for a DPDCH burst. Fifteen access slots each defining an access channel exist within 20ms (see Figure 8.12). Random access is divided into a contention phase and a transmission phase. In the contention phase, using a Slotted ALOHA technique, mobile stations
170
Figure 8.10: Some possible transmission rates for a DPCH access a channel within an access slot by sending a code sequence, called a preamble. Per access slot there are 16 different preamble code sequences for each 4096 chips that mobile stations can use for collision-free access. This means that 16 parallel access channels are available per access slot. The contention phase is not only used so that mobile stations can assert themselves against other mobile stations in the Slotted ALOHA technique. More importantly, a type of power control called power ramping is carried out in the contention phase. A mobile station without a connection to a base station also does not have a DPCCH over which power control information can be exchanged. Power ramping is able to implement power control with avoidance of near-far effects. A mobile station that wants to access the PRACH selects an available access slot and then one of the 16 preamble sequences. The preamble is then transmitted at a lower transmitter power and an acknowledgement is awaited that is received over the Acquisition Indication Channel (AICH). If the mobile station does not receive an acknowledgement from the base station or if it receives a negative acknowledgement, it selects a new access slot and a new preamble and transmits both with a somewhat higher transmitter power (see Figure 8.12). This procedure is repeated for the maximum number of attempts until a positive acknowledgement is received.
171
In the case of a successful contention phase, i.e., a positive acknowledgement, the mobile station transmits its random access message that may be 10ms or 20ms long with a delay of three or four time slots. It is not necessary for all access slots available for random access to be available constantly in each cell. Instead the BCH notifies mobile stations of the appropriate cell configuration. This enables the allocation of different access slots to different classes of service so that a varying quality of service can be implemented for the services. The 10 ms or 20 ms long random access message consists of bursts, illustrated in Figure 8.13. Similar to data transmission over the DPDCH, 15 bursts are transmitted every 10 ms. The minimum spreading factor is 32 so that a maximum of 80 bits can be transmitted per burst. With a message length of 20 ms a total maximum of 2400 bits (gross) is therefore transmitted. The message bits are transmitted over the in-phase branch of the modulator. At the same time a spreading code with the spreading factor 256 is used to transmit pilot bits for channel assessment and TFCI information for the configuration of the physical layer of the receiver. As is the case with dedicated data transmission over the DPDCH/DPCCH, this control information is transmitted over the quadrature branch of the modulator.
172
Figure 8.13: Time and burst structure with data transmission over a PRACH used by the CPICH. This process takes place quickly because only 8 primary codes are defined in any code group. Once the primary scrambling code is established, the P-CCPCH in which the system and cell-specific information is transmitted can be read.
174
Common Control Physical Channel (CCPCH): Broadcast services in a cell are implemented on the downlink over a CCPCH. These services can be identified through an observation of the transport channels that are mapped to the CCPCH. The CCPCH is divided into a primary (P-CCPCH) and a secondary (S-CCPCH) subchannel. Transport blocks of the BCH are transmitted over the P-CCPCH; the P-CCPCH is used to broadcast system information within a cell. The S-CCPCH transmits the transport channels FACH and PCH and is thus used for power control and paging. Physical Random Access Channel (PRACH): Random access is carried out with the PRACH. The PRACH only exists on the uplink. Physical Uplink Shared Channel (PUSCH): The Physical Uplink Shared Channel (PUSCH) is a common channel, which means that it can be used by different mobile stations. User and control data is transmitted over it. Physical Downlink Shared Channel (PDSCH): The PDSCH is the counterpart to the PUSCH on the downlink. Paging Indication Channel (PICH): The Paging Indication Channel (PICH) carries out paging and can replace one or more subchannels for paging on the S-CCPCH.
Physical Node B Synchronisation Channel (PNBSCH): The Physical Node B Synchronisation Channel (PNBSCH) is used for mutual Node B synchronisation over the air. Figure 8.15 shows the three different burst types in TDD mode. A burstis exactly the length of one time slot and consists of four fields: two data fields, which are separated by a so-called midamble sequence, and a guard time, called a guard period (GP), which compensates for the differences in the runtimes of the signals of different mobile stations. The three burst types are distinguished by the length of the midamble and the length of the guard period, and, consequently, in the size of the data fields. The midamble is a training sequence and is particularly used for channel assessment and for the support of joint detection in the receiver. The longer the training sequence, the better the receiver can assess the channels of the different connections and the higher the number of the signals that can be synchronised in the receiver and received jointly. The guard period is needed to compensate for synchronisation errors and runtime differences. The shorter the guard period, the more precisely sender and receiver have to be synchronised. Burst type 1 has a long midamble and a short guard period. It is used both on the uplink and the downlink. A maximum of 16 bursts of type 1 may
176
be used simultaneously per slot and transmission direction, depending on the different spreading codes. To the benefit of the length of the data fields, burst type 2 has a shorter midamble. Since all physical channels of a cell are transmitted with perfect synchronisation on the downlink, a shorter midamble on the downlink is usually sufficient. Burst type 2 may only be used on the uplink when a maximum of four bursts per slot are being transmitted simultaneously. A short guard period is sufficient for compensating for runtime differences when an active connection exists between mobile and base station. A longer guard period is necessary for random access and for handover. This is carried out in burst type 3 at the expense of the length of the second data field. All three burst types can be used for dedicated data transmission over the DPCH and the PUSCH or Packet Data Channel (PDCH), although type 3 is reserved for the uplink. The P-CCPCH always uses type 1, the S-CCPCH type 1 or type 2. For the reasons mentioned above, the PRACH only uses burst type 3. The PICK and the SCH use different time and burst structures that are not further explained here. Figure 8.16 shows the transmission rates at the radio interface with the use of type 1 and type 2 bursts. The number of bits transmitted per time slot depends on the spreading factor as well as the size of the data fields in the respective bursts. A maximum bit rate of 6624kbit/s can be achieved within a time slot; with one burst per time frame this produces an average gross bit rate of 441.6kbit/s with a spreading factor of one. Higher transmission rates can only be realised through the use of multiple time slots in a time frame. The standard describes mobile stations that can occupy a maximum of nine time slots on the uplink and a maximum of twelve on the downlink. The maximum achievable gross bit rate is therefore 3974.4 kbit/s on the uplink and 5299.2 kbit/s on the downlink. It is clear that a bearer service with a net bit rate of 2 Mbit/s can only be realised on the downlink and only with a code rate of more than 1/3. The same restrictions that apply for such services in FDD mode also apply in TDD mode. The radio propagation environment in particular must permit the use of a higher code rate. The standard-compliant reference configuration for voice transmission with 12.2 kbit/s net provides for a spreading factor of eight: with burst type 1 this produces a gross bit rate of 48.8 kbit/s. Variable transmission rates can be achieved in three ways in TDD mode: through selection of a spreading factor, through the parallel transmission of several physical channels in one time slot or through the parallel transmission of several physical channels in several time slots of a frame. Figure 8.17 shows how higher data rates can be achieved through multicode or multislot operations.
177
Figure 8.16: Configurations and transmission rates of DPCH in TDD mode Even in TDD mode information about the transport format or the current transport format combination can be exchanged between communicating physical layers over a corresponding indicator (TFCI). Whether and when a TFCI is transmitted is negotiated between the communicating partners. In addition, a power control command (TPC) is also transmitted on the uplink. This information is transmitted in the data fields of a burst. The same as in FDD mode, TFCI and TPC apply to all physical channels of a connection and therefore do not have to be transmitted in all physical channels. In multicode transmission, TPC and TFCI are only transmitted in the data fields of a burst; in multslot transmission, they are only transmitted in the first burst that is transmitted within a time frame (see Figure 8.17). The TPC and TFCI information is always transmitted with a spreading factor of 16, irrespective of which spreading factor is being used within the data fields. As shown in Figure 8.18, the different physical channels are multiplexed within a time slot before modulation. Every two consecutive bits of a physical channel are combined into a complex-valued symbol that is spread with the actual spreading code of the physical channel and then scrambled with a cell-specific scrambling code. Figure 8.18 (top) shows the multiplexing on the uplink of two DPCH belonging to the same CCTrCH. The weighting factor G is used to carry out power control and therefore has the same effect on both data streams. Afterwards each branch is subject to the weighting 7, which matches
178
Figure 8.17: Multicode and multislot transmission in TDD mode the power of the individual physical channels according to their spreading factors. The two complex-valued data streams are added and the sum is weighted with the factor ft dependent on the actual transport format combination. The resulting signal is finally transmitted by means of QPSK modulation. If several CCTrCH exist on the uplink, then the same procedure is followed separately by the physical channels of the other CCTrCH. Physical channels are multiplexed on the downlink in a similar way to on the uplink, with the difference that each physical channel is only weighted on its own. All weighted complex-valued chip streams are added and the sum transmitted through QPSK modulation.
179
Fast Physical Access Channel (FPACH): The Fast Physical Access Channel (FPACH) is a downlink channel that is used to transmit the acknowledgement of a detected signature with timing and power level adjustment indication from the Node B to the UE. The FPACH uses spreading factor 16 with a single burst whose spreading code, training sequence and time slot position are configured by the network and signalled on the BCH. Dedicated Physical Synchronisation Channels (DwPCH, UpPCH): The Downlink Physical Synchronisation Channel (DwPCH) and the Uplink Physical Synchronisation Channel (UpPCH) are mapped to the DwPTS and the UpPTS, respectively, that exist in each sub-frame. They are used for downlink and uplink synchronisation. The synchronisation pattern sent in the DwPCH and UpPCH bursts are not spread. The DwPCH burst is transmitted at each sub-frame with an antenna which provides coverage for the whole cell. Figure 8.16 shows the transmission rates at the radio interface for the low chip rate option. The number of bits transmitted per time slot depends on the spreading factor as well as the number of bits used for e.g. TFCI or TPC information included in the data part of the burst. Figure 8.16 shows the maximum bit rate that can be achieved without transmitting control information like TFCI or TPC. In the downlink a maximum gross data rate of
180
Figure 8.19: Configurations and transmission rates of DPCH in low chip rate TDD mode 1257.6 kbit/s can be achieved with spreading factor 1 and the use of 6 time slots within each sub-frame. If, alternatively, the 8PSK Modulation is used, the maximum achievable transmission rate is 2534.4 kbit/s. In the uplink direction the maximum data rate is 1257.6 kbit/s using 6 time slots per sub-frame with spreading factor 1 and QPSK modulation. With 8PSK modulation this maximum value increases to 253.4 kbit/s. It is clear that a bearer service with a net bit rate of 2 Mbit/s cannot be realised with one frequency channel at a time. Following the standard-compliant reference configuration for voice transmission with 12.2 kbit/s net a two bursts with spreading factor 16 are used per sub-frame, both in the same time slot.
181
tion of the structure of the physical layer in the UTRA protocol stack. As already explained, data blocks called transport blocks are transmitted over the transport channels. Each transport block passes through a chain of security and matching functions, such as channel coding, interleaving and puncturing. Data blocks that are subject to the same coding, interleaving and matching can be multiplexed to channels called Coded Composite Transport Channel (CCTrCH). A CCTrCH is then mapped through segmentation to one or more physical channels. A physical channel can therefore transmit the signalling and user data of different transport channels simultaneously. Let us take another look at the example of the 12.2kbit/s reference channel for voice data transmission, as shown in Figure 8.21. In the Medium Access Control (MAC) layer of the UTRA protocol stack the two logical channels Dedicated Traffic Channel (DTCH) and Dedicated Control Channel (DCCH) are mapped to two dedicated transport channels, called Dedicated Channel (DCH), for the purpose of transmitting user and signalling data. The mapping takes place in such a way that transport blocks each with 244 bits of user data are transmitted over the first transport channel every 20ms and that transport blocks each the length of 100 bits are transmitted over the second transport channel every 40ms. Channel coding and rate matching for both transport channels are the same. This means that they can be multiplexed to a CCTrCH.
182
Figure 8.21: Mapping of 12.2 kbit/s reference channels to physical channels in FDD and TDD mode
No multicode or multislot transmission is required to transmit the data of the CCTrCH; one dedicated physical channel suffices. On the uplink hi FDD mode this is a DPCH with a type 1 burst per time frame and a spreading factor 8, and in FDD mode this is a DPDCH with the spreading factor 64. Parallel to the DPDCH pilot bits, TFCI and power control information is transmitted over a DPCCH. In TDD mode this takes place within the data fields of the DPCH burst. What is noticeable is that at 48.8 kbit/s the gross rate of the physical channel in TDD mode is, first, lower than that of the DPDCH in FDD mode and, second, also lower than required for the gross data after coding with rate 1/3. Therefore, 5% of the data ready for transmission has to be reduced through puncturing, thus through a systematic removal of bits. The gross bit rate of the physical channel in the FDD reference configuration is higher than the necessary bit rate. Therefore, through the repetition of bits around 23% more is transmitted than would be necessary on the CCTrCH. Figure 8.22 shows how the transport blocks of both DCH transport channels are mapped to the dedicated physical DPDCH on the FDD uplink. The illustration shows a time frame of 40ms. In this time frame two transport blocks each with 244 bits are transmitted over the first transport channel, one
183
Figure 8.22: Mapping of two DCH to a DPDCH in FDD mode (uplink), 12.2 kbit/s reference channel
every 20 ms. The second DCH delivers a transport block the length of 100 bits every 40ms. A checksum is attached to each transport block for error detection. Since the channel coder requires data blocks of a specific length, the lengths of the data blocks are lengthened - if required - after the attachment of the checksum. The channel coding with the rate 1/3 adds redundancy for forward-error correction to the data stream, thereby increasing the data quantity by the factor 3. Afterwards the bits of the resulting data blocks are systematically interleaved within a block. The coded data blocks are divided into equal-sized parts according to the transmission interval of the transport block. The 804 bits resulting from the 244 bit long transport blocks transmitted every 20ms are divided into two blocks of 402 bits each. Of these blocks each one is transmitted within a 10 ms time frame. In a similar way the data block resulting from the 100 bits of the second transport block is divided up over four successive time frames. As explained above, the transmission capacity of a DPDCH is larger than necessary according to the channel coding. The data quantity is therefore artificially increased through a repetition of bits before the data blocks are multiplexed serially to a CCTrCH. Over this CCTrCH 40 bits, or a total of
184
Figure 8.23: Mapping of two DCH to one DPCH in TDD mode (uplink), 12.2 kbit/s reference channel
600 bits per time frame, are transmitted in each time slot. The multiplexed data blocks are interleaved again before the spreading. In TDD mode transport channels are mapped in the same way as they are in FDD mode, as shown in Figure 8.23. However, the characteristics of physical channels are not the same in FDD mode and in TDD mode. As explained earlier, the quantity of data for transmission within a time frame after channel coding and interleaving is greater than the physical DPCH permits. Therefore, after the first interleaving bits are systematically removed from each data block through puncturing. The punctured data blocks are serially multiplexed to a CCTrCH and after spreading they are transmitted within four time frames. At the same time a type 1 burst is sent per time frame. In TDD low chip rate mode, channel coding, rate matching, frame size equalisation and interleaving are done in the same way as in the high chip rate mode. The main difference in the mapping of transport channels to physical channels in TDD low chip rate mode is the additional so-called sub-frame segmentation after the second interleaving. Since the radio frame in low chip rate TDD is subdivided into 2 sub-frames of 5 ms each, the basic mapping unit is a sub-frame. The rate matching procedure ensures that the data blocks of the CCTrCH have an even number of bits and can be segmented and mapped to two sub-frames.
185
Table 8.1 presents the different reference channels for the uplink in FDD mode. Such reference configurations are used for the conformity tests of mobile and base stations and can be interpreted as examples of how different net transmission rates can be realised. Signalling data with a net rate of 2.4kbit/s is always simultaneously transmitted with the user data over a transport channel. The transmission rate of a physical channel depends on the spreading factor. If a DPDCH is not sufficient, then several physical channels are used. Rate matching ensures that the data rate of the CCTrCH conforms with that of the physical channels.
186
8.6 Questions
8.1 8.2 8.3 8.4 8.5 8.6 8.7 8.8 8.9 8.10 8.11 8.12 What is a physical channel? How is a physical channel characterised in FDD mode? In TDD mode? What is the purpose of dedicated physical channels? What are shared physical channels used for? What is the difference between them? How many bits are transmitted on the uplink (UL) per frame over the DPDCH with a spreading factor SF = 64? How many bits are transmitted on the downlink (DL) per frame over the DPDCH with a spreading factor SF = 64? Why is the bit rate of a dedicated channel on the FDD UL twice as high as on the FDD DL when the same spreading factor is the same? What are the possibilities on the FDD uplink of achieving different transmission rates? Which conditions have to be maintained? What are the possibilities on the FDD downlink of achieving different transmission rates? Which conditions have to be maintained? Calculate the maximum transmission rate theoretically possible for a mobile station (MS) on the FDD uplink (DPDCH, gross). Calculate the maximum transmission rate theoretically possible for a base station (BS) on the FDD downlink (DPDCH, gross).
8.13 What is the maximum amount of data that can be transmitted during random access? How high is the transmission rate? 8.14 How many users can share a time slot in FDD mode? How many in TDD mode?
8.15 Calculate the maximum transmission rate possible for a mobile station (MS) on the TDD uplink (DPDCH, gross). 8.16 Calculate the maximum transmission rate possible for a base station (BS) on the TDD downlink (DPDCH, gross).
188
in the maximum coverage range. The load-dependent change in range is also referred to as cell breathing. Figure 9.2 shows the effect of cell breathing. In cellular CDMA networks intracell and intercell interference rises as traffic increases and the connection quality often degrades. Since this process - increase in traffic and interference - occurs slowly and not suddenly in real networks, one refers to a graceful degradation of quality of service for all users. If the traffic continues to increase, then the interference power does as well. What can occur if this process continues is that the available transmitter power of a transmitter is not sufficient to comply with the required C/I at the receiver due to the high radio field attenuation; communication is then no longer possible. Due to the high level of interference power, the only connections that can be maintained are those where the transmitters are able to guarantee the required C/I because of a closer proximity to the receiver and thus lower propagation attenuation. The useable area of a cell thus shrinks as traffic increases in a network. Since the traffic load in a network typically changes during the course of day, the cells of a CDMA network grow and shrink depending on the time of day. This change of cell size is called breathing. This breathing is essentially determined by the intracell interference. The intracell interference is in turn determined by the orthogonality of the spreading codes and the quality of the receiver. In UMTS FDD mode the spreading codes on the uplink are only
189
quasi-orthogonal; they are orthogonal on the downlink. In UMTS TDD mode orthogonal codes are used both on the uplink and on the downlink. The use of joint detection may be required with the orthogonal codes. Cell breathing is therefore particularly prevalent on the uplink of UMTS FDD mode. What plays a role in cell size is the attenuation that a signal can experience in radio propagation without the C/I ratio at the receiver falling below the required value, even in the case of maximum transmitter power. This maximum allowable propagation attenuation is also called link budget. Since the propagation attenuation is proportional to the propagation distance, the link budget ultimately determines the coverage range and thus the size of a cell. Figure 9.3 shows how the link budget is calculated for the 8 kbit/s voice service on the uplink in UMTS FDD mode [10]. With a maximum power of 21 dBm, the transmitter of the mobile station must be able to achieve the required C/I ratio of -20.9 dB at the receiver. The noise power is made up partly of thermal noise and partly of intracell and intercell interference. With a total interference of -97 dBm the user signal must therefore be received with at least the power of -117.9 dBm. Together with the antenna gain of mobile and base station of a total, for example, of 11 dB, the maximum allowable propagation attenuation is 149.9dB. It is clear from Figure 9.3 that the total interference power is directly entered as a summand in the calculation of the link budget (calculation in decibels).
190
The effect of cell breathing is evident here: a higher interference power reduces the link budget, i.e., the coverage range becomes smaller. The link budget for the downlink is calculated in a similar way; however, on the downlink all connections have to share the maximum transmitter power of the base station. On the downlink the transmitter power available per connection therefore depends on the interference power as well as on the number of connections per cell. The breathing of radio cells therefore is different on the uplink and on the downlink. Figure 9.4 shows the link budget as a function of traffic per cell, i.e., the number of connections per cell [10]. It is noticeable that the link budget reduces as the traffic increases due to the increase in interference power. When the traffic is low, the link budget is considerably lower on the uplink than on the downlink. The cell size is therefore determined by the uplink. When the traffic volume increases, then the link budget for the downlink falls more quickly than for the uplink since more and more connections have to share the transmitter power of the base station on the downlink and the interference power increases at the same time. As of a certain volume of traffic, the link budget, and consequently the cell size, is no longer determined by the uplink but instead by the downlink. This has to be taken into account in the planning of UMTS radio networks.
191
192
The capacity of a cell in a CDMA network essentially depends on the orthogonality and number of spreading codes used. Perfectly orthogonal codes guarantee that the different physical channels do not cause mutual interference. In this case, the traffic capacity of a CDMA cell is only determined by the number of mutually orthogonal codes. In normal cases where only a scrambling code is used on the downlink in UMTS FDD mode, the theoretical capacity is determined by the number of available OVSF spreading codes. There are exactly four spreading codes with the spreading factor four that are orthogonal to one another. If the spreading codes are only quasi-orthogonal, as is the case on the uplink of UMTS FDD mode, then cell capacity is determined by the interference this creates. Figure 9.6 clarifies the principle of calculating the capacity of a CDMA cell for the uplink. The transmitters of the mobile stations are controlled by the power control in such a way that in ideal circumstances the signals received at the base station all have the same power, thus preventing near-far effects. Of n transmitters in a cell, one of them thus always supplies the wanted signal, the remaining n 1 contribute to the interference power. As Figure 9.6 shows, the maximum user capacity per cell therefore now only depends on the minimum required C/I ratio.
193
In CDMA networks the interference power is a factor that determines the network capacity. CDMA networks are therefore also referred to as being interference-limited (see Chapter 2). The connection between user numbers and C/I is illustrated in Figure 9.7. The C/I at the receiver is spread over the number n of active senders in a cell. The more senders that are active in a cell, the higher is the interference power at the receiver and the smaller the C/I ratio. The C/I ratio required depends on various factors. What is particularly important for determining the required C/I ratio are the spreading factor, the channel coding and modulation as well as the tolerable residual bit error ratio. It is obvious from Figure 9.7 that with a required C/I of -20dB around 100 users can be active in an individual cell or that with 100 users only a C/I ratio of a maximum of -20 dB can be achieved. The calculation of cell capacity in a multicell mobile radio network has to take into account the intracell interference as well as the intercell interference and thermal noise (see Figure 9.8). In UMTS the spreading codes of different cells are only quasi-orthogonal to one another. All senders in co-channel cells thus produce intercell interference. The interference shown on the uplink in Figure 9.8 originates in the transmitters of the mobile stations. In a multicell situation the equation given can no longer simply be resolved based on the number n of active participants, because the intercell interference also
194
Figure 9.7: Carrier-to-interference ratio based on number of active users per cell
depends on the number of participants in the co-channel cells. However, the cell capacity can also be calculated for a multicell situation. It is easy to see that the cell capacity for a single-cell network is always larger than the cell capacity for a multicell one. Due to thermal noise and intercell interference, the cell capacity in multicell networks is only about half that of single-cell networks that have no intercell interference or thermal noise.
195
link channel of the mobile station on the uplink. Through the soft handover a mobile station maintains connections with several base stations during the handover phase; there is no sudden changeover of physical channel as is familiar from GSM. The handover is therefore referred to as a soft handover. If the mobile station does not change cells but only the sector of a cell during handover, the handover is referred to as a softer handover. In principle a softer handover functions the same as a soft handover (see Figure 4.13). The hard handover is the one used in UMTS TDD mode. The physical channels of a connection become hard, i.e., changed from one time frame to another. The simultaneous reception of different physical channels in a soft handover results in additional computation for a mobile station in a CDMA network. If the physical channels also had a different frequency channel, the calculation effort, especially in the hardware, would be incomparably higher. Therefore, TDMA/FDMA systems only use the hard handover. Inter-frequency handovers, which require a change of frequency channel, are also implemented by a hard handover in UMTS FDD mode, just like the UMTS handover according to GSM. An active mobile station constantly measures different physical parameters, such as the received signal strength of the pilot channels of neighbouring cells. The results of such measurements are transmitted to the RNC and used there
196
Figure 9.9: Functioning of a soft handover to control the soft handover. Figure 9.9 shows an example of a soft handover based on the characteristics of the received signal strength measured by a mobile station for the pilot signals of three cells. The mobile station first only communicates with base station 1. If the mobile station starts to move in the direction of base station 2, then the received signal strength for the CPICH of base station 2 increases. If the received signal strengths for CPICH 1 and CPICH 2 differ by a maximum of an amount called the handover margin during the period AT, a connection is also established to the second base station. The mobile station thus finds itself in a soft handover. The connection to the first base station is then cleared when the received signal strength of CPICH 1 is smaller by a certain amount than that of CPICH 2 or if reception by another base station is considerably better. In the latter case, the connection to base station 1 is cleared and one established to base station 3 (see Figure 9.9). Due to the effects of shadowing, a mobile station on a cell boundary will receive different base stations with varying signal strength at short time intervals. The margins shown in Figure 9.9 that cause a type of hysteresis effect during cell changing are used to prevent so-called pingpong handovers in which a frequent switching back and forth occurs between different cells. Although soft handovers are associated with additional complexity in terms of computing and organisation for the mobile station and in the radio access
191
network, they represent an important mechanism for the capacity of cellular CDMA networks (see Figure 9.10). When a mobile station is provided with radio coverage by several base stations, there is macro diversity that reduces the effects of slow fading as well as fast fading. Since shadowing is generally only correlated weakly to different base stations, macro diversity increases the probability that a sufficiently strong connection can be maintained to at least one base station. The fast fading on the connections to different base stations is also basically uncorrelated. It is this lower sensitivity compared to fast fading that can be used to reduce the required carrier-to-interference ratio that is maintained through power control. The reason is that a reduction is possible in the protection margin contained in the link budget calculation for fast fading. During a soft handover the mobile station receives power control commands from all base stations involved in the handover. For communication it suffices if only one base station receives the signals of the mobile station with sufficient strength. The mobile station therefore adjusts its transmitter power downward so long until it receives a command to reduce its transmitter power from at least one base station. If the transmitter power were only controlled by one base station, there would be the danger of a mobile station finding itself in the radio coverage area of a neighbouring cell, but not being controlled by it. As explained earlier, precise power control is necessary to counter near-far
198
effects. This means that the base station to which the lowest possible propagation attenuation exists should be the one to control the mobile station. To summarise what was explained earlier: a low required C/I ratio and a reduction in interference power through precise power control equate to increased capacity in a radio network.
9.5 Questions
The values presented in Figure 9.3 for calculating a sample link budget for the 8kbit/s voice service on the FDD uplink should be used as the basis for your responses to the following questions. Other examples of coverage range calculations can be found in [10]. 9.1 9.2 9.3 9.4 Why is strong co-channel interference characteristic of CDMA systems? Why is efficient communication possible despite the strong co-channel interference? What is the maximum range of an FDD cell on the uplink? The path loss (PL) is calculated on the basis of PL = 135 4- 35.2 - Iog10(fl/[km]). An interference power of -98dBm (without noise) exists for the maximum load established by the network operator. How large can the network operator plan its cells? What size does a cell shrink to if the interference increases by 3dB? A GSM network operator wants to equip its GSM locations additionally with UTRA FDD base stations. How large are the GSM/UTRA cells? The link budget for the GSM cells is 154dB. How high can the interference power be on the FDD UL so that the same cell size can be achieved as with a GSM system? Explain why on the FDD UL it is the transmission direction that determines cell size when the usage is low. Why does the downlink determine the coverage range when usage increases? What is the difference between a soft handover and a softer handover? Which handover is typically an inter-controller or an intra-controller handover?
9.5 9.6
9.7 9.8
9.9 9.10
9.11 Why are soft handovers necessary in CDMA networks? What role does the near-far effect play in this connection with a soft handover? 9.12 How is a soft handover typically implemented on the uplink? On the downlink? Briefly explain how it functions.
199
What determines the number of base stations involved in a soft handover? Allocate soft and hard handovers on the basis of implementability: (a) UTRA FDD - UTRA - FDD, intra-cell, intra-frequency (b) UTRA FDD - UTRA - FDD, inter-cell, intra-frequency (c) UTRA FDD - UTRA - FDD, inter-cell, inter-frequency (d) UTRA FDD - GSM
202
Figure 10.1: Concept of the Virtual Home Environment (VHE) The selection of services is filed in the user profile of the particular user. In addition to general data, the user profile can also include personal interests and similar data. For example, every day at 17:00 hours on normal working days the user wants an overview of the traffic situation in the city in order to plan his trip home from work. The subscribed services could be managed on a situation-dependent basis in the user profile. When executed, the services access the user profile and adapt individually to the customer's requirements. The services are stored and executed in a so-called home environment, an infrastructure for the provision of these services. This logical structure does not have to be limited to the fixed network infrastructure and can also include other parts, such as the UE or the USIM. Although a network operator can set up a 3G network, but does not necessarily have all information requested by his users at his disposal, he can enter into agreements with third parties, called Value-Added Service Providers, and offer them interfaces to his execution environments. These providers can then make their own content available to users over these interfaces. A bank that provides its customers with access to their accounts or deposits over a Personal Service Environment (PSE) would be a provider of value-added services in this case. Since access to the personal service environment is integrated, a customer can carry out financial transactions with his or her bank from any location and with any terminal.
203
The interaction of these personalised services and information about the requirements of a user is called the Personal Service Environment (PSE). Furthermore, users can use information from independent service providers at any time. The network operator has no influence on these services since the provider of the services is not in a contractual agreement with the network operator. As a result, these services are normally not personalised by the PSE. The basic architecture shown in Figure 10.3 is used in the provision of personalised services: User-specific information is stored in a data storage unit DAT. This can be an account number or the destination call number for situationdependent call forwarding. The code for the program providing the service is filed in service programme storage PRG. At runtime the program is loaded together with the data into the execution environment EXE. This execution environment has well-defined interfaces for communication with the outside world. Special commands are usually available for reloading other data from data and program storage or for communicating with the user via the Man-Machine-
204
Interface (MMI). These commands are combined in the Service API that programs can access during runtime. The actual communication routines are contained in the communication control block (CoC). This refers to the control of the communications functions of the node on which the program is running. The program can control the communication at runtime over an open interface, called the Network API. For example, the user selects the service "Selective availability". The relevant program is loaded and started in the execution environment. Depending on the time of day, it forwards incoming calls to the user's mobile number, office number or private telephone number. These numbers are filed in the data storage unit DAT and are queried via the Service API. The Network API, which provides the call forwarding function, handles the programming of the call forwarding. Due to the open interfaces and the defined execution environment, the programmer of the application can develop the service independent of the actual hardware and software running on the node. This basic architecture is applied to all components involved in the service execution (see Figure 10.4). It is found in the home network, in the visited network, in the terminal and in the USIM. The RAN is mainly transparent
205
for the provision of these higher services (commands exist at the lu-Interface to determine the position of a mobile station for location-based services). Network nodes in the home network and in the visited network can contain data and program storage as well as an execution environment for programs. The architecture for program execution in a home network is described below under the keyword OS A. Services subscribed to in the home network can be loaded into network nodes in the visited network using the Customised Application of Mobile Enhanced Logic (CAMEL) concept. This enables the user to have access to his or her personalised Intelligent Network (IN)-services irrespective of the network currently being used [31, 32]. CAMEL is already used in current GSM implementations, i.e. for the provision of roaming to prepaid users. A terminal can also be used to provide services. In addition to an execution environment and storage for programs and data, it offers communication control functions and a user interface for data input and output. Services can even be provided over the USIM as well. New SIM cards are able to dynamically download Java programs from the network over-the-air and execute them within their CPU. These programs can also be stored on the SIM card by the network operator before the card is issued to the customer. For data input and output and for communication control, the USIM uses a defined interface to access the functions of the terminal (SIM Application Toolkit (SAT)).
206
Some card vendors are already offering full-value JAVA cards with 32 or even 64 KBytes of usable memory. Current GSM networks are already partially supporting program execution on SIM cards and in terminals (see Figure 10.5). With WAP, programs can be transferred from the network to a terminal, then become executed within the WAP browser in the terminal and enable access to personalised services. Although WAP has not been a real commercial success so far, the underlying architecture is open and flexible. The main reason why WAP has not been successful is attributed to the fact that it was promoted as providing full mobile access to the Internet and raised high expectations that the technology has not yet been able to fulfil. Moreover, the circuit-switched WAP access offered when WAP was introduced makes little sense because of the timebased billing. Finally, because the conent representation is incompatible with HTML, less content is available than with the Internet. Some new services like Multimedia Message Service (MMS), which is seen by many as the worthy successor to SMS, are based on the WAP protocols Wireless Transaction Protocol (WTP) and Wireless Session Protocol (WSP). The MMS services currently offered are based on GPRS, but as UMTS becomes available, the new bearer services can be used as well.
10.2 MExE
207
Figure 10.5: Example of a VHE service MExE can currently support two types of programmes: Java and WAP applications. This list may be expanded later to include other languages. MExe programs belong to one of currently three classmarks: MExE classmark 1 - WAP Environment: Applications based on this MExE classmark use mandatory features of the WAP standard and can run on nearly any phone. Since WAP phones usually have limited display capabilities, these applications often have a limited user interface. MExE classmark 2 - Personal Java: This environment is based on the Java 2 Standard Edition and provides the applications with a full-scale Java environment. The runtime environment is extended by a software API to support telephony control, messaging, address book modifications, etc. Classmark 2 seems to provide the most powerful runtime environment. MExe classmark 3 - Java 2 Micro Edition: The third classmark uses the special Java version J2ME developed for small and portable devices. Again, special APIs to access telephony functions have been added.
208
209
210
Of course, customers can download applications onto their terminals directly from the Internet or from other service providers. However, there is no guarantee then that an application will function as it should and it could even cause damage. Some experts are already talking boldly about "mobile phone viruses". Decoupling applications development from network operations over an open interface is a very important factor for commercial success, because it makes it easier for external companies to develop new services for UMTS. This approach resembles the success of the PC architecture that has also become very popular due to its openness and has made many alternative proprietary systems redundant. However, the approach is not uncontroversial. The Session Initiation Protocol (SIP] presented in Section 4.10.1 also enables the open development of new services, in this case even beyond the Internet and UMTS. Whereas many telecommunications firms support OSA, SIP finds support in the IT camp. Because of this competition many companies are still undecided as to which system to implement.
211
212
Figure 10.10: Some bearer services in UMTS Supplementary services were introduced in fixed networks with the migration to the ISDN and are already available in GSM. Visionaries see value-added services as a possibility for covering the immense cost of UMTS: Value-added services are services that are often taken over by external value-added service providers and that increase the added value created by teleservices. Value-added services could include the automatic transmission of traffic jam warnings by terminals in telematic services. In the future terminals will take over more and more of the functions currently being handled by other devices. For example, network operators are considering offering payment functions with UMTS. All these new services are refining simple telecommunications services into a value-added service. No exact bearer services are defined in the UMTS standard. Although the standard includes a number of reference configurations, the radio interface can be configured very flexibly. The possibilities extend from very low bit rates to data rates exceeding 1 Mbit/s with varying quality of service parameters. Figure 10.10 shows some of the quality of service parameters that define a bearer service. The label Long Constraint Delay (LCD) stands for long constrained delay data (circuit-switched) and refers to continuously transmitted data, such as video streams and audio data. Transmission using Unconstrained Delay Data (UDD) (unconstrained delay data - packet switched] achieves a
213
high level of data integrity because defective data packets are detected and requested again over an Automatic Repeat Request (ARQ) technique. The applications and users of future wireless services are shown in Figure 10.11. Humans and machines will become senders as well as recepients of large data volumes when they start using real-time and other applications, Wireless communication between machines is expected to produce more message traffic than the communication initiated by people or directed towards people. The restrictions that exist today in terms of quality of service, characterised by low throughput, high transmission delays and bit error probability, will largely be eliminated. This will be possible due to wireless access with an average (2Mbit/s) to high (> 25Mbit/s) transmission rate, comparable to the fixed network. Support will be provided for multimedia (MM) services and applications in the office, in the home and in high-traffic public service areas; support for these high data rates will even be available in a later stage for moving terminals (in vehicles) [11]. The different telecommunications networks that form the basis for such services as transport platforms appear at the bottom of Figure 10.12. These services include ISDN, broadband ISDN, Metropolitan Area Networks (city networks), Local Area Networks (inside buildings), broadband distributed networks (cable television distributed networks that in the future will transmit
214
bidirectionally) and cellular mobile and satellite radio networks. In the upper part of the figure is a list of examples of representative MM applications that are run on workplace computers (called service platforms). Recent research shows that the support of Multimedia (MM) services for moving and mobile users can be met for many applications through a cost-effective solution based on the principle of cellular networks. The mobile radio network functions as a back-up in case a broadband network is not available but when there is an immediate need for important communication and cost plays a only secondary role. The communication would involve voice and important data connection with low bit rates. This system is described in Section 11.9. The content of MM communication between people and/or machines can be categorised and divided into four sectors: Information Production data Communication Entertainment
The users of the services listed in Figure 10.13 can also be roughly broken down into private individuals, self-employed people (small office, home office}, small to medium-sized organisations and large organisations. Some of these services or applications will most likely generate the most traffic over the coming years, namely through network-supported trade between organisations and customers (electronic commerce, business-to-customer}, network-supported
215
banking and market transactions (telebcmkmg, telebrokering), Internet access, added-value services on the basis of short-message services in GSM) and browser programs suitable for mobile terminals, e.g., the Wireless Application Protocol of the GSM/GPRS service or UMTS, as well as controlled access to digital content. More importance will also be given to the uniform support of different communications services, such as the telephone, fax, data transmission, paging, email and mobile radio. This will be provided by platforms that support uniform communications services (unified messaging). The users of these services will for the most part be from the groups shown in Figure 10.13. The size of the ovals represents the scope of the data quantities involved. In addition to the services and applications already mentioned, the other ones shown in Figure 10.12 are also of interest. These sectors are expected to make an important contribution to the use of wireless or mobile radio networks in the future. Even a small GSM mobile terminal is capable of supporting a wealth of services and applications, as shown in Figure 10.14. Internet-related telecommunications services contribute 30% of the revenue; access services contribute a further 13%. Location-based services equate to 15%, the same level as the network-supported banking business. The remaining anticipated revenue is distributed over smaller segments such as simple information services, mobile
216
Figure 10.14: Breakdown of income from mobile data applications offices, building and home automation via telemetry, traffic telematics, games and online payment systems.
10.7 Questions
217
coding levels. The voice data is delivered to the codec as PCM-coded speech with 8000 samples/s. On the basis of Voice Activity Detection (VAD), the codec recognises whether a user currently talks. If there is no voice data to send, Silence Descriptor (SID) frames with a data rate of 1.8kbit/s are transmitted. The decoder generates synthetic comfort noise from the data received to prevent the receiver from having the impression that the connection has been cut off. The general expectation is that the new codec will provide a considerable improvement to voice quality, even under difficult conditions.
10.7 Questions
10.1 10.2 10.3 10.4 10.5 10.6 10.7 10.8 Name two advantages the Virtual Home Environment (VHE) offers users. Describe the four elements of the VHE basic architecture and explain how they interact. Why are defined and open interfaces important? Explain the basic difference between SAT and MexE. Give two examples each of a bearer service, a teleservice, a supplementary service and a value-added service. Name three parameters that describe a bearer service. Explain why value-added services can possibly make the high investment in UMTS profitable. What is the maximum data rate needed by an AMR speech codec? What is the minimum data rate needed? With which scanning rate is PCM-coded voice information supplied to the AMR codec?
220
that for a communication relationship multihop transmissions will be used via radio in order to connect two terminals not located in the radio range. Multihop systems are being mentioned, meaning the use of several sequential radio relay nodes providing links for a communication connection. It is not always possible to plan the route of message flow and the participating terminals. Ad-hoc networks allow the operation of self-organising networks that configure themselves when activated and then permit communication between participating terminals (plug-and-play). Ad-hoc network capabilities can, for example, be useful in the organisation of multihop networks.
There is a considerable difference between the speeds of movement supported by the different radio standards; the multiplex transmission rate available to all terminals at the radio interface to a base station is also very different (see Figure 11.2). The 2G GSM system and its further developments GPRS and EDGE (Enhanced Data Rates for GSM Evolution) cover all speeds of movement but only offer (depending on the modulation and coding scheme) aggregate data rates between 80kbit/s (GSM) or 128kbit/s (GPRS) or 384kbit/s (EDGE) at the radio interface. The development of cellular mobile radio networks from 2G to 3G and then to 4G systems shows a constant growth in the number of radio standards. With
221
2G there were only four standards worldwide, namely the two very closely related systems TDMA (the USA) and PDC (Japan), GSM (Europe but introduced worldwide) and the cdma2000 system using code-spreading techniques (the USA). The last two systems were actually further developments that evolved into the 2.5th generation (evolved 2G). With 3G systems, which are identified as International Mobile Telecommunications at 2000 MHz (IMT2000) systems by the International Telecommunications Union (ITU), there are six mobile radio standards (of which only three main ones are represented in Figure 11.3) and two classes of W-LANs. cdma2000 1XEV is a further development of the corresponding 2G system with higher transmission rates. The designation Wideband Code Division Multiple Access (WCDMA) conceals the two UMTS radio standards as well as TD-SCDMA, which is the 3G standard favoured by China and has a close similarity to the Time Division - Code Division Multiple Access (TD-CDMA) UMTS standard. EDGE is the more important of the two IMT-2000 TDMAbased standards; the other one is called DECT (both were developed in Europe) . It is obvious that 3G systems will also be undergoing further development. The integration of W-LANs in mobile radio systems will enable transmission rates of up to 25 Mbit/s at the air interface. 4G is represented as a research area here, which will comprise, among other things, the Mobile Broad-
222
band System (4/4060 GHz), so-called ad-hoc networks and probably a new family of mobile radio standards that will probably be transmitting using coded multi-carrier modulation (coded Orthogonal Frequency Division Multiplex (OFDM)). The aim of the further development is to improve the quality of service for wireless and mobile communication. Instead of ultimate resolutions being provided for all problems relating to existing systems, 5G systems will be appearing on the horizon in the years beyond 2010. A look at Figure 11.3 also highlights the fact that more radio standards have been generated than ever before to implement the same applications and that this trend will probably continue. The reason is that the competitive market is looking for the best solutions seen from applications. Some of the facts highlight this: The original intention of the IMT-2000 initiative to produce a uniform radio standard worldwide was not achieved and also will not be achieved in the future. New applications and the frequency bands allocated to them will require new radio standards that are adapted to the respective purpose. This will result in an increase in the number of radio standards. The frequency range in the spectrum to be covered by 4G systems is very large and it is not likely that a single radio terminal will be able
to cover it in the foreseeable future. The size of terminal this would require and its power usage would not be in line with specific demands (as small as possible with a maximum battery life). The 3G radio standards are a temporary solution that will be replaced by improved systems. One of the greatest challenges in the development of mobile radio standards is and will continue to be the provision of higher transmission rates per user. This goal is trongly dependent on the technology progress towards higher processing power and lower power consumption. Of course the prerequisite for meeting this challenge is the availability of the necessary spectrum so that such systems can actually be implemented. The table in Figure 11.4 indicates the time required to transmit a sampling of media objects of different dimensions - such as a Web page, the content of a book and a video - over different mobile radio systems. It is clear from the values given that mobile radio systems such as (E)GPRS and UMTS are unable to support continuous media with moving terminals, even with the assumption of the unrealistically high transmission rates given here. Figure 11.5 schematically shows the anticipated development of terminals, radio standards, standards for fixed networks of mobile radio networks (so-called core networks) and applications for mobile use over the period of time. Ter-
224
Figure 11.4: Time requirement for the transmission of media objects over different mobile radio systems
minals have developed from single-band to multi-band devices (e.g., initially a GSM terminal only operated at 900 MHz, later it also had to be able to operate in the 1800/1900MHz band). Their development will have to continue in the direction of multi-standard devices to adapt to the different radio interfaces of competing operators. This is the expectation of 3G and 4G systems. Third-generation radio interfaces will soon be transformed into (evolved) 3G+ interfaces that integrate cellular and broadcasting services or become modified 3G systems that can provide optimal support to services with asymmetrical message traffic. The mobile radio core network will be developed so that it can support packetoriented high bit rate data and multimedia applications, with more advanced Internet protocols eventually being used in combination with Asynchronous Transfer Mode (ATM) technology. Multimedia applications that transmit high bit rates will be supported by a combination of the highest capacity radio interfaces. All services familiar from the various wireless and mobile radio systems will be carried over the different radio interfaces in order to achieve unrestricted connection between user terminals and partner terminals over radio.
225
Figure 11.5: Anticipated development of terminals, radio standards and fixed network standards of mobile radio networks
226
Figure 11.6: Advance calculation of future requirements for frequency bandwidth (sources: UMTS-Forum, Report No. 6 and ITU-R)
A service called High Speed Downlink Packet Access (HSDPA) has recently been standardised as part of UMTS release 5. It allows the application of adaptive modulation techniques to go beyond QPSK modulation, thereby increasing the number of bits per symbol transmitted from two to three, four and even six under good, better and excellent receive conditions, respectively [21].
227
new terminals also have to support GSM/GPRS in two frequency bands since this is the only standard available throughout the countries and worldwide. As a result of the high licensing fees, infrastructure costs and subsidies in Europe, the expectation is that services requiring a high transmission rate will be too expensive for the normal user. Consequently, the focus will be more on services that manage with low amounts of data and data transmission rates per use occurrence but can be charged at a high tariff similar to or even beyond that of a voice minute. Examples of this include the short-message service of GSM and the I-mode service of NTT DoCoMo. Especially, Wireless Application Protocol (WAP)-based services are a big hope to pay back the investments made by the operators. The current allocation of spectrum by the World Administrative Radio Conference (WARC)-92 (1992 session) for 3G systems is not sufficient to provide the spectrum capacity required to implement services with mean or even higher required data rates for a significant number of simultaneous users. Around 200 MHz to 400 MHz of additional spectrum, used in pico-cellular cell structures, is required to achieve the required capacity. In all probability such a broad frequency band is only available in the spectrum above 2.69 GHz, therefore above the IMT-2000 extension bands as defined by WRC-2000 (see Figure 3.17). With the knowledge that spectrum for mobile radio services with mean to high transmission rates is scarce, WRC-92 also provided for spectrum between 5 GHz and 6 GHz for wireless broadband systems (W-LANs) (see Figure 11.7). It is proposed that this spectrum be usable without a licence. The size of this spectrum is 455 MHz in Europe, 300MHz in the USA and 100 MHz in Japan. This allocation of spectrum will greatly accelerate the breakthrough needed for wireless Internet access. The first standards and associated products for wireless access already exist, e.g., Institute for Electrical and Electronics Engineers (IEEE) 802.11(b), a system that transmits in the Industrial, Scientific and Medical (ISM) band at 2.4GHz (79MHz bandwidth), as well as IEEE 802.lla and High Performance Radio Local Area Network Type 2 (HiperLAN/2) that are standardised for the 5 GHz range and will be available as products starting in 2002. The W-LAN spectrum was partly planned for indoor radio coverage with a transmitter power of 200 mW Equivalent Isotropic Radiated Power (EIRP) and partly for the supply of outdoor coverage with 1W EIRP. Mobile radio is characterised by its need to provide radio coverage to large geographical areas for use by highly mobile users (in vehicles, trains). The costs for this coverage should be within a limit that will result in an acceptance of the services provided. All spectrum allocations for mobile radio systems above 1 GHz (= 1000MHz) are considered unfavourable for mobile radio use because the attenuation of
228
the radio waves when propagating through obstacles increases with frequency, and diffraction as a prerequisite for unbroken illumination, also of shadowed areas, is clearly smaller. (The degradations of propagation characteristics are naturally not abrupt but the radio propagation becomes more and more unfavourable as the frequency increases.) Allocations above 2 GHz are only acceptable as a compromise when no other ranges in the spectrum are available or can be freed up. Allocations above 2.5 GHz (as planned for the IMT2000 extension band) are unreasonable for rural areas and can only be used elsewhere if a very high investment is made in infrastructure. Another problem with the licensing for IMT-2000 systems in some countries is that the licensing fees themselves are much too high (and there are many reasons for this). As a result, the competition that was intended to provide reasonably priced mobile radio services has effectively been eliminated, contrary to what the political players claimed. At the same time 3G technology in Europe has suffered a setback that can never be made good again: its sluggish introduction in Europe is providing manufacturers of 3G systems other than UMTS with an advantage, giving them a head start in unit production and thus enabling them to establish themselves successfully on the world market. Due to the greed of the governments of Great Britain and Germany (two of the most important markets in Europe), UMTS most likely will have difficulties in repeating the global success of GSM. Yet down the road it will be
229
the engineers who are unfairly forced to take the blame for not having the capabilities to compete in the marketplace.
Band IV/V: 470-862 MHz (of which 838-862 MHz is used by the military; 368 MHz) Calculated in the value of UMTS licensing costs, this equates to a value of 144 billion Euros. The situation is quite similar in other countries in Europe. The economic benefit of the allocation of TV spectrum is very low. It bears no relationship to its market value (even if one were to rate it much lower today). At one time 100% of all TV users received coverage from terrestrial TV; today, in most countries this figure is very low now, e.g. 8% in Germany, most users now receive their TV programmes by cable or satellite. Since a very high percentage of TV users in many countries have decided against using the terrestrial TV service, TV operators cannot continue to retain their excessive spectrum allocation. This spectrum would be optimally suitable for mobile radio. Since there are large areas in all countries where only some programmes can be received terrestrially, large parts of the occupied TV spectrum are wasted, even considering the conversion to digital television. The regional public and private broadcasting companies claim within the framework of their role of performing a public service to have the right to the continued free use of the terrestrial spectrum or the corresponding TV channels used in the distribution network as part of the basis of their existence. The broadcasting companies and the respective regional politicians have a mutual interest in one another. The system appears to be relatively
230
stable, even if the reason for its existence has largely become invalid. The realities of the market seem to be ignored here. As part of its role to ensure the shaping of free public opinion, it was decided about 50 years ago that all citizens must be served by radio broadcasting. The concept of radio broadcasting also includes the television service. The federal government meets this demand by providing radio spectrum free of charge to the appropriate institutions. After a period of transition (agreed between the federal states) during which analogue and digital TV would coexist, the digitalisation of television would render around 35-50% of the currently allocated spectrum unnecessary. The other possibility is to introduce more terrestrial broadcast programmes and fill up the spectrum freed by digitalisation of the service. The introduction of broadcast services with digital content accessible over the Internet planned by the broadcasting companies would be considerable competition for mobile radio operators. Many of the data applications expected contain content that provides subscribers with information about current events, e.g., the stock market and ongoing developments, sports results and sports tables and lottery numbers. Such content can easily be implemented through broadcast services communication and the demand for this kind of information can be served by mobile radio operators against fees per call. Figure 11.8 shows the current use of television bands in the spectrum between 470 MHz and 862 MHz that is of particular interest for mobile radio, this is the range provided by the ITU for these services. A part of the television band is used for DVB-T testing. In some countries the television band actually ends at below 862 MHz. Generally speaking, organisations responsible for public services (this does not include the broadcasting companies) have more than 30% of the entire spectrum under their control along with the benefit of free licensing. The three alternative scenarios 1 to 3 shown were developed by two research projects [4, 5] that are researching possibilities for the future use of the television band for mobile radio. The currently popular view is to integrate both services into a joint system with television bands planned to implement a high capacity downlink for asymmetric mobile radio services. There are different ways in which this is possible: Use of digital television (Digital Video Broadcasting Terrestrial (DVBT)) on the downlink to supplement UMTS services there. This requires a common coordination control in an integrated mobile radio and distribution communication system, which is just now being studied. Time-shared operation of mobile radio and broadcast services on the same TV channel. In scenario 1 channels of the band used by the military 814-862 MHz operate this way for mobile radio.
231
In scenario 2 a public mobile radio network is operated on certain television channels that can vary from region to region. This is referred to as dynamic channel allocation, which will be possible depending on the time of day. A television channel is 8 MHz wide. Based on the results of the projects mentioned, interference-free operation of UMTS, which has a channel grid of 5 MHz and a channel bandwidth of 3.8 MHz, will be possible. Scenario 3 assumes that a certain number of television channels are permanently allocated to mobile radio. All scenarios will have practical significance in the future, because it is hardly likely that terrestrial television will be able to retain the frequencies currently allocated to it in the long run. The hybrid system resulting from the integration of both system types would of course require multi-mode terminals that support UMTS as well as DVB-T. Due to the high power usage in DVB-T receivers, such operations would only appear feasible for permanently installed terminals in vehicles. Experiments in 2001 in both projects showed that all ideas are feasible in practice. However, the MPEG-2 container specified for video transmission makes the DVB-T standard less suitable for data transport. Even at high speeds a distributed communication data rate of 12 Mbit/s could be achieved per DVB-T (8 MHz) channel. Cell broadcast, a service in
232
UMTS, in particular could be implemented cost-effectively on this basis and the capacity of UMTS increased. A homogeneous system with one radio standard (instead of two), such as the one assumed in scenarios 1 to 3, of course appears more attractive. The asymmetric downlink could then be operated by all mobile radio base stations and not only from the small number of television towers. This would increase capacity substantially and provide a more location-specific broadcast service than is possible with DVB-T. The freed up TV spectrum could be used for the following: Constant allocation of individual channels or channels from TV channel groups to mobile radio. Operation of 3G downlinks in the TV band (for asymmetric traffic). Combination of 3G and DVB-T systems, e.g. based on the concepts of [4] and [5]. Use of spectrum by an operating company consisting of mobile radio and television companies, each contributing its own spectrum. Time-shared use of TV channels for mobile radio and TV. Digital broadcast communication over television networks based on the DVBT standard would benefit from the availability of a reverse channel for (location-specific) activation of the desired content. The reverse channel can easily be implemented over the fixed network. Mobile radio networks would make the reverse channel available from all locations and even for moving users. Through user-specific control over a reverse channel the broadcast communication network would have the capacity to distribute personal content (for a charge). This would make it a competitor of the mobile radio networks. Mobile radio networks will also offer content that can be provided most costeffectively by broadcast communication. The 3G standards provide for this possibility. The integration of TV broadcast communication systems with mobile radio networks enables a utilisation of the strengths of the respective networks to increase the capacity of 3G systems for broadcast services. Broadcast communication requires a high-capacity downlink from the base station. From the view of mobile radio operators, under some circumstances (e.g., no alternative available) support of a second radio (DVB-T) in the mobile terminal is sensible. It would be more advantageous and economic if broadcast communication used the same radio interface (3G) as personal mobile radio. Since many TV channels are not used during the day, especially outside of cities and beyond metropolitan areas, but mobile telephone users are frequently on the move on roads between cities, a dynamically controlled use of
233
TV channels would make sense. Certain channels would then be used for mobile radio during the day and then for television towards the evening. Mobile terminals would have to be able to receive the different carrier frequencies and synthesise them. New studies show there are certain situations in which DVB-T and UMTS could even be operated simultaneously without much interference.
234
In UMTS-based mobile radio systems the power is only affected by the power control and is radiated evenly (see Chapters 7 and 8), unlike GSM where it pulsates. The power of transmitted signals in UMTS is distributed over a broad frequency spectrum, whereas in GSM the radiated power is always only concentrated on around one-ninth of the overall frequency bandwidth assuming a cluster size nine. If on a medium-term basis the UMTS was subject to a higher spectral efficiency than GSM, it would use less energy to transmit the same quantity of data than GSM would in the same period. Since it is projected that there will be a considerable increase in the amount of data transmitted over mobile radio in the future, the radiation produced through the introduction of UMTS will be much less compared to GSM. Concerned citizens should therefore support the introduction of UMTS. Instead they are using their energy to fight against this new technology because they do not want to see any more antenna sites. It is unfortunate that the political forces are feeding the concerns of the people and stirring their fears without any scientifically based reason. Almost everything a person uses or does has benefits and side effects. Generally the benefits are weighed against the disadvantages associated with the possible side effects, e.g., driving a car (5000 dead, 30,000 seriously injured per year in Germany alone), using medication, smoking, drinking alcohol and consuming food. If the risks appear too high, people cut down on the usage or totally do without. In the case of mobile radio, the highest source of radiation by far is the mobile telephone handset used close to the head - and not the radio masts. Everyone can therefore easily control the amount of radiation being received.
235
System throughput is not of interest to the users of mobile radio networks: They are more concerned about the mean transmission rate available for their use. Figure 11.10 presents the results from an emulated Frequency Division - Code Division Multiple Access (FD-CDMA) system (UMTS) for users of the World Wide Web (WWW) service. The mean throughput available to a user when the number of mobile stations indicated are simultaneously running WWW processes is represented in kbit/s at the ordinate. The three curves apply to different transmission rates for the physical channels allocated to the users. Each curve shows a kink that occurs when the capacity limits of the radio interface determined by the maximum allowable interference are reached. The interference occurs through the simultaneous transmission of data by different connections within the cell and by interference caused by transmission in neighbouring cells. If the respective kink point of the curves is exceeded, the transmission of some data has to be repeated due to the increasing interference-associated bit error ratio, and this reduces the traffic speed [38]. Besides the mean throughput, the variance of throughput is alos of concern. It has been found from the simulated UMTS system that the variance of the bit rate provided to a WWW process is extremely high and might result in below 10[bit/s] and also above 100 kbit/s, dependent on the location of the terminal in the radio cell.
236
Figure 11.10: Mean packet data rates for users of WWW service The limitations of 3G systems are low capacity and high licensing costs in some of the high potential regins. The reasons are as follows: Multimedia cannot be realised with up to 2 Mbit/s, contray to what is needed and was expected. Instead, 384 kbit/s can be seen as an exceptional high data rate available only to very few concurrent users in a radio cell. Owing to the high costs of the system few users will be able to afford the bills for a frequent use of high bit rate services. The entire capacity of a 10 MHz FDD band for both the downlink and the uplink in UMTS is much lower than the capacity of 2 x 17.5 or 2x22.5 MHz available with most GSM operators. A low number of users employing a high bit rate is less favourable in UMTS than a large number of users each using a low bit rate: UMTS is especially well suited for speech and lower data rate services such as multimedia short messages. The systems will not be able to offer the high bit rate, asymmetric services foreseen by the UMTS Forum and the ITU at a favourable cost.
237
In the countries where the abnormal high licence fees have been paid, the cost to provide the 12.2kbit/s voice service in UMTS is approximately six times higher than in GSM (but cannot be charged of course). The only option available to UMTS to make a profit is to offer low bit rate data services to a mass market. The respective applications are to still to be developed. 3G systems urgently require clearly more spectrum in the TV band (below 1 GHz) in order to be successful as a country-wide service. The current spectrum allocation makes it very difficult and costly to cover suburbs, motor ways and rural areas. In addition, W-LANs have to be integrated with UMTS to support multimedia traffic in densely populated areas.
238
handovers. It provides almost complete coverage to the area being supplied and enables continuous broadband communication at a 25 Mbit/s multiplex data rate for slow mobile terminals on a 20 MHz radio channel. The point-to-multipoint radio relay system for bridging the last mile (radio local loop) enables buildings to be connected to the ATM fixed network and provides a multiplex data rate of 155 Mbit/s for this purpose, see lower left corner of Figure 11.12. The corresponding results are currently being incorporated into the standardisation of the ETSI/HiperACCESS system. Systems like this are also called Wireless Metropolitan Area Networks (W-MANs) or Local Multipoint Distribution Systems (LMDSs) and are aimed to operate at frequency bands like 5, 10, 17, 26. 30, 38 or 60 GHz. A self-organising (plug-arid-play) system was developed for the wireless connection of multimedia devices in the home. This system uses the radio interface of the cellular broadband system but has additional functions such as direct mode for direct transmission between terminals. The corresponding preliminary work has been adopted into the Home Extension of the HiperLAN/2 standard. The W-LAN scenario was developed for offices and factory automation. This too is supported by the same radio interface developed in cellular broadband systems. The Chair for Communication Networks (CornNets) at RWTH Aachen proposed the ATMmobil project, contributed to the concept for the radio interface, participated in all prototype implementations
239
of the four designs shown in Figure 11.12 and assumed responsibility for the technical project management. The HiperLAN/1 standard was completed by ETSI one year before the HiperLAN/2 standard. No products are yet available for HiperLAN/2. At the same time the IEEE in the USA completed the W-LAN IEEE 802.11 standard, which provides a plug-and-play W-LAN for operation in the ISM band at 2.4 GHz. Due to the limited capacity of the ISM band because of interference by other systems operating in the same band (microwave ovens, Bluetooth), IEEE implemented a further development of Version 802.1 la for operation in the 5 GHz band and completed the standard for it around the same time that ETSI provided the HiperLAN/2 standard, i.e. in the year 2000. HiperLAN/2 and IEEE 802.1 la use the same transmission technique, a 52-carrier OFDM with adaptive modulation and coding in a 20 MHz channel. Each system has a different media access technique (see Figure 11.13), details are explained in [35]. HiperLAN/2 uses a centrally controlled reservation-based technique in which a terminal, usually the access point to the wired network, takes over the task of the central control entity and signals the MAC frame structure depending on the capacity requirements of the terminals to be served. The IEEE 802.1 la standard describes a non-reservation-based Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA) technique in which all terminals listen in
240
Figure 11.13: IEEE 802.lla and HiperLAN/2 on the medium before sending MAC frames, thus user data packets. The basic operation of the MAC protocol relies on the Distributed Coordination Function (DCF). This technique is very suitable for ad-hoc networks having the ability to self-organise their temporal or permanent functioning. An option of the IEEE 802.1 la MAC protocol is the Point Coordination Function (PCF) where any station may take the role of a local coordinator of the packet traffic flow across the radio space. Thereby, real-time support can be given to services based on transmit capacity reservation to stations that have requested the PCF supporting station for that. For the future it is necessary that W-LANs also make the quality of service supported in the fixed network (Internet) available on a wireless basis. HiperLAN/2 is fully equipped for this requirement; in the 802.lie group the IEEE developed an improvement to the existing standard orientated to the function principles of HiperLAN/2. The HiperLAN/2 protocol reserves the radio medium for a 2ms-long future time interval (the MAC frame) and through a central Access Point (AP) station allocates time slots (for the transmission of one or more ATM cells) for the uplink or the downlink to the terminals in its environment that are ready to transmit (see Figure 11.14). Each frame starts with an announcement of its structure by the Period Control Protocol Data Unit (PCtr-PDU). Using the request channels at the end of a MAC frame, the terminals can signal
241
HiperLAN/2 Protocol
MACframe MACframe MAC frame Trancceiv
of wi broadband networks
a Periodic Medium Access Control Protocol a Transmit/Receive Slots with reservation by Central Controller (Access Point, AP) n MAC Scheduler to support real-time services D ARQ Protocol with discarding of late packets
the AP that they wish to transmit in the next frame. Access to the Request Channel (RQCH) in the MAC frame is random-based. The capacity of the downlink and the uplink can be adapted as necessary to enable asymmetric traffic flows. An error-protection Automatic Repeat Request (ARQ) protocol is used above the MAC layer to detect transmission errors on the basis of a checksum and to request the retransmission of defective blocks. The Quality of Service (QoS) is described by a parameter set containing values for performance characteristics such as throughput, delay, bit error rate, blocking probability and abnormal termination. When an actual connection is established, numerical values are specified for the relevant performance characteristics; these are the values that are to be maintained for the duration of the connection to enable an appropriate use of the service. A distinction is made between two different classes of service (see the top three examples in Figure 11.15), each with certain characteristic requirements. The more restrictive the requirements of a service are (e.g., high throughput, minimal delays), the more complex it is for the network operator to provide the service and the higher the costs to the user. Along with transmitter power control, Link Adaptation (LA) and Dynamic Frequency Selection (DFS) are suitable techniques for achieving an optimal coordination in the sense of quality of service, throughput and spectral ef-
242
Figure 11.15: Requirements of diflFerent services for the quality of the transmission service
ficiency. It should also be noted that in addition to the two system types considered (IEEE 802.lla and HiperLAN/2), other radio systems whose operation should not be affected by unnecessary high emissions also operate in the 5 GHz frequency band, e.g. satellites. Dynamic Frequency Selection and Transmitter Power Control will be able to contribute substantially to reduce the radio signal power to the level needed for a given communications relationship, thereby reducing the interference produced in other systems operating spatially distant on the same radio channel. For example, Figure 11.16 clearly shows that with a carrier-to-interference ratio of 15dB a transmission mode that permits a bit rate of 9Mbit/s has to be selected to achieve a Packet Error Ratio (PER) of 0.01. Figure 11.17 (right) shows which range can be achieved with which transmitter power with line of sight or with shadowing (obstructions) using the most robust transmission mode BPSK plus code rate 1/2 resulting in a bit rate of 6 Mbit/s. What is noticeable is that very large cell radii are possible with line of sight connections but the ones with shadowing are very small, independent of the shown (maximum allowable) transmitter power. The graphics show the probability that with HiperLAN/2 a communications relationship is possible with one of the transmission modes (physical mode) in a given distance from the AP. For example, at a distance of 40 m data rates of 54 Mbit/s are possible
243
in 40% of the cases, only 36 Mbit/s is possible in 40% of the cases and only 27 or 12 Mbit/s in the rest.
244
the Information Society Technology (1ST)/Broadband Radio Access to IP Network (BRAIN) project and reviewed in the 1ST /Mobile Internet Networking Demonstrator (MIND) project. A terminal with two different radio interfaces is required and is managed by the central mobility management function of the mobile radio fixed network. The most suitable radio access system is always used on a location-specific basis so that subscribers are offered the maximum quality of service. The proposals of the BRAIN project provide for the availability of broadband services at locations with high user numbers, called "hot spots". A vertical handover to the 3G system takes place when a user leaves a W-LAN-supplied area. The current assumption is that W-LAN technology will be based on the ETSI/Broadband Radio Access Network (BRAN) HiperLAN/2 standard. The W-LAN standard IEEE 802.11 b/a is also under discussion. The integration of systems such as DVB-T, alongside Personal Area Networks (PANs) such as Bluetooth, in a joint network architecture would constitute another step forward (see Figure 11.19). Figure 11.19 shows a layered architecture of the various heterogeneous radio networks combined here, including the following technologies [16]: Digital radio broadcasting 2G cellular networks, e.g., GSM und GPRS
245
Figure 11.18: BRAIN architecture 3G cellular networks, e.g., UMTS W-LANs for use at locations with high public traffic (hot spots) Personal radio networks like Bluetooth and others. The architecture shown is already realisable today because the individual components are available and only have to be combined in an appropriate format. This requires a considerable effort but vendors and network operators will be receptive to this idea as soon as they are convinced of the usefulness of the architecture. The radio interfaces that were specially developed for the different movement of speeds and services will then appear as access networks to a combined universal mobile radio network and be supported by a shared mobile radio-specific fixed network. This fixed network, in cooperation with the public telecommunications networks, will then provide subscribers with universal mobile access to all services familiar from the fixed networks. In addition, the strengths of mobile networks will appear in the form of the availability of all services that are only meaningful for mobile users, namely narrowband real-time and low-speed data, while high-speed data is provided via the non-mobile network part based on W-LANs.
246
247
Figure 11.20: The ideal terminal networks that are already known or are in the process of being introduced, as shown in Figure 11.20. Figure 11.20 shows a terminal with two operating buttons "red" and "black" (representing the internal control for the use of a service and the respective network). These operating buttons control the use of two radio interfaces based on the current needs of the user and the requirements of the respective service, along with the usage costs. Cellular networks and WBS-based networks are incorporated as the transport or service platforms. The networks are characterised according to their respective features. Cellular mobile radio networks offer low bit rate services with real-time features and are associated with relatively high usage costs. W-LANs offer high bit rate services to the Internet with the appropriate quality of service and low usage costs. Considering the high licensing fees for second and third generation mobile radio networks in Europe, along with the basically very high set-up and operation costs of these networks, users appear to find it attractive to be able to take advantage of the strengths of both technologies on a situation-specific basis. WBSs are expected to transmit in the licence-exempt spectrum, see Figure 11.11.
248
Figure 11.21: Architecture of MediaPoint systems Yet users will probably as often as possible access WMS-based services that appear like high bit rate network access, available either locally or elsewhere. This is similar to users going to a newspaper stand, a petrol station or a telephone call box but instead of entering a concrete infrastructure, they only get close enough to it (up to a few hundred feet outdoors) so they can have wireless communication. In fact, the density of WBS cells in populated areas might be high enough that no specific decision on terminal movement is needed to have more or less permanent WMS access. Figure 11.21 illustrates the integration of cellular mobile radio systems with their accompanying Internet Protocol (IP)-supported fixed networks (core network). It also shows how the proposed WMS, which is supported by its own Intranet [35, 36], can be integrated into a common core network. The assumption is that the terminals support at least one mobile radio and one WBS interface. The integration can be a close one in which the Intranet of the WMS is part of the core network of the mobile radio network. Alternatively, the integration can be loose in which case the two fixed network parts are coupled together for the exchange of control information. It is also conceivable that the two classes of systems could be operated independently of one another. In this context a mobile terminal could accept two Subscriber Identity Modules (SIMs) that contain contractual data for the mobile radio network or the WMS.
249
The vision of the BRAIN project regarding the integration of mobile radio networks and WBSs provides for vertical handovers. The suggestion is that handovers should be dispensed with and connections allowed to be cut off and instead quickly re-established in the new system if the systems concerned do not have shared mobility management. This is likely to be the case when the two networks are operated separately. With multimedia applications a handover from WMS to the mobile radio network means a drastic reduction in quality of service so that a user will be unhappy with or without a handover. When a handover takes place in the other direction, the current application should decide when the handover from the mobile radio network to the WMS takes place. It can then prevent an active connection from being cut off since the mobile radio network has area-wide radio coverage including locations that have WMS radio coverage. Transmission in the proposed WMS is bi-directional between its base stations called Media Access Points (M-APs) connected to the fixed network and the Mobile Terminals (MTs). The MTs have a very large data storage facility for media data to cache the high-speed incoming data for later medium to low-speed consumption. Interactive services in real-time, such as voice and video communication, can obviously be supported over a WMS as long as the MT is operating in the range of the radio coverage of an M-AP. Although a WMS can be operated autonomously and independently of a mobile radio network, some applications benefit considerably if the system is in loose or even in close cooperation with such a network; however, for some applications this can be a disadvantage. The following WMS features are noteworthy: Operation in a licence-exempt frequency band and use of a standardised radio interface, e.g., HiperLAN/2 or IEEE 802.11 x. Wireless transmission of media data with high bit rates at the air interface with the M-AP linked over a radio relay system, cable or optical fibre to an Intranet that connects to the WMS-specific multimedia server available. The M-AP generates certain local radio coverage. The number of M-APs selected in the service area is sufficient to cope with the anticipated density of mobile terminals and their message traffic. Overall, the individual M-APs together do not achieve a continuous areawide radio supply to a coverage area; the radio supply is instead scattered. A coverage area can be very large and include, for example, major motorways or a city or a densely populated metropolitan area. Smaller coverage areas are sports facilities, airports, train stations, and city centres. Each M-AP has a very large storage capacity (as intermediate storage, cache memory) to enable communication with the MT to take place with the full
250
transmission rate of the radio interface and not with the possibly limited transmission rate of the Intranet. A special service control function in the MT and in the Intranet ensures that medial content loaded over the network is continuously available to a subscriber even if the radio supply is interrupted from time to time. This service control simulates a continuous connectivity to the WMS for the transmission of media data by buffering the medial content in the M-APs and MTs. Spontaneous access to media data is typically executed with a situationspecific delay, since the respective MT must wait until it has reached a radio supply area with access to the WMS. If the MT reaches an M-AP, it then refers to the session already established earlier with the WMS operator, receives the medial data it had requested earlier at a very high data rate from the cache memory of the respective MAP and stores it in local mass storage for later use. The quantity of data transmitted is so large that a long enough time horizon is covered, e.g., half an hour, to accommodate the expected duration of the local processing (e.g., mailbox contents) or local usage. The MT transmits all data waiting for transmission to the M-AP as soon as it reaches its coverage area. MTs can use all services known from cellular networks and the Internet, i.e., voice, data transmission, reception of broadcast transmissions and can operate interactive multimedia connections. The subscriber uses his or her MT as usual. As part of the application being used, the MT sends commands to the WMS specifying which media data should be transmitted next. The M-AP most suitable for the transmission to the MT is determined either by the MT or by the WMS. The WMS refers to geographical information or movement patterns of the MT that it recognises as being typical of the respective MT, e.g., because they originate from previous observations. Localisation of the MT can also be supported from the cellular mobile radio system. The user processes or consumes the data available in local storage in the MT without a radio connection to the WMS. When the next M-AP is reached, the processing results are transmitted by wireless over the WMS to the destination address. One interesting feature of the proposed system is that cellular mobile radio systems can be used (over their radio interface) at any time to send urgent data immediately if necessary or to be available for urgent incoming communication requests. Likewise data can be requested over a mobile radio network for intermediate storage with the next M-AP a user will reach in the near future. Alternatively, the data can be stored with several M-APs operating in the vicinity of the MT for later loading in the MT when it reaches an M-AP. Data cached at M-APs will be cleared anyway after a timer has expired.
251
Figure 11.22: Media Access Points of the WMS for user coverage
If the M-AP uses directional antennas instead of omni-directional ones, the radio supply can be limited to areas in which MTs normally operate or move, e.g., roads that are used by vehicles with MTs or city areas for portable MTs. The coverage range of the radio waves is then increased and less interference power generated that could possibly cause interference to other radio cells of the WMS. An example of the use of an WMS is shown in the scenario on the left in Figure 11.22. Two M-APs are mounted with their transmitting and receiving equipment at two traffic signal gantries of a motorway. Each M-AP has a control unit that is linked to the Intranet of the WMS or the local multimedia services under the control of an internal network service control. So long as a car (or other vehicle) finds itself in the coverage area of an MAP, the MT inside the car can set up a connection to request applications data from the WMS, load it wirelessly or send data such as emails or video recordings it has produced in the meantime. Once the car leaves the coverage zone, the connection is broken and cannot be resumed until the next M-AP is reached. The currently existing air interfaces of WBSs like HiperLAN/2 and IEEE 802.llx do not support a high-speed of movement. 50km/h appears to be the upper speed limit today limiting the applicability of this scenario to urban usage.
252
A second scenario on the right in Figure 11.22 shows the transmitting and receiving equipment (antennas) of M-APs mounted to the masts of street lamps in a residential area. Users in cars and those walking can set up a radio connection in the coverage area of the M-AP so long as they remain in that area. The connection is resumed when the next coverage zone is entered. The 15-minute video (300.000.000 bytes) in Figure 11.4 gives an idea of the type of content that can be transmitted in a short amount of time over the radio interface of an M-AP. With the transmission rate of 25Mbit/s available at an M-AP, the 20 minutes that UMTS needs to transmit the video would be reduced to 1.6 minutes; this is the amount of time a car waits at a signal-controlled intersection. The video referred to could be part of a film that is then played and consumed offline in the MT. The next section of the film (another 15 minutes of video scenes) can then be loaded down from the network at the next M-AP. If the downloading process is successfully synchronised at successive M-APs, then the subscriber can view the entire film without any breaks when he or she leaves her car. The M-AP of a WMS can, for example, transmit on the basis of the HiperLAN/2 (H/2) (or IEEE 802.11 x) standard and be sited in the middle of an intersection in a city. As Figure 11.23 shows, the radio coverage of the M-AP reaches the area shown in the light shading, namely a complete illumination of the intersection where it is located and a very far-reaching (up to 1 km) illumination of the streets off of it as long as no shadowing obstacles exist. It also reaches all vehicles parked or travelling there as well as people on foot. Due to the quasi-optical radio wave propagation, the side streets off the next intersection are not supplied and are therefore shown with dark shading. Many M-AP sites each with access to the fixed telecommunications network are needed if H/2 or comparable WBS systems are to be used to supply radio coverage to a city. The number of sites corresponds to the number of base stations required by a 3G mobile radio system. The system will typically aim for base station sites with wave propagation below the roof tops so it can deal with large traffic capacity in a city. This means that the number of sites required for 3G mobile radio systems and the WMS are about the same if the WMS uses the technology shown for supplying coverage (this can change as is explained later). The large number of radio standards added as a result of the introduction of 3G systems raises thoughts about what users really need in order to use the services available to them. Users obviously have to be equipped so they can make telephone calls anywhere and transmit data at a preferably high rate. As matters stand, GSM with its supplementary services GPRS and EGPRS is the only network able to provide comprehensive geographical coverage in Europe and beyond. The GSM interface is therefore a must. Terminals that support more than one radio interface are called multi-mode mobile terminals. Not only can they be operated in different frequency bands
253
such as 900, 1800 and 1900MHz that are customary with GSM, but they also support different radio standards. Each additional radio standard supported in a mobile terminal increases the complexity of the terminal and the power consumption. Consequently, radio operators and equipment manufacturers will limit themselves to the absolutely necessary radio standards, at least for the terminals produced in large quantities for the mass market. If a mobile terminal is small, then a data interface with a mean transmission rate that can be provided through Bluetooth or WBS 802.11 (in the 2.4 GHz band) is sufficient. The advantage is that the frequency range being covered by the MT will be still limited; this will result in low-cost transceivers. GSM/(E)GPR,S is also essential for high-performance portable terminals. In addition, a WBS radio interface operating at 5 GHz will be provided and Bluetooth then eliminated because its capabilities are included with the WBS. In the time frame being considered, the UMTS radio interface will only be used in high-end mobile terminals in the upmarket price range to provide interference-free mobile radio data operations in local areas with very high traffic volumes "hot spots" to customers with "business tariff" contracts. Prom time to time other users in the same location will notice that the network is overloaded and only be able to use data rates that are lower than at other locations.
254
It would be sensible to make the two classes of mobile terminals compatible with one another, e.g., with the small terminal capable of being docked to the big one and taken along when the user wants to travel light. In this case the same user number could easily be used for both devices and the GSM/GPRS interface would not have to be implemented many times.
11.10
The regulatory conditions for WBSs at 5 GHz provide for performance limitations of 200 mW indoors and 1W outdoors. Due to path loss the range of the radio waves is very limited. At 5 GHz there is very little wave diffraction and the reflected waves are so heavily attenuated that radio supply without line of sight links is only possible in the close vicinity of a station. WBS standards have functions that are not found in mobile radio systems and therefore can improve radio supply. Stations of WBSss can organise themselves spontaneously into local networks with the stations able to exchange information with one another as needed. If one of the WBS stations has access to the core network, then it can help other stations to reach the network also. This entails the data packets being transmitted many times over radio over the WMS - referred to as multi-hop communication. The participating (or some) stations must then be relay-enabled, i.e., able to buffer data packets arriving over radio links and to forward them over radio links. A WBS does function like an Internet router. Centrally controlled systems like HiperLAN/2 and IEEE 802.11 (with its central Point Coordination Function) can form area-wide local cellular networks. When mobility management is introduced to a core network part, communication relationships remain intact, even during a cell change, by being forwarded (handover) or re-established under network control. This kind of handover is referred to as a horizontal handover because it is implemented within the same system compared to a vertical handover in which the standard used by the radio interface is changed simultaneously with the handover. If a terminal leaves the coverage area of a cellular WBS system, then the communications relationship can be continued after a vertical handover if cross-system mobility management that encompasses the WMS and the mobile radio network is available. This relationship can continue even with a reduced quality of service because a mobile radio network typically has a much lower transmission rate than a WBS. For the reason just mentioned, some experts are of the opinion that the introduction of such systems will make the vertical handover superfluous. The problem with vertical handovers is that they produce a drastic degradation in the quality of service for most services, sometimes coming close to an interruption in the service. In the
255
Figure 11.24: Interworking of 3G and HiperLAN using Multi-Hop Communications other direction of a vertical handover from a mobile radio network to a WMS the suitable time instant for a vertical handover can be selected, e.g., at the end of the communication phase of a session. There is then enough time for a connection to be established in the WMS (without a handover). Another variation of combining the use of WMS and 3G systems with or without multi-hop communication is shown in Figure 11.24. The best system that airplanes, ships, trains, buses and similar transport carriers with large numbers of passengers can offer their customers "on board" is a WBS operating similar to the wired branch exchange systems in hotels. A connection with the outside world can then either be made from time to time when the MT reaches the coverage area of a M-AP of the WMS or continuously with the quality of service available with the 3G system. In each case a communications relationship exists over two serial radio links (hops), one in the transport vehicle and the second in the form of radio access to a fixed network. The solution selected will depend on the type of service being used: 3G systems will be used for voice communication and important low bit rate data services that essentially have to be available immediately and therefore are also allowed to cost more. For services involving mass data, users will normally wait until (in the case of a train or a bus) they reach a train station
256
or a Media Access Point at an intersection with a traffic light to transmit over a second WBS hop to a M-AP and back. In some cases it is possible to dispense with the first hop in the vehicle and directly search for the contact to the outside M-AP through a control of the terminal (as described above). The number of M-APs required in a given service area can be minimised through the option of a considerable reduction in infrastructure investment at the cost of a heavier load on the radio medium. With M-APs based on HiperLAN/2 technology wireless base stations (WBS) can be used to increase substantially the coverage area of an H/2 Access Point (AP) that is connected to a fixed network (see Figure 11.25). A Wireless Relay Station (WRS), which presents itself like a mobile terminal vis-a-vis the AP but acts like an AP to its environment, is used at the boundary of the coverage area of the AP. Consequently, the WRS connects all mobile terminals operating in its coverage area to itself over the first hop and with the AP over a second hop. The principle is cascadable so that a third hop also would be possible. As a result the available spectrum for a communications relationship with an n-hop connection is loaded n times. This means that the spectrum capacity is divided by n. So long as sufficient spectrum capacity is available locally, the n-hop communication can help towards saving infrastructure investment in the form of fixed network connections that would be needed to connect APs placed at the locations of WRSs. The selection of terminals with a WRS function can be planned and then provide stationary WRS sites. In special cases some mobile stations could conceivably contain the WRS function, and when they provide relay services for third parties collect credits from WMS operators that they can use later for their own communication in the WMS. Multi-hop communication makes sense when sufficient spectrum is available locally at a favourable cost. If local traffic increases, the spectrum capacity will reach its limit, more APs will be installed and a migration made to pure one-hop communication to free up spectrum. In the example shown in Figure 11.26 two-hop communication is provided using H/2 relays (WRS) to illuminate the side streets with the dark shading in the example in Figure 11.23. In this example the H/2 relays are mounted at certain intersections next to an AP and obtain their power supply on site but would have no access to the fixed communications network (this is how a savings is achieved vis-a-vis the use of APs at relay locations!). Of course, directional antennas at the relay would contribute much to bridging larger distances between APs and relays. In addition, much higher capacity at the relay is possible then, owing to the higher physical transmission mode applicable, see Figure 11.16. It is plausible that the principle shown, based on a centrally sited AP supplemented by WRSs. could also be applied to the vertical parallel roads so that
11.11 Conclusion
257
the city road network is provided with a relatively high level of coverage (i.e., presence of WMS). Private WBS systems would be set up inside buildings and link wireless terminals either directly to the Internet or over an indoor WRS to the outdoor WMS.
11.11 Conclusion
This chapter has described the visions of the next generation of wireless communication systems, yet only from the perspective of a short time period of three to five years. For instance, no consideration has been given to the fact that 3G systems will continue to evolve and achieve a clearly higher level of spectrum efficiency (kbit/s per MHz and km2) than is possible today. Technical options based on intelligent antenna systems and systems offering simultaneous transmission of multiple communication relationships over the same radio channel (Multiple Input Multiple Output) are in development right now and have the potential to make this goal a reality. However, the level of processing required of signal processors in mobile terminals is still comparatively much higher than
258
now and underlines the urgent need for other technologies for mobile energy supply. Although the batteries available today are being developed further, it is not expected that they will be able to provide the level of power capacity that will be required. Fuel cells have potential in this area but are far from being market-ready, and, therefore, very considerably limit the development possibilities for wireless communication. What also has not been covered is how new transmission technologies could make mobile radio coverage more omnipresent, thereby achieving a high quality of service (throughput, delay parameters, bit error ratio, and so forth). Coded multi-carrier techniques (Coded Orthogonal Frequency Division Multiple Access (COFDMA)) are being looked at again in this regard. This was an option that was not considered at the time the 3G standard was specified due to the linear broadband receiver that is very difficult to implement, but today this problem seems to have been solved. It appears much easier to implement high-speed downlink transmission to highly mobile terminals than high-speed uplink transmission. According to Figure 11.6 this is exactly what the mobile applications would need, so that it can be expected that systems beyond 3G will extend the high-speed service supply from urban to suburban and even rural areas. Spectrum availability will be the dominating parameter to make this possible development happen or not.
11.11 Conclusion
259
The final point to note is that the electromagnetic impact on the environment due to the use of WBS systems will be reduced considerably. There are two main reasons for this: the transmitter power of APs amounts to a maximum of 1W and is consequently half the amount of that of the mobile terminals being used today and the AP antenna is effective from a greater distance than close to the head of the user. Due to the screens necessary for media services, the associated wireless terminals also will not be operated at the user's ear, and, in spite of higher transmission speeds, the biological effect will be noticeably less.
Answers to questions
3.3
3.4
3.5
3.6 3.7
262
11 The Next Generation of Mobile Radio Systems Line-switched and packet-switched data transmission High level of voice quality, comparable to the fixed network High level of spectral efficiency Service portability (VHE, Virtual Home Environment) Global access
3.8 3.9
Cdma2000, DECT+, UWC136/EDGE, TD-SCDMA (now part of UMTS as a low chip rate option of TDD mode in R4). Cdma2000 is downwardly compatible with existing IS-95 networks. Cdma2000 will play an important role since a significant basis of IS-95 networks is installed in the US. The first systems are being built in accordance with R99. It is unclear to what extent the hardware can continue to be used after a changeover to R4 or R5. A great deal depends on the hardware platform selected by the respective vendor. However, some vendors have hinted at the probability that first generation hardware, except for the 19" cabinets, will have to be replaced in accordance with R99 when a switch is made toR4.
3.10
3.11 Some network operators want to start the network as early as the second quarter of 2002. However, the terminals will not be available until late 2002 or perhaps even in 2003, so a widespread start of UMTS is not anticipated until then. The network operators also still need time to build the infrastructure in heavily populated areas. 3.12 The population's increasing criticism of the erection of antenna sites is preventing network operators from acquiring the locations they need for starting networks in heavily populated areas. This is now being regarded as a serious threat to the timetable. There is also a fear that the vendors of the terminals will have problems due to the high complexity of these terminals. Since end users are used to small, reasonably priced and reliable terminals with a long battery life from GSM, the UMTS terminals will have to offer the same features despite the fact that they are considerably more complex. This can jeopardise the availability of terminals. Another problem exists because some network operators were not able to shoulder the high financial burden of the licences and infrastructure for long and therefore could not build the networks. Several licences were auctioned off at high prices in the USA in the 1990s, yet the network operators could not start with the networks due to the high costs involved. 3.13 unpaired (TDD): 1900-1920MHz, 2010-2025MHz. paired (FDD): 1920-1980MHz for the uplink, 2110-2170MHz for the downlink.
263
Three extension areas have been identified: below the GSM900 band at 2.5 GHz and at 2.7 GHz. The advantage of the band below the GSM900 band is the lower attenuation of the radio waves due to physical conditions. As a result, a given area can be illuminated with fewer infrastructure elements. A relatively large block exists at 2.5 GHz that is relatively close to the 3G bands used today. This block is therefore also being regarded as an ideal candidate. With continuing growth the neighbouring band at 2.7 GHz can also be used.
4.2
4.3
4.4
264 Handovers
S-RNS relocation (change of lu-reference point) Encryption Protocol conversion (lu (RANAP), lub, lur (RNSAP))
ATM, SS7
O&M tasks. Functions of Node B: Like BTS with GSM, additional inner loop power control, generation of measurement reports for the RNC, softer handovers (microdiversity). 4.5 HLR and VLR are cascaded database systems. The statistical information for a user is filed in an HLR. When the user moves into a cell, the data is copied from the HLR into the VLR responsible for the respective region and stored there temporarily. At the same time a reference to the currently applicable VLR is entered in the HLR. When the location area changes, only the VLR is updated. Access is therefore not constantly required to the HLR, which otherwise would soon be overloaded. An MSC is used for the transmission of circuit-switched services, whereas an SGSN is used for packet-switched services. MSCs normally "communicate" between themselves through SS7. whereas an SGSN is addressed over IP. Hard handover: immediate changeover from one cell to another (GSM, UTRA-TDD) Soft handover: simultaneous radio connection to two or even three different base stations Softer handover: simultaneous radio connection to the different sectors of a base station. Advantages: Resistance to shadowing, lower fading reserve required, avoidance of near-far effect. 4.8 When the Node Bs involved in a soft handover are attached to different RNCs, the original RNC takes over the control function (SRNC) and also supervises the Node Bs connected to the new RNC over the lurInterface and the new RNC. The new RNC (DRNC) forwards the data received to the SRNC. There all incoming data is merged together and sent to the CN (combining, splitting}.
4.6
4.7
265
With packet-switched services there are more calls (data packets) per time unit that require the set-up of a radio connection than is the case, for example, with circuit-switched voice calls. So that unnecessary signalling can be avoided, the network must have a more exact knowledge of the location of the mobile station than is necessary with circuit-switched services. A group of cells is combined into what is called a location area (LA). Each cell in the LA beams a code called a location area code. As soon as a mobile station recognises that it is receiving a new location area code, it updates the databases. The same applies to packet-switched services (routing area update). The network can also be configured so that a mobile station has to register periodically with the network. This is intended to prevent a situation in which a mobile station leaves a supply area and the network does not register the fact. Incoming calls would otherwise generate signalling at the radio interface to no avail.
4.10
4.11
The GTP-U transmits data within a network between GGSN, SGSN and RNC. This enables external and internal IP traffic to be separate from one another. A network operator can actually use a purely IP-based infrastructure for an easy and flexible introduction of new services. However, controversy does surround this architecture and some issues still need to be resolved. For example, it is not clear whether the new network nodes are really less expensive or whether the latency for voice connections is sufficient. New network nodes required at the outer boundaries of the IP network Possible latency problems for voice telephony Security aspects
4.12
4.13
4.14
SIP is used for the set-up and configuration of IP-based calls. The user data itself is transmitted on a direct path between terminals (via SGSN and GGSN).
266
11 The Next Generation of Mobile Radio Systems Through the separation into layers functions are divided into blocks that are easier to manage. This facilitates the orientation and implementation. The alternative would be a large monolithic block that would be more difficult to implement and maintain.
5.2 5.3
The philosophers can exchange ideas and information via their staffs. A logical connection therefore does not exist. The C-plane or control plane takes over the management and evaluation of control information between the layers or between partner entities of the same layers. The actual information data for a user is managed and exchanged in the U-plane or user plane. As a higher ranking part in the protocol stack, the M-plane or management plane manages the organisation of a protocol stack. This part is normally not standardised and is implemented differently by the different vendors.
5.4 5.5
The UTRA protocol stack comprises layers 1, 2 and 3. The physical layer is responsible for the transmission of information over a physical medium. It is therefore responsible for channel coding, forward-error correction and interleaving as well as adaptive power control. It also measures different quality parameters and supplies the measured values to the RRC layer. The physical layer in UTRA-TDD is different from the one in UTRA-FDD. Transport channels. Priority control/scheduling, monitoring of traffic volume, encryption of data in transparent RLC mode, allocation of data transmitted over so-called shared channels. Segmentation, flow control, encryption (acknowledged mode, unacknowledged mode), error correction. In acknowledged mode data blocks detected as being defective are requested again. In unacknowledged mode defective data blocks are discarded. No error protection occurs at the RLC level in transparent mode. Transmission errors can be handled in the following ways: Error detection merely checks the accuracy of the received data and forwards this as additional information with the data that is unchanged. This requires a check sum for each data block. With error correction transmission errors are actually corrected. This involves an addition to the original data stream of systematic redundancy, which is used in conjunction with appropriate algorithms in the receiver to enable the correction of individual errors.
5.6 5.7
5.8 5.9
5.10
11.11 Conclusion
267
Repeated transmission using Automatic Repeat Request (ARQ) protocols is a procedure that can be attached to an error detection procedure. When a transmission error is detected, it can be used to request and retransmit the defective data block again. Finally, it is possible for a data block detected as being defective simply to be discarded or for no error detection to be implemented at all. This is sensible when the data being used has to be forwarded soon after the application and the application itself is robust against errors. This is the case, for example, with voice data. 5.11 5.12 In transparent RLC mode the MAC layer is responsible for data encryption. In all other cases encryption is a part of the RLC layer. The PDCP sublayer adapts the UTRA protocol stack to the packet data protocols supported by the UTRA protocol stack. The functions of the PDCP sublayer include TCP/IP-/ieader compression. This gives the PDCP sublayer a special role in mobile Internet access.
5.13 The RRC layer records the measured values of all other layers in the protocol stack. These values are processed in algorithms within the RRC layer. Decisions are made on this basis and forwarded to the individual layers through configuration messages. 5.14 The UMTS standard mainly describes the interfaces but less so the algorithms. Consequently, vendors can use efficient algorithms to increase the performance of their RANs. This especially applies to the radio resource control algorithms in the RRC layer (in the RNC). The performance of the radio interface can therefore vary from vendor to vendor. 5.15 The physical layer is embedded in Node B; the other layers belong to the RNC. In between is an ATM line that connects the physical layer with the MAC and RRC layers.
5.16 The UMTS radio interface offers a high level of flexibility. The other layers in the UTRA protocol stack must be able to work with this flexibility so that applications can also benefit from it. Consequently, a complicated but in many areas flexible mechanism was developed for the transmission of transport blocks over the transport channels. 5.17 Transport channels describe how user or control data should be transmitted. The key parameters are data quantity and the time frame when this data arises. The data quantity is determined by the size of the data blocks or transport blocks (TB) and the number of them within a transport block set (TBS). In UMTS the interval for a TBS is referred to as a transmission time interval (TTI). Transport channels are provided by the physical layer to the medium access control (MAC) sublayer above it.
268
11 The Next Generation of Mobile Radio Systems Logical channels, on the other hand, are provided by the MAC sublayer to the RLC sublayer. Logical channels describe which type of data is being transmitted thus, for example, the user data of a voice connection over a DTCH or signalling information over a DCCH.
5.18
The MAC layer can transmit a DTCH over various transport channels. In addition to the DCH, these include the CPCH (FDD), the RACK (uplink), the FACH (downlink), the USCH (TDD) and the DSCH. The efficiency of the different transport varies depending on the characteristics of the transmitted data. Thus a limited quantity of user data can be included with the data transmission over the RACK since the data packet is already transmitted at the time the medium is accessed and no lengthy signalling is necessary. However, due to poor power control of the transmitter interference is higher than with a DCH so that the latter is more efficient when the volume of data reaches a certain level.
5.19
This question naturally does not have a precise answer. Experts operate on the assumption that the complexity for a protocol stack is higher by a factor of 10. However, this excludes the new types of algorithms such as adaptive antennas, etc. Added to this is the additional complexity due to video codecs, graphical user interfaces, etc. Since complexity is associated with high calculation levels, one of the most difficult tasks is reducing the power consumption of components enough so that a terminal's operating time is acceptable to users.
6.2
11.11 Conclusion 6.3 According to the Shannon formula D = B*log2(l+R) provides the maximum transmission rate D = 5MHz*log 2 (l + 15) > = 20Mbit/s for the given values.
269
6.4
All multiple-access procedures are basically equal when it comes to achievable capacity, i.e., achievable throughput. The advantage of CDMA is its high level of flexibility. With the equal distribution in FDMA systems each user receives exactly one-tenth of the data rate, thus
Duser - D/W.
6.5
In TDM A systems each user receives the full data rate, albeit only for one-tenth of the TDMA frame because the remaining portion is allocated to other users, thus Duser - D * 1/10. With CDMA systems all users transmit their data simultaneously in the complete frequency band. However, a sufficient number of different codes must be available so that the users can be distinguished from one another. This also reduces the data rate according to Duser = D * 1/10. 6.6 The modulation scheme affects the amount of user information transmitted per modulation symbol. The transmission rate for the information is generally higher than the modulation rate. UMTS uses QPSK modulation. With this modulation scheme two information symbols are transmitted per modulation symbol. This means that a modulation rate of 3.84Msymbol/s corresponds to a transmission rate of 7.68Mchip/s. This is frequently referred to as complex-valued information symbols. Since all users within the same frequency band transmit at the same time, several interferers with comparable transmitter power occur for each transmit signal. The resulting S/N is then usually < 1. One "bit" is an element of a data stream of user data. One "chip" is an element of a spreading code. With the CDMA technique one bit is mapped to several chips. Through the transformation of the bit sequence into a higher rate chip sequence the data signal is spread in the frequency domain. Since this spreading becomes obvious in the frequency spectrum, the expression "spread spectrum" technique is used. In CDMA systems "orthogonality" is the characteristic spreading codes have, enabling them to be separated from one another. The product
6.7
6.8
6.9
6.10
270
11 The Next Generation of Mobile Radio Systems of two spreading codes added up over a period of time equals zero (ideally orthogonal). In this case the value of the cross-correlation function (CCF) of both spreading codes is also zero. The spreading gain enables the user signal to be extracted again from the noise signal. Furthermore, the interference signals of other users are eliminated or at least considerably weakened by the orthogonality of the spreading code.
6.11 In FDMA systems the carrier functions used can be multiplied together and over a period of time produce a zero. In TDM A orthogonality is found in the time domain. Here individual users transmit one after another so that only one carrier function is ever different from zero when all other carrier signals are deactivated. 6.12 With the spreading process each bit is allocated a chip sequence of constant length. Each individual bit is therefore mapped to several chips. The use of orthogonal spreading codes enables an ideal separation of the different data streams. Scrambling helps to provide a further distinction between the spread data streams. Here quasi-orthogonal chip sequences are used to map one chip of the spread data stream in turn to one chip according to a certain pattern. In the FDD mode of UMTS this separates the sum of chip streams of the different users. In TDD mode each cell uses its own specific scrambling chip sequence so that the different cells are separated from one another through the scrambling. 6.13 Variable data rates can be achieved through a variation of the spreading factor if the transmission chip rate is maintained at a constant level. With a constant bandwidth and constant modulation, however, it is precisely this transmission chip rate that is fixed. Different data rates can therefore only be achieved through the help of different spreading factors or through the simultaneous use of several code channels. 6.14 Because two participants use spreading codes with the spreading factor SF = 4, exactly half of the OVSF code tree is unavailable to the other users. With the spreading factor SF = 16 a maximum of only 8 codes can be used, i.e., precisely 8 users can transmit data. Two participants with the spreading factor SF = 4 then always have a transmission rate of 500kbit/s. Eight participants with the spreading factor SF = 16 then always have a transmission rate of 125kbit/s. 6.15 Multiple access interference refers to the interference power experienced by a user due to the transmit signals of other users in the cell. 6.16 The power of the user signals at the receiver must be at the same level for all n users in a cell. This wav each user has the same interference
11.11 Conclusion
271
signal part of n 1 users and always the same level of the user signal part. 6.17 The near-far effect is the effect created due to higher path loss when signals from remote users arrive at the receiver with lower power than the signals from users nearby. Without transmitter power control the multiple access interference is then considerably higher for remote users than for those close by.
= 1.92Mbit/s.
The maximum spreading factor, which in FDD mode is different for the uplink and the downlink, is decisive for the minimum data rate. For the downlink
Dmin,DL = -r^- = 15kblt/S.
3.84 x 2 512
,,
In TDD mode the bandwidth is 5 MHz and the complex chip rate is 3.84Mchip/s. QPSK modulation is used here too. Since a maximum of 14 time slots may be used for a transmission direction, the following results from a minimum spreading factor of SF = 1 Dmax = 3'841 X 2 - i| = 7.168 Mbit/s. 1 15 The minimum data rate resulting from the use of only one time slot for the spreading factor SF = 16 is
LSrmn
_ 3.84x2 1 ., ,, ., ^ lo lo
o^Jvoit/a.
272 7.3
11 The Next Generation of Mobile Radio Systems The advantage of a multiple-switching-point configuration within a TDD time frame is that there can still be a reaction to requests from mobile stations (over the uplink) within the same frame, i.e., data can be transmitted on the downlink. The disadvantage of this configuration is the additional hardware effort, because switching over the transmission direction means switching off the receiving branches and switching on the sending branches or vice versa.
7.4
The functions of the physical layer include: provision of transport channels mapping of transport channels to physical channels implementation of error protection procedures segmentation and multiplexing of data streams synchronisation transmitter power control measurement of channel parameters and connection quality execution of soft handovers.
7.5
Transmitter power control reduces the energy consumption of terminals, which increases the operating time. Furthermore, there is a reduction in the radiated power and consequently system interference. An appropriate adjustment of the transmitter power prevents the near-far effect. There is no difference in the PC techniques between UL and DL. A different technique is defined in TDD mode than for FDD mode or the TDD downlink. Only on the TDD uplink is the control loop between base and mobile station open. This means that no control information that is used directly to control the transmitter power for the uplink is sent from a base station to a mobile station. In this case the control loop algorithm itself estimates the transmitter power to be set for the mobile station from measured values and target guidelines. A target value for the Carrier-to-interference (C/I) ratio is specified by the outer control loop. This enables the transmission quality to be adapted to the requirements of different services (voice, video, data), the current propagation environment (city, countryside) and the transmission mode used (spreading factor). The Coded Composite Transport CHannel (CCTrCH) is the designation for a virtual channel that merges together all transport channels of a user within the physical layer so they can then be distributed again to the available physical channels.
7.6 7.7
7.8
7.9
273
Discontinuous Transmission (DTX) is when a transmitter is switched to mute if there is no user information for transmission on the physical channel. DTX is already being used in GSM systems where the transmitter power is always regulated downwards during voice pauses. On the FDD UL the DTX function is not found within a frame. Instead, either the entire frame is used for the transmission or all time slots remain unused (during voice pauses). On the FDD DL zero values are set in the otherwise two-value data stream during voice pauses. After the bit interleaving these DTX indicators are found distributed unevenly over the frames. Depending on the combination of transport channels, a second insertion of DTX indicators may be necessary in case whole voice data blocks are empty.
7.11
7.12
7.13 The physical layer provides different channels with varying gross data rates using different spreading factors. In addition, an adaptation to variable data rates is possible on the transport channels through rate adaptation using puncturing or repeated transmission.
8.2
274 8.4
11 The Next Generation of Mobile Radio Systems Shared physical channels are used for communication between the physical layer of a Node B and several UEs. This applies, for example, to broadcast channels and to packet-data channels, the capacity of which is shared by several UEs. When shared channels are used, an identification of the connection to which the sent data belongs is required in the data stream. The key difference lies in the necessity for identification in the case of jointly used physical channels. 15x40 bit = 600 bit. 15x80 bit = 1200 bit. Because a UL burst with BPSK modulation (2-value) is being transmitted but the DL burst uses QPSK modulation (4-value). Variable data rates are achievable either through a change to the spreading factor or through multicode transmission. A maximum of 6 DPDCH with the same spreading factor can be transmitted simultaneously. Variable data rates are achievable either through a change to the spreading factor or through multicode transmission. Certain conditions relating to the use of OVSF codes have to be taken into account. Minimum spreading factor: 4. 6 DPDCH simultaneously for each 960kbit/s gross = 5740kbit/s gross 3 DPDCH are transmitted in the in-phase branch and 3 DPDCH and the DPCCH in the quadrature branch of the modulation. Minimum spreading factor: 4. A maximum of 3 DPDCH with spreading factor 4 can be used, because other codes from the remaining branch of the code tree are already being used by other physical channels. 3xl872kbit/s = 5616kbit/s. Minimum spreading factor: 32. Maximum number of bursts: 30. 30x80 bit = 2400 bit.
8.10
8.11
8.12
8.13
8.14 The aximum number of users is generally limited by the number of available codes. For the FDD downlink the number of simultaneous transmissions is restricted to 512, in TDD to a maximum of 16 which corresponds to the maximum spreading factor, respectively. In practice, the maximum number of available physical channes in the FDD downlink is much lower since common and dedicated signalling has to be transmitted in parallel to the user data. In addition to that a certain amount of the spreading codes can be allocated for shared use packet
11.11 Conclusion
275
transmission. In the FDD uplink, the maximum number users is limited by the respective interference power affecting the base station's receivers. 8.15 Minimum spreading factor: 1. 14x441,6bit/s = 6182bit/s (gross). 8.16 Minimum spreading factor: 1. 14x441,6bit/s = 6182bit/s (gross).
9.2 9.3
276 9.4
11 The Next Generation of Mobile Radio Systems Cell size with normal load: EIRP Noise power Interference power Total effective interference and noise Required C/I Receiver sensitivity Gains and losses at BS Maximum path loss Fading margin Handover gain Link budget Range Cell size with higher interference: EIRP Noise power Interference power Total effective interference and noise Required C/I Receiver sensitivity Gains and losses at BS Maximum path loss Fading margin Handover gain Link budget Range 21 d"Bm~ -103 dBm -95 -93.8 dBm -20.9 dB -114.7 dBm 11 dB 146.7 dB 11.3 dB 3 dB 138.4 dB 1.25 km
21 dBm~ -103 dBm -98 -96.8 dBm -20,9 dB -117.7 dBm 11 dB 149.7 dB 11.3 dB 3 dB 141.4 dB 1.52 km
9.5
9.6
R/km = 10 ssi
9.7
147.6-135
= 2.28
The coverage range of 2.28km is already the maximum achievable range, i.e., it does not allow for any interference. UMTS cells must therefore be reduced in size. UL: capacity reduces as interference increases, maximum transmitter power is constant. DL: capacity reduces as interference increases, maximum transmitter power per user decreases as number of users increases. In soft handovers a UE has a connection to two or more different Node Bs that are typically separated from one another physically. In softer handovers the UE has a connection to two or more sectors or cells that are supplied by the same Node B. A softer handover is an intra-controller, intra-Node B handover. A soft handover is an inter-controller handover when the same controller
9.8
9.9
9.10
11.11 Conclusion
277
controls all participating Node Bs. Otherwise it is an intra-controller handover. 9.11 A soft handover essentially produces two effects. First, the sensitivity of the receiver to fast and slow fading decreases due to spatial diversity. As a result, there is a decrease in the signal-to-interference ratio needed for sufficiently effective data transmission. Second, the soft handover prevents a UE from moving from one cell to another while it is still being supplied and controlled by the original Node B, thereby causing strong interference in the other cell. Soft handovers ensure that the transmitter power of the UE is always controlled by the Node B to which the lowest propagation loss exists. This prevents a near-far effect. On the UL the signal sent by the UE is decoded into two or more Node Bs and the individual data streams are merged in the RNC. On the DL the data stream is duplicated in the RNC and always transmitted with specific scrambling codes over two or more Node Bs. The UE decodes all copies of the data stream and merges them. In UMTS FDD the number may not be greater than three. The RNC decides which base stations are involved. Handover: (a) Softer handover (b) Soft handover (c) Hard handover (d) Hard handover (e) Hard handover (f) Hard handover 9.15 UTRA-FDD stations transmit without interruption. However, such interruptions are required when seeking possible target frequencies.
9.12
9.13 9.14
278
11 The Next Generation of Mobile Radio Systems the development of frequently used applications (killer applications). The same history of success incidentally applies to personal computer architecture. Many developers were able to develop applications on the basis of disclosed interfaces and therefore contribute to the continuing success of a system.
10.3
SAT applications are run on a processor on the SIM card, whereas MexE applications are executed within the terminal.
10.4 Some examples: Bearer services: Transmission channel with error correction or detection with e.g., 20kbit/s, transmission channel with error correction with e.g., 144kbit/s. Teleservices: Voice telephony, Internet access. Supplementary services: Call diversion when number busy, advice of charge. Value-added services: Call diversion when lines congested telematics), financial services. 10.5 10.6 Data transmission rate, jitter, latency, bit-error rate, quality of service. Since there is no money to be made over the long term from purely transmitting bits, network operators try to extend their value-added chains and implement other applications on the basis of their networks. It is hoped that attractive services will be developed and customers will pay for information or entertainment and not purely for the transmission service. Maximuml2.2kbit/s, minimum 4.75kbit/s.
10.7
3G No. TS 21.102 TS 21.111 TS 21.133 TR 21.801 TR 21.900 TR 21.905 TS 22.001 TS 22.002 TS 22.003 TS TS TS TS 22.004 22.011 22.016 22.022
TS 22.024 TS 22.030 TS 22.031 TS 22.032 TS 22.034 TS 22.038 TS 22.041 TS 22.042 TS 22.048 TS 22.053 TS 22.057 TS 22.060 TS 22.066 TS 22.067
Titel 3rd Generation mobile system Release 4 specifications USIM and 1C card requirements 3G security; Security threats and requirements Specification drafting rules Technical Specification Group working methods Vocabulary for 3GPP Specifications Principles of circuit telecommunication services supported by a Public Land Mobile Network (PLMN) Circuit Bearer Services (BS) supported by a Public Land Mobile Network (PLMN) Circuit Teleservices supported by a Public Land Mobile Network (PLMN) General on supplementary services Service accessibility International Mobile Equipment Identities (IMEI) Personalisation of Mobile Equipment (ME); Mobile functionality specification Description of Charge Advice Information (CAI) Man-Machine Interface (MMI) of the User Equipment (UE) Fraud Information Gathering System (FIGS); Service description; Stage 1 Immediate Service Termination (1ST); Service description; Stage 1 High Speed Circuit Switched Data (HSCSD); Stage 1 USIM/SIM Application Toolkit (USAT/SAT); Service description; Stage 1 Operator Determined Call Barring Network Identity and Time Zone (NITZ) service description; Stage 1 Security Mechanisms for the (U)SIM application toolkit; Stage 1 Tandem Free Operation (TFO); Service description; Stage 1 Mobile Execution Environment (MExE) service description; Stage 1 General Packet Radio Service (GPRS); Service description; Stage 1 Support of Mobile Number Portability (MNP); Stage 1 enhanced Multi-Level Precedence and Pre-emption service (eMLPP); Stage 1
280
3G TS TS TS No. 22.071 22.072 22.076
TS 22.078 TS TS TS TS TS TS TS TS TS TS TS TS 22.079 22.081 22.082 22.083 22.084 22.085 22.086 22.087 22.088 22.090 22.091 22.093
TS 22.094 TS 22.096 TS 22.097 TS 22.101 TS 22.105 TS 22.115 TR 22.121 TS 22.127 TS 22.129 TS 22.135 TS 22.140 TS 23.002 TS 23.003 TS 23.007 TS 23.008 TS 23.009 TS 23.011 TS 23.012 TS 23.014 TS 23.015 TS 23.016 TS 23.018 TS 23.031
11.11 Conclusion
3G No. TS 23.032 TS 23.034 TS 23.035 TS 23.038 TR 23.039 TS TS TS TS 23.040 23.041 23.042 23.048
281
Titel Universal Geographical Area Description (GAD) High Speed Circuit Switched Data (HSCSD); Stage 2 Immediate Service Termination (1ST); Stage 2 Alphabets and language-specific information Interface Protocols for the Connection of Short Message Service Centers (SMSCs) to Short Message Entities (SMEs) Technical realization of Short Message Service (SMS) Technical realization of Cell Broadcast Service (CBS) Compression algorithm for SMS Security Mechanisms for the (U)SIM application toolkit; Stage 2 Tandem Free Operation (TFO); Service description; Stage 2 Mobile Execution Environment (MExE); Functional description: Stage 2 General Packet Radio Service (GPRS) Service description; Stage
2
TS 23.053 TS 23.057 TS 23.060 TS 23.066 TS 23.067 TS 23.072 TS 23.078 TS 23.079 TS 23.081 TS 23.082 TS 23.083 TS TS TS TS TS TS TS TS TS TS TS TS TS TS 23.084 23.085 23.086 23.087 23.088 23.090 23.091 23.093 23.094 23.096 23.097 23.101 23.107 23.108
Support of GSM Mobile Number Portability (MNP) stage 2 Enhanced Multi-Level Precedence and Pre-emption Service (eMLPP); Stage 2 Call Deflection Supplementary Service; Stage 2 Customised Applications for Mobile network Enhanced Logic (CAMEL); Stage 2 Support of Optimal Routeing (SOR); Technical realization; Stage 2 Line Identification supplementary services; Stage 2 Call Forwarding (CF) Supplementary Services; Stage 2 Call Waiting (CW) and Call Hold (HOLD) Supplementary Service; Stage 2 MultiParty (MPTY) Supplementary Service; Stage 2 Closed User Group (CUG) Supplementary Service; Stage 2 Advice of Charge (AoC) Supplementary Service; Stage 2 User-to-User Signalling (UUS) supplementary service; Stage 2 Call Barring (CB) Supplementary Service; Stage 2 Unstructured Supplementary Service Data (USSD); Stage 2 Explicit Call Transfer (ECT) Supplementary Service; Stage 2 Technical realization of Completion of Calls to Busy Subscriber (CCBS); Stage 2 Follow Me Stage 2 Name Identification Supplementary Service; Stage 2 Multiple Subscriber Profile (MSP) Phase 1; Stage 2 General UMTS Architecture Quality of Service (QoS) concept and architecture Mobile radio interface layer 3 specification core network protocols; Stage 2 (structured procedures) UMTS Access Stratum Services and Functions Super-Charger technical realization; Stage 2 Gateway Location Register (GLR); Stage2
282
3G No. TS 23.122 TS 23.127 TS 23.135 TS 23.140 TS 23.146 TS TS TS TS 23.153 23.205 23.221 23.227
TS 23.271 TR 23.821 TR 23.873 TR 23.874 TR 23.907 TR 23.908 TR 23.909 TR 23.910 TR 23.911 TR 23.912 TR 23.925 TR 23.930 TS 24.002 TS 24.007 TS 24.008 TS 24.010 TS 24.011 TS 24.022 TS 24.030 TS 24.067 TS 24.072 TS 24.080 TS 24.081
11.11 Conclusion
3G No. TS 24.082 TS 24.083 TS TS TS TS TS TS TS TS TS TS TS TS TS TS TS TS TS TS TS TS TS TS TS TS TS TS TS TS TS TS TS TS TS TS TS TS 24.084 24.085 24.086 24.087 24.088 24.090 24.091 24.093 24.096 24.135 25.101 25.102 25.104 25.105 25.106 25.113 25.123 25.133 25.141 25.142 25.143 25.201 25.211 25.212 25.213 25.214 25.215 25.221 25.222 25.223 25.224 25.225 25.301 25.302 25.303 25.304
283
Titel Call Forwarding supplementary service; Stage 3 Call Waiting (CW) and Call Hold (HOLD) Supplementary Service; Stage 3 MultiParty (MPTY) Supplementary Service; Stage 3 Closed User Group (CUG) Supplementary Service; Stage 3 Advice of Charge (AoC) Supplementary Service; Stage 3 User-to-User Signalling (UUS); Stage 3 Call Barring (CB) Supplementary Service; Stage 3 Unstructured Supplementary Service Data (USSD); Stage 3 Explicit Call Transfer (ECT) Supplementary Service; Stage 3 Call Completion to Busy Subscriber (CCBS); Stage 3 Name Identification Supplementary Service; Stage 3 Multicall supplementary service; Stage 3 UE Radio transmission and reception (FDD) UTRA (UE) TDD; Radio transmission and reception UTRA (BS) FDD; Radio transmission and reception UTRA (BS) TDD: Radio transmission and reception UTRA Repeater; Radio transmission and reception Base station and repeater electromagnetic compatibility (EMC) Requirements for support of radio resource management (TDD) Requirements for support of radio resource management (FDD) Base station conformance testing (FDD) Base station conformance testing (TDD) UTRA repeater; Conformance testing Physical layer - general description Physical channels and mapping of transport channels onto physical channels (FDD) Multiplexing and channel coding (FDD) Spreading and modulation (FDD) Physical layer procedures (FDD) Physical layer; Measurements (FDD) Physical channels and mapping of transport channels onto physical channels (TDD) Multiplexing and channel coding (TDD) Spreading and modulation (TDD) Physical layer procedures (TDD) Physical layer; Measurements (TDD) Radio Interface Protocol Architecture Services provided by the physical layer Interlayer procedures in Connected Mode UE Procedures in Idle Mode and Procedures for Cell Reselection in Connected Mode User Equipment (UE) positioning in Universal Terrestrial Radio Access Network (UTRAN); Stage 2 UE Radio Access capabilities definition Requirements on UEs supporting a release-independent frequency band
284
3G TS TS TS TS TS TS TS TS TS TS TS TS TS TS TS TS TS TS TS No. 25.321 25.322 25.323 25.324 25.331 25.401 25.402 25.410 25.411 25.412 25.413 25.414 25.415 25.419 25.420 25.421 25.422 25.423 25.424
TS 25.435 TS 25.442 TR 25.832 TR 25.834 TR 25.836 TR 25.837 TR 25.838 TR 25.839 TR TR TR TR TR TR 25.840 25.841 25.842 25.843 25.844 25.847
11.11 Conclusion
3G No. TR 25.848 TR TR TR TR TR TR TR TR TR TR TR TR TR TR TR TR TR TR TR TR TR TR TR 25.849 25.850 25.851 25.852 25.853 25.921 25.922 25.928 25.931 25.934 25.935 25.936 25.937 25.942 25.943 25.944 25.945 25.946 25.950 25.953 25.954 25.956 25.993
285
Titel Physical Layer Aspects of UTRA High Speed Downlink Packet Access DSCH power control improvement in soft handover UE positioning in UTRAN lub/Iur protocol aspects RAB Quality of Service (QoS) Renegotiation over lu Radio access bearer support enhancements for the lu Delay budget within the access stratum Guidelines and principles for protocol description and error handling Radio Resource Management Strategies 1,28 Mcps functionality for UTRA TDD physical layer UTRAN Functions, examples on signalling procedures AAL2 QoS optimization RRM optimisation Handover for realtime services from PS-domain UTRAN TDD low chiprate RF system scenarios Deployment aspects Channel coding and multiplexing examples RF requirements for low chip rate TDD option RAB Quality of Service (QoS) Negotiation over lu UTRA high speed downlink packet access TrFO/TFO Migration to modification procedure UTRA repeater: Planning guidelines and system analysis Typical examples of Radio Access Bearers (RABs) and Radio Bearers (RBs) supported by Universal Terrestrial Radio Access (UTRA) AMR speech Codec; General description AMR speech Codec; C-source code AMR speech Codec; Test sequences Minimum Performance Requirements for Noise Suppresser Application to the AMR Speech Encoder AMR speech Codec; Transcoding Functions AMR speech Codec; Error concealment of lost frames AMR speech Codec; comfort noise for AMR Speech Traffic Channels AMR speech Codec; Source Controlled Rate operation AMR Speech Codec; Voice Activity Detector for AMR Speech Traffic Channels Mandatory speech codec speech processing functions; Adaptive Multi-Rate (AMR) speech codec frame structure AMR speech Codec; Interface to lu and Uu Speech codec list for GSM and UMTS ANSI-C code for the floating-point Adaptive Multi-Rate (AMR) speech codec
TS TS TS TS
286
3G No. TS 26.110
TS 26.111 TS 26.115 TS 26.131 TS 26.132 TS 26.233 TS 26.234 TR 26.901 TR 26.911 TR 26.912 TR 26.975 TR 26.978 TS 27.001 TS 27.002 TS 27.003 TS 27.005 TS 27.007 TS 27.010 TS 27.060 TS 27.103 TR 27.901 TR 27.903 TS 28.062 TS 29.002 TS 29.007 TS 29.010
TS 29.011
11.11 Conclusion
287
3G No. TS 29.013
TS 29.016 TS 29.018
TS 29.060 TS 29.061
TS 29.078 TS 29.108 TS 29.119 TS 29.120 TS 29.198-01 TS 29.198-02 TS 29.198-03 TS 29.198-04 TS 29.198-05 TS 29.198-06 TS 29.198-07 TS 29.198-08 TS 29.198-11 TS 29.198-12 TS 29.202 TS 29.205 TS 29.232
Titel Signalling interworking between ISDN supplementary services Application Service Element (ASE) and Mobile Application Part (MAP) protocols Serving GPRS Support Node SGSN - Visitors Location Register (VLR); Gs Interface Network Service Specification General Packet Radio Service (GPRS); Serving GPRS Support Node (SGSN) - Visitors Location Register (VLR); Gs interface layer 3 specification General Packet Radio Service (GPRS); GPRS Tunnelling Protocol (GTP) across the Gn and Gp interface Interworking between the Public Land Mobile Network (PLMN) supporting Packet Based services and Packet Data Networks (PDN) Customised Applications for Mobile network Enhanced Logic (CAMEL); CAMEL Application Part (CAP) specification Application of the Radio Access Network Application Part (RANAP) on the E-interface GPRS Tunnelling Protocol (GTP) specification for Gateway Location Register (GLR) Mobile Application Part (MAP) specification for Gateway Location Register (GLR); Stage 3 Open Service Access (OSA) Application Programming Interface (API); Part 1: Overview Open Service Access (OSA) Application Programming Interface (API); Part 2: Common data Open Service Access (OSA) Application Programming Interface (API); Part 3: Framework Open Service Access (OSA) Application Programming Interface (API); Part 4: Call control Open Service Access (OSA) Application Programming Interface (API); Part 5: Generic user interaction Open Service Access (OSA) Application Programming Interface (API); Part 6: Mobility Open Service Access (OSA) Application Programming Interface (API); Part 7: Terminal capabilities Open Service Access (OSA) Application Programming Interface (API); Part 8: Data session control Open Service Access (OSA) Application Programming Interface (API); Part 11: Account management Open Service Access (OSA) Application Programming Interface (API); Part 12: Charging Signalling System No. 7 (SS7) signalling transport in core network; Stage 3 Application of Q.1900 series to bearer-independent circuitswitched core network architecture; Stage 3 Media Gateway Controller (MGC) - Media Gateway (MGW) interface; Stage 3
288
3G No. TS 29.414 TS 29.415 TR 29.993 TR 29.994 TR 29.998-01
TR 29.998-04-1
TR 29.998-05-1
TR 29.998-05-4
TR 29.998-06
TR 29.998-08
11.11 Conclusion
3G No. TS 32.111-4 TS 32.200 TS 32.205
289
Titel Telecommunication management; Fault Management; Part 4: Alarm Integration Reference Point: CMIP solution set Telecommunication management; Charging management; Charging principles Telecommunication management; Charging management; Charging data description for the Circuit Switched (CS) domain Telecommunication management; Charging management; Charging data description for the Packet Switched (PS) domain Telecommunication management; Charging management; Charging data description for application services Telecommunication management; Configuration Management (CM); Name convention for Managed Objects Telecommunication management; Configuration Management (CM); Notification Integration Reference Point (IRP): requirements Telecommunication management; Configuration Management (CM); Notification Integration Reference Point; Information Service version 1 Telecommunication management; Configuration Management (CM); Notification Integration Reference Point; CORE A solution set version 1:1 Telecommunication management; Configuration Management (CM); Notification Integration Reference Point: CMIP Solution Set Version 1:1 Telecommunication management; Generic Integration Reference Point (IRP) management; Requirements Telecommunication management; Generic Integration Reference Point (IRP) management; Information service Telecommunication management; Performance Management (PM); Concept and requirements Telecommunication management; Performance Management (PM); Performance measurements - UMTS and combined UMTS/GSM Telecommunication management; Configuration Management (CM); Concept and high-level requirements Telecommunication management; Configuration Management (CM); Basic CM Integration Reference Point (IRP): requirements Telecommunication management; Configuration Management (CM); Basic Configuration Management Integration Reference Point (IRP) information service Telecommunication management; Configuration Management (CM); Basic Configuration Management Integration Reference Point (IRP): CORE A solution set
TS 32.302
TS 32.303
TS 32.304
TS 32.600 TS 32.601
TS 32.602
TS 32.603
290
3G No. TS 32.604
TS 32.611
TS 32.612
TS 32.613
TS 32.614
TS 32.615
TS 32.621
TS 32.622
TS 32.623
TS 32.624
TS 32.631
TS 32.632
TS 32.633 TS 32.634
TS 32.641
11.11 Conclusion
3G No. TS 32.642
291
Titel Telecommunication management; Configuration Management (CM); UTRAN network resources Integration Reference Point (IRP): Network Resource Model (NRM) Telecommunication management; Configuration Management (CM); UTRAN network resources Integration Reference Point (IRP): CORE A solution set Telecommunication management; Configuration Management (CM); UTRAN network resources Integration Reference Point (IRP): CMIP solution set Telecommunication management; Management level procedures and interaction with UTRAN 3G security; Security architecture 3G security; Integration guidelines Cryptographic Algorithm requirements Lawful interception requirements 3G security; Lawful interception architecture and functions Security Objectives and Principles 3G Security; Network Domain Security (NDS); Mobile Application Part (MAP) application layer security Criteria for cryptographic Algorithm design process Formal Analysis of the 3G Authentication Protocol Access Security for IP based services 3G Security; General report on the design, specification and evaluation of 3GPP standard confidentiality and integrity algorithms 3G Security; Report on the design and evaluation of the MILENAGE algorithm set; Deliverable 5: An example algorithm for the 3GPP authentication and key generation functions Common test environments for User Equipment (UE) conformance testing Terminal logical test interface; Special conformance testing functions Terminal Conformance Specification, Radio Transmission and Reception (FDD) Terminal Conformance Specification, Radio Transmission and Reception (TDD) User Equipment (UE) conformance specification; Part 1: Protocol conformance specification User Equipment (UE) conformance specification; Part 2: Implementation conformance statement (ICS) specification User Equipment (UE) conformance specification; Part 3: Abstract test suites (ATSs) Electromagnetic compatibility (EMC) requirements for Mobile terminals and ancillary equipment Identification of test requirements for regulatory purposes in different regions/countries Table of international EMC requirements
TS 32.643
TS 32.644
TR 32.800 TS TS TS TS TS TS TS TR TR TR TR 33.102 33.103 33.105 33.106 33.107 33.120 33.200 33.901 33.902 33.903 33.908
TR 33.909
TS 34.108 TS 34.109 TS 34.121 TS 34.122 TS 34,123-1 TS 34.123-2 TS 34.123-3 TS 34.124 TR 34.910 TR 34.926
292
3G No. TS 35.201 TS 35.202 TS 35.203 TS 35.204 TS 35.205
TS 35.206
TS 35.207
TS 35.208
TR 35.909
Acronyms
Third Generation Partnership Project Third Generation Partnership Project 2 ATM Adaptation Layer 2 Segmentation and Reassembly Autocorrelation function Advanced Communications Technologies & Services Acquisition Indication Channel Advanced Mobile Phone Service Adaptive Multi-Rate Access Point Association of Radio Industries and Businesses Automatic Repeat Request Application Specific Integrated Circuit Advanced TDMA Asynchronous Mode Transfer
Binary Phase Shift Keying Broadband Radio Access to IP Network Broadband Radio Access Network Base Station Controller Base Transceiver Station Call Admission Control Customised Application of Mobile Enhanced Logic Common Control Channel Cross- correlation function Common Control Physical Channel Coded Composite Transport Channel Code Division Multiple Access Code Division Multiple Access 2000 Carrier to Interference Ratio Core Network Code Division Testbed Coded Orthogonal Frequency Division Multiple Access Communication and Mobility by Cellular Advanced Radio
ACF
ACTS AICH AMPS
CCF
CCPCH CCTrCH CDMA cdma2000
AMR
AP
ARiB
ARQ
ASIC ATOM A
CIR
ATM
BCCH BCH
CN
CODIT COFDMA
Broadcast Control Channel Broadcast Channel Bit Error Ratio Bundesministerium fur Bildung und Forschung Broadcast and Multicast Control
BER
BMBF
COMCAR
BMC
UMTS: The Fundamentals B. Walke, P. Seidenben5, M. P. Althoff (g) 2003 John Wiley & Sons, Ltd
294
CPCH
DRM
DRNC
Digital Rights Management Drift RNC Direct Sequence Downlink Shared Channel Direct Sequence Spread Spectrum Dedicated Traffic Discontinuous Transmission Digital Video Broadcasting Terrestrial Downlink Physical Synchronisation Channel Downlink Pilot Tone Slot Enhanced Data Rates for GSM Evolution Enhanced Full Rate Codec Enhanced General Packet Radio Service Enhanced GSM Equivalent Isotropic Radiated Power European Telecommunications Standards Institute European Union Forward Access Channel Feedback Information Frequency Division - Code Division Multiple Access Frequency Division Duplex Frequency Division Multiplex Frequency Division Multiple Access Forward Error Correction Frame Error Rate FRAMES Multiple Access Channel
DS
DSCH
DTCH
DTX
DVB-T DwPCH DwPTS EDGE EFRC EGPRS E-GSM EIRP ETSI
CSMA/CD
CTI
CWTS
DAB
D-AMPS DCCH
DCF DCH
DECT
EU
FACH
DPS
DPCH DPCCH DPDCH DRIVE
FBI
FD-CDMA
FDD FDM
FDMA
11.11 Conclusion
FPACH GERAN GGSN GMSC GMSK GPRS GSM GTP GTP-u Fast Physical Access Channel GSM/EDGE Radio Access Network Gateway GPRS Support Node Gateway Mobile Services Switching Centre Gaussian Mean Shift Keying General Packet Radio Service Global System for Mobile Communications GRPS Tunnel Protocol GRPS Tunnel Protocol User Part IN IP IPv4 IPv6 IS-136 IS-54 ISDN ISM ISO 1ST ITU
LA LA
LAI LCD LLC
295
Intelligent Network Internet Protocol Internet Protocol Version 4 Internet Protocol Version 6 TIA Interim Standard 136 TIA Interim Standard 54 Integrated Services Digital Network Industrial, Scientific and Medical International Organization for Standardization Information Society Technology International Telecommunications Union Link Adaptation Location Area Location Area Index Long Constraint Delay Logical Link Control Local Multipoint Distribution System Medium Access Control Media Access Point Multimedia Broadcast/ Multicast Service Mobile Broadband System Mobile Equipment Mobile Execution Environment Media Gateway Multiple Input Multiple Output
HiperLAN/1 High Performance Radio Local Area Network Type 1 HiperLAN/2 High Performance Radio Local Area Network Type 2 HLR Home Location Register HRC HSCSD HSDPA HSS I-CSCF IEEE IETF IMT-2000 Half Rate Codec High Speed Circuit Switched Data High Speed Downlink Packet Access Home Subscriber Server Interrogating Call State Control Function Institute for Electrical and Electronics Engineers Internet Engineering Task Force International Mobile Telecommunications at 2000 MHz Improved Mobile Telephone Service
LMDS
MAC
M-AP
MBMS
MBS
ME
MExE
MGW
IMTS
MIMO
296
MIND
MM
MMI MMS
PDP
PDSCH
MS
MSC
MT
MTS
OFDM
PSC
P-SCH
PSE PSK
PUSCH
PAN
PCCH P-CCPCH
QoS
QPSK
RA
RACE
RAN
RANAP RegTP
PDC
11.11 Conclusion
RLC RNC RNS
RNSAP RNTI RQCH Radio Link Control Radio Network Controller Radio Network Subsystem Radio Network Subsystem Application Part Radio Network Temporary Identifier Request Channel Radio Resource Radio Resource Control Radio Resource Management Roaming Signalling Gateway Rheinisch- Westfalische Technische Hochschule SIM Application Toolkit Secondary Common Control Physical Channel Synchronisation Channel Serving Call State Control Function Serving GPRS Support Node Silence Descriptor Subscriber Identity Module Session Initiation Protocol Signal to Interference Ratio Sub-Network Dependent Convergence Protocol Signalling Point Serving RNC Serving Radio Network Subsystem Secondary Synchronisation Channel
297
STP
Signalling Transfer Point Tl American standardisation committee Transport Block Set Transport Control Protocol Time Division - Code Division Multiple Access Time Division Duplex Time Division Multiplex Time Division Multiple Access
Tl
TBS TCP
TD-CDMA
TDD TDM
TDMA
RR
RRC RRM
R-SGW RWTH
TF
TFC
TFCI TFCS
Transport Format Transport Format Combination Transport Format Combination Identifier Transport Format Combination Set Transport Format Set Telecommunications Industry Association Transmitter Power Control Technical Specification Technical Specification Group Telecommunication Technology Association Telecommunication Technology Committee Transmission Time Interval Unconstrained Delay Data User Datagram Protocol User Equipment Uplink
SAT
S-CCPCH
SCH
S-CSCF SGSN
TTC 1 1 v_
SP
SRNC SRNS
SSC
UE UL
298
UMTS
Wireless Application Protocol WAP Next Generation World Administrative Radio Conference Wireless Base Station Wideband Code Division Multiple Access Working Group Wireless Local Area Network Wireless Metropolitan Area Network Wireless Media System World Radio Conference Wireless Relay Station Wireless Session Protocol World Trade Organisation Wireless Transaction Protocol World Wide Web
UPP URA
WAP-NG WARC
WBS
WCDMA
WG
W-LAN W-MAN
WMS WRC
WRS WSP
WTO WTP
VoIP
References
[1] An assessment of the viability of accommodating advanced mobile wireless (3g) systems in the 1710-1770 mhz and 2110-2170 mhz bands. http://www.ntia.doc.gov/ntiahome/threeg/. [2] Cellular networks: Past, present and http://www.acm.org/crossroads/xrds7-2/cellular.html. [3] Cellular telephone basics: Amps & http://www.privateline.com/Cellbasics/Cellbasics.html. future. beyond.
[4] Communication and mobility by cellular advanced radio (comcar). www.comcar.de. [5] Dynamic radio for IP-services in vehicular environments (drive), www.istdrive.org. [6] FCC streamlines part 22 of its rules, eliminates analog service requirement after five-year transition period. http://www.privateline.com/Cellbasics/FCCanalogcellular.doc. [7] World cellular subscribers by technology, www.3gamericas.org. [8] ETSI. Overall requirements on the radio interface(s) of the Universal Mobile Telecommunications System (UMTS). Draft UMTS ETR 04-01, ETSI, Sept. 1996. Ref. DTR/SMG-050401. [9] UMTS Forum. Spectrum for IMT-2000. Technical Report, UMTS Forum, Oct. 1997. [10] Harri Homa and Antti Toskala, editors. WCDMA for UMTSRadio Access For Third Generation Mobile Communications. Wiley, Chichester, 1st edition, 2000. [11] J. Huber, D. Weiler, and H. Brand. UMTS, the mobile multimedia vision for IMT-2000, a focus on standardization. In IEEE Communications Magazine, pages 129-136, Sep. 2000. [12] IEEE. The infestation challenge: Balancing cost and ubiquity in delivering wireless data. IEEE Personal Communications, pages 66-71, 2000. [13] ITU-T. Recommendation Q.1701: Framework for IMT-2000 networks. [14] ITU-T. Recommendation Q.1702: Network Functional Model for IMT2000. [15] Ralf Keller, Bernhard Walke, Gerhard Fettweis, Gert Bostelmann, Karl Heinz Mohrmann, Christoph Herrmann, and Rolf Kraemer. Wireless ATM for broadband multimedia wireless access: The ATMmobil project. IEEE Personal Communications, pages 66-80, October 1999. UMTS: The Fundamentals B. Walke, P. Seidenberg, M. P. Althoff 2003 John Wiley & Sons, Ltd
300
[16] Walter Konhauser. Innovating the mobile world beyond the third generation. In Proc. Visions of the Wireless World, Brussels, Belgium, December 2000. Workshop of the Wireless Stratigic Initiative. [17] H.D. Luke. Signaliibertragung. Berlin: Springer, 1992. [18] A. Maloberti and P. P. Giusto. Activities on third generation mobile systems in COST and ETSI. In Mobile Radio Conference (MRC'91), pages 235-242, Nice, France, Nov. 1991. [19] J. G. Proakis. Digital Communications. New York: McGraw-Hill, 3rd edition, 1995. [20] Adam Roach. SIP in 3gpp. www.sipforum.com, 2000. [21] H.D. Schotten. High speed downlink packet access: The first step tin 3G evolution. In 10. Aachen Symposium on Signal Theory, pages 37-42, September 2001. [22] P. Sehier, J-M. Gabriagues, and A. Urie. Standardization of 3G mobile systems. Alcatel Telecommunications Review, (1):11-18, 2001. [23] A.S. Tanenbaum. Computer Networks. Englewood Cliffs. NJ: PrenticeHall, Inc., 3. edition, 1996. [24] W. Tuttlebee, editor. Cordless Telecommunications in Europe. Berlin: Springer, 1990. [25] UMTS/3GPP. Ts 22.105 Universal Mobile Telecommunication System (UMTS); services & service capabilities. Technical report. [26] UMTS/3GPP. Ts 22.121, Universal Mobile Telecommunication System (UMTS); the virtual home environment. Technical report. [27] UMTS/3GPP. TS 23.002 v5.2.0 TSG services and systems aspects; network architecture (release 5). Technical report. [28] UMTS/3GPP. Ts 23.127, Universal Mobile Telecommunication System (UMTS); the virtual home environment; stage 2. Technical report. [29] UMTS/3GPP. Ts 23.910 Universal Mobile Telecommunication System (UMTS); circuit switched data bearer services. Technical report. [30] UMTS/3GPP. Ts 26.071 Universal Mobile Telecommunication System (UMTS); AMR speech codec; general description. Technical report. [31] UMTS/3GPP. Ts 29.198 Universal Mobile Telecommunication System (UMTS); open services architecture api part 1. Technical report. [32] UMTS/3GPP. Ts 29.998 Universal Mobile Telecommunication System (UMTS); open services architecture API part 2. Technical report.
Refer en ces
301
[33] B. Walke. Mobile data communications in Germanya survey. In Proceedings of 6th International Symposium on Personal and Indoor Mobile Radio Communications, pages 799-804, The Hague, Netherlands, Sept. 1994. [34] B. Walke. Hiperlan/2 ein weitgehend in Deutschland entwickelter Standard. In BMBF Symposium "Zukunftsperspektiven Mobilkommunikation", Neu-Ulm, Germany, Juni 2000. [35] B. Walke. Mobile Radio Networks, Networking, Protocols and Traffic Performance. Chichester, Weinheim, New York: John Wiley & Sons, 2001. 2nd edition. [36] B. Walke. Mobilfunknetze und ihre Protokolle. Wiesbaden: B.G. Teubner Verlag, 3rd revised edition, 2001. [37] Prof. Dr.-Ing. Matthias Wuschek. Messtechnische Ermittlung hochfrequenter elektromagnetischer Felder an Reprasentativen Orten in Schleswig-Holstein. Technical report, Ingenieurgemeinschaft fur Geowissenschaften und Umwelttechnik, Munchen, November 2000. Erstellt im Auftrag des Staatlichen Umweltamtes Kiel. [38] G. Xylomenos, G.C. Polyzos, P. Mahonen, and M. Saaranen. TCP performance issues over wireless links. IEEE Communications Magazine, pages 52-58, April 2001.
Index
Symbols
3G Americas Forum, 23 3GPP2, 33 3GPP, 33, 34, 36, 39 4G, 220 Asynchronous Transfer Mode, see ATM ATDMA, 35 ATM, 34, 224, 237, 238, 240 ATMmobil, 237 Audible interference, 152 Autocorrelation function, see ACF Automatic Repeat Request, see ARQ
A
A-Network, 11, 21 AAL2SAR, 80 Access Point, see AP Access slot, 170 ACF, 121 Acknowledged mode, 98 Acquisition Indication Channel, see AICH ACTS, 35, 237 Adaptive Multi-Rate, see AMR Advanced Communications Technologies & Services, see ACTS Advanced Mobile Phone Service, see AMPS Advanced TDMA, see ATDMA AICH, 170 AMPS, 11 AMPS, 11, 23 AMR, 216 AP, 240, 256, 259 Application layer, 93 Application Specific Integrated Circuit, see ASIC Architecture , see System architecture ARIB, 33 ARQ, 213, 241 ASIC, 36 Association of Radio Industries and Businesses, see ARIB Asymmetric traffic, 114, 225
B
B-Network, 11, 21 Base Station Controller, see BSC Base Transceiver Station, see BTS BCCH, 102, 106 BCH, 102, 107, 162, 171 bearer services, 211 Binary Phase Shift Keying, see BPSK BMC, 94, 99 BPSK, 131 BPSK, 131, 159, 164 BRAIN, 244, 249 BRAN, 244 Broadband Radio Access Network, see BRAN Broadband Radio Access to IP Network, see BRAIN Broadcast and Multicast Control, see BMC Broadcast Channel, see BCH Broadcast channels, 100 Broadcast Control Channel, see BCCH BSC, 56 BTS, 60
c
C-Network, 21 CAC, 57 Call admission control, 57
304
Index Code Division Testbed, see CODIT Code sequence, 117 Coded Composite Transport Channel. see CCTrCH Coded Orthogonal Frequency Division Multiple Access. see COFDMA Codes, 117, 139 OVSF codes, 130 OVSF codes Code tree, 130 OVSF-Codes, 129 quasi-orthogonal, 127. 133 spreading factor. 130 Spreading factor, 127 CODIT, 35 COFDMA, 258 Common Control Channel, see CCCH Common Control Physical Channel. see CCPCH Common Packet Channel, see CPCH Common Pilot Channel, see CPICH Compressed mode, 168 Computer Telephony Integration, see CTI control plane, 94 Controlling RNC, see CRNC Cordless systems, 220 Core Network, see CN CPCH, 107, 161 CPICH, 161, 167, 173, 196 CRNC, 65 Cross-correlation function, see CCF CSCF, 83-86 CSMA/CA, 239 CSMA/CD, 161 CTI, 87 Customised Application of Mobile Enhanced Logic , see CAMEL CWTS, 33
Call Admission Control, see CAC Call State Control Function, see CSCF CAMEL, 205 Carrier Sense Multiple Acces with Collision Avoidance, see CSMA/CA Carrier Sense Multiple Acces with Collision Detection, see CSMA/CD Carrier to Interference Ratio, see
cm
CCCH, 107 CCF, 121 CCPCH, 162, 174 CCTrCH, 95, 140, 155, 166, 177, 178, 181-185 CDMA Direct Sequence, 118 Chips, 118 Multiple-access interference, 132 Receiver, 132 Spreading code, 120 spreading factor, 120 Spreading factor, 127 cdma2000, 33, 36, 220 CDMA, 23, 29, 31, 32, 35, 111, 117, 118, 120, 122-125, 127, 132-134, 136, 142, 143, 147, 159, 187, 188, 191-193, 195 Cell breathing, 187, 190 Cell capacity, 191 cell search, 172 Cellular concept, 12 Channel capacity, 9 Channel coding, 151 Chinese Wireless Telecommunications Standards, see CWTS CIR, 16-19 Circuit switching, 51, 71 Cluster, 13 CN, 34, 47, 50, 53, 93 Co-channel interference, 16, 187 Code Division Multiple Access, see CDMA Code Division Multiple Access 2000, see cdma2000
D
D-AMPS, 23 DAB, 229 Data link layer. 92 DCCH, 106, 107. 181 DCF. 240
Index
DCH, 103, 107, 162, 181, 183 DECT, 30, 43, 114, 221 Dedicated Channel, see DCH Dedicated Control Channel, see DCCH Dedicated Physical Channel, see DPCH Dedicated Physical Control Channel, see DPCCH Dedicated Traffic Channel, see DTCH DFS, 237, 241 Digital Advanced Mobile Phone Service, see D-AMPS Digital Enhanced Cordless Telecommunications, see DECT Digital Rights Management, see DRM Digital Video Broadcasting Terrestrial, see DVB-T Direct Sequence, see DS Discontinuous Transmission, see DTX Distributed Coordination Function, see DCF Domains, 48 Downlink Physical Synchronisation Channel, see DwPCH Downlink Pilot Tone Slot, see DwPTS Downlink Shared Channel, see DSCH DPCCH, 161 166, 170, 171, 182 DPCH Burst structure, 165 Transmission rates, 167 DPCH, 161, 162, 165-167, 173, 176, 177, 182, 184 DPDCH Burst structure, 163 Transmission rates, 164 DPDCH, 160-165, 169, 171, 182, 183, 185 Drift RNC, see DRNC DRM, 41 DRNC, 65, 66 DS, 118, 123, 125, 127 DSCH, 107, 162 DTCH, 106, 107, 181
305
DTX, 154 Duplex distance, 112 duplex procedure, 111 Duplex technique Duplex distance, 112 Frequency-division duplex, 112 Duplication avoidance, 94 DVB-T, 230-232, 244 DwPCH, 179 DwPTS, 146, 179 Dynamic Frequency Selection, see DFS
E
E-GSM, 42 EDGE, 27, 31, 34, 220, 221, 261 EFRC, 26 EIRP, 227 Elektromagnetic compatibility, 233 Encryption, 99 Enhanced Data Rates for GSM Evolution, see EDGE Enhanced Full Rate Codec, see EFRC Enhanced GSM, see E-GSM Equivalent Isotropic Radiated Power, see EIRP ETSI, 33, 35, 36, 237-239, 244 EU, 35 European Telecommunications Standards Institute, see ETSI European Union, see EU FACH, 107, 162 Fast Physical Access Channel, see FPACH FBI, 163 FD-CDMA, 235 FDD, 29, 36, 112-114, 128, 131, 134, 136, 141-144, 146, 149-152, 156, 157, 159, 160, 163, 167, 168, 173, 176, 177, 180, 182, 184, 185, 188, 189, 192, 194, 195, 236 FDM, 225 FDMA, 23, 116-118, 142, 146, 148, 187, 195
306
Index
GSM, 17, 20, 23-27, 29, 31, 34, 36, 38^10, 113, 140, 148, 168, 195, 215, 220, 221, 224, 227, 228, 233, 236, 237, 244, 252-254 GTP-u, 80 GTP, 56
FEC, 95
Feedback Information, see FBI FEE, 95 Flow control, 99 FMA, 35 Forward Access Channel, see FACH Forward Error Correction, see FEC FPACH, 179 Frame Error Rate, see FER FRAMES Multiple Access, see FMA Frequency Division - Code Division Multiple Access, see FD-CDMA Frequency Division Duplex, see FDD Frequency Division Multiple Access, see FDMA Frequency Division Multiplex, see FDM Frequency duplex, 141 Frequency reuse, 13 Frequency spectrum, 42 Extended spectrum, 43 Frequency-division duplex, 112 Frequency-division multiple access technique, 116
H
Half Rate Codec, see HRC Handover, 21, 54, 58, 63, 66, 168 Soft handover, 63 Softer handover, 64 High Performance Radio Local Area Network Type 1, see HiperLAN/1 High Performance Radio Local Area Network Type 2, see HiperLAN/2 High Speed Circuit Switched Data, see HSCSD High Speed Downlink Packet Access, see HSDPA HiperLAN/1, 237, 239 HiperLAN/2, 227, 237, 239, 240, 242, 244, 246, 251 HLR, 55, 72 Home environment, 202 Home Location Register, see HLR Home Subscriber Server, see HSS HRC, 26 HSCSD, 27, 53 HSDPA, 226 HSS, 82, 84-86
I I-CSCF, 85, 86 i-Mode, 24 IEEE, 227, 237, 239, 240, 242, 246, 249, 251, 252, 254 IETF, 34 Improved Mobile Telephone Service, see IMTS IMT-2000 Overview, 29 IMT-2000, 28-31, 35, 42, 221, 222, 225, 227, 228 IMTS, 11 IN. 205
G
Gateway GPRS Support Node, see GGSN Gateway Mobile Services Switching Centre, see GMSC Gaussian Mean Shift Keying, see GMSK General Packet Radio Service, see GPRS GERAN, 34 GGSN, 56 Global System for Mobile Communications, see GSM GMSC, 55 GMSK, 27 GPRS Tunnel Protoco User Part, see
GTP-u
GPRS Tunnel Protocol, see GTP GPRS, 27, 34, 53, 215, 220, 223, 227, 244, 252, 254 GSM/EDGE Radio Access Network, see GERAN
Index
indicators, 160 Industrial, Scientific and Medical, see ISM Information Society Technology, see 1ST Institute for Electrical and Electronics Engineers, see IEEE Integrated Services Digital Network, see ISDN Intelligent Network, see IN intercell interference, 187 interference, 16 Interference, 187 interference cancellation, 132 Interleaving, 151, 165 International Mobile Telecommunications at 2000 MHz, see IMT-2000 International Organization for Standardization, see ISO International Telecommunications Union, see ITU Internet Protocol, see IP Internet Protocol Version 6, see IPv6 Interrogating Call State Control Function, see I-CSCF intracell interference, 187 IP tunnel, 73, 80 IP, 41, 246, 248 IPv6, 53, 87, 88 IS-136, 23 IS-54, 23 ISDN, 47, 55 ISM, 227, 237, 239 ISO/OSI reference model, 91 1ST, 244 ITU, 28, 29, 33, 221, 225, 230 lu-interface, 49, 53, 56, 75 lur-interface, 64 Link Adaptation, see LA Link budget, 189 LLC, 92 LMDS, 238 Local Multipoint Distribution System, see LMDS Location Area, 21, 55, 70 Location Area Index, see LAI Location management, 21, 68 Location area, 70 Routing area, 70 Location Update, 22, 101 Logical channels, 106 Logical Link Control, see LLC Long Constraint Delay, see LCD
30,
M
M-AP, 249-252, 255, 256 MAC, 80, 92, 94, 139, 159, 181, 240, 241 Man-Machine-Interface, see MMI matched filter, 121 MBMS, 41 MBS, 237 ME, 47 Media Access Point, see M-AP Media Gateway, see MGW Media Point, 246 Medium Access Control, see MAC MExE, 40, 206-209 MGW, 83 MIMO, 41 MIND, 244 MM, 213, 214 MMI, 204 MMS, 206 Mobile Equipment, see ME Mobile Execution Environment, see MExE Mobile Internet Networking Demonstrator, see MIND Mobile radio systems Capacity-limited-, 19 Interference-limited-, 18 Range-limited-, 18 Mobile Services Switching Centre, see MSC Mobile Station, see MS Mobile Telephone Service, see MTS
J
Java, 205, 207 joint detection, 132
L
LA, 241 LAI, 68 LCD, 212
308
Index
Orthogonal Frequency Division Multiplex, see OFDM Orthogonal Variable Spreading Factor, see OVSF OSA, 38, 40, 209 OSI, 91 OVSF, 129, 130, 152, 153, 164, 167, 168, 192 P-CCPCH, 162, 173, 174, 176 P-CSCF, 85, 86 P-SCH, 172 Packet Data Channel, see PDCH Packet Data Convergence Protocol, see PDCP Packet Data Protocol, see POP Packet Error Ratio, see PER Packet switching, 51, 72 Page Indication Channel, see PICK Paging Channel, see PCH Paging Control Channel, see PCCH PAN, 220, 244 PCCH, 107 PCF, 240 PCG, 34 PCH, 102, 162 PCM, 53 PCPCH, 161 PCtr-PDU, 240 PDC, 24, 26, 221 PDCH, 176 PDCP, 81, 94, 99, 100 POP, 73 PDSCH, 162, 174 PER, 242 Period Control Protocol Data Unit, see PCtr-PDU Personal Area Network, see PAN Personal Digital Cellular, see PDC Personal Handyphone Service, see PHS Personal service environment. 201 Personal Service Environment, see PSE Phase Shift Keying, see PSK PHS, 43 PHY, 80, 96 Phvsical channels, 95. 139. 159
Mobile Terminal, see MT Modulation, 1 QPSK, 2 Spectral characteristics, 4 Modulation technique, see QPSK MS, 111 MSC, 54, 84 MT, 249-253, 255 MTS, 11 Multicode transmission, 164, 166, 176 Multimedia, see MM Multimedia Broadcast/Multicast Service, see MBMS Multimedia Message Service, see MMS Multiple access, 141 Multiple access in FDD mode, 142 Multiple access in TDD mode, 143 Multiple access in TDD mode, low chip rate, 145 multiple access technique, 115 Multiple access technique Code-division multiple access technique, 117 Frequency-division multiple access technique, 116 Time-division multiple access technique, 116 Multiple Input Multiple Output, see MIMO
N
Near-far effect, 134, 146, 149, 170, 192 Network elements, 54 Network layer, 92 Node B, 95
o
OfcM, 59 OFDM, 222, 239 OMC, 47, 59 Open Service Architecture, see OSA Open System Interconnection, see OSI Operations and Maintenance Centre, see OMC Orthogonal carrier functions, 116
Index
Dedicated, 159 in FDD mode, 159 Indicators, 160 multiple access techniques, 115 Shared, 159 Transmission rates, 164, 167, 176, 179 Physical channels in TDD mode, 173 Physical channels in TDD mode low chip rate option, 178 Physical Common Packet Channel, see PCPCH Physical Downlink Shared Channel, see PDSCH Physical layer, 92, 139 Indicators, 160 Physical Layer, see PHY Physical Node B Synchronisation Channel, see PNBSCH Physical Random Acces Channel, see PRACH Physical Uplink Shared Channel, see PUSCH PICK, 174, 176 PNBSCH, 175, 178 Point Coordination Function, see PCF Power control, 58, 146 Power density, 118, 123 Power ramping, 170 PRACH, 161, 162, 169, 170, 174, 176 Presentation layer, 93 Primary Common Control Physical Channel, see P-CCPCH Primary Synchronisation Channel, see P-SCH Primary Synchronisation Code, see
309
QoS, 40, 241 QPSK, 2, 3, 5, 131, 141, 159, 164, 178, 180, 226 Quality of Service, see QoS Quarternary Phase Shift Keying, see QPSK quasi-orthogonal, 133
R
R-SGW, 83 RA, 70 RACE, 35 RACK, 102, 107, 161 Radio access network, 47 Radio Access Network, see RAN Radio Access Network Application Part, see RANAP radio interface, 111 Radio Link Control, see RLC Radio Network Controller, see RNC Radio Network Subsystem, see RNS Radio Network Subsystem Application Part, see RNSAP Radio Network Temporary Identifier, see RNTI Radio Resource, see RR Radio Resource Control, see RRC Radio Resource Management, see RRM RAN, 34, 47-49 RANAP, 75 Random access channel, 169 Random Access Channel, see RACH rate matching, 155 Receiver, 132 Correlation filter receiver, 122 interference cancellation, 132 joint detection, 132 single detection, 132 Receivers Single detection Near-far effect, 134 RegTP, 34, 38 Regulierungsbehode fur Telekommunikation und Post, see RegTP Request Channel, see RQCH
PSC
Processing gain, 124 Project Coordination Group, see
PCG
propagation attenuation, 15 Proxy Call State Control Function, see P-CSCF PSC, 172 PSE, 201-203 PSK, 131 Pulse Code Modulation, see PCM PUSCH, 174, 176
310
Research, Analysis, Communication, Evaluation, see RACE reuse distance, 16 Reuse distance, 14 RLC, 57, 80, 94, 97, 102 RNC, 47, 54, 56, 57, 66, 147, 195 RNS, 47 RNSAP, 77 RNTI, 97, 103 Roaming Signalling Gateway, see R-SGW Root-raised cosine filter, 132 Routing Area, see RA RQCH, 241 RR, 65 RRC, 94-96, 100, 102, 139, 154, 159 RRM, 57 RWTH, 238
Index
Signalling Point, see SP Signalling Transfer Point, see STP Silence Descriptor, see SID SIM Application Toolkit, see SAT SIM, 208, 248 single detection, 132 SIP, 83, 84, 86, 210 SIR, 95 SNDCP, 82 Soft handover, 139, 194 SP, 75 Spectrum, 42, 226 Television frequencies, 229 Speech codec, 216 Spectrum Extended spectrum, 43 Spreading, 119 Spreading code, see Codes Spreading factor, 120, 130, 142 SRNC, 65, 66, 76 SRNS relocation, 59, 66, 94 SRNS, 67 SSC, 172 Standardisation, 25, 33 Releases 4, 5 and 6, 40 Release 99, 38 STP, 75 Sub-Network Dependent Convergence Protocol, see SNDCP Subscriber Identity Module, see SIM supplementary services, 211 Switching point, 113, 144 Switching types, 50 Circuit switching, 71 Packet switching, 51, 72 Synchronisation Channel, see SCH System architecture, 47 Access plane, 53 Access stratum, 49 Circuit switching. 71. 79 Domains, 48 functional units, 48 IP-based, 82, 86 Location management. 68 Network elements. 54 Packet switching. 72, 80 Protocols, 75 Radio access network. 47
s
S-CCPCH, 162, 174, 176 S-CSCF, 85, 86 SAT, 40, 205, 208, 209 SCH, 162, 176, 178 Scrambling, 127 Scrambling code, 127, 153 Secondary Common Control Physical Channel, see S-CCPCH Secondary Synchronisation Channel, see SSC Segmentation, 151 Services Bearer services, 212 Classification, 211 Quality of service, 213 Serving Call State Control Function, see S-CSCF Serving GPRS Support Node, see SGSN Serving Radio Network Subsystem, see SRNS Serving RNC, see SRNC Session Initiation Protocol, see SIP Session layer, 93 SGSN, 56 Shannon theorem, 9 SID, 217 Signal to Interference Ration, see SIR
Index
311
Traffic capacity, 191, 234 Transmission errors, 7 Transmission rates, 164, 167, 176, 179, 234 Transmission Time Interval, see TTI Transmitter Power Control, see TPC Transparent mode, 98 Transport block, 103 Transport Block Set, see TBS Transport channels, 95, 102, 139, 151 Mapping to physical channels, 139 Transport Control Protocol, see TCP transport format, 139 Transport format, 103 Transport Format, see TF Transport format combination, 105 Transport Format Combination Identifier, see TFCI Transport Format Combination Set, see TFCS Transport Format Set, see TFS Transportkanale, 180 TS, 34 TSG, 34 TTA, 33 TTC, 33 TTI, 103 Types of switching Circuit switching, 51
T
Tl, 33 TBS, 103 TCP, 81 TD-CDMA, 221 TD-SCDMA, 41, 221 TDD, 29, 36, 113, 114, 128, 131, 132, 134, 141, 143-146, 149, 150, 152, 156, 157, 159, 173, 175-178, 180, 182, 184, 189, 195 TDMA, 23, 25, 35, 116-118, 148, 187, 195, 221 Technical Specification, see TS Technical Specification Group, see TSG Telecommunication Technology Assocication, see TTA Telecommunication Technology Committee, see TTC Telecommunications Industry Association, see TIA teleservices, 211 TF, 103 TFCI, 105, 106, 163-165, 171, 177, 179 TFCS, 105, 106 TFS, 103, 104 The physical layer, 95 Third Generation Partnership Project, see 3GPP Third Generation Partnership Project 2, see 3GPP2 TIA Interim Standard 136, see IS-136 TIA Interim Standard 54, see IS-54 TIA, 23 Time Division - Code Division Multiple Access, see TD-CDMA Time Division - Synchronised Code Division Multiple Access, see TD-SCDMA Time Division Duplex, see TDD Time Division Multiple Access, see TDMA time duplex, 141 time frames, 143 TPC, 163, 165, 177, 179, 237
u
UDD, 212 UDP, 81 UE, 48, 50, 51, 61, 93, 179 UL, 152 UMTS SIM Application Toolkit, see USAT UMTS Subscriber Identity Module, see USIM UMTS Terrestrial Radio Access, see UTRA UMTS Terrestrial Radio Access Network, see UTRAN UMTS, 2, 23, 27, 29-34, 36-40, 44, 111, 113, 118, 127-131, 134, 136, 141, 146, 147, 159, 169, 188-190, 192-195, 221, 223, 226,
312
228, 230-232, 234-237, 243, 245
Index
VLR, 55 Voice Activity Detection, see VAD Voice over IP, see VoIP VoIP, 53, 83, 88, 100
Unacknowledged mode, 98 Unconstrained Delay Data, see UDD Universal Mobile Telecommunication System, see UMTS Uplink, see UL Uplink Dedicated Physical Data Channel, see DPDCH Uplink Physical Synchronisation Channel, see UpPCH Uplink Pilot Tone Slot, see UpPTS Uplink Shared Channel, see USCH UpPCH, 179 UpPTS, 146, 179 URA, 70 USAT, 208 USCH, 107 User Datagram Protocol, see UDP User Equipment, see UE user plane, 94 USIM, 38, 47, 50 UTRA, 111, 141, 145, 159, 181 UTRAN Registration Area, see URA UTRAN, 79, 93, 111, 140, 147 Uu-interface, 93 PDCP layer, 100 RLC layer, 97 RRC layer, 100 Uu-Interface, 94 BMC layer, 99 MAC layer, 96 PHY layer, 95
w
W-LAN, 219-221, 227, 237-240, 243-247 W-MAN, 238 WAP Next Generation, see WAP-NG WAP-NG, 24 WAP, 27, 206, 207, 227 WARC, 227 WBS, 246-249, 251-257, 259 WCDMA, 221 WG, 34 Wideband Code Division Multiple Access, see WCDMA Wireless Application Protocol, see WAP Wireless Base Station, see WBS Wireless Local Area Network, see W-LAN Wireless media system. 246 Wireless Media System, see WMS Wireless Metropolitan Area Network. see W-MAN Wireless Relay Station, see WRS Wireless Session Protocol, see WSP Wireless systems, 220 Wireless Transaction Protocol, see WTP WMS, 246, 248-252, 254-257 Working Group, see WG World Administrative Radio Conference, see WARC World Radio Conference, see WRC World Trade Organisation, see WTO World Wide Web, see WWW WRC, 42, 227 WRS, 256, 257 WSP, 206 WTO, 34 WTP, 206 WWW, 235
V
VAD, 217 value-added services, 211 Value-added services Providers, 202 Variable transmission rates, 164 VHE, 29, 38, 201 Virtual Home Environment Architectural model, 204 Basic architecture, 203 Personal service environment, 201 Virtual Home Environment, see VHE Visitor Location Register, see VLR