3

Click here to load reader

Idle traffic management_for_n_carriers

Embed Size (px)

Citation preview

Page 1: Idle traffic management_for_n_carriers

Traffic Management for N Carriers

Author Name Department Contact InformationWei Lou Core RF Engineering (972) 685-6514

1xEVDO standard supports AT idle state traffic distribution using Hashing function. For mixed DO data and voice networks, the multi-carriers traffic managements operate independently. DO networks only supports idle state traffic distribution using Hashing function. While 1xRTT networks support mobile idle state traffic distribution using Hashing or AccessOverLoadClass as well as mobile call setup state using MCTA.

The 1xEVDO Default Idle State Protocol (DISP) provides the procedures and messages used by the access terminal and the access network when the access terminal has acquired a network and a connection is not open. This protocol operates in one of the following four states:

o Inactive Stateo Sleep Stateo Monitor Stateo Connection Setup State

In the Monitor State the access terminal monitors the Control Channel, listens for Page messages and if necessary, updates the parameters received from the Overhead Messages Protocol. The access network may transmit unicast packets to the access terminal in this state.

The 1xEVDO idle state traffic management is implemented while AT in Monitor State. Each time the content of the SectorParameters message changes, the access terminal shall select a CDMA Channel from the list of channels in the message. If no channels are listed,the access terminal shall use the channel it is currently monitoring. If one or more channels are available, the access terminal shall use the hash function to compute an index into the channel list provided in the message. The access terminal shall use the following hash function parameters to obtain this index:

Key = SessionSeedDecorrelate = 0N = NumChannels field of the SectorParameters message

Where SessionSeed is provided as public data by the AddressManagement Protocol.

The hash function takes three arguments, Key (typically the access terminal.s ATI), N (the number of resources), and Decorrelate (an argument used to de-correlate values obtained for different applications for the same access terminal).Define:

o Word L to be bits 0-15 of Key

1

Page 2: Idle traffic management_for_n_carriers

o Word H to be bits 16-31 of Key

Where bit 0 is the least significant bit of Key.Common Algorithms and Data Structures TIA/EIA/IS-856 The hash value is computed as follows:

R =∟ N ((40503 (L ⊕H⊕ Decorrelate)) mod 216) / 216」

The SectorParameters message is used to convey sector specific information to the access terminals.

ChannelCount: The access network shall set this field to the number of cdma2000 high rate packet data channels available to the access terminal on this sector.

The Channel record defines an access network channel frequency and the type of system on that frequency. This record contains the following fields:

Field Length (bits)SystemType 8 BandClass 5 ChannelNumber 11 SystemType The access network shall set this field of this record to

0x00. BandClass: The access network shall set this field to the band class number corresponding to the frequency assignment of the channel specified by this record.

ChannelNumber: The access network shall set this field to the channel number corresponding to the frequency assignment of the channel specified by this record.

2