Ericsson UMTS Feature Guidelines FSC Performance Engineering Document Initiated Revision Number Revision Date July 17, 2007 0.6 December 5, 2007 © Copyright 2007 T-Mobile USA, Inc. All rights reserved. Confidential and proprietary information of T-Mobile USA, Inc. Not for distribution outside T-Mobile. Ошибка! Используйте вкладку "Главная" для применения Title к тексту, который должен здесь отображаться. Document Information The information in these materials is confidential and proprietary to T-Mobile USA, Inc. These materials are authorized for the use of TMobile USA service providers and their employees and agents, solely for the purposes of the agreement under which these materials are provided. The rights granted hereunder constitute a limited, nonexclusive, revocable license and not a transfer of title. Authorized TMobile USA service providers and their employees and agents may view, copy or print pages of these materials solely for the purposes set forth herein, but may not otherwise use, modify, copy, print, display, reproduce, distribute, transmit, publish, license, sublicense or create derivative works from these materials in whole or in part, or remove any copyright or other proprietary notices set forth herein, without the express written permission of T-Mobile USA. The information in these materials is subject to change without notice. T-Mobile USA's liability for any errors in these materials is limited to the documentary correction of errors. T-Mobile USA will not be responsible in any event for errors in these materials or for any damages, incidental or consequential (including monetary losses), that might arise from the use of these materials or the information in them. T-Mobile, the T-Mobile logo and the World Class logo are registered or unregistered trademarks of Deutsche Telekom AG. Acknowledgements The following individuals are responsible for contribution to the specifications, design and implementations represented in the various revisions: Alejandro Aguirre Changbo Wen Dinesh Arcotkumar Pankaj Chopra Ryan Kolln Shubhankar Saha Sireesha Panchagnula Protection of Information Credibility This document contains confidential material critical to the business and is therefore a controlled document. Outdated copies must be destroyed to prevent erroneous use of obsolete information and compromised security of confidential material. Do not e-mail this file. Do send the link to correspondents so they are assured of seeing the latest revision. The most recent revision of this file is always in softcopy and can be accessed at the following link. Doc server hyperlink, without the &filename part. Note to revisers: For the above link to remain valid, you must use proper check out / check in procedures when you update this document. Revision Code The revision number will reflect the modifications by following the format Rev. x, y, where X is the first digit, incremented for changes of substance, i.e. technical/procedural issues. Y is the second digit, incremented when editorial only changes have been incorporated. All draft/preliminary versions are 0.n; the first final version is Revision 1.0. Revision History Rev. Date 0.1 07/17/2007 T-Mobile USA, INC. Confidential Author Information Alejandro Aguirre and Sireesha Panchagnula Initial document for Ericsson UMTS features covering Neighbor List, Soft Handover, 3G to 3G cell Reselection and Location and Routing Area. Rev. 0.6 December 5, 2007 2 of 214 Ошибка! Используйте вкладку "Главная" для применения Title к тексту, который должен здесь отображаться. 0.2 8/07/07 Sireesha Panchagnula 0.21 0.3 8/09/07 8/28/07 0.4 9/26/07 Sireesha Panchagnula Ryan Kolln, Sireesha Panchagnula Alejandro Aguirre and Sireesha Panchagnula 0.5 11/26/07 Sireesha Panchagnula 0.6 12/5/07 Alejandro Aguirre, Dinesh Arcotkumar and Sireesha Panchagnula T-Mobile USA, INC. Confidential Updates made to original content in IRAT Guideline and transferred to this document for Ericsson 3G. Same content as V 0.2. V0.21 has tracking disabled. Power Control Section added to the document. Added sections Call setup, Random Access Procedure and Paging. Additional content to section 10.7. based on feedback form south region. Added sections Capacity Management Overview, Admission Control and Congestion Control Added content on UE States, PS data services and Channel switching Rev. 0.6 December 5, 2007 3 of 214 Ошибка! Используйте вкладку "Главная" для применения Title к тексту, который должен здесь отображаться. Table of Contents 1. 2. 1.1. 1.2. 2.1. 2.1.1. 2.1.2. 2.1.3. 2.1.4. 2.2. 3. 3.1. 3.2. 3.3. 3.4. 4. 4.1. 4.1.1. 4.1.2. 4.1.3. 4.1.4. 4.2. 4.3. 4.3.1. 4.3.2. 4.3.3. 4.4. 4.5. 4.5.1. 4.5.2. 4.5.3. 4.6. 4.7. 4.7.1. 4.7.2. 4.7.3. 4.7.4. 4.7.5. 5. 5.1. 5.1.1. 5.1.2. 5.1.3. 5.1.4. 5.1.5. 5.2. 5.2.1. 5.2.2. 5.2.3. 5.2.4. 5.2.5. Introduction ....................................................................................................................... 9 Purpose & Scope ...........................................................................................................................9 Definitions for this Document .........................................................................................................9 Neighbor List .................................................................................................................... 12 Monitored Set Creation ................................................................................................................ 12 Neighbor Cell Priority................................................................................................................... 13 IAF Monitored Subset Creation..................................................................................................... 13 Field example of Monitored set creation ....................................................................................... 15 IEF and GSM Monitored Subset Creation ...................................................................................... 15 Neighbor List Creation and Priority ............................................................................................... 15 3G to 2G Neighbor List Generation .................................................................................. 18 UMTS to GSM 1:1 overlay with matched azimuths ......................................................................... 18 UMTS to GSM 1:1 overlay with mis-matched azimuths .................................................................. 19 UMTS site without overlay ........................................................................................................... 19 New GSM site added to the 2G Network ....................................................................................... 20 Idle Mode Process, Algorithms and Parameters .............................................................. 21 PLMN Selection ........................................................................................................................... 22 PLMN Selection at UE switch on ................................................................................................... 22 PLMN selection in Automatic Mode ............................................................................................... 22 PLMN Selection in Manual Mode ................................................................................................... 24 PLMN Selection while Roaming .................................................................................................... 24 Cell Selection Procedure in UTRAN state ....................................................................................... 24 Cell Reselection Parameters from 3G to 3G ................................................................................... 26 Measurements ............................................................................................................................ 26 Eligibility ..................................................................................................................................... 26 Ranking ...................................................................................................................................... 27 Recommended Values for 3G to 3G Selection and Reselection parameters ...................................... 28 Cell Reselection Parameters from 3G to 2G ................................................................................... 29 Measurements ............................................................................................................................ 29 Eligibility ..................................................................................................................................... 30 Ranking ...................................................................................................................................... 30 Recommended Values for 3G to 2G Reselection parameters .......................................................... 32 Location and Routing Area Registration and Updating ................................................................... 33 Terminology ............................................................................................................................... 33 Normal LA and RA Updating ........................................................................................................ 34 Periodic LA and RA Updating ....................................................................................................... 34 IMSI Attach/Detach ..................................................................................................................... 35 Recommended Values for LA and RA update parameters ............................................................... 36 Call Setup Procedure ........................................................................................................ 37 Circuit Switched Call Setup .......................................................................................................... 37 RRC Setup Phase, CS Voice ......................................................................................................... 37 Pre-RAB Phase, CS Voice ............................................................................................................. 38 RAB Setup Phase, CS Voice ......................................................................................................... 41 Counters Related to CS Voice Call Setup ....................................................................................... 43 Circuit Switched Voice Accessibility KPI ......................................................................................... 47 Packet Switched Call Setup .......................................................................................................... 48 RRC Setup Phase, PS Setup ......................................................................................................... 48 Pre-RAB Phase, PS Setup............................................................................................................. 49 RAB Setup Phase, PS Setup ......................................................................................................... 51 Counters Related to PS Setup ...................................................................................................... 53 Packet Switched Accessibility KPI ................................................................................................. 55 T-Mobile USA, INC. Confidential Rev. 0.6 December 5, 2007 4 of 214 Ошибка! Используйте вкладку "Главная" для применения Title к тексту, который должен здесь отображаться. 6. Random Access Procedure ............................................................................................... 56 6.1. Random Access Overview ............................................................................................................ 56 6.1.1. Random Access Channels ............................................................................................................ 56 6.1.2. Open Loop Power Control ............................................................................................................ 57 6.1.3. Physical Layer Random Access Procedure ..................................................................................... 58 6.1.4. MAC Monitoring and Control of Random Access Transmissions ....................................................... 60 6.1.5. RRC Control or Random Access Transmissions .............................................................................. 61 6.1.6. Interaction of RRC, MAC and Physical Layer Random Access Procedures ........................................ 62 6.1.7. RACH Sub-Channels .................................................................................................................... 63 6.1.8. Access Class and Access Service Class .......................................................................................... 64 6.2. Ericsson Specific Parameter for Random Access ............................................................................ 66 6.3. Random Access Parameter Optimization and Troubleshooting ........................................................ 66 7. Paging Procedures............................................................................................................ 69 7.1. Paging Types .............................................................................................................................. 70 7.1.1. Paging Type 1............................................................................................................................. 70 7.1.2. Paging Type 2............................................................................................................................. 71 7.2. Paging Channels ......................................................................................................................... 72 7.2.1. Paging Indication Channel ........................................................................................................... 72 7.3. DRX Procedure ........................................................................................................................... 73 7.4. Paging Repetition ........................................................................................................................ 75 7.5. Ericsson Specific Parameter and Counters for Paging .................................................................... 75 7.5.1. Ericsson Paging Control Parameters ............................................................................................. 75 7.5.2. Ericsson Paging Counters ............................................................................................................ 75 8. Soft/Softer Handover Feature .......................................................................................... 78 8.1. Soft/Softer Handover Procedure and Parameters .......................................................................... 78 8.1.1. Event 1a Evaluation .................................................................................................................... 80 8.1.2. Event 1b Evaluation .................................................................................................................... 81 8.1.3. Event 1c Evaluation ..................................................................................................................... 82 8.1.4. Event 1d Evaluation .................................................................................................................... 83 8.1.5. Event Triggered Periodical Measurement Reporting ....................................................................... 85 8.1.6. Buffering and Queuing ................................................................................................................ 85 8.1.7. Soft/Softer Handover Execution ................................................................................................... 85 8.1.8. Soft/Soft Handover Signaling ....................................................................................................... 86 8.1.9. ReleaseConnOffset setting ........................................................................................................... 88 8.2. Recommended Values for Soft/Softer handover parameters .......................................................... 88 9. Compressed Mode Operation ........................................................................................... 90 9.1. Halving the Spreading factor (SF/2) Method ................................................................................. 90 9.2. Higher Layered Scheduling (HLS) Method: .................................................................................... 91 9.3. Compressed Mode Pattern ........................................................................................................... 91 9.4. Limitations on number of mobiles in Compressed Mode ................................................................. 92 10. 3G to 2G Handover and Cell Change Procedure and Parameters .................................... 93 10.1. T-Mobile Strategy for IRAT .......................................................................................................... 93 10.2. Feature Activation ....................................................................................................................... 93 10.3. IRAT Interaction with Inter-Frequency Handover .......................................................................... 94 10.4. 3G to 2G IRAT Handover/Cell Change Procedure .......................................................................... 94 10.4.1. Event based Connection quality monitoring .................................................................................. 94 10.4.2. Event based GSM measurements reporting ................................................................................... 98 10.4.3. Identification of target GSM cell for Handover/Cell Change .......................................................... 100 10.4.4. 3G to 2G IRAT Handover/Cell Change Execution ......................................................................... 100 10.5. Scenarios for 3G to 2G IRAT Handover / Cell Change .................................................................. 105 10.5.1. Edge Thresholds ....................................................................................................................... 106 10.5.2. Core Thresholds ........................................................................................................................ 106 10.6. Parameter recommendations for IRAT Scenarios ......................................................................... 106 T-Mobile USA, INC. Confidential Rev. 0.6 December 5, 2007 5 of 214 Ошибка! Используйте вкладку "Главная" для применения Title к тексту, который должен здесь отображаться. 10.6.1. Edge Thresholds ....................................................................................................................... 107 10.6.2. Core Thresholds ........................................................................................................................ 107 10.7. 3G to 2G IRAT Handover/Cell Change Optimization Strategy ....................................................... 108 11. Emergency Call treatment .............................................................................................. 110 12. 2G to 3G IRAT Cell Reselection ...................................................................................... 112 12.1. Ericsson 2G to Ericsson 3G Reselection ....................................................................................... 112 12.1.1. Measurements on WCDMA neighbors in idle mode ...................................................................... 113 12.1.2. Cell Reselection to UMTS for mobiles that don’t support RSCP evaluation ..................................... 113 12.1.3. Cell Reselection to UMTS for mobiles that support RSCP evaluation.............................................. 115 12.2. Nokia 2G to Ericsson 3G Reselection .......................................................................................... 115 12.2.1. UTRAN Neighbor Definitions and System Information .................................................................. 116 12.2.2. Measurements on WCDMA neighbors in idle mode ...................................................................... 116 12.2.3. Cell Reselection to UMTS for mobiles that don’t support RSCP evaluation ..................................... 117 12.2.4. Cell Reselection to UMTS for mobiles that support RSCP evaluation .............................................. 118 12.3. Nortel 2G to Ericsson 3G Reselection .......................................................................................... 119 12.3.1. Measurements on WCDMA neighbors in idle mode ...................................................................... 120 12.3.2. Cell Reselection to UMTS for mobiles that don’t support RSCP evaluation ..................................... 120 12.3.3. Cell Reselection to UMTS for mobiles that support RSCP evaluation .............................................. 121 13. Capacity Management Overview .................................................................................... 123 13.1. Overview of UMTS Resources .................................................................................................... 124 13.1.1. DL Power ................................................................................................................................. 124 13.1.2. Received Total Wideband Power ................................................................................................ 125 13.1.3. OVSF Codes .............................................................................................................................. 125 13.1.4. RBS Channel Elements .............................................................................................................. 126 13.2. Common Resource Utilization..................................................................................................... 127 13.2.1. Overhead and Common Channels .............................................................................................. 127 13.2.2. Maximum Downlink Transmission Power .................................................................................... 129 13.2.3. HSDPA Resources ..................................................................................................................... 129 13.3. Dedicated Monitor Resource Handling ........................................................................................ 130 13.3.1. Downlink Channelization Code Monitor ....................................................................................... 130 13.3.2. Histogram Monitor .................................................................................................................... 130 13.3.3. Downlink Transmitted Carrier Power .......................................................................................... 131 13.3.4. ASE Monitor .............................................................................................................................. 132 13.3.5. RTWP Monitor .......................................................................................................................... 133 13.3.6. RBS Hardware Monitor .............................................................................................................. 133 13.4. Services Class and Setup Type ................................................................................................... 133 13.4.1. Service Class ............................................................................................................................ 133 13.4.2. Setup Type ............................................................................................................................... 134 14. Admission Control .......................................................................................................... 135 14.1. Enhanced Soft Congestion ......................................................................................................... 135 14.2. Downlink OVSF Code Usage Admission ....................................................................................... 136 14.3. Histogram Admission ................................................................................................................. 137 14.3.1. Downlink OVSF Code Admission ................................................................................................. 137 14.3.2. Uplink OVSF Code Admission ..................................................................................................... 138 14.3.3. HSDPA Admission ..................................................................................................................... 138 14.3.4. Compressed Mode Admission ..................................................................................................... 139 14.4. Transmitted Downlink Carrier Power Admission........................................................................... 139 14.5. Air Interface Speech Equivalents Admission ................................................................................ 141 14.5.1. Uplink ASE Admission ................................................................................................................ 141 14.5.2. Downlink ASE Admission ........................................................................................................... 143 14.6. Node B Hardware Admission ...................................................................................................... 145 14.6.1. Uplink Channel Element Admission ............................................................................................. 145 14.6.2. Downlink Channel Element Admission ........................................................................................ 147 T-Mobile USA, INC. Confidential Rev. 0.6 December 5, 2007 6 of 214 Ошибка! Используйте вкладку "Главная" для применения Title к тексту, который должен здесь отображаться. 14.7. Admission Control Parameters ................................................................................................... 149 14.8. Counters Related to Admission Control ....................................................................................... 149 15. Congestion Control ......................................................................................................... 153 15.1. Downlink Cell Congestion .......................................................................................................... 153 15.2. Uplink Cell Congestion ............................................................................................................... 155 15.3. Resolution of Congestion ........................................................................................................... 156 15.4. Congestion Control Parameters .................................................................................................. 158 15.5. Counters Related to Congestion Control ..................................................................................... 158 16. Power Control ................................................................................................................. 164 16.1. Importance of Power Control ..................................................................................................... 164 16.2. Overall Power Control Procedure ................................................................................................ 164 16.3. Power Control of downlink common channels ............................................................................. 165 16.4. Open Loop Power Control (Power Control of uplink common channels) ........................................ 166 16.5. Power Control of Dedicated channels ......................................................................................... 168 16.5.1. Initial Downlink Power Setting ................................................................................................... 169 16.5.2. Downlink Power Limits .............................................................................................................. 171 16.5.3. Initial Uplink Power Setting ........................................................................................................ 173 16.5.4. Initial Uplink SIR Target Setting ................................................................................................. 174 16.5.5. Uplink Outer Loop Power Control ............................................................................................... 175 16.5.6. Downlink Outer Loop Power Control ........................................................................................... 177 16.5.7. Downlink Inner Loop Power Control ........................................................................................... 177 16.5.8. Uplink Inner Loop Power Control ................................................................................................ 177 16.6. Power Control during Soft Handover .......................................................................................... 178 16.6.1. Uplink power control during SHO ............................................................................................... 178 16.6.2. Downlink power control during Soft Handover ............................................................................ 179 16.7. Power Control during Compressed Mode .................................................................................... 182 16.7.1. Uplink Power Control in Compressed Mode ................................................................................. 182 16.7.2. Downlink Power Control in Compressed Mode ............................................................................. 182 16.8. Power Control Scenarios ............................................................................................................ 183 16.8.1. Power Control steps for Radio Link Setup Procedure ................................................................... 183 16.8.2. Power Control steps for RAB Establishment ................................................................................ 183 16.8.3. Power Control steps for Soft Handover ....................................................................................... 184 16.9. Example of Power Control Procedure .......................................................................................... 184 17. UE States ........................................................................................................................ 186 17.1. Cell_DCH .................................................................................................................................. 186 17.1.1. CELL_DCH to CELL_FACH state .................................................................................................. 187 17.2. Cell_FACH ................................................................................................................................ 187 17.2.1. CELL_FACH to CELL_DCH .......................................................................................................... 187 17.2.2. CELL_FACH to URA_PCH ........................................................................................................... 188 17.3. URA_PCH ................................................................................................................................. 188 17.3.1. URA_PCH to CELL_FACH ........................................................................................................... 189 17.3.2. URA_PCH to IDLE ..................................................................................................................... 189 18. Introduction to R99 PS data services............................................................................. 190 18.1. Radio bearer QoS ...................................................................................................................... 190 18.2. Differentiation between traffic classes ........................................................................................ 190 18.3. Radio Resource Management for packet data services ................................................................. 191 18.4. Active Queue Management feature ............................................................................................ 191 18.5. Channel Switching Feature ........................................................................................................ 192 18.6. Channel Switching Triggers ....................................................................................................... 192 18.7. Triggers for Dedicated to Dedicated channel switching ................................................................ 193 18.7.1. Throughput-triggered Upswitch ................................................................................................. 193 18.7.2. Throughput-triggered Downswitch ............................................................................................. 193 18.7.3. Coverage-triggered downswitch ................................................................................................. 193 T-Mobile USA, INC. Confidential Rev. 0.6 December 5, 2007 7 of 214 Ошибка! Используйте вкладку "Главная" для применения Title к тексту, который должен здесь отображаться. 18.8. Multi RAB State Transitions ........................................................................................................ 194 18.8.1. Speech + Interactive ................................................................................................................. 194 18.8.2. 2xInteractive ............................................................................................................................ 194 18.8.3. Speech + 2xInteractive ............................................................................................................. 194 19. Channel Switching Algorithms ....................................................................................... 195 19.1. Common to Dedicated Evaluation ............................................................................................... 195 19.2. Dedicated to Common Evaluation ............................................................................................... 196 19.3. Common to URA Evaluation ....................................................................................................... 197 19.4. URA to Idle Evaluation .............................................................................................................. 197 19.5. Coverage Triggered Downswitch Evaluation ................................................................................ 197 19.6. Dedicated to Dedicated Upswitch Evaluation ............................................................................... 198 19.7. Throughput Based Dedicated to Dedicated Downswitch Evaluation .............................................. 200 19.8. Multi RAB Downswitch Evaluation .............................................................................................. 200 19.9. Multi RAB Upswitch Evaluation ................................................................................................... 200 19.10. Channel Switching Parameter Optimization ................................................................................. 201 20. Appendix A: Weighting Factor Analysis for Soft Handover Algorithm ........................... 202 20.1. Event 1a evaluation................................................................................................................... 202 20.2. Event 1b evaluation .................................................................................................................. 203 20.3. Tradeoff due to weighting factor ................................................................................................ 203 21. Appendix B: Monitored Set Creation Field Example ....................................................... 205 21.1. Description ............................................................................................................................... 205 21.2. Execution ................................................................................................................................. 205 21.3. Neighbor Lists ........................................................................................................................... 205 21.4. Results ..................................................................................................................................... 205 22. Appendix C: Parameter Recommendations for 3G to 2G Reselection ........................... 209 23. Appendix D: Parameter Recommendations for 3G to 2G Handover/Cell Change ......... 210 24. Appendix E: Parameter Recommendations for 2G to 3G Reselection ............................ 212 24.1. Ericsson BSS ............................................................................................................................. 212 24.2. Nokia BSS ................................................................................................................................. 212 24.3. Nortel BSS ................................................................................................................................ 212 25. Appendix F: Parameter Recommendations for Channel Switching ............................... 213 26. Reference ....................................................................................................................... 214 T-Mobile USA, INC. Confidential Rev. 0.6 December 5, 2007 8 of 214 Ошибка! Используйте вкладку "Главная" для применения Title к тексту, который должен здесь отображаться. 1. Introduction 1.1. Purpose & Scope The intent of this document is to introduce the important UMTS features of the Ericsson Radio Access Network (RAN), and provide detailed algorithms and parameters related to these features. Wherever applicable, recommended values for these parameters are also provided. In the initial phases these recommended values are based on vendor recommendations and prior UMTS experience. Once UMTS networks are available for testing, these parameters will be tested and updated with new recommended values. The recommended values per feature are listed at the end of each section or in the Appendix for quick and easy access. The parameters and algorithms described here are applicable to the P5 release. This document is not all inclusive and merely provides a quick reference to some of the various UMTS features available in the Ericsson UMTS RAN. For any information not covered here, the relevant Ericsson product documentation should be referenced. 1.2. Definitions for this Document Term or Acronym 3GPP Definition Third Generation Partnership Project AS Active Set BSIC Base Station Identity Code BTS Base Transceiver Station CN Core Network CPICH Common Pilot Channel DCH Dedicated Channel DL DownLink DPCCH Dedicated Physical Control Channel DPCH Dedicated Physical Channel DRNC Drift Radio Network Controller FACH Forward Access Channel T-Mobile USA, INC. Confidential Rev. 0.6 December 5, 2007 9 of 214 Ошибка! Используйте вкладку "Главная" для применения Title к тексту, который должен здесь отображаться. FIFO First In First Out GERAN GSM EDGE RAN GSM Global System for Mobile Communications HCS Hierarchical Cell Structure IAF Intra Frequency IE Information Element IEF Inter Frequency IFHO Inter Frequency HandOver Inter-RAT Inter Radio Access Technology IRAT Inter Radio Access Technology Iur Interface between two RNCs KPI Key Parameter Indicator LA Location Area LAI Location Area Indicator NBAP Node B Node B Application Part Logical node responsible for radio transmission and reception in one or several cells OCNS Orthogonal Channel Noise Simulator PLMN Public Land Mobile Network RA Routing Area RAB Radio Access Bearer RAI Routing Area Indicator RAN Radio Access Network RAT Radio Access Technology RB Radio Bearer T-Mobile USA, INC. Confidential Rev. 0.6 December 5, 2007 10 of 214 Ошибка! Используйте вкладку "Главная" для применения Title к тексту, который должен здесь отображаться. RBS Radio Base Station – another name for the Node B RF Radio Frequency RL Radio Link RNC Radio Network Controller RRC Radio Resource Control RSCP Received Signal Code Power RSSI Received Signal Strength Indicator SIB System Information Block SIR Signal to Interference Ratio TRX Transceiver TX Transmit UE User Equipment UL UMTS UpLink Universal Services UTRAN UMTS Terrestrial Radio Access Network WCDMA Wideband Code Division Multiple Access T-Mobile USA, INC. Confidential Mobile Rev. 0.6 Telecommunication December 5, 2007 11 of 214 Ошибка! Используйте вкладку "Главная" для применения Title к тексту, который должен здесь отображаться. 2. Neighbor List Neighbor List creation is crucial to the proper operation of a WCDMA network. When the UE is in connected mode, the RNC follows it on cell level. Once it knows in which cell the UE is located, the RNC checks information about all the neighboring cells and transmits the data back to the UE. The RNC updates continuously the neighbor cell lists in order to reflect the changing neighborhood of a moving mobile station in connected mode. By relaying information about neighbor cells to the UE, the RNC is effectively telling it what to look for, and the RNC knows what the available options are if the load in the serving cell increases. Neighbor cell definitions also speed up cell re-selection procedures, as the UE does not have to decode the scrambling codes of other cells. The cells in a WCDMA RAN, from the UE’s point of view are divided into the following sets as per 3GPP 25.331 [4]. Active Set: The cells involved in Soft/Softer Handover and measured by the UE. Virtual Active Set: The Active set associated with a non-used frequency for support of Inter-Frequency evaluation. Monitored Set: The cells measured by the UE but not part of the Active Set. The monitored set is further divided into intra-frequency monitored subset, interfrequency monitored subset and GSM monitored subset. Detected Set: The intra frequency cells (P-CPICH scrambling codes) detected by the UE but not part of the Monitored Set. The number of Intra-frequency cells in the Monitored Set + the Active Set cells is limited to 32 as per [4]. The number of Inter-Frequency cells in the Monitored set is limited to 32. The number of Inter-RAT cells in the Monitored set is limited to 32. 2.1. Monitored Set Creation The maximum number of cells that a UE is required to measure according to [4] is 32 of each type - Intra-Frequency, Inter-Frequency and GSM cells. For IEF cells, the number may be divided between a maximum of two frequencies. The IAF monitored subset always includes the cells in the active set. The IAF Monitored Subset is obtained by performing Monitored Subset Reduction with MaxMonSubset=MaxIafMonSubset = C_MaxSohoListSubset(32) –PresActiveSet, where PresActiveSet is the number of cells in the present Active Set. It is equal to 1 when the connection is set up on CELL_DCH. The cells in the Reduced IAF neighbor Cell Lists that are not included in the IAF Monitored Subset shall be retained in the IAF Unmonitored Subset. The IAF Unmonitored Subset is used to check if a reported cell, belonging to the Detected Set, is a valid cell. The IEF Monitored Subset is obtained by performing Monitored Subset Reduction with MaxMonSubset=MaxIefMonSubset = maxIefMonSubset(32). A maximum of two unused frequencies are included in the IEF Monitored Set, if a third frequency is found during the filtering process then all “third-frequency” inter frequency neighbor cells are discarded. The GSM Monitored subset is obtained by performing Monitored Subset reduction with MaxMonSubset=MaxGSMMonSubset = maxGsmMonSubset(32). T-Mobile USA, INC. Confidential Rev. 0.6 December 5, 2007 12 of 214 Ошибка! Используйте вкладку "Главная" для применения Title к тексту, который должен здесь отображаться. Recommended Values: The parameters maxIefMonSubset and maxGsmMonSubset are recommended to be set to a value of 32. The parameter C_MaxSohoListSubset is a constant hard coded value and is set to 32 by Ericsson. The listed set sent to the UE contains the Active Set cells, plus the monitored set cells. The monitored set is created from the neighbor cell lists of all the cells in the Active Set, and if the resulting Monitored subset contained in the listed set becomes larger than MaxMonSubset, some of the neighbor cells will be removed and stored in the unmonitored set. 2.1.1. Neighbor Cell Priority The neighbor cell priority defined by selectionPriority is used when building the monitored set, so that neighbor cells with higher priority are included before low priority neighbors, for each cell in the active set. The neighbor priorities are not compared between different cells in the active set, priorities only apply among defined neighbors out from the same cell. If several neighbors are given the same priority, the order between them is not defined. The highest priority is 1, which should be given to the most important neighbors. If no value or a value of zero is entered when a neighbor is defined, the system will automatically set it to the currently highest used value of selectionPriority + 1, that is, to the currently lowest priority definition for the source cell and for the relation type (Intra / Inter / GSM).This priority can be set separately for IAF, IEF and GSM neighbors. Refer to section “Neighbor List Creation and Priority” for the procedure to assign the Neighbor Cell priority for different neighbors of a serving cell. 2.1.2. IAF Monitored Subset Creation If possible, a specific cell’s position in the listed set sent to the UE is retained in consecutive measurement control messages. Cells that are removed from the IAF Monitored subset and not sent to the UE, are retained in the IAF Unmonitored subset. If there is only one cell (A) in the Active Set, a monitored set containing the first 31 neighbors of this cell is created in priority order (based on the setting of parameter selectionPriority). When a second cell (B) is added to the Active Set, and assuming that Cell (A) is reported as the strongest cell in the 1a event triggered measurement report, the monitored set is created in the following manner. Add both the active cells (A) and (B) to the listed set in the same position as they existed previously. Take the neighbor cell with the highest priority for the best active set cell, cell (A), and if it already exists in the old listed set, add it to the new listed set in the same position. If it does not exist in the old listed set, then the position does not matter; therefore store it for addition later in a temporary array. Take the neighbor cell with the highest priority for the second best active set cell (B), and if it already exists in the old listed set, add it to the new listed set in the same position. If it does not exist in the old listed set, then the position does not matter and it can be stored in a temporary array for addition later. Store the neighboring cell only if it does not already exist in the temporary array to avoid duplications. If it is already stored in the temporary T-Mobile USA, INC. Confidential Rev. 0.6 December 5, 2007 13 of 214 Ошибка! Используйте вкладку "Главная" для применения Title к тексту, который должен здесь отображаться. array, take the next neighboring cell in priority order from the next cell in the Active Set, cell (A) applying the same rules. Repeat until all neighbor cells have been processed or until MaxIafMonSubset number of neighboring cells have been selected for the listed set. Take the cells that have been selected to be included in the new listed set that are stored in the temporary array and add them to the listed set by filling the empty spaces. The neighboring cells are picked from the temporary array in the order they were stored (FIFO). This makes sure that neighboring cells stored early in the temporary array will be the first to fill out the spaces in the listed set. If the listed set gets full (reaches a value of C_MaxSohoListSubset), remaining unprocessed neighbor cells or cells in the temporary array shall instead be stored in the unmonitored set, without duplicates. If the Active Set contains more than 2 cells, the above algorithm can be expanded to include the neighboring cells of all the active set cells. Below is an illustration of the combined monitored set, when the Active set has 3 cells. The following figure shows the individual neighbor lists for the 3 cells in the active set. Assume that Cell A is the strongest cell and Cell C is the weakest cell. The combined monitored set when the active set contains all 3 cells is shown below. T-Mobile USA, INC. Confidential Rev. 0.6 December 5, 2007 14 of 214 Ошибка! Используйте вкладку "Главная" для применения Title к тексту, который должен здесь отображаться. 2.1.3. Field example of Monitored set creation Refer to Appendix B for a field example of the monitored set creation for event 1a when there is initially 1 cell in the Active set. 2.1.4. IEF and GSM Monitored Subset Creation The IEF and GSM Monitored sets don’t contain any Active set cells, and there is no unmonitored set in these cases. The maximum number of cells in the monitored subsets is maxIefMonSubset and maxGsmMonSubset respectively. Otherwise, the same approach as described in the previous section is used when creating the IEF and GSM monitored subsets. 2.2. Neighbor List Creation and Priority A good cell plan and correctly defined neighbor cell list is the foundation for good handover behavior. Due to the restriction in the number of neighbors that is possible to monitor as per [4], superfluous neighbors should not be defined. On the other hand, it is important for all true neighbor cells to be defined. A UE will approach an undefined neighbor cell without adding it to the Active Set, and will therefore not be power controlled by the cell. If the UE comes close to an undefined neighbor, it will cause destructive interference that in the worst case leads to dropped calls. By defining a large number of neighbors per each cell, there is a risk that the combined neighbor list would exceed the maximum limit of 32 cells when the Active Set contains more T-Mobile USA, INC. Confidential Rev. 0.6 December 5, 2007 15 of 214 Ошибка! Используйте вкладку "Главная" для применения Title к тексту, который должен здесь отображаться. than 1 cell. Hence it is important to define only the required neighbors. In addition to this risk, for Ericsson networks, there is an additional disadvantage of defining a large number of neighbors, which is covered below. Recommended Value: It is recommended not to exceed 16 neighbor definitions per each serving cell for the Intra Frequency case. This recommendation is based partly on vendor recommendations. This number will be updated in the future based on network performance and needs. This section will be updated with recommendations for IEF neighbors in the future when more than one WCDMA carrier is deployed in T-Mobile networks. Refer to the next section for the recommendations on neighbor list size for the GSM neighbor case. Though the recommended maximum neighbor list size is 16 neighbors, it is foreseen that in most cases depending on the network plan, a much smaller number of neighbor definitions will be needed for most serving cells. There may also be a few cases, where due to cell site locations issues caused by zoning, a neighbor list greater than 16 may been needed. However these cases should be limited to a minimum number and used only when absolutely required. Since the priority of neighbors per each serving cell plays a huge part in the creation of the unmonitored set, it is very important to plan the neighbor list with the correct priorities for each neighbor. One property of the Monitored set reduction algorithm in Ericsson RAN is that if cells in the active set have a large difference in number of neighbors, all of equal importance; for example, cell A = 32 and Cell B = 10, then assuming that these cells have a very small number of common neighbors, Cell A with the most neighbors will be penalized relative to cell B by the monitored set reduction algorithm, since cell B will get all its neighbors into the monitored set, but only a subset of Cell A’s neighbors may be included. This can be controlled to a certain extent by assigning the correct priorities to the neighbors, such that the more important neighbors of Cell A will be selected into the combined neighbor list. The following are some options that can be used for constructing the priorities of the IAF neighbor list. Refer to the next section for the GSM neighbor list creation. The IEF neighbor list creation will be covered in future updates when a second WCDMA carrier is planned to be deployed. Option 1: Visualization of the cell proximities to assign higher priorities for neighbors that are closer to the serving cell, with lower priorities as we radiate farther away form the server. This option while being a very basic and practical approach might take longer to implement. Option 2: The neighbors of the underlying GSM cell of any serving WCDMA cell can be ordered based on the number of handover attempts obtained from GSM statistics, with the highest priority for neighbors with the most handover attempts. This ordered GSM neighbor list can then be translated in to an ordered UMTS neighbor list by replacing each of the GSM neighbors with the corresponding overlay UMTS cell. This option results in the most automated way to create a neighbor list as long as the UMTS site has the same sector configurations as the collocated GSM site, but would need manual work otherwise. T-Mobile USA, INC. Confidential Rev. 0.6 December 5, 2007 16 of 214 Ошибка! Используйте вкладку "Главная" для применения Title к тексту, который должен здесь отображаться. Option 3: Scanner data if available can be processed to create an ordered IAF neighbor list. This can only be used if the entire network has scanner data available. Option 4: For areas with weak coverage, which are covered by far away cells, it might be advisable to make sure these cells are defined as higher priority neighbors, even if they have lesser number of handover attempts, so as to keep a call alive in these poor coverage areas. The options provided here should be treated only as a starting point, and should be further verified with planning tools and visual checks. T-Mobile USA, INC. Confidential Rev. 0.6 December 5, 2007 17 of 214 Ошибка! Используйте вкладку "Главная" для применения Title к тексту, который должен здесь отображаться. 3. 3G to 2G Neighbor List Generation GSM neighbor definitions are required for 3G to 2G handovers and 3G to 2G Reselection to work. It is recommended to define GSM neighbors for all UMTS cells in the network, irrespective of their location with respect to the edge of the coverage, and then use relevant parameters to disable IRAT handovers and reselection for UMTS cells that are well within the 3G coverage area. This would allow rescue handovers to work from 3G to 2G in case there is ever a service disruption on the UMTS network due to any reason. For Ericsson RAN, a UMTS cell can have up to 32 GSM cells defined as neighbors. However it is recommended to keep the GSM neighbor list to an optimum number as the time it takes for a UE to find a candidate GSM cell generally increases with longer neighbor lists. Keeping the neighbor list short would generally lead to less time in compressed mode and better retainability. More information on compressed mode and its effects are covered in a subsequent section. If the UMTS coverage falls quickly, the probability of quickly finding a suitable GSM candidate cell will increase, if there are fewer GSM cells to measure on. The following strategy for the creation of GSM neighbor lists for UMTS cells depends on the overlay configuration and utilizes existing neighbor lists on the GERAN network where possible. Planning tools can be used to run validation checks on neighbor lists created through this procedure. The following is the neighbor list creation strategy for all the possible overlay configurations. It should be noted that the intent of the following neighbor list tuning strategy is to create the initial GSM neighbor list for UMTS cells. Once the UMTS cell is integrated and enabled, scanner data from cluster drives, wherever available should be utilized to tune the UMTS GSM neighbor list. Ultimately, the UMTS neighbor lists should be based on the signal strength of the best server, not just the geographical proximity of the UMTS and GSM cells. Neighbor list tuning techniques are outside the scope of this document. In the Ericsson 3G network, neighbor priorities play an important role in the creation of a monitored set. Hence the following procedure addresses recommendations to assign priorities among neighbors for a particular UMTS cell. For any other cases that are not covered here, the GSM neighbor list should be planned using visual checks and planning tools as necessary. 3.1. UMTS to GSM 1:1 overlay with matched azimuths This scenario refers to the case where the UMTS site is co-located with the GSM site, and the UMTS cell azimuths are within +/- 15 degrees of the GSM azimuths. In addition, the UMTS antennas are required to have a horizontal beam width of 65 or 90 degrees. The recommended size of the GSM neighbor list for this configuration is 11 neighbors, with 8 neighbors generated from the following procedure and 3 neighbors reserved for any missing GSM cells found after validation checks. Procedure to generate GSM neighbors Identify the corresponding sector of the co-located GSM site for the UMTS cell. Add this GSM cell to the top of the neighbor list with highest priority. T-Mobile USA, INC. Confidential Rev. 0.6 December 5, 2007 18 of 214 Ошибка! Используйте вкладку "Главная" для применения Title к тексту, который должен здесь отображаться. Add the other sectors of the co-located GSM site to this list starting with priority 2. Using the 2G network statistics, order the remaining 2G neighbors of the GSM cell as per number of handover attempts. Choose the top 5 neighbors and add them to the bottom of the above created list. Validate the list using visual checks or planning tools to make sure none of the obvious neighbors are missing. Make sure that all required in-building GSM cells are included, otherwise add them as necessary. Extend the neighbor list beyond 11, only if necessary to accommodate any missing 2G neighbors found after validation checks. 3.2. UMTS to GSM 1:1 overlay with mis-matched azimuths This scenario refers to the case where the UMTS site is co-located with the GSM site, but the UMTS sector azimuths are more than +/- 15 degrees different from the GSM azimuths. This solution can also be used for co-located sites with matched azimuths (within +/- 15 degrees of GSM), but with narrow horizontal beam widths (less than 65 degrees). The recommended size of the GSM neighbor list for this configuration is 14 neighbors with 11 neighbors generated from the following procedure and 3 neighbors reserved for any missing GSM cells found after validation checks. Procedure to generate GSM neighbors Add all sectors of the co-located GSM site to the top of the 3G -> 2G neighbor list with the highest priorities. Identify the two closest co-located GSM sectors for the UMTS cell. Using GSM statistics, order the combined 2G neighbor list of these 2 GSM sectors as per number of handover attempts. Choose the top 8 neighbors and add them to the bottom of the above created list with the next highest priorities. Validate the list using visual checks or planning tools to make sure none of the obvious neighbors are missing. Make sure that all required in-building GSM cells are included, otherwise add them as necessary. Extend the number of neighbors beyond 14, only if necessary to accommodate any missing 2G neighbors found after validation checks. 3.3. UMTS site without overlay This scenario refers to a new UMTS site without a co-located GSM site. In this case the GSM neighbors will have to be created using planning tools. The recommended size of the GSM neighbor list for this scenario is 11 neighbors. The neighbor list size should be extended beyond 11, only if required, to accommodate missing 2G neighbors after validation checks. T-Mobile USA, INC. Confidential Rev. 0.6 December 5, 2007 19 of 214 Ошибка! Используйте вкладку "Главная" для применения Title к тексту, который должен здесь отображаться. 3.4. New GSM site added to the 2G Network When a new GSM site is added to the 2G network, since GSM handover statistics would not available as soon as the new site is added, visual checks and planning tools will have to be used to ensure that the new GSM site is correctly configured as a neighbor to the relevant UMTS cells. T-Mobile USA, INC. Confidential Rev. 0.6 December 5, 2007 20 of 214 Ошибка! Используйте вкладку "Главная" для применения Title к тексту, который должен здесь отображаться. 4. Idle Mode Process, Algorithms and Parameters The idle mode tasks are divided into the following 3 processes: PLMN Selection Cell Selection & Reselection Location and Routing Areas Registration The relationship between these 3 processes is shown in the figure below. Camping on a cell is necessary for the UE to get access to some services in the network. The following three types of services are defined for the UE in Idle mode: Limited service, which allows the UE to make emergency calls only on an acceptable cell. Normal service, for public use on a suitable cell Operator-related services, which allow the operator to test newly deployed cells without being disturbed by normal traffic. An "acceptable cell" is a cell on which the UE may camp to obtain limited services (originate emergency calls). Such a cell fulfils the following requirements, which is the minimum set of requirements to initiate an emergency call in a UTRAN network: The cell is not barred. The cell selection criteria are fulfilled. T-Mobile USA, INC. Confidential Rev. 0.6 December 5, 2007 21 of 214 Ошибка! Используйте вкладку "Главная" для применения Title к тексту, который должен здесь отображаться. A "suitable cell" is a cell on which the UE may camp on to obtain normal service. Such a cell fulfils all the following requirements. The cell is part of the selected PLMN or, of the registered PLMN or, of a PLMN considered as equivalent by the UE according to the information provided by the NAS. The cell is not barred. The cell is not part of the list of "forbidden LAs for roaming". The cell selection criteria are fulfilled. A “barred cell” is a cell that is restricted (barred) to camp on for all access classes. This is indicated on SIB 3. A “reserved cell” is a cell that has been reserved for operator use where only UEs with USIM access class 11 or 15 can camp on. This is indicated on SIB 3. 4.1. PLMN Selection The PLMN selection for the various modes are detailed below. 4.1.1. PLMN Selection at UE switch on Whenever a UE is switched on or enters an area with acceptable coverage after coverage loss, it attempts to camp on the last registered PLMN or equivalent PLMN, if available. To speed up the PLMN selection procedure, the UE uses information about the last registered PLMN, such as carrier frequencies or the list of neighboring cells stored in the USIM before the UE was switched off. On each stored carrier frequency, the UE searches first for the cell with strongest signal and reads its system information to verify the PLMN to which the cell belongs. It also reads the system information for PLMN identity, which consists of MCC and MNC. Then the UE decides whether the chosen cell is acceptable or whether at least one acceptable cell belonging to that PLMN exists. Finally, the UE attempts registration if the PLMN is allowed. If the last registered PLMN is not available, a registration attempt fails. If there is no registered PLMN stored in the USIM, the UE selects and attempts registration on other PLMNs using either the Automatic mode or the Manual mode. 4.1.2. PLMN selection in Automatic Mode In Automatic mode, if no last registered PLMN exists or is available, the UE will select a PLMN that is available and allowed, in the following order: Home PLMN (HPLMN), if not previously selected, according to the Radio Access Technologies (RATs) supported by the UE. Each PLMN in the user-controlled PLMN list in the USIM, if present, in order of priority, according to the RATs supported by the UE Each PLMN in the operator-controlled PLMN list in the USIM, in order of priority, according to the RATs supported by the UE. Other PLMNs, according to the high-quality criterion, in random order. Other PLMNs that do not fulfill high-quality criterion, in order of decreasing signal strength (SS). T-Mobile USA, INC. Confidential Rev. 0.6 December 5, 2007 22 of 214 Ошибка! Используйте вкладку "Главная" для применения Title к тексту, который должен здесь отображаться. PLMNs are considered high quality if the Received CPICH RSCP fulfills the high-quality criterion. The high-quality criterion is fulfilled when CPICH RSCP level is greater than or equal to –95 dBm. For GSM cells the high-quality criterion is fulfilled when the signal level is above –85 dBm. A PLMN with at least one acceptable cell is considered available. If that PLMN is allowed, the UE tries to register on it. If registration is successful, the UE displays the selected PLMN. When the UE cannot register on any PLMN in the user and operator lists, it attempts to register on other PLMNs according to the high-quality criterion. If the UE cannot register on any PLMN, it selects an available PLMN and enters a limited service state. If it does not find an available PLMN, the UE enters the non-service state, and waits until a new PLMN is available and allowed. The following figure shows the PLMN selection procedure using the Automatic mode. T-Mobile USA, INC. Confidential Rev. 0.6 December 5, 2007 23 of 214 Ошибка! Используйте вкладку "Главная" для применения Title к тексту, который должен здесь отображаться. 4.1.3. PLMN Selection in Manual Mode The Manual mode allows the user to select a PLMN among those indicated by the UE. The UE displays all PLMNs that it finds by scanning all frequency carriers. The UE displays those PLMNs that are allowed as well as those that are not allowed. The user makes a manual selection, according to the available RAT for the chosen PLMN, and the UE attempts registration on this PLMN, ignoring the contents of the forbidden Location Area Identities (LAIs) and PLMN lists. If the user selects an available PLMN in the forbidden PLMN list, the UE attempts to register and may receive a positive acknowledgement from the CN. In this case, the PLMN is removed from the forbidden list. If the user does not select a PLMN, the selected PLMN is the one that was selected before the PLMN selection procedure started. If this PLMN is no longer available, the UE attempts to camp on an acceptable cell at any PLMN and enters the limited service state. The UE remains in that state until it is switched off or the user makes a manual PLMN reselection. 4.1.4. PLMN Selection while Roaming Roaming is a service through which a UE is able to obtain services from another PLMN in the same country (national roaming area) or another country (international roaming area). The behaviour that the UE must follow is specified by agreements among the network operators. A UE in automatic mode, having selected and registered on a Visited PLMN (VPLMN) in its home country, periodically attempts to return to its Home PLMN (HPLMN). The time interval between consecutive attempts is stored in the USIM and is managed by the network operator using a timer. The timer may have a value of between 6 minutes and 8 hours, with a step size of 6 minutes. In the absence of a fixed value, a default value of 60 minutes shall be used by the UE as per 3GPP 22.011. This timer is not a radio or core network parameter; it is stored in the USIM when provisioned. T-Mobile is setting this timer to 6 minutes. 4.2. Cell Selection Procedure in UTRAN state The cell selection and reselection process allows the UE to look for a suitable cell in the selected PLMN and to camp on it. The UE then camps on the suitable cell in a “camped normally’ state. In this state, the UE monitors paging and system information, performs periodical radio measurements, and evaluates cell reselection criteria. If the UE finds a better cell, that cell is selected by the cell reselection process. The change of cell may imply a change of the RAT. The purpose of camping on a cell in idle mode is the following: It enables the UE to receive system information from the PLMN. When registered and if the UE wishes to establish an RRC connection, it can do this by initially accessing the network on the control channel of the cell on which it is camped. If the PLMN receives a call for the registered UE, it knows the registration area of the cell in which the UE is camped. It can then send a "paging" message for the UE on control channels of all the cells in the registration area. The UE will then receive the paging message because it is tuned to the control channel of a cell in that registration area and the UE can respond on that control channel. T-Mobile USA, INC. Confidential Rev. 0.6 December 5, 2007 24 of 214 Ошибка! Используйте вкладку "Главная" для применения Title к тексту, который должен здесь отображаться. It enables the UE to receive cell broadcast services. The UE attempts cell selection in the following cases: When a UE is switched on When a UE in idle mode has had a number of failed RRC connection requests When a UE returns to idle mode from connected mode on common channels (CELL_FACH state) after a number of failed cell update attempts. When a UE moves from dedicated mode to idle mode. The candidate cells for cell selection are the ones used immediately before leaving connected mode. If no suitable cell is found, the UE can use stored information cell selection procedure to find a suitable cell. When a UE returns to idle mode after an emergency call on any PLMN. The UE selects an acceptable cell on which to camp. In this case, candidate cells for cell selection are the ones used immediately before leaving the connected mode. If no acceptable cell on that PLMN is found, the UE continues to search for an acceptable cell on any PLMN. When a UE moves from dedicated mode to state CELL_FACH or URA_PCH. The UE uses one of the following cell selection procedures: Initial Cell Selection: This procedure requires no prior knowledge of which RF channels are UTRA carriers. The UE shall scan all RF channels in the UTRA bands according to its capabilities to find a suitable cell of the selected PLMN. On each carrier, the UE only needs to search for the strongest cell. Once a suitable cell is found this cell is selected. Stored Information Cell Selection: This procedure requires stored information of carrier frequencies and optionally also information on cell parameters, e.g. scrambling codes, from previously received measurement control information elements. Once the UE has found a suitable cell for the selected PLMN the UE selects it. If no suitable cell of the selected PLMN is found, the Initial cell selection procedure is started. The cell selection criterion S is fulfilled when the following is true. Squal > 0 and Srxlev > 0 The quantities Squal and Srxlev are defined as Squal = Qqualmeas - qQualMin and Srxlev = Qrxlevmeas - qRxLevMin – Pcompensation Qqualmeas is the quality of the received signal expressed as CPICH Ec/No and Qrxlevmeas is the received signal strength expressed as CPICH RSCP. The parameter qQualMin in object UtranCell indicates the minimum required quality value in the cell while the UtranCell parameter qRxLevMin indicates the minimum required signal strength in the cell. These values are sent in SIB 3 for the serving cell. Pcompensation = max (maxTxPowerUl - P, 0) Pcompensation is introduced for UEs that cannot transmit at maximum power on the RACH in the cell. The cell range decreases for those UEs. P is the output power of the UE T-Mobile USA, INC. Confidential Rev. 0.6 December 5, 2007 25 of 214 Ошибка! Используйте вкладку "Главная" для применения Title к тексту, который должен здесь отображаться. according to its class. The parameter maxTxPowerUl in the object UtranCell is the maximum allowed transmission power when the UE accesses the system on RACH. It is broadcast in SIB 3. 4.3. Cell Reselection Parameters from 3G to 3G The UE performs the cell reselection procedure in the following cases: When the cell on which it is camping is no longer suitable. When the UE, in “camped normally” state, has found a neighboring cell better than the cell on which it is camping. When the UE is in “limited service” state on an acceptable cell. The cell reselection process is divided into 3 steps – Measurements, Eligibility and Ranking. The parameters for each of these phases are detailed below. For more details on the value ranges, please refer to the Parameter Guidelines document. 4.3.1. Measurements A UE makes measurements on intra frequency neighbors when Squal <= sIntraSearch. The quantity Squal is defined as Squal = QqualMeas – qQualMin. Qqualmeas is the quality of the received signal in the serving cell, expressed as CPICH Ec/No. Hence If CPich_Ec/Nomeas > qQualMin + sIntraSearch , then no intra frequency measurements. If CPich_Ec/Nomeas <= qQualMin + sIntraSearch, then UE makes intra frequency measurements. If the parameter sIntraSearch is not sent for the serving cell (this is accomplished by setting the value of sIntraSearch = 0), the UE always performs intra frequency measurements. The parameters qQualMin and sIntraSearch are cell based parameters are found in the object UtranCell. 4.3.2. Eligibility The eligibility of the intra frequency neighbors for reselection is verified using the cell selection criteria (S criteria). The cell selection criterion S is fulfilled when Squal > 0 and Srxlev > 0 The quantities Squal and Srxlev are defined as Squal = Qqualmeas - qQualMin and Srxlev = Qrxlevmeas - qRxLevMin – Pcompensation Pcompensation = max (maxTxPowerUl - P, 0) As per the Ericsson implementation, the parameters qQualMin, qRxLevMin and maxTxPowerUl are the same as the ones found in the object UtranCell, and are not defined separately for the intra frequency neighboring cells. T-Mobile USA, INC. Confidential Rev. 0.6 December 5, 2007 26 of 214 Ошибка! Используйте вкладку "Главная" для применения Title к тексту, который должен здесь отображаться. 4.3.3. Ranking The cells that satisfy the Selection criteria are then selected to be ranked as per the following procedure. The cells are ranked according to the R criteria. R(serving) = Qmeas(s) + qHyst(s) R(neighbor) = Qmeas(n) - qOffset(s,n) Qmeas is the quality value of the received signal, which is derived from the average CPICH Ec/No or CPICH RSCP level for WCDMA cells and from the average received signal for GSM cells. (s) and (n) refer to the serving cell and neighboring cell values respectively. The ranking of GSM neighbors is always made using the measurement quantity CPICH RSCP. The ranking of WCDMA cells can be done using CPICH RSCP or CPICH Ec/No based on the value of the parameter qualMeasQuantity. The recommended setting is qualMeasQuantity = 2 which corresponds to CPICH Ec/No. The quantity qHyst(s) is the hysteresis value of the serving cell and is configured by the parameter qHyst1 when the ranking is based on CPICH RSCP and by parameter qHyst2 when the ranking is based on CPICH Ec/No. The quantity qOffset(s,n) is the offset between the serving and neighbor cell and can be used to move the border between the two cells. It can be configured using the parameter qoffset1sn when the ranking is based on CPICH RSCP and by qoffset2sn when the ranking is based on CPICH Ec/No. For cells that fulfill the selection criteria, a first ranking is done using CPICH RSCP. R(serving) = CPICH RSCP(s) + qHyst1 RWCDMA(neighbor) = CPICH RSCP(n) – qoffset1sn(s,n) RGSM(neighbor) = RxLev(n) – qoffset1sn(s,n) If a GSM cell is the best ranked cell after the first ranking, it is selected for the 3G to 2G reselection. The UE reselects to the new cell, if it is better ranked than the serving cell for a time equal to treSelection. A second ranking is only performed if the best ranked cell resulting from the first ranking is a WCDMA neighbor and the parameter qualMeasQuantity is set to CPICH Ec/No. The second ranking is performed as per CPICH Ec/No as follows. R(serving) = CPICH Ec/No(s) + qHyst2 RWCDMA(neighbor) = CPICH Ec/No(n) – qoffset2sn(s,n) After the second ranking the UE reselects to the best ranked neighbor, as long as this neighbor is better ranked than the serving cell for at least a time equal to a value defined by the parameter treSelection. The parameters qHyst1, qHyst2 qualMeasQuantity and treselection are defined per 3G cell and are set in the object UtranCell. The parameter qoffset1sn is defined per 3G – 3G neighbor pair (configured in object UtranRelation) and per 3G – 2G neighbor pair (configured in object GsmRelation). The parameter qoffset2sn is defined per 3G – 3G neighbor pair and is configured in the object UtranRelation. T-Mobile USA, INC. Confidential Rev. 0.6 December 5, 2007 27 of 214 Ошибка! Используйте вкладку "Главная" для применения Title к тексту, который должен здесь отображаться. 4.4. Recommended Values for 3G to 3G Selection and Reselection parameters The camping strategy places an important role in determining the recommended values of Reselection parameters. T-Mobile’s camping strategy is to camp on UMTS, whenever UMTS coverage is available, and reselect to GSM at the boundaries of UMTS coverage. Since UMTS is being launched with only 1 WCDMA carrier, the setting of sInterSearch is not considered here. Hence, in order to adhere to this camping strategy, the values of sIntraSearch and sRatSearch should be set such that the UE is making measurements only on 3G neighbors as long as it is in the UMTS coverage area, and tries to make measurements on GSM neighbors only when at the edge of the 3G coverage area. A constant value of -18 dB is recommended for qQualMin and a constant value of -115 dBm for the qRxLevMin, so that all cells are selected at the same thresholds. The other reselection parameters should be used to optimize the idle mode cell size. Recommended value for sIntraSearch: With qQualMin set to a constant value, a small value of sIntraSearch would reduce the number of measurements on intra frequency neighbors, while a large value of sIntraSearch would increase the number of times the UE measures on intra frequency cells. A large number of measurements would decrease the battery life in the UE. On the other hand, less frequent measurements may result in the UE camping on a non-optimum cell, thus increasing the call setup time when the UE tries to place a call. An optimum value for this parameter should achieve a balance between good battery life and lower call setup time. It should be noted that the battery life impacted would be the idle mode battery life which is not as critical as the connected mode battery life. The vendor recommended value of 0 for sIntraSearch would result in the UE always measuring on all available intra frequency cells, thus reducing the call setup time. However this may result in a lower UE battery life while compared to a different setting. Again the battery life reduction would be only in the idle mode, which is not as critical as the connected mode battery life. Further testing will be done to optimize this parameter value. The table below shows the recommended values for some intra frequency reselection related parameters. For details on the complete parameter set, refer to the Parameter Guidelines document. Parameter Name Object Name Recommended Value maxTxPowerUl UtranCell 24 dBm qHyst1 UtranCell 4 dB qHyst2 UtranCell 4 dB qQualMin UtranCell -18 dB qRxLevMin UtranCell -115 dBm qoffset1sn UtranRelation 0 dB qualMeasQuantity UtranCell CPICH_EC_NO sIntraSearch UtranCell 0 dB treselection UtranCell 2s T-Mobile USA, INC. Confidential Rev. 0.6 December 5, 2007 28 of 214 Ошибка! Используйте вкладку "Главная" для применения Title к тексту, который должен здесь отображаться. 4.5. Cell Reselection Parameters from 3G to 2G The following are the parameters involved in the inter RAT reselection of a 3G cell on the Ericsson RAN to a 2G cell of any vendor’s BSS. The cell reselection process is divided into 3 steps – Measurements, Eligibility and Ranking. 4.5.1. Measurements For a 3G cell that has GSM neighbors defined, the decision about when the GSM measurements are performed is based on the parameter sRatSearch in relation to Squal. The parameter Squal is defined as QqualMeas – qQualMin. If the Squal value is larger than the parameter sRatSearch, the UE does not perform measurements on GSM cells. If the Squal value is less than or equal to the parameter sRatSearch, the UE performs measurements on the GSM neighbors. If the value of sRatSearch is not sent for the serving cell (by setting sRatSearch = 0), the UE always performs measurements on GSM cells. Squal = QqualMeas – qQualMin = CPich_Ec/Nomeas – qQualMin As illustrated in the example below, qQualMin = -18 dB and sRatSearch = 4 dB. As the Ec/Io of the pilot drops below -14 dB, the UE will begin measuring GSM candidates assuming they are provided as neighbors in SIB 11/12. If the Ec/Io of the current pilot improves and exceeds -14 dB, the UE will cease measuring GSM candidates. The parameters qQualMin and sRatSearch are cell based parameters and are found in the UtranCell object. In order to trigger GSM measurements based on RSCP measurements relative to qRxLevMin, the sHcsRat parameter is used. The behavior of these measurements is T-Mobile USA, INC. Confidential Rev. 0.6 December 5, 2007 29 of 214 Ошибка! Используйте вкладку "Главная" для применения Title к тексту, который должен здесь отображаться. similar to the Ec/Io case. Assuming qRxLevMin = -115 dBm and sHcsRat = 3 dB, the UE will begin measuring GSM candidates when the current pilot’s RSCP drops below -112 dBm. If the RSCP of the current pilot improves and exceeds -112 dB, the UE will cease measuring GSM candidates. The default value for this parameter is -105 dB, which deactivates the parameter and only allows the UE to trigger GSM measurements based on Ec/Io. Because Ec/Io measurements are not indicative of quality, especially at the UMTS network edge, it is recommended that sHcsRat parameter be enabled. The recommended value of sHcsRat is 3 dB, which would allow measurements on GSM when the serving cell’s RSCP falls below -112 dBm. The parameter fachMeasOccaCycLenCoeff is used to control the inter frequency and IRAT cell reselection measurements of a UE in CELL_FACH state. A UE in CELL_FACH state is allowed to make inter frequency and/or IRAT measurements only when this parameter fachMeasOccaCycLenCoeff > 0. If there are only GSM neighbors or inter-frequency neighbors defined for a cell, then fachMeasOccaCycLenCoeff should be set to 4 so that the UE will leave the FACH channel every 16th frame to perform measurements on these neighbors. If a cell has both GSM and Inter-frequency neighbors, then this parameter should be set to a value of 3, so that the UE will leave the FACH channel every 8th frame to perform measurements on the inter-frequency and GSM neighbors. Since T-Mobile networks will have only 1 WCDMA carrier to start with, for cells that have GSM neighbors defined, this parameter is recommended to be set to 4. For any cell with no IRAT neighbors or Inter frequency neighbors, fachMeasOccaCycLenCoeff should be set to 0. 4.5.2. Eligibility The eligibility of the neighboring GSM cells for reselection is verified using the selection criteria (S criteria). The selection criteria are fulfilled when Srxlev > 0 for the neighboring GSM cells. The parameter Srxlev is defined as Srxlev = Qrxlevmeas - qRxLevMin - Pcompensation Where Qrxlevmeas is the quality value of the received signal and is derived from the average received signal level for a GSM cell. qRxlevMin is the minimum received signal strength for a specific GSM cell. Pcompensation = max (maxTxPowerUl - P, 0) where P is the output power of the UE according to its class maxTxPowerUl is the maximum allowed transmission power when the UE accesses the system on RACH The parameters qRxLevMin and maxTxPowerUl are defined per GSM cell and can be set in the ExternalGsmCell Object. 4.5.3. Ranking Only GSM cells that satisfy the selection criteria are chosen for ranking. The cells are ranked according to the R criteria. T-Mobile USA, INC. Confidential Rev. 0.6 December 5, 2007 30 of 214 Ошибка! Используйте вкладку "Главная" для применения Title к тексту, который должен здесь отображаться. R(serving) = Qmeas(s) + qHyst(s) R(neighbor) = Qmeas(n) - qOffset(s,n) Qmeas is the quality value of the received signal, which is derived from the average CPICH Ec/No or CPICH RSCP level for WCDMA cells and from the average received signal for GSM cells. (s) and (n) refer to the serving cell and neighboring cell values respectively. The ranking of GSM neighbors is always made using the measurement quantity CPICH RSCP. The ranking of WCDMA cells can be done using CPICH RSCP or CPICH Ec/No based on the value of the parameter qualMeasQuantity. The quantity qHyst(s) is the hysteresis value of the serving cell and is configured by the parameter qHyst1 when the ranking is based on CPICH RSCP and by parameter qHyst2 when the ranking is based on CPICH Ec/No. The quantity qOffset(s,n) is the offset between the serving and neighbor cell and can be used to move the border between the two cells. It can be configured using the parameter qoffset1sn when the ranking is based on CPICH RSCP and by qoffset2sn when the ranking is based on CPICH Ec/No. For cells that fulfill the selection criteria, a first ranking is done using CPICH RSCP. R(serving) = CPICH RSCP(s) + qHyst1 RWCDMA(neighbor) = CPICH RSCP(n) – qoffset1sn(s,n) RGSM(neighbor) = RxLev(n) – qoffset1sn(s,n) If a GSM cell is the best ranked cell after the first ranking, it is selected for the 3G to 2G reselection. The UE reselects to the new cell, if it is better ranked than the serving cell for a time equal to treSelection. A second ranking is only performed if the best ranked cell resulting from the first ranking is a WCDMA neighbor and the parameter qualMeasQuantity is set to CPICH Ec/No. In this case a 3G to 3G reselection will be performed. Simply put, the evaluation of a GSM candidate for reselection is based on the following parameters qHyst1, qOffset1sn, and treSelection. qHyst1 is a hysteresis added to the CPICH RSCP of the serving UMTS cell. The parameter qOffset1sn is offset subtracted from the candidate GSM RSSI. This offset can be used to appropriately compare a GSM RSSI to a UMTS RSCP value. Two examples are illustrated below. In the first example, qOffset1sn = 0 dB, and qHyst1 = 4 dB. In this case, reselection will occur if the target GSM cell’s RSSI is 4 dB stronger than the serving CPICH RSCP, for period of treSelection seconds. In the second example, qOffset1sn = 7 dB, and qHyst1 = 4 dB. In this case, reselection will occur if the target GSM cell’s RSSI is 11 dB stronger than the serving CPICH RSCP, for period of treSelection seconds T-Mobile USA, INC. Confidential Rev. 0.6 December 5, 2007 31 of 214 Ошибка! Используйте вкладку "Главная" для применения Title к тексту, который должен здесь отображаться. The parameters qHyst1, qualMeasQuantity and treSelection are defined per 3G cell and are set in the object UtranCell. The parameter qoffset1sn is defined per 3G – 3G neighbor pair (configured in object UtranRelation) and per 3G – 2G neighbor pair (configured in object GsmRelation). 4.6. Recommended Values for 3G to 2G Reselection parameters T-Mobile camping strategy is to keep the UE on UMTS coverage as far as possible with good quality. The following are the recommended values for the 3G to 2G reselection parameters. Measurements: The parameters qQualMin and sRatSearch found in the UtranCell object to trigger measurements on 2G neighbors should be set to -18 dB and 4 dB respectively, so that the UE can make GSM measurements when the CPICH Ec/No of the serving UMTS cell is less than or equal to -14 dB. The threshold of -14 dB is consistent with the Planning Guidelines as well as the 2G to 3G reselection threshold of -12 dB, avoiding ping pong between 3G and 2G networks. The parameters qRxlevMin and sHcsRat are recommended to be set to -115 dBm and 3 dB. It is recommended to keep the same parameter value for all cells so as to trigger the 2G measurements at the same threshold. The parameter qQualMin also influences the start of measurements on 3G neighbors. If this value is changed, then the sRatSearch parameter should be changed accordingly to keep the mobile measuring on GSM cells when the CPICH Ec/No falls below or is equal to -14 dB. Eligibility: The parameters qRxLevMin and maxTxPowerUl defined per GSM cell in the ExternalGsmCell Object should be set to -105 dBm and 24 dBm respectively. The value of qRxLevMin chosen is the minimum receive signal level required for a GSM call. It is T-Mobile USA, INC. Confidential Rev. 0.6 December 5, 2007 32 of 214 Ошибка! Используйте вкладку "Главная" для применения Title к тексту, который должен здесь отображаться. recommended to keep the same parameter value for all cells. With these values, a GSM cell would be eligible for reselection to Class 3 UEs as long as the Rxlev in that cell is greater than -105 dBm. For Class 4 UEs, with a maximum transmit power of 21 dBm, the Pcompensation factor would be equal to 3 dB. This would result in the GSM cell to be eligible to Class 4 UEs, only when the Rxlev is greater than -102 dBm. Ranking: The recommended value for the parameter qHyst1 in UtranCell is 4 dB. The parameter qHyst1 is used to avoid ping pong between the serving cell and the neighbor cells. The parameter qoffset1 can be used to move the borders between cells. From the 3G to 3G reselection, it can be seen that the recommended value of qOffset1 in UtranRelation is 0 dB. From various testing it had been shown that the WCDMA RSCP is related to GSM RSSI as WCDMA RSCP + 7dB ~ GSM RSSI. Hence in order to keep RSSI and RSCP comparable, the parameter qOffset1 in GsmRelation should be set to 7 dB. This implies that a neighboring 3G cell needs to be greater than 4dB of the serving cell in order to be ranked higher, and a neighboring GSM cell needs to be greater than 11 dB of the serving cell in order to be ranked higher than the serving cell. This would ensure that a WCDMA cell is first checked for reselection before choosing a GSM cell for reselection. If for any reason, if we choose to prefer reselection to GSM above WCDMA, this can be accomplished by reducing the value of qOffset1 in object GsmRelation for the corresponding GSM neighbor. Recommended value for treSelection: The setting for the parameter treSelection is a compromise between a too low value, triggering too many reselections in the fading radio environment, and a too high value, that slows down the process. The recommended value for the parameter treselection is set to 2 seconds. This value would avoid too many reselections between cells and hence too many LA/RA updates when crossing LA/RA borders. Thus there would be less signaling and less call failures at LA/RA borders due to LA/RA update. It is recommended to keep the same values for these parameters for all cells and all neighbor relations for network launch, and only change on as needed basis afterwards. The recommended values for all 3G to 2G reselection parameters for the Ericsson 3G RAN are tabulated in Appendix C. 4.7. Location and Routing Area Registration and Updating After a UE has found a suitable cell and can access services requiring registration, it tries to register on the selected PLMN. If the Location Area Identity (LAI) or Routing Area Identity (RAI), read on SIB 1, is different from the one stored on the USIM before switch-off, the UE performs a LA or RA registration update. When a UE in idle mode moves into a new cell in a new LA or RA or into a new PLMN, it performs a registration area update. The LA or RA update procedure is managed by the CN and is transparent to the WCDMA RAN. There are three types of registration update procedures: normal, periodic and IMSI attach/detach. 4.7.1. Terminology Location Area (LA) is an area to which the core network (CN) sends a paging message for circuit switch services. The LA may consist of cells belonging to one or more RNCs, which are connected to the same CN. T-Mobile USA, INC. Confidential Rev. 0.6 December 5, 2007 33 of 214 Ошибка! Используйте вкладку "Главная" для применения Title к тексту, который должен здесь отображаться. Location Area Identity (LAI) is formed by a PLMN Identity and a Location Area Code (LAC) sent in SIB 1. Routing Area (RA) is an area to which the CN sends a paging message for packet switch services. The RA may consist of cells belonging to one or more RNCs, which are connected to the same CN. Routing Area Identity (RAI) is formed by a PLMN Identity and a Routing Area Code (RAC) sent in the SIB 1. 4.7.2. Normal LA and RA Updating A UE executes a normal registration update when, in a cell belonging to a new LA or RA, it is switched on or leaves the Connected mode. Normal registration update is also performed when the UE, in Idle mode, moves in a cell belonging to a new LA or RA, or when the UE is unknown to the CN. The UE reads the LAI and the RAI in the system information and detects that one or both of the received area identities differ from the ones stored on the USIM. If the LAI received is not in the forbidden LAIs list, an LA and/or RA update request is sent by the UE to the WCDMA RAN. If the LAI is forbidden, the UE tries to select another cell belonging to a permitted LAI or another PLMN. 4.7.3. Periodic LA and RA Updating Periodic LA or RA updating is used to notify the network of the UEs availability, and to avoid unnecessary paging attempts for a UE that has lost coverage and is not able to inform the CN that it is inactive. The periodic LA update procedure is controlled by a timer, t3212, which gives the time interval between two consecutive periodic location updates. The value is sent by the WCDMA RAN to UEs on the SIB 1. The periodic RA update procedure is controlled by a timer, t3312, which gives the time interval between two consecutive periodic routing updates. The value of this timer is sent by the CN to the UE in the IMSI attached or in the routing area update message accept. The following figure shows an Example of a SIB1 and Attach Accept messages showing the periodic LA and RA update timer values, respectively. T-Mobile USA, INC. Confidential Rev. 0.6 December 5, 2007 34 of 214 Ошибка! Используйте вкладку "Главная" для применения Title к тексту, который должен здесь отображаться. 4.7.4. IMSI Attach/Detach A location registration request indicating IMSI attach is made when the UE is activated in the same LA in which it was deactivated, and the system information indicates that IMSI attach/detach is used (SIB 1). The IMSI attach/detach procedure allows the UE to avoid unnecessary paging attempts from the CN. If IMSI attach/detach is used the UE sends an “attach” or “detach” message to the CN when is powered on or off indicating whether the UE is active or inactive in the network. The CN avoids performing paging attempts when the IMSI detach is applied and the UE is switched off. When the UE is switched on and the IMSI attach/detach procedure is applied the UE performs a location registration request, indicating IMSI attach, if it is in the same LA or RA in which it was switched off. If the registration area is changed, a normal LA update is performed by the UE. Ericsson has a parameter called “att” to indicate if IMSI attach/detach is used. The following figure depicts an example of an IMSI detach message sent by UE when powered off. T-Mobile USA, INC. Confidential Rev. 0.6 December 5, 2007 35 of 214 Ошибка! Используйте вкладку "Главная" для применения Title к тексту, который должен здесь отображаться. 4.7.5. Recommended Values for LA and RA update parameters Parameter Name Object Name Recommended Value Att LocationArea TRUE t3212 LocationArea 54 minutes T-Mobile USA, INC. Confidential Rev. 0.6 December 5, 2007 36 of 214 Ошибка! Используйте вкладку "Главная" для применения Title к тексту, который должен здесь отображаться. 5. Call Setup Procedure The fundamental steps required in the accessing the T-Mobile UMTS network is similar for both CS and PS services. In both cases the UE utilizes the same random access procedure to request establishment of a RRC Connection with the RNC. If dedicated resources are available to setup this radio link, an RRC Connection will be established with the RNC. Once an RRC Connection is established with the RNC, the Core Network (CN) is signaled to establish an Iu connection between the CN and RNC. At this time core network may initiate security procedures such as Authentication and Ciphering. After the security procedures are complete, the UE requests services from the Core Network. At this point the CN requests the establishment of a Radio Access Bearer (RAB) with the RNC to support the requested services. If this RAB is established, the RNC will acknowledge the CN request and a successful access will have occurred. Alternatively, if any of these steps fail, an access failure will occur. The procedure described above only summarizes the steps required to successfully access the UMTS network. In the following sections, the details for both the CS and PS setup procedure are described. Understanding these setup procedures is required to successfully troubleshoot and optimize the Accessibility metric of the UMTS network. 5.1. Circuit Switched Call Setup Figure 1 illustrates the call flow diagram for a typical CS call establishment. The setup is divided into three phases: 5.1.1. The RRC Setup Phase The Pre-RAB Phase The RAB Setup Phase RRC Setup Phase, CS Voice In order to setup a call, the UE must establish an RRC Connection with the UTRAN. Once the UE has completed the Random Access Procedure, a RRC Connection Request message is sent to the SRNC. Embedded in this message is the establishment cause, or the reason the UE is requesting a RRC connection. For the case of mobile originating CS Call, the establishment cause would be “Originating Conversational Call”. If the UE is responding to a page, or a mobile terminating call, the establishment cause would be “Terminating Conversational Call”. Upon reception of the RRC Connection Request, the UE is assigned UMTS Radio Network Temporary Identifier (U-RNTI). This identifier is unique to the PLMN and is derived from the SRNC identity and a unique SRNC RNTI (S-RNTI). In this manner the U-RNTI is unique to the UE. After a RRC Connection Request message is received, the Admission Control algorithm is invoked to confirm the required dedicated resources are available to establish a signaling connection. These resources include codes, power, and channel elements. If admission can not be granted, an RRC Connection Reject message is sent, and the counter pmNoReqDeniedAdm is pegged. If admission is granted, a Radio Link Setup request is sent to the Node B requesting dedicated resources be reserved. Once resources are T-Mobile USA, INC. Confidential Rev. 0.6 December 5, 2007 37 of 214 Ошибка! Используйте вкладку "Главная" для применения Title к тексту, который должен здесь отображаться. reserved, the Node B responds with a Radio Link Setup Response message, and activates its Radio Link Set Supervision algorithm for this Radio Link. At this time, the RRC Connection Setup is sent to the UE with a RRC state indicator ordering the UE to go to CELL_DCH. Embedded in this message is all the information the UE needs to construct a dedicated channel. This includes all the logical, transport, and physical layer information required to build the 13.6 kbps SRB. For Ericsson, the SRB is identified by Transport Channel 31, and uses third rate convolution coding. The transport channel DL BLER target for outer loop power control, as well as the Rate Matching for the SRB is also transmitted to the UE at this time. At the physical layer, this SRB utilizes a 128 bit spreading factor. After the RRC Connection Setup message is sent, the Node B begins transmitting the DL DPCH to enable L1 synchronization. Once synchronization has occurred, the UE sends an RRC Connection Setup Complete message to the SRNC. Within this message are all the UE radio access capabilities for the RLC, Transport Channel, and Physical Channel. At this point, an RRC connection has been established between the UE and the SRNC. At this point in the call setup, the UE has reached a major milestone. Not only has it successfully completed the Random Access procedure, it has also setup a dedicated radio bearer with the RNC. This allows the UE to utilize fast power control, and soft handover to overcome adverse RF conditions. Prior to this, the UE was highly susceptible to interference and coverage issues. The UE is now known by the UTRAN and has been assigned an ID: U-RNTI. It has signaling resources assigned to it, but has no bearer resources. The CN, however, has no visibility about this UE at this point. That is where the next phase (Pre-RAB Phase) comes in. 5.1.2. Pre-RAB Phase, CS Voice Once the RRC connection has been established, the next phase of the call setup procedure is the Pre-RAB or Signaling phase. This is initiated by the UE transmitting the Non-Access Stratum (NAS) message, CM Service Request, to the CN. This initial NAS message will trigger the creation of an Iu Signaling Connection between the SRNC and the MSC. At this point, the core network initiates the security procedures like Authentication and Ciphering. During the Authentication process, the Authentication Center (AuC) uses an IMSI specific Authentication Key (K) and a randomly generated number (RAND) to generate five security parameters, known as the Quintet. Once these security parameters are generated, the CN sends the NAS message, Authentication Request, to the UE. Embedded in this message is the RAND used to generate the Quintet, as well as an Authentication Token (AUTN), which is derived from two of the Quintet parameters. Because the Authentication Key is also stored on the UE’s SIM card, the UE can use this RAND to generate the same Quintet that was generated by the AUC. In this manner, the UE can compare its locally generated AUTN to the version sent in the Authentication Request message. If these versions match, the UE has successfully authenticated the sender of the message, thus eliminating fraudulent access to UE specific information. This network authentication step is new for UMTS and was not available in GSM. Once this is complete, the UE responds with a NAS Authentication Response message, which contains one of the Quintet parameters, know as the Response (RES). The CN compares this RES with is locally generated Expected Response (XRES) to authenticate the UE. This method of bi-directional authentication between the UE and the CN is known as Mutual Authentication. T-Mobile USA, INC. Confidential Rev. 0.6 December 5, 2007 38 of 214 Ошибка! Используйте вкладку "Главная" для применения Title к тексту, который должен здесь отображаться. Once Mutual Authentication is complete, the Integrity and Ciphering security features can be initiated. Integrity insures that L3 messaging can not be altered in an unauthorized manner and that the sender of the signaling is the appropriate sender (i.e. Integrity protects the UE from the “man in the middle attack”). Ciphering encrypts the signaling and user data sent between the UE and the SRNC. Integrity and Ciphering procedures are initiated by the MSC by sending the RANAP message Security Mode Command. This message contains the Integrity Key (IK) and the Ciphering Key (CK), which are two of the five security parameters (Quintet). The RNC uses these keys to perform the Integrity and Ciphering security features. Because the UE can generate the same Quintet that was generated by the AUC, the IK and CK are known to the UE as well. The RRC message Security Mode Command is sent by the SRNC to instruct the UE to start the Integrity and Ciphering procedures. The Security Mode Control procedure is finalized by sending the RRC Security Mode Complete message from the UE to the SRNC. This message is also forwarded to the MSC using the RANAP Security Mode Complete message. Once the security functions are enabled, the NAS message Setup is sent from the UE to the MSC. This message contains the dialed digits, as well as some Bearer and Call Control capabilities of the UE. The MSC confirms the call setup request has been received and is in progress with a Call Proceeding message. T-Mobile USA, INC. Confidential Rev. 0.6 December 5, 2007 39 of 214 Ошибка! Используйте вкладку "Главная" для применения Title к тексту, который должен здесь отображаться. Figure 1 - Circuit Switched Call Setup Flow Diagram T-Mobile USA, INC. Confidential Rev. 0.6 December 5, 2007 40 of 214 Ошибка! Используйте вкладку "Главная" для применения Title к тексту, который должен здесь отображаться. 5.1.3. RAB Setup Phase, CS Voice Now that the RRC Connection is established, and the UE authentication and encryption is enabled, the UE can request the setup it requires for this call and the MSC can start negotiating the call with the UE. Upon a successful negotiation, the MSC triggers the setup of resources for the User Plane by means of the “RAB Assignment” procedure. Since the QoS parameters indicate that the Traffic Class for this call is “Conversational”, the RRC state for the Radio Bearer to be set up is “Cell_DCH.” Having set up the resources for the User Plane, the call can be completed by means of some further NAS messages to notify the user that the call has been accepted. The voice traffic can now be sent over the resources in the User Plane. Once the service request has been initiated, the MSC requests the UTRAN to allocate the necessary radio resources via the RANAP message RAB Assignment Request. The RAB Assignment is the mechanism for the CN to notify the UTRAN of the appropriate Quality of Service (QoS) and attributes required to deliver the service. Examples of these attributes include, but are not limited to: Maximum Bit Rate o o UL = 12.2 kbps DL = 12.2 kbps Guaranteed Bit Rate: o o UL = 4.75, 5.9, 7.95, 12.2 kbps DL = 4.75, 5.9, 7.95, 12.2 kbps Maximum SDU Size: o 244 (bits) Sub-flow SDU Size (bits) o o o Sub-flow 1: 42, 55, 75, 81, 39 Sub-flow 2: 53, 63, 84, 103, 0 Sub-flow 3: 0, 0, 0, 60, 0 Because this is requesting dedicated resources, the Admission Control Algorithm is again invoked. If admission is granted, a Radio Link Setup Request message is sent from the RNC to the Node B via Node B Application Part (NBAP) signaling. If the Node B responds positively with a Radio Link Setup Response, and Bearer Synchronization is established, a RRC Radio Bearer Setup message is sent from the RNC to the UE. Embedded in this message is all the information the UE needs to construct a dedicated channel to support the CS voice call (e.g. AMR 12.2 kbps codec plus SRB). The AMR trans-coder within the MSC divides speech into 3 classes (A, B, and C) where A is the highest priority, B is next, C is lowest priority. Since each of these classes has unique RAB attributes, they are mapped to their own logical and transport channel within the radio bearer. For Ericsson, the AMR A bit sub-flow is identified by Transport Channel 8, and uses third rate convolutional coding. The transport channel DL BLER target for outer loop power control, as well as the Rate Matching attribute the for this Transport Channel are also transmitted to the UE at this time. Because the successful transmission of the B and C sub-flows (Transport Channels 9 and 10 respectfully) are not monitored by the outer loop power control, transport channel DL BLER targets are not required. The AMR B sub-flow transport channel uses third rate convolutional coding, while the AMR C sub-flow uses half rate convolutional coding. Table T-Mobile USA, INC. Confidential Rev. 0.6 December 5, 2007 41 of 214 Ошибка! Используйте вкладку "Главная" для применения Title к тексту, который должен здесь отображаться. 1 lists some of the Transport Channel attributes for each of the sub-flows used for AMR Speech. Ericsson TrCh ID AMR Sub-flow Coding 8 9 10 A B C 1/3 1/3 1/2 CRC 12 bits None None Physical Frame Size 20 ms 20 ms 20 ms Table 1 - Transport Channel Attributes AMR Speech In addition to configuring the transport channels for the AMR speech sub-flows, Transport Channel 31 is reconfigured from 13.6 kbps to a 3.4 kbps SRB. All four of these transport channels (8, 9, 10, and 31) are multiplexed into a single Coded Composite Transport Channel (CcTrCh), and mapped to a physical channel with a 64 bit spreading factor for the UL, and a 128 bit spreading factor for the DL (assuming AMR 12.2 kbps). Once this Radio Bearer has been configured and synchronized in the DL, the UE sends the SRNC a RRC Radio Bearer Setup Complete message. Upon receiving this message, the SRNC responds to the MSC with a RANAP RAB Assignment Response message. At this point, the call has been successfully setup, and moves into the Retainability phase of the call. The remaining NAS messages are used to provide the UE with the status of the call. The NAS Alerting message indicates to the UE that the other end has been notified of an incoming call. At this time, the UE typically generates ringing tones to alert the caller that progress is being made. Once the called party answers the call, the MSC sends NAS message Connect to the UE. At this point the UE and MSC activate their respective voice coders, and the UE sends the NAS message Connect Acknowledgement to the MSC. Figure 2 illustrates the actual L3 messaging of a call setup, collected by UE logging tool, in a market with an Ericsson UTRAN. T-Mobile USA, INC. Confidential Rev. 0.6 December 5, 2007 42 of 214 Ошибка! Используйте вкладку "Главная" для применения Title к тексту, который должен здесь отображаться. Figure 2 - L3 Messaging sample 5.1.4. Counters Related to CS Voice Call Setup In this section, the counters associated with a CS Voice call setup are discussed. Understanding which counters are affected, and under what circumstances they are incremented during the call flow, is essential to successfully monitor and troubleshoot the performance of the network. Figure 3 illustrates the counters associated with a RRC Connection establishment based a CS establishment cause. These counters include, but are not limited to the following: pmTotNoRrcConnectReq pmTotNoRrcConnectReqSucc pmTotNoRrcConnectReqCs pmTotNoRrcConnectReqSuccCs pmNoRejRrcConnMpLoadC Refer to [14] for details on these counters. T-Mobile USA, INC. Confidential Rev. 0.6 December 5, 2007 43 of 214 Ошибка! Используйте вкладку "Главная" для применения Title к тексту, который должен здесь отображаться. Figure 3 - Flowchart for Ericsson Counters, RRC Connection Setup, CS T-Mobile USA, INC. Confidential Rev. 0.6 December 5, 2007 44 of 214 Ошибка! Используйте вкладку "Главная" для применения Title к тексту, который должен здесь отображаться. Figure 4 and Figure 5 illustrate the counters associated with a RAB Establishment Attempt and Success respectively. These counters related to a CS Call Setup include, but are not limited to the following: pmNoRabEstablishAttempts pmNoRabEstablishAttemptSpeech pmpmNoRabEstablishSuccess pmpmNoRabEstablishSuccessSpeech pmNoRabEstablishFailureUeCapability pmNoFailedRabEstAttemptExceedConnLimit pmNoFailedRabEstAttemptLackDlAse pmNoFailedRabEstAttemptLackUlAse pmNoFailedRabEstAttemptLackDlChnlCode pmNoFailedRabEstAttemptLackDlPwr T-Mobile USA, INC. Confidential Rev. 0.6 December 5, 2007 45 of 214 Ошибка! Используйте вкладку "Главная" для применения Title к тексту, который должен здесь отображаться. Figure 4 - Flowchart for Ericsson Counters, RAB Setup T-Mobile USA, INC. Confidential Rev. 0.6 December 5, 2007 46 of 214 Ошибка! Используйте вкладку "Главная" для применения Title к тексту, который должен здесь отображаться. Figure 5 - Flowchart for Ericsson Counters, Successful RAB Setup 5.1.5. Circuit Switched Voice Accessibility KPI Equation 1 provides the KPI equation for CSV Access failure rate. pmTotNoRrc ConnectReq CsSucc(Utr anCell) pmNoRabEst ablishSucc essSpeech( UtranCell) 100 * 1 * pmNoRabEst ablishAtte mptSpeech( UtranCell) pmTotNoRrc ConnectReq Cs(UtranCe ll) Equation 1 - CSV Access Failure Rate T-Mobile USA, INC. Confidential Rev. 0.6 December 5, 2007 47 of 214 Ошибка! Используйте вкладку "Главная" для применения Title к тексту, который должен здесь отображаться. 5.2. Packet Switched Call Setup Figure 6 illustrates call flow diagram for the typical establishment of a Packet Switched call. Similar to the CS call setup, the PS setup is also divided into three phases: 5.2.1. The RRC Setup Phase The Pre-RAB Phase The RAB Setup Phase RRC Setup Phase, PS Setup In order to setup a call, the UE must establish an RRC Connection with the UTRAN. Once the UE has completed the Random Access Procedure, a RRC Connection Request Message is sent to the SRNC. Embedded in this message is the establishment cause, or the reason the UE is requesting a RRC connection. For the case mobile originating PS Call, the establishment cause could be “Originating Interactive Call”, or “Originating Background Call”. If the UE is responding to a page, or a mobile terminating PS call, the establishment cause could be “Terminating Interactive Call”, or “Terminating Background Call”. Upon reception of the RRC Connection Request, the UE is assigned UMTS Radio Network Temporary Identifier (U-RNTI). This identifier is unique to the PLMN and is derived from the SRNC identity and a unique SRNC RNTI (S-RNTI). In this manner the U-RNTI is unique to the UE. After a RRC Connection Request message is received, the Admission Control algorithm is invoked to confirm the required dedicated resources are available to establish a signaling connection. These resources include codes, power, and channel elements. If admission can not be granted, an RRC Connection Reject message is sent, and the counter pmNoReqDeniedAdm is pegged. If admission is granted, a Radio Link Setup request is sent to the Node B requesting dedicated resources be reserved. Once resources are reserved, the Node B responds with a Radio Link Setup Response message, and activates its Radio Link Set Supervision algorithm for this Radio Link. At this time, the RRC Connection Setup is sent to the UE with a RRC state indicator ordering the UE to go to CELL_DCH. Embedded in this message is all the information the UE needs to construct a dedicated channel. This includes all the logical, transport, and physical layer information required to build the 13.6 kbps SRB. For Ericsson, the SRB is identified by Transport Channel 31, and uses third rate convolution coding. The transport channel DL BLER target for outer loop power control, as well as the Rate Matching for the SRB is also transmitted to the UE at this time. At the physical layer, this SRB utilizes a 128 bit spreading factor. After the RRC Connection Setup message is sent, the Node B begins transmitting the DL DPCH to enable L1 synchronization. Once synchronization has occurred, the UE sends an RRC Connection Setup Complete message to the SRNC. Within this message are all the UE radio access capabilities for the RLC, Transport Channel, and Physical Channel. At this point, an RRC connection has been established between the UE and the SRNC. At this point in the PS call setup, the UE has reached a major milestone. Not only has it successfully completed the Random Access procedure, it has also setup a dedicated radio bearer with the RNC. This allows the UE to utilize fast power control, and soft handover to T-Mobile USA, INC. Confidential Rev. 0.6 December 5, 2007 48 of 214 Ошибка! Используйте вкладку "Главная" для применения Title к тексту, который должен здесь отображаться. overcome adverse RF conditions. Prior to this, the UE was highly susceptible to interference and coverage issues. The UE is now known by the UTRAN and has been assigned an ID: U-RNTI. It has signaling resources assigned to it, but has no bearer resources. The CN, however, has no visibility about this UE at this point. That is where the next phase (Pre-RAB Phase) comes in. 5.2.2. Pre-RAB Phase, PS Setup Once the RRC connection has been established, the next phase of the PS call setup procedure is the Pre-RAB or Signaling phase. This is initiated by the UE transmitting the Non-Access Stratum (NAS) message, Service Request, to the CN. This initial NAS message will trigger the creation of an Iu Signaling Connection between the SRNC and the SGSN. At this point, the core network initiates the security procedures like Authentication and Ciphering. During the Authentication process, the Authentication Center (AuC) uses an IMSI specific Authentication Key (K) and a randomly generated number (RAND) to generate five security parameters, known as the Quintet. Once these security parameters are generated, the CN sends the NAS message, Authentication Request, to the UE. Embedded in this message is the RAND used to generate the Quintet, as well as an Authentication Token (AUTN), which is derived from two of the Quintet parameters. Because the Authentication Key is also stored on the UE’s SIM card, the UE can use this RAND to generate the same Quintet that was generated by the AUC. In this manner, the UE can compare its locally generated AUTN to the version sent in the Authentication Request message. If these versions match, the UE has successfully authenticated the sender of the message, thus eliminating fraudulent access to UE specific information. This network authentication step is brand new in UMTS and was not available in GSM. Once this is complete, the UE responds with a NAS Authentication Response message, which contains one of the Quintet parameters, know as the Response (RES). The CN compares this RES with its locally generated Expected Response (XRES) to authenticate the UE. This method of bi-directional authentication between the UE and the CN is known as Mutual Authentication. Once Mutual Authentication is complete, the Integrity and Ciphering security features can be initiated. Integrity insures that L3 messaging can not be altered in an unauthorized manner and that the sender of the signaling is the appropriate sender (i.e. Integrity protects the UE from the “man in the middle attack”). Ciphering encrypts the signaling and user data sent between the UE and the SRNC. Integrity and Ciphering procedures are initiated by the SGSN by sending the RANAP message Security Mode Command. This message contains the Integrity Key (IK) and the Ciphering Key (CK), which are two of the five security parameters (Quintet). The RNC uses these keys to perform the Integrity and Ciphering security features. Because the UE can generate the same Quintet that was generated by the AUC, the IK and CK are known to the UE as well. The RRC message Security Mode Command is sent by the SRNC to instruct the UE to start the Integrity and Ciphering procedures. The Security Mode Control procedure is finalized by sending the RRC Security Mode Complete message from the UE to the SRNC. This message is also forwarded to the SGSN using the RANAP Security Mode Complete message. Once the security functions are enabled, the NAS message PDP Context Activation Request is sent from the UE to the CN. This message is basically requesting a connection T-Mobile USA, INC. Confidential Rev. 0.6 December 5, 2007 49 of 214 Ошибка! Используйте вкладку "Главная" для применения Title к тексту, который должен здесь отображаться. to the Public Packet Data Network via the SGSN and GGSN, using the Packet Data Protocol (PDP). T-Mobile USA, INC. Confidential Rev. 0.6 December 5, 2007 50 of 214 Ошибка! Используйте вкладку "Главная" для применения Title к тексту, который должен здесь отображаться. Figure 6 - Packet Switched Call Flow Diagram 5.2.3. RAB Setup Phase, PS Setup T-Mobile USA, INC. Confidential Rev. 0.6 December 5, 2007 51 of 214 Ошибка! Используйте вкладку "Главная" для применения Title к тексту, который должен здесь отображаться. Now that the RRC Connection is established, and the UE authentication and encryption enabled, the UE can request the setup it requires for this call and the SGNS can start negotiating the setup with the UE. Upon a successful negotiation, the SGSN triggers the setup of resources for the User Plane by means of the “RAB Assignment” procedure. Since the QoS parameters indicate that the Traffic Class for this call is “Interactive”, the RRC state for the Radio Bearer to be set up is “Cell_DCH.” Once the service request has been initiated, the SGSN requests the UTRAN to allocate the necessary radio resources via the RANAP message RAB Assignment Request. The RAB Assignment is the mechanism for the CN to notify the UTRAN of the appropriate Quality of Service (QoS) and attributes required to deliver the service. Examples of these attributes include, but are not limited to: Maximum Bit Rate o o UL = 12.2 kbps DL = 12.2 kbps Guaranteed Bit Rate: o o UL = 8, 64, 128, 384 and HSPA DL = 8, 64, 128, 384 and HSPA Maximum SDU Size: o 12016 (bits) Because this is requesting dedicated resources, the Admission Control Algorithm is again invoked. If admission is granted, a Radio Link Setup Request message is sent from the RNC to the Node B via Node B Application Part (NBAP) signaling. If the Node B responds positively with a Radio Link Setup Response, and Bearer Synchronization is established, a RRC Radio Bearer Setup message is sent from the RNC to the UE. Embedded in this message is all the information the UE needs to construct a Radio Bearer to support the PS session. At this point, the PS session may be setup utilizing dedicated channels, (i.e. 64 kbps UL/64 kbps DL), the High Speed Downlink Shared Channel (HS-DSCH) and an UL dedicated channel (i.e. 64 kbps UL/HS-DSCH), or the HS-DSCH and Enhanced Uplink (EUL) (i.e. EUL/HS-DSCH). Setup for these three scenarios is dependant on UE capabilities (as communicated in the RRC Connection Setup Complete message), and the capabilities of the serving cell. For this discussion, it is assumed that the PS session is setup using dedicated channels (i.e. 64k/64k). Since this bearer has unique RAB attributes, it is mapped to its own logical, transport and physical channel within the radio bearer. For Ericsson, Transport Channel 24 is used for PS, and utilizes Turbo coding for forward error correction. The transport channel DL BLER target for outer loop power control as well as the Rate Matching attribute for this transport channel is also transmitted to the UE at this time. In addition to configuring the transport channel for the PS Session, Transport Channel 31 is reconfigured from 13.6 kbps to a 3.4 kbps SRB. Both of these transport channels (24 and 31) are multiplexed into a single Coded Composite Transport Channel (CcTrCh), and mapped to a physical channel with a 16 bit spreading factor for the UL, and a 32 bit spreading factor for the DL (assuming 64k/64k RAB). Once this Radio Bearer has been configured and synchronized in the DL, the UE sends the SRNC a RRC Radio Bearer Setup Complete message. Upon receiving this message, the SRNC responds to the SGSN with a T-Mobile USA, INC. Confidential Rev. 0.6 December 5, 2007 52 of 214 Ошибка! Используйте вкладку "Главная" для применения Title к тексту, который должен здесь отображаться. RANAP RAB Assignment Response message. At this point, the session has been successfully setup, and moves into the Retainability phase of the call. The NAS Activate PDP Context Accept message indicates to the UE that an IP address has been assigned and the PS session may begin. Figure 7 illustrates the actual L3 messaging of a PS session setup, collected by UE logging tool, in a market with an Ericsson UTRAN. Figure 7 - L3 Messaging for PS Setup 5.2.4. Counters Related to PS Setup In this section, the counters associated with a PS session setup are discussed. Understanding which counters are affected, and under what circumstances they are incremented during the call flow, is essential to successfully monitor and troubleshoot the performance of the network. Figure 8 illustrates the counters associated with a RRC Connection establishment based a PS establishment cause. These counters include, but are not limited to the following: pmTotNoRrcConnectReq pmTotNoRrcConnectReqSucc pmTotNoRrcConnectReqPs pmTotNoRrcConnectReqSuccPs pmTotNoUtranRejRrcConnReq pmNoRejRrcConnMpLoadC T-Mobile USA, INC. Confidential Rev. 0.6 December 5, 2007 53 of 214 Ошибка! Используйте вкладку "Главная" для применения Title к тексту, который должен здесь отображаться. Figure 8 - Flowchart for Ericsson Counters, RRC Connection Setup, PS T-Mobile USA, INC. Confidential Rev. 0.6 December 5, 2007 54 of 214 Ошибка! Используйте вкладку "Главная" для применения Title к тексту, который должен здесь отображаться. Figure 4 and Figure 5 illustrate flowchart for the counters associated with a RAB Establishment Attempt and Success respectively. The counters related to a PS Session Setup include, but are not limited to the following: 5.2.5. pmNoRabEstablishAttempts pmNoRabEstablishAttemptPacketInteractive pmpmNoRabEstablishSuccessPacketInteractive pmNoRabEstablishAttemptPacketInteractiveHs pmNoRabEstablishSuccessPacketInteractiveHs pmNoRabEstablishFailureUeCapability pmNoFailedRabEstAttemptExceedConnLimit pmNoFailedRabEstAttemptLackDlAse pmNoFailedRabEstAttemptLackUlAse pmNoFailedRabEstAttemptLackDlChnlCode pmNoFailedRabEstAttemptLackDlPwr Packet Switched Accessibility KPI Equation 2 provides the KPI equation for PSD Access failure rate (refer to the Ericsson UMTS Network KPI document for details regarding this equation). pmTotNoRrc ConnectReq PsSucc(Utr anCell) 100 * 1 * 0.9993 * R99 InteractiveRABEstabl ishSuccess Rate pmTotNoRrc ConnectReq Ps(UtranCe ll) Equation 2 - PSD Access Failure Rate T-Mobile USA, INC. Confidential Rev. 0.6 December 5, 2007 55 of 214 Ошибка! Используйте вкладку "Главная" для применения Title к тексту, который должен здесь отображаться. 6. Random Access Procedure The Random Access Procedure is utilized by the UE to access the UTRAN network from an Idle, or Cell_FACH state. Since this is a critical step in the CS or PS call setup process, understanding this procedure is essential to successfully maintain and operate the UMTS network. In addition to being familiar with the Random Access Procedure, it is important to understand the configurable parameters utilized by the algorithm, and the affects of modifying these parameters. It is quite possible to aggressively configure the Random Access parameters to improve the likelihood of accessing the network, at the cost of capacity. Alternatively, it is also possible to be overly concerned about capacity at the cost of successfully accessing the network. The UMTS Random Access Procedure is based on a slotted ALOHA approach, which is commonly utilized by modern wireless communication systems. Developed at the University of Hawaii in the early 1970’s, this access algorithm allows any terminal to transmit on the shared uplink channel without considering if the channel is being utilized by another terminal. The term “slotted” implies that these transmissions occur at predefined time slots. If the transmission is received by the Node B correctly, an acknowledgement will be sent to the UE. If no acknowledgement is received by the UE, it assumes the previous transmission was lost and retransmits after waiting a random amount of time. An overview of the 3GPP implementation of this Random Access Procedure, and the configurable parameters utilized by Ericsson, are discussed in the following section. 6.1. Random Access Overview When accessing the UMTS network, several factors must be considered. The channel which is utilized, the Random Access Channel (RACH), is a shared channel. Because of this, the possibility of collisions from multiple user access attempts is possible. In addition, all uplink transmissions result in co-channel interference and therefore require stringent power control to minimize this interference. However, since the RACH does not use closed loop power control, the UE must estimate the power required to transmit the RACH message. The goal of the Random Access Procedure is to minimize the chance of collisions, and to estimate the UE transmit power so that interference to other UEs is minimized. However, these goals must be achieved while minimizing system access time. 6.1.1. Random Access Channels To achieve these goals, the UE initially sends test messages (i.e. preambles) on the Physical Random Access Channel (PRACH), prior to sending the RACH message (e.g. the RRC Connection Request message). The preamble messages are sent in predefined slots known as Access Slots. The PRACH Access Slot format, and its relation to the Acquisition Indication Channel (AICH) slots, is illustrated in Figure 9 (ref. 3GPP TS 25.214). There are 15 defined Access slots, divided into two access slot sets, every 20 ms. There are 8 access slots (0-7) in access slot set 1, and 7 access slots (8-14) in access slot set 2. In addition, there are 15 corresponding AICH slots which are time offset by p-a. The AICH only exists on the physical layer and is used solely to acknowledge preambles sent on PRACH Access Slots. T-Mobile USA, INC. Confidential Rev. 0.6 December 5, 2007 56 of 214 Ошибка! Используйте вкладку "Главная" для применения Title к тексту, который должен здесь отображаться. Figure 9- PRACH access slot and downlink AICH relation p-a is the preamble to Acquisition Indication (AI) distance p-p is the preamble to preamble distance p-m is the preamble to message distance The AICH Transmission Timing (p-a) can be set by a configurable parameter called aichTransmissionTiming and can be either equal to 0 or 1 in the Ericsson implementation. This parameter is interpreted as follows (Reference 3GPP TS 25.211). If aichTransmissionTiming = 0 p-p, min = 15360 chips ( 3 access slots) p-a = 7680 chips p-m = 15360 chips (3 access slots) If aichTransmissionTiming = 1 p-p, min = 20480 chips ( 4 access slots) p-a = 12800 chips p-m = 20480 chips (4 access slots) The AICH Transmission Timing parameter is broadcast in SIB 5. 6.1.2. Open Loop Power Control As previously stated, the initial preamble power (P_PRACH) must be conservatively calculated to insure that uplink interference to other UEs is minimized. To achieve this, the initial preamble power (P_PRACH) is calculated by the following equation: P_PRACH L_PCPICH RTWP constantVa lueCprach Equation 3 - Initial Preamble Transmit Power Where: T-Mobile USA, INC. Confidential Rev. 0.6 December 5, 2007 57 of 214 Ошибка! Используйте вкладку "Главная" для применения Title к тексту, который должен здесь отображаться. L_PCPICH = the estimated downlink path loss of the Pilot Channel (CPICH) RTWP = the Received Total Wideband Power (i.e. Uplink Interference) measured by the Node B constantValueCprach = is a configurable parameter used to offset the equation’s result The downlink path loss of the Pilot Channel (L_CPICH) is estimated by subtracting the CPICH RSCP (measured by the UE) from the primaryCPICH-TX-Power, which is broadcast in System Information Block 5 (SIB 5). In addition, the parameter constantValueCprach is also broadcast in SIB 5. The uplink interference (RTWP) measured by the Node B is broadcast in SIB 7. The purpose of the configurable parameter constantValueCprach, is to account for the processing gain of the preamble, which is equivalent to 10log(256) = 24 dB. Ericsson’s default value for constantValueCprach is equal to -27 dB, which results in a -3 dB offset to the initial preamble transmit power. This negative offset yields a conservative estimate for the transmit power of the initial preamble, thus reducing the potential of causing unnecessary uplink interference. 6.1.3. Physical Layer Random Access Procedure Once the initial preamble transmit power is determined, the physical layer random access procedure shall be performed as follows (reference 3GPP TS 25.214, Section 6): 1. An access slot is randomly selected from the group of available access slots in the next full access slot set (e.g. Access Slot set 1). If there are no available access slots in the selected set, randomly select an available access slot in the next access slot set (e.g. Access Slot set 2). The term “available access slots” is used because some of the access slots may be reserved for a higher priority Access Class (AC), such as emergency personnel. 2. Once an access slot has been selected, the UE randomly selects a Preamble Signature from the set of available signatures. As specified in 3GPP TS 25.213, Section 4.3.3, the set of Preamble Signatures consist of 16 Hadamard codes, each 16 bits long. The selected 16 bit code is repeated 256 times and combined with a preamble scrambling code, to form the transmitted preamble code. The preamble scrambling code selected is one of 16 associated with the CPICH Scrambling code of the cell being accessed. In this manner, the Node B can identify preambles targeted for it, and ignore preambles intended for other Node Bs. Similar to the access slot scenario, the term “available signatures” is used because some of the signatures may be reserved for a higher priority Access Class (AC), such as emergency personnel. 3. At this point, the UE transmits the selected preamble code, using the selected slot; at an initial preamble transmit power (P_PRACH), which was calculated using Equation 3. If the calculated transmit power exceeds the maximum allowed UE transmit power (as broadcast on SIB 3), the preamble will be transmitted at the maximum allowed power. 4. After the preamble is sent, the UE monitors the AICH for an acknowledgement on the corresponding AICH access slot (refer to Figure 9). The UE is able to differentiate AICH acknowledgements targeted for it, and ignore those intended for other UEs, because the 16 specified 32 bit AICH signature patterns used by the AICH are related to the 16 preamble signatures previously described. Refer to 3GPP TS 25.211, Section 5.3.3.7 for information regarding the AICH. T-Mobile USA, INC. Confidential Rev. 0.6 December 5, 2007 58 of 214 Ошибка! Используйте вкладку "Главная" для применения Title к тексту, который должен здесь отображаться. 5. If no acknowledgement (positive or negative) is detected on the corresponding AICH access slot, the UE utilizes the next available access slot, randomly picks an available preamble signature, and increases the preamble transmit power by a value equal to the configurable parameter powerOffsetP0 (broadcast in SIB 5/6). If this newly adjusted power is not greater than the maximum allowed UE transmit power by 6 dB, the preamble is transmitted at the calculated power or the maximum UE transmit power, whichever is minimum. 6. Assuming no acknowledgement is detected, the power ramping process will continue (as described in step 5), unless one or both of the following events occur: a. The number of preambles transmitted equals the configurable parameter preambleRetransMax (broadcast in SIB 5/6). b. The newly calculated preamble transmit power exceeds the maximum allowed UE transmit power by 6 dB, after applying the powerOffsetP0 offset. 7. If step 6a or 6b occur, the UE will exit the physical random access process and inform the MAC layer that “No Ack on AICH” was detected. 8. If the preamble is detected, and the Node B responds with a positive acknowledgement, the UE will transmit the Layer 3 message three or four access slots after the last preamble transmitted. The control part of this message will be transmitted at a power equal to the power of the last preamble sent, plus the value of the configurable parameter powerOffsetPpm (not to exceed the maximum allowed UE transmit power). The data part of this Layer 3 message is transmitted based on the gain factors for PRACH, which are also broadcast in SIB 5. 9. If the preamble is detected, and the Node B responds with a negative acknowledgement the UE will exit the physical random access process and inform the MAC layer that a “Nack on AICH recieved”. Figure 10 illustrates the major aspects of the physical random access procedure. The first preamble is transmitted at the calculated initial preamble transmit power. If no acknowledgement is received on the AICH, the next preamble is transmitted with a power that is increased by powerOffsetP0. Once the preamble is positively acknowledged, the message is sent with a power that is increased by powerOffsetPpm, relative to the last preamble power. Figure 10 - Random Access Power Ramping on PRACH T-Mobile USA, INC. Confidential Rev. 0.6 December 5, 2007 59 of 214 Ошибка! Используйте вкладку "Главная" для применения Title к тексту, который должен здесь отображаться. The time between preamble transmissions is dependant on the availability of access slots, and the AICH Transmission Timing parameter described earlier. The minimum time interval is based on the AICH Transmission Timing parameter as specified earlier. The maximum time between preambles is dependant on the availability of access slots. If access slots are reserved for a higher priority Service Class (SC), the time between preambles may increase as a function of the number of sub channels used. 6.1.4. MAC Monitoring and Control of Random Access Transmissions The physical layer random access procedure described is only part of the overall Random Access procedure. In addition to initiating the physical random access procedure, the Medium Access Control (MAC) also monitors and reinitiates RACH transmission based on parameters provided by higher layers. Figure 11 is a flowchart illustrating the MAC’s control for RACH transmissions. Once it is determined that there is a message to send on RACH, the MAC obtains required parameters from higher layers and initiates the physical layer random access procedure, which is described in the previous section. The three possible responses from Layer 1 are: “Ack”; “Nack”; or “No Ack” An “Ack” indicates a positive acknowledgement was received during the physical random access procedure. In this case, the procedure was successful and the RRC Message was transmitted on RACH. At this point, the MAC ends the RACH transmission procedure. A “Nack” indicates that a negative acknowledgement was received during the physical random access procedure, possible due to contention. In this case, the UE needs to reinitiate the random access procedure after time delay. As shown in Figure 11, the MAC inserts a fixed T2 =10 ms delay, plus an additional back off timer TBO1 = (NBO1 * 10 ms), where NBO1 is an integer randomly selected within the range of parameters NBO1 (max) and NBO1 (min), which are broadcast in SIB 5. The purpose of this random back off timer is to reduce the probability of repeated collisions on the PRACH. Once this timer has expired, the MAC checks the number of initiated preamble transmissions to the configurable parameter maxPreambleCycle. This parameter basically limits the number of physical random access procedures that can be initiated by the MAC, per request from higher layers. If the maxPreambleCycle limit has been exceeded, the MAC ends the RACH transmission procedure and the higher layer (RRC) is notified that the transmit status was “unsuccessful”. If the maxPreambleCycle limit has not been exceeded, the MAC performs a persistency check. A persistency check is basically another way to insert a random delay (in increments of 10 ms) into the algorithm. Once this delay is completed, the command is sent to the physical layer to reinitiate the physical random access procedure. A “No Ack” indicates that neither a negative or positive acknowledgement was received during the physical random access procedure. In this case, the UE needs to reinitiate the random access procedure after a time delay. As shown in Figure 11, the process used for this scenario is similar to the “Nack” scenario, except the back off timer TBO1 is not utilized. Simply put, the MAC will reinitiate the physical layer random access procedure (described in Section 6.1.3) repeatedly until either a positive acknowledgement is received, or the maxPreambleCycle limit has been exceeded. T-Mobile USA, INC. Confidential Rev. 0.6 December 5, 2007 60 of 214 Ошибка! Используйте вкладку "Главная" для применения Title к тексту, который должен здесь отображаться. In the Ericsson implementation, NBO1 (max) = NBO1 (min) = 0, which means the backoff timer TBO1 is not used. Also the persistence value selected is 1, so that the delay due to persistence check is not implemented either. Start NOTE: MAC-c/sh receives RACH tx control parameters from RRC with CMAC-CONFIG-Req primitive whenever one of the parameters is updated Get RACH tx control parameters from RRC: M max , N BO1min , N BO1max , set of ASC parameters N Any data to be transmitted ? Y ASC selection: (PRACH partition i, P i) M := 0 Increment preamble transmission counter M M M max ? Indicate to higher layer that maximum number of preamble cycles have been reached (TX status "unsuccessful") N Y End Set and wait expiry timer T BO1 (N BO1 *10 ms) Update RACH tx control parameters Wait expiry Timer T 2 (10 ms) Wait expiry Timer T 2 (10 ms) Set Timer T 2 (10 ms) Wait expiry timer T 2 (10 ms) Draw random number 0 Ri 1 N R Pi ? Y Send PHY-ACCESS-REQ (start of L1 PRACH transmission procedure) No Ack L1 access info N ack ? Ack Send PHY-DATA-REQ, indicate TX status to higher layer (PRACH message part transmitted) End Figure 11 – MAC Flowchart of RACH Transmission Control 6.1.5. RRC Control or Random Access Transmissions The Radio Resource Control (RRC) initiates the MAC RACH transmission control algorithm whenever a message needs to be sent on the RACH. In addition, the RRC monitors the results of these transmissions and has the ability to resend messages that were not successfully transmitted. For the specific case of the RRC Connection Request message, T-Mobile USA, INC. Confidential Rev. 0.6 December 5, 2007 61 of 214 Ошибка! Используйте вкладку "Главная" для применения Title к тексту, который должен здесь отображаться. these retransmissions are controlled by the N300 and T300 parameters, which are broadcast in SIB 1. When it is determined that an Idle UE requires an RRC Connection, RRC will initiate the RRC Connection procedure. At the onset of this procedure, an internal counter, V300 is set to 1 and the RRC Connection Request message is submitted to the lower layers (MAC and L1) for transmission on RACH. When the MAC indicates either success or failure in sending this RRC message, timer T300 is started. If this transmission does not result in the reception of a RRC Connection Setup message before T300 expires, the RRC checks the value of counter V300. If V300 is less than or equal to N300, the RRC Connection Request message is resubmitted to the MAC for transmission on the RACH. This process is continued until either an RRC Connection Setup message is received by the UE, or the V300 counter exceeds the parameter N300. If the latter occurs, the UE enters idle mode and RRC Connection procedure is considered to be unsuccessful. (Reference 3GPP TS 25.331, Section 8.1.3.5) To summarize, if the transmission of the RRC Connection Request message does not result in the reception of the RRC Connection Setup message; it will be retransmitted N300 times with T300 seconds delay between transmissions. Failure to receive the RRC Connection Setup message may be due to several reasons, which include, but are not limited to: The Layer 1 preambles were never detected The Layer 1 preambles were detected, and a “Nack” was transmitted by the AICH (preambleRetransMax times) The Layer 1 preambles were detected, an “Ack” was transmitted by the AICH, and the RRC Connection Request message was sent, however it was not successfully detected by the Node B The RRC Connection Request message was received by the Node B, however the RRC Connection Setup message was not successfully detected by the UE. In Ericsson implementation, these parameters are not operator configurable and are currently set as N300 = 5, and T300 = 2000 ms. 6.1.6. Interaction of RRC, MAC and Physical Layer Random Access Procedures As described before, the Physical, MAC, and RRC layers all play a part in the random access procedure. In order to clarify the interaction of these layers on random access, an example will be provided in this section. For this example, the following parameter values will be assumed: powerOffsetP0 = 2 dB preambleRetransMax = 15 maxPreambleCycle = 3 powerOffsetPpm = 2 dB N300 = 5 T300 = 2000 ms T-Mobile USA, INC. Confidential Rev. 0.6 December 5, 2007 62 of 214 Ошибка! Используйте вкладку "Главная" для применения Title к тексту, который должен здесь отображаться. Assume that an idle UE is originating CS call, and RRC Connection Request message needs to be sent. The initial preamble power is determined by Equation 3 to be -25 dBm. The preamble is sent at this power and no acknowledgement is sent on the AICH. The second preamble is sent at -23 dBm (due to powerOffsetP0 = 2 dB). Assuming an acknowledgement is not received on all the following preambles, a total of 15 preambles (preambleRetransMax = 15) would be sent with the last one transmitting at +3 dBm. After a delay of 2-15 ms, the MAC would repeat the process up to 2 more times (maxPreambleCycle = 3). Every time the process is repeated, the initial preamble transmit power would be recalculated. If the process continued without a received acknowledgement on all the following preambles, an additional 30 preambles could be transmitted during the 2nd and 3rd preamble cycle. This would bring the total to 45 preambles for the initial RRC Connection Request (15 * 3 = 45 preambles). After a 2 second delay (T300 = 2000 ms), a second RRC Connection Request message would be sent to the MAC layer initiating the process to repeat. If this continues without an acknowledgement being received, it is possible that a total of 270 preambles could be sent over a 10-11 second period (45 * (5+1) = 270). This is a worst case scenario; however its occurrence in real world situation is not rare. As a second example, assume that RF conditions are poor and the initial preamble power is determined by Equation 3 to be +18 dBm. The second preamble is sent at +20 dBm and a positive acknowledgement is sent on the AICH. The UE would transmit the RRC Connection Request message with the control part of the message at +22 dBm (powerOffsetPpm = 2 dB). Assuming a RRC Connection Setup message is received within 2 seconds, then no additional preambles will be sent. Figure 12 is an example of a physical random access logged with TEMS. This mode report lists the initial preamble transmit power (18 dBm), the number of preambles sent during this cycle (2 preambles) and the result on the associated AICH slot (Ack received). Figure 12 – Log file of Physical Layer Random Access 6.1.7. RACH Sub-Channels As mentioned previously, some of the PRACH access slots may be reserved for UEs containing higher priority Access Class (AC) USIMS, such as those for emergency personnel. This functionality is accomplished by means of RACH sub-channels. By reserving one or more RACH sub-channels to a specific Access Service Class (ASC), the likelihood of a successful access can be improved for members of that AC. A RACH sub-channel is defined as a subset of the PRACH access slots. There are a total of 12 sub-channels with each sub-channel consisting of 5 access slots. Since 15 access slots span 2 radio frames, the 12 sub-channels repeat every 60 access slots (or 8 radio frames). Each sub channel consists of 5 access slots which include the access slot corresponding to T-Mobile USA, INC. Confidential Rev. 0.6 December 5, 2007 63 of 214 Ошибка! Используйте вкладку "Главная" для применения Title к тексту, который должен здесь отображаться. the sub channel number as well as the 12th access slot relative to the sub channel number. Table 2 defines the PRACH access slot to RACH sub-channel mapping (3GPP TS 25.214, Section 6.1.1). As shown in the Table 2, Sub-channel 0 consists of 5 access slots: 0 (frame 1), 12 (frame 2), 9 (frame 3), 6 (frame 4), and 3 (frame 6). Here access slot 0 corresponds to the sub channel number 0, and the 12th access slot for this sun channel would be access slot 12. Sub-channels 1-11 are similarly distributed across the 8 radio frames. SFN modulo 8 0 of corresponding P-CCPCH frame 0 0 1 12 2 3 4 5 6 7 Sub-channel number 1 2 3 4 5 6 7 1 13 2 14 3 4 5 6 7 0 12 1 13 2 14 3 9 6 10 7 3 4 11 8 5 9 6 10 7 8 9 10 11 8 5 9 6 10 7 11 4 1 13 2 14 3 4 8 5 11 0 12 8 9 10 11 0 12 1 13 2 14 Table 2 – The available uplink access slots for different RACH sub-channels 6.1.8. Access Class and Access Service Class 16 Access Classes (0-15) are defined for UMTS and GSM users (3GPP TS 22.011). Access Classes 0 to 9 are equivalent and are randomly allocated to all UEs such that every UE belong to one of these ten Access Classes. The access class assigned to a user is stored in their SIM/USIM. In addition to these first 10 Access Classes, UEs may also belong to one or more of the 5 special Access Classes (11-15). These special Access Classes are allocated to high priority users as follows: Class 15: PLMN Staff; Class 14: Emergency Services; Class 13: Public Utilities (e.g. water/gas suppliers); Class 12: Security Services; Class 11: For PLMN Use Access Class 10 is used for Emergency Calls. In addition, any number of these Access Classes may be barred access to the network at any time. For example, Access Classes 015 can be barred access to a site during maintenance, or testing. Alternatively, Access Classes 0-9 can be barred access to the entire network during a natural disaster (e.g. a hurricane). The 16 Access Classes are mapped to 7 Access Service Classes (ref 3GPP 25.331, Section 8.5.13). This mapping is shown in Table 3. At the RRC layer, the set of available signatures and the set of available RACH sub-channels for each Access Service Class (ASC). In this manner, specific RACH signatures and RACH sub-channels can be reserved for specific Access Classes. T-Mobile USA, INC. Confidential Rev. 0.6 December 5, 2007 64 of 214 Ошибка! Используйте вкладку "Главная" для применения Title к тексту, который должен здесь отображаться. AC ASC 0–9 1st IE 10 2nd IE 11 3rd IE 12 4th IE 13 5th IE 14 6th IE 15 7th IE Table 3 – Access Class to Access Service Class Mapping T-Mobile USA, INC. Confidential Rev. 0.6 December 5, 2007 65 of 214 Ошибка! Используйте вкладку "Главная" для применения Title к тексту, который должен здесь отображаться. 6.2. Ericsson Specific Parameter for Random Access The following list contains the configurable parameters related to Random Access. The values shown here are vendor defaults and will be updated based on tests in the future. Parameter Name constantValueCprach aichPower maxPreambleCycle powerOffsetP0 powerOffsetPpm preambleRetransMax Object Name UtranCell UtranCell UtranCell UtranCell UtranCell UtranCell Recommended Value -27 dB - 6 dB 4 cycles 3 dB -4 dB 8 preamble Table 4 – Ericsson Specific Random Access Parameters The following section details some of the steps that can be considered for optimization of these parameters based on field testing. 6.3. Random Access Parameter Optimization and Troubleshooting When optimizing the Random Access parameters, one must consider the tradeoffs between accessibility, and capacity. As previously stated, it is quite possible to aggressively configure the Random Access parameters to improve the likelihood of accessing the network, at the cost of capacity. Alternatively, it is also possible to be overly concerned about capacity at the cost of successfully accessing the network. Several of the parameters utilized in the random access process can be configured to achieve one of these extremes. This section will discuss how the configurations of these parameters will affect accessibility, as well as capacity. As previously described, the initial preamble transmit power is calculated at the beginning of every ramping cycle, using Equation 3. The configurable parameter in this equation is constantValueCprach, which has a default value of -27 dB. If the maximum value of -10 dB was used, the initial preamble transmit power would likely be excessive, as well as the power of the subsequent RRC message. Although the chance for successfully sending the RRC message is increased, the side effect of increased UL interference is unwanted. Note that if drive testing analysis determines that the estimated transmit power for the initial preamble is consistently low; adjusting this parameter to a higher value (e.g. – 24 dB) will improve the accuracy of the estimate. Alternatively, if drive testing analysis determines that a large percentage of the initial preambles are being acknowledged, then the initial preamble power is likely to be excessive and constantValueCprach may need to be reduced. Once the initial preamble transmit power is calculated, the preamble power is ramped until an acknowledgement is detected on the AICH. The two parameters related to this functionality are powerOffsetP0, and preambleRetransMax. The dynamic range of the power ramping function can be calculated by using Equation 4. Assume that 2 dB and 15 were used for powerOffsetP0, and preambleRetransMax respectively. This would result in a dynamic range of 28 dB. The dynamic range of the UE (assuming 24 dBm max T-Mobile USA, INC. Confidential Rev. 0.6 December 5, 2007 66 of 214 Ошибка! Используйте вкладку "Главная" для применения Title к тексту, который должен здесь отображаться. power) is (24 dBm – (-50 dB) = 74 dB. Comparing these two ranges emphasizes the need for the initial preamble power estimate to be relatively accurate. Under certain conditions (i.e. very high measure CPICH RSCP), it has been observed in the field that this estimate is erroneous and yields a value that is too low. The result, in some cases, is that all preambleRetransMax preambles are transmitted, no acknowledgement was received, and the UE did not transmit at maximum power (e.g. 24 dBm). PowerRampDynRange powerOffse tP0 preambleRe transMax - 1 Equation 4 – Dynamic Range of Preamble Power Ramping Function An example of this is shown in Figure 13. As the mode report shows, 15 preambles were transmitted without an acknowledgement received on the AICH. The initial preamble transmit power is -40 dBm, and the step size is 2 dB (not shown). This equates to a final preamble transmit power of -12 dBm, which is 36 dB less than the maximum UE transmit power. The occurrence of this scenario needs to be minimized as it can lead to access failures and increased call setup time. Figure 13 - Log File of Failed Preamble Ramping Function To mitigate the risk of this occurring, the dynamic range of the power ramping function can be increased. This can be accomplished by increasing either powerOffsetP0 or preambleRetransMax. If powerOffsetP0 is increased, the potential of overshooting the required preamble transmit power during a power ramp step is increased. The average amount of overshoot should be approximately (50% x powerOffsetP0). Therefore, increasing the step size from 2 to 3 dB would result in the average amount of overshoot increasing from 1 dB to 1.5 dB. The alternative would be increasing the maximum number of preamble step with the parameter preambleRetransMax. Although this change would not result in an increase in the average amount of overshoot, it would potentially increase the number of preambles transmitted. Although this could result in increased setup time and rise, the effects should be negligible and should only affect UEs in bad radio condiitons. Since this scenario has a low percentage of occurrences, increasing the preambleRetransMax parameter would have the least effect on the network, given the two options. If drive test analysis determines that this scenario is occurring frequently, increasing the preambleRetransMax value may be required. Since this is a UtranCell parameter, only cells effected by this problem can be modified. The final issue to consider is related to the transmission of the RRC Connection Request message after a positive acknowledgement has been received on the AICH. The parameter powerOffsetPpm defines transmit power of the message, relative to the last transmitted preamble. For example, if the last transmitted preamble was sent at +10 dBm, and powerOffsetPpm = 2 dB, the control part of the RRC message would be sent at +12 dBm. Since both the preamble signature and the RRC Connection Request message T-Mobile USA, INC. Confidential Rev. 0.6 December 5, 2007 67 of 214 Ошибка! Используйте вкладку "Главная" для применения Title к тексту, который должен здесь отображаться. have the same processing gain, it is tempting to set the parameter to 0 dB (which would also reduce UL interference). However one must consider the Node Bs ability to receive and decode these messages. The preamble signatures are known to the Node B. By using a matched filter in the channel element, the Node B only has to detect the preamble, not actually decode the message. On the other hand, the RRC Connection Request message must be received and correctly decoded by the Node B. Based on this, it is likely that the transmit power for the RRC Connection Request message should be higher than the power used on the detected preamble. If test analysis indicates this scenario may be occurring, it can be validated with RNC logs (e.g. UETR) and powerOffsetPpm parameter can be optimized. T-Mobile USA, INC. Confidential Rev. 0.6 December 5, 2007 68 of 214 Ошибка! Используйте вкладку "Главная" для применения Title к тексту, который должен здесь отображаться. 7. Paging Procedures The primary purpose of paging is to set up a Mobile Terminating (MT) call. The idle User Equipment (UE) is normally paged in a Location Area (LA) or a Routing Area (RA) using a subscriber-Id (e.g. IMSI or P-TMSI), depending on the Core Network (CN) domain that originated the page message. The idle UE’s response to the paging message will reveal its location at the cell level to the network and necessary signaling will continue on common and/or dedicated channels in order to establish a connection to the UE. The LA and RA definitions in UMTS are exactly the same as for GERAN. As a vendor feature, the UE may be paged in a global RNC area corresponding to cells under the control of one RNC. In UMTS the paging procedure has been enhanced in a number of ways. This is required in order to deal with the more complicated behavior of the UE in connected mode (“connected while sleeping”), and the increased responsibilities of the UTRAN in managing radio related tasks. As an example, unlike GERAN, a paging message in UMTS may be originated autonomously by the RNC in order to inform the UE about changes in System Information Blocks (SIB), or trigger the UE to do a Cell Update. As in 2G networks there is a great need for reducing battery consumption by the UEs. UMTS also utilizes a discontinuous reception (DRX) mechanism on paging channels which is similar to the paging-groups concept of GSM but quite different in details due to the radical difference in the air interface between GSM and UMTS. This is discussed in the following sections. In addition to paging in LA and RA, UMTS defines a new paging area known as UTRAN Registration Area (URA). The URAs are known only within the UTRAN and are generally independent of LAs and RAs. A UE is paged in a URA only when it is in the RRC URA_PCH mode (i.e. it has an active RRC connection towards a Serving RNC). A single cell can belong to more than one URA, thus allowing for overlapping URAs. SIB 2 indicates a list of URAs the cell belongs to, and a UE can be assigned more than one URA-id. Careful URAplanning involves considerations regarding a balance between the paging load and UE initiated URA-updates, similar to LA/RA planning. The chart below shows the possible scenarios related to paging in terms of the UE states, the resources used, the originating node for pages and the paging area. Further details on Paging in UTRAN can be found in [19]. In Ericsson, CELL_PCH state is not implemented. UE State RRC Connected Paging Type Resources Used Originating Node Paging Reason Paging Area Idle No Type 1 PICH & SCCPCH (carrying PCH) CN Terminating service LA/RA UTRAN System Information updates DPCCH (carrying CN Terminating service from CELL_DCH Yes T-Mobile USA, INC. Confidential Type 2 Rev. 0.6 December 5, 2007 Specific UE 69 of 214 Ошибка! Используйте вкладку "Главная" для применения Title к тексту, который должен здесь отображаться. DCH) a CN that UE is not connected to CELL_FACH Yes Type 2 SCCPCH (carrying FACH) and PRACH (carrying RACH) CN Terminating service from a CN that UE is not connected to Specific UE CELL_PCH Yes Type 1 PICH & SCCPCH (carrying PCH) CN CS terminating service Last known cell UTRAN System Information updates, allow UE to trigger cell update PICH & SCCPCH (carrying PCH) CN CS terminating service UTRAN System Information updates, allow UE to trigger cell update URA_PCH Yes Type 1 Last known URA 7.1. Paging Types The paging procedure is normally initiated by CN using the RANAP procedure called PAGING. Once the PAGING message has been received by the RNC, it will use one of the two types of RRC paging messages depending on the state of the UE. 7.1.1. Paging Type 1 For a UE in RRC Idle state, an RRC: PAGING TYPE 1 is sent from the RNC to the UE. Two parameters in Paging Type 1 are the CN domain-Id and the IMSI/(P)TMSI of the paged UE. If the UE has already an RRC connection, then the RNC may convert the IMSI/(P)TMSI to a UTRAN Radio Network Temporary Id (U-RNTI). The reception of the PAGING TYPE 1 message typically results in the establishment of an RRC Connection which is initiated by the UE after the page message is received. T-Mobile USA, INC. Confidential Rev. 0.6 December 5, 2007 70 of 214 Ошибка! Используйте вкладку "Главная" для применения Title к тексту, который должен здесь отображаться. Another use of the Paging Type 1 message is when the UE has an RRC connection but no radio resources are allocated to it. In this case the UE is either in Cell_PCH or URA_PCH mode. As indicated by the name of these RRC states, the UE’s position is known to the serving RNC at cell and URA levels respectively and the UE is monitoring the paging channel based on certain criteria that can be set differently from the idle mode criteria for monitoring paging channels. Figure 14 - Signaling for Paging Type 1 7.1.2. Paging Type 2 For a UE that is already in the RRC Connected mode and has dedicated (Cell-DCH) or common channels (Cell_FACH) assigned to it, the paging procedure uses the RRC PAGING TYPE 2 message. This is especially useful in a scenario where the other CN domain that does not already have an active connection with the UE wants to establish a new signaling connection. PAGING TYPE 2 is sometimes referred to as “Dedicated Paging”. From the radio access point of view this is just like any other signaling message carried on dedicated channels. Figure 15 – Signaling for Paging Type 2 Note that the RANAP PAGING message is similar in both cases. It is the RNC that decides to initiate the correct paging type based on UE-id and the current state of the paged UE. The UE’s response to these paging messages also depends on the current RRC state of the UE. In RRC Idle mode, the UE sends an RRC Connection Request message with establishment cause set to “paging response”. In RRC connected mode the paging can trigger the UE to change RRC state from Cell_PCH or URA_PCH to Cell_FACH by doing a Cell Update procedure, with cause value set to “paging response”. Alternatively the UE will directly send a Paging Response if it is already in Cell_DCH/FACH mode. An autonomous T-Mobile USA, INC. Confidential Rev. 0.6 December 5, 2007 71 of 214 Ошибка! Используйте вкладку "Главная" для применения Title к тексту, который должен здесь отображаться. Paging Type 1 message can be initiated from the RNC when new downlink data or signaling messages need to be sent to the UE. This causes the UE to transition to Cell_FACH and subsequently do a Cell Update. Figure 16 - State Changes due to Paging 7.2. Paging Channels The paging message is carried in the downlink on the Logical channel Paging Control Channel (PCCH). The logical channel is mapped to the transport channel Paging Channel (PCH) at the MAC layer. This channel in turn is coded and carried over the air using the Secondary Common Control Physical Channel (S-CCPCH). A paging message type 2 is associated with the Dedicated Control Channel DCCH, which may be mapped to FACH or DCH transport channels. A cell may be configured with more than one S-CCPCH depending for example on the cell load and the expected paging volume. The S-CCPCH spreading factor (SF) may be chosen from any valid SF from 4 to 256. Figure 17 - Logical, Transport, and Physical Channels Associated with Paging 7.2.1. Paging Indication Channel The Paging Indicator Channel (PICH) has fixed spreading factor of 256 and carries the Paging Indicator. The paging indicator indicates the presence of a page message on the PCH for the UEs using Paging Indicator (PI) bits. Each PICH is associated with a S-CCPCH which carries the transport channel PCH (see Figure 17). Of the 300 available bits in a 10ms PICH frame, 288 are used to carry paging indicators, while the remaining 12 bits are not used. Each PICH frame can carry Np paging indicators, where Np = 18, 36, 72 or 144, T-Mobile USA, INC. Confidential Rev. 0.6 December 5, 2007 72 of 214 Ошибка! Используйте вкладку "Главная" для применения Title к тексту, который должен здесь отображаться. corresponding to 16, 8, 4 or 2 bits per Paging Indicator. The PICH frame timing is fixed in relation to the associated S-CCPCH. The PICH transmission power is given in relation to the CPICH power level and depends on the number of PIs configured in PICH. For higher Np values, more power is needed on the PICH. This follows from the fact that for higher Np values there will be fewer bits for each PI. In order to maintain an acceptable bit error probability, more power per bit will be required. The PICH power offset is broadcasted in SIB 5/6. On the other hand, a higher Np value can decrease the probability of false paging indications. A false paging indication occurs when a UE sees positive paging indication on PICH but does not see a paging message on S-CCPCH for itself (IMSI/TMSI or RNTI). In Ericsson implementation, the value of Np is hard coded to 18. Figure 18 – PICH and PCH Frame Synchronization 7.3. DRX Procedure A UE in idle mode (or RRC Cell_PCH/URA_PCH) has to continuously monitor PCH so that it will not miss any incoming calls or RRC messages. This can be very demanding on the UE’s battery power consumption. For this reason, discontinuous reception (DRX) mechanism is used in UMTS as in many other wireless systems. The PICH is used to indicate to the UE when it should read the S-CCPCH which carries the true paging message. If a UE that is monitoring the PICH does not see an indication that it is paged, it will ignore the following S-CCPCH. If the UE does see an indication then it will decode the S-CCPCH which occurs 2ms after the PICH frame. This may be a false indication as described above. In that case the S-CCPCH will carry a paging message for another UE that happens to share the same PI. Although the PICH carries a simple “yes-no” message, listening to PICH on every frame is not a very effective power saving feature. Further enhancement to power saving can be achieved if the UE only wakes up and listens to certain PICH frames. This frequency of wake-up is called the Paging Occasion (PO) and is determined by important DRX cycle length parameter. Each UE will calculate a PO which simply corresponds to the frame number that the UE must read the PICH on. The PO is a function of the IMSI, the DRX cycle length, and the number of S-CCPCH in the cell and the System Frame Number (SFN). In Ericsson’s current implementation, only 1 SCCPCH can be configured per cell. Hence the paging occasions for a specific UE are calculated as (IMSI mod DRX cycle length) + n * DRX cycle length where n = 0, 1, 2 … T-Mobile USA, INC. Confidential Rev. 0.6 December 5, 2007 73 of 214 Ошибка! Используйте вкладку "Главная" для применения Title к тексту, который должен здесь отображаться. Using the Np value and the IMSI, the UE can also calculate its own Paging Indicator to know where in the PICH to look for paging indicators. The paging indicator for a particular UE can be calculated based on its IMSI as PI = (IMSI div 8192) mod Np Figure 19 - Paging Occasions The DRX cycle length is defined by Equation 5, where k is the DRX cycle coefficient and ranges from 3 to 9. The possible DRX values are then from 80ms to a little more than 5 seconds of sleeping time. If this value is set too low, the UE is more active in monitoring the PICH, thus decreasing the UE stand-by time. On the other hand, large values of this parameter will increase mobile-terminating call set-up times, since the UE will take longer periods of time to read the PICH. The DRX Cycle Length value can be set separately for each Core Network domain type. If a UE is connected to both the PS and CS Core networks simultaneously, then the shorter of the two values will always be used by the UE. For UEs in connected mode (URA_PCH and Cell_PCH) a separate k value is defined as in the table below. It is generally considered beneficial to decrease the DRX cycle length for connected mode UEs since transitions to Cell_FACH need to occur faster in comparison to those between idle mode and connected mode. DRX_CYCLE_ LENGTH 2 k 10 msec Equation 5 - DRX Cycle Length A useful rule-of-thumb used by Ericsson when dealing with the DRX_Cycle_Length parameter, is the fact that an increase in the DRX_Cycle_Length will generally increase the call set-up time by half of the increased amount. For example, changing the value from 640 ms to 1280 ms (k is changed from 6 to 7) will increase the call set-up time by (1280-640) ms/2 = 320 ms on average. T-Mobile USA, INC. Confidential Rev. 0.6 December 5, 2007 74 of 214 Ошибка! Используйте вкладку "Главная" для применения Title к тексту, который должен здесь отображаться. 7.4. Paging Repetition Paging repetition in Ericsson UTRAN depends on the UE state and on where the page was originated. A page that is initiated by the CN is repeated by the UTRAN “noOfPagingRecordTransm” subsequent times, irrespective of the response to the first paging attempt. A UTRAN originated page for a UE in URA_PCH state is time supervised. An RNC timer is started when a page is sent and stopped when the UE answers. If the timer expires the paging is repeated once. On a second expiry of this timer, the PS connection of the UE is released. The RNC timer is hard coded to a value of (10 ms * 2k * noOfPagingRecordTransm) + 1000 ms, where k = utranDrxCycleLength. When the UTRAN has to inform a UE about updates to system information, it sends a number of consecutive Paging Type 1 messages to the UE using the maximum possible DRX cycle length to ensure that the UE receives this at least once. The number of times a page indicating updates to the same system information is sent to the UE is set with a configurable RNC parameter “noOfMaxDrxCycles”. 7.5. Ericsson Specific Parameter and Counters for Paging 7.5.1. Ericsson Paging Control Parameters The following list contains the configurable parameters related to Random Paging. Parameter Name Object Name Recommended Value noOfPagingRecordTransm RNC 2 cnDrxCycleLengthCs RNC 640 ms cnDrxCycleLengthPs RNC 1280 ms utranDrxCycleLength noOfMaxDrxCycles RNC RNC 320 ms 1 Table 5 – Ericsson Specific Paging Parameters 7.5.2. Ericsson Paging Counters Figure 19 illustrates the counters associated with the Ericsson Paging Process. These counters include, but are not limited to the following: pmNoPagingAttemptCnInitDcch pmCnInitPagingToIdleLa pmNoPageDiscardCmpLoadC pmCnInitPagingToIdleRa pmCnInitPagingToIdleUe T-Mobile USA, INC. Confidential Rev. 0.6 December 5, 2007 75 of 214 Ошибка! Используйте вкладку "Главная" для применения Title к тексту, который должен здесь отображаться. pmNoPagingAttemptUtranRejected pmCnInitPagingToUraUe pmUtranInitPagingToUraUe pmNoPagingType1Attempt pmNoPagingType1AttemptPS pmNoPagingType1AttemptCS T-Mobile USA, INC. Confidential Rev. 0.6 December 5, 2007 76 of 214 Ошибка! Используйте вкладку "Главная" для применения Title к тексту, который должен здесь отображаться. Figure 20 Flowchart for Ericsson Counters, Paging T-Mobile USA, INC. Confidential Rev. 0.6 December 5, 2007 77 of 214 Ошибка! Используйте вкладку "Главная" для применения Title к тексту, который должен здесь отображаться. 8. Soft/Softer Handover Feature Soft/Softer Handover implies that a UE is connected to more than one WCDMA BTS at the same time. For a UE moving from the coverage area of one WCDMA cell to another, Soft/Softer handover allows the UE to start communicating with the new cell before it stops communicating with the old cell. In Soft Handover, the UE is connected to at least 2 cells belonging to different Node B’s, and the uplink signals from the different cells are combined in the RNC. When the UE is connected to at least 2 cells belonging to the same Node B, the handover is called Softer Handover, and in this case, the uplink signals from the different cells are combined in the Node B. The following are the advantages of Soft/Softer handover. Seamless Handover without disconnection of the radio access bearer. Fast closed loop power control is possible since the UE is always linked to the strongest cell. Sufficient reception level for communication at cell edge by combining reception signals from different cells. The macro diversity gain achieved by combining reception signals improves the uplink signal quality and decreases the required transmission power of the UE, reducing uplink interference and increasing system capacity. Despite the above advantages of Soft/Softer Handover, there is a trade-off between soft handover and system capacity. A UE involved in Soft/Softer Handover uses several radio links, more DL channelization codes, more DL power and more channel elements than a single link connection. However, as long as the number of radio links involved in Soft Handover is optimized, the capacity advantage offered due to Soft Handover from interference reduction is larger and hence system capacity is actually improved. 8.1. Soft/Softer Handover Procedure and Parameters The Soft/Softer handover Algorithm can be split into the following 3 parts. Algorithm for handling cell sets, subsets and Lists to determine the subset of cells to be measured on by the UE based on the cells present in the active set and their configured neighboring cells. This has been detailed in the previous 2 sections. Soft/Softer Handover Evaluation for determining which cells should be proposed to be added, removed, or replaced in the Active Set. The algorithm bases its decision on quality measures of the P-CPICH done in the UE. An evaluation that results in a revised Active Set proposes it to the execution part of Soft/Softer handover. Soft/Softer Handover Execution covers the actual addition and/or removal of radio links proposed by the Soft/Softer Handover Evaluation algorithm. Soft/Softer Handover evaluation is enabled for a UE entering the CELL_DCH state. Soft/Softer Handover evaluation is performed based on the UE’s intra frequency measurement report. Before the first MEASUREMENT CONTROL message has been sent from the RNC, any MEASUREMENT REPORT message received from the UE is evaluated based on intra-frequency measurement reporting criteria broadcasted by system information (SIB11/SIB12). T-Mobile USA, INC. Confidential Rev. 0.6 December 5, 2007 78 of 214 Ошибка! Используйте вкладку "Главная" для применения Title к тексту, который должен здесь отображаться. Soft/Softer Handover is controlled by the events 1a, 1b, 1c and 1d. The following is the description of these four events. Event 1a: A new candidate for the active set enters the reporting range. Event 1b: A cell in the active set leaves the reporting range. Event 1c: A cell not in the active set becomes stronger than a cell in the active set when the active set is at its maximum size. Event 1d: Any cell becomes better than the best cell in the active set. When a UE enters CELL_DCH state, intra frequency measurements are set up by sending a MEASUREMENT CONTROL message with IE MEASUREMENT REPORT MODE set to “setup” for event 1a, 1b, 1c and 1d. This first MEASUREMENT CONTROL message is used to setup the UE reporting mode as well as send the very first Intra-frequency Monitored Subset. After an Active Set update, a MEASUREMENT CONTROL message with IE “MEASUREMENT REPORT MODE” set to “modify” for event 1a, 1b, 1c and 1d is sent to the UE, telling it which cells will be added to and deleted from the Monitored Subset. The measurement criteria don’t change during a connection lifetime. The UE is configured to check event criteria for the different events as follows: Event 1a: IAF Monitored Subset and Detected set cells. Event 1b: Active set cells Event 1c: Any cell that is not included in the active set. Event 1d: Any cell that is not the best cell. In addition to the 3GPP cell sets, Ericsson 3G network uses the following additional classification. Valid Cell: A cell that is part of the Active Set, Monitored set or the Unmonitored set, so that the SRNC is able to translate information about reported P-CPICH scrambling code to a configured cell by using the configured neighbor cell lists. Invalid Cell: A cell that is not part of the Active Set, Monitored set or the Unmonitored set, so the SRNC does not have information for P-CPICH scrambling code translation to a configured neighboring cell. The UE is configured to base event evaluation as per the setting of the parameter measQuantity1. The measured values are filtered by the UE before comparing the resulting values with the event report criteria. Recommended Value: The recommended value for measQuantity1 is CPICH_EC_NO. This configures the UE to base event evaluation on CPICH Ec/No. A MEASUREMENT REPORT sent by the UE for event 1a, 1b, 1c and 1d contains the following messages: Quality of cells in the active set. List of cells that fulfill the event criteria. Quality of cells that fulfill the event criteria. Synchronization information for the cells that fulfill the event criteria. T-Mobile USA, INC. Confidential Rev. 0.6 December 5, 2007 79 of 214 Ошибка! Используйте вкладку "Главная" для применения Title к тексту, который должен здесь отображаться. 8.1.1. Event 1a Evaluation Reporting event 1a is used to add cells into the active set. The UE sends event 1a triggered measurement report when a cell enters the reporting range defined by the following formula for at least a time equal to timeToTrigger1a. NA 10 LogM individualoffset w1a 10 Log M (1 w1a) 10 LogM (reportingRange1a hystere New New best i 1 i The following are the definitions of the parameters used. MNew: measurement result of the cell entering the reporting range individualoffsetNew: offset of the neighbor cell entering the reporting range. w1a: weighting factor for event 1a. Mi: measurement result of a cell in the active set. NA: number of cells in the current active set. Mbest: measurement result of the strongest cell in the active set. reportingRange1a: relative threshold referenced to the CPICH of the best cell in the active set. hysteresis1a: Hysteresis used in event evaluation for event 1a to avoid ping pong effects. timeToTrigger1a: Minimum time during which a candidate cell should stay within reporting range of event 1a before the UE can send event 1a triggered measurement report to the RNC. filterCoefficient1: The measured values are filtered by the UE using the filter coefficient value before comparing with event criteria. Since the parameter measQuantity1 is recommended to be set to CPICH_EC_NO, the measurement result in the above equation refers to the CPICH Ec/No of the relevant cell. Recommended Value: The recommended value for w1a is 0 for network launch, so that the event evaluation is only done with respect to the best cell in the active set. Refer to the Appendix A for more information on the weighting factor. The recommended value for parameter individualoffset is 0 for initial network launch. These parameters should be reevaluated based on network statistics and changed to a non-zero value only as needed for specific scenarios. When an event 1a triggered MEASUREMENT REPORT is received, the Soft/Softer Handover Evaluation Algorithm at the RNC processes the report and evaluates if the proposed candidate can be added to the Active set. Only the best cell that fulfilled the reporting criteria is retained, and all other cells from the MEASUREMENT REPORT are discarded. If the retained cell already belongs to the Active set, the RNC updates the Active Set with the Ec/No value from the measurement report and the evaluation process terminates with no other actions. If the retained cell is not in the active set, the following 3 scenarios are possible based on the validity of the retained cell. Invalid Retained Cell: If the retained cell is invalid and the quality measure (Ec/No) of this invalid cell is not included in the MEASUREMENT REPORT, then the Soft Handover evaluation process is terminated. If the retained cell is an invalid cell and its quality measure T-Mobile USA, INC. Confidential Rev. 0.6 December 5, 2007 80 of 214 Ошибка! Используйте вкладку "Главная" для применения Title к тексту, который должен здесь отображаться. exceeds the quality measure of the best cell in the Active set by an amount defined by the parameter releaseConnoffset, then the connection is terminated. The reason for terminating this connection is to avoid UL interference caused by the UE entering a new cell area without being power controlled by that cell. If the retained cell is invalid, but the quality measure of the cell doesn’t exceed the quality measure of the best cell in the Active set by the amount of releaseConnoffset, then the Soft handover Evaluation procedure updates the ordered Active Set List with the quality measure reported in the received measurement report, and the evaluation process terminates with no other action. Valid retained Cell missing synchronization information: If the retained cell is a valid cell but is missing synchronization information, the Soft handover procedure can’t be executed, since the synchronization information is necessary to perform soft handover. Hence the Soft Handover Evaluation Procedure updates the quality measures in the ordered Active Set List with the values received in the Measurement report, and the evaluation process terminates with no other actions. Valid retained Cell with synchronization information: If the retained cell is valid with synchronization information available, and the number of cells in the current active set is less than the amount defined by the parameter maxActiveSet, the Soft handover Evaluation Algorithm creates a new Active Set by adding the retained cell to the Active set. If the retained cell is valid with synchronization information available, but the number of cells in the current active set is equal to the maximum possible valued defined by the parameter maxActiveSet, and the quality of the retained cell is better than that of the worst cell in the Active set, the Soft Handover Evaluation Algorithm creates a new Active set by replacing the worst cell in the previous Active set with the retained cell. Recommended Value: The recommended value for the parameter maxActiveSet is 3. This would limit the number of soft handover links, thus optimizing network capacity. 8.1.2. Event 1b Evaluation Reporting event 1b is used to delete cells from the Active set. The UE sends event 1b triggered measurement report when a cell leaves the reporting range defined by the following formula for at least a time equal to timeToTrigger1b. NA w1b 10 Log M (1 w1b) 10 LogM (reportingRange1b hysteresis Old Old best i 1 i The following are the definitions of the parameters used. 10 LogM individualoffset MOld: measurement result of the cell leaving the reporting range individualoffsetOld: offset of the neighbor cell leaving the reporting range. w1b: weighting factor for event 1b. Mi: measurement result of a cell in the active set. NA: number of cells in the current active set. Mbest: measurement result of the strongest cell in the active set. reportingRange1b: relative threshold referenced to the CPICH of the best cell in the active set. T-Mobile USA, INC. Confidential Rev. 0.6 December 5, 2007 81 of 214 Ошибка! Используйте вкладку "Главная" для применения Title к тексту, который должен здесь отображаться. hysteresis1b: Hysteresis used in event evaluation for event 1b to avoid ping pong effects. timeToTrigger1b: Minimum time during which a candidate cell should stay within reporting range of event 1b before the UE can send event 1b triggered measurement report to the RNC. filterCoefficient1: The measured values are filtered by the UE using the filter coefficient value before comparing with event criteria. Since the parameter measQuantity1 is recommended to be set to CPICH_EC_NO, the measurement result in the above equation refers to the CPICH Ec/No of the relevant cell. Recommended Value: The recommended value for w1a is 0 for network launch, so that the event evaluation is only done with respect to the best cell in the active set. Refer to the Appendix A for more information on the weighting factor. The recommended value for parameter individualoffset is 0 for initial network launch. These parameters should be reevaluated based on network statistics and changed to a non-zero value only as needed for specific scenarios. When an event 1b triggered MEASUREMENT REPORT is received, the Soft Handover Evaluation Algorithm at the RNC processes the report and evaluates if the proposed candidate can be removed from the Active set. If the event 1b triggered MEASUREMENT REPORT includes more than 1 cell, then all the cells fulfilling the reporting criteria are stored in a Remove List. The Soft Handover Evaluation Algorithm retains the first cell in the Remove List and deletes it from the list. If this retained cell is not in the Active set, then the next cell on the Remove List is processed. When the current retained cell is in the Active Set, the Soft handover Evaluation Algorithm creates a new proposed Active set by removing the retained cell from the Active set. The new Active Set is forwarded to the Soft Handover Execution Algorithm. This process is repeated as long as there is at least 1 cell remaining in the Remove List. When the Remove List is empty, the evaluation process terminates for that particular MEASUREMENT REPORT. 8.1.3. Event 1c Evaluation Reporting event 1c is used for replacing cells in the Active Set. A UE sends the event 1c triggered MEASUREMENT REPORT when the number of cells in the Active set is equal to the value defined by parameter maxActiveSet, and a cell that is not included in the Active Set becomes better than a cell in the Active set as defined by the following formula for at least a time equal to timeToTrigger1c. 10 LogM New individualoffset New 10 LogM InAS individualoffset InAS hysteresis1c / 2 The following are the definitions of the parameters used. MNew: measurement result of the cell not included in the Active set. individualoffsetNew: offset of the neighbor cell not included in the Active set. MInAS: measurement result of a cell in the active set with the least measurement value among active set cells. IndividualoffsetInAS: offset of the cell in the Active set. hysteresis1c: Hysteresis used in event evaluation for event 1c to avoid ping pong effects. T-Mobile USA, INC. Confidential Rev. 0.6 December 5, 2007 82 of 214 Ошибка! Используйте вкладку "Главная" для применения Title к тексту, который должен здесь отображаться. timeToTrigger1c: Minimum time during which a candidate cell should stay stronger than a cell in the Active set before the UE can send event 1c triggered measurement report to the RNC. filterCoefficient1: The measured values are filtered by the UE using the filter coefficient value before comparing with event criteria. Since the parameter measQuantity1 is recommended to be set to CPICH_EC_NO, the measurement result in the above equation refers to the CPICH Ec/No of the relevant cell. The evaluation of an event 1c triggered MEASUREMENT REPORT is the same as of an event 1a triggered report. When an event 1a triggered MEASUREMENT REPORT is received, the Soft Handover Evaluation Algorithm at the RNC processes the report and evaluates if the proposed candidate can be added to the Active set. Only the best cell that fulfilled the reporting criteria is retained, and all other cells from the MEASUREMENT REPORT are discarded. If the retained cell already belongs to the Active set, the RNC updates the Active Set with the Ec/No value from the measurement report and the evaluation process terminates with no other actions. If the retained cell is not in the active set, the following 3 scenarios are possible based on the validity of the retained cell. Invalid Retained Cell: If the retained cell is invalid and the quality measure (Ec/No) of this invalid cell is not included in the MEASUREMENT REPORT, then the Soft Handover evaluation process is terminated. If the retained cell is an invalid cell and its quality measure exceeds the quality measure of the best cell in the Active set by an amount defined by the parameter releaseConnoffset, then the connection is terminated. The reason for terminating this connection is to avoid UL interference caused by the UE entering a new cell area without being power controlled by that cell. If the retained cell is invalid, but the quality measure of the cell doesn’t exceed the quality measure of the best cell in the Active set by the amount of releaseConnoffset, then the Soft handover Evaluation procedure updates the ordered Active Set List with the quality measure reported in the received measurement report, and the evaluation process terminates with no other action. Valid retained Cell missing synchronization information: If the retained cell is a valid cell but is missing synchronization information, the Soft handover procedure can’t be executed, since the synchronization information is necessary to perform soft handover. Hence the Soft Handover Evaluation Procedure updates the quality measures in the ordered Active Set List with the values received in the Measurement report, and the evaluation process terminates with no other actions. Valid retained Cell with synchronization information: If the retained cell is valid with synchronization information available, but the number of cells in the current active set is equal to the maximum possible valued defined by the parameter maxActiveSet, and the quality of the retained cell is better than that of the worst cell in the Active set, the Soft Handover Evaluation Algorithm creates a new Active set by replacing the worst cell in the previous Active set with the retained cell. 8.1.4. Event 1d Evaluation Reporting event 1d is used to change the best cell in an Active set. A UE send the event 1d triggered MEASUREMENT REPORT when a cell in the Active set, Monitored set or Detected set becomes stronger than the best cell in the Active set as defined by the following formula for at least a time equal to timeToTrigger1d. T-Mobile USA, INC. Confidential Rev. 0.6 December 5, 2007 83 of 214 Ошибка! Используйте вкладку "Главная" для применения Title к тексту, который должен здесь отображаться. 10 LogM NotBest 10 LogM Best hysteresis1d / 2 The following are the definitions of the parameters used MNotBest: measurement result of a cell that is currently not the best cell. MBest: measurement result of the best cell in the active set. hysteresis1d: Hysteresis used in event evaluation for event 1d to avoid ping pong effects. timeToTrigger1d: Minimum time during which a candidate cell should stay stronger than the best cell in the Active set before the UE can send event 1d triggered measurement report to the RNC. filterCoefficient1: The measured values are filtered by the UE using the filter coefficient value before comparing with event criteria. Since the parameter measQuantity1 is recommended to be set to CPICH_EC_NO, the measurement result in the above equation refers to the CPICH Ec/No of the relevant cell. When an event 1d triggered MEASUREMENT REPORT is received, the Soft Handover Evaluation Algorithm at the RNC processes the report and evaluates if the proposed candidate can be added to the Active set. If the retained cell already belongs to the Active set, the RNC updates the Active Set with the Ec/No value from the measurement report and the evaluation process terminates with no other actions. If the retained cell is not in the active set, the following 3 scenarios are possible based on the validity of the retained cell. Invalid Retained Cell: If the retained cell is invalid then the Soft Handover evaluation process is terminated with no other actions. Valid retained Cell missing synchronization information: If the retained cell is a valid cell but is missing synchronization information, the Soft handover procedure can’t be executed, since the synchronization information is necessary to perform soft handover. Hence the Soft Handover Evaluation Procedure updates the quality measures in the ordered Active Set List with the values received in the Measurement report, and the evaluation process terminates with no other actions. Valid retained Cell with synchronization information: If the retained cell is valid with synchronization information available, and the number of cells in the current active set is less than the amount defined by the parameter maxActiveSet, the Soft handover Evaluation Algorithm creates a new Active Set by adding the retained cell to the Active set. If the retained cell is valid with synchronization information available, but the number of cells in the current active set is equal to the maximum possible valued defined by the parameter maxActiveSet, then the Soft Handover Evaluation Algorithm creates a new Active set by replacing the worst cell in the previous Active set with the retained cell. In most cases event 1d is triggered when a cell already in the active set becomes stronger than the best cell. Hence these reports will not lead to a proposed Active Set. The ordered Active Set List is updated with the Ec/No values reported in the Measurements section of the received report and the evaluation process terminates with no other actions. T-Mobile USA, INC. Confidential Rev. 0.6 December 5, 2007 84 of 214 Ошибка! Используйте вкладку "Главная" для применения Title к тексту, который должен здесь отображаться. 8.1.5. Event Triggered Periodical Measurement Reporting When a cell enters the reporting range and triggers event 1a or 1c, the UE transmits a measurement report to the RNC in order to update the Active Set. The RNC maybe unable to add the reported cell to the Active set due to various reasons, one of which is capacity shortage on the target cell. If the UE doesn’t receive an Active Set Update message from the RNC, it continues the measurement reporting by changing to periodical reporting mode. During periodical reporting, the UE transmits measurement reports to the RNC at predefined intervals. If an event 1a triggered measurement report doesn’t result in an Active Set Update message received, the UE transmits the same event every interval defined by the parameter reportingInterval1a. If an event 1c triggered measurement report didn’t result in an Active Set Update message, then the UE transmits this event every interval defined by the parameter reportingInterval1c. The event triggered periodic reporting is applicable only for valid retained cells that weren’t added to the Active set. An invalid cell will not be considered by the RNC to be part of the Active set to begin with. Event-triggered periodic measurement reporting is terminated either when there are no more monitored cells within the reporting range or when the RNC has updated the active set so that it includes the optimal cells 8.1.6. Buffering and Queuing There are 3 buffers for event 1x measurement reports. There is 1 combined buffer for event 1a and event 1c, a separate buffer for event 1b and another for event 1d. The 1a/1c reporting buffer is used to hold reports triggered on event 1a and event 1c, and also the event triggered periodic reports based on these events. This buffer holds only the last received report, so a new received report overwrites a report already in the buffer. The 1b reporting buffer is used to hold reports triggered on event 1b, and the 1d reporting buffer is used to hold reports triggered on event 1d. These 2 buffers can hold up to 10 reports each. The reports in these 2 buffers are queued in order of arrival with the oldest report first and the newest report last in the queue. If the 1b or 1d reporting buffer is full when a new event 1b or event 1d report is received, an indication is forwarded to Soft Handover Execution Algorithm to release the connection. When the Soft Handover Evaluation Algorithm is ready to process a new report, the buffers are searched in the following order – 1d reporting buffer, then the 1a/1c reporting buffer followed by the 1b reporting buffer. A report is removed from the buffer when its processing begins. 8.1.7. Soft/Softer Handover Execution Once a proposed new Active Set is created by the Soft/Softer Handover Evaluation Algorithm, Soft/Softer Handover Execution is started and the result of this is one of the following. Radio Link Addition Radio Link Removal Radio Link Replacement T-Mobile USA, INC. Confidential Rev. 0.6 December 5, 2007 85 of 214 Ошибка! Используйте вкладку "Главная" для применения Title к тексту, который должен здесь отображаться. Proposed Active set Rejection RRC Connection Release The Active set always includes at least 1 radio link and hence the Soft Handover Algorithm would never remove the last existing radio link from the Active set. There is no information loss or interruption of data flow during a Soft handover procedure. Soft Handover Algorithm interacts with the Capacity Management Algorithm to request admission before adding radio links and also informs the Capacity Management Algorithm about successful changes to the Active set. 8.1.8. Soft/Soft Handover Signaling The Soft/Softer Handover Signaling for the following processes is covered below. Radio Link Addition Radio Link Deletion Radio Link Replacement Radio Link Addition Radio link addition is normally triggered by event 1a, event 1c or event 1d reports from the UE. During execution of addition, the Admission Control algorithm in the SRNC is asked if the new RL setup can be allowed in the cell. After access has been granted, the Code Control algorithms in the SRNC allocate DL channelization code, and the Power Control algorithms in the SRNC set the initial DL transmission power, UL SIR Target, and DL power range. The SRNC then contacts the Node B, which allocates resources, starts reception, and tries to synchronize the UE on the uplink. The SRNC sends the Active Set UPDATE message to the UE, which allocates reception resources, synchronizes to the new radio link on the downlink. The UE responds with an Active Set UPDATE COMPLETE message. Other Evaluation algorithms and interacting functions are informed about the new Active Set. In case of Inter-RNC Radio Link Addition, the SRNC establishes signaling connections to the DRNC over the Iur interface. Once the Iur connection exits, Node B resources are demanded by the SRNC and if resources are available, the new radio link is setup. Radio Link Removal Radio Link removal is triggered by the reception of an event 1b report from the UE. The Soft/Softer Handover Evaluation algorithm sends an Active Set proposal to the Execution part in the SRNC to remove the reported cells from the Active Set of the UE. During execution of the removal, the SRNC sends an Active Set UPDATE message to the UE, which releases the resources for that radio link and responds with an Active Set UPDATE COMPLETE message. Other Evaluation algorithms and interacting functions are informed about the new Active Set. In case of Inter-RNC Radio Link Removal, the DRNC stays involved in the connection provided that at least one radio link uses an RBS belonging to the DRNC. If not, the Iur connection will be released. T-Mobile USA, INC. Confidential Rev. 0.6 December 5, 2007 86 of 214 Ошибка! Используйте вкладку "Главная" для применения Title к тексту, который должен здесь отображаться. Radio Link Replacement Combined radio link addition and removal replaces one radio link with another in the Active Set. Radio link replacement is normally triggered by an event 1c report or an event 1d report from the UE. The new Node B is contacted by the SRNC. The new Node B allocates resources, starts reception, and tries to synchronize the UE on the uplink. During replacement execution, power is determined for the radio link to be added. The SRNC sends an Active Set UPDATE message to the UE indicating which radio link to add and which radio link to remove. The UE allocates resources for the new radio link and releases corresponding resources for the old radio link. The UE responds with an ACTIVE SET UPDATE COMPLETE message. Node B and SRNC resources are then released for the removed radio link, and Evaluation algorithms and interacting functions are informed about the new Active Set. The RRC messages between the UE and the RNC for the Radio Link Addition and removal procedures are shown in the following figure. T-Mobile USA, INC. Confidential Rev. 0.6 December 5, 2007 87 of 214 Ошибка! Используйте вкладку "Главная" для применения Title к тексту, который должен здесь отображаться. If a Radio Link Addition is denied by the Admission Control Algorithm, then the UE will normally repeat the 1a or 1c event reports. Capacity Management might perform best-effort cleanup actions in the target cell and downgrade actions for the current connection, so that the repeated RL add requests might be admitted. RRC Connection Release The current RRC connection can be released due to any of the following reasons. A Detected Set report is received where the invalid cell is more than releaseConnOffset stronger than the strongest cell in the active set. A failed RL add/replace attempt, where the proposed cell is more than releaseConnOffset stronger than the strongest cell in the active set. A Measurement Control message failure for a 1x event. An Active set update failure, in which the UE does not respond to the Active Set UPDATE message and the timer <RRC> T-ASU expires. The timer <RRC> T-ASU is started when an Active Set UPDATE message is sent and stopped when the Active Set UPDATE COMPLETE or Active Set UPDATE FAILURE is received and is a hard-coded value set to 5 s. 8.1.9. ReleaseConnOffset setting The vendor recommended value for this parameter is set at 12 dB, which would imply that the a call is released only when a cell that is 12 dB stronger than the best cell in the Active set is not being added to the Active set. This value would make the dropped calls due to this feature less likely. This is the recommended value for network launch. A value smaller than 12 dB can be used during optimization to find problems related to missing neighbors which would result in drop calls. The parameter should be put back to 12 dB after optimization to ensure that the drop call rate is not affected. 8.2. Recommended Values for Soft/Softer handover parameters As before, the intent of the soft handover guidelines here is not to provide parameter recommendations, but to offer methods to analyze the change of certain specific soft handover parameters on overall network performance. The parameter values provided here are vendor recommended values, and will be updated as and when more information is available. All Ericsson 3G parameters related to Soft/Softer handover are listed here. Parameter Name Object Name Recommended Value filterCoefficient1 UeMeasControl 2 hysteresis1a UeMeasControl 0 hysteresis1b UeMeasControl 0 hysteresis1c UeMeasControl 1 dB hysteresis1d UeMeasControl 7.5 dB individualOffset ExternalUtranCell 0 individualOffset UtranCell 0 T-Mobile USA, INC. Confidential Rev. 0.6 December 5, 2007 88 of 214 Ошибка! Используйте вкладку "Главная" для применения Title к тексту, который должен здесь отображаться. maxActiveSet Handover 3 measQuantity1 UeMeasControl CPICH_EC_NO releaseConnOffset Handover 12 dB reportingInterval1a UeMeasControl 1s reportingInterval1c UeMeasControl 1s reportingRange1a UeMeasControl 3 dB reportingRange1b UeMeasControl 5 dB timeToTrigger1a UeMeasControl 320 ms timeToTrigger1b UeMeasControl 640 ms timeToTrigger1c UeMeasControl 320 ms timeToTrigger1d UeMeasControl 2560 ms T-ASU Hardcoded 5s w1a UeMeasControl 0 w1b UeMeasControl 0 T-Mobile USA, INC. Confidential Rev. 0.6 December 5, 2007 89 of 214 Ошибка! Используйте вкладку "Главная" для применения Title к тексту, который должен здесь отображаться. 9. Compressed Mode Operation Compressed mode is a physical layer function that allows the UE to temporarily tune to another frequency, and measure the RF environment of another UMTS frequency (e.g. IFHO) or another technology (e.g. IRAT), while maintaining an existing dedicated channel. Unlike TDMA type air interfaces, the WCDMA physical frame does not contain any idle or unused slots to make measurements on other frequencies. This is not an issue if a UE has a dual Transceiver, which would allow the second receivers to make measurements while the first receiver is processing the 10 millisecond frames. However, most UEs do not contain dual transceivers (at this time), thus requiring an alternate means for a single transceiver UE to make measurements on other frequencies In the case of Ericsson, compressed mode may take one of two forms depending on the radio bearer combination at the measurements on other frequencies are taken. If the radio bearer contains any delay sensitive services (e.g. circuit switched voice), then SF/2 is utilized. If it is not critical to delay the data flow (e.g. interactive or background packet switched data) then Higher Layered Scheduling (HLS) is used. 9.1. Halving the Spreading factor (SF/2) Method If SF/2 is required, the spreading factor (or OVSF) is reduced to half of its typical value. For example, a radio bearer containing an AMR 12.2k utilizes a 128 OVSF code. When compressed mode is enabled, the spreading factor will be reduced to a 64 bit OVSF. This allows a transmission gap of up to seven slots (of the fifteen slots per frame) to be available for measurements on other frequency. However this 50% reduction in the spreading factor has many side effects. To maintain the appropriate Bit Error Rate (BER), and counter the reduced processing gain, the power of the compressed frame will have to be increased by approximately 3 dB. This is illustrated in the following figure of a compressed mode transmission from 3GPP TS 25.212. In addition to downlink power utilization, compressed mode will also affect capacity by consuming more codes in the downlink, increasing channel element usage, and increasing uplink noise rise due to increased UE transmit power. Because of these side effects, care must be taken to ensure that UEs do not unnecessarily trigger compressed mode. In addition, the time spent in compressed mode should be minimized. One frame (10 ms) T-Mobile USA, INC. Confidential Transmission gap available for inter-frequency measurements Rev. 0.6 December 5, 2007 90 of 214 Ошибка! Используйте вкладку "Главная" для применения Title к тексту, который должен здесь отображаться. 9.2. Higher Layered Scheduling (HLS) Method: In the case of HLS, the transmission gap is generated by simply reducing the user throughput in the higher layers. This is achieved in Layer 2 where the MAC utilizes a subset of the available transport format combinations (TFC) within the transport format combination set (TFCS). For example, the transport block set size for a PS 64 kbps transport channel may contain 0, 1, 2, 3 or 4 transport blocks of 336 bits within every 20 ms transport time interval (TTI). By only utilizing 0, 1, or 2 transport blocks every TTI, a transmission gap of up to 7 slots can be generated, while maintaining a maximum throughput of 50% of the original transport channel. Unlike the SF/2 method, HLS does not require additional power, code usage, channel element usage, or UE transmit power to achieve compressed mode operation. 9.3. Compressed Mode Pattern When the UE reports that event 2d or 6d has occurred, the RNC sends a Physical Channel Reconfiguration Message to the UE which contains the Compressed Mode parameters. These parameters include the following (which are illustrated below in the figure from 3GPP TS 25.215): TGPSI (Transmission Gap Pattern Sequence Indicator): This defines a unique transmission gap pattern sequence. Multiple transmission gap pattern sequence may be configured in a single Physical Reconfiguration Message; TGPRC (Transmission Gap Pattern Repetition Count): This is the number of repeated transmission gap patterns within the transmission gap pattern sequence; TGSN (Transmission Gap Starting Slot Number): This is the slot number of the first transmission gap slot within the first radio frame of the transmission gap pattern; TGL1 (Transmission Gap Length 1): This is the number of slots in the first transmission gap; TGL2 (Transmission Gap Length 2): This is the number of slots in the second transmission gap; TGD (Transmission Gap start Distance): This is the number of slots between the first and second transmission gap within a transmission gap pattern; TGPL1 (Transmission Gap Pattern Length): This is the number of frames within a transmission gap pattern. T-Mobile USA, INC. Confidential Rev. 0.6 December 5, 2007 91 of 214 Ошибка! Используйте вкладку "Главная" для применения Title к тексту, который должен здесь отображаться. #1 #2 #3 #4 #5 #TGPRC TG pattern 1 TG pattern 1 TG pattern 1 TG pattern 1 TG pattern 1 TG pattern 1 TG pattern 1 Transmission Transmission gap 1 gap 2 TGL1 TGL2 TGSN TGD TGPL1 9.4. Limitations on number of mobiles in Compressed Mode To minimize the impact of compressed mode on coverage, capacity and call quality, it is possible to limit the number of UEs in compressed mode on a cell basis using the UtranCell parameter compModeAdm. It is recommended to keep the value of this parameter equal to the vendor default value of 15. In case the number of UEs in compressed mode for a cell reaches this number, Admission control blocks a new radio link in being setup for this cell. This is the only configurable parameter with regard to Compressed Mode for Ericsson 3G RAN. The actual implementation of the Compressed Mode implementation is hard coded in the Ericsson 3G RAN. Power control parameters related to Compressed Mode will be dealt with in the Power Control section of this document. T-Mobile USA, INC. Confidential Rev. 0.6 December 5, 2007 92 of 214 Ошибка! Используйте вкладку "Главная" для применения Title к тексту, который должен здесь отображаться. 10. 3G to 2G Handover and Cell Change Procedure and Parameters This section details the 3G to 2G handover algorithm and the relevant parameters for Ericsson 3G network. 10.1. T-Mobile Strategy for IRAT T-Mobile deployment of UMTS in the U.S. will be carried out in several phases. In order to maintain contiguous coverage to customers, it is important to transition them to the GERAN network at the edge of UMTS coverage, without service disruption. This can be accomplished by configuring 3G to 2G handover in the connected mode and 3G to 2G reselection in the idle mode. The following is the current T-Mobile strategy for IRAT transition: Allow 3G to 2G handover in poor UMTS coverage areas. Allow 3G to 2G cell change in poor UMTS coverage areas. Allow 3G to 2G Reselection in poor UMTS coverage areas. Allow 2G to 3G Reselection even in good GSM coverage as long as UMTS coverage is available. Do not allow 2G to 3G handovers in connected mode. The objectives of the IRAT feature as described here are: Offload the CS traffic on GSM networks by maximizing the use of UMTS networks, where available to carry speech traffic. This will be done through the use of 2G to 3G reselection even in areas of good GSM signal strength, as long as there is UMTS coverage available. Keep UMTS capable UEs on UMTS coverage as long as possible with an acceptable call quality. Move 3G UEs to GSM using handover or reselection while leaving UMTS coverage areas before call quality degradation. 10.2. Feature Activation The IRAT feature in the Ericsson 3G RAN can be activated using the following parameters. C_GsmHoAllowed: IRAT handover is only attempted if this parameter is set to Allowed for the current UeRc state. This is a constant hard coded value and is currently set to Allowed by Ericsson. FddGsmHoSupp: This parameter at the RNC level should be set to TRUE to enable IRAT functionality. hoType: This cell parameter controls if IRAT Handover or Inter-Frequency HO or None shall be evaluated in case both Inter RAT and Inter-Frequency neighboring cells have been configured. The detailed working of this parameter is covered in the following section. defaultHoType: This parameter set per DRNC indicates the hoType for cells in the neighboring RNC. If not datafilled, IRAT handover is preferred. T-Mobile USA, INC. Confidential Rev. 0.6 December 5, 2007 93 of 214 Ошибка! Используйте вкладку "Главная" для применения Title к тексту, который должен здесь отображаться. 10.3. IRAT Interaction with Inter-Frequency Handover For 3G cells that have both GSM and Inter frequency neighbors configured, the cell parameter hoType controls which type of handover is actually carried out. If all cells in the active set have hoType = None, then neither IRAT nor Inter-Frequency Handover is attempted. If at least one cell in the active set has hoType = IF-Preferred, then Inter-Frequency handover is attempted. If at least one cell in the active set has hoType = GSM-Preferred and no cell has hoType = IF-Preferred, then IRAT handover will be attempted. Recommendation: For network launch, when only one WCDMA carrier is available, hoType should be set to GSM-Preferred for all cells in the network. When there is more than one WCDMA carrier available, this parameter would be re-evaluated and this guideline would be updated accordingly. 10.4. 3G to 2G IRAT Handover/Cell Change Procedure When a UE is on a CS call, 3G to 2G IRAT Handover is used to transition the mobile to GSM at the edge of UMTS coverage area allowing service continuation on dedicated channels. When the UE is on a PS call at the edge of the 3G network, IRAT Cell Change procedure is used to transition the mobile to GPRS. The IRAT Cell Change procedure on dedicated channels involves a network initiated cell reselection from UMTS to GSM, after which the UE is responsible to continue the existing PS connection through the GPRS network. One important difference in the Cell Change and IRAT handover procedures is that there are no resources allocated in the target system in the case of the Cell Change procedure. The 3G to 2G Handover procedure for Ericsson RAN can be grouped into the following 4 steps. Connection quality monitoring based on event triggers. Event based GSM measurements reporting. Identification of target GSM cell for Handover/Cell Change. 3G to 2G IRAT Handover/Cell Change execution. 10.4.1. Event based Connection quality monitoring Three connection qualities are monitored and used to trigger IRAT handover process. The downlink is monitored using CPICH RSCP and CPICH Ec/No, and the uplink is monitored using UE TX power. If any of these three monitored connections qualities reach a predefined threshold, indicating poor RF conditions, the IRAT handover process is triggered (i.e. GSM candidate cells will be measured). If RF conditions improve, and all three monitored connection qualities meet predefined thresholds indicating minimum RF conditions are met, the IRAT handover attempt will be aborted. Filtering Concept The measurement values are filtered by the UE before comparison with the event criteria. The filtering is performed as per 3GPP recommendations according to the following formula. T-Mobile USA, INC. Confidential Rev. 0.6 December 5, 2007 94 of 214 Ошибка! Используйте вкладку "Главная" для применения Title к тексту, который должен здесь отображаться. Fn = (1–a) Fn-1 + a Mn where Fn is the updated filtered measurement result Fn-1 is the old filtered measurement result Mn is the latest received measurement result from physical layer measurements a = ½^(k/2), where k is the parameter received in the IE "Filter coefficient", and refers to the filter coefficient parameter available in the Ericsson network for the various features. A high value of this parameter emphasizes an old filtered measurement result (for example, with k = 9, the weight of an old filtered measurement is 96% and the weight of a new measurement is 5%). A low value of this parameter emphasizes a new measurement result (for example, with k = 1, the weight of a new measurement result is 71%). With k = 0, old measurements are not considered. The details of the Ericsson implementation of the filtering period from the filter coefficient are out of the scope of this document. The recommended values in Appendix D for the different filter coefficients related to the IRAT feature are the same as the Ericsson default values and will be changed as required in the future. Weighting Concept A weighting factor is used to include active cells other than the best cell in the evaluation criteria for reporting events. The measured value after weighting will be NA W 10 Log M i (1 W ) 10 LogM Best i 1 where Mi is a measurement result of a cell in the active set NA is the number of cells in the current active set MBest is the measurement result of the cell in the active set with the highest measurement result W is the weighting factor Recommendation: The recommended value for the weighting factors is 0. This would enable the evaluation criteria for the reporting events to be based completely on the best cell’s measurement. Event 2d and 2f for CPICH RSCP and CPICH Ec/No monitoring Events 2d and 2f are typically used to trigger and suspend compressed mode operations, respectively. The Threshold, Hysteresis and Time-to-trigger parameters are delivered to the IRAT capable UE via Measurement Control messages. The Measurement Quantity for the Threshold can be CPICH RSCP, or CPICH Ec/No. If a Measurement Quantity drops below the Event 2d threshold level, for the specified Time to trigger, a Measurement Report indicating Event 2d has occurred will be sent to the RNC. T-Mobile USA, INC. Confidential Rev. 0.6 December 5, 2007 95 of 214 Ошибка! Используйте вкладку "Главная" для применения Title к тексту, который должен здесь отображаться. This will typically result in compressed mode being triggered to enable the UE to measure GSM neighbors. The actual Event 2d threshold is defined by the parameters (usedFreqThresh2dEcno - hysteresis2d/2), for the Measurement Quantity CPICH Ec/No; and (usedFreqThresh2dRscp - hysteresis2d/2), for the Measurement Quantity CPICH RSCP. The time to trigger is defined by the parameters timeToTrigger2dEcno and timeToTrigger2dRscp for Measurement Quantities CPICH Ec/No and CPICH RSCP respectively. If a Measurement Quantity improves and goes above the Event 2f threshold level, for the specified Time-to-trigger, a Measurement Report indicating Event 2f has occurred will be sent to the RNC. This will typically result in compressed mode being suspended, and the measurement of GSM neighbors ending. The actual Event 2f threshold is defined by the parameters (usedFreqThresh2dEcno + usedFreqRelThresh2fEcno + hysteresis2f/2), for the Measurement Quantity CPICH Ec/No; and (usedFreqThresh2dRscp + usedFreqRelThresh2fRscp + hysteresis2f/2), for the Measurement Quantity CPICH RSCP. The time to trigger is defined by the parameters timeToTrigger2fEcno and timeToTrigger2fRscp for Measurement Quantities CPICH Ec/No and CPICH RSCP respectively. The following figure shows the concept of events 2d and 2f for CPICH Ec/No monitoring. The following are the definitions of parameters used for events 2d and 2f. Refer to Appendix D for the recommended values for these parameters as well as the object where these parameters reside. For details on the ranges of these parameters, refer to the Parameter Guidelines document [3]. usedFreqThresh2dEcno: indicates threshold to trigger event 2d for Ec/No. usedFreqThresh2dRscp: indicates threshold to trigger event 2d for RSCP. usedFreqThresh2dEcnoDrnc: indicates the threshold to trigger event 2d for Ec/No when the best cell in the active set belongs to a DRNC. T-Mobile USA, INC. Confidential Rev. 0.6 December 5, 2007 96 of 214 Ошибка! Используйте вкладку "Главная" для применения Title к тексту, который должен здесь отображаться. usedFreqThresh2dRscpDrnc: indicates the threshold to trigger event 2d for RSCP when the best cell in the active set belongs to a DRNC. hysteresis2d: Hysteresis used for event 2d. timeToTrigger2dEcno: Minimum interval of time the Measurement Quantity Ec/No must be below the Event 2d threshold level before event 2d is triggered, and a measurement report is sent. timeToTrigger2dRscp: Minimum interval of time the Measurement Quantity RSCP must be below the Event 2d threshold level before event 2d is triggered, and a measurement report is sent. usedFreqRelThresh2fEcno: Relative threshold for event 2f for Ec/No referenced to the parameter usedFreqThresh2dEcno. usedFreqRelThresh2fRscp: Relative threshold for event 2f for RSCP referenced to the parameter usedFreqThresh2dRscp. hysteresis2f: Hysteresis used for event 2f. timeToTrigger2fEcno: Minimum interval of time the Measurement Quantity Ec/No must be above the Event 2f threshold level before event 2f is triggered, and a measurement report is sent. timeToTrigger2fRscp: Minimum interval of time the Measurement Quantity RSCP must be above the Event 2f threshold level before event 2f is triggered, and a measurement report is sent. filtercoefficient2: coefficient used to filter measured values before comparing to event criteria. This is set to a value of 2, so that there is equal weight given to an old filtered measurement result as well as to the new measurement result. usedFreqW2d: weighting factor for event 2d. usedFreqW2f: weighting factor for event 2f. If the value of 2d threshold changes as a result of an Active Set update for the Ec/No or the RSCP measurement, due to different settings of the cell parameter usedFreqThresh2dEcno or usedFreqThresh2dRscp, the corresponding measurements using event 2d and event 2f must be modified with the new thresholds. If the best cell of the active set belongs to a neighboring RNC, then the parameters usedFreqThresh2dEcnoDrnc and usedFreqThresh2dRscpDrnc are used to evaluate the event 2d. The parameters usedFreqThresh2dEcnoDrnc and usedFreqThresh2dRscpDrnc are RNC based parameters. These can’t be modified on a cell level, however, with the current implementation of soft handovers at the IuR boundary, there will be minimal IRAT handovers, if any at RNC borders. Hence the absence of flexibility in tuning these parameters on a cell level should not pose a big disadvantage to network optimization. Finally, the parameters usedFreqThresh2dEcno and usedFreqThresh2dRscp can be uniquely configured at the cell level. This allows the event 2d threshold for individual cells to be tuned to meet desired network conditions (e.g. a cell in the UMTS core may have more stringent conditions to trigger event 2d as opposed to a site on the UMTS network border). All other IRAT (as well as handover) parameters are global RNC parameters. Event 6d and 6b for UE TX Power monitoring T-Mobile USA, INC. Confidential Rev. 0.6 December 5, 2007 97 of 214 Ошибка! Используйте вкладку "Главная" для применения Title к тексту, который должен здесь отображаться. Event 6d is used to evaluate if the TX power of the UE increases above the maximum transmit power of the UE class. There is no pre-defined threshold to trigger event 6d. The transmit power of the UE is compared to its maximum transmit power, P_max in order to trigger event 6d, which typically results in IRAT measurements. Event 6b is used to evaluate when the TX power goes below a pre-defined threshold, typically ending GSM measurements. There is no support for hysteresis for events 6d and 6b. Also since the comparison is done on the UE (and not on a specific cell in the active set), there is no requirement of a weighting factor. The following are the definitions of parameters used for events 6d and 6b. Refer to Appendix D for the recommended values for these parameters as well as the object where these parameters reside. For details on the ranges of these parameters, refer to the Parameter Guidelines document [3]. txPowerConnQualMonEnabled: Enables or disables the connection quality monitoring based on UE Tx power. ueTxPowerThresh6b: The threshold used to trigger event 6b when UE Transmit power becomes less than an absolute threshold. timeToTrigger6d: Minimum interval of time the UE transmit power must be above the Event 6d threshold level before event 6d is triggered, and a measurement report is sent. timeTrigg6b: Minimum interval of time the UE transmit power must be below the Event 6b threshold level before event 6b is triggered, and a measurement report is sent. filterCoeff6: Coefficient for layer 3 filtering before UE internal measurement reporting evaluation. This is set to a value of 3, so that there is more weight given to an old filtered measurement result (65%) and less weight given to the new measurement result (35%). 10.4.2. Event based GSM measurements reporting Once the UE receives the compressed mode parameters and responds with a Physical Channel Reconfiguration Complete message, the RNC delivers a Measurement Control message to the UE which contains the following: The GSM monitored subset, built from the GSM neighbors of the active set cells. This is a list of the candidate cells to measure (i.e. GSM cells). In the case of IRAT, the BCCH ARFCN, and BSIC are also provided The event 3a parameters, including the following: The UMTS event 3a threshold trigger The weighting factor, used to include measurements from the cells in the active set The hysteresis applied to the UMTS event 3a threshold The time to trigger The GSM event 3a threshold trigger The connection frame number (CFN) indicating which frame each TGPSI begins. Note that the Measurement Quantity used for the UMTS event 3a threshold trigger is dependant on the original event 2d or event 6d trigger. If event 2d was triggered based on Ec/No, then the event 3a threshold trigger will be based on Ec/No. If event 2d was T-Mobile USA, INC. Confidential Rev. 0.6 December 5, 2007 98 of 214 Ошибка! Используйте вкладку "Главная" для применения Title к тексту, который должен здесь отображаться. triggered based on RSCP, or an event 6d was the trigger, then the event 3a threshold trigger will be based on RSCP. If the connection quality trigger is CPICH Ec/No, event 3a is triggered when the (estimated quality < usedFreqThresh2dEcno + utranRelThresh3aEcno hysteresis3a/2) and the (GSM carrier RSSI > gsmThresh3a), for at least TimeToTrigger3a. If the connection quality is CPICH RSCP, event 3a is triggered when the (estimated quality < usedFreqThresh2dRscp + utranRelThresh3aRscp - hysteresis3a/2) and the (GSM carrier RSSI > gsmThresh3a), for at least TimeToTrigger3a. If the connection quality is UE Tx power, event 3a is triggered when the (estimated quality < usedFreqThresh2dRscp + utranRelThresh3aRscp + utranRelThreshRscp hysteresis3a/2 and the (GSM carrier RSSI > gsmThresh3a), for at least TimeToTrigger3a. In the case of UE Tx power, the event 3a is always evaluated only on CPICH RSCP and not on CPICH Ec/No. The following figure shows the concept of event 3a when the trigger is CPICH Ec/No. The following are the definitions of the parameters used for event 3a. Refer to Appendix D for the recommended values for these parameters as well as the object where these parameters reside. For details on the ranges of these parameters, refer to the Parameter Guidelines document [3]. utranRelThresh3aEcno: Relative threshold for event 3a versus event 2d when the 2d measurement quantity is CPICH Ec/No. utranRelThresh3aRscp: Relative threshold for event 3a versus event 2d when the 2d measurement quantity is CPICH RSCP. utranRelThreshRscp: This is used to compute the absolute RSCP threshold for event 3a when bad connection quality has been triggered in the UL. T-Mobile USA, INC. Confidential Rev. 0.6 December 5, 2007 99 of 214 Ошибка! Используйте вкладку "Главная" для применения Title к тексту, который должен здесь отображаться. timeToTrigger3a: Minimum interval of time that both the UMTS and GSM event 3a thresholds are met, before event 3a is triggered, and a measurement report is sent. Hysteresis3a: Hysteresis used for event 3a. gsmThresh3a: Threshold for event 3a (the estimated quality of the currently used UTRAN RAN frequency is below a certain threshold and the estimated quality of the GSM system is above a certain threshold for GSM). individualOffset: The offset is added to the measured quantity before the UE evaluates whether an event has occurred. This parameter is found in the object ExternalGSMCell. Improper use of non-default values may result in instability and unequal cell borders. Recommended value is 0 for network launch. maxGsmMonSubset: Maximum number of GSM cells that the UE will measure on. It is recommended to keep this value to the default = 32. utranFilterCoefficient3: Coefficient for layer 3 filtering of UTRAN quality before IRAT reporting evaluation. This is set to a value of 2, so that there is equal weight given to an old filtered measurement result as well as to the new measurement result. utranW3a: Weighting factor for event 3a for UTRAN. If the RNC receives a second event 3a MEASUREMENT REPORT while it is already processing one, the new report is buffered. The buffer holds only the last received report so a new received report overwrites a report already in the buffer. 10.4.3. Identification of target GSM cell for Handover/Cell Change The RNC uses the measurement report from event 3a and orders the GSM cells according to their GSM quality measure. While doing this, RNC discards all GSM cells that are not BSIC verified and cells whose GSM carrier RSSI is less than gsmThresh3a. RNC then chooses the target GSM cell as the cell which has the best carrier RSSI and starts an IRAT handover attempt towards this cell. 10.4.4. 3G to 2G IRAT Handover/Cell Change Execution Once the evaluation carried by the IRAT Handover Evaluation algorithm has lead to a target GSM/GPRS cell, IRAT Handover Execution starts. The result of the execution part is one of the following: Hand over the UE connection to a GSM/GPRS cell. That is, the UE is finally connected to the GSM/GPRS cell and WCDMA RAN resources related to the UE connection are released. The UE connection remains on the WCDMA RAN due to a handover to GSM/GPRS failure. IRAT Handover Execution requests resources in the GSM/GPRS system, according to the proposal received from the IRAT Handover Evaluation algorithm. If the attempt succeeds, the actions necessary to fulfill the handover proposal are executed. If execution fails, exception handling is performed to get back to stable situation and keep the UE connection on the WCDMA RAN. 3G to 2G IRAT Handover Execution for CS services T-Mobile USA, INC. Confidential Rev. 0.6 December 5, 2007 100 of 214 Ошибка! Используйте вкладку "Главная" для применения Title к тексту, который должен здесь отображаться. IRAT Handover function can only be executed for connections in CELL_DCH state and only for UEs connected towards a Circuit-Switched service. The Circuit-Switched service can be either voice or data. The following ladder diagram (reference 3GPP TS 25.931) illustrates the signaling required between the UMTS and GSM network to perform a handover for CS services. UE Node B RNC Serving RANAP CN 1. Relocation Required MSC BSC BTS RANAP MAP/E 2. Prepare Handover MAP/E BSSMAP 3. Handover Request BSSMAP 4. Handover Request Ack BSSMAP MAP/E 5. Prepare Handover Response BSSMAP MAP/E 6. Relocation Command RANAP RANAP 7. DCCH : Handover from UTRAN Command RRC RRC 8. Handover Detect BSSMAP BSSMAP 9. Handover Complete RR RR 10. Handover Complete BSSMAP MAP/E RANAP 12. Iu Release Command 11. Send End Signal Request BSSMAP MAP/E RANAP 13. Iu Release Complete RANAP RANAP 14. Send End Signal Response MAP/E MAP/E Once a target GSM neighbor is selected for handover, the RNC sends the RANAP message RELOCATION REQUIRED to the 3G MSC, and the timer T_RELOC_prep is started. The RELOCATION REQUIRED message contains information regarding the target GSM cell, and this is forwarded on to the 2G MSC and BSC via MAP/E and BSSMAP signaling respectively. If resources are allocated by the GSM target system, a RELOCATION COMMAND message is received by the SRNC. At this point, the SRNC sends HANDOVER FROM UTRAN COMMAND message to the UE to initiate the handover. The GSM/GPRS message HANDOVER COMMAND is included in the handover message. The resources on WCDMA RAN side are kept to allow the UE return to the old channels in case of handover failure. When the target GSM BSS detects the UE and the handover is completed, the RR message HANDOVER COMPLETE is sent by the UE to the BSC. At this point, the successful IRAT handover is reported to the 3G Core Network, and a RANAP IU RELEASE COMMAND message is sent to the RNC. At the reception of this message, the SRNC de-allocates all resources related to the UE connection and responds to the 3G MSC with an IU RELEASE COMPLETE message. The RRC and RANAP messages between the UE, UTRAN, and 3G MSC, for the IRAT Handover execution are shown in the figure below. Actual UE traces showing IRAT message flow will be included once available. T-Mobile USA, INC. Confidential Rev. 0.6 December 5, 2007 101 of 214 Ошибка! Используйте вкладку "Главная" для применения Title к тексту, который должен здесь отображаться. Exception Handling of Failed 3G to 2G IRAT Handover As stated in the previous section, the hard coded timer T_RELOC_prep, is started at the transmission of the RELOCATION REQUIRED message and stopped at the reception of the RELOCATION COMMAND. If this timer expires prior to receiving a response to the RELOCATION REQUIRED message (either positive or negative), a RELOCATION CANCEL message is sent to the 3G CS core network. The current 3G connection is maintained if possible. If a MEASUREMENT CONTROL failure occurs for event 3a, the SRNC cancels the IRAT Handover procedure and the connection is released. If the RELOCATION PREPARATION FAILURE message is received at SRNC from the Core Network, IRAT Handover is canceled, and the connection is kept, if possible. If the cause of the message is “No resource available”, the IRAT Handover Evaluation algorithm is informed that the allocation failed due to lack of resources in the target system. If it is not possible to fulfill the RELOCATION T-Mobile USA, INC. Confidential Rev. 0.6 December 5, 2007 102 of 214 Ошибка! Используйте вкладку "Главная" для применения Title к тексту, который должен здесь отображаться. COMMAND message for any reason, the function is cancelled and the RELOCATION CANCEL message is sent from the SRNC to Core Network. The connection is kept, if possible. If the UE fails to access the GSM cell and returns to the old channel, then a RADIO LINK RESTORE INDICATION message is sent from RBS to the SRNC to indicate that the UE has returned to the old channel. When the UE comes back to the old channel, a HANDOVER FROM UTRAN FAILURE message is sent to the SRNC by the UE. The SRNC informs the Core Network that IRAT Handover has failed so GSM resources can be de-allocated. The IRAT Handover Execution informs the IRAT Handover Evaluation algorithm that the handover has failed. If the IRAT handover to the target cell fails, and if there are soft handover reports buffered, RNC uses these to perform soft handover evaluation before returning to the IRAT handover evaluation. If the IRAT handover fails, and there is a buffered 3a measurement report, RNC terminates the existing event 3a handling, and processes the buffered event 3a report to find a new GSM target for handover. If the IRAT handover fails due to RELOCATION PREPARATION FAILURE (which is the failed response to the RELOCATION REQUIRED message) or HANDOVER FROM UTRAN FAILURE, then the RNC makes multiple attempts to the same GSM cell. If there is more than one GSM cell in the 3a measurement report, repeated handover attempts shall be made to these cells in quality order. The following are the parameters that influence repeated attempts to handover. Refer to Appendix D for the recommended values for these parameters as well as the object where these parameters reside. For details on the ranges of these parameters, refer to the Parameter Guidelines document [3]. gsmAmountPropRepeat: Maximum number of repeated attempts (not including the first attempt) of GSM cells for handover based on the same measurement report. gsmPropRepeatInterval: Minimum time interval between handover attempts to the same GSM cell based on the same measurement report. gsmFilterCoefficient3: Coefficient for layer 3 filtering of GSM quality before IRAT reporting evaluation. This is set to a value of 1, so that there is less weight given to an old filtered measurement result (29%) and more weight given to the new measurement result (71%). If the IRAT handover failure cause is “Other”, then the IRAT algorithm will be terminated and the UE stays on UMTS. 3G to 2G IRAT Cell Change Execution for PS services IRAT Cell Change is used to transition a UE connected to PS on a dedicated channel to the GSM system. A network-initiated cell reselection is used to transition the UE to GPRS. The following ladder diagram (reference 3GPP TS 25.931) illustrates the signaling required between the UMTS and GSM network to perform a network initiated cell change for PS services. T-Mobile USA, INC. Confidential Rev. 0.6 December 5, 2007 103 of 214 Ошибка! Используйте вкладку "Главная" для применения Title к тексту, который должен здесь отображаться. UE Serving RNC CN 1. Cell Change Order from UTRAN RRC RRC RANAP RANAP 2. Iu Release Command 3. Iu Release Complete RANAP RANAP Once a target GSM cell is selected for a UE connected to the PS network (via HLS compressed mode), the SRNC initiates the IRAT Cell Change in the UE by sending the CELL CHANGE ORDER FROM UTRAN message to UE. The message includes information of the RAB to hand over and a target cell description. The UE synchronizes to the GPRS system and sends a ROUTING AREA UPDATE message. Then, the PS Core Network sends a SRNS CONTEXT REQUEST message that includes the RAB id for which the context must be transferred. At this moment the DL transmission is stopped. The SRNC sends an SRNS CONTEXT RESPONSE message. The PS Core Network initiates the release of the Iu connection by sending the IU RELEASE COMMAND message. When this message is received by the SRNC, the Iu bearers are released. The SRNC terminates the Iu release by sending an IU RELEASE COMPLETE message to the PS Core Network. The RRC connection messages between the UE and the UTRAN for the IRAT Cell Change Execution are shown in the figure below. Actual UE traces showing IRAT message flow will be included once available. T-Mobile USA, INC. Confidential Rev. 0.6 December 5, 2007 104 of 214 Ошибка! Используйте вкладку "Главная" для применения Title к тексту, который должен здесь отображаться. Exception Handling of Failed 3G to 2G IRAT Cell Change If the UE sends a MEASUREMENT CONTROL FAILURE message, the SRNC will cancel the IRAT Cell Change Execution procedure and the connection is released. If the UE fails to access the GPRS cell, it returns to the old channel. A RADIO LINK RESTORE INDICATION is sent from the Node B to the SRNC to indicate that the UE has returned to the old channel. The UE then sends a CELL CHANGE ORDER FROM UTRAN FAILURE message to the SRNC. The IRAT Handover Evaluation is informed about the failure. If there is an invalid RAB id in the SRNS CONTEXT TRANSFER, the SRNC will respond with SRNS CONTEXT RESPONSE using the indicator that “RABs Context Failed to Transfer”, due to invalid RAB id. 3G to 2G IRAT Handover Execution for CS and PS Multi-service In cases where the UE is connected to both the CS and PS networks simultaneously, the transition to 2G is handled by the IRAT Handover Execution procedure for CS. 10.5. Scenarios for 3G to 2G IRAT Handover / Cell Change The primary purpose of 3G to 2G IRAT handover in the T-Mobile USA network is to transition mobile users from the UMTS network to the GSM network while leaving the UMTS coverage areas. A UE might leave the UMTS coverage area in the following 4 cases. T-Mobile USA, INC. Confidential Rev. 0.6 December 5, 2007 105 of 214 Ошибка! Используйте вкладку "Главная" для применения Title к тексту, который должен здесь отображаться. At the edge of the defined UMTS network – As the UMTS network is scheduled to be deployed in phases across the country, there are bound to be gaps in UMTS coverage area. Hence while leaving the UMTS network; the users would be able to maintain a call through handover to 2G. In-building areas without dedicated UMTS sites – In the initial phase of 3G network planning, outdoor UMTS sites will be used to cover in-building areas. The 2G network would then provide better in-building coverage in these areas, and hence a 3G to 2G handover might be useful to maintain the call in indoor locations. Missing Sites – During initial deployment, it is possible that one or more planned UMTS sites in a cluster may be built later than the rest of the cluster. In these cases as well, it would be beneficial to use 3G to 2G handover to maintain a call while transitioning between sites. Coverage Holes – To address any unplanned coverage holes resulting from site related failures. 2G handover can be used maintain a call in this scenario as well. The following are the 2 scenarios chosen for 3G to 2G IRAT handover optimization. 10.5.1. Edge Thresholds The Edge thresholds can be used when the intent of the 3G to 2G handover is to transition the UE to GSM at fairly stronger values of RSCP and Ec/No. The intent is to compromise on the extent of the UMTS coverage area, by enabling mobiles to handover to GSM well within the 3G coverage. This would help in making the handover more reliable and minimize the number of drop calls. Since this set of values for RSCP and Ec/No triggers would reduce the 3G coverage area, this should be used only as required for a limited number of sites. The details on the actual RSCP and Ec/No values are available in the next chapter. 10.5.2. Core Thresholds The Core thresholds should be used when the intent of 3G to 2G handover is to allow transition from UMTS to GSM at relatively weaker values of RSCP and Ec/No when compared to the Edge case. The intent of these lower thresholds is to maximize the UMTS coverage area, especially in areas where a temporary fade in the RF environment may otherwise trigger unwanted handovers to 2G when higher values are used for the trigger points. In the core of the network, there may be areas where the signal strength may start falling due to temporary fade conditions, but the UE maybe able to recover fairly quickly from these temporary fade conditions, making handover to GSM unnecessary. By not setting the thresholds to stronger values, the UE is given enough time to recover from these temporary fade conditions. This is the recommended starting configuration for most sites in the UMTS network, thus maximizing the UMTS coverage area. 10.6. Parameter recommendations for IRAT Scenarios This section details the recommended values for parameters that influence IRAT 3G to 2G handover for the two scenarios discussed in the previous section. The following are the recommended values for each of the two scenarios. Core Thresholds: For the core of the network, the recommended settings for IRAT handover are based on UMTS outdoor design thresholds. As per [2], the UMTS design threshold for AMR 12.2 Voice is an RSCP of -105 dBm and an Ec/No of -14 dB. The intent of the IRAT T-Mobile USA, INC. Confidential Rev. 0.6 December 5, 2007 106 of 214 Ошибка! Используйте вкладку "Главная" для применения Title к тексту, который должен здесь отображаться. feature is to maximize the UMTS coverage area; hence a UE on UMTS should handover to GSM when the RSCP reaches a value of -105 dBm or when the Ec/No reaches a value of -14 dB. Since there is a delay between triggering compressed mode and the actual IRAT handover to GSM, the thresholds to trigger compressed mode should be set higher than the above mentioned thresholds. Hence the thresholds to trigger compressed mode are recommended to be set at an RSCP of -102 dBm and an Ec/No of -13 dBm, giving a margin for IRAT handover before UMTS coverage loss. Edge Thresholds: The Edge thresholds are recommended to be set higher than the Core values so as to handover a UE to GSM with minimum drop calls. An RSCP of -98 dBm and an Ec/No of -12 dB is recommended as the trigger to start compressed mode measurements on GSM neighbors. In the following subsections, the above thresholds for 3G to 2G handover are translated into specific parameter values from an Ericsson RNC perspective. For the Ericsson 3G RAN, the parameters usedFreqThresh2dEcno for Ec/No based trigger and usedFreqThresh2dRscp for RSCP based trigger are configurable on a per-cell basis. 10.6.1. Edge Thresholds The recommended values to trigger compressed mode (event 2d) in this case are usedFreqThresh2dEcno = -12 dB usedFreqThresh2dRscp = -98 dBm The recommended values to trigger compressed mode cancellation (event 2f) are obtained from the event 2d values using a constant (RNC-level) offset of usedFreqRelThresh2fEcno for Ec/no and usedFreqRelThresh2fRscp for RSCP. usedFreqRelThresh2fEcno = 3 dB (thus resulting in 2f threshold of -9 dB) usedFreqRelThresh2fRscp = 3 dBm (thus resulting in 2f threshold of -95 dBm) The recommended values to trigger IRAT handover (event 3a) are obtained from the event 2d values using a constant (RNC-level) offset of utranRelThresh3aEcno for Ec/No and utranRelThresh3aRscp for RSCP. utranRelThresh3aEcno = -1 dB (thus resulting in 3a threshold of -13 dB) utranRelThresh3aRscp = -3 dBm (thus resulting in 3a threshold of -101 dBm) The recommended values for the complete set of IRAT related parameters are available in Appendix D. 10.6.2. Core Thresholds The recommended values to trigger compressed mode (event 2d) in this case are usedFreqThresh2dEcno = -13 dB usedFreqThresh2dRscp = -102dBm The recommended values to trigger compressed mode cancellation (event 2f) are obtained from the event 2d values using a constant (RNC-level) offset of usedFreqRelThresh2fEcno for Ec/no and usedFreqRelThresh2fRscp for RSCP. T-Mobile USA, INC. Confidential Rev. 0.6 December 5, 2007 107 of 214 Ошибка! Используйте вкладку "Главная" для применения Title к тексту, который должен здесь отображаться. usedFreqRelThresh2fEcno = 3 dB (thus resulting in 2f threshold of -10 dB) usedFreqRelThresh2fRscp = 3 dBm (thus resulting in 2f threshold of -99 dBm) The recommended values to trigger IRAT handover (event 3a) are obtained from the event 2d values using a constant (RNC-level) offset of utranRelThresh3aEcno for Ec/No and utranRelThresh3aRscp for RSCP. utranRelThresh3aEcno = -1 dB (thus resulting in 3a threshold of -14 dB) utranRelThresh3aRscp = -3 dBm (thus resulting in 3a threshold of -105 dBm) In case the best cell of the active set belongs to a DRNC, then the parameters usedFreqThresh2dEcnoDrnc and usedFreqThresh2dRscpDrnc are used for IRAT handover to 2G. Since these parameters are set at the RNC level, these have the same value for both scenarios and are set equal to the Core Thresholds. The recommended values for the complete set of Ericsson IRAT related parameters are available in Appendix D. 10.7. 3G to 2G IRAT Handover/Cell Change Optimization Strategy Initially, it is recommended to use the Core set of values for the RSCP and Ec/No thresholds for the majority of the UMTS sites in the UMTS network, except for UMTS cells that fall at the defined edge of a UMTS market. This would ensure that the UMTS coverage area is maximized in the core of the network, and in any particular case of a UMTS coverage hole due to a missing site either outdoor or in-building, a UE on UMTS can be transitioned to GSM before dropping the call. The strategy outlined here is for the optimization of the Core and Edge thresholds in order to ensure that the UE is transitioned to 2G only at the edge of the UMTS coverage area while minimizing the overall 3G plus 2G drop call rate. Since the intent of the Edge thresholds (as described in the previous sections) is to transition a UE to 2G well within the 3G coverage area, even though the UMTS coverage is slightly reduced, the final Edge thresholds should still be at higher RSCP and Ec/No values when compared to the Core thresholds. The metrics outlined here are only to aid in the optimization strategy of the IRAT thresholds. The exact counter names are not specified here and can be referenced from the KPI documents [5] and [6]. 3G and 2G Drop Call Rate: The combined drop call rate of 3G and 2G should be monitored to ensure that the IRAT handover feature doesn’t affect the performance of the T-Mobile network. The goal of 3G to 2G IRAT handovers is to transition mobiles to 2G systems at the edge of UMTS network, while minimizing the drop call rate on 3G as well as 2G. The 3G and 2G drop call percentages should be monitored on a network level as well as on a cell level for each of the cells that have IRAT handover enabled. The trend in drop call rate changes for 3G and 2G corresponding to any IRAT related parameter changes should be monitored to ensure the success of the new values. Ratio of 3G to 2G Handover attempts to 3G calls established: This metric when compared for 2 different sets of IRAT handover triggers, would give an idea as to which set of values for RSCP and Ec/No threshold might be more suitable. As long T-Mobile USA, INC. Confidential Rev. 0.6 December 5, 2007 108 of 214 Ошибка! Используйте вкладку "Главная" для применения Title к тексту, который должен здесь отображаться. as the 3G and 2G total drop call rate is not affected, the thresholds for IRAT handover should be chosen such that the ratio of 3G to 2G handover attempts to 3G calls established is minimized. This would eliminate unnecessary IRAT handover attempts to 2G. Ratio of 3G to 2G Handover attempts to Number of Compressed Mode (CM) attempts: This metric gives a trend of how many compressed mode triggers actually result in a 3G to 2G handover attempt. This metric in combination with the combined 3G and 2G drop call rate can be used to pick a suitable value for 2 different sets of RSCP and Ec/No thresholds. As long as the total 3G and 2G drop call rate is not affected, the set of thresholds which minimize the ratio of IRAT handover attempts to number of CM attempts should be chosen. Ratio of 3G to 2G handover attempts to overlay GSM cell to total 3G to 2G handover attempts: This metric on a WCDMA cell level, helps in finding premature IRAT handover trigger. A high value shows a lot of IRAT handovers happening in the core of the cell, and may point to non-optimal compressed mode and IRAT handover triggers. IRAT attempts for UMTS cells in the core: A high value for this metric indicates problems with the UMTS cell. Ratio of Number of IRAT handovers from a UMTS cell to Number of idle mode 2G3G reselections to the same UMTS cell: A low value can be used to identify ping pong behavior between in-call mode and idle mode. If the IRAT Handover and idle mode reselection parameters are set incorrectly, it can happen that a UE camps on 3G in idle mode and when a call is setup it will do an IRAT HO almost immediately because of aggressive IRAT parameter settings and the call will be completed on 2G. After the call is completed it will reselect back to 3G until the next call and the process will repeat itself. This is just a high level strategy for optimization thresholds and further analysis of drive test data as well as counter data should be performed before actual changes in parameter values is implemented. T-Mobile USA, INC. Confidential Rev. 0.6 December 5, 2007 109 of 214 Ошибка! Используйте вкладку "Главная" для применения Title к тексту, который должен здесь отображаться. 11. Emergency Call treatment The Location Technology Systems team has defined in [7] how a E911 call needs to be treated in order to be reported to the PSAP (Public Safety Answering Point) with the most accurate latitude and longitude values. The following is just a very brief explanation of the proposed treatment for an emergency call. The long term solution is a network based A-GPS system called as stand along SMLC (Service Mobile Location Center) or SAS based on 3GPP standards. Unfortunately, neither this system nor the A-GPS capable UEs will be available at launch. Therefore, interim solutions have been defined for emergency call handling. One interim solution is based on Service Based Handover (SBHO) and the other is based on emergency RRC Redirection. The preferred solution is to use SBHO, however this would need the availability of the Lb interface via LCS conversion. Markets with a Lb interface will be using SBHO for emergency calls, while markets that don’t have a Lb interface available will be using the emergency RRC redirection method for handling emergency calls. SBHO for emergency calls can be enabled by setting parameter “ecCnSbhoRequestIgnore” to False. The handover from WCDMA to GSM will be performed immediately following the RAB Assignment request message from the MSC and it will be performed only if the following is fulfilled: the ServiceHandover IE in the RAB Assignment request need to have the value "should" and the Priority Level IE in the same RANAP message need to have the value equal to the configurable parameter ecCnPriorityLevel. Also the parameter agpsEnabled should be set to False indicating the lack of AGPS support in the 3G network. A timer, ecSbhoTimer, is started if a handover to GSM is initiated. Before expiration of this timer, the RNC will not respond to a Location Reporting Control message from the CN. At expiration of the timer, a Location Report may be sent if the handover to GSM was unsuccessful, but otherwise no response will be sent. In order for SBHO to be used for emergency calls, For emergency RRC redirection, the parameter emergencyCallRedirect is set to ‘On’ to allow all emergency calls to be redirected to GSM. When a UE requests to establish an RRC connection and indicates 'Emergency call' as establishment code, the WCDMA RAN will reject the request by sending the message RRC Connection Reject with the 'Redirection info' equal to 'Inter-RAT info GSM'. The UE will then perform a cell selection to GSM and attempt to establish a connection to GSM. This procedure is applied when there is no RRC connection already setup in WCDMA RAN. If there is an existing RRC connection used for packet-switched traffic, this RRC connection has to be ended by the user ending its packet session before dialing an emergency call.. If the cell selection in GSM fails, the UE may do a cell re-selection to UMTS after the time stated in the 'Wait time' has elapsed. The timer ‘Wait time’ is sent by the RNC to the UE in the ‘RRC Reject Message’. It is the minimum wait time after which the UE can perform a reselection back to UMTS after a failed call attempt on GSM following an emergency call redirection. This timer is hard coded to 1 second. Once the UE returns to UMTS, the RNC will provide location information to the PSAP based on cell ID (CI). There is a second UE timer in the RNC, hard coded to 60 seconds, enabling the RNC to remember the “initial UE identity” for 60 seconds from the time of RRC reject message. If T-Mobile USA, INC. Confidential Rev. 0.6 December 5, 2007 110 of 214 Ошибка! Используйте вкладку "Главная" для применения Title к тексту, который должен здесь отображаться. this UE makes a second RRC connection attempt within this 60 second time period, then the RNC will recognize the UE and allow it to make a call on UMTS. The following are the related parameters to the E911 interim solutions activation. The proposed settings are to allow the interim solutions to be activated. All other settings are following vendors default values. Parameter Name Object Name Recommended Value emergencyCallRedirect RncFunction On ecCnSbhoRequestIgnore RncFunction False ecLocationAttemptUmts RncFunction Off ecSbhoTimer RncFunction 6s ecCnPriorityLevel RncFunction 7 agpsEnabled UtranCell False uePositioning RncFunction enabledPositioningFeatures = Cell_ID_ONLY T-Mobile USA, INC. Confidential Rev. 0.6 December 5, 2007 111 of 214 Ошибка! Используйте вкладку "Главная" для применения Title к тексту, который должен здесь отображаться. 12. 2G to 3G IRAT Cell Reselection The T-Mobile camping strategy is to allow mobiles to camp on UMTS, wherever UMTS service is available, so that the users can take advantage of the advanced features available in the UMTS network, as well as to offload the GSM traffic whenever possible. The 2G to 3G Cell Reselection feature can be used to transition mobiles in idle mode from GSM to UMTS, when entering UMTS coverage areas. In order to comply with T-Mobile strategy, the UEs should be allowed to camp on UMTS, irrespective of the GSM signal strength whenever UMTS coverage is available. This section details the reselection algorithms to transition to 3G for the Ericsson BSS, Nokia BSS and Nortel BSS. In each case the recommended values required to implement the above mentioned T-Mobile strategy are presented. Since the reselection is carried out from the 2G side, the target 3G system is immaterial to this discussion. In general, the algorithms detailed here are applicable for transition to any 3G network including the Ericsson 3G network. 12.1. Ericsson 2G to Ericsson 3G Reselection The following discussion is valid for Ericsson BSS version R12. The parameter COEXUMTS is used to enable the GSM-UMTS Cell Reselection feature. The following are the possible values for this parameter. COEXUMTS = 0 (OFF): In this case, none of the GSM – UMTS features is activated. COEXUMTS = 1 (ON): In this case, the GSM – UMTS Cell Reselection and Handover features are activated. COEXUMTS = 2 (ONADDINFO): In this case, the GSM-UMTS Cell Reselection and Handover, as well as Combined Reselection Triggering GSM to WCDMA (this feature is detailed in the following sections) are activated. The recommended value for this parameter is 2 (ONADDINFO). 8.1.1. UTRAN Neighbor Definitions and System Information The UTRAN cells to be monitored for inter system cell reselection are defined in the 3G neighboring cell list which is broadcast on BCCH using the System Information Type 2quater (SI 2quater). If a PBCCH is also configured, the 3G neighboring cell list is also broadcast on PBCCH using the Packet System Information Type 3quater (PSI 3quater). The SI 2quater and PSI 3 quarter messages are only broadcast if any UTRAN neighbor cells exist and if the parameter COEXUMTS is not set to OFF. In T-Mobile GSM networks, PBCCH is currently not configured. Hence, only the SI 2quater message will be broadcast. SI 2quater can be broadcast either on BCCH Normal or BCCH Extended. If all the information doesn’t fit into a single SI 2quater message, the remaining information will be sent in other instances of this message. When SI 2quater is sent, AGBLK is recommended to be set to 1 when SI 2bis and SI 2ter are sent, when GPRS/EGPRS is active and SI 2bis is sent, and when GPRS/EGPRS is active and SI 2ter is sent. This is because SI 2quater will share the same resources as SI 13 T-Mobile USA, INC. Confidential Rev. 0.6 December 5, 2007 112 of 214 Ошибка! Используйте вкладку "Главная" для применения Title к тексту, который должен здесь отображаться. and/or SI 2ter on BCCH normal implying longer cycle for the System Information to be broadcast. This could impact cell selection/reselection performance. When AGBLK = 1, either SI2quater or SI 13 are placed on BCCH extended in the above cases. However, use of BCCH extended implies reduction of the paging capacity since BCCH extended shares the resource with PCH and AGCH. UTRAN FDD neighboring cells are identified with a frequency and scrambling code combination. In idle mode, the measurement frequency (MFDDARFCN) and scrambling code (MSCRCODE) for the neighboring UTRAN cells are defined within the parameter UMFI. This parameter is also used to define if diversity is applied or not for an UTRAN cell. Up to 64 UTRAN neighboring cells may be defined per GSM cell. 12.1.1. Measurements on WCDMA neighbors in idle mode In addition to measurements on surrounding GSM/GPRS/EGPRS cells, a Multi-RAT mobile also performs measurements on UTRAN neighboring cells. The parameter QSI can be used to enable measurements on UTRAN cells in idle mode and packet switched modes. This parameter is broadcast on BCCH and PBCCH (if PBCCH is enabled). There are four possible scenarios based on value of QSI for measurements on UTRAN neighbors. UTRAN neighbors are measured only when the signal strength of the GSM serving cell is above the threshold set by QSI. UTRAN neighbors are measured only when the signal strength of the GSM serving cell is below the threshold set by QSI. UTRAN neighboring cells are always measured. UTRAN neighboring cells are never measured. Since T-Mobile camping strategy is to have the mobiles camp on the UMTS network, whenever UMTS coverage is available, this parameter QSI should be set to ‘always’, so that UTRAN cells are measured even when the GSM signal strength is good. Recommended Value: The parameter QSI is recommended to be set to 7 (= always). 12.1.2. Cell Reselection to UMTS for mobiles that don’t support RSCP evaluation This section is focused on the reselection algorithm used for mobiles that don’t support RSCP evaluation. A similar algorithm to the one for GSM reselection is used for the GSM to UMTS cell reselection. Since the modulation technique used for UMTS is completely different from GSM, there is a difference in the evaluation of signal quality for GSM and UMTS measurements. Hence a mapping of UMTS signal strength is performed in such a way that it can be compared to GSM signal strength values. The following two criteria have to be fulfilled for a period of 5 seconds for a multi-RAT mobile to reselect a suitable UTRAN cell. CPICH Ec/No > FDDQMIN T-Mobile USA, INC. Confidential Rev. 0.6 December 5, 2007 113 of 214 Ошибка! Используйте вкладку "Главная" для применения Title к тексту, который должен здесь отображаться. and CPICH RSCP > RLA(s+n) + FDDQOFF Where RLA(s+n) refers to the Received Level Average of the serving and neighboring GSM cells. RLA is the average of the received signal levels measured in dBm for all monitored GSM frequencies in the BA list. FDDQMIN is the minimum quality of a UTRAN cell for cell reselection. This parameter ensures a sufficient quality of the candidate UTRAN cell. FDDQOFF is the key parameter to control the behavior of inter-system cell reselection. It defines an offset between the signal strength of UTRAN and GSM cells. Lower values of the parameter FDDQOFF can be used to off-load the GSM system, while higher values can be used to keep multi-RAT mobiles in the GSM system. Since the values of GSM signal strength and UTRAN CPICH RSCP are not of the same kind, the balance between the two should be set with the offset FDDQOFF. Cell reselection back to UTRAN will not occur within 5 seconds after a previous cell reselection from UTRAN. If a cell reselection occurred within the previous 15 seconds, an additional offset of 5 dB is added to FDDQOFF by the mobile. These conditions prevent ping-pong for a mobile that has just entered GSM. To achieve the preferred camping strategy of the mobile camping on UMTS, whenever UTRAN coverage is available, the value of FDDQOFF should be such that the UTRAN CPICH RSCP always looks better than the GSM RLA. A negative value of FDDQOFF would achieve this by making a UTRAN cell always look better than a GSM cell. Since this might sometimes result in cell reselection to a weak UMTS cell, the value of parameter FDDQMIN should be set to control this. A value of FDDQMIN such that FDDQMIN > qQualMin + sRatSearch would prevent the mobile from making cell reselection to a weak UTRAN cell. This setting would also ensure that the MS will not start to measure on GSM cells immediately after reselecting a UTRAN cell. For details on these parameters with respect to the Ericsson RAN, refer to the Chapter “Cell Reselection Parameters from 3G to 2G”. The available values for parameter FDDQMIN are one of [-20dBm, -6dBm, -18dBm, -8dBm, -16dBm, -10dBm, -14dBm, -12dBm]. Since the recommended value for qQualMin = -18 dB and sRatSearch = 4 dB, the parameter FDDQMIN should be greater than -14 dB. The lowest value that achieves this condition (-12 dB) should be selected to speed up the reselection of a UTRAN cell. Recommended Values: From the above reasoning, the recommended value of FDDQOFF = infinity and FDDQMIN = -12 dB. This would allow the MS to camp on UMTS, whenever UTRAN coverage is available, irrespective of the signal strength of GSM. These settings would result in a cell reselection algorithm that is based only on the quality of the UTRAN cell, since the reselection criterion 2 is always satisfied. Refer to Appendix E for a quick look at the recommended values for all 2G to 3G reselection parameters. T-Mobile USA, INC. Confidential Rev. 0.6 December 5, 2007 114 of 214 Ошибка! Используйте вкладку "Главная" для применения Title к тексту, который должен здесь отображаться. 12.1.3. Cell Reselection to UMTS for mobiles that support RSCP evaluation For mobiles that support RSCP evaluation for reselection to 3G, an additional criterion is used to further minimize the number of ping pong cell reselections. This is achieved by adding a threshold for CPICH RSCP measurements to assure a sufficient downlink signal strength, which in turn increases the possibility for the mobile to reach the network in the uplink. The following three criteria have to be fulfilled for a period of 5 seconds for a multi-RAT mobile with RSCP evaluation capability to reselect a suitable UTRAN cell. CPICH RSCP > RLA(s+n) + FDDQOFF CPICH Ec/No > FDDQMIN – FDDQMINOFF and CPICH RSCP > FDDRSCPMIN - min((P_MAX-21), 3dB) Where RLA(s+n) refers to the Received Level Average of the serving and neighboring GSM cells. RLA is the average of the received signal levels measured in dBm for all monitored GSM frequencies in the BA list. FDDQMIN is the minimum quality of a UTRAN cell for cell reselection. This parameter ensures a sufficient quality of the candidate UTRAN cell. FDDQMINOFF defines an offset to the threshold FDDQMIN. FDDQOFF defines an offset between the signal strength of UTRAN and GSM cells. FDDRSCPMIN defines the minimum threshold for the “signal strength” measure CPICH RSCP for cell reselection to UTRAN. P_MAX is the maximum RF output power of the MS in UTRAN FDD mode. For a Class 3 mobile, this is equal to 24 dBm. The recommended values for FDDQMIN and FDDQOFF are equal to -12 dB and –infinity as explained in the previous section. The recommended value for FDDQMINOFF = 0 dB, which would keep FDDQMIN – FDDQMINOFF > qQualMin + sRatSearch (= -14 dB). The absolute minimum CPICH RSCP value to reselect a UTRAN cell is given by the selection parameter qRxLevMin in UTRAN. A setting of FDDRSCPMIN such that FDDRSCPMIN > qRxLevMin + hysteresis prevents the multi-RAT mobile to trigger a reselection to a weak UTRAN cell. The recommended value for FDDRSCPMIN = -102 dBm, which would result in a Class 3 MS (P_MAX = 24 dBm) reselecting a 3G cell when the cell’s CPICH RSCP > -105 dBm, and a Class 4 MS (P_MAX = 21 dBm) reselecting a 3G cell when the CPICH RSCP > -102 dBm. Refer to Appendix E for a quick look at the recommended values for all 2G to 3G reselection parameters 12.2. Nokia 2G to Ericsson 3G Reselection The following discussion is valid for Nokia BSS version S11.5. The ISHO_SUPPORT_IN_BSC option must be in use to handle, modify and output any of the GSM-WCDMA Inter System T-Mobile USA, INC. Confidential Rev. 0.6 December 5, 2007 115 of 214 Ошибка! Используйте вкладку "Главная" для применения Title к тексту, который должен здесь отображаться. Handover and Cell Reselection parameters which are not GPRS related. To enable the GPRS capable mobiles on PBCCH to measure and select an adjacent WCDMA cell the ISHO_SUPPORT_IN_BSC and BSC_GPRS_PARAM_ENABLED options must be in use. As per the current T-Mobile implementation there is no PBCCH configured in the GSM networks, hence the parameter BSC_GPRS_PARAM_ENABLED should be set to False. 12.2.1. UTRAN Neighbor Definitions and System Information The UTRAN cells to be monitored for inter system cell reselection are defined in the 3G neighboring cell list which is broadcast on BCCH using the System Information Type 2quater (SI 2quater). If a PBCCH is also configured, the 3G neighboring cell list is also broadcast on PBCCH using the Packet System Information Type 3quater (PSI 3quater). The SI 2quater and PSI 3 quarter messages are only broadcast if UTRAN neighbor cells are defined. These messages may contain more than one instance. The dual mode GSM/WCDMA mobiles are divided into two separate categories according to the GPRS capabilities: GPRS and non-GPRS capable mobiles. There are both common and category specific user defined parameters for the adjustment of the mobile functionality in the idle state, packet idle mode, dedicated state and packet transfer mode. For the BSC radio network parameter handling, this means that most if the WCDMA related idle state parameters are applicable foe all mobiles. However, the operator is also able to define the GPRS capability specific neighbor WCDMA cell measuring and reselection threshold values for the WCDMA capable mobiles. The dual mode GSM/WCDMA mobiles are able to find and identify a WCDMA RAN cell by the information included in the parameters WCDMA downlink carrier frequency (FREQ), scrambling code SCC), and downlink transmission diversity (DIV). The maximum number of 3G neighboring cells per serving GSM cell is limited to 32 cells over 3 frequencies. If GSM-WCDMA Inter-System Handover is in use, the maximum number of neighbor GSM cells (ADJC) per a serving cell (or segment) is 31 without Common BCCH Control in BSC or 30 if there is also at least one of the Common BCCH software activated. If GSM-WCDMA Inter-System Handover is in use, the maximum number of frequencies in a BCCH Allocation (BA) list is 31 without Common BCCH Control in BSC or 30 if there is also at least one of the Common BCCH software activated. A serving GSM cell cannot have two or more neighbor WCDMA RAN cells with the same UARFCN and scrambling code. A serving GSM cell cannot have two or more neighbor WCDMA RAN cells which use the same MCC + MNC + RNC id + CI combination and/or WCDMA RAN cell index value. 12.2.2. Measurements on WCDMA neighbors in idle mode In addition to measurements on surrounding GSM/GPRS/EGPRS cells, a Multi-RAT mobile also performs measurements on UTRAN neighboring cells. The parameter qSearchI for nonGPRS and qSearchP for GPRS capable UEs can be used to enable measurements on UTRAN cells in idle mode and packet switched modes. This parameter is broadcast on BCCH and PBCCH (if PBCCH is enabled). T-Mobile USA, INC. Confidential Rev. 0.6 December 5, 2007 116 of 214 Ошибка! Используйте вкладку "Главная" для применения Title к тексту, который должен здесь отображаться. There are four possible scenarios based on value of qSearchI for non-GPRS capable mobiles (qSearchP for GPRS capable mobiles) for measurements on UTRAN neighbors. UTRAN neighbors are measured only when the signal strength of the GSM serving cell is above the threshold set by qSearchI (qSearchP). UTRAN neighbors are measured only when the signal strength of the GSM serving cell is below the threshold set by qSearchI (qSearchP). UTRAN neighboring cells are always measured. UTRAN neighboring cells are never measured. Since T-Mobile camping strategy is to have the mobiles camp on the UMTS network, whenever UMTS coverage is available, the parameters qSearchI and qSearchP should be set to ‘always’, so that the UTRAN cells are measured even when the GSM signal strength is good. Recommended Value: The parameters qSearchI and qSearchP are recommended to be set to 7 (= always). 12.2.3. Cell Reselection to UMTS for mobiles that don’t support RSCP evaluation A similar algorithm to the one for GSM reselection is used for the GSM to UMTS cell reselection. Since the modulation technique used for UMTS is completely different from GSM, there is a difference in the evaluation of signal quality for GSM and UMTS measurements. Hence a mapping of UMTS signal strength is performed in such a way that it can be compared to GSM signal strength values. The following two criteria have to be fulfilled for a period of 5 seconds for a multi-RAT mobile to reselect a suitable UTRAN cell. For a Non-GPRS capable UE: CPICH Ec/No > fddQMin and CPICH RSCP > RLA_C + fddQOffset For a GPRS capable UE: CPICH Ec/No > gprsFddQMin and CPICH RSCP > RLA_C + fddGprsQOffset Where RLA_C refers to the Received Level Average of the serving GSM cells. RLA is the average of the received signal level measured in dBm for the serving GSM. fddQMin and gprsFddQMin are the minimum quality of a UTRAN cell for cell reselection for non-GPRS and GPRS capable UEs, respectively. These parameters ensure a sufficient quality for the candidate UTRAN cell. fddQOffset and fddGprsQOffset are the key parameters to control the behavior of intersystem cell reselection for non-GPRS and GPRS capable UEs, respectively. They define an T-Mobile USA, INC. Confidential Rev. 0.6 December 5, 2007 117 of 214 Ошибка! Используйте вкладку "Главная" для применения Title к тексту, который должен здесь отображаться. offset between the signal strength of UTRAN and GSM cells. Lower values of these parameters can be used to off-load the GSM system, while higher values can be used to keep multi-RAT mobiles in the GSM system. Since the values of GSM signal strength and UTRAN CPICH RSCP are not of the same kind, the balance between the two should be set with the offsets fddQOffset and fddGprsQOffset for non-GPRS and GPRS capable UEs, respectively. If more than one WCDMA cell fulfils the above criteria, the cell with the best RSCP is selected for reselection. The parameters that are required to determine whether the WCDMA RAN cell is suitable are broadcast on BCCH of the WCDMA RAN cell. A mobile may start re-selection towards the WCDMA RAN cell before decoding the BCCH of the WCDMA RAN cell. If the WCDMA RAN cell is not suitable, this leads to a short interruption of service. Cell reselection back to UTRAN will not occur within 5 seconds after a previous cell reselection from UTRAN. If a cell reselection occurred within the previous 15 seconds, the value of parameters fddQOffset and fddGprsQOffset is increased by 5 dB by the mobile. These conditions prevent ping-pong for a mobile that has just entered GSM. To achieve the preferred camping strategy of the mobile camping on UMTS, whenever UTRAN coverage is available, the value of fddQOffset (fddGprsQOffset) should be such that the UTRAN CPICH RSCP always looks better than the GSM RLA_C. A negative value of fddQOffset (fddGprsQOffset) would achieve this by making a UTRAN cell always look better than a GSM cell. Since this might result sometimes in cell reselection to a weak UMTS cell, the value of parameter fddQMin (gprsFddQMin) should be set to control this. A value of fddQMin (gprsFddQMin) such that fddQMin (gprsFddQMin) > qQualMin + sRatSearch would prevent the mobile from making cell reselection to a weak UTRAN cell. This setting would also ensure that the MS will not start to measure on GSM cells immediately after reselecting a UTRAN cell. For details on these parameters qQualMin and sRatSearch, refer to Chapter “Cell Reselection Parameters from 3G to 2G” for Ericsson 3G networks. The available values for parameter fddQMin (gprsFddQMin) are one of [-20dBm, -6dBm, 18dBm, -8dBm, -16dBm, -10dBm, -14dBm, -12dBm]. Since the recommended value for qQualMin = -18 dB and sRatSearch = 4 dB, the parameter fddQMin (gprsFddQMin) should be greater than -14 dB. The lowest value that achieves this condition (-12 dB) should be selected to speed up the reselection of a UTRAN cell. Recommended Values: From the above reasoning, the recommended value of fddQOffset (fddGprsQOffset) = -infinity and fddQMin (gprsFddQMin) = -12 dB. This would allow the MS to camp on UMTS, whenever UTRAN coverage is available, irrespective of the signal strength of GSM. These settings would result in a call reselection algorithm that is based only on the quality of the UTRAN cell, since the reselection criterion 2 is always satisfied. Refer to Appendix E for a quick look at the recommended values for all 2G to 3G reselection parameters. 12.2.4. Cell Reselection to UMTS for mobiles that support RSCP evaluation For mobiles that support RSCP evaluation for reselection to 3G, an additional criterion is used to further minimize the number of ping pong cell reselections. This is achieved by T-Mobile USA, INC. Confidential Rev. 0.6 December 5, 2007 118 of 214 Ошибка! Используйте вкладку "Главная" для применения Title к тексту, который должен здесь отображаться. adding a threshold for CPICH RSCP measurements to assure a sufficient downlink signal strength, which in turn increases the possibility for the mobile to reach the network in the uplink. As per 3GPP, the additional criterion is given by CPICH RSCP > FDD_RSCP_threshold for a period of 5s, where FDD_RSCP_threshold = FDD_RSCPmin – min((P_MAX – 21 dBm), 3 dB) if FDD_RSCPmin is broadcast on the serving cell, else Qrxlevmin + Pcompensation + 10 dB, if these parameters are available, otherwise the default value of FDD_RSCPmin. Nokia 2G doesn’t support the availability of the parameter FDD_RSCPmin until BSS V13. Hence for a MS that supports RSCP evaluation, the CPICH RSCP of the 3G cell is compared to the default value of FDD_RSCPmin, which is equal to -102 dBm minus the value of min(P_MAX – 21 dBm, 3 dB). Hence for a Class 3 mobile that supports RSCP evaluation for cell reselection, a 3G cell is reselected when the RSCP > -105 dBm, in addition to the 2 criteria covered in the previous section for a time equal to 5 seconds. 12.3. Nortel 2G to Ericsson 3G Reselection The following discussion is valid for Nortel BSS version V16. GSM to UMTS Mobility is provided to UEs in Idle Mode to reselect to the 3G network. This section does not deal with UEs in connected mode. The parameter “uMTSReselectionARFCN” should be set to a nonnull value in order for the SI2quater message containing the UMTS neighbor cell information to be broadcast on the BCCH. A null value for this parameter would otherwise disable this feature and prevent reselection to UMTS. 8.1.2. UTRAN Neighbor Definitions and System Information The cell reselection does not require any specific algorithm in the GSM-BSS. The intersystem reselection only requires new piece of information to be broadcast on the BCCH by the GSMBSS: new intersystem cell reselection control parameters neighboring UMTS cell list The broadcast of parameters required for 2G to 3G reselection is done using the "System Information 2quater" message. Due to the volume of information, it may happen that the set of data exceeds the 23 byte limit for "System Information" messages sent on BCCH. In such a case, the information is segmented into several parts i.e. several instances of the System Information 2quater message, each of them tagged with an INDEX from 0 to COUNT, (COUNT + 1) being the number of segments. When the information is updated (following a change at the OMC-R), the CHANGE MARK bit is set to a new value. The System Information 2quater is scheduled either on Normal or Extended BCCH If sent on Normal BCCH: It shall be sent when TC = 5 if neither of 2bis and 2ter are used, otherwise it shall be sent at least once within any of 4 consecutive occurrences of TC = 4. If sent on BCCH Ext, it is sent at least once within any of 4 consecutive occurrences of TC = 5. T-Mobile USA, INC. Confidential Rev. 0.6 December 5, 2007 119 of 214 Ошибка! Используйте вкладку "Главная" для применения Title к тексту, который должен здесь отображаться. As a consequence, System Information 3 message has been updated in order to indicate to the mobile: Whether or not SI2quater is broadcast. If broadcast is done on Normal or Extended BCCH. The current Nortel implementation doesn’t support UMTS neighbor definitions for the serving GSM cell. Only the UMTS FDD_ARFCN is defined on a BTS level. Hence the neighboring cell scrambling codes are not broadcast in the Nortel implementation, only FDD_ARFCN will be broadcast using SI 2quater. 12.3.1. Measurements on WCDMA neighbors in idle mode The parameter “uMTSSearchLevel” can be used to enable measurements on UTRAN cells in idle mode. This parameter is broadcast on BCCH. There are four possible scenarios based on value of “uMTSSearchLevel” for measurements on UTRAN neighbors. UTRAN neighbors are measured only when the signal strength of the GSM serving cell is above the threshold set by uMTSSearchLevel. UTRAN neighbors are measured only when the signal strength of the GSM serving cell is below the threshold set by uMTSSearchLevel. UTRAN neighboring cells are always measured. UTRAN neighboring cells are never measured. Since T-Mobile camping strategy is to have the mobiles camp on the UMTS network, whenever UMTS coverage is available, this parameter uMTSSearchLevel should be set to ‘always’, so that the UTRAN cells are measured even when the GSM signal strength is good. Recommended Value: The parameter uMTSSearchLevel is recommended to be set to 7 (= always). 12.3.2. Cell Reselection to UMTS for mobiles that don’t support RSCP evaluation Instead of C2 criterion used in a GSM-only network, the multimode cell reselection uses a criteria based on RLA_C (Received Level Averages for Circuit services), which is an unweighted average of the received signal levels measured in dBm. The UE starts measuring 3G cells based on the serving GSM cell’s RLA_C with respect to the setting of the parameter uMTSSearchLevel. The following two criteria have to be fulfilled for a period of 5 seconds for a multi-RAT mobile to reselect a suitable UTRAN cell. CPICH Ec/No(n) > uMTSAccessMinLevel and CPICH RSCP(n) > RLA_Cserving + uMTSReselectionOffset The parameter “uMTSAccessMinLevel” is the Nortel implementation of the 3GPP parameter FDD_Qmin and is the minimum quality of a UTRAN cell for cell reselection. This parameter ensures a sufficient quality of the candidate UTRAN cell. T-Mobile USA, INC. Confidential Rev. 0.6 December 5, 2007 120 of 214 Ошибка! Используйте вкладку "Главная" для применения Title к тексту, который должен здесь отображаться. The parameter “uMTSReselectionOffset” is the key parameter to control the behavior of inter-system cell reselection and is the Nortel implementation of the 3GPP parameter FDD_Qoffset. It defines an offset between the signal strength of UTRAN and GSM cells. Lower values of this parameter can be used to off-load the GSM system, while higher values can be used to keep multi-RAT mobiles in the GSM system. Since the values of GSM signal strength and UTRAN CPICH RSCP are not of the same kind, the balance between the two should be set with the offset uMTSReselectionOffset. To achieve the preferred camping strategy of the mobile camping on UMTS, whenever UTRAN coverage is available, the value of uMTSReselectionOffset should be such that the UTRAN CPICH RSCP always looks better than the GSM RLA_C. A negative value of uMTSReselectionOffset would achieve this by making a UTRAN cell always look better than a GSM cell. Since this might sometimes result in cell reselection to a weak UMTS cell, the value of parameter uMTSAccessMinLevel should be set to control this. A value of uMTSAccessMinLevel such that uMTSAccessMinLevel > qQualMin + sRatSearch would prevent the mobile from making cell reselection to a weak UTRAN cell. This setting would also ensure that the MS will not start to measure on GSM cells immediately after reselecting a UTRAN cell. For details on these parameters with respect to the Ericsson RAN, refer to the Chapter “Cell Reselection Parameters from 3G to 2G”. The available values for parameter uMTSAccessMinLevel are one of [-20dB, -6dB, -18dB, 8dB, -16dB, -10dB, -14dB, -12dB]. Since the recommended value for qQualMin = -18 dB and sRatSearch = 4 dB, the parameter uMTSAccessMinLevel should be greater than -14 dB. The lowest available value that achieves this condition (-12 dB) should be selected to speed up the reselection of a UTRAN cell. Recommended Values: From the above reasoning, the recommended value of uMTSReselectionOffset = -infinity and uMTSAccessMinLevel = -12 dB. This would allow the MS to camp on UMTS, whenever UTRAN coverage is available, irrespective of the signal strength of GSM. These settings would result in a cell reselection algorithm that is based only on the quality of the UTRAN cell, since the reselection criterion 2 is always satisfied. Refer to Appendix E for a quick look at the recommended values for all 2G to 3G reselection parameters. 12.3.3. Cell Reselection to UMTS for mobiles that support RSCP evaluation For mobiles that support RSCP evaluation for reselection to 3G, an additional criterion is used to further minimize the number of ping pong cell reselections. This is achieved by adding a threshold for CPICH RSCP measurements to assure a sufficient downlink signal strength, which in turn increases the possibility for the mobile to reach the network in the uplink. As per 3GPP, the additional criterion is given by CPICH RSCP > FDD_RSCP_threshold for a period of 5s, where FDD_RSCP_threshold = FDD_RSCPmin – min((P_MAX – 21 dBm), 3 dB) if FDD_RSCPmin is broadcast on the serving cell, else Qrxlevmin + Pcompensation + 10 dB, if these parameters are available, otherwise the default value of FDD_RSCPmin. T-Mobile USA, INC. Confidential Rev. 0.6 December 5, 2007 121 of 214 Ошибка! Используйте вкладку "Главная" для применения Title к тексту, который должен здесь отображаться. Nortel 2G doesn’t support the availability of the parameter FDD_RSCPmin until BSS V17. Hence for a MS that supports RSCP evaluation, the CPICH RSCP of the 3G cell is compared to the default value of FDD_RSCPmin, which is equal to -102 dBm minus the value of min(P_MAX – 21 dBm, 3 dB). Hence for a Class 3 mobile that supports RSCP evaluation for cell reselection, a 3G cell is reselected when the RSCP > -105 dBm, in addition to the two criteria covered in the previous section for a time equal to 5 seconds. T-Mobile USA, INC. Confidential Rev. 0.6 December 5, 2007 122 of 214 Ошибка! Используйте вкладку "Главная" для применения Title к тексту, который должен здесь отображаться. 13. Capacity Management Overview The fundamental algorithms associated with capacity management are Admission Control, and Congestion Control. These algorithms depend on Ericsson’s Dedicated Monitored Resource Handling function to supervise the utilization of system resources and provide inputs to the admission and Congestion Control programs. Figure 21 illustrates Ericsson’s capacity management functions. Admission Control is invoked whenever new or additional resources are required; such as an access attempt or a soft handover request. In either of these cases, the Admission Control algorithm must confirm there are adequate system resources available to support this new request. Examples of these resources include codes, power and channel elements. Congestion Control is invoked when the utilization of resources is reaching a critical limit and this contention needs to be resolved. An example of this would be downlink power nearing one hundred percent. In this case, resources dedicated to users may be reduced, or in the extreme case removed, to eliminate congestion. Both power and orthogonal codes are a limited resource. In general, once a cell’s capacity demands consume these resources, the only option is to add a new site or a second frequency in order to offload the cell’s usage. On the other hand, channel elements are typically limited by license agreements between Ericsson and T-Mobile. Once the user capacity needs consistently approach a predefined channel element threshold, more channel elements will have to be licensed. Before getting into the details of the capacity management algorithms, this section will discuss resources that are monitored by the capacity management algorithms. Resources are consumed to support overhead channels (e.g. the Pilot channel), as well as common user channels (e.g. the FACH or HS-DSCH channels). Additionally resources are obviously made use of to support dedicated channels. The term dedicated channel (DCH) refers to a channel which is only used by a single user (e.g. a CS voice call), and consumes resources that are solely allocated to this user. Every DCH requires the use of orthogonal codes, channel elements and power. The consumption of these resources is described in the following sections. T-Mobile USA, INC. Confidential Rev. 0.6 December 5, 2007 123 of 214 Ошибка! Используйте вкладку "Главная" для применения Title к тексту, который должен здесь отображаться. Figure 21 - Overview of Ericsson Capacity Management Functions 13.1. Overview of UMTS Resources The resources that are monitored by the capacity management algorithms include power, orthogonal codes and channel elements. In addition the uplink noise rise is monitored as well. In this section, some properties of these resources, as well as some of their configurable parameters (if applicable) will be discussed. 13.1.1. DL Power All physical channels require an allocation of downlink power. The power for common channels is typically fixed and parametrically controlled. On the other hand, dedicated channels utilize power dynamically depending on RF conditions (i.e. interference) and distance from the cell (i.e. pathloss). When a dedicated channel is configured, the amount of downlink power it uses is controlled by closed loop power control. If the transport channel’s configured Block Error Rate (BLER) is not met, outer loop power control raises the SIR target, which results in increased DL power. If the maximum power for a given DCH was not limited by some mechanism, it is possible that a majority of the cell’s power could be consumed by a single user. In order to curtail the amount of power that a single user can use, a maximum downlink transmitted code power is defined. This is defined per cell, by use of the interpolation curve shown in Figure 22 - Bit Rate (bps) versus Maximum Downlink Transmitted Code Power. As the figure illustrates, the curve is defined by six parameters: minPwrMax; minimumRate; interPwrMax; interRate; maxPwrMax; maxRate. In this manner, the maximum power for a DCH can be limited based on its data rate, and a single user can not consume an excessive amount of power. For data rates that fall between these parameter data points, interpolation is used. As an example, the maximum power a 12.2 kbps voice call can use is less than the maximum power a 384 kbps PS radio bearer can use. Since these two dedicated channels use a 128 bit code and an 8 bit code respectively, the processing gain of the PS call is approximately 12 dB less than the CS call. Therefore it is logical that the PS call will need more power than the CS call to maintain the same coverage within the cell. In addition to this power limiting effect described above, soft and softer handover also add to the consumption of downlink power. Assuming that the average soft handover factor was 1.8 radio links per user, each user would require power from 1.8 cells, on an average (excluding the HS-PDSCH). T-Mobile USA, INC. Confidential Rev. 0.6 December 5, 2007 124 of 214 Ошибка! Используйте вкладку "Главная" для применения Title к тексту, который должен здесь отображаться. Figure 22 - Bit Rate (bps) versus Maximum Downlink Transmitted Code Power 13.1.2. Received Total Wideband Power All transmissions in the uplink contribute to the increase in uplink noise, or Received Total Wideband Power (RTWP). To limit the interference a UE can create, the parameter maxTxPwrUl is used to control the maximum power the UE can transmit. This parameter is typically configured to be 24 dBm for a Class 3 UE. 13.1.3. OVSF Codes Every dedicated channel that is configured utilizes an orthogonal code, or an Orthogonal Variable Spreading Factor (OVSF), from the code tree. In addition, some common channels also consume OVSF codes. Unfortunately, the number of available codes is limited within each cell. Figure 23 illustrates a portion of the OVSF code tree (reference 3GPP TR 25.292). As the figure shows, the number of available codes is equal to the number of bits in the code (e.g. there are two 2 bit codes, four 4 bits codes, etc.). In addition, once a specific code is allocated, other codes on the same branch of the code tree become unavailable for use. For example, if the 4 bit code (1,1,-1,-1) is assigned, all preceding codes on the same branch, such as (1, 1), are unusable. In addition, all the codes the follow on the same branch are unusable as well. This would include (1,1,-1,-1, 1,1,-1,-1), (1,1,-1,-1, -1,-1,1,1), as well as all the 16, 32, 64, 128, and 256 bit codes that are decedents of this 4 bit code. These codes are unusable because the orthogonal properties of OVSF codes do not exist between parent codes and their descendants. T-Mobile USA, INC. Confidential Rev. 0.6 December 5, 2007 125 of 214 Ошибка! Используйте вкладку "Главная" для применения Title к тексту, который должен здесь отображаться. c4,1 = (1,1,1,1) C8,1 C8,2 c4,2 = (1,1,-1,-1) C8,3 C8,4 c2,1 = (1,1) c1,1 = (1) Unusable Codes c4,3 = (1,-1,1,-1) Allocated Code c2,2 = (1,-1) c4,4 = (1,-1,-1,1) SF = 1 SF = 2 Unusable Codes SF = 4 Figure 23 – OVSF Code Tree Based on the properties of OVSF codes discussed above, it is apparent why codes can be consumed so quickly. Table 6 provides a sample of downlink code utilization of miscellaneous user applications. Because the descendants of codes become unusable, a user utilizing an 8 bit OVSF for a 384 kbps session reduces the pool of available 128 bit codes by 16 codes. This has a direct impact on 128 bit code availability for 12.2 kbps AMR voice calls. User Application 5.9 AMR CS 12.2 AMR CS HSDPA Code DCH 64k PS DCH 128k PS DCH 384k PS DL Code Length 256 bit 128 bit 16 bit 32 bit 16 bit 8 bit Available Codes 256 128 16 32 16 8 Table 6 - Code Utilization of Misc. User Applications In addition to this code limiting effect described above, soft and softer handover also add to the consumption of OVSF codes. Assuming that the average soft handover factor was 1.8 radio links per user, each user would require 1.8 codes on an average (excluding the HSPDSCH). 13.1.4. RBS Channel Elements The term channel element (CE) is used to quantify processing power in the Node B chipset. The number of channel elements available for users is dependant on hardware configuration, and number of licensed channel elements enabled. In general, channel elements for the common and overhead channels are included with the Node B, and do not take from the pool of licensed channel elements. In the Ericsson Node B, channel elements for uplink are located on the Random Access and Receiver (RAX) board. The total number of CE available is dependant on the type of RAX board, as well as the number of RAX boards that are installed in the Node B. As an example, the high capacity 3206 RBS can contain 8 RAX R2 boards with 128 channel element each, for a total of 1024 channel elements. T-Mobile USA, INC. Confidential Rev. 0.6 December 5, 2007 126 of 214 Ошибка! Используйте вкладку "Главная" для применения Title к тексту, который должен здесь отображаться. The channel elements for the downlink are located on the transmitter card. The total number of CE available is dependant on the number of transmitter boards installed. The 3206 RBS can be configured with 2 transmitter cards with 256 channel elements each, for a total of 512 channel elements. The number of channel elements utilized by a UE is dependant on several factors. This includes the RAB type used, as well as the soft/softer handover state of the UE. Table 7 provides some examples of downlink and uplink CE usage based on RAB type. As the table shows, RABs with high data rates require additional processing and therefore more channel elements. When a UE is in soft handover, the CE requirement obviously increases since multiple Node Bs are involved. However, when a UE is in softer handover, the same CE will process the multiple radio links within the same Node B. CS/PS RAB Speech 64 kbps 128 kbps 384 kbps Downlink (CE) 1 2 4 8 Uplink (CE) 1 4 8 16 Table 7 - Channel Element Consumption by RAB Type 13.2. Common Resource Utilization In general, capacity management is typically focused on controlling resources for dedicated channels. However, common channels also consume resources and affect the pool of resources available for dedicated channels. In order to better understand how capacity management operates, this section will review the utilization of common resources. 13.2.1. Overhead and Common Channels The term overhead channels refer to the set of channels that are required for the network to operate, however they are not used to relay user plane data (i.e. a CS call or PS data). Common channels, such as the Forward Access Channel, do have the capability to deliver user specific data over a common resource. All of these channels require the use of orthogonal codes, channel elements, and downlink power. In general, channel elements for the overhead channels are included with the Node B, and do not take from the pool of licensed channel elements. The consumption of the downlink power and codes resources, for each of the overhead and common physical layer channels, is described in the following sections. Primary Common Pilot Channel The Primary Common Pilot Channel (CPICH), also known has the pilot, is an overhead channel that is constantly broadcast. The CPICH utilizes a 256 bit orthogonal code, and its power is configured by the parameter primaryCpichPower. Typically the CPICH is set to approximately 10% of the cell’s output power capability. Because this parameter is set at the antenna reference point (see figure below), the insertion loss of the feeder lines, and other miscellaneous coupler losses should be considered when setting this parameter. As an example, assume the Node B has a 40 watt (i.e. 46 dBm) power amplifier (PA), and the total insertion loss was 3 dB between the Node B and the antenna reference point. If the desired CPICH power was 10% of the total PA power, primaryCpichPower would be T-Mobile USA, INC. Confidential Rev. 0.6 December 5, 2007 127 of 214 Ошибка! Используйте вкладку "Главная" для применения Title к тексту, который должен здесь отображаться. set to 33 dBm. This based on a maximum Node B output of 43 dBm (46 -3 = 43) at the antenna reference point; and 10 % of 43 dBm is 33 dBm. Antenna Reference Point Node B Figure 24: Antenna Reference point Primary Common Control Physical Channel The Broadcast Channel (BCH) is used to transmit system and cell specific information to idle UEs. The BCH is mapped to the Primary Common Control Physical Channel (P-CCPCH). The P-CCPCH utilizes a 256 bit orthogonal code, and its power is configured relative to the CPICH by the parameter bchPower. Secondary Common Control Physical Channel The Paging Channel (PCH) and the Forward Access Channel (FACH) transport channels are mapped to the Secondary Common Control Physical Channel (S-CCPCH). It is possible to map the PCH and the FACH to a single S-CCPCH, or to map each of them to a unique SCCPCH. Typically the S-CCPCH with the FACH mapped to it will have a 64 bit orthogonal code, while a stand alone PCH mapped S-CCPCH only requires a 128 bit orthogonal code. The power for the PCH is controlled by the parameter pchPower; and the maximum power for FACH is configured by maxFach1Power. Both of these parameters are configured relative to the CPICH power. If a second FACH channel is configured, the power is configured with the parameter maxFach2Power. Primary and Secondary Synchronization Channels The Primary Synchronization Channel (P-SCH) and Primary Synchronization Channel (S-SCH) are used by the UE to obtain slot and frame synchronization. The P-SCH and S-SCH only exist at the physical layer, and do not consume orthogonal codes. The power for the PSCH, and the S-SCH are configured relative to the CPICH power by the parameters primarySchPower, and secondarySchPower respectively. Paging Indication Channel The Paging Indication Channel (PICH) is used by the network to instruct the UE to monitor the Paging Channel for a possible page. The PICH was introduced into the 3GPP standard to improve UE battery life. This channel only exists at the physical layer and does not T-Mobile USA, INC. Confidential Rev. 0.6 December 5, 2007 128 of 214 Ошибка! Используйте вкладку "Главная" для применения Title к тексту, который должен здесь отображаться. consume any orthogonal codes. The power for the PICH is configured relative to the pilot by the parameter pichPower. Acquisition Indication Channel The Acquisition Indication Channel (AICH) is used to acknowledge random access preambles when the UE is attempting to access the network. The AICH only exists at the physical layer and does not consume any orthogonal codes from the code tree. The power for the AICH is configured relative to the pilot by the parameter aichPower. 13.2.2. Maximum Downlink Transmission Power The maximum downlink power transmitted from a cell can be limited by the configurable parameter maximumTransmissionPower. As described earlier in the section, the reference point for this parameter is at the antenna reference point. This parameter allows limiting the power to a level lower than the actual power available, which is reported by the Node B as maxDlPowerCapability. This reported power available is derived from the maximum PA output power, less the insertion losses between the PA and the antenna reference point. If the parameter maximumTransmissionPower is configured to a value that differs from the maxDlPowerCapability reported by the Node B, the lesser of the two values will be utilized. 13.2.3. HSDPA Resources High Speed Downlink Packet Access (HSDPA) uses the High Speed Physical Downlink Shared Channel (HS-PDSCH) to deliver user data to HS capable UEs. This channel utilizes 16 bit orthogonal codes, as well as the remaining unused power in the cell. The number of orthogonal codes utilized for HS is controlled by multiple parameters, and will be described below. The parameter numHsPdschCodes is used to reserve a fixed number of 16 bit orthogonal codes for use by the HSDPA scheduler. In this manner, HS users are guaranteed codes regardless of DCH resource requests. However, these reserved codes will be unavailable for DCH resource requests, even if there are not any HSDPA users in the cell. It is possible to dynamically allocate more HS-PDSCH codes by enabling the HSDPA Dynamic Code Allocation algorithm by setting the parameter dynamicHsPdschCodeAdditionOn to TRUE. This algorithm will periodically assess the use of 16 codes every second. If there are any unused codes available, they will be temporarily made available to the scheduler. However, if there is a need for codes to support DCH requests, they will be immediately deallocated from the scheduler (excluding those reserved by the parameter numHsPdschCodes). The maximum number of simultaneous codes used by the HSPDSCH at any give time is limited by the configurable parameter maxNumHsPdschCodes. Care should be taken when configuring the parameter numHsPdschCodes. If the value is set too high, the potential of blocking DCH users (e.g. CS calls), is increased. However, setting this value too low may starve HS cell throughput if DCH traffic is high. This parameter is configured at the cell level and therefore can be tuned to meet user requirements. In addition to HS-PDSCH, the High Speed Shared Control Channel (HS-SCCH) requires a 128 bit orthogonal code. The parameter numHsScchCodes controls the number of HS-SCCH broadcast per cell. The number of HS users that can be simultaneously allocated resources T-Mobile USA, INC. Confidential Rev. 0.6 December 5, 2007 129 of 214 Ошибка! Используйте вкладку "Главная" для применения Title к тексту, который должен здесь отображаться. by the scheduler per 2 ms Transport Time Interval (TTI) is directly related to the number of HS-SCCH broadcast (maximum is 4). If a cell has a high HS traffic load, and a low DCH load, it may be beneficial to increase the number of broadcast HS-SCCH. However, if the overall cell throughput is limited due to power, HS-PDSCH codes or transport limitations, consuming another 128 bit code to support an additional HS-SCCH is unneeded. 13.3. Dedicated Monitor Resource Handling The utilization of system resources is constantly changing based on several factors. These factors include the number of users, the RF conditions each user is experiencing, the applications they are using, their soft handover state, etc. Because of this dynamic use of resources, the Ericsson UTRAN monitors the most critical resources. The admission and Congestion Control algorithms depend on Ericsson’s Dedicated Monitored Resource Handling function to supervise the utilization of system resources and provide inputs to the admission and Congestion Control programs. 13.3.1. Downlink Channelization Code Monitor The Downlink Channelization Code Monitor tracks the usage of OVSF codes. The fraction of code tree usage is reported to the capacity management programs. Both common and dedicated OVSF code usage is accounted for when calculating the fraction of code tree usage. This monitor is used by Admission Control to reserve OVSF codes for handover admission requests. 13.3.2. Histogram Monitor The Histogram Monitor is used to track specific events that impact resource utilization. This includes OVSF codes usage, HSDPA users and the number of users in compressed mode. Enhanced Uplink or HSUPA is not currently addressed in this version of the Feature Guide and hence E-DCH resources are not covered in this discussion. These specific events are described in the following sections: DL Spreading Factor Usage This function of the histogram monitor tracks the downlink OVSF code use on per spreading factor (SF) length basis. This is unlike the Downlink Channelization Monitor which tracks the fraction of code tree usage. The Histogram Monitor reports the usage of SF8, SF16 and SF32 to Admission Control so that the use of these spreading factors can be limited. As described before, the descendants of allocated codes become unavailable for use. Because of this fact, it is apparent that limiting the allocation of these codes may be necessary. It is important to note that the histogram monitor does not include the number of SF16 OVSF codes reserved for HSDPA by the parameter numHsPdschCodes. Therefore care should be taken when configuring the Admission Control parameter limiting the number of SF16 codes. UL Spreading Factor Usage This function of the histogram monitor tracks the uplink spreading factor usage of all the users in the cell. The Histogram Monitor reports the usage of SF4, S8 and SF16 to Admission Control so that the use of these spreading factors can be limited. The reason for limiting the use of these codes in the uplink is not because of code usage, rather it is the additional uplink noise caused by these codes. Because these OVSF codes exhibit a lower T-Mobile USA, INC. Confidential Rev. 0.6 December 5, 2007 130 of 214 Ошибка! Используйте вкладку "Главная" для применения Title к тексту, который должен здесь отображаться. processing gain, the amount of uplink power required increases resulting in a rise of RTWP. Because of this fact, it is apparent that limiting the allocation of these codes may be necessary. Number of Compressed Mode Radio Links Compressed Mode (CM) is used to allow a UE to make inter-frequency measurements. In order to make these measurements, gaps are created in the uplink and downlink physical frame. For CS users, these gaps are created by dividing the spreading factor by two (i.e. SF/2). This reduced processing gain due to halving of the spreading factor results in increased RTWP. Therefore, the number of CM users is monitored and reported to Admission Control. Number of HSDPA Users Allocated to the HS-DSCH The number of HSDPA users allocated to the HS-DSCH is monitored and reported to Admission Control. If the number of HSDPA users becomes excessive, the HSDPA Scheduler’s ability to operate efficiently may be impacted. 13.3.3. Downlink Transmitted Carrier Power The downlink transmitted carrier power is obviously a limited resource. The use of this resource must be monitored to provide input to the Admission Control and Congestion Control algorithms. The amount of power (non-HS) used at any given time is constantly changing based on the number of users; their radio bearer type (i.e. spreading factor), distance from site, and RF conditions. Two mechanisms are used by the Node B to report the total transmitted carrier power of the cell (non-HS) to the RNC. Periodic reports are used by Admission Control to determine if admission requests, soft handover requests, and radio link reconfiguration requests will be granted or denied. In addition, event based measurements are used in extreme cases when the total downlink power usage exceeds a predefined threshold and Congestion Control must offload users. Once the carrier power drops below a second predefined threshold, another event based measurement is sent to indicate that the congestion condition has been resolved. The details of these two measurement types are provided in the following sections. Periodic Measurement Report When a cell is integrated and enabled in the UTRAN, the controlling RNC utilizes NBAP messaging to initiate periodic measurement reports for the downlink transmitted carrier power. These periodic reports are filtered in the RNC, and tracked by the Downlink Transmitted Carrier Power Monitor. In addition to the reported carrier power, this monitor also estimates power utilization for pending radio links that have been granted admission, but may have not had time to be implemented. These estimates decay over time and allow the Admission Control algorithm to handle new requests while previously admitted radio links are being set up. Equation below illustrates how the monitor derives the downlink transmitted carrier power. P_Monitore d P_Measure_ Filter f P_Estimate _RL Equation 6 - Monitored Downlink Carrier Power where: T-Mobile USA, INC. Confidential Rev. 0.6 December 5, 2007 131 of 214 Ошибка! Используйте вкладку "Главная" для применения Title к тексту, который должен здесь отображаться. power P_Monitored Total monitored power P_Measure_Filter Filtered periodic measurement of downlink transmitted carrier f(P_Estimate_RL) Sum of all decaying estimates of recently admitted radio links The estimated power for recently admitted radio links is derived by providing a scaling factor based on the type of radio link; and multiplying it to the maximum transmitted code power for that type of radio link. This scaling factor is based on characteristics for that specific type of radio link (i.e. activity factor, discontinuous transmission, etc.). The derivation of this estimated radio link power is provided in Equation below. P_Estimate _RL F * P_Max_RL Equation 7 - Estimated Radio Link Power Where: link P_ Estimate_RL Estimated power of the recently admitted radio link F Scaling factor for the specific type of radio link P_Max_RL Maximum transmitted code power for the specific type of radio Event Based Measurement Report Event based measurement reports are also set up by NBAP signaling when a Node B is integrated into the network. The thresholds for the (downlink transmitted carrier power) event based measurements are configured by Congestion Control parameters. These parameters define at what carrier power level congestion is triggered, and at what power level congestion is resolved. Event based measurement reports are sent to the RNC when the total downlink power of the cell exceeds the congestion threshold; and an additional event based measurement report is sent once the carrier power drops below the congestion resolution threshold. The details regarding these parameters, as well as the Congestion Control algorithm, will be covered in later sections. 13.3.4. ASE Monitor The Air Interface Speech Equivalent (ASE) is an Ericsson specific term used to quantitatively describe the interference caused by a single 12.2 AMR speech call (excluding the SRB). The term is used for both the uplink and downlink. As an example, a PS 384 has an ASE equal to 40.27 in the downlink. This implies that a 384 kbps downlink radio bearer, including its SRB, contributes 40.27 times the amount of interference in the downlink than a single 12.2 kbps speech call does. Some ASE values for some sample radio connections are provided in the table below. Note that the values provided below and utilized by the capacity control algorithm account for the 0.61 ASE load contributed by the 3.4 kbps SRB. The number of uplink ASEs credited to a cell, from a specific UE, is dependant on the soft handover state of that UE. The ASE load for a cell is divided by the number of radio links in the active set. If a UE is in 2 way soft handover, ASE load for each cell will be halved. This is because of the reduced uplink interference due to soft handover gain. Radio Connection Type Uplink ASEs Downlink ASEs T-Mobile USA, INC. Confidential Rev. 0.6 December 5, 2007 132 of 214 Ошибка! Используйте вкладку "Главная" для применения Title к тексту, который должен здесь отображаться. SRB AMR 12.2 CS64 PS16/64 (Streaming) 2.43 1.61 11.10 4.74 2.43 1.61 11.10 10.59 PS64/384 MultiRAB (speech+PS64/64) 8.32 9.32 40.27 9.32 PS64/HS 8.32 0.61 Table 8 - ASE Value per Radio link 13.3.5. RTWP Monitor All transmissions in the uplink contribute to the increase in uplink noise, or Received Total Wideband Power (RTWP). The RTWP monitor tracks the noise rise by mean of event based measurement reports configured via NBAP signaling. The thresholds for the RTWP event based measurements are configured by Congestion Control parameters. These parameters define at what uplink noise level congestion is triggered, and at what noise level congestion is resolved. Event based measurement reports are sent to the RNC when the RTWP of the cell exceeds the congestion threshold; and an additional event based measurement report is sent once the RTWP drops below the congestion resolved threshold. The details regarding these parameters, as well as the Congestion Control algorithm, will be covered in later sections. 13.3.6. RBS Hardware Monitor The RBS Hardware Monitor tracks both uplink and downlink CE utilization. As described previously, the term channel element (CE) is used to quantify processing power in the Node B chipset. The number of channel elements available for users is dependant on hardware configuration and the number of licensed channel elements enabled. The Node B’s CE consumption is tracked as a percentage, based on the number of dedicated radio links in the cell, the type of radio link, and the amount of available licensed channel elements. The admission thresholds for both uplink and downlink CE usage are configured by Admission Control parameters. The details regarding these parameters, as well as the Admission Control algorithm, will be covered in the next section. 13.4. Services Class and Setup Type Service class and setup type of a specific user are used to prioritize the allocation of dedicated resources, and the retention of resources when the system becomes congested. 13.4.1. Service Class The service classes are divided and prioritized into the four specific groups: 1. Guaranteed-emergency: This group includes any calls that are considered to be an emergency call. 2. Guaranteed: This group includes the “conversational” and “streaming” traffic classes, as described in 3GPP TS 23.107. Both of these traffic classes are characterized as “real T-Mobile USA, INC. Confidential Rev. 0.6 December 5, 2007 133 of 214 Ошибка! Используйте вкладку "Главная" для применения Title к тексту, который должен здесь отображаться. time”. Examples of applications that use the “conversational” and “streaming” traffic classes are voice calls and streaming video respectively. 3. Guaranteed-HS: This group includes the HS configurations that require an associated dedicated channel (e.g. Signaling Radio Bearer) to be configured. Enhanced Uplink connections are also included in this service class. 4. Non-guaranteed: This group includes the “background” and “interactive” traffic classes, as described in 3GPP TS 23.107. Both of these traffic classes are characterized as “best effort”. Examples of applications that use the “background” and “interactive” traffic classes are web browsing and email respectively. It should be obvious that an emergency call will be prioritized over the other three service classes. In addition, a “real time” traffic class ranks higher that a “best effort” class. The HS class is third in the list because it can more effectively utilize available resources (e.g. codes and power) than a full fledged PS dedicated channel. 13.4.2. Setup Type The setup type is divided and prioritized into two groups: 1. Handover: This setup type refers to requests for resources when a connection exists, and an additional radio link is requested to support soft handover. 2. Non-handover: This setup type refers to requests for resources when there is no existing connection (i.e. a new call setup request). The thought behind this prioritization is that a user denied admission to setup a new call will be less “irritated” than a user that drops a call due to a failed handover. In addition, a denied handover request is likely to result in a degradation of resources in the target cell. This is due to the additional uplink and downlink interference the target cell will be subjected to if it can not power control the UE as it enters the target cells coverage area. T-Mobile USA, INC. Confidential Rev. 0.6 December 5, 2007 134 of 214 Ошибка! Используйте вкладку "Главная" для применения Title к тексту, который должен здесь отображаться. 14. Admission Control Admission Control is invoked whenever new or additional dedicated resources are required; such as an access attempt, a soft handover request, or a radio bearer reconfiguration request. In either of these cases, the Admission Control algorithm must confirm there are adequate system resources available to support this new request. Examples of these resources include codes, power and channel elements. In the case of an access attempt, the Admission Control algorithm may be invoked multiple times. When a RRC Connection Request message is received on the RACH, the corresponding RRC Connection Setup Complete message typically instructs the UE to setup a dedicated SRB. Regardless if the request is for CS, PS or simply a reselection, Admission Control must confirm resources are available to support the requested SRB. In addition, the algorithm is invoked again once the RNC receives a RAB Assignment Request from the core network. In the case of CS call, the SRB is reconfigured to include the AMR transport channels; and resources must be confirmed. If the RAB Assignment Request is for PS Services, Admission Control must confirm that DCH or HS resources are available. In the case of an ongoing DCH PS session, a radio bearer reconfiguration may be requested by the channel switching algorithm to support higher user throughput. Since this reconfiguration would require additional codes, power, and channel elements, Admission Control would obviously be triggered. As mentioned previously, the admission request may also originate from a UE requesting soft handover. Although these types of requests do take priority over new call setups, the Admission Control algorithm must confirm the cell can handle the additional load. In order to assess the resource availability, every admission request must include the following information: Setup type (e.g. handover/non-handover) Service class (e.g. non-guaranteed, guaranteed, guaranteed-hs, or guaranteedemergency) Additional requested downlink transmitted carrier power Additional requested uplink and downlink ASEs Additional requested compressed mode resources The following sections will describe the different aspects of the Admission Control algorithm, and the parameters and counters associated with them. In addition, impacts of parameter changes to system performance will be discussed. 14.1. Enhanced Soft Congestion Enhanced soft congestion is a feature of Admission Control that reduces the resource utilization of existing non-guaranteed users, when admission thresholds have been reached. In this manner other users can be admitted into the cell, by down switching existing nonguaranteed users. Resources requirements that can trigger soft congestion include downlink transmitted carrier power, downlink OVSF codes, and uplink/downlink channel elements. T-Mobile USA, INC. Confidential Rev. 0.6 December 5, 2007 135 of 214 Ошибка! Используйте вкладку "Главная" для применения Title к тексту, который должен здесь отображаться. When soft congestion is triggered by a new admission request, the request is conditionally blocked. If a non-guaranteed user can be down switched to free the resource under contention, then the new admission will be granted. If the down switching of the existing non-guaranteed users does not free up the required resources, the new admission request will be denied. When the conditionally blocked access attempt is a guaranteed or guaranteed-HS service class, the higher rate non-guaranteed connections will be reduced prior to the lower rate non-guaranteed connections. Therefore, existing 384 kbps connections will be down switched prior to existing 128 kbps connections being down-switched. Existing 64 kbps radio links are never down switched as a result of soft congestion. 14.2. Downlink OVSF Code Usage Admission The Downlink Channelization Code Monitor tracks the percentage of downlink OVSF codes utilized. In order to reserve some of these codes for soft handover requests, there is a code blocking threshold for non-handover requests. As seen in the figure below the admission policy for the DL OVSF code usage is defined as follows: The Non-guaranteed, non-handover admission requests can be granted when the resource usage exceeds the dlCodeAdm – beMarginDlCode level if it is possible to free resources by downswitching a non-guaranteed user with a lower spreading factor than the spreading factor being requested in the admission request otherwise they are blocked when the resource usage exceeds the dlCodeAdm beMarginDlCode level. Guaranteed, non-handover and guaranteed-hs, non-handover admission requests can be granted when the resource usage exceeds the dlCodeAdm level if it is possible to free resources by downswitching a non-guaranteed user, otherwise they are blocked when the resource usage exceeds the dlCodeAdm level. It is important to note that the Downlink Channelization Code Monitor does not account for 16 bit OVSF codes utilized by the HS-DSCH. Therefore if codes are statically allocated for HS, by means of the parameter numHsPdschCodes, the allocation of these 16 bit codes for HS will not be tracked by the code monitor. T-Mobile USA, INC. Confidential Rev. 0.6 December 5, 2007 136 of 214 Ошибка! Используйте вкладку "Главная" для применения Title к тексту, который должен здесь отображаться. Figure 25 - Blocking Thresholds for Downlink OVSF Codes 14.3. Histogram Admission Histogram Monitor tracks OVSF code usage, as well as the number of users utilizing HSDPA, E-DCH, and compressed mode. This information is used by Admission Control to determine if these dedicated resources will be allocated or denied. 14.3.1. Downlink OVSF Code Admission High data rate PS users utilizing downlink dedicated resources can quite quickly consume system resources. For example a PS user with a 384k RAB in the downlink requires an 8 bit OVSF. This is 12.5% of the code tree. In fact, the code usage will exceed 12.5% if the soft handover factor is taken into account. For this reason, Ericsson’s Admission Control algorithm allows to parametrically limit the admission of non-guaranteed users based on downlink code usage. As illustrated in the figure below, the parameters sf8Adm, sf16Adm, and sf32Adm set the admission limit for these non-guaranteed users based on 8 bit, 16 bit and 32 bit downlink OVSF codes usage respectively. In addition, the downlink code utilization of high consumption streaming users can be limited with the parameter sf16gAdm, which sets the admission limit for guaranteed users requesting 16 bit OVSF codes. However, as previously stated, any 16 bit codes statically allocated to HSDPA by the parameter numHsPdschCodes will not considered by the Histogram Monitor. Therefore, the configured value of numHsPdschCodes should be considered when the parameter sf16Adm and sf16gAdm is determined. T-Mobile USA, INC. Confidential Rev. 0.6 December 5, 2007 137 of 214 Ошибка! Используйте вкладку "Главная" для применения Title к тексту, который должен здесь отображаться. Figure 26 – Downlink OVSF Admission Limits for Non-guaranteed Users 14.3.2. Uplink OVSF Code Admission Unlike the downlink case, uplink OVSF codes are not typically a limited resource because each UE has the complete OVSF code tree for its disposal. However, since each UE uses a unique uplink scrambling code, the uplink transmissions of these different UEs lack any orthogonal properties. Therefore, every UE uplink transmission contributes to uplink noise rise, or RTWP. This problem is compounded when 4 bit, 8 bit and 16 bit uplink OVSF codes are utilized by dedicated users. Because these codes have a low processing gain, they can contribute a higher amount of uplink noise when compared to higher order OVSF codes like the 64 bit code used for uplink 12.2k AMR. In order to limit this uplink noise rise, the parameters sf4AdmUl, sf8AdmUl, and sf16AdmUl set the admission limit for nonguaranteed users based on 4 bit, 8 bit and 16 bit uplink OVSF codes usage respectively. For the guaranteed users requesting high speed streaming services, the admission threshold for uplink OVSF codes is controlled by the parameter sf8gAdmUl. 14.3.3. HSDPA Admission HSDPA utilizes the HS-DSCH, which is a shared resource. Although HSDPA is a highly efficient means to deliver data to PS users, the number of simultaneous users monitoring the HS-SCCH should be limited. Excessive users monitoring the same HSDPA cell not only tax the scheduler’s processing capabilities, they can also impact the end user throughput and system capacity. At a first glance, it may seem advantageous to not limit HSDPA users, thus maximizing cell throughput. However, one must also consider the effect to system capacity. Currently, for every user that is assigned to a HSDPA serving cell, that user requires a downlink dedicated physical channel (DPDCH/DPCCH) to support RRC/NAS signaling and power control of the subsequent UL dedicated channel. This physical channel requires power, and a 256 bit downlink OVSF code. Although this may seem trivial, one must remember that for every HSDPA user assigned a 256 bit OVSF code to support this downlink DCH, a 16 bit code becomes unavailable for use by the HS-DSCH. As users continue to be added to a HSDPA serving cell, a point of diminishing returns is reached as 16 bit codes for the HS-DSCH become unavailable. In addition, each HSDPA user is assigned a High Speed Dedicated T-Mobile USA, INC. Confidential Rev. 0.6 December 5, 2007 138 of 214 Ошибка! Используйте вкладку "Главная" для применения Title к тексту, который должен здесь отображаться. Physical Control Channel (HS-DPCCH) in the uplink. Each of these dedicated uplink channels contribute to uplink noise rise, thus limiting system capacity. Optimizing the parameters related to state changes, to efficiently de-allocate HS resources from idle PS users, is the best way to maximize user access to HSDPA resources. Admission requests for HSDPA connections are limited by the parameter maxNumHsdpaUsers. However, this is only applied to admission requests for new HSDPA connections. If an admission request is originated from an existing HSDPA connection, as a result of mobility, the request is not blocked based on maxNumHsdpaUsers. That being the case, the mobility of HSDPA users should be considered when configuring this parameter. 14.3.4. Compressed Mode Admission Compressed mode is used when it becomes necessary for the UE to make inter-frequency or inter-system measurements when the currently utilized UMTS frequency’s RF coverage deteriorates. In order to make these measurements, it is necessary to create gaps in the 10 millisecond physical frames. For circuit switched users, this gap is created by reducing the typically used downlink and uplink spreading factor by half (e.g. SF/2). For example, a 12.2 kbps AMR voice call typically utilizes a 128 bit and 64 bit OVSF code for the downlink and uplink respectively. To create a gap, these OVSF codes are reduced to 64 bits and 32 bits for the downlink and uplink. This impacts system capacity because of reduced downlink code availability, increased downlink power, and increased uplink noise rise. The increased downlink power and uplink noise rise are a result of the lost processing gain caused when the downlink and uplink codes are halved. Because of the capacity impacts due to compressed mode, the number of compressed mode radio links allowed in a cell at any given time is controlled by the parameter compModeAdm. 14.4. Transmitted Downlink Carrier Power Admission The transmitted downlink carrier power is limited by power rating of the Node B’s power amplifier, as well as the various insertion losses between the Node B and the antenna reference point (e.g. downlink feeder lines, duplexers, diplexers, etc.). The maximum downlink transmission power of the Node B is defined by the configurable parameter maximumTransmissionPower; unless the maximum power capability reported by the Node B (maxDlPowerCapability) is less. This maximum downlink transmission power is used to define relative thresholds for admission based on transmitted downlink carrier power as reported by the Histogram Monitor. The downlink carrier power admission policy is simply defined by three thresholds. These thresholds are set by the configurable parameters pwrAdm, pwrAdmOffset, and beMarginDlPwr. Figure below illustrates how these parameters are utilized to define the three admission thresholds. It should be noted that the values provided in this figure are the default values. The parameter pwrAdm is defined as a percentage of the maximum downlink transmission power. On the other hand, parameters pwrAdmOffset and beMarginDlPwr are percentages relative to pwrAdm. T-Mobile USA, INC. Confidential Rev. 0.6 December 5, 2007 139 of 214 Ошибка! Используйте вкладку "Главная" для применения Title к тексту, который должен здесь отображаться. DL Transmitted Carrier Power maximumTransmissionPower 100 % Power Reserved for Power Control pwrAdm + pwrAdmOffset 85 % Admit: (Guaranteed/Handover) & (All Guaranteed-HS) 75 % Admit: (All Guaranteed) & (Non-Guaranteed/Handover) & (All Guaranteed-HS) 65 % pwrAdm pwrAdm - beMarginDlPwr Admit: (All Guaranteed) & (All Non-Guaranteed) & (All Guaranteed-HS) Figure 27 - Admission Thresholds for Downlink Transmitted Carrier Power (default values) The first admission threshold is defined by subtracting beMarginDlPwr from pwrAdm (i.e. pwrAdm- beMarginDlPwr). This defines the maximum carrier power allowed to grant admission to new best effort DCH users. If the downlink carrier power is greater than this threshold, an admission request by a nonguaranteed/non-handover service class user will trigger enhanced soft congestion. The second admission threshold is defined by the parameter pwrAdm. This defines the maximum carrier power allowed to grant admission for guaranteed users requesting a new connection, as well as existing best effort DCH users requiring soft handover. If the downlink carrier power is greater than the pwrAdm threshold, an admission request by a guaranteed/non-handover service class user, or a non-guaranteed/handover service class user, will trigger enhanced soft congestion. The final admission threshold is defined by adding pwrAdmOffset to pwrAdm (i.e. pwrAdmOffset+ PwrAdm). This defines the maximum carrier power allowed to grant admission for guaranteed users requesting soft handover, as well as both new and existing HS connections requiring the cell to become the new HS serving cell. If the downlink carrier power is greater than this threshold, an admission request by a guaranteed/handover service class user, or a guaranteedHS service class user, will trigger enhanced soft congestion. The remaining power (i.e. greater than pwrAdmOffset+ PwrAdm) is reserved for power control, to support existing users served by the cell. Once a user is admitted to the cell, their mobility, or changing RF conditions, may require additional power to support the T-Mobile USA, INC. Confidential Rev. 0.6 December 5, 2007 140 of 214 Ошибка! Используйте вкладку "Главная" для применения Title к тексту, который должен здесь отображаться. quality of the connection. If this reserved carrier power did not exist, Congesting Control would be triggered due to minor fluctuations in user downlink power requirements. Figure below provides an alternative view of the admission thresholds based on downlink carrier power usage, as well as the trigger points for enhanced soft congestion. As the figure illustrates, the applicable threshold is dependant on the user’s service class and setup type. When soft congestion is triggered by any non-guaranteed service class, only existing best effort connections with rates greater than the conditionally blocked rate will be considered for rate reduction. For example, an admission request for a best effort 128 kbps connection will only impact existing 384 kbps best effort connections when enhanced soft congestion is triggered. Figure 28 – Admission Policy for Downlink Transmitted Carrier Power 14.5. Air Interface Speech Equivalents Admission The Air Interface Speech Equivalent (ASE) is an Ericsson specific term used to quantitatively describe the interference caused by a single 12.2 AMR speech call (excluding the SRB). The term is used for both the uplink and downlink. The ASE Monitor reports both uplink and downlink ASE usage to the Admission Control Algorithm. 14.5.1. Uplink ASE Admission Uplink ASE admission thresholds are a mechanism that can be utilized to limit uplink noise rise, which results in reduced uplink coverage. This dynamic change in uplink coverage is known as cell breathing. Cell breathing is due to the fact that increased uplink interference requires the UE to use more of its uplink power to overcome interference, leaving less power available to overcome uplink path loss. The uplink ASE admission policy is simply defined by three thresholds. These thresholds are adjusted by the configurable parameters aseUlAdm, aseUlAdmOffset, and beMarginAseUl. Figure below illustrates how these parameters are utilized to define the three admission thresholds. It should be noted that the values provided in this figure are T-Mobile USA, INC. Confidential Rev. 0.6 December 5, 2007 141 of 214 Ошибка! Используйте вкладку "Главная" для применения Title к тексту, который должен здесь отображаться. the default values. The unit of measure for these three parameters is uplink ASE. In addition, it should be noted that enhanced soft congestion is not triggered when these thresholds are exceeded. The first admission threshold is defined by subtracting beMarginAseUl from aseUlAdm (i.e. aseUlAdm-beMarginAseUl). This defines the maximum number of uplink ASEs allowed to grant admission to new best effort DCH users. If the uplink ASE utilization is greater than this threshold, an admission request by a non-guaranteed/non-handover service class user will be denied. The second admission threshold is defined by the parameter aseUlAdm. This defines the maximum uplink ASEs allowed to grant admission for guaranteed and HS users requesting a new connection, as well as existing best effort DCH users requiring soft handover. If the uplink ASE consumption is greater than the aseUlAdm threshold, an admission request by a guaranteed/non-handover, guaranteed-HS/non-handover, or a non-guaranteed/handover service class user will not be allowed. UL ASE Usage Maximum Configurable Value 1000 aseUlAdm + aseUlAdmOffset 200 Admit: (Guaranteed/Handover) & (Guaranteed-HS/Handover) aseUlAdm 160 Admit: (All Guaranteed) & (Non-Guaranteed/Handover) & (All Guaranteed-HS) aseUlAdm - beMarginAseUl 140 Admit: (All Guaranteed) & (All Non-Guaranteed) & (All Guaranteed-HS) Figure 29 - Admission Thresholds for Uplink ASE Usage (default values) The final admission threshold is defined by adding aseUlAdmOffset to aseUlAdm (i.e. aseUlAdmOffset + aseUlAdm). This defines the maximum uplink ASEs allowed to grant admission for guaranteed users requesting soft handover, as well as existing HS connections requiring the cell to become the new HS serving cell. If the uplink ASE utilization is greater than this threshold, an admission request by a guaranteed/handover service class user, or a guaranteedHS/handover service class user, will be denied. Figure below provides a different view of the admission thresholds based on uplink ASE consumption. As the figure illustrates, the applicable threshold is dependant on the user’s T-Mobile USA, INC. Confidential Rev. 0.6 December 5, 2007 142 of 214 Ошибка! Используйте вкладку "Главная" для применения Title к тексту, который должен здесь отображаться. service class and setup type. If it is determined that the ASE thresholds are triggering Admission Control, and uplink cell coverage is not being affected, the parameter aseUlAdm should be increased. Figure 30 - Admission Policy for Uplink ASE Usage It is important to note the side effects of incorrectly configuring these parameters. Since this admission policy does not trigger soft congestion, UEs requesting admission due to handover may be denied access to the cell. If a mobile UE with an existing connection is denied access to the cell, the uplink power from this UE can not be power controlled as it approaches the new cell. This will result in excessive uplink interference and could result in cell breathing. To mitigate the potential of this scenario occurring, the parameter aseUlAdmOffset can be increased to effectively disable the threshold for guaranteed and HS handover admission requests. To totally disable this feature, aseUlAdm can be set to its maximum value 500; and beMarginAseUl can be set to zero. 14.5.2. Downlink ASE Admission Downlink ASE admission thresholds is another mechanism that can be utilized, along with downlink carrier power, to control admission for various service classes and access types. The downlink ASE admission policy is only defined by two thresholds. These thresholds are adjusted by the configurable parameters aseDlAdm and beMarginAseDl. Figure below illustrates how these parameters are utilized to define both admission thresholds. It should be noted that the values provided in this figure are the default values. The unit of measure for these parameters is downlink ASE. In addition, it should be noted that enhanced soft congestion is not triggered when these thresholds are exceeded. T-Mobile USA, INC. Confidential Rev. 0.6 December 5, 2007 143 of 214 Ошибка! Используйте вкладку "Главная" для применения Title к тексту, который должен здесь отображаться. DL ASE Usage Maximum Configurable Value 1000 aseDlAdm 240 Admit: (All Guaranteed) & (Non-Guaranteed/Handover) & (All Guaranteed-HS) aseDlAdm - beMarginAseDl 140 Admit: (All Guaranteed) & (All Non-Guaranteed) & (All Guaranteed-HS) Figure 31 - Admission Thresholds for Downlink ASE Usage (default values) The first admission threshold is defined by subtracting beMarginAseDl from aseDlAdm (i.e. aseDlAdm-beMarginAseDl). This defines the maximum number of downlink ASEs allowed to grant admission to new best effort DCH users. If the downlink ASE utilization is greater than this threshold, an admission request by a non-guaranteed/non-handover service class user will be denied. The second admission threshold is defined by the parameter aseDlAdm. This defines the maximum downlink ASEs allowed to grant admission for all guaranteed and HS users, as well as existing best effort DCH users requiring soft handover. If the downlink ASE consumption is greater than the aseDlAdm threshold, an admission request by any guaranteed or guaranteed-HS service class user or a non-guaranteed/handover service class user will not be allowed. Figure below provides an alternative view of the admission thresholds based on downlink ASE consumption. As the figure illustrates, the applicable threshold is dependant on the user’s service class and setup type. Unlike the uplink ASE scenario, which is the only means to control uplink interference, monitoring downlink ASEs and downlink carrier power can both achieve similar results. Since most UMTS systems are downlink power limited, the downlink ASE admission algorithm may prematurely block users if it is not configured correctly. If it is determined that the ASE thresholds are triggering Admission Control, and downlink power is not limited, the parameter aseDlAdm should be increased. Similar to the issue mentioned in the previous section, handover admission requests may be denied due to this admission policy. This may result in increased uplink interference and cell breathing. To mitigate the potential of this scenario occurring, the parameter aseDlAdm can be increased, or disabled. Because the downlink carrier power admission policy can trigger soft congestion, and it performs a similar job as downlink ASE admission policy, disabling this feature is a viable option. To disable this feature, aseDlAdm can be set to its maximum value 500; and beMarginAseDl can be set to zero. T-Mobile USA, INC. Confidential Rev. 0.6 December 5, 2007 144 of 214 Ошибка! Используйте вкладку "Главная" для применения Title к тексту, который должен здесь отображаться. Figure 32 - Admission Policy for Downlink ASE Usage 14.6. Node B Hardware Admission Node B hardware usage, or specifically channel element usage, is monitored by the RBS Hardware Monitor and reported to Admission Control. The term channel element (CE) is used to quantify processing power in the Node B chipset. The number of channel elements available for users is dependant on hardware configuration, and number of licensed channel elements enabled. Channel elements for the common and overhead channels are included with the Node B, and are not considered by the RBS Hardware Monitor or Admission Control. Both uplink and downlink channel element usage is monitored and can limit admission based on parameter setting, user admission class, and user access type. 14.6.1. Uplink Channel Element Admission The uplink channel element admission policy is simply defined by three thresholds. These thresholds are adjusted by the configurable parameters ulHwAdm and beMarginUlHw. Figure below illustrates how these parameters are utilized to define these admission thresholds. The unit of measure for these two parameters is percentage of available uplink CE utilization. In addition, it should be noted that enhanced soft congestion is triggered when these thresholds are exceeded. T-Mobile USA, INC. Confidential Rev. 0.6 December 5, 2007 145 of 214 Ошибка! Используйте вкладку "Главная" для применения Title к тексту, который должен здесь отображаться. UL CE Usage 100 % Admit: (Guaranteed/Handover) & (Non-Guaranteed/Handover) ulHwAdm m% Admit: (All Guaranteed) & (Non-Guaranteed/Handover) & (Guar-HS/Handover) ulHwAdm - beMarginUlHw n% Admit: (All Guaranteed) & (All Non-Guaranteed) & (All Guaranteed-HS) Figure 33 - Admission Thresholds for Percentage of Uplink Channel Element Usage The first admission threshold is defined by subtracting beMarginUlHw from ulHwAdm (i.e. ulHwAdm- beMarginUlHw). This defines the maximum percentage of available uplink channel elements that can be consumed to grant admission to new best effort DCH users, as well HS users requesting a new connection. If the uplink CE utilization is greater than this threshold, an admission request by a non-guaranteed/non-handover, or a guaranteed-HS/non-handover service class user will trigger enhanced soft congestion. The second admission threshold is defined by the parameter ulHwAdm. This defines the maximum percentage of available uplink channel elements that can be consumed to grant admission for guaranteed users requesting new connections, as well as existing HS connections requiring the cell to become the new HS serving cell. If the uplink CE consumption is greater than the ulHwAdm threshold, an admission request by a guaranteed/non-handover or a guaranteed-HS/handover service class user will trigger enhanced soft congestion. The final admission threshold is defined as 100% channel element utilization. This defines the maximum uplink channel element threshold to grant admission for both guaranteed and non-guaranteed users requesting soft handover. Only if the available uplink CE pool is 100% utilized, will an admission request by a guaranteed/handover service class user, or a non-guaranteed/handover service class user, be denied. Figure below provides a different view of the admission thresholds based on uplink CE consumption. As the figure illustrates, the applicable threshold is dependant on the user’s service class and setup type. Because of soft congestion, and the threshold for existing guaranteed and non-guaranteed users requesting handover being fixed at 100%, the risk of increased uplink interference and cell breathing is inherently reduced for this admission policy. T-Mobile USA, INC. Confidential Rev. 0.6 December 5, 2007 146 of 214 Ошибка! Используйте вкладку "Главная" для применения Title к тексту, который должен здесь отображаться. Figure 34 - Admission Policy for Uplink Channel Element Usage 14.6.2. Downlink Channel Element Admission The downlink channel element admission policy is defined by three thresholds. These thresholds are adjusted by the configurable parameters dlHwAdm and beMarginDlHw. Figure below illustrates how these parameters are utilized to define the admission thresholds. The unit of measure for these two parameters is percentage of available downlink CE utilization. In addition, it should be noted that enhanced soft congestion is triggered when these thresholds are exceeded. DL CE Usage 100 % Admit: (Guaranteed/Handover) & (Guaranteed-HS/Handover) dlHwAdm m% Admit: (All Guaranteed) & (Non-Guaranteed/Handover) & (All Guaranteed-HS) dlHwAdm - beMarginDlHw n% Admit: (All Guaranteed) & (All Non-Guaranteed) & (All Guaranteed-HS) T-Mobile USA, INC. Confidential Rev. 0.6 December 5, 2007 147 of 214 Ошибка! Используйте вкладку "Главная" для применения Title к тексту, который должен здесь отображаться. Figure 35 - Admission Thresholds for Percentage of Downlink Channel Element Usage The first admission threshold is defined by subtracting beMarginDlHw from dlHwAdm (i.e. dlHwAdm- beMarginDlHw). This defines the maximum percentage of available downlink channel elements that can be utilized to grant admission to new best effort DCH users. If the downlink CE utilization is greater than this threshold, an admission request by a non-guaranteed/non-handover service class user will trigger enhanced soft congestion. The second admission threshold is defined by the parameter dlHwAdm. This defines the maximum percentage of available downlink channel elements that can be consumed to grant admission for best effort DCH users requesting soft handover, guaranteed users requesting new connections, as well HS users requesting a new connection. If the downlink CE consumption is greater than the dlHwAdm threshold, an admission request by a non-guaranteed/handover, guaranteed/non-handover, or a guaranteed-HS/non-handover service class user will trigger enhanced soft congestion. The final admission threshold is defined as 100% channel element utilization. This defines the maximum downlink channel element threshold to grant admission for both existing guaranteed users requesting handover, as well as existing HS connections requiring the cell to become the new HS serving cell. Only if the available downlink CE pool is 100% utilized, will an admission request by a guaranteed/handover service class user, or a non-guaranteed/handover service class user, be denied. Figure below provides an alternative view of the admission thresholds based on downlink CE consumption. As the figure illustrates, the applicable threshold is dependant on the user’s service class and setup type. Because of soft congestion, as well as the threshold for existing guaranteed and HS users requesting handover is fixed at 100%, the risk of increased uplink interference and cell breathing is inherently reduced for this admission policy. T-Mobile USA, INC. Confidential Rev. 0.6 December 5, 2007 148 of 214 Ошибка! Используйте вкладку "Главная" для применения Title к тексту, который должен здесь отображаться. Figure 36 - Admission Policy for Downlink Channel Element Usage 14.7. Admission Control Parameters The following table provides details regarding for the Ericsson parameters for Admission Control. Parameter Name dlCodeAdm beMarginDlCode sf8Adm sf16Adm sf32Adm sf16gAdm sf4AdmUl sf8AdmUl sf16AdmUl sf8gAdmUl maxNumHsdpaUsers eulServingCellUsersAdm eulNonServingCellUsersAdm compModeAdm pwrAdm pwrAdmOffset beMarginDlPwr aseUlAdm aseUlAdmOffset beMarginAseUl aseDlAdm beMarginAseDl ulHwAdm beMarginUlHw dlHwAdm beMarginDlHw Object Name UtranCell UtranCell UtranCell UtranCell UtranCell UtranCell UtranCell UtranCell UtranCell UtranCell RbsLocalCell UtranCell UtranCell UtranCell UtranCell UtranCell UtranCell UtranCell UtranCell UtranCell UtranCell UtranCell IubLink IubLink IubLink IubLink Recommended Value 80 % 5% 8 16 32 16 1000 8 16 8 16 4 100 15 75 % 10 % 10 % 500 0 0 500 0 100 0 100 0 Table 9 – Ericsson Parameters for Admission Control 14.8. Counters Related to Admission Control Tracking performance statistics or counters allow monitoring and troubleshooting UTRAN system performance. The counters specifically related to Admission Control can be utilized to tune parameter settings, or trigger capacity/dimensioning related actions (e.g. channel element additions). The counters described in this section include some of the more important counters related to Admission Control. For a complete list of performance counters, refer to the Ericsson RNC Performance Management documentation [14]. Figures below provide a three part flowchart for the some of the counters related to Admission Control. The counters illustrated on the right side of Figure 37 include some of T-Mobile USA, INC. Confidential Rev. 0.6 December 5, 2007 149 of 214 Ошибка! Используйте вкладку "Главная" для применения Title к тексту, который должен здесь отображаться. the level counters used by the Dedicated Monitored Resource Handling function (e.g. pmLevelAseUl, pmLevelAseDl, and pmLevelCompMode). These counters are incremented and decremented based on resource utilization and typically do not yield useful information from a statistical or troubleshooting perspective. On the other hand, the left side of Figure 37 provides the path for failed admission requests. If enhanced soft congestion is triggered, the counter pmNoOfSwDownNgAdm is incremented. The fact that this counter was incremented does not indicate that the down switch was successful, rather that a down switch was attempted. For more information related to channel switching counters, refer to the Ericsson RNC Performance Management documentation [14]. If the down switch fails, the admission request will be denied and the counter pmNoReqDeniedAdm will be incremented. In addition, this counter is also incremented for failed admission requests that do not trigger enhanced soft congestion. T-Mobile USA, INC. Confidential Rev. 0.6 December 5, 2007 150 of 214 Ошибка! Используйте вкладку "Главная" для применения Title к тексту, который должен здесь отображаться. Figure 37 - Ericsson Admission Control Flowchart (1 of 3) Continuing down the path for failed admission requests, figure below illustrates when nonhandover related counters are incremented based on service type. If the failed admission attempt is for a new speech connection (non-handover), the counter pmNoOfNonHoReqDeniedSpeech is incremented. For circuit switched data or circuit switched streaming admission requests, the counter pmNoOfNonHoReqDeniedCs is incremented, for non-handover scenarios. Figure 38 - Ericsson Admission Control Flowchart (2 of 3) The counter pmNoOfNonHoReqDeniedInteractive is incremented if the failed admission request is for non-HS interactive packet switch RABs, while the counter T-Mobile USA, INC. Confidential Rev. 0.6 December 5, 2007 151 of 214 Ошибка! Используйте вкладку "Главная" для применения Title к тексту, который должен здесь отображаться. pmNoOfNonHoReqDeniedPsStreaming is pegged if the request was for a non-HS streaming packet switched RAB. If the failed streaming PS RAB request was specifically for a 128 kbps bearer, the counter pmNoOfNonHoReqDeniedPsStr128 would be incremented, along with pmNoOfNonHoReqDeniedPsStreaming. High speed admission failures are also counted, as shown in figures 38 and 39. The performance counter pmNoOfNonHoReqDeniedHs is incremented when non-handover, failed admission request occurs for HSDPA. Figure 39 - Ericsson Admission Control Flowchart (3 of 3) In addition to the circumstances listed above, there are additional counters for handover related admission requests. When the handover request triggers enhanced soft congestion, the counter pmNoOfSwDownNgHo is incremented. The fact that this counter was increased does not indicate that the down switch was successful, rather that a down switch was attempted. If the handover request is denied due to admission (whether soft congestion is triggered or not) the counter pmNoRlDeniedAdm is pegged. T-Mobile USA, INC. Confidential Rev. 0.6 December 5, 2007 152 of 214 Ошибка! Используйте вкладку "Главная" для применения Title к тексту, который должен здесь отображаться. 15. Congestion Control Congestion Control monitors the dynamic utilization of specific cell resources and insures that overload conditions do not occur. If overload conditions do occur, Congestion Control will immediately restrict Admission Control from granting additional resources. In addition, Congestion Control will attempt to resolve the congestion by either down switching, or terminating existing users. Once the congestion is corrected, the congestion resolution actions will cease, and Admission Control will be enabled. The two specific resources monitored are downlink transmitted carrier power, as well as uplink noise (i.e. RTWP). The consumption of downlink carrier power is dynamic, and can change after users are admitted into the cell. As users travel within the cell, or the RF environment changes, their downlink power requirements can increase and drive the cell into congestion. For the uplink case, the mobility of users outside of the cell can affect the RTWP, and trigger congestion. The other resources controlled by Admission Control (e.g. OVSF code usage, or ASEs) will not dynamically change without the admission criterion being met; therefore there is no need for Congestion Control to monitor these resources. The following sections will describe the different aspects of the Congestion Control algorithm, and the parameters and counters associated with them. In addition, impacts of parameter changes to system performance will be discussed. 15.1. Downlink Cell Congestion The detection of downlink cell congestion is solely based on the utilization of downlink transmitted carrier power. Although the allocation of this resource is controlled by Admission Control, the mobility of users within the cell is dynamic. As users move away from the cell, the power required for their dedicated channel is increased by the power control algorithm. This mobility can result in an overload situation for the downlink transmitted carrier power and trigger Congestion Control. The thresholds that define when downlink congestion is triggered, as well as resolved, are provided in the figure below. Congestion is triggered when the downlink carrier power exceeds the threshold equivalent to the summation of the parameters pwrAdm, pwrAdmOffset and pwrOffset (or pwrAdm + pwrAdmOffset + pwrOffset), for a period of time equal to the parameter pwrHyst. Once congestion is triggered, actions will be taken to reduce the downlink transmitted carrier power until the congestion is considered to be resolved. Congestion is resolved when the downlink carrier power drops below the threshold defined by the summation of the parameters pwrAdm, pwrAdmOffset (or pwrAdm + pwrAdmOffset), for a hysteresis time equal to the parameter pwrHyst. Event based measurement reports from the Node B, for the downlink transmitted carrier power, are set up by NBAP signaling when a Node B is configured. The thresholds for these event based measurements are defined by the Congestion Control parameters described in the previous paragraph. Event based measurement reports are triggered when the total downlink power of the cell exceeds the congestion threshold, for the defined hysteresis time. Once this event based measurement report is triggered, periodic reports follow until the carrier power drops below the congestion resolution threshold, for the defined hysteresis time. At this point, a final measurement report is sent to the RNC indicating that T-Mobile USA, INC. Confidential Rev. 0.6 December 5, 2007 153 of 214 Ошибка! Используйте вкладку "Главная" для применения Title к тексту, который должен здесь отображаться. the congestion has been resolved. By using event based measurements, the Node B can quickly report to the RNC when congestion occurs, and when it is resolved. Figure 40 - Congestion Thresholds for Downlink Transmitter Carrier Power Figure below provides an alternative view of how these parameters are utilized to define the two congestion thresholds. It should be noted that all the values provided in this figure are the default values. In addition to the congestion thresholds, the admission thresholds for transmitted carrier power are included for comparison. As the figure illustrates, the congestion threshold is simply derived by adding the parameter pwrOffset to the admission threshold defined for the highest priority service class/access type. Assuming that default values are used, congestion would be triggered at 95%; and resolved when the power dropped below 85%. DL Transmitted Carrier Power Congestion Triggered Congestion Resolved maximumTransmissionPower 100 % pwrAdm + pwrAdmOffset +pwrOffset 90 % 85 % Power Reserved for Power Control Admit: (Guaranteed/Handover) & (All Guaranteed-HS) 75 % Admit: (All Guaranteed) & (Non-Guaranteed/Handover) & (All Guaranteed-HS) 65 % pwrAdm + pwrAdmOffset pwrAdm pwrAdm - beMarginDlPwr Admit: (All Guaranteed) & (All Non-Guaranteed) & (All Guaranteed-HS) T-Mobile USA, INC. Confidential Rev. 0.6 December 5, 2007 154 of 214 Ошибка! Используйте вкладку "Главная" для применения Title к тексту, который должен здесь отображаться. Figure 41 – Congestion and Admission Thresholds for Downlink Transmitted Carrier Power (default values) 15.2. Uplink Cell Congestion The detection of uplink cell congestion is exclusively based on the utilization of RTWP measurements. Similar to the downlink scenario, the mobility of users within the network is dynamic. As “out of cell” users approach the cell, their uplink transmissions may contribute to the cell’s noise rise prior to soft handover occurring. In addition, Admission Control does not monitor RTWP when evaluating admission requests for users. Situations may occur when excessive cell loading occurs as users are admitted. Finally, the uplink transmit power of users within the cell is dynamic based on mobility, resulting in variable noise rise. The net result of these various conditions can contribute to high uplink interference and trigger Congestion Control. The thresholds that define when uplink congestion is triggered, as well as resolved, are provided in the figure below. Congestion is triggered when the uplink RTWP exceeds the threshold equivalent to the summation of the parameters iFCong and iFOffset (or iFCong + iFOffset), for a period of time equal to the parameter iFHyst. Once congestion is triggered, actions will be taken to reduce the uplink noise rise until the congestion is considered to be resolved. Congestion is resolved when the uplink RTWP drops below the threshold defined by the parameter iFCong, for a hysteresis time equal to the parameter iFHyst. Event based measurement reports from the Node B, for the uplink RTWP, are set up by NBAP signaling when a Node B is configured. The thresholds for these event based measurements are defined by the Congestion Control parameters described in the previous paragraph. Event based measurement reports are triggered when the uplink RTWP of the cell exceeds the congestion threshold, for the defined hysteresis time. Once this event based measurement report is triggered, periodic reports follow until the RTWP drops below the congestion resolution threshold, for the defined hysteresis time. At this point, a final measurement report is sent to the RNC indicating that the congestion has been resolved. By using event based measurements, the Node B can quickly report to the RNC when congestion occurs, and when it is resolved. Figure 42 - Congestion Thresholds for Uplink RTWP T-Mobile USA, INC. Confidential Rev. 0.6 December 5, 2007 155 of 214 Ошибка! Используйте вкладку "Главная" для применения Title к тексту, который должен здесь отображаться. Typically, system capacity is not uplink limited and this feature can be disabled. In fact the default values for the parameters controlling uplink Congestion Control do indeed disable the feature. By setting the parameter iFCong = -49.9 dBm, and iFOffset to 0 dB; it is highly unlikely that uplink congestion will ever be triggered. The side effect of disabling this feature is the increased potential of cell breathing which may, or may not be an issue. If it is determined that system performance is being impacted by cell breathing, enabling the uplink congestion algorithm may be required. When configuring these parameters, the source of uplink noise must be considered. To begin with, thermal noise (i.e. kTB = -107.5 dBm) defines the best case value of RTWP. Added to this is the cascaded noise figure for the uplink path. This cascaded noise figure is based on the individual gain and noise figures of each stage of the uplink path (e.g. TMA, feeder loss, Node B LNA, etc.). This can be derived from TMA and Node B specifications, and results for antenna sweeps. Finally, the noise rise due to loading needs to be added. The target loading factor is typically defined in uplink link budgets, and is a function of the calculated pole capacity. Alternatively, another method to tune these parameters would employ the unloaded cell’s RTWP measurement to define a baseline; and then apply the designed noise rise due to loading (i.e. loading factor) to define the congestion threshold. The hysteresis iFHyst should be long enough to ignore short term spikes in RTWP. 15.3. Resolution of Congestion Once congestion is detected, due to downlink carrier power or uplink RTWP, Congestion Control takes actions to resolve the congestion. The first action taken is to limit additional admissions to the cell. If congestion was triggered by downlink transmitted carrier power, all admissions are blocked until the congestion is resolved. Alternatively, if congestion is triggered by uplink RTWP, only non-handover admissions are prevented. Admission requests due to handover are allowed, for the uplink congestion case, because the user is likely a contributor of the uplink interference and admission to the cell will improve the situation. Note that blocking the admission of new users is the only action taken by Congestion Control when uplink congestion is triggered. When downlink congestion is detected, actions will be taken to resolve the issue. Congestion Control will achieve this by periodically releasing the amount of resources utilized by users in the cell. The amount of resources released periodically will be based on downlink air interface speech equivalents (ASEs). The users targeted will be based on their service class, as well as their specific resource consumption. Non-guaranteed users are targeted first, followed by guaranteed-HS users, and finally guaranteed users. Figure below illustrates how the different parameters are utilized to resolve congestion, based on service class. The first step taken to resolve congestion is to target non-guaranteed users. At the moment congestion is detected, the higher data rate best effort users will be targeted to be down switched to a lower data rate. The parameter releaseAseDlNg defines how many ASEs will be released during this initial step (releaseAseDlNg = 0 indicates that no ASEs will be released). The Congestion Control algorithm will begin with the highest data rate users first, and then proceed to the lower data rates (i.e. 384k first, then 128k, then 64k). If the all users have been down switched and releaseAseDlNg ASEs have not been released, non-guaranteed users’ connections will be switched to common channels until the T-Mobile USA, INC. Confidential Rev. 0.6 December 5, 2007 156 of 214 Ошибка! Используйте вкладку "Главная" для применения Title к тексту, который должен здесь отображаться. desired number of ASEs have been released. If this first step resolves congestion, the process is ended. However, if downlink congestion still exists, and there are still nonguaranteed users connected, the process is repeated after a delay defined by the parameter tmCongActionNg. This periodical release of non-guaranteed users continues until all nonguaranteed users have been released, or congestion is resolved. If all non-guaranteed users have been released, and congestion still exists, guaranteed-HS users will be targeted after timer tmCongActionGhs has expired. At this point, guaranteed-HS user connections will be terminated until releaseAseDlGhs ASEs have been released (releaseAseDlGhs = 0 indicates that no ASEs will be released). If this step resolves congestion, the process is ended. If downlink congestion is detected again, and there are still guaranteed-HS users connected, the process is repeated after a delay defined by the parameter tmCongActionGhs. If congestion is detected, and the cell does not originally contain non-guaranteed users, guaranteed-HS users will be initially targeted for release. In this special case, the initial release of releaseAseDlGhs ASEs can not occur until the timer, defined by the parameter tmInitialGhs, has expired. This timer is started when congestion is initially detected. In both scenarios, periodical release of users continues until all guaranteed-HS users have been released, or congestion is resolved. The last targeted group is guaranteed users. If all non-guaranteed and guaranteed HS users have been released, and congestion still exists, guaranteed users will be targeted after timer tmCongAction has expired. At this point, guaranteed user connections will be terminated until releaseAseDl ASEs have been released. If this step resolves congestion, the process is ended. However, if downlink congestion still exists, the process is repeated after a delay defined by the parameter tmCongAction. If congestion is detected, and the cell does not originally contain guaranteed-HS users, guaranteed users will be initially targeted for release. In this special case, the initial release of releaseAseDl ASEs can not occur until the timer, defined by the parameter tmInitialG, has expired. This timer is started when congestion is initially detected. In both scenarios, periodical release of users continues until congestion is resolved. T-Mobile USA, INC. Confidential Rev. 0.6 December 5, 2007 157 of 214 Ошибка! Используйте вкладку "Главная" для применения Title к тексту, который должен здесь отображаться. Figure 43 - Resolution of Downlink Congestion The priority of non-guaranteed users released is based on the origination of their connections. Non-Iur dedicated connections will be targeted first and their connections will be switched to common channels. Connections originating over Iur will be targeted last and will result in their connections being terminated. For the guaranteed-HS service class releases, the priority is based on the origination of the connection, as well as HS serving cell status of the radio link. The HS connections in which the congested cell is the HS serving cell will have the highest priority and will be the last link released. For guaranteed CS users, streaming calls will be terminated prior to speech calls. In addition, a particular service class can be omitted from the congestion resolution actions if its “releaseAse” parameter is set to zero. For example, the default value for releaseAseDlGhs = 0, which indicates that no guaranteed-HS ASEs will be released during congestion resolution. For the other two service classes, the parameters releaseAseDlNg and releaseAseDl behave similarly. 15.4. Congestion Control Parameters The following table provides details regarding for the Ericsson parameters for Congestion Control. Parameter Name pwrOffset pwrHyst iFCong iFOffset iFHyst releaseAseDlNg releaseAseDlGhs releaseAseDl tmCongActionNg tmCongActionGhs tmCongAction tmInitialGhs tmInitialG Object Name UtranCell UtranCell UtranCell UtranCell UtranCell UtranCell UtranCell UtranCell UtranCell UtranCell UtranCell UtranCell UtranCell Recommended Value 5% 300 ms -49.9 dBm 0.0 dB 60000 ms 3 ASE 0 ASE 1 ASE 800 ms 300 ms 2000 ms 500 ms 3000 ms Table 10 - Ericsson Parameters for Congestion Control 15.5. Counters Related to Congestion Control Tracking performance statistics or counters allow monitoring and troubleshooting UTRAN system performance. The counters specifically related to Congestion Control can be utilized to tune parameter settings, or trigger capacity/dimensioning related actions. The counters described in this section include some of the more important counters related to Congestion Control. For a complete list of performance counters, refer to the Ericsson RNC Performance Management documentation [14]. The flowchart for the counters related to the detection of downlink congestion is provided in the figure below. As the flowchart indicates, the counter pmSumOfTimesMeasOlDl is T-Mobile USA, INC. Confidential Rev. 0.6 December 5, 2007 158 of 214 Ошибка! Используйте вкладку "Главная" для применения Title к тексту, который должен здесь отображаться. incremented when a NBAP common measurement report is received from Node B indicating that the downlink transmitted carrier power is above the congestion threshold. Note that this counter is not incremented by the reception of the periodic measurement reports that follow the initial congestion report. This counter only pegs once for each downlink congestion occasion. The total amount of time a cell is downlink congested (in seconds) is provided by the counter pmTotalTimeDlCellCong. This counter is incremented once every second the cell remains in the downlink congested state. Figure 44 – Ericsson Counter Flowchart for DL Congestion Detection The flowchart for the counters related to the detection of uplink congestion is provided in the figure below. As the flowchart indicates, the counter pmSumOfTimesMeasOlUl is incremented when a NBAP common measurement report is received from Node B indicating that the uplink RTWP is above the congestion threshold. Note that this counter is not incremented by the reception of the periodic measurement reports that follow the initial congestion report. This counter only increases once for each uplink congestion occasion. The total amount of time a cell is uplink congested (in seconds) is provided by the counter pmTotalTimeUlCellCong. This counter is incremented once every second the cell remains in the uplink congested state. T-Mobile USA, INC. Confidential Rev. 0.6 December 5, 2007 159 of 214 Ошибка! Используйте вкладку "Главная" для применения Title к тексту, который должен здесь отображаться. Figure 45 – Ericsson Counter Flowchart for UL Congestion Detection The actions taken for congestion resolution of non-guaranteed users are illustrated in the below figure. If non-guaranteed users are down switched to common channels (non-Iur case) the counter pmNoOfSwDownNgCong is incremented by a number equal to the number of users affected. On the other hand, non-guaranteed users with an Iur connection (drift RNC) will increment pmNoOfIurSwDownNgCong accordingly. This figure also illustrates at what points the timer tmInitialGhs, tmInitialG, and tmCongActionNg are started. T-Mobile USA, INC. Confidential Rev. 0.6 December 5, 2007 160 of 214 Ошибка! Используйте вкладку "Главная" для применения Title к тексту, который должен здесь отображаться. Figure 46 - Resolution of Congestion (1 of 2) Figure below details how guaranteed-HS service class related counters are affected. For non-Iur HS connections, the counter pmNoOfSwDownHsCong is incremented for each HSDPA user that is switched to common channels due to congestion. For the Iur scenario, T-Mobile USA, INC. Confidential Rev. 0.6 December 5, 2007 161 of 214 Ошибка! Используйте вкладку "Главная" для применения Title к тексту, который должен здесь отображаться. the connections are not switched to common channels. Instead, they are terminated and the counter pmNoOfIurTermHsCong is increased accordingly. The counters for guaranteed users impacted by congestion are also shown in this figure. For non-Iur circuit switched connections released due to the Congestion Control algorithm, the counters pmNoOfTermCsCong and pmNoOfTermSpeechCong are incremented for CS data and CS speech users respectively. If the circuit switched connection was released from a congested cell by a drift RNC (Iur), the counters pmNoOfIurTermCsCong and pmNoOfIurTermSpeechCong are incremented for CS data and CS speech users respectively. T-Mobile USA, INC. Confidential Rev. 0.6 December 5, 2007 162 of 214 Ошибка! Используйте вкладку "Главная" для применения Title к тексту, который должен здесь отображаться. Figure 47 - Resolution of Congestion (2 of 2) T-Mobile USA, INC. Confidential Rev. 0.6 December 5, 2007 163 of 214 Ошибка! Используйте вкладку "Главная" для применения Title к тексту, который должен здесь отображаться. 16. Power Control This section deals with the Power Control algorithms and parameters related to the Ericsson 3G RAN. 16.1. Importance of Power Control Any WCDMA system is limited by interference and it is important to minimize the interference level, since the lower the interference, the better the network capacity is. The intent of Power control is to allow as many users as possible into the WCDMA network, while keeping the interference caused by these users to a minimum. Power control aims at using the minimum signal to interference ratio (SIR) required for the quality of the connection to remain sufficient. Power control provides protection against large changes in shadowing, immediate response to fast changes in signal and interference levels. It is also needed to cope with the near-far problem found in WCDMA systems, and to bring the SIR back close to the target SIR as fast as possible after each transmission gap in compressed mode. The two main capabilities of Power Control in a WCDMA system are as follows: To maintain the quality of connections (including common channels needed, for example, for call access) To minimize the transmitted power in both uplink and downlink Power Control works on a connection basis. 16.2. Overall Power Control Procedure There are three different types of power control in UMTS Open Loop: Open Loop power control is used when no feedback mechanism is possible. An estimate of the required power is made from measurements and system information. This is used for initial network access and finding initial power settings during dedicated mode. Closed Inner Loop: This power control technique uses a fast feedback mechanism to request an increase or decrease in output power based on the difference between the target and measured SIR. The feedback is provided via Transmit Power Control (TPC) bits on the DPCCH channel 1500 times per second. Inner loop power control exists in both the uplink and downlink. Closed Outer Loop: Outer loop power control is used to set the target SIR that is used during inner loop power control. For downlink power control this is set in the UE by an algorithm that is proprietary to the UE manufacturer. For uplink power control it is set by the RNC. The key difference between closed and open loop is the feedback cycle. Closed loop relies on feedback from the receiving node to adjust the power at the transmitting node. Open loop has no feedback on the amount to increase or decrease it’s transmit power. T-Mobile USA, INC. Confidential Rev. 0.6 December 5, 2007 164 of 214 Ошибка! Используйте вкладку "Главная" для применения Title к тексту, который должен здесь отображаться. UMTS Power Control Open Loop Power Control Closed Loop Power Control Power control during initial network access Inner Loop Outer Loop Fast power control for compensation of signal fluctuations Slow power control for ensuring the desired signal power level 16.3. Power Control of downlink common channels This section outlines how the different downlink common channels handle Power Control. The following downlink common channels are not subject to dynamic Power control as they are required to cover the entire coverage area of the cell. The transmission powers of these channels are determined during radio network planning. Refer to [2] for the actual values. PCPICH: The transmission of the PCPICH determines the actual cell size. Its power primaryCpichPower is set to an absolute value, and the power level of every other downlink channel is expressed as an offset relative to it. PCCPCH: The PCCPCH carries the broadcast channel (BCH), which is broadcast time multiplexed with the SCH. The last 2304 chips of every slot transmit the PCCPCH. The parameter bchpower determines the power and is expressed as on offset of the PCPICH power. SCH: The SCH consists of a primary SCH (P-SCH) and a secondary SCH (S-SCH), used in the cell search procedure in the UE. Their powers are set as primarySchPower for P-SCH and secondarySchPower for S-SCH, and are expressed as offsets of the PCPICH power. AICH: The AICH carries the acquisition indication (AI), which is the response to the PRACH preambles. The AICH is not continuously broadcast in the cell. Its power is set by the parameter aichPower and is expressed as an offset relative to the PCPICH power. SCCPCH carrying FACH: When the SCCPCH carries the FACH transport channel, one of 2 parameters determines the power depending on the logical channels carried by the FACH. If the FACH frame carries a logical control channel (BCCH, CCCH, DCCH), the power is set through parameter maxFach1Power. If the FACH frame carries a logical traffic channel (DTCH), the power is then set through the parameter maxFach2Power. These are both expressed as offsets relative to the PCPICH power. The SCCPCH uses discontinuous transmission (DTX) to halt power transmission when there is no payload. Additional offset for the TFCI field of the SCCPCH carrying FACH frame can set with the parameter T-Mobile USA, INC. Confidential Rev. 0.6 December 5, 2007 165 of 214 Ошибка! Используйте вкладку "Главная" для применения Title к тексту, который должен здесь отображаться. pOffset1Fach and for the pilot field can be set as pOffset3Fach, which are relative to the power on the payload. SCCPCH carrying PCH: The parameter pchPower sets the power level, expressed as an offset relative to the PCPICH power. The SCCPCH uses discontinuous transmission (DTX) to halt power transmission when there is no payload. PICH: The PICH carries the paging indicators, which tell UEs belonging to specific paging groups to listen to the paging channel. The PICH power is set by the parameter pichPower, relative to the PCPICH power. 16.4. Open Loop Power Control (Power Control of uplink common channels) Need for Open Loop Power Control: The power control of the uplink control channels is done using the Open Loop Power control method. Uplink open loop power control is controlled by the UE. In a UMTS network, the UE always initiates the RRC connection setup procedure. This is applicable for mobile terminating calls (MTC) also in which case the network pages the UE, telling it to establish an RRC connection. The UE does this using the random access procedure. Before it initiates the random access procedure, the UE has to determine how much power it has to use in the uplink. If a UE uses a fixed power level for random access, and if it happens to be close to the BTS, then it would block out messages from the UEs farther away. Therefore the UE must always use the lowest possible transmission power. The goal of power control during call setup is for the UE to transmit the minimum amount of power required to access the network. At this time the UE does not know the power required to reach the system, so it estimates the initial preamble power (based on broadcast information and downlink measurements). If there is no acknowledgement from the RBS to this initial request (via acquisition indication sent by the RBS), the UE will increase its power based on predefined increments and retransmissions until it is heard. This procedure is known as ‘Power Ramping’ and because of the limited feedback provided by the network is termed ‘Open Loop Power Control’. The UE uses an equation to estimate the initial preamble transmit power on the Physical Random Access Channel (PRACH), based on CPICH received power and System Information (broadcast in the cell). P_PRACH = PCPICH DL Tx Power – CPICH_RSCP+UL Interference +constantValueCprach Where P_PRACH Power of the first preamble on the PRACH PCPICH DL Tx Power Primary CPICH transmit power (sent in SIB5) CPICH_RSCP Received CPICH RSCP measured by UE UL Interference UL Interference measured by RBS and broadcast by BCH constantValueCprach configurable parameter in object Rach used by the UE to calculate the initial power on the PRACH (SIB5) (SIB7) T-Mobile USA, INC. Confidential Rev. 0.6 December 5, 2007 166 of 214 Ошибка! Используйте вкладку "Главная" для применения Title к тексту, который должен здесь отображаться. CPICH >> RSCP System Info >> BCCH >> P-CCPCH § § § § § UE measures CPICH RSCP and receives network parameters in the System Information (SIB) messages CPICH DL Tx Power UL Interference Constant Value Power Ramp Step Preamble Retrans Max P_PRACH = CPICH DL Tx Power – CPICH_RSCP + UL Interference + Constant Value (+ Power Ramp Step) UE uses a formula to calculate the initial transmit power, and increases the power each retry by Power Ramp Step Once the first preamble is transmitted the UE monitors the Acquisition Indication Channel (AICH) to see if an Acquisition Indicator (AI) has been sent. The system will send an Acquisition Indicator only if the preamble has been received. If there is no Acquisition Indicator received on the AICH, the UE will transmit another preamble with an increased power, increasing the transmission power with respect to the previous preamble power by a parameter powerOffsetP0. It will continue to increase the preamble power until it is successfully received by the system and an Acquisition Indicator is received. If the preamble sequence finishes before an Acquisition Indicator is received, the UE may repeat the preamble sequence. If the preamble is not received by the network and the entire sequence has been completed, the call setup will be counted as an access failure. Once the Acquisition Indicator is received, the UE sends the PRACH message part that contains the internal details about the desired connection to the radio network. The power of the control part of the PRACH message is determined by the power of the last transmitted preamble and by an offset configurable by the parameter powerOffsetPpm. The power of the data part of the PRACH message is determined by the gain factors for PRACH, which is included in the System information. Preamble ramping does not go on indefinitely. The maximum number of steps in each preamble ramping cycle is set by the configurable parameter preambleRetransMax. When this maximum is reached, a new preamble ramping cycle is attempted. The maximum number of preamble ramping cycles before the access attempt is aborted is set by the configurable parameter maxPreambleCycle. T-Mobile USA, INC. Confidential Rev. 0.6 December 5, 2007 167 of 214 Ошибка! Используйте вкладку "Главная" для применения Title к тексту, который должен здесь отображаться. Once preamble is heard, increase power for message Increase power until heard Message (Control Part) 1st transmitted preamble PRACH UL Preamble heard and Acquisition Indicator sent Preamble Sequence AICH DL The following are the values of the various parameters involved in the Open Loop Power control procedure. Parameter Name constantValueCprach Object Name Rach Recommended Value -27 dB maxPreambleCycle Rach 4 powerOffsetP0 Rach 3 dB powerOffsetPpm Rach -4 dB preambleRetransMax Rach 8 16.5. Power Control of Dedicated channels The power control of dedicated channels is performed by a combination of the Outer loop power control and the inner loop power control procedures. Outer Loop power control adjusts the target SIR in the BTS according to the needs of the individual radio links and aims at constant quality, defined in terms of a certain block error rate (BLER). This target SIR is signaled to the inner loop power control, which is then used to compare against the received SIR by the BTS and the UE. In the Inner loop power control, the BTS and UE continuously compare the SIR of the received signal to the target SIR value for a particular connection. Based on this they tell each other to increase or decrease the transmission power. The inner loop power control can vary the transmission power from one slot to another. And since a WCDMA frame consists of 15 slots in a 10 ms duration, the inner loop power control can be performed at a maximum rate of 1500 times per second. Hence inner loop power control is also called fast closed loop power control. The overall power control procedure of dedicated channels is shown in the figure below. T-Mobile USA, INC. Confidential Rev. 0.6 December 5, 2007 168 of 214 Ошибка! Используйте вкладку "Главная" для применения Title к тексту, который должен здесь отображаться. The following sections detail the different steps involved in the outer loop and inner loop power control procedures. 16.5.1. Initial Downlink Power Setting RNC calculates initial DL power for dedicated channels (DPDCH/ DPCCH) and sends to RBS UE RNC RBS An initial transmit power setting for the downlink dedicated channels (DPCCH/DPDCH) is calculated by the RNC and sent to the RBS utilizing open loop power control. This initial setting is intended to ensure a reliable radio connection setup while minimizing the impact on existing connections. T-Mobile USA, INC. Confidential Rev. 0.6 December 5, 2007 169 of 214 Ошибка! Используйте вкладку "Главная" для применения Title к тексту, который должен здесь отображаться. The following equation is used to determine the initial power setting for the dedicated physical data channels (DPDCH). primaryCPI CHPower + (dlInitSirT arg et - PCPICH _ EcNo ) + P _ DL _ DPDCH = cBack Off + 10 log 2 SF _ DL _ DPDCH where P_DL_DPDCH is the Initial power setting for the Dedicated Physical Data Channel (DPDCH) primaryCpichPower is the downlink output power used for the PCPICH in the cell where the connection is set up PCPICH_EcNo is the measured Ec/No on PCPICH in the cell where the connection is set up, received from the UE. dlInitSirTarget is the required initial SIR target for the downlink DPDCH. SF_DL_DPDCH is the Spreading Factor for the downlink DPDCH. cBackOff is a configurable parameter to adjust the Open Loop Power Control estimate for the initial transmit power level on DPDCH. It can either back off the open loop power control estimate to a more conservative starting point or to increase the initial downlink power to improve the call setup reliability. In the case of IRAT handover where there is no measured Ec/No, the system uses a default setting for Ec/No configured by the parameter ecNoPcpichDefault. This parameter should be set to a value typically seen at the cell edge. This is recommended to -14 dBm as per [2] for cell edge coverage value. The initial power setting for the dedicated control channels (DPCCH) is calculated using the following equations. P_DL_DPCCH_TFCI = (P_DL_DPDCH + pO1) P_DL_DPCCH_TPC = (P_DL_DPDCH + pO2) P_DL_DPCCH_PILOT = (P_DL_DPDCH + pO3) where P_DL_DPCCH_TFCI is the Initial output power for the DPCCH TFCI field. pO1 is the power offset between the data field and the TFCI field of the downlink DPCCH, expressed in dB. This offset is constant, regardless of the service. P_DL_DPCCH_TPC is the initial output power for the DPCCH TPC field. pO2 is the power offset between the data field and the TPC field of the downlink DPCCH, expressed in dB. This offset is constant, regardless of the service. P_DL_DPCCH_PILOT is the initial output power for the DPCCH Pilot field. pO3 is the power offset between the data field and the Pilot field of the downlink DPCCH, expressed in dB. This offset is the same regardless of the service. The values of the parameters discussed above are shown in the table below. T-Mobile USA, INC. Confidential Rev. 0.6 December 5, 2007 170 of 214 Ошибка! Используйте вкладку "Главная" для применения Title к тексту, который должен здесь отображаться. Parameter Name Object Name Recommended Value cBackOff Power Control 0 dlInitSirTarget Power Control 4.1 dB ecNoPcpichDefault Power Control -14 dBm pO1 Power Control 0 dB pO2 Power Control 3 dB pO3 Power Control 3 dB The main reason for recommending a higher offset for pO2 when compared to pO1 and pO3 is that the TPC commands received from different RBSs are subject to logical combining in the UE. Consequently, the TPC command from each RBS must be decoded before being combined, whereas the user data, Pilot bits, and TFCI bits can be combined before decoding. To allow reliable decoding of TPC commands, it is advisable to increase their power with respect to the other fields of the DPCCH. 16.5.2. Downlink Power Limits RNC calculates max and min DL power limits and sends to RBS RNC RBS UE In power control systems there must be maximum and minimum limits for how much power can be transmitted. Maximum Downlink Transmitted Code Power: In the downlink, the maximum allowable transmit power is dependant upon the radio connection type, specifically the maximum data rate of the radio link. This is set on a per cell basis using a combination of parameters. minPwrMax & minimumRate This sets the maximum transmit power (relative to CPICH) for any services requiring minimumRate data transfer rates or less interPwrMax & interRate T-Mobile USA, INC. Confidential This is used to adjust the slope between minPwrMax and maxPwrMax. Any service that requires data transfer rates Rev. 0.6 December 5, 2007 171 of 214 Ошибка! Используйте вкладку "Главная" для применения Title к тексту, который должен здесь отображаться. great than minRate and less than maxRate will be interpolated on this slope. maxPwrMax & maxRate This sets the maximum transmit power (relative to CPICH) for any services requiring maxRate data transfer rates or greater The following table provides the maximum radio link data rate for different services. Radio Connection Type Maximum Radio Link Rate PS384/HS 3700 SRB 14800 AMR 12.2 15900 CS64 67700 PS64/64 70900 MultiRAB (CS64 + PS8/8) 76100 PS64/384 406900 Using the above table and the limits base on radio link data rates, the RNC calculates the max DL transmit power and sends it to the RBS. The following graph provides an example of the mapping of these parameters. Ericsson default parameters have been included in this example. T-Mobile USA, INC. Confidential Rev. 0.6 December 5, 2007 172 of 214 Ошибка! Используйте вкладку "Главная" для применения Title к тексту, который должен здесь отображаться. Max DL TX Power (dB) CPICH + maxPwrMax 4.8dB CPICH + interPwrMax 3.8dB The max power for services with RL rate 406.9kbps or greater is 4.8dB stronger than CPICH Tx Pwr CPICH + minPwrMax 0dB The max power for services with RL rate 15.9kbps or less is 0dB stronger than CPICH Tx Pwr Min Rate 15900 (AMR12.2) Inter Rate Max Rate Maximum RL Rate (bps) 406900 (PS384) 77600 Minimum Downlink Transmitted Code Power: If the power of a radio link is very low, it is very sensitive to the impact from interference changes. To avoid this, the minimum downlink transmitted code power is set using the configurable parameter minPwrRl which is relative to the CPICH Tx Power. 16.5.3. Initial Uplink Power Setting RNC Calculates DPCCH_POWER_OFFSET and sends to UE DPCCH_POWER_OFFSET UE RNC RBS UE uses DPCCH_POWER_OFFSET and CPICH RSCP to determine initial UL DPCCH Power The initial uplink power is set in a similar way to setting the initial downlink power by utilizing open loop power control. The power of the uplink dedicated physical control channel (DPCCH) is first set using the following equation. T-Mobile USA, INC. Confidential Rev. 0.6 December 5, 2007 173 of 214 Ошибка! Используйте вкладку "Главная" для применения Title к тексту, который должен здесь отображаться. Power_UL_DPCCH_INIT = DPCCH_POWER_OFFSET - RSCP_PCPICH Where RSCP_PCPICH is the Received Signal Code Power (RSCP) measured on the PCPICH DPCCH_POWER_OFFSET = primaryCpichPower + RTWP + ulInitSirTarget - 10 log (SF_DPCCH) + cPO where primaryCpichPower is the downlink power used for the PCPICH. If the serving RNC is not aware of the power on the PCPICH when another physical RNC controls the cell, it uses a configured default value pcpichPowerDefault, which is used only for this calculation. RTWP is the Received Total Wideband Power (uplink interference) level measured by the RBS. ulInitSirTarget is the Initial value for the Uplink SIR Target, defined according to the minimum Spreading Factor (SF) of the uplink Dedicated Physical Data Channel (DPDCH): SF_DPCCH is the Spreading Factor for the DPCCH. cPO is a parameter to set the uplink DPCCH power offset to a conservative level to avoid excessive UL interference DPCCH_POWER_OFFSET is calculated in the RNC and sent to the UE via the ul-DPCHPowerControlInfo part of the RRC Connection Setup (DL-CCCH) message. The initial uplink power in DPDCH is then determined from the initial uplink DPCCH power according to the relative power offsets between DPCCH and DPDCH (gain factor, as described in 3GPP TS 25.214). The UTRAN determines and sends to the UE the gain factor for the reference Transport Format Combination (TFC) only. The UE, in turn computes the gain factors for other TFCs, based on the reference TFC. 16.5.4. Initial Uplink SIR Target Setting Initial Uplink SIR Target is a configurable parameter defined according to the minimum Spreading Factor (SF) of the uplink Dedicated Physical Data Channel (DPDCH). The following parameters are used to configure the initial uplink SIR target for different scenarios. ulInitSirTargetSrb: Used for stand-alone SRB, i.e. RRC connection setup, Inter-RAT handover and common to dedicated(SRB) RAB release, ulInitSirTargetLow: Used for RABs having minimum DPDCH SF equal to or higher than 32. ulInitSirTargetHigh: Used for RABs having minimum DPDCH SF equal to 16 or 8. ulInitSirTargetExtraHigh: Used for RABs having minimum DPDCH SF equal to or lower than 4. T-Mobile USA, INC. Confidential Rev. 0.6 December 5, 2007 174 of 214 Ошибка! Используйте вкладку "Главная" для применения Title к тексту, который должен здесь отображаться. 16.5.5. Uplink Outer Loop Power Control DPCCH DPCCH RNC Sends new SIR Target to RBS UE RNC RBS RNC uses CRC on DPCCH to determine UL SIR Target The purpose of outer loop power control in the uplink is to define the SIR target that the UE will attempt to maintain. By adjusting the SIR target, and consequently the transmission power levels, the outer loop power control aims at providing the required quality. Too high quality would waste the system capacity, so the goal is to use as little power as possible. The RNC uses the quality of the DPCCH to determine if the SIR target needs to be increased or decreased, and sends the new target to the RBS. Since AMR voice CRCs are received on 20 ms TTI boundaries, the fastest this outer loop power control method can be adjusted is 50 times a second. The RNC can use two methods to determine the new SIR target:. The parameter ulOuterLoopRegulator determines whether to use Constant Step Regulator or Jump Regulator. The default setting is Jump Regulator. The initial uplink SIR targets are determined by the parameters ulInitSirTargetLow, ulInitSirTargetHigh or ulInitSirTargetExtraHigh depending on the spreading factor of the DPDCH. There are limits set for the maximum and minimum SIR targets. These are set using the parameters sirMax and sirMin. Constant Step Regulator Whenever the Cyclic Redundancy Check (CRC) indicates that the reception of a transport block is erroneous, the uplink SIR target is increased by configurable increment ulSirStep, expressed in dB. Whenever NBR_OF_CRC_OK consecutive transport blocks are correctly received, the uplink SIR target is decreased by an equal step. The number of consecutive correct transport blocks needed to trigger a decrease of the uplink SIR target depends on the BLER target. T-Mobile USA, INC. Confidential Rev. 0.6 December 5, 2007 175 of 214 Ошибка! Используйте вкладку "Главная" для применения Title к тексту, который должен здесь отображаться. ulSirStep NBR_OF_CRC_OK SIR Target CRC Jump Regulator The Jump Regulator increases the uplink SIR target by a configurable increment ulSirStep, expressed in dB, whenever a transport block is erroneously received. When a block is correctly received, the uplink SIR target is decreased by a fraction of ulSirStep. This fraction, denoted UP_DOWN_STEP_RATIO, depends on the BLER target. ulSirStep UP_DOWN_STEP_RATIO SIR Target ulSirStep CRC If several transport blocks are received in one Transmission Time Interval (TTI), the change in the uplink SIR target will be based on the accumulated change individually caused by each of the transport blocks. To reduce the variations of the uplink SIR target, the change of uplink SIR target is always scaled by the number of transport blocks received in the corresponding TTI, as SIRtarget_new = SIRtarget + ulSirStep [-X/(Z*UP_DOWN_STEP_RATIO)+Y/Z] where Z is the total number of received transport blocks. X is the number of transport blocks that have a CRC=OK. Y is the number of transport blocks that have a CRC=NG T-Mobile USA, INC. Confidential Rev. 0.6 December 5, 2007 176 of 214 Ошибка! Используйте вкладку "Главная" для применения Title к тексту, который должен здесь отображаться. 16.5.6. Downlink Outer Loop Power Control The downlink outer loop power control is taken care by the UE using its own proprietary algorithm. The SIR target is set according to an autonomous function in the UE in order to achieve the same measured quality as the quality target set by the RNC. The quality target is set as the transport channel BLER value and signaled by the RNC to the UE. This resultant SIR target is used by the UE as an input to the downlink inner loop power control. 16.5.7. Downlink Inner Loop Power Control UE requests power control adjustment in TPC command (1500 per second) RBS monitors TPC commands sent in DPCCH and increases or decreases Tx power in steps ± 0.5dB DPCCH/DPDCH sent with new power UE RNC RBS UE uses an internal algorithm to set the SIR target (outer-loop) The UE power controls the RBS to maintain the call quality in the downlink. Based on the difference between the actual SIR and the target SIR, the UE will request the RBS to either increase or decrease its transmit power. The UE requests a power adjustment by sending a Transmit Power Control (TPC) command in every slot (1500 times per second). Actual SIR >= Target SIR UE sends Power Down command Actual SIR < Target SIR UE sends Power Up command As soon as the RBS receives power control commands (TPC bits), it starts regulating the downlink power of the radio link according to these commands - increasing or decreasing the power by TPC equal to 0.5 dB (1.0 dB if the link is established over Iur). 16.5.8. Uplink Inner Loop Power Control Uplink inner loop power control uses a similar feedback method to downlink inner loop. The RBS sends power up or power down commands (TPC bits on the DPCCH) based on the difference between the target SIR and the measured SIR. The UE monitors the TPC bits on the DPCCH and increases or decreases its transmit power accordingly at the rate of 1500 times per second. The uplink transmit power is adjusted in steps of ±1dB. Actual SIR >= Target SIR RBS sends Power Down command Actual SIR < Target SIR RBS sends Power Up command T-Mobile USA, INC. Confidential Rev. 0.6 December 5, 2007 177 of 214 Ошибка! Используйте вкладку "Главная" для применения Title к тексту, который должен здесь отображаться. RBS compares measured SIR against target SIR (from UL outer loop PC) and determines if power up or power down is required RBS requests power control adjustment in TPC command (1500 per second) DPCCH/DPDCH sent with new power UE RNC RBS UE monitors TPC commands sent in DPCCH and increases or decreases Tx power in steps ± 1dB 16.6. Power Control during Soft Handover During soft-handoff the UE has to manage power control to and from multiple RBSs. This is handled differently in both the uplink and downlink. 16.6.1. Uplink power control during SHO During uplink power control, the UE receives TPC bits from the RBS instructing it to either increase or decrease its transmit power. When the UE is in soft-handover it receives TPC bits from multiple RBSs at the same time. The received TPC bits from the different RBSs are independent from each other so there is a good chance that they will be different. The UE resolves this conflict using a simple rule: if any Node B commands the UE to reduce power, it will reduce power. This is called OR of the downs. The UE will increase the DPCCH power by 1 dB, only if all the RBSs in the active set send a power up command. T-Mobile USA, INC. Confidential Rev. 0.6 December 5, 2007 178 of 214 Ошибка! Используйте вкладку "Главная" для применения Title к тексту, который должен здесь отображаться. TPC1 TPC2 UE RBS2 RBS1 Rule of the OR of the Down If any RBS requests the UE to power down, it will power down UE Tx Pwr (dB) +1 -1 -1 +1 -1 -1 +1 -1 -1 Power Up TPC1 Power Down Power Up TPC2 Power Down In the event of softer-handover, the UE should receive identical commands from the two cells. Knowing this, the UE “soft combines” the bits before making a decision on the value of the bit. Here, there is no OR of the downs. The reason is that if the signal is from two cells of the same Node B, the signal likely experiences the same general fading environment. The UE can tell whether two or more radio links are from the same Node B with the help of the TPC index. 16.6.2. Downlink power control during Soft Handover Initial Downlink power in Soft Handover During soft handover, the aim of power control is to equalize the power transmissions from the different RBSs, while compensating for differences in PCPICH power so that every signal is received with the same strength at the cell border. The first step in this process is to set the initial downlink power of the added radio link. The power for a radio link added through soft handover is initially set as T-Mobile USA, INC. Confidential Rev. 0.6 December 5, 2007 179 of 214 Ошибка! Используйте вкладку "Главная" для применения Title к тексту, который должен здесь отображаться. primaryCPICHPower dlInitSirT arg et - EcNo _ PCPICH P _ DL _ DPDCH 2 cSho 10 log SF _ DL _ DPDCH where P_DL_DPDCH is the Initial power setting for the Dedicated Physical Data Channel (DPDCH) primaryCpichPower is the downlink output power used for the PCPICH in the cell where the connection is set up EcNo_PCPICH is the measured Ec/No on PCPICH in the cell where the connection is set up, received from the UE. dlInitSirTarget is the required initial SIR target for the downlink DPDCH. SF_DL_DPDCH is the Spreading Factor for the downlink DPDCH. cSho is a correction factor that takes into account the handover margin mSho and a configurable parameter initShoPowerParam Typically, a new radio link is added when the measured PCPICH Ec/No of the cell to be added is higher than the best PCPICH Ec/No of cells already having a radio link, lowered by a handover margin. It is desirable to let the different RBSs transmit the same power, but, due to handover margin (mSho), the received PCPICH Ec/No is lower in the new cell, resulting in a higher-than-required initial power. The correction factor cSho is used to compensate for this effect, ideally allowing every RBS in the active set to transmit the same downlink power. Its value is determined as a function of mSho, to which the configurable parameter initShoPowerParam is added. This parameter is mainly useful to help the UE in getting frame synchronization, in case high input signals are required by the base band processing. When entering soft handover, the downlink Inner Loop Power control of the existing branch is directly applied to the new branch. The initial power setting allows all branches to start with the correct power levels. Each RBS in the active set listens to the same sequence of TPC commands from the UE. However, due to the different radio conditions of the different soft handover links, the different TPC commands may be affected by different errors. Consequently, the transmitted power at different RBSs will start to drift, eventually leading to uncoordinated links. The Power Balancing mechanism prevents this power drift by using a modified type of power control during soft handover. Power Balancing: RNC calculates a single reference power based on the transmitted code power measured in each radio link, and periodically sends it to all the RBSs. Each RBS involved in soft handover makes synchronized adjustments of the downlink power of the T-Mobile USA, INC. Confidential Rev. 0.6 December 5, 2007 180 of 214 Ошибка! Используйте вкладку "Главная" для применения Title к тексту, который должен здесь отображаться. radio links according to the received reference power. This will result in the convergence of RBSs power levels and prevents the power drift. The Power balancing method works in conjunction with the downlink Inner Loop Power control based on the setting of the parameter dlPcMethod. If dlPcMethod is set to FIXED, both Power balancing and downlink Inner Loop Power control are disabled and the downlink power is kept at a constant level set by the parameter fixedPowerDL during the call. If dlPcMethod is set to NO BALANCING, downlink Inner Loop Power control is active, but Power Balancing is disabled. If dlPcMethod is set to BALANCING, downlink Inner Loop Power control is always active and Power Balancing runs in parallel with downlink Inner Loop power control when more than one radio link is involved. If dlPcMethod is set to FIXED BALANCING, downlink Inner loop power control is active as long as only one radio link is involved. As soon as an additional radio link is added to the active set, downlink inner loop power control is disabled, and Power balancing is activated; the downlink power stays at the configurable parameter fixedRefPower as long as the active set includes multiple radio links. The power control mechanism in a soft handover scenario is shown in the figure below. T-Mobile USA, INC. Confidential Rev. 0.6 December 5, 2007 181 of 214 Ошибка! Используйте вкладку "Главная" для применения Title к тексту, который должен здесь отображаться. 16.7. Power Control during Compressed Mode 16.7.1. Uplink Power Control in Compressed Mode Power Control in uplink Compressed Mode aims at recovering the SIR target as quickly as possible after each transmission gap, in order to avoid block errors during and after the compressed frames. To achieve this recovery, the uplink Inner Loop Power Control increases the SIR target. The active set cells estimate the SIR value of the received uplink DPCCH, generate TPC commands, and transmit them one per slot, except during downlink transmission gaps, according to the following rule: If estimated SIR SIR cm_target, the RBS sends a down command. If estimated SIR < SIRcm_target, the RBS sends an up command. SIRcm_target is the target SIR during Compressed Mode, which is increased to compensate for the interruption in the Power Control due to transmission gaps, as well as for differences in the number of pilot bits in the uplink DPCCH. Compressed and non-compressed frames in the uplink DPCCH can have a different number of pilots per slot. The total number of transmitted slots in compressed frames is decreased, but the same number of bits as in a non-compressed frame must be sent. To accomplish this, some of the pilot bits are replaced with TFCI bits. The total pilot energy per slot should nevertheless be maintained, implying that an additional PILOT needs to be added to the transmitted uplink power. PILOT = 10Log10 (N pilot,prev /N pilot,curr ); where N pilot,prev and Npilot,curr represent the number of pilot bits in the most recently transmitted slot and in the current slot respectively. Thus, the received SIR per slot will increase correspondingly, and so as not to misinterpret this as improved channel conditions, the SIR target is increased by SIR PILOT: SIR PILOT = 10Log10 (Npilot,N /N pilot,currframe ); where N pilot,N and Npilot,currframe represent the number of pilot bits per slot in a normal uplink frame (without transmission gap) and in the current uplink frame respectively. 16.7.2. Downlink Power Control in Compressed Mode Power Control in downlink Compressed Mode aims at recovering the SIR target as quickly as possible after each transmission gap, in order to avoid block errors during and after the compressed frames. To achieve this recovery, the Power Control increases the downlink power, and the RRC signaling increases the downlink SIR target used by the Power Control algorithm in the UE. In compressed frames, the transmission of downlink DPDCH and DPCCH stops during transmission gaps. Downlink Inner Loop Power Control is not active during the transmission gap. In every slot in Compressed Mode, except during downlink transmission gaps, UTRAN estimates the k-th TPC command and adjusts the current downlink power P(k-1) [dB] to the new value P(k) [dB], according to the following formula: T-Mobile USA, INC. Confidential Rev. 0.6 December 5, 2007 182 of 214 Ошибка! Используйте вкладку "Главная" для применения Title к тексту, который должен здесь отображаться. P(k) = P(k - 1) + PTPC(k) + PSIR(k) + P bal(k) where PTPC (k) is the k-th power adjustment due to the Inner Loop Power Control PSIR (k) is the k-th power adjustment due to the downlink SIR target variation Pbal (k) [dB] is the correction due to the Power Balancing Due to transmission gaps in uplink compressed frames, uplink TPC commands might be missing. If none is received, PTPC(k), derived by the Node B, is set to zero. Otherwise, PTPC(k) is calculated in the same way as in normal mode, but applying a step size STEP instead of TPC. STEP is set equal to 2 TPC during the slots belonging to the Recovery Period, after each transmission gap, and to TPC otherwise. The Recovery Period Length (RPL) is expressed as a number of slots, and is equal to MINIMUM(transmission gap length, 7). Refer to the ‘Compressed Mode’ section earlier in this document for details on the compressed mode feature. In Compressed Mode, the transmitted DPDCH power does not exceed the maximum transmission power by more than the accumulated effect of P SIR(k). 16.8. Power Control Scenarios 16.8.1. Power Control steps for Radio Link Setup Procedure When a dedicated radio link is established, the following power control actions are performed. Set Initial Downlink Power Set Downlink Power Limits Set Initial Uplink Power Set Initial Uplink SIR Targets Start Uplink Outer Loop Power Control Start Downlink Inner Loop Power Control Start Uplink Inner Loop Power Control The details of each of these actions are covered in the previous sections. 16.8.2. Power Control steps for RAB Establishment When a RAB is added to the existing connection, the following actions related to Power Control are taken. Set Downlink Power Limits Downlink Inner Loop Power Control is already running and no changes are made as a result of the addition of the service. Any requirements for increased power is handled through the regular downlink power updates ordered through the TPC commands sent on the uplink Dedicated Physical Control Channel (DPCCH). Set Initial Uplink SIR Target Start Uplink Outer Loop Power Control T-Mobile USA, INC. Confidential Rev. 0.6 December 5, 2007 183 of 214 Ошибка! Используйте вкладку "Главная" для применения Title к тексту, который должен здесь отображаться. 16.8.3. Uplink Inner Loop Power Control is already running, and no changes of the uplink DPCCH Power are made as a result of the addition of the service. Any requirements for increased power are handled through the regular uplink power updates ordered through the TPC commands sent on the downlink DPCCH. Power Control steps for Soft Handover When a radio link is added to the active set, the following actions related to Power Control are taken: Set Initial Downlink Power Set Downlink Power Limits Start Power Balancing Upon radio link addition, no Power Control actions are initially needed for the uplink, since the UE is already power controlled by the existing radio links. As soon as the added radio link obtains uplink synchronization, the RBS issues Power Control commands based on the SIR estimates for uplink Inner Loop Power Control. In case of softer handover, the instantaneous power level is copied from the existing to the new radio link. When a radio link is removed from the active set, no Power Control actions are taken, except for stopping Power Balancing when the soft handover ends. 16.9. Example of Power Control Procedure The following figure shows the steps involved in the power control procedure for the establishment of a speech call, followed by a soft handover. Each box in the figure represents NBAP/RRC procedure or power control action described in the above subsections. T-Mobile USA, INC. Confidential Rev. 0.6 December 5, 2007 184 of 214 Ошибка! Используйте вкладку "Главная" для применения Title к тексту, который должен здесь отображаться. T-Mobile USA, INC. Confidential Rev. 0.6 December 5, 2007 185 of 214 Ошибка! Используйте вкладку "Главная" для применения Title к тексту, который должен здесь отображаться. 17. UE States In UMTS, a UE is said to be in idle mode when it has no RRC connection with the RNC. An RRC connection is a logical connection between UE and RAN used by two peer entities to support the upper layer exchange of information flows. A UE can have only one RRC connection. Several upper layer entities use the same RRC connection. A UE in RRC connected state can be in one of 4 states – CELL_DCH, CELL_FACH, CELL_PCH and URA_PCH. In the Ericsson implementation, the CELL_PCH state is not supported and is not covered in the rest of the document. The remaining 4 states are shown in the figure below. Connected Mode URA_PCH Cell_DCH Cell_FACH Idle Mode Figure 48: UE States in Ericsson UTRAN Each of these UE states is covered in detail below. 17.1. Cell_DCH The CELL_DCH state is characterized by: A dedicated physical channel is allocated to the UE in uplink and downlink. The UE is known on cell level according to its current active set. The CELL_DCH-state is entered from the Idle Mode through the setup of an RRC connection, or by establishing a dedicated physical channel from the CELL_FACH state. In this state the UE is allocated a DCH/E-DCH (Dedicated Transport Channel) or HS-DSCH (Common Transport Channel). The logical channel DCCH (Dedicated Control Channels) is T-Mobile USA, INC. Confidential Rev. 0.6 December 5, 2007 186 of 214 Ошибка! Используйте вкладку "Главная" для применения Title к тексту, который должен здесь отображаться. used for control signaling and DTCH (Dedicated Traffic Channels) is used for user data transmission. They are mapped onto the Transport channels and further multiplexed onto Dedicated Physical Channels. 17.1.1. CELL_DCH to CELL_FACH state Switching from a dedicated transport channel to the common transport channels on RACH/FACH when the traffic volume is low makes better use of dedicated radio resources. It allows other users to take advantage of the unused resources. This switch is triggered by inactivity (uplink and downlink combined) and applies to all CELL_DCH rates including DCH/DCH, DCH/HS and EUL/HS. It is initiated by the S-RNC based on RLC throughput measurements and is triggered by the Dedicated to Common Evaluation algorithm (covered in the later section). 17.2. Cell_FACH The CELL_FACH state is characterized by: No dedicated physical channel is allocated to the UE. The UE continuously monitors a FACH in the downlink The UE is assigned a default common or shared transport channel in the uplink (e.g. RACH) that it can use anytime according to the access procedure for that transport channel The position of the UE is known by UTRAN on cell level according to the cell where the UE last made a cell update. Cell Update In CELL_FACH state, the Cell Update procedure is used to keep the UTRAN informed about the UEs location on a cell level. Cell Update is initiated in the following cases when a UE is in the CELL_FACH state: A UE in state CELL_FACH enters a new cell. As part of a supervision mechanism, Cell Update is performed periodically by UEs in state CELL_FACH. The periodicity is controlled by the timer t305. If a UE in state CELL_FACH re-enters the service area after having been out of coverage when a periodic Cell Update should have been sent. UE in state CELL_FACH detects RLC unrecoverable error in an AM RLC entity. In the CELL_FACH state, the UE is able to transmit control signals and data packets on the common transport channel RACH in the uplink direction and on the FACH in the downlink direction. A maximum of 32 kbps is available on downlink for user data transmission. 17.2.1. CELL_FACH to CELL_DCH A transition occurs, when a dedicated physical channel is established via explicit signaling. When the traffic volume of a UE on CELL_FACH state increases, it is switched to the 64/64, 64/HS or EUL/HS state if there are resources available. This is to better serve the needs of the UE and to keep the common channels available to others that require only small amount of resources. This switch is triggered by the Common to Dedicated Evaluation algorithm based on buffer load measurements made in the S-RNC and in the UE. T-Mobile USA, INC. Confidential Rev. 0.6 December 5, 2007 187 of 214 Ошибка! Используйте вкладку "Главная" для применения Title к тексту, который должен здесь отображаться. 17.2.2. CELL_FACH to URA_PCH A UE on CELL_FACH is switched down to URA_PCH if it shows no activity for a long period of time. This time is given by the RNC parameter inactivityTimer. In this way, system resources are freed and UE power consumption is reduced, since the UE does not have to monitor the FACH any more. This switch is triggered by the Common to URA_PCH algorithm based on complete inactivity on both the uplink and the downlink. 17.3. URA_PCH For a UE in URA_PCH state the service re-activation time is shorter compared to setting up the connection from idle mode. At the same time the UE requires less signaling and power consumption when in URA_PCH state compared to when on the common CELL_FACH channel. Hence, it is possible to keep the UE in URA_PCH state for long time and let the user benefit from the short service reactivation time. The URA_PCH state is characterized by: Neither an uplink nor a downlink dedicated physical channel is allocated to the UE The UE uses DRX for monitoring a PCH via an allocated PICH. No uplink activity is possible The location of the UE is known on UTRAN Registration area (URA) level according to the URA assigned to the UE during the last URA update in CELL_FACH state. In this state the UE performs the following actions: Monitor the paging occasions according to the DRX cycle and receive paging information on the PCH Listens to the BCH transport channel of the serving cell for the decoding of system information messages Initiates a URA updating procedure on URA change. The Cell Update procedure in the URA_PCH state is for the following cases: UE in state URA_PCH has uplink data to transmit UE in state URA_PCH state is paged by the network. The page can be either UTRAN or CN initiated. URA Update In state URA_PCH, the procedure URA Update is used to keep WCDMA RAN informed about the UEs location on a URA level. To perform the URA update procedure, UE is moved temporarily from URA_PCH to CELL_ FACH state. After the URA update is completed, UE state is changed back to URA _PCH. URA Update is initiated in the following cases: A UE in state URA_PCH enters a new cell not belonging to the same URA that the UE is registered in. The UE enters a cell that has no URAs defined. This will trigger a release of the RRC Connection and the UE enters idle mode. T-Mobile USA, INC. Confidential Rev. 0.6 December 5, 2007 188 of 214 Ошибка! Используйте вкладку "Главная" для применения Title к тексту, который должен здесь отображаться. As part of a supervision mechanism, URA Update is performed periodically. The periodicity is controlled by the timer t305. In the response to the URA Update, WCDMA RAN selects which URA the UE shall be registered to. Also for periodical URA Updates, where the UE might not have moved, the selected URA has to be specified by the network. System Information Block Type 2 contains the URA identities of the URAs configured in the cell. The same cell can belong to a maximum of 4 different URAs. In the URA_PCH state, the UE is not able to transmit or receive any control signals or data packets. 17.3.1. URA_PCH to CELL_FACH When UE detects request for data activity on uplink it will send a cell-update message which triggers a switch to CELL_FACH state. When RNC detects need for data transmission on downlink it will send a URA page to UE which will trigger a cell-update leading to switch to CELL_FACH. Note that the release of an RRC connection is not possible in the URA_PCH State. The UE will first move to Cell_FACH state to perform the release signaling. 17.3.2. URA_PCH to IDLE Upon extended inactivity on both the uplink and the downlink, a URA_PCH state will be switched down to IDLE. This is controlled by the RNC parameter inactivityTimerPch timer which limits the time the connections stays in URA_PCH state. The switch is triggered by the URA_PCH to idle evaluation algorithm. T-Mobile USA, INC. Confidential Rev. 0.6 December 5, 2007 189 of 214 Ошибка! Используйте вкладку "Главная" для применения Title к тексту, который должен здесь отображаться. 18. Introduction to R99 PS data services The aim of this section and the subsequent ones is to describe the important features offered in Ericsson Radio Access Network (RAN) that impact the delivery of R99 Packet Switch (PS) data services to T-Mobile’s customers. This section explains the different QoS and Traffic classes related to packet data services as well as the Radio Resource Management (RRM) functionality. The Channel Switching Algorithm is the main function inside the RRM that controls PS Data Services, which is covered in the subsequent sections. 18.1. Radio bearer QoS The Packet Switch data services are defined according to its Quality of Service (QoS) requirement in order to deliver the service effectively. For example certain applications are more tolerant to delay (latency) and can therefore be assigned a lower priority. The three main QoS service considerations that must be taken into account are: Call quality - mapping of UMTS QoS parameters to the WCDMA transport and physical channel characteristics, Priority - bearer admission and scheduling, Service availability and blocking - perceived QoS in terms of service coverage and capacity. 18.2. Differentiation between traffic classes In general, the UMTS traffic classes provide the means for the network to differentiate between end-to-end user applications according to their required traffic characteristics for that service. The main differentiation between the traffic classes is based on how sensitive the service is to delay. Given that radio spectrum is a limited resource, the radio access bearers (RABs) are limiting factors in terms of the available resources (compared to a fixed network where additional circuits can be provided with the extension of hardware e.g. fiber cable,) then traffic must be prioritized and handled according to its service class attributes. However, it is the performance of both the radio and fixed bearers (Transmission infrastructure) that determine the overall QoS offered by the network. Table 11 shows the main characteristics of the QoS classes that are supported in UMTS. T-Mobile USA, INC. Confidential Rev. 0.6 December 5, 2007 190 of 214 Ошибка! Используйте вкладку "Главная" для применения Title к тексту, который должен здесь отображаться. Table 11: Traffic Classes Characteristics 18.3. Radio Resource Management for packet data services In addition to the Channel Switching algorithms, Congestion Control, Admission Control and Handover functions can also trigger switching of a transport channel for an interactive RAB to one with a lower rate. Admission Control switches a UE from one dedicated transport channel to another one at the next lower-rate when the resource is needed to establish a new connection for a UE with high priority. Congestion Control may switch a UE from a dedicated to a common transport channel to resolve a congestion situation. When the Soft Handover algorithm fails to add a radio link due to admission denial and the current connection has uplink and/or downlink rates higher than 64 kbps, it will switch the connection down to 64/64 or 64/HS before trying to add the radio link again. When a UE enters the area of a new RNC, while being in states FACH or URA_PCH, it will be switched down to IDLE state in order to avoid common transport channel (FACH/RACH) signaling over the Iur interface. 18.4. Active Queue Management feature The Active Queue Management for interactive RAB feature introduces an optimized buffer handling, which minimizes the buffering delays and interacts with the TCP protocol in a favorable manner, thereby significantly improving the quality of the service experienced by the end user. With Active Queue Management, a mechanism to detect link overload before the absolute limits of the buffer in the RNC have been reached is introduced. Through this, a carefully selected packet dropping profile is applied to the overloaded buffers in order to avoid uncontrolled packet losses and high buffering delays when link overload is detected. Active Queue Management can be turned on and off with the activeQueueMgmt parameter. T-Mobile USA, INC. Confidential Rev. 0.6 December 5, 2007 191 of 214 Ошибка! Используйте вкладку "Главная" для применения Title к тексту, который должен здесь отображаться. 18.5. Channel Switching Feature Traffic on the interactive Radio Access Bearer (RAB) causes large variations in offered traffic over time for a particular user. Consequently, it is not efficient to reserve resources for a dedicated channel continuously. Channel Switching is a feature that dynamically allocates resources to a user according to the amount of data that needs to be transmitted in the uplink and the downlink. This is achieved by switching the interactive RAB of the user between transport channels of different rates. When an interactive RAB has only a small amount of data to send and receive, it is switched to common transport channels .This allows more users to share the radio resources than in a circuit-switched scenario. When the traffic increases, the user is switched to a dedicated transport channel if there are resources available Channel Switching applies only to packet traffic on the interactive RAB, which has little or no quality of service attributes that apply. It belongs to the interactive and Background Quality of Service classes, which have no guaranteed bit rates and no packet delay requirements. When sufficient resources are available, the interactive RAB receives high bit rates but when the system is heavily loaded and not many resources are available, the bit rates offered may be low. In a heavily loaded situation, it may not be given any bandwidth at all, since there are no guarantees on resource allocation for the RAB. Channel Switching switches only between transport channels. The logical channels are not affected. The channel switching feature will only affect users that are turned on and in connect mode, sending or receiving data. The UEs in connected mode can be changed through the different states to optimize the resources. The channel switching feature consists of two parts: evaluation and execution. Channel switching evaluation is responsible for monitoring and reporting the needs of a UE by measurement reports received from the UE, RBS and RNC. The evaluation part will then send an execution request to the execution part when the criteria for a channel switch is fulfilled. Chanel switching execution is responsible for the allocation of resources according to the UE and cell capabilities and executing the Radio Bearer Reconfiguration procedure for performing the channel switch. 18.6. Channel Switching Triggers The Channel Switching Evaluation is based on two criteria User activity measured in terms of either channel throughput or RLC (Radio Link Control) buffer load. Coverage condition measured in terms of downlink code power. An upswitch is requested when high user activity is detected either on a dedicated channel (DCH) as high channel throughput close to the maximum capacity of the current transport channel or on FACH as high buffer load. For a dedicated to dedicated channel upswitch on the downlink, a test is also made to ensure that there will be sufficient coverage (downlink code power) after the switch. Upswitch from URA_PCH to FACH is triggered by user activity. When low or no user activity is detected, a downswitch is requested. When on a dedicated channel, the detection is based on throughput measurement and the connection will be switched down either to a lower rate on a dedicated channel or to FACH depending on throughput level. This happens after periods defined by downswitch timers. When on FACH, T-Mobile USA, INC. Confidential Rev. 0.6 December 5, 2007 192 of 214 Ошибка! Используйте вкладку "Главная" для применения Title к тексту, который должен здесь отображаться. a switch down request to URA_PCH state will be made based on user data inactivity after the period specified by an inactivity timer. Also, when on URA_PCH, the measurement is based on data inactivity and a request to release the connection will be made after the period specified by an inactivity timer. When the coverage on downlink of a connection falls below a certain threshold considered to be insufficient for the current rate, a downswitch to the next lower state will be requested. There is no coverage-triggered downswitch for the uplink. Also there is no coverage test for dedicated to dedicated channel upswitch on the uplink. The UE is expected to perform transport format reduction to compensate for insufficient uplink coverage. 18.7. Triggers for Dedicated to Dedicated channel switching 18.7.1. Throughput-triggered Upswitch This is triggered by high channel utilization in the uplink or the downlink as indicated by a measured channel throughput that is close to the maximum capacity of the current transport channel. The UE will be switched to a state with a higher rate in the link that triggered the switch. The HS-DSCH is the preferred channel for the downlink and E-DCH in the uplink. A check on the EUL/HS capability or DCH/HS capability of both the UE and the connected cells is made before the switch. If all are EUL/HS capable, the transition will be to the EUL/HS state. If both are DCH/HS capable but not EUL/HS capable the transition will be to 64/HS or 384/HS depending on the need. For an uplink trigger, the UE is switched to a state with a higher uplink rate without compromising the downlink rate and for downlink trigger; the UE is switched to a state with a higher downlink rate without compromising the uplink rate. A coverage test based on the current DL code power utilization is made to see if the UE has sufficient code power to switch up to the target state. This is to avoid loss of connection or immediate coverage triggered downswitch due to insufficient code power. Note that if the current best cell is not HSDPA enabled but a coverage related cell on another frequency is, the connection may be redirected to that cell. These transitions are triggered by the CELL_DCH to CELL_DCH Upswitch Evaluation algorithm. 18.7.2. Throughput-triggered Downswitch This is triggered by low channel utilization in the uplink or the downlink as indicated by a measured channel throughput that is below a certain percentage of the maximum capacity of the transport channel with the next lower rate. The UE will be switched down to a state with the next lower rate in the link that triggered the switch. 18.7.3. Coverage-triggered downswitch Insufficient downlink coverage is detected in the form of high downlink code power. This applies only to UE’s that have a DCH transport channel on the downlink. The downlink channel will be switched to one with the next lower rate, i.e., DCH/384 to DCH/128, DCH/128 to DCH/64, with DCH equals 64,128 and 384. This is triggered by the CoverageTriggered Downswitch Evaluation algorithm. T-Mobile USA, INC. Confidential Rev. 0.6 December 5, 2007 193 of 214 Ошибка! Используйте вкладку "Главная" для применения Title к тексту, который должен здесь отображаться. 18.8. Multi RAB State Transitions 18.8.1. Speech + Interactive Five different types of Channel Switching among the seven states Speech + 0/0, Speech + 64/64, Speech + 64/128, Speech + 64/384, Speech +128/64, Speech + 64/HS, Speech + 384/HS are available. The Multi-RAB Downswitch Evaluation monitors the states with a non-zero interactive rates and triggers a switch to the lowest state Speech + 0/0 (SP0) when there is no activity on the Interactive RAB for an extended period of time. If the state SP0 is not available (multiRabSp0Available set to 0), a request to release the Interactive RAB is made, instead. The Multi-RAB Upswitch Evaluation monitors the activity on both the uplink and the downlink of the SP0 state and switch it up to the Speech + 64/64 or Speech + 64/HS state if necessary. The CELL_DCH to CELL_DCH Upswitch Evaluation switching for a downlink trigger: Speech + 64/64, Speech + 64/128, Speech + 64/384 to Speech + 64/HS Speech + 128/64 to Speech + 384/HS Speech + 64/64 and Speech+ 64/128 to Speech + 64/384 Speech +64/64 to Speech + 64/128. The CELL_DCH to CELL_DCH Upswitch Evaluation switching for an uplink trigger: Speech + 64/64, Speech + 64/128, Speech + 64/384, Speech + 128/64, Speech + 64/HS to Speech + 384/HS Speech + 64/64 to Speech + 64/128 The CELL_DCH to CELL_DCH Downswitch Evaluation switching for a downlink trigger: Speech + 64/384 to Speech + 64/128 Speech + 64/128 to Speech + 64/64. The CELL_DCH to CELL_DCH Downswitch Evaluation switching for an uplink trigger: Speech + 128/64 to Speech + 64/64 Speech + 384/HS to Speech + 64/HS. The Coverage Triggered Downswitch Evaluation switches Speech + 64/384 to Speech + 64 /128 and switches Speech + 64/ 128 to Speech + 64/64. 18.8.2. 2xInteractive Inactivity monitoring is available on the 2xInteractive multi-RAB. The Multi-RAB Downswitch Evaluation triggers a request to release one of the interactive RAB's upon a period of inactivity on both the uplink and the downlink for one of the RAB's. 18.8.3. Speech + 2xInteractive Inactivity monitoring is available on the Speech + 2xInteractive multi-RAB. The Multi-RAB Downswitch Evaluation triggers a request to release one of the interactive RAB’s upon a period of inactivity on both the uplink and the downlink for that RAB. T-Mobile USA, INC. Confidential Rev. 0.6 December 5, 2007 194 of 214 Ошибка! Используйте вкладку "Главная" для применения Title к тексту, который должен здесь отображаться. 19. Channel Switching Algorithms The objective of the channel switching algorithms is to determine for each interactive RAB if there is a need to switch a UE from one transport channel to another and to select a transport channel with a user bit rate corresponding to the required bandwidth of the data transmission. The channel switching algorithms consist of the following sub-algorithms: Common to Dedicated Evaluation Dedicated to Common Evaluation Common to URA Evaluation URA to Idle Evaluation Coverage Triggered Downswitch Evaluation Dedicated to Dedicated Upswitch Evaluation Throughput based Dedicated to Dedicated Downswitch Evaluation Multi RAB Downswitch Evaluation Multi RAB Upswitch Evaluation The Channel Switching algorithms use buffer load, throughput, and transmitted code power as input to the algorithms. These terms are defined as follows: Buffer load is defined as the minimum of the Radio Link Control (RLC) transmission window and the sum of bytes in the SDU (service data unit) buffers and retransmission buffers of some of the RLC instances (each interactive RAB connection consists of five RLC instances). Uplink throughput is defined as the number of bits transmitted from the MAC layer to the RLC layer. Downlink throughput is defined as the number of bits transmitted from the RLC layer to the MAC layer. The RLC instances to be considered for the buffer load and throughput measure depends on the UE state and the algorithm using the measure. Transmitted code power is defined as the downlink power of the pilot bits of the DPCCH (Dedicated Physical Control Channel) field. For channel switching purposes, periodic reporting with a 1 second period is used. The following sections will describe in detail the different channel switching algorithms and will mention the parameters involved in them. Refer to Appendix F for a quick look at the recommended values for all Channel Switching parameters. 19.1. Common to Dedicated Evaluation The Common to Dedicated Evaluation algorithm monitors the amount of user data waiting to be transmitted (buffered) in the RNC or UE. If the buffer load increases and a switch from the common transport channels FACH/RACH to a higher bit rate dedicated transport channel is required, an upswitch request is sent to channel switching execution. The evaluation algorithm is activated at the entry of the common state, and uses RLC buffer loads in both the uplink and the downlink as input. T-Mobile USA, INC. Confidential Rev. 0.6 December 5, 2007 195 of 214 Ошибка! Используйте вкладку "Главная" для применения Title к тексту, который должен здесь отображаться. When the RLC buffer load in the uplink exceeds the threshold value set by the RNC parameter ulRlcBufUpswitch, a measurement report is sent from the UE and an upswitch request is issued after the reception of the measurement report. A request is also issued when the RLC buffer load in the RNC, in the downlink exceeds the threshold value set by the RNC parameter dlRlcBufUpswitch. Channel switching execution thereafter performs the upswitch when permission is given from Admission Control. The common to dedicated switching function always tries to allocate the highest rate transport channel pair possible. If the highest is not possible it tries with the second highest and so on (i.e. EUL/HS, 64/HS, 64/384, 64/128). 19.2. Dedicated to Common Evaluation The Dedicated to Common Evaluation algorithm monitors the transmitted user data. If user throughput decreases so that a switch from a dedicated transport channel to the common transport channels FACH/RACH is required, a downswitch request is sent to channel switching execution. The evaluation is activated once the dedicated state is entered and it uses throughput measurements, performed in the S-RNC, in both the uplink and downlink for both control and user data as input. When the throughput on both the uplink and downlink is below the threshold value set by the RNC parameter downswitchThreshold, the timer defined by the RNC parameter downswitchTimer is started for a DCH/DCH allocation or the timer defined by the RNC parameter hsdschInactivityTimer is started for a DCH/HS or EUL/HS allocation. If the throughput increases above a second threshold set by the parameter downswitchTimerThreshold before the timer expires, the timer is stopped and no switch is issued. This is done for stability reasons, and could be used to prevent switches back and forth at momentary dips in throughput. Figure 49: Dedicated to common channel switching evaluation The example in the previous figure shows the following: 1. The throughput decreases below the downswitch threshold (downswitchThreshold) and the timer (downswitchTimer) is started. T-Mobile USA, INC. Confidential Rev. 0.6 December 5, 2007 196 of 214 Ошибка! Используйте вкладку "Главная" для применения Title к тексту, который должен здесь отображаться. 2. The throughput increases and exceeds the upper threshold (downswitchTimerThreshold) and the timer is stopped. 3. The throughput decreases again and the downswitch threshold (downswitchThreshold) is crossed, which starts the timer. 4. Finally, the timer expires and a switching request from the dedicated to the common state is issued. The evaluation is restarted when the switch request is issued to Channel Switching execution. This is necessary in order to handle failing downswitches. If the downswitch fails, a new request is issued when the restarted timer expires. A value of 0 for the downswitchTimer disables the Dedicated to Common Evaluation algorithm. When the UE is ordered to switch to the common state, no target cell is specified. This means that the UE selects a cell and performs a cell update procedure. 19.3. Common to URA Evaluation The Common to URA Evaluation releases UEs with no activity in order to free resources. It also decreases the power consumption of the UE, since the UE does not have to monitor the FACH for long periods of time. The algorithm is activated at the entry of the FACH state. Uplink and downlink activity is monitored and the algorithm requests a switch to URA_PCH state if no uplink or downlink activity is detected (i.e. no data has been transmitted) during a time defined by the RNC parameter inactivityTimer. If the URA_PCH state is not available, the UE is switched down to idle state. 19.4. URA to Idle Evaluation The URA to Idle Evaluation releases UEs with no activity in order to free resources. The algorithm is activated at the entry of the URA_PCH state. The algorithm requests a switch to idle mode if a UE has been allocated to URA_PCH state for a time defined by the RNC parameter InactivityTimerPch. The request is issued to the Signaling Connection Handling function. Signaling Connection Handling issues an Iu release request to the Core Network, which in turn decides whether the connection should be released. 19.5. Coverage Triggered Downswitch Evaluation The Coverage Triggered Downswitch Evaluation algorithm monitors the code power utilization on the downlink. If the code power increases so that a switch to a lower rate dedicated channel on the downlink is required due to coverage reasons, a downswitch request is sent to the Channel Switching Execution function. The goal is to minimize call drops due to bad link quality. When downlink transmitted code power increases to a value too close to its maximum, there is a risk that the link quality cannot be maintained. In this situation, a user should be switched down to a lower rate to decrease the needed downlink transmitted code power. This feature is used to prevent a user from using a data rate in an area where there is risk for no coverage of that particular rate. T-Mobile USA, INC. Confidential Rev. 0.6 December 5, 2007 197 of 214 Ошибка! Используйте вкладку "Главная" для применения Title к тексту, который должен здесь отображаться. The algorithm monitors the downlink transmitted code power of all legs in the active set and the code power is then filtered by each Node B in the active set. A downswitch request is issued when all handover legs use a power above the power alarm threshold defined by the parameter downswitchPwrMargin below the maximum code power for a period defined by the parameter coverageTimer. If the transmitted downlink code power falls below the power alarm threshold by a margin equal to the parameter reportHysteresis while the timer defined by the parameter coverageTimer is running, the request will be cancelled and no downswitch is executed. The reason for this hysteresis is to prevent the algorithm from cancel a downswitch due to small, momentary dips in transmitted downlink code power. This evaluation algorithm is started at the entry of the single RAB states DCH/384 and DCH/128 and Multi RAB states speech + 64/384 , speech + 64/128 and 64/128 + 64/128 . Figure 50: Coverage Triggered Downswitch 19.6. Dedicated to Dedicated Upswitch Evaluation The Dedicated to Dedicated Upswitch Evaluation algorithm determines whether a switch to a higher rate channel should be made. The same algorithm applies both for Single RAB and for Multi RAB transitions. The algorithm monitors the uplink and the downlink throughput separately. A channel switch request to a higher uplink rate Radio Bearer (uplink triggered) or to a higher downlink rate Radio Bearer (downlink triggered) is issued if all of the following conditions are fulfilled: The downlink throughput increases above the threshold specified by the RNC parameter bandwidthMargin for a period defined by the parameter upswitchTimer or the uplink throughput increases above the threshold specified by the RNC parameter bandwidthMarginUl for a period defined by the parameter upswitchTimerUl. T-Mobile USA, INC. Confidential Rev. 0.6 December 5, 2007 198 of 214 Ошибка! Используйте вкладку "Главная" для применения Title к тексту, который должен здесь отображаться. For a trigger on the downlink, the transmitted code power consumption on the current rate is below the power upswitch threshold defined by the RNC parameter upswitchPwrMargin for all legs in the active set at the expiry of the timer set by the parameter upswitchTimer. The maximum bit rate capability for QoS profiling does not indicate that the current rate is the maximum bit rate for the user After a throughput based downswitch, the downlink throughput has fallen below the threshold specified by dlThroughputAllowUpswitchThreshold or the uplink throughput has fallen below the threshold specified by ulThroughputAllowUpswitchThreshold. The power upswitch threshold is defined from the power alarm threshold through the parameter upswitchPwrMargin and the estimated power increase, as shown in the figure below. The estimated power increase is based on the relative rate difference between the current and a higher rate. For an upswitch from 64 to 128 kbps, the estimated power increase is 2.9 dB and for the 128 to 384 kbps upswitch, it is 4.7 dB. When evaluating an upswitch from 64 kbps, rate 384 kbps is targeted as first alternative and rate 128 kbps as second alternative. If the bandwidthMargin parameter is set to 0 or the bandwidthMarginUl is set to 0, the Dedicated to Dedicated Upswitch evaluation is turned off for downlink or uplink respectively. If the dlThroughputAllowUpswitchThreshold parameter is set to 0 or the ulThroughputAllowUpswitchThreshold is set to 0, this condition is not used for downlink or uplink respectively. As long as the upswitch request cannot be fulfilled, the upswitch request will be repeated. An adaptive upswitch time is achieved by doubling the time between requests for each new request sent, where the time between first and second request is determined by upswitchTimer or by upswitchTimerUl to a maximum of 60 seconds. This decreases the possibility of immediately ending up in a congestion situation again when a congestion situation had just been resolved. T-Mobile USA, INC. Confidential Rev. 0.6 December 5, 2007 199 of 214 Ошибка! Используйте вкладку "Главная" для применения Title к тексту, который должен здесь отображаться. Figure 51: Coverage testing before a downlink upswitch 19.7. Throughput Based Dedicated to Dedicated Downswitch Evaluation The Dedicated to Dedicated Downswitch Evaluation algorithm determines whether a switch to a lower rate channel should be made. The same algorithm applies both for Single RAB and for Multi RAB transitions. The uplink and the downlink throughput are monitored separately. A channel switch request to the next lower uplink rate Radio Bearer (uplink triggered) or to the next lower downlink rate Radio Bearer (downlink triggered) is issued when the downlink throughput decreases below the threshold specified by dlDownswitchBandwidthMargin for a period defined by the parameter dlThroughputDownswitchTimer or the uplink throughput decreases below the threshold specified by ulDownswitchBandwidthMargin for a period defined by the parameter ulThroughputDownswitchTimer. If the dlDownswitchBandwidthMargin parameter is set to 0 or the ulDownswitchBandwidthMargin parameter is set to 0, the Dedicated to Dedicated downswitch evaluation is turned off for downlink or uplink respectively. 19.8. Multi RAB Downswitch Evaluation This algorithm monitors the user data throughput both in the uplink and the downlink. If no data is transmitted for the duration specified by a downswitch timer, a request is issued to switch the interactive RAB to state Speech + 0/0 (SP0) in the cases of Speech + interactive DCH/DCH Multi-RAB or Speech + DCH/HS Interactive Multi-RAB. If the state SP0 is not available, this would instead result in a request to release the interactive RAB for the 2xinteractive multi-RAB. The downswitch timer for the Speech + interactive DCH/DCH multiRAB is given by the parameter downswitchTimerSp and that for the Speech + Interactive DCH/HS multi-RAB is given by the parameter hsdschInactivityTimer. The downswitch timer for the 2xinteractive multi-RAB is given by the parameter inactivityTimeMultiPsInteractive. The algorithm receives throughput measurement reports every 500 ms and if the throughput in both uplink and downlink is equal to zero, the timer is started. The timer is stopped when the throughput in either UL or DL increase above zero. If the downswitchTimerSp or downswitchTimerUp parameter is set to 0, the corresponding MultiRAB Downswitch Evaluation is turned off and no downswitches will occur irrespective of how long the throughput has been zero. 19.9. Multi RAB Upswitch Evaluation The Multi RAB Upswitch Evaluation algorithm is specific to the Speech + interactive multiRAB. It monitors the RLC buffer load on both the uplink and the downlink of the interactive part of the Speech + 0/0 state (SP0). The evaluation algorithm is activated at the entry of the Multi RAB SP0 state, and uses RLC buffer loads in both the uplink and the downlink as input. When the buffer load in the uplink exceeds the threshold value set by the parameter ulRlcBufUpswitchMrab, a measurement report is sent from the UE. An upswitch request T-Mobile USA, INC. Confidential Rev. 0.6 December 5, 2007 200 of 214 Ошибка! Используйте вкладку "Главная" для применения Title к тексту, который должен здесь отображаться. is issued upon reception of the measurement report. A request is also issued when the RLC buffer load in the RNC exceeds the threshold value set by the parameter dlRlcBufUpswitchMrab. If the dlRlcBufUpswitchMrab parameter is set to 0, the Multi-RAB Upswitch Evaluation algorithm is turned off, meaning that no upswitches from SP0 will occur, irrespective of the RLC buffer load. 19.10. Channel Switching Parameter Optimization Optimization of channel switching is a trade-off between user throughput and system capacity. For example, the time a user stays on DCH can be increased so that a short period without traffic does not lead to a downswitch to FACH. This improves the user throughput since transmission can be started immediately after the short period without transmission. However, since the user then also holds the resources associated to a DCH for a longer time, the system capacity will decrease. When optimizing the parameter setting of channel switching it is also important to consider the different kinds of traffic and the different kinds of mobiles in the network since both traffic and mobile behavior can differ significantly. Optimization of the channel switching from common to dedicated channels depends on the parameter ulRlCBufUpswitch. A lower value for this parameter might be useful to trigger an upswitch to a dedicated state when a UE is used for an application like we browsing, but when used as a modem with a laptop, signaling from other applications might trigger an unwanted upswitch to a CELL_DCH state. The above discussion is also applicable to a downswitch from a dedicated to common channels. The setting of the downswitchThreshold parameter dictates when a UE changes to a CELL_FACH state from a CELL_DCH state. While a value of 0 kbps for this parameter would be accurate for a UE doing a FTP download, when used as a modem, the applications on a laptop may create low level background traffic which would force the UE to stay in a CELL_DCH state when this parameter is set to 0 kbps. These are just some initial guidelines for trending of the channel switching parameters and actual recommended values for all related parameters would have to be evaluated with the help of network trials. T-Mobile USA, INC. Confidential Rev. 0.6 December 5, 2007 201 of 214 Ошибка! Используйте вкладку "Главная" для применения Title к тексту, который должен здесь отображаться. 20. Appendix A: Weighting Factor Analysis for Soft Handover Algorithm A weighting factor is used to include active cells other than the best cell in the evaluation criteria for reporting events. The measured value after weighting will be NA W 10 Log M i (1 W ) 10 LogM Best i 1 where Mi is a measurement result of a cell in the active set NA is the number of cells in the current active set MBest is the measurement result of the cell in the active set with the highest measurement result W is the weighting factor When W = 0, as can be seen from the above equation, only the best cell’s measured value is considered for event analysis. Consider the following example of the influence of a nonzero weighting factor on event 1a and event 1b evaluation. 20.1. Event 1a evaluation When there is only 1 cell in the active set, the value of W doesn’t influence the measurement result, and hence the example below considers a case where there are 2 cells in the active set, and a third cell is being considered to trigger either event 1a. Consider that the active set has only 2 cells, cell A with CPICH Ec/No = -8 dB, and cell B with CPICH Ec/No = -12 dB. Assume the following values for the different soft handover related parameters. reportingrange1a = 3 dB hysteresis1a = 0 individualoffset = 0 With these values, the Event 1a conditions simplifies to 10 LogM New NA w1a 10 Log M (1 w1a) 10 LogM reportingRange1a best i 1 i If W1a = 0, then the right hand part of the above equation equals -11 dB, which means that Event 1a is satisfied when the neighboring cell’s CPICH Ec/No is greater than or equal to -11 dB. If W1a = 0.5, then the right hand part of the above equation equals -9.9, which means that Event 1a is met when a neighboring cell’s CPICH Ec/No is greater than or equal to -9.9 dB. So in this case, a neighbor cell has to be stronger than the previous case in order to be added to the active set. T-Mobile USA, INC. Confidential Rev. 0.6 December 5, 2007 202 of 214 Ошибка! Используйте вкладку "Главная" для применения Title к тексту, который должен здесь отображаться. If W1a = 1, then the right hand part of the above equation equals -8.8, which means that Event 1a is met when a neighboring cell’s CPICH Ec/No is greater than or equal to -8.8 dB. So in this case, a neighbor cell has to be even stronger than the previous two cases in order to be added to the active set. 20.2. Event 1b evaluation Consider that the active set has only 2 cells, cell A with CPICH Ec/No = -8 dB, and cell B with CPICH Ec/No = -12 dB. Assume the following values for the different soft handover related parameters. reportingrange1b = 5 dB hysteresis1b = 0 individualoffset = 0 With these values, the Event 1b conditions simplifies to 10 LogM Old NA w1b 10 Log M (1 w1b) 10 LogM reportingRange1b best i 1 i If W1b = 0, then the right hand part of the above equation equals -13 dB, which means that Event 1b is satisfied when the neighboring cell’s CPICH Ec/No is less than or equal to 13 dB. If W1b = 0.5, then the right hand part of the above equation equals -11.9, which means that Event 1b is met when a neighboring cell’s CPICH Ec/No is less than or equal to -11.9 dB. So in this case, a neighbor cell has to be stronger than the previous case in order to remain in the active set. If W1b = 1, then the right hand part of the above equation equals -10.8, which means that Event 1b is met when a neighboring cell’s CPICH Ec/No is less than or equal to -10.8 dB. So in this case, a neighbor cell has to be even stronger than the previous two cases in order to remain in the active set. 20.3. Tradeoff due to weighting factor From the above two cases it can be inferred that for a non-zero value of the weighting factor, a neighboring cell has to be stronger than when the weighting factor = 0, for it to be added to the Active set or retained in the Active set. Hence a non-zero weighting factor would result in a small reduction in the Active set size. Note that this reduction is only valid when the Active set size is at least equal to 2. A larger value of W will result in a reduction in the Active Set size, thus saving network capacity. However a large value of W would mean that the a possible neighbor is added less quickly into the Active set, which might impact call quality negatively in some cases. Also delaying the addition of a neighbor into the Active set would result in larger number of measurement reports being sent to the RNC for the same candidate cell, thus more processing would be needed from the RNC to handle this increase in received measurement reports. T-Mobile USA, INC. Confidential Rev. 0.6 December 5, 2007 203 of 214 Ошибка! Используйте вкладку "Главная" для применения Title к тексту, который должен здесь отображаться. In networks where capacity is an issue, a larger value of W might be more useful as long as the reporting ranges are modified for this newer value of W. For initial network launch, a value of W = 0 is still recommended. Further tests in the field will be performed to assess the impact of the weighting factor on Soft Handover performance. T-Mobile USA, INC. Confidential Rev. 0.6 December 5, 2007 204 of 214 Ошибка! Используйте вкладку "Главная" для применения Title к тексту, который должен здесь отображаться. 21. Appendix B: Monitored Set Creation Field Example 21.1. Description This test will compare a theoretical monitored set against a measured monitored set after SHO has occurred between 2 cells with a mixture of common and unique neighbors. 21.2. Execution The following is the list of the test steps that were performed. Begin a CS voice call on BQU4659C (SC165) Drive until BQU4841A (SC221) is added to the active set Record new monitored set from TEMS Compare against theoretical neighbor list 21.3. Neighbor Lists Neighbor List - BQU4659C (SC165) 1 2 3 4 5 6 149 157 52 68 323 331 17 18 19 20 21 22 403 7 221 23 8 229 24 9 124 25 10 133 26 11 141 27 12 268 28 13 395 29 14 28 30 15 36 31 16 237 32 Neighbor List - BQU4841A (SC221) 1 2 3 4 5 6 229 237 395 403 165 268 17 18 19 20 21 22 213 125 96 7 323 23 8 331 24 9 68 25 10 141 26 11 28 27 12 149 28 13 157 29 14 181 30 15 155 31 16 236 32 21.4. Results The following shows the steps in the monitored set creation for this test case. Original List 1 2 165 149 17 18 237 403 - Serving 3 4 157 52 19 20 Cell = BQU4659C 5 6 7 68 323 331 21 22 23 (SC165) 8 9 221 229 24 25 10 124 26 11 133 27 12 141 28 13 268 29 14 395 30 15 28 31 16 36 32 BQU4841A (SC221) added to Active Set - Calculate New Monitored List STEP 1 - Add both the active cells (A) and (B) to the listed set in the same position as they existed previously. New List 1 2 165 3 T-Mobile USA, INC. Confidential 4 5 6 7 8 221 Rev. 0.6 9 10 11 December 5, 2007 12 13 14 15 16 205 of 214 Ошибка! Используйте вкладку "Главная" для применения Title к тексту, который должен здесь отображаться. 17 18 Old List 1 2 165 149 17 18 237 403 19 20 21 22 23 24 25 26 27 28 29 30 31 32 3 157 19 4 52 20 5 68 21 6 323 22 7 331 23 8 221 24 9 229 25 10 124 26 11 133 27 12 141 28 13 268 29 14 395 30 15 28 31 16 36 32 STEP 2 - Take the neighbor cell with the highest priority for the best active set cell, cell(A), and if it already exists in the old listed set add it to the new listed set in the same position. If it does not exist in the old listed set, then the position does not matter, therefore store it for addition later in a temporary array. New 1 165 17 List 2 149 18 3 4 5 6 7 19 20 21 22 3 157 19 4 52 20 5 68 21 Temporary List 1 2 3 4 17 20 Old List 1 2 165 149 17 18 237 403 18 19 9 10 11 12 13 14 15 16 23 8 221 24 25 26 27 28 29 30 31 32 6 323 22 7 331 23 8 221 24 9 229 25 10 124 26 11 133 27 12 141 28 13 268 29 14 395 30 15 28 31 16 36 32 5 6 7 8 9 10 11 12 13 14 15 16 21 22 23 24 25 26 27 28 29 30 31 32 STEP 3 - Take the neighbor cell with the highest priority for the second best active set cell (B), and if it already exists in the old listed set add it to the new listed set in the same position. If it does not exist in the old listed set, then the position does not matter and it can be stored in a temporary array for later addition. Store the neighboring cell only if it does not already exist in the temporary array (avoid duplicate). If it is already stored in the temporary array, take the next neighboring cell in priority order from the next cell in the Active Set, cell (A) applying the same rules. New 1 165 17 List 2 149 18 3 4 5 6 7 19 20 21 22 23 8 221 24 9 229 25 10 11 12 13 14 15 16 26 27 28 29 30 31 32 Old List T-Mobile USA, INC. Confidential Rev. 0.6 December 5, 2007 206 of 214 Ошибка! Используйте вкладку "Главная" для применения Title к тексту, который должен здесь отображаться. 1 165 17 237 2 149 18 403 4 52 20 5 68 21 6 323 22 7 331 23 8 221 24 9 229 25 10 124 26 11 133 27 12 141 28 13 268 29 14 395 30 15 28 31 16 36 32 Temporary List 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 20 21 22 23 24 25 26 27 28 29 30 31 32 18 3 157 19 19 STEP 4 - Repeat until all neighbor cells have been processed or until MaxIafMonSubsetIAF neighboring cells have been selected for the listed set. New 1 165 17 237 List 2 149 18 403 3 157 19 4 52 20 5 68 21 6 323 22 7 331 23 8 221 24 9 229 25 10 124 26 11 133 27 12 141 28 13 268 29 14 395 30 15 28 31 16 36 32 Old List 1 2 165 149 17 18 237 403 3 157 19 4 52 20 5 68 21 6 323 22 7 331 23 8 221 24 9 229 25 10 124 26 11 133 27 12 141 28 13 268 29 14 395 30 15 28 31 16 36 32 Temporary 1 2 149 157 17 18 List 3 181 19 4 155 20 5 236 21 6 213 22 7 125 23 8 96 24 9 10 11 12 13 14 15 16 25 26 27 28 29 30 31 32 STEP 5 - Take the cells that have been selected to be included in the new listed set (stored in the temporary array) and add them to the listed set by filling the spaces that have not been filled in step (c), the neighboring cells are picked from the temporary array in the order they was stored (FIFO). (This makes sure that neighboring cells stored early in the temporary array will be the first to fill out the spaces in the listed set). New 1 165 17 237 List 2 149 18 403 Old List 1 2 3 157 19 181 4 52 20 155 5 68 21 236 6 323 22 213 7 331 23 125 8 221 24 96 9 229 25 10 124 26 11 133 27 12 141 28 13 268 29 14 395 30 15 28 31 16 36 32 3 4 5 6 7 8 9 10 11 12 13 14 15 16 T-Mobile USA, INC. Confidential Rev. 0.6 December 5, 2007 207 of 214 Ошибка! Используйте вкладку "Главная" для применения Title к тексту, который должен здесь отображаться. 165 17 237 149 18 403 Temporary 1 2 181 155 17 18 157 19 52 20 68 21 323 22 331 23 221 24 229 25 124 26 133 27 141 28 268 29 395 30 28 31 36 32 List 3 236 19 4 213 20 5 125 21 6 96 22 7 8 9 10 11 12 13 14 15 16 23 24 25 26 27 28 29 30 31 32 5 68 21 236 6 323 22 213 7 331 23 125 8 221 24 96 9 229 25 10 124 26 11 133 27 12 141 28 13 268 29 14 395 30 15 28 31 16 36 32 5 68 21 155 6 323 22 236 7 331 23 213 8 221 24 125 9 229 25 96 10 124 26 11 133 27 12 141 28 13 268 29 14 395 30 15 28 31 16 36 32 COMPARISON - PASS Theoretical 1 2 165 149 17 18 237 403 New List 3 4 157 52 19 20 181 155 Measured List 1 2 3 165 149 157 17 18 19 237 403 403 T-Mobile USA, INC. Confidential 4 52 20 181 Rev. 0.6 December 5, 2007 208 of 214 Ошибка! Используйте вкладку "Главная" для применения Title к тексту, который должен здесь отображаться. 22. Appendix C: Parameter Recommendations for 3G to 2G Reselection Parameter Name qQualMin sRatSearch qRxLevMin maxTxPowerUl sHcsRat qHyst1 qoffset1sn qoffset1sn treselection T-Mobile USA, INC. Confidential Object Name UtranCell UtranCell ExternalGsmCell ExternalGsmCell UtranCell UtranCell UtranRelation GsmRelation UtranCell Rev. 0.6 Recommended Value -18 dB 4 -105 dBm 24 dBm 3 dB 4 0 7 2s December 5, 2007 209 of 214 Ошибка! Используйте вкладку "Главная" для применения Title к тексту, который должен здесь отображаться. 23. Appendix D: Parameter Recommendations for 3G to 2G Handover/Cell Change This section lists the recommended values for the IRAT 3G to 2G Handover for an Ericsson 3G RAN. The parameter values presented here are based on Ericsson recommendations. These values will be updated when more testing is done on the IRAT feature. Values for parameters independent of handover scenarios Parameter Name Recommended Value Object Name C_GsmHoAllowed Hard Coded Value Allowed defaultHoType WcdmaCarrier Gsm-Preferred FddGsmHoSupp Handover True filterCoeff6 UeMeasControl 3 filtercoefficient2 UeMeasControl 2 gsmAmountPropRepeat Handover 4 gsmFilterCoefficient3 UeMeasControl 1 gsmPropRepeatInterval Handover 5 gsmThresh3a UeMeasControl -95 dBm hoType UtranCell Gsm-Preferred hysteresis2d UeMeasControl 0 dB hysteresis2f UeMeasControl 0 dB hysteresis3a UeMeasControl 0 dB individual offset ExternalGsmCell 0 maxGsmMonSubset Handover 32 T_RELOC_prep Hard Coded Value 10 s timeToTrigger2dEcno UeMeasControl 320 ms timeToTrigger2fEcno UeMeasControl 1280 ms timeToTrigger2dRscp UeMeasControl 320 ms timeToTrigger2fRscp UeMeasControl 1280 ms timeToTrigger3a UeMeasControl 100 ms timeToTrigger6d UeMeasControl 320 ms timeTrigg6b UeMeasControl 640 ms txPowerConnQualMonEnabled UeMeasControl True ueTxPowerThresh6b UeMeasControl 18 dBm usedFreqRelThresh2fEcno UeMeasControl 3 dB usedFreqRelThresh2fRscp UeMeasControl 3 dB usedFreqThresh2dEcnoDrnc UeMeasControl -13 dB usedFreqThresh2dRscpDrnc UeMeasControl -102 dBm usedFreqW2d UeMeasControl 0 T-Mobile USA, INC. Confidential Rev. 0.6 December 5, 2007 210 of 214 Ошибка! Используйте вкладку "Главная" для применения Title к тексту, который должен здесь отображаться. usedFreqW2f UeMeasControl 0 utranFilterCoefficient3 UeMeasControl 2 utranRelThreshRscp UeMeasControl 5 dB utranRelThresh3aEcno UeMeasControl -1 dB utranRelThresh3aRscp UeMeasControl -3 dB utranW3a UeMeasControl 0 Values for parameters based on handover scenarios Parameter Name Object Name Recommended Value for Core Thresholds Recommended Value for Edge Thresholds usedFreqThresh2dEcno UtranCell -13 dB -12 dB usedFreqThresh2dRscp UtranCell -102 dBm -98 dBm T-Mobile USA, INC. Confidential Rev. 0.6 December 5, 2007 211 of 214 Ошибка! Используйте вкладку "Главная" для применения Title к тексту, который должен здесь отображаться. 24. Appendix E: Parameter Recommendations for 2G to 3G Reselection 24.1. Ericsson BSS Parameter Name COEXUMTS FDDQMIN FDDQMINOFF FDDQOFF FDDRSCPMIN QSI Object Name Recommended Value BSC BTS BTS BTS BTS BTS ON 7 (-12 dB) 0 (0 dB) 0 (-infinity) 6 (-102 dBm) 7 (always) 24.2. Nokia BSS Parameter Name fddQOffset (FDD) fddQMin (FDM) fddGprsQOffset (GFDD) gprsFddQMin (GFDM) qSearchI (QSRI) qSearchP (QSRP) Object Name Recommended Value BTS BTS N (-infinity) -12 dB BTS N (-infinity) BTS BTS BTS -12 dB 7 (always) 7 (always) 24.3. Nortel BSS Parameter Name Object Name uMTSAccessMinLevel BTS uMTSReselectionARFCN uMTSReselectionOffset uMTSSearchLevel BTS BTS BTS T-Mobile USA, INC. Confidential Rev. 0.6 Recommended Value -12 dB ARFCN of UMTS carrier -infinity 7 (always) December 5, 2007 212 of 214 Ошибка! Используйте вкладку "Главная" для применения Title к тексту, который должен здесь отображаться. 25. Appendix F: Parameter Recommendations for Channel Switching Parameter Name bandwidthMargin bandwidthMarginUl coverageTimer dlDownswitchBandwidthMargin dlRlcBufUpswitch dlRlcBufUpswitchMrab dlThroughputAllowUpswitchThreshold dlThroughputDownswitchTimer downswitchPwrMargin downswitchThreshold downswitchTimer downswitchTimerSp downswitchTimerThreshold downswitchTimerUp hsdschInactivityTimer inactivityTimeMultiPsInteractive inactivityTimer inactivityTimerPch reportHysteresis ulDownswitchBandwidthMargin ulRlcBufUpswitch ulRlcBufUpswitchMrab ulThroughputAllowUpswitchThreshold ulThroughputDownswitchTimer upswitchPwrMargin upswitchTimer upswitchTimerUl activeQueueMgmt T-Mobile USA, INC. Confidential Object Name ChannelSwitching ChannelSwitching ChannelSwitching ChannelSwitching ChannelSwitching ChannelSwitching ChannelSwitching ChannelSwitching ChannelSwitching ChannelSwitching ChannelSwitching ChannelSwitching ChannelSwitching ChannelSwitching ChannelSwitching ChannelSwitching ChannelSwitching ChannelSwitching ChannelSwitching ChannelSwitching ChannelSwitching ChannelSwitching ChannelSwitching ChannelSwitching ChannelSwitching ChannelSwitching ChannelSwitching RabHandling Rev. 0.6 December 5, 2007 Recommended Value 90% 90% 1 sec 80% 500 bytes 500 bytes 0 % (Not used) 2 sec 1 dB 0 kBps 1 sec 10 sec 0 kBps 20 sec 2 sec 5 sec 30 sec 30 min 3 dB 80% 256 bytes 8 bytes 0 % (not used) 2 sec 3 dB 0.5 sec 0.5 sec 0 (OFF) 213 of 214 Ошибка! Используйте вкладку "Главная" для применения Title к тексту, который должен здесь отображаться. 26. Reference 1. 3GPP TS 25.331 V 5.19.0 “UMTS Radio Resource Control Protocol Specification”. 2. Allan Orbigo, Christophe Vidal, UMTS RF Planning and Design Guidelines 3. Alejandro Aguirre, Changbo Wen, Sireesha Panchagnula UMTS Parameter Guidelines 4. 3GPP TS 25.304 V 5.9.0 “UMTS UE Procedures in Idle Mode and Procedures for Cell Reselection in Connected Mode”. 5. UMTS Network KPI, U12 UMTS Network KPI v6.14 080406TMO LR.doc 6. UMTS Network KPI Level 2, UMTS Network KPI Level-2_v1_20070205ERI_Updated.doc 7. UMTS RNC LCS KPI definitions and Formulas, Michael Gebretsadik 8. 3GPP TS 25.331, UMTS RRC protocol specification. 9. 3GPP TS 25.211 V 5.8.0, “UMTS Physical channels and mapping of transport channels onto physical channels”. 10. 3GPP TS 25.413 V 5.12.0, “UTRAN Iu Interface RANAP Signaling”. 11. 3GPP TS 25.214, ”UMTS Physical Layer Procedures FDD”. 12. Ericsson Product Documentation, EN/LZN 733 0017 R4A. 13. Ericsson Product Documentation, “Guidelines for LA/RA/URA planning” 14. Ericsson Product Documentation 58/1551-AXD 105 03/1 Uen G, “Performance Statistics RNC 3810”. 15. Nabeel Lughmani, Pradeep Singh, Tim Zhang, “Paging Performance Guidelines”. 16. Sireesha Panchagnula, “UMTS Paging Concepts”. T-Mobile USA, INC. Confidential Rev. 0.6 December 5, 2007 214 of 214