35
1 Vocational Training Council - IVE (Tsing Yi) TN3431 Mobile Networks Department of Information & Communications Technology 4.3 CDMA Air Interface Design The starting point for the air interface design are the system requirements. Understanding these is critical for a good end result of the design process. Basic system requirements determine data rates, bit error rate (BER), and delay, as well as channel models, which define the radio environment. CDMA radio interface design involves several areas, as shown in Figure 4.4.1. Each area itself is very board, and different parameters can be optimized alone.However, a good design is always a trade-off between several and often contradicting requirements. Good radio performance, for example, requires more advanced receivers resulting in higher costs and complexity, while another system requirement might be precisely the minimization of equipment cost.

1 Vocational Training Council - IVE (Tsing Yi) TN3431 Mobile Networks Department of Information & Communications Technology Vocational Training Council

Embed Size (px)

Citation preview

Page 1: 1 Vocational Training Council - IVE (Tsing Yi) TN3431 Mobile Networks Department of Information & Communications Technology Vocational Training Council

1

Vocational Training Council - IVE (Tsing Yi) TN3431 Mobile NetworksDepartment of Information & Communications TechnologyVocational Training Council - IVE (Tsing Yi) TN3431 Mobile NetworksDepartment of Information & Communications Technology

4.3 CDMA Air Interface Design

The starting point for the air interface design are the system requirements. Understanding these is critical for a good end result of the design process. Basic system requirements determine data rates, bit error rate (BER), and delay, as well as channel models, which define the radio environment.

CDMA radio interface design involves several areas, as shown in Figure 4.4.1. Each area itself is very board, and different parameters can be optimized alone.However, a good design is always a trade-off between several and often contradicting requirements. Good radio performance, for example, requires more advanced receivers resulting in higher costs and complexity, while another system requirement might be precisely the minimization of equipment cost.

Page 2: 1 Vocational Training Council - IVE (Tsing Yi) TN3431 Mobile Networks Department of Information & Communications Technology Vocational Training Council

2

Vocational Training Council - IVE (Tsing Yi) TN3431 Mobile NetworksDepartment of Information & Communications TechnologyVocational Training Council - IVE (Tsing Yi) TN3431 Mobile NetworksDepartment of Information & Communications Technology

System requirement

• data rates, BER, delay

• radio environment

• available frequency bands

• synchronization requirements

• signaling requirement

• complexity aspects

Radio interface design:

Joint Optimization of:-

• physical channels

• spreading codes

• modulation

• error control schemes

• multirate scheme

• packet data transmission

• random access

• receiver and transmitter

• handover

• power control

• admission and load control

Figure 4.3.1 CDMA air interface design process

Page 3: 1 Vocational Training Council - IVE (Tsing Yi) TN3431 Mobile Networks Department of Information & Communications Technology Vocational Training Council

3

4.3.1 Layered Air Interface Structure

Network Layer:

Call control,

Mobility management

Radio resource management

Link access layer

Medium access control

Physical layerLayer 1

Layer 2

Layer 3

Figure 4.3.2 The layered structure of the air interface

Vocational Training Council - IVE (Tsing Yi) TN3431 Mobile NetworksDepartment of Information & Communications TechnologyVocational Training Council - IVE (Tsing Yi) TN3431 Mobile NetworksDepartment of Information & Communications Technology

Page 4: 1 Vocational Training Council - IVE (Tsing Yi) TN3431 Mobile Networks Department of Information & Communications Technology Vocational Training Council

4

Vocational Training Council - IVE (Tsing Yi) TN3431 Mobile NetworksDepartment of Information & Communications TechnologyVocational Training Council - IVE (Tsing Yi) TN3431 Mobile NetworksDepartment of Information & Communications Technology

As shown in Figure 4.3.2, the air interface functions are structured into protocol layers. The physical channel performs coding, modulation, and spreading for the physical channels. As shown in Figure 4.3.2, the link layer is further divided into the two sublayers: mcdium access control (MAC) and link access control (LAC). The medium access layer coordinates the resources offered by the physical layer. The link access control performs the functions essential to set up, maintain, and release a logical link connection. The network layer contains call control, mobility management, and radio resource management functions. (i.e. to those that function in different protocol layers that depend on the underlying multiple access method, in this case, wideband CDMA) These layers include the physical layer, the MAC layer, and radio resource management in the network layer.

Page 5: 1 Vocational Training Council - IVE (Tsing Yi) TN3431 Mobile Networks Department of Information & Communications Technology Vocational Training Council

5

• ETSI’s Special Mobile Group is responsible for UMTS standardization. It has selected the basic technology for UTRA (UMTS Terrestrial Radio Access)– 1920 - 1980 MHz, 2110 - 2170 MHz paired band will use

WCDMA in FDD operation– 35 MHz unpaired band will use TD-CDMA in TDD operation

• ARIB (Association of Radio Industry and Business) and ETSI are working towards a common proposal

• Requirement of IMT-2000 is 384 kb/s for full area and 2 Mb/s for local area access

• GSM evolution to IMT-2000– EDGE use high level modulation for a 200 kHz TDMA migration

from existing bands in small spectrum chunks– UMTS is based on 5 MHz WCDMA– Reuse GSM’s mobility support, authentication, circuit switching

Vocational Training Council - IVE (Tsing Yi) TN3431 Mobile NetworksDepartment of Information & Communications TechnologyVocational Training Council - IVE (Tsing Yi) TN3431 Mobile NetworksDepartment of Information & Communications Technology

4.3.1.1 Introduction

Page 6: 1 Vocational Training Council - IVE (Tsing Yi) TN3431 Mobile Networks Department of Information & Communications Technology Vocational Training Council

6

Vocational Training Council - IVE (Tsing Yi) TN3431 Mobile NetworksDepartment of Information & Communications TechnologyVocational Training Council - IVE (Tsing Yi) TN3431 Mobile NetworksDepartment of Information & Communications Technology

4.3.1.2 Physical layer (Basic Radio Parameters)

• UTRA/FDD is based on 4.096 Mchips/s in 5 MHz band. 8.192 and 16.384 Mchips/s are also specified for future evolution to >2 Mb/s data rate.

• 10 ms radio frame for low delay speech and fast control message

• Carriers are on a 200 kHz carrier grid with spacing 4.2 - 5 MHz. Larger spacing is needed in different cell layers

Page 7: 1 Vocational Training Council - IVE (Tsing Yi) TN3431 Mobile Networks Department of Information & Communications Technology Vocational Training Council

7

Vocational Training Council - IVE (Tsing Yi) TN3431 Mobile NetworksDepartment of Information & Communications TechnologyVocational Training Council - IVE (Tsing Yi) TN3431 Mobile NetworksDepartment of Information & Communications Technology

4.3.1.3 Physical Layer (Transport Channels)

• Transport channels are PHY services offered to higher layers. • Always unidirectional, either common or dedicated• Broadcast control channel (BCCH) -- downlink channel for broadcasti

ng system and cell specific control information• Forward Access Channel (FACH) -- downlink common channel to ent

ire cell or part of cell using adaptive antenna array• Paging Channel (PCH) -- downlink common channel to mobiles whos

e locations are not known• Random Access Channel (RACH) -- uplink common• Dedicated Channel (DCH) -- down or up link dedicated channel to and

from a mobile station• Data are organized into transport blocks. Different channels have diff

erent transmission time interval ranging from 10 to 80 ms

Page 8: 1 Vocational Training Council - IVE (Tsing Yi) TN3431 Mobile Networks Department of Information & Communications Technology Vocational Training Council

8

Vocational Training Council - IVE (Tsing Yi) TN3431 Mobile NetworksDepartment of Information & Communications TechnologyVocational Training Council - IVE (Tsing Yi) TN3431 Mobile NetworksDepartment of Information & Communications Technology

Table 1. Transport-channel formats for some typical service cases

• Service //Transmission-time interval// blocks per tran. Interval//block size

• Variable-rate speech 10 or 20 ms Fixed (=1) Variable

• Packet data 10 80 ms Variable Fixed (~300 bits)

• Circuit-switched data 10 80 ms Fixed (>=1) Fixed

Page 9: 1 Vocational Training Council - IVE (Tsing Yi) TN3431 Mobile Networks Department of Information & Communications Technology Vocational Training Council

9

Vocational Training Council - IVE (Tsing Yi) TN3431 Mobile NetworksDepartment of Information & Communications TechnologyVocational Training Council - IVE (Tsing Yi) TN3431 Mobile NetworksDepartment of Information & Communications Technology

4.3.2 Logical Channels

The logical channels can be divided into control channels and traffic channels. A control channel is either common or dedicated. A common control channel is a point-to-multi-point control channel that carries connectionless messages, which are primarily intended to carry signaling information necessary for access management functions broadcast information (access request, access grant, paging messages,and user packet data). A dedicated control channel is a point-to-point bidirectional control channel, intended to carry signaling information such as handover measurements, service adaption information, and power control information. Traffic channels carry a wide variety of user information streams. The procedures described lead to the following logical channel structure:

• Synchronization channel;

• Random access channel;

Page 10: 1 Vocational Training Council - IVE (Tsing Yi) TN3431 Mobile Networks Department of Information & Communications Technology Vocational Training Council

10

Vocational Training Council - IVE (Tsing Yi) TN3431 Mobile NetworksDepartment of Information & Communications TechnologyVocational Training Council - IVE (Tsing Yi) TN3431 Mobile NetworksDepartment of Information & Communications Technology

• Broadcast channel;

• Paging channel;

• Dedicated control channel;

• Traffic channel.

4.3.3 Physically Channels

In general, the functions provided by logical channels need to be mapped into physical channels. The mapping depends on several aspects such as frame design, modulation method, and code design.

A synchronization channel is used to provide the receiver with chip, bit and frame synchronization. A pilot signal can be used as a reference signal for chip level synchronization and coherent detection, as discussed below. The mobile station uses the downlink synchronization channel for handover measurements and synchronization.

Page 11: 1 Vocational Training Council - IVE (Tsing Yi) TN3431 Mobile Networks Department of Information & Communications Technology Vocational Training Council

11

Vocational Training Council - IVE (Tsing Yi) TN3431 Mobile NetworksDepartment of Information & Communications TechnologyVocational Training Council - IVE (Tsing Yi) TN3431 Mobile NetworksDepartment of Information & Communications Technology

The broadcast channels system-specific information. The system designer needs to determine the type and rate of information to be transmitted so that the broadcast channel data rate can be set. For the paging channel, the number of paging channels and the data rate need to be determined.

The random access channel structure depends on how fast the synchronization needs to be established and on the selected access strategy.

A dedicated control channel is bundled together with a traffic channel. Traffic and dedicated control channels can be multiplexed, code multiplexed or I&Q multiplexed.

4.3.3.1 Measurement Signaling

Signaling requirements depend on the measurement needs (i.e. how often measurements for power control, handover, and load control are performed and how they need to be transmitted between mobile stations and the base station). When the rough transmission requirements for signaling have been defined, appropriate channel structures can be designed. The signaling traffic can either

Page 12: 1 Vocational Training Council - IVE (Tsing Yi) TN3431 Mobile Networks Department of Information & Communications Technology Vocational Training Council

12

Vocational Training Council - IVE (Tsing Yi) TN3431 Mobile NetworksDepartment of Information & Communications TechnologyVocational Training Council - IVE (Tsing Yi) TN3431 Mobile NetworksDepartment of Information & Communications Technology

be transmitted on a dedicated control channel (outband signaling) or on a traffic channel by puncturing the user data (inband signaling). The selected method depends on the quality requirements for user data and mobile station complexity.

4.3.3.2 Pilot Signals

Because of fading channels, it is hard to obtain a phase reference for the coherent detection of data modulated signal. Therefore, it is beneficial to have a separate pilot channel. Typically, a channel estimate for coherent detection is obtained from a common pilot channel. Typically, a channel estimate for coherent detection is obtained from a common pilot channel.

The user dedicated pilot symbols can either be time or code multiplexed. Figure 4.3.3 and 4.3.4 depict block diagram of a transmitter and receiver for time multiplexed pilot symbols and, a code multiplexed, parallel pilot channel, respectively. A drawback of a pilot channel transmitted on a separate code is that it requires extra correlators for despreading. The performance of both

Page 13: 1 Vocational Training Council - IVE (Tsing Yi) TN3431 Mobile Networks Department of Information & Communications Technology Vocational Training Council

13

Vocational Training Council - IVE (Tsing Yi) TN3431 Mobile NetworksDepartment of Information & Communications TechnologyVocational Training Council - IVE (Tsing Yi) TN3431 Mobile NetworksDepartment of Information & Communications Technology

approaches is the same if the same amount of power is used for the pilot signals, assuming that optimal least mean squares channel recovery techniques are employed.

For time multiplexed pilot symbols, the ratio between the number of data symbols (Ld) and the number of pilot symbols (Lp) needs to be determined. For the parallel pilot channel, the power ratio of pilot and data channels needs to be determined. In the receiver, pilot symbols are averaged over a certain time period.

Page 14: 1 Vocational Training Council - IVE (Tsing Yi) TN3431 Mobile Networks Department of Information & Communications Technology Vocational Training Council

14

Vocational Training Council - IVE (Tsing Yi) TN3431 Mobile NetworksDepartment of Information & Communications TechnologyVocational Training Council - IVE (Tsing Yi) TN3431 Mobile NetworksDepartment of Information & Communications Technology

LpLpLp Data (Ld) Data (Ld)

MUXSpreading

and modulation

Coded data symbols

Pilot symbols

Correlator

BankDEMUX

Detection

and RAKE

combiner

Channel Decoding

Figure 4.3.3 Time multiplexed pilot symbols.

Page 15: 1 Vocational Training Council - IVE (Tsing Yi) TN3431 Mobile Networks Department of Information & Communications Technology Vocational Training Council

15

Spreading

and modulation

Coded data symbols

Pilot symbols

Spreading

Detection

and RAKE

combiner

Channel Decording

Correlator

bank for data

Figure 4.3.4 Code multiplexed, parallel pilot channel.

Vocational Training Council - IVE (Tsing Yi) TN3431 Mobile NetworksDepartment of Information & Communications TechnologyVocational Training Council - IVE (Tsing Yi) TN3431 Mobile NetworksDepartment of Information & Communications Technology

Spreading

Spreading

Correlator

bank for pilot

Data Channel

Unmodulated PilotRelative Power

Page 16: 1 Vocational Training Council - IVE (Tsing Yi) TN3431 Mobile Networks Department of Information & Communications Technology Vocational Training Council

16

Vocational Training Council - IVE (Tsing Yi) TN3431 Mobile NetworksDepartment of Information & Communications TechnologyVocational Training Council - IVE (Tsing Yi) TN3431 Mobile NetworksDepartment of Information & Communications Technology

4.3.4 Modulation

Figure 3.4.5 illustrates DS-CDMA transmission functions related to modulation. The data modulator maps the incoming coded data bits into one of M(=2m) possible real or complex valued transmitted data symbols. Typical data modulation schemes are BPSK and QPSK. Typical spreading modulation schemes are BPSK used with spreading circuit, QPSK, and O-QPSK used with a quaternary or complex spreading circuit.

4.3.4.1 Data Modulation

Binary data modulation maps incoming data bits into transmitted data symbols with a mapping rule (1 = +1), (0 = -1). Quaternary data modulation converts two consecutive data bits into one complex data symbol. Typically, gray encoding is used, which has the following mapping rule:

00 = -1+j ; 01 = -1+j ; 11 = -1+j ; 10 = +1-j

Page 17: 1 Vocational Training Council - IVE (Tsing Yi) TN3431 Mobile Networks Department of Information & Communications Technology Vocational Training Council

17

Vocational Training Council - IVE (Tsing Yi) TN3431 Mobile NetworksDepartment of Information & Communications TechnologyVocational Training Council - IVE (Tsing Yi) TN3431 Mobile NetworksDepartment of Information & Communications Technology

4.3.4.2 Spreading Modulation

Typically, linear modulation methods (BPSK, QPSK and offset QPSK) have been proposed for wideband CDMA because they offer good modulation efficiency. Band-limited linear modulation methods with nonlinear power amplifiers result in spectrum regrowth (i.e. spectrum leakage to adjacent carriers). Thus, especially in the uplink, the modulated signal should tolerate nonlinear power amplifier effects as much as possible, since a nonlinear power amplifier is more power efficient than a linear one. In practice, after the modulation method has been fixed, pulse shaping determines the final spectrum properties of the modulation scheme.

BPSK spreading modulation can be used with the binary spreading circuit. Non-filtered BPSK has a constant envelope and an infinite spectrum.

Page 18: 1 Vocational Training Council - IVE (Tsing Yi) TN3431 Mobile Networks Department of Information & Communications Technology Vocational Training Council

18

Vocational Training Council - IVE (Tsing Yi) TN3431 Mobile NetworksDepartment of Information & Communications TechnologyVocational Training Council - IVE (Tsing Yi) TN3431 Mobile NetworksDepartment of Information & Communications Technology

QPSK and offset QPSK are quadrature types of modulation methods. The offset QPSK has a one chip delay in the Q channel, which prevents phase transitions via zero, as can be observed in Figure 3.4.5. Therefore, filtered O-QPSK has fewer envelope variations than QPSK, thus reducing the linearity requirements on the power amplifier. This is especially important in the uplink. However, if complex spreading is used, then QPSK should be used instead of offset QPSK.

The scattering diagrams of BPSK, QPSK and offset QPSK modulation methods are shown in Figure 4.3.5.

Page 19: 1 Vocational Training Council - IVE (Tsing Yi) TN3431 Mobile Networks Department of Information & Communications Technology Vocational Training Council

19

Vocational Training Council - IVE (Tsing Yi) TN3431 Mobile NetworksDepartment of Information & Communications TechnologyVocational Training Council - IVE (Tsing Yi) TN3431 Mobile NetworksDepartment of Information & Communications Technology

(a)

Q

I

Q

I

(b)

Q

I

(c)

Figure 4.3.5: Scattering diagrams: (a) BPSK, (b) QPSK, and O-QPSK

Page 20: 1 Vocational Training Council - IVE (Tsing Yi) TN3431 Mobile Networks Department of Information & Communications Technology Vocational Training Council

20

Vocational Training Council - IVE (Tsing Yi) TN3431 Mobile NetworksDepartment of Information & Communications TechnologyVocational Training Council - IVE (Tsing Yi) TN3431 Mobile NetworksDepartment of Information & Communications Technology

Comparison:

• GMSK has constant envelope; so nonlinear amplifier can be used to achieve high battery efficiency; good channel performance, and self-synchronization capability.

• / 4 – QPSK is linear modulation, hence high frequency efficiency and power efficiency. Drawback is: it needs linear power amplifier.

Page 21: 1 Vocational Training Council - IVE (Tsing Yi) TN3431 Mobile Networks Department of Information & Communications Technology Vocational Training Council

21

Vocational Training Council - IVE (Tsing Yi) TN3431 Mobile NetworksDepartment of Information & Communications TechnologyVocational Training Council - IVE (Tsing Yi) TN3431 Mobile NetworksDepartment of Information & Communications Technology

4.3.5 Error Control Schemes

Error control schemes can be classified in two basic categories: forward error control (FEC) and automatic repeat request (ARQ) schemes. In addition, a combination of FEC and ARQ, a hybrid scheme, can be used. In FEC, an error correcting code, sometimes referred to as the channel code, is used to combat transmission errors in a fading radio channel. In ARQ, an error detecting code together with a retransmission protocol is used. In the hybrid scheme, FEC reduces the need for retransmission by improving the error rate before ARQ.

Page 22: 1 Vocational Training Council - IVE (Tsing Yi) TN3431 Mobile Networks Department of Information & Communications Technology Vocational Training Council

22

Vocational Training Council - IVE (Tsing Yi) TN3431 Mobile NetworksDepartment of Information & Communications TechnologyVocational Training Council - IVE (Tsing Yi) TN3431 Mobile NetworksDepartment of Information & Communications Technology

4.3.5.1 Selection of Error Control Scheme

The choice of the error control scheme depends on the required quality of service (data rate, delay and BER) and the radio channel. Raw channel error rates for transmission in a fading channel are typically on the order of 10-1 to 10-2. For speech, the resulting error rate after demodulation must be on the order of 10-2 to 10-3 or better. This can be achieved, for example, with convolutional codes, which is the standard coding for all cellular systems. For data transmission, a bit error rate of 10-6 or better is required.

4.4.5.2 Convolutional Codes

For convolutional codes, constraint length and code rate need to be selected. The constraint length should be as large as possible to obtain good performance. However, the complexity of the decoder increases with increasing constraint length. State-of-the-art VLSI (very large scale integration) implementations have been obtained for constant length 9 convolutional codes. The code rate depends on the interleaving depth and the coherence time of the channel.

Page 23: 1 Vocational Training Council - IVE (Tsing Yi) TN3431 Mobile Networks Department of Information & Communications Technology Vocational Training Council

23

Vocational Training Council - IVE (Tsing Yi) TN3431 Mobile NetworksDepartment of Information & Communications TechnologyVocational Training Council - IVE (Tsing Yi) TN3431 Mobile NetworksDepartment of Information & Communications Technology

4.3.5.2 Concatenated Reed-Solomon / Convolutional Coding

This coding scheme employs an outer Reed-Solomon (RS) code and aninner convolutional code in conjunction with outer and inner interleavers. The use of an inner bit interleaver / deinterleaver pair renders the fading channel memoryless and allow the convolutional code to mitigate multiuser interference more effectively.

4.3.5.3 Turbo Codes

Recently, turbo coding has received attention as a potential FEC coding scheme for cellular applications. Turbo codes are parallel or serial concatenated recursive convolutional codes, whose decoding is carried out iteratively. They have been demonstrated to closely approach the Shannon capacity limit on both AWGN and Rayleigh Fading channels.

Page 24: 1 Vocational Training Council - IVE (Tsing Yi) TN3431 Mobile Networks Department of Information & Communications Technology Vocational Training Council

24

Vocational Training Council - IVE (Tsing Yi) TN3431 Mobile NetworksDepartment of Information & Communications TechnologyVocational Training Council - IVE (Tsing Yi) TN3431 Mobile NetworksDepartment of Information & Communications Technology

4.3.5.4 Hyhrid ARQ Schemes

The type-I hybrid ARQ scheme uses a code designed for error detection and correction. Thus, it requires more parity check bits (overhead) than a code used for error detection only. Type-II hybrid ARQ codes the first transmission of a message with parity check bits used solely for error detection. If an error is detected, the erroneous word is saved in the receiver buffer and a retransmission is required. The retransmission is a block of parity check bits formed from the original message and an error-correcting code. These parity check bits are then applied to the stored code word in the receivcr. In case there is still an error, the next retransmission might contain either the original code word or an additional block of parity check bits.

Page 25: 1 Vocational Training Council - IVE (Tsing Yi) TN3431 Mobile Networks Department of Information & Communications Technology Vocational Training Council

25

Vocational Training Council - IVE (Tsing Yi) TN3431 Mobile NetworksDepartment of Information & Communications TechnologyVocational Training Council - IVE (Tsing Yi) TN3431 Mobile NetworksDepartment of Information & Communications Technology

4.3.5.5 Interleaving Schemes

A radio channel produces bursty errors. However, since convolutional codes are most effective against random errors, interleaving is used to randomize the bursty errors. The interleaving scheme can be either block interleaving or convolutional interleaving. Typically, block interleaving is used in cellular applications.

The performance improvement due to interleaving depends on the diversity order of the channel and the average fade duration of the channel. The interleaving length is determined by the delay requirements of the service. Speech service typically requires a shorter delay than data services. Thus, it should be possible to match the interleaving depth to different services.

Page 26: 1 Vocational Training Council - IVE (Tsing Yi) TN3431 Mobile Networks Department of Information & Communications Technology Vocational Training Council

26

Vocational Training Council - IVE (Tsing Yi) TN3431 Mobile NetworksDepartment of Information & Communications TechnologyVocational Training Council - IVE (Tsing Yi) TN3431 Mobile NetworksDepartment of Information & Communications Technology

4.3.5.6 Multirate Schemes

Mulyirate design means that different services with different quality of service requirements are multiplexed together in a flexible and spectrum-efficient way. The provision of variable data rate with different quality of service requirements can be divided into three sub-problem:

• How to map different bit rates into the allocated bandwidth;

• How to provide the desired quality of service;

• How to inform the receiver about the characteristics of the received signal.

The first problem concerns issues like multicode transmission and variable spreading. The second spread problem concerns coding schemes, and the third problem concerns control channel multiplexing and coding.

Page 27: 1 Vocational Training Council - IVE (Tsing Yi) TN3431 Mobile Networks Department of Information & Communications Technology Vocational Training Council

27

Vocational Training Council - IVE (Tsing Yi) TN3431 Mobile NetworksDepartment of Information & Communications TechnologyVocational Training Council - IVE (Tsing Yi) TN3431 Mobile NetworksDepartment of Information & Communications Technology

4.3.6 Packet Data

Since non real-time packet data services are not delay sensitive, they are the retransmission principle implemented with ARQ protocol to improve the error rate. The retransmission protocol can be either implemented in layer 2 as part of MAC and RLP or in the physical layer (layer 1). If packet data retransmission is implemented as part of layer, the transmission of packet data in the physical layer does not differ from the transmission of circuit switched data. So the multirate aspects discussed above also apply to the transmission of packet data. If the physical layer ARQ is used, then physical layer is modified depending on the ARQ scheme used. In both cases, the access procedure and handover for packet data services have certain special implication, which are discussed in the next subsection.

Page 28: 1 Vocational Training Council - IVE (Tsing Yi) TN3431 Mobile Networks Department of Information & Communications Technology Vocational Training Council

28

Vocational Training Council - IVE (Tsing Yi) TN3431 Mobile NetworksDepartment of Information & Communications TechnologyVocational Training Council - IVE (Tsing Yi) TN3431 Mobile NetworksDepartment of Information & Communications Technology

4.3.6.1 Packet Access Procedure

The packet access procedure in CDMA should minimize the interference to other users. Since there is no connection between the base station and the mobile station before the access procedure, initial access is not power controlled and thus the information transmitted during this period should be minimized. There are three scenarios for packet access:

• Infrequent transmission of short packets containing little information;

• Transmission of long packets;

• Frequent transmission of short packets.

Since the establishment of a traffic channel itself requires signalling and thus consumes radio resources, it is better to transmit small packets within the random access message without power control. For long and frequent short packets, a dedicated traffic channel should be allocated.

Page 29: 1 Vocational Training Council - IVE (Tsing Yi) TN3431 Mobile Networks Department of Information & Communications Technology Vocational Training Council

29

Vocational Training Council - IVE (Tsing Yi) TN3431 Mobile NetworksDepartment of Information & Communications TechnologyVocational Training Council - IVE (Tsing Yi) TN3431 Mobile NetworksDepartment of Information & Communications Technology

4.3.6.2 MAC Protocol

The task of the medium access protocol is to share the transmission medium with different users in a fair and efficient way. Sometimes, multiple access protocols such as FDMA, CDMA, and TDMA are also classified as medium access protocols. The medium access protocol is part of the link layer, while the multiple access scheme is part of the physical layer. The medium access protocol has to resolve contention between users accessing the same physical resource. Thus, it also manages the packet access procedure. Since the third generation systems offer a multitude of services to customers at widely varying quality of service requirements, the MAC needs to offer capabilities to manage the access demands of different users and different service classes. This can be performed using reservation and priority schemes. Services with delay constraints can use a reservation scheme to reserve capacity to guarantee the quality of service. Priority schemes can be used to prioritize the requests from different services.

Page 30: 1 Vocational Training Council - IVE (Tsing Yi) TN3431 Mobile Networks Department of Information & Communications Technology Vocational Training Council

30

Vocational Training Council - IVE (Tsing Yi) TN3431 Mobile NetworksDepartment of Information & Communications TechnologyVocational Training Council - IVE (Tsing Yi) TN3431 Mobile NetworksDepartment of Information & Communications Technology

4.3.6.3 Packet Data Handover

Since CDMA operates with the reuse factor of one, it needs efficient and fast handover in order to avoid excessive interference with the other cells. This has been realized with soft handover in the case of circuit switched connection. Soft handover also improves performance through increased diversity. For packet connection, and especially for short packets, there may be no need to establish soft handover even if the user is at the cell edge. However, there is still the need to route packets via the base station that provides the best connection. This is more important with frequent packet transmissions than with infrequent transmission.This can be implemented with frequent rescheduling of packet data transmission (i.e. if the transmission time exceeds a predefined timer, rescheduling is performed and the base station offering the best connection is selected).

If soft handover is used, then the implementation of ARQ depends on where it is terminated (i.e., where in the network the retransmission decision is made).

Page 31: 1 Vocational Training Council - IVE (Tsing Yi) TN3431 Mobile Networks Department of Information & Communications Technology Vocational Training Council

31

Vocational Training Council - IVE (Tsing Yi) TN3431 Mobile NetworksDepartment of Information & Communications TechnologyVocational Training Council - IVE (Tsing Yi) TN3431 Mobile NetworksDepartment of Information & Communications Technology

If the ARQ is terminated after the soft handover combining device typically situated in the BSC, then ARQ is implemented as without soft handover. The only drawback of this solution is that it increases the delay for retransmission because of the fixed network transmission between the BTS and the BSC.

Page 32: 1 Vocational Training Council - IVE (Tsing Yi) TN3431 Mobile Networks Department of Information & Communications Technology Vocational Training Council

32

Vocational Training Council - IVE (Tsing Yi) TN3431 Mobile NetworksDepartment of Information & Communications TechnologyVocational Training Council - IVE (Tsing Yi) TN3431 Mobile NetworksDepartment of Information & Communications Technology

4.3.7 Multiuser Detection

Multiuser detection (MUD) and interference cancellation (IC) seek to improve performance by canceling the intra-cell interference and thus increasing the system capacity. The actual capacity increase depends on the efficiency of the algorithm, radio environment, and the system load. In addition to capacity improvement, MUD and IC alleviate the near/far problem typical to DS-CDMA systems.

Figure 4.3.6 depicts a system using multiuser detection / interference cancellation. Each user is transmitting data bits, which are spread by the spreading codes. The signals are transmitted over a Gaussian multiple access channel. In the receiver, the received signal is correlated with replicas of the user spreading codes. The correlator consists of a multiplier and an integrate and dump function. A matched filter can also be used. Multiuser detection processes the signal from the correlators jointly to remove the unwanted multiple access interference from the desired signal. The output of a multiuser detection block are the estimated data bits.

Page 33: 1 Vocational Training Council - IVE (Tsing Yi) TN3431 Mobile Networks Department of Information & Communications Technology Vocational Training Council

33

Vocational Training Council - IVE (Tsing Yi) TN3431 Mobile NetworksDepartment of Information & Communications TechnologyVocational Training Council - IVE (Tsing Yi) TN3431 Mobile NetworksDepartment of Information & Communications Technology

Figure 4.3.6 System model of multiuser detection

Page 34: 1 Vocational Training Council - IVE (Tsing Yi) TN3431 Mobile Networks Department of Information & Communications Technology Vocational Training Council

34

Vocational Training Council - IVE (Tsing Yi) TN3431 Mobile NetworksDepartment of Information & Communications TechnologyVocational Training Council - IVE (Tsing Yi) TN3431 Mobile NetworksDepartment of Information & Communications Technology

4.3.7.1 Capacity and Coverage Improvement

The performance of multiuser detection depends on the captured energy and impact of phase and code tracking errors. The fraction of captured energy is a function of chip duration multiplied by the number of RAKE branches divided by the delay spread.Furthermore, since typically the interference from a single cell (i.e., intracell interference) is cancelled, the intercell interference limits the achievable capacity. With a propagation power law of 4, intercell interference is 55% of intracell interference; therefore, ideally, MUD can improve the capacity of the system by a factor of 2.8, compared to a system without MUD. However, in practice, the MUD efficiency is not 100% but depends on the detection scheme, channel estimation, delay estimation, and power control error.

Page 35: 1 Vocational Training Council - IVE (Tsing Yi) TN3431 Mobile Networks Department of Information & Communications Technology Vocational Training Council

35

Vocational Training Council - IVE (Tsing Yi) TN3431 Mobile NetworksDepartment of Information & Communications TechnologyVocational Training Council - IVE (Tsing Yi) TN3431 Mobile NetworksDepartment of Information & Communications Technology

Typically, MUD is studied mainly for the uplink. One of the main motivations, in addition to complexity considerations, to justify the study of multiuser detection for the uplink has been the claim that the capacity of DS-CDMA system is uplink limited. However, this claim comes from the studies for IS-95. The noncoherent uplink of IS-95 with antenna diversity has normally worse performance than the coherent downlink with orthogonal codes. Even for IS-95, however, the downlink is sometimes the limiting detection. All third generation wideband CDMA system use coherent detection also is the uplink and thus, together with antenna diversity, the uplink has better performance than the downlink. One way of improving downlink performance would be canceling the worse interferers from other cells.