WCC Question Bank
WCC Question Bank
Module - 1
1. Discuss the delay spread and coherence bandwidth with relevant expressions.
Sol:
Delay Spread and Coherence bandwidth
Delay spread is the amount of time that elapses between the first arriving path and
the last arriving path.
It can be found by inspecting A(Δτ,0).
A(Δτ) is referred to as Multipath Intensity Profile or Power Delay Profile.
The average delay spread is defined as
It is denoted as .
A large implies that channel energy is coming from many directions and this
results in more statistical diversity in channel.
A small implies that the received channel energy is more focused and this results
in less statistical diversity.
The dual of angular speed is coherence distance.
A coherence distance of d means that any physical positions separated by d have an
essentially uncorrelated received signal amplitude and phase.
An approximate rule of thumb is .
For Rayleigh Fading, .
3. Explain Ground Reflection (2- Ray Model) with relevant diagrams and necessary
equations.
Sol:
Ground Reflection (2-Ray Model)
The 2-ray ground reflection model is a useful propagation model that is based on
geometric optics and considers both the direct path and a ground reflected propagation
path between transmitter and receiver.
This model has been found to be reasonably accurate for predicting the large-scale signal
strength over distances of several kilometres for mobile radio systems that use tall towers
(heights which exceed 50 m), as well as for line-of-sight microcell channels in urban
environments.
In most mobile communication systems, the maximum T-R separation distance is at most
only a few tens of kilometres, and the earth may be assumed to be flat.
The total received E-field, ETOT, is then a result of the direct line-of-sight component,
ELOS, and the ground reflected component, Eg.
where |E(d, t)| = E0d0/d represents the envelope of the E-field at d meters from the
transmitter.
Two propagating waves arrive at the receiver: the direct wave that travels a distance d’;
and the reflected wave that travels a distance d”.
The E-field due to the line-of-sight component at the receiver can be expressed as
and the E-field for the ground reflected wave, which has a propagation distance of d", can
be expressed as
For small values of θi(i.e., grazing incidence), the reflected wave is equal in magnitude
and 180° out of phase with the incident wave.
The resultant E-field, assuming perfect ground reflection (i.e., Γ = -1 and Et = 0) is the
vector sum of ELOS and Eg, and the resultant total E-field envelope is given by |ETOT|=
|ELOS + Eg|
The electric field ETOT(d, t) can be expressed as
Using the method of images, the path difference, Δ, between the line-of-sight and the ground
reflected paths can be expressed as
When the T-R separation distance d is very large compared to ht +hr, the equation can be
simplified using a Taylor series approximation as
Once the path difference is known, the phase difference θΔ between the two E-field
components and the time delay τd between the arrival of the two components can be
easily computed using the following relations
and
It should be noted that as d becomes large, the difference between the distances d' and d”
becomes very small, and the amplitudes of ELOS and Eg are virtually identical and differ
only in phase i.e.,
If the received E-field is evaluated at some time, say at t = d”/c,
where d is the distance over a flat earth between the bases of the transmitter and receiver
antennas.
The electric field (at the receiver) at a distance d from the transmitter can be written as
Or
where k is a constant related to E0, the antenna heights, and the wavelength.
The power received at d is related to the square of the electric field. Therefore, the
received power at a distance d from the transmitter can be expressed as
At large distances (d>> ) the received power falls off with distance raised to the fourth
power, or at a rate of 40 dB/decade.
At large values of d, the received power and path loss become independent of frequency.
The path loss for the 2-ray model (with antenna gains) can be expressed in dB as
If , then
where the ground appears in the first Fresnel zone between the transmitter and receiver.
5. Compute the diffraction loss for the three cases shown. Assume λ=1/3m, d1=1km,
d2=1km, and (a) h=25m, (b) h=0 (c) h=-25m. For each of these cases, identify the
Fresnel zone within which the tip of the obstruction lies.
Sol:
Given:
λ=1/3m, d1=1km, d2=1km
(a) h = 25m
The Fresnel diffraction parameter is obtained as
= 2.74
The path length difference between the direct and diffracted rays is given as
= 0.625m
To find the Fresnel zone in which the tip of the obstruction lies we need to compute n
which satisfies the relation Δ= nλ /2.
For λ = 1/3m, and a = 0.625 m, we obtain
= 3.75
Therefore, the tip of the obstruction completely blocks the first three Fresnel zones.
(b) h = 0
Therefore, the Fresnel diffraction parameter v = 0.
Using the numerical approximation equation, the diffraction loss is
= 6dB.
For this case, since h = 0, we have Δ = 0, and the tip of the obstruction lies in the middle
of the first Fresnel zone.
(c) h = -25
Using equation, the Fresnel diffraction parameter is obtained as -2.74.
Using the numerical approximation equation, the diffraction loss is 0dB.
Since the absolute value of the height h, is the same as part (a), the excess path length Δ
and hence n will also be the same.
It should be noted that although the tip of the obstruction completely blocks the first three
Fresnel zones, the diffraction losses are negligible, since the obstruction is below the line
of sight (h is negative).
Sol:
The wavelength = 1/3 m
Redraw the geometry by subtracting the height of the smallest structure.
= 0.2865○
= 2.15○
= 2.434○ = 0.0424rad
The Fresnel diffraction parameter is obtained as
= 4.24
D 3
Z 3N .
R f
Module - 2
1. List the various GSM services.
Sol:
The service offered over the GSM network was classified into two categories:
Tele Services and Bearer Services.
In addition, there are Supplementary Services that can be added to the Tele Services.
Teleservices provide standard voice communication between two end users and additional
communication between two end user applications according to some standard protocol.
Bearer services provide the user with the ability to transmit data between user network
interfaces.
Supplementary services are the services that enhance or support a tele service provided by
the network.
Phase 1 GSM Services
2. With a neat GSM network architecture, explain the Network Switching System
(NSS).
Sol:
The major GSM subsystems are the Network Switching System (NSS), the Base Station
System (BSS), and the Mobile Station (MS).
Commonly stored information will include such items as the MSISDN and IMSI numbers
and type of services that have been subscribed to. Also included in the HLR database will be
dynamic data such as the subscriber’s current location (i.e., VLR address) and presently
activated services. The HLR together with VLR and the MSC provide support for the
connection and mobility management of mobile station either in their home location area or
roaming within the GSM system. The Authentication Center (AUC) and the Equipment
Identity Register(EIR) in conjunction with the MSC/VLR and HLR provide additional GSM
network security and help facilitate international roaming within the GSM network. The
Flexible Numbering Register (FNR) is used by the GSM system to provide number
portability to a subscriber. With this feature a subscriber may change GSM operators and still
maintain the same MSISDN number. The network switching system will use the FNR to
redirect messages sent by a GMSC toward a particular HLR to the correct HLR. The
Interworking Location Register (ILR) is used to allow intersystem roaming. In the United
States, this operation supports roaming between the legacy AMPS system and GSM 1900
system.
Abis Interface
The Abis interface exists between the BSC and the BTS. The layer 2 protocol used on the
Abis interface is LAPD. At that Layer 3 level, most messages just passed through the BTS
transparently. However, there are some radio resource management messages that are closely
linked to the system radio hardware that must be handled by the BTS. The BTS management
(BTSM) entities manage these messages. An example of this type of radio resource message
involves encryption. The ciphering message sends the cipher key, k c to the BTS and then the
BTS sends the ciphering mode command of the MS.
A Interface
The A interface exists between the BSC and the MSC. Signaling over the A interface is done
according to Base Station Signaling Application Part [BSSAP] using the network service part
of SS7. In the MSC, in the direction of the MS, Layer 3 is subdivided into three parts: Radio
Resource Management (RR), Mobility Management (MM), and Connection Management
[CM]. As mentioned, the protocol used to transfer the CM and MM messages is BBSAP.
The BBSAP protocol has two subparts: Direct Transfer Application Part [DTAP] and Base
Station System Management Application Part (BSSAMP). DTAP is used to send CM and
MM messages between the MSC and the MS transparently through the BSS. BSSAMP is
used to send messages between the MSC and the BSC.
Ater Interface
The Ater interface only exists in GSM systems that have separate units for the Transcoder
Controller and BSC (this is typical of some vendors’ GSM equipment). Signaling between
the BSC and the TRC is performed by the use of BSC/TRC Application Part (BTAP)
protocol over the Ater interface. The figure indicates how BSSAP signaling is sent
transparently through the TRC node.
c) Synchronization Channel
The Synchronization Channel (SCH) is used to transmit the required information for the MS
to synchronize itself with the timing within a particular cell. By listening to the SCH, the MS
can learn about the frame number in this cell and about the BSIC of the BTS it is attached to.
The BSIC can only be decoded if the BTS belongs to the GSM network. SCH is only
transmitted in the downlink direction.
a) Paging Channel
The Paging Channel (PCH) is used by the system to send paging messages to the mobiles
attached to the cell. The MS listen to the PCH at certain time intervals to learn if the network
wants to make contact with it. The mobile will be paged whenever the network has an
incoming call ready for the mobile or some type of message (e.g., short message or
multimedia message) to deliver to the mobile. The information transmitted on the PCH will
consist of a paging message and the mobile’s identity number (e.g., ISMI or TMSI). The
PCH is transmitted in the downlink direction only.
The use of a TA allows any mobile within the cell to transmit information that will arrive at
the BTS in correct synchronization with the start of the TDMA frame. In the GSM system,
the structure of the RACH signal allows for a maximum cell radius of 35 km except when
extended range cells are defined by the system.
Besides being stored in the subscribers SIM, the IMSI number is also stored in the HLR
and VLR databases.
The Temporary Mobile Subscriber Identity (TMSI) number is used by the GSM
network to protect the subscriber’s privacy over the air interface.
The wireless network assigns a TMSI to the MS, and the TMSI number only has local
significance within the particular MS/VLR coverage area during MS attachment.
The International Mobile Equipment Identity (IMEI) number and the International
Mobile Equipment Identity and Software Version (IMEISV) number are used by the
GSM network for equipment identification and to uniquely identity an MS as a piece of
equipment.
The IMSI is used by the MSC for final establishment of the call.
MSRN=CC + NDC +SN
where CC = Country Code
NDC = National Destination Code
SN = Subscriber Number (This is the number of the serving MSC)
8. List out the ten operations in call setup in GSM system. Explain in detail ciphering
mode setting and IMEI check.
Sol:
The ten operations in call setup in GSM system are:
Interrogation (only for a mobile-terminating call)
Radio resource connection establishment
Service request
Ciphering mode setting
IMEI number check
TMSI allocation
Call initiation
Assignment of a traffic channel
User alerting signaling
Call accepted signaling
IMEI Check
Again, the exchanges properties set in the MSC/VLR determine whether an IMEI check
is performed. If the IMEI number is to be checked, the MSC/VLR sends an identify
request message to the MS as shown by Figure.
As shown by the Figure, this mobility management message and the MS identify
response message are sent transparently between BTS and BSC. The value of IMEI sent
by the mobile is checked against the equipment identity register (EIR) database.
The EIR can return three status mode for the MS back to the network. The MS can be
“white listed” and allowed to use the network, the MS can be “black listed” and not
allowed to use the network, or the MS can be “grey listed.” It is then up to the network
operator to decide if the MS can use the network or not.
9. Explain Interrogation and Radio Resource operations with a neat flow diagram.
Sol:
Interrogation Phase
Figure graphically illustrates the interrogation phase in a timeline/flowchart form.
The various operations and signaling occurring between the different nodes of the GSM
network. For the interrogation operation, one notes that the Initial Address Message
(IAM) comes from outside the GSM network using ISUP/TUP protocols.
In some vendors’ systems, the GMSC can send a request to the Flexible Numbering
Register (FNR) system node before being sent to the HLR. Also, for security reasons, the
subscriber data can be simultaneously stored and updated in two HLRs.
This built-in system redundancy assures successful operation in all but the most
catastrophic disasters. In one final note final note about this operation, one observes that
in the last operation performed, the two GSM system nodes (the MSC/VLR and the
GMSC) use a non-MAP protocol to communicate with each other (i.e., the IAM
message).
In most cases, the LAI is provided by the MSC to the BSC. The BSC receives the paging
message and typically translates the LAI to a Cell Global Identity (CGI) number if this
information was not provided in the paging message.
The BSC sends the paging command message to the appropriate BTSs. This message will
contain to following information the IMSI or TMSI, the paging group, and the channel
number.
The channel will contain enough information to indicate the channel type and the timeslot
number. For this case channel type is a downlink Common Control Channel (CCCH)
(i.e., a Paging Channel [PCH]).
For the GSM system, the Paging Group is determined by the subscriber’s IMSI and other
information defined in the BSC.
When the MS has received the system information and knows its paging group, it will
calculate when the paging group will be broadcast and thereafter will only listen for pages
during the time they are expected be sent.
Finally, the BTS sends a paging message to the MS. this message is sent on the PCH.
there are different types of paging requests possible depending upon the use of IMSI or
TMSI.
The MS responds to the paging request message by sending a channel request message to
the BTS. the message is transmitted on the Random Access Channel(RACH)and contains
information about the type request to set the priority if the system is experiencing heavy
call volume and the radio resources are low. When the BTS detects an access burst, it
sends a channel required message to the BSC.
The BSC examines the information contained within the channel required message and
determines whether the MS is within the allowed range of the cell.
The BSC determines what channel to use and sends a channel activation message to the
BTS.
Figure 5 shows the detailed steps required for radio resource connection establishment.
Figure 6 indicates that there are two possible modes of system operation The BTS
activities this channel and then sends a channel activation acknowledge message back to
the BSC. The BSC then sends and immediate assignment command message back to the
BTS that include an immediate assign message for the MS.
This immediate assign message is sent by the BTS to the MS over the Access Grant
Channel (AGCH) and instructs the MS to switch to the allocated signalling channel and
contains the channel description information element.
If the information sent back to the MS from the original access burst agrees with the
values stored by the MS, the mobile enters a new phase to be described next.
The GSM specifications allow for a modification of the just described procedure. If need
be, the BSC may send an immediate assignment on TCH command to the MS. This
allows the call setup signalling to be performed directly over the TCH. When the call
setup procedure is complete, a channel mode modify command message can have used to
initiate a procedure that will return the TCH to the traffic mode. This strategy might be
employed if there is congestion on the available system SDCCHs.
The message containing a 128- bit Random number (RAND) and the Ciphering Key
Sequence Number (CKSN) is sent to the MS over the Stand-alone Dedicated Control
Channel (SDCCH) from the BTS.
The MS stores the CKSN and then calculates the value of a signed response (SRES) by
using the RAND, the value of k1 (the subscriber authentication key that is stored in the
SIM card), and Kc in several authentication algorithms (known as A3 and A8). The value
of SRES is returned to the MSC/VLR as a transparent authentication response message.
Between the BSC and the BTS a data request frame and a data indication frame are used
to pass the layer 3 message as shown. A timer is set in the MSC/VLR when the first
authentication request message is sent.
If the timer expires, the request is set again. If the timer expires a second time, the radio
resources (the channel) are released.
If authentication is unsuccessful, the GSM system may initiate a procedure to identify the
MS. Depending upon the results of this procedure the MS may be barred from the system
or sent a message indicating that the “IMSI is unknown in VLR” or “PLMN not allowed.”
In step#1, the MS sends a measurement report about the RSS levels to the BTS at a rate
of about two times per second. The BTS also makes measurements of the TCH uplink
signal strength and adds these to the measurement report from the MS.
In step#2, the combined report is forwarded to the BSC. The BSC uses a locating function
to determine the necessity of handing over the call to another cell because of either poor
quality or low signal strength in the cell that the MS is attached to.
In step #3, if handover is deemed necessary, the BSC sends a command to the BTS in the
new cell to activate a TCH.
In step #4, when the new BTS acknowledges the activation of the new TCH, the BSC
sends a message to the MS via the old BTS with information about the new TCH (i.e.,
frequency, timeslot, and mobile output power).
In step #5, the mobile tunes to the new TCH and sends, short handover access bursts on
the appropriate FACCH. At this time, the MS does not use anything advance.
In step #6, when the BTS detects the handover access bursts, it sends timing advance
information to the MS over the FACCH. The BTS also sends a handover detection
message to the BSC. The BSC reconfigures the group switch to deliver the traffic to the
new BTS.
In step #7, the MS sends a handover complete message to the BSC.
In step #8, the BSC sends a message to the old BTS to deactivate the old TCH and its
associated signalling channel (SACCH).in the intra-BSC handover the MSC is not
involved with the operations. The BSC would handover send a record of the handover to
the MSC for the generation of system statistics.
Module – 3
1. Explain Network Nodes in CDMA 2000 wireless system, with neat diagram.
Sol:
The details of the Network nodes found in a cdma2000 Wireless System is shown in
Figure.
Interworking Function
In the early CDMA systems, the Inter Working Function(IWF) node is the only gateway
between the wireless network and the Packet Data Network (PDN).
It provides a direct connection to the PDN for packet data calls.
It also supports circuit-switched data calls by providing internal modems for connections
to dial-up Internet Service Providers (ISPs). These circuit switched data calls are routed to
the PSTN through the MSC.
Later, IWF typically uses Ethernet for the signaling between itself and the MSC and for
the exchange of packet data between itself and the PDN.
In CDMA2000, the IWFs packet data transfer function is augmented by the Packet Core
Network (PCN) element.
HLR/AC
Home Location Register (HLR) and Authentication Center (AC) are typically collocated
in CDMA2000 systems.
The HLR holds subscriber information in a database format that is used by the system to
manage the Subscriber Device (SD) activity.
It includes the SD Electronic Serial Number (ESN), details of subscriber’s service plan,
any service restrictions (no overseas access) and identification of the MSC where the
mobile was last registered.
The AC provides a secure database for the authentication of mobile subscribers when
they first register with the system and during call origination and termination.
The AC uses Shared Secret Data (SSD) for authentication calculations.
Both the AC and SD calculate SSD based on the authentication key or A-key, the ESN,
and a random number provided by the AC and broadcast to the SD.
The A-key is stored in the SD and also at the AC and never transmitted over the air.
The AC or MSC/VLR compares the values calculated by the AC and the SD to determine
the mobile’s status with the system.
PLMN Subnetwork
A cdma2000 Public Land Mobile Network (PLMN) provides mobile wireless
communication services to subscribers and typically consists of several functional
subnetworks.
These subnetworks are known as the Circuit Core Network (CCN), the Packet Core
Network (PCN), the Service Node Network (SNN) and the CDMA Radio Access
Network (C-RAN).
The cdma2000 PLMN subscriber has access to the PSTN and the PDN through these
subnetworks.
These subnetworks facilitates the management of the system.
For this Walsh spreading codes are used for channel encoding.
Walsh code consists of a binary combination of sixty-four 0s and 1s and all these are
orthogonal to one another.
This creates 64 distinct communication channels that can all exist in the same frequency
spectrum.
All other Walsh encoded signals will appear as broadband noise to the CDMA receiver
except for the unique signal that was created with the same Walsh code as the one the
receiver uses for demodulation.
3. Explain with block diagram the generation of CDMA forward traffic control with
power control channel for 14.4 kbps traffic.
Sol:
The CDMA Forward Traffic Channels carry the actual user information.
The digitally encoded voice or data can be transmitted at several different data rates.
Rate Set 1(RS1) supports 9.6kbps maximum and slower rates of 4.8, 2.4, 1.2kbps.
Rate Set 2(RS2) supports 14.4, 7.2, 3.6, 1.8kbps.
All the CDMA system’s unused Walsh codes may be used to generate forward traffic
channels.
The Traffic Channels are further scrambled with both the short PN sequence codes and
the long PN sequence codes before transmission.
Power control information is transmitted to the mobile stations within the cell over the
Traffic Channels as shown in Figure.
This information is used to set the output power of the mobile on the reverse link and is
multiplexed with the scrambled voice bits at the rate of 800bps or 1 bit every 1.25msec.
4. Describe the generation of the CDMA pilot channel signal with a neat figure.
Sol:
The CDMA Pilot channel is used to provide a reference signal for all the SDs within a
cell.
This message also goes through a convolutional encoding process symbol repetition and
block interleaving before being scrambled by a slower version of the long PN code.
10. Explain the different types of hard handoffs supported by CDMA systems.
Sol:
Hard handoff is an intercarrier handoff.
This causes the radio link to be abruptly interrupted for a short period while the base and
mobile station switch from one carrier frequency to another.
The two basic types of intercarrier handoffs are:
A hand-down is a hard handover between two different carriers within the same cell.
A handover is a hard handoff between two different carriers in two different cells.
The circumstances for hard handoff can be due to the particular coverage area
implementation of a service provider or the less frequent case of existence of two service
providers in adjacent areas.
The first case is known as pocketed implementation, a service provider might use a
second CDMA carrier in individual or noncontiguous cells to provide additional capacity
during system growth or for local high-traffic hot spots.
The Figure shows Hard CDMA Handoffs due to Inter carrier Handoff.
A mobile that is using the second carrier and exiting the pocket of second-carrier cells
must be handed off to the common carrier to continue the call.
To perform this; first hand-down the call to the common carrier before the mobile leaves
the pocketed area.
Then a soft handoff can be performed as the mobile moves across the border from the
pocketed area into the surrounding service area.
This works well for a large pocket with a well-defined border cells.
This process does not work well where insufficient first-carrier capacity is available to
accommodate the required hand-down as might be the case for an isolated cell with a
second carrier.
The solution is to expand the second carrier pocket so that it has sufficient first-carrier
capacity to handle normal first-carrier traffic and hand-downs.
In case where a second carrier is added to a cell to facilitate hand-downs instead of
providing normal traffic relief, the term transition cell is used instead of border cell.
The area around the original isolated cell is known as the transition zone and hand-down
is only allowed in the transition zone providing relief for the heavily loaded original cell.
There is possibility of disjoint systems where distinct CDMA carriers exist in different
regions due to issues like availability of appropriate spectrum.
Figure shows Hard CDMA Handoffs due to Disjointed Regions.
The most common method used to provide handoff between the two regions is to
implement a border area that supports the use of both carrier frequencies and is
configured to provide hand-downs or to execute a hard handoff from one carrier to the
other as the mobile crosses the border between the two regions.
The first scenario works well for a clearly defined border area with a predictable flow of
traffic.
If a mobile might be expected to turn around within the border area and return to the
region it had previously left, a more complex border area must be created to prevent the
possibility of thrashing (extremely undesirable) between the two carriers.
This requires the identification of border cells that facilitate the handover from one carrier
to the other.
These border cells are configured to make frequent pilot-strength measurements and use a
threshold value that will cause a handover from the host (current) cell to the target
(future) cell in the vicinity of the border between the two cells.
Module - 4
1. Explain the advantages of OFDM for LTE.
Sol:
Advantages of OFDM
a) Elegant Solution to Multipath Interference
Any residual Inter Symbol Interference (ISI) can be eliminated by using guard intervals
between OFDM symbols that are larger than the expected multipath delay.
b) Reduced Computational Complexity
The Computational Complexity of OFDM is O(BlogBT m) where B is the bandwidth and
Tm is the delay spread.
c) Graceful degradation of performance under excess delay
The Performance of OFDM system degrades gracefully as the delay spread exceeds the
value designed for.
d) Exploitation of frequency diversity
OFDM facilitates coding and interleaving across sub carriers in the frequency domain
which can provide robustness against burst errors.
e) Enables efficient multi access scheme
OFDM can be used as a multi access schemeby partitioning different sub carriers among
multiple users which I referred to as OFDMA and is exploited in LTE.
f) Robust against narrowband interference
OFDM is relatively robust against narrowband interference since such interference affects
only a fraction of sub carriers.
g) Suitable for coherent demodulation
It is relatively easy to do pilot based channel estimation in OFDM systems, which renders
them suitable for coherent demodulation schemes that are more power efficient.
h) Facilitates use of MIMO
OFDM converts a frequency selective broadband channel into several narrowband flat
fading channels where MIMO models and techniques work well to improve the system
capacity.
i) Efficient support of broadcast services
By synchronizing base stations to timing errors well within OFDM guard interval, it is
possible to operate an OFDM network as a Single Frequency Network (SFN).
It allows broadcast signals from different cells to combine over the air to significantly
enhance the received signal power, thereby enhancing higher data broadcast
transmissions for a given transmit power.
3. Write the block diagram of end to end architecture of EPC supporting current and
legacy Radio Access Networks and discuss the elements of EPC.
Sol:
LTE network architecture/Evolved Packet Core architecture
EPC is designed to provide a high capacity, all IP, reduced latency, flat architecture and
supports new Radio Access Networks such as LTE.
EPC provide interworking with legacy 2G GERAN and 3G UTRAN networks connected
via SGSN.
EPC provides functions such as access control, packet routing and transfer, mobility
management, security, radio resource management and network management.
The EPC includes 4 new elements: Serving Gate Way (SGW), Packet Data Network
(PDN) Gate Way (PGW), mobility Management Entity (MME) and Policy Charging
Rules Function (PRCF).
i) Serving Gate Way (SGW)
It terminates the interface towards the 3GPP radio access networks (RAN)
It acts as a demarcation point between the RAN and Core network and management user
plane mobility.
It serves as mobility anchor when terminals move across areas served by different node-
B elements in E-UTRAN- as well as acrossother3GPPradio networks such as GERAN
and UTRAN.
SGW does downlink packet buffering and initiation of network triggered service request
procedures.
Other function include packet routing and forwarding transport level packet marking in
the uplink and downlink support for per user and inter operator charging.
ii) Packet Data Network Gate Way (PGW)
It acts as the termination point of the EPC toward other Packet Data Networks (PDN)
such as the internet private IP network or the IP Multimedia Subsystem (IMS) network
providing end user services.
It serves as an anchor point for sessions toward external PDN and provides functions such
as user IP address allocation, routing, policy enforcement, packet filtering and charging
support.
iii) Mobility Management Entity (MME)
It performs Signaling and Control functions to manage user terminal access to network
connections, assignment of network resources, mobility management functions such as
idle mode location tracking, paging, roaming and handover.
It provides security functions such as providing temporary identities for user terminals,
interacting with Home Subscriber Server (HSS) for authentication and negotiation of
ciphering and integrity protection algorithms.
iv) Policy and Charging Rules Function (PCRF)
It is a concatenation of Policy Decision Function (PDF) and Charing Rules Function
(CRF).
It interfaces with the PDN Gate Way and supports service data flow detection, policy
enforcement and flow based charging.
4. Consider a channel where the maximum delay spread has been determined to be
τ = 2μsec. What is the minimum and maximum data rate loss due to the cyclic
prefix? What is the minimum theoretical loss if a shorter cyclic prefix could be
used?
Sol:
The normal Cyclic Prefix (CP) length / Guard Time T g = 144 * Ts ≈ 4.7μsec which is
clearly longer than delay spread τ = 2μsec and so sufficient for this channel.
Since CP length is fixed, least overhead (rate loss) will be incurred for the longest block
size and most overhead (rate loss) would be incurred for the shortest block size.
With maximum block size Lmax= 2048 sub carriers, and block size L=128 sub carriers:
CP length = v = 144 *Ts = 144 * L / Lmax = 144 * 128 / 2048 = 9 data symbols.
Rate Loss factor = L / (L+v) = 128 / (128 + 9) = 128 / 137 = 0.934 ≈ 93% and hence
a rate loss of less than 7%.
With maximum block size Lmax = 2048 sub carriers, and block size L=2048 sub carriers:
CP length = v = 144 * Ts = 144 * L / Lmax = 144 * 2048 / 2048 = 144 data symbols.
Rate Loss factor = L / (L + v) = 2048 / (2048 + 144) = 2048 / 2192 = 0.934 ≈ 93%
and hence a rate loss of less than 7%.
If the Cyclic Prefix was even shorter, the rate loss would be less.
For block size L = 128 sub carriers, with Tg = 4.7μsec, there are 9data symbols.
With τ = 2μsec = Tg, there are (2μsec * 9) / 4.7μsec = 3.82 ≈ 4 data symbols = v
Rate Loss factor = L / (L + v) = 128 / (128 + 4) = 128 / 132 = 0.969 ≈ 97% and
hence a rate loss of less than 3%.
For block size L = 2048 sub carriers, with Tg = 4.7μsec, there are 144 data symbols.
With τ = 2μsec = Tg, there are (2μsec * 144) / 4.7μsec = 61.27 ≈ 62 data symbols = v
Rate Loss factor = L / (L + v) = 2048 / (2048 + 62) = 2048 / 2110 = 0.970 ≈ 97%
and hence a rate loss of less than 3%.
The L independent QAM symbols (the vector X) act as input and are treated as separate
sub carriers.
These L data bearing symbols are created from a bit stream by a symbol mapper and
serial to parallel converter (S/P).
The L-point IFFT then creates a time domain L vector x that is cyclic extended to have
length L(1+G) where G is fractional overhead.
The longer vector is then parallel to serial (P/S) converted into a wide digital signal that
can be amplitude modulated with a single radio at a carrier frequency of .
The raw data rate of LTE system is .
6. With a neat block diagram, explain OFDM communication system. Also mention the
need of Timing and Frequency Synchronization.
Sol:
The timing offset of the symbol and the optimal timing instants needs to be determined
which is referred to as Timing Synchronization.
The receiver must align its carrier frequency as closely as possible with the transmitted
carrier frequency which is referred to as Frequency Synchronization.
The primary and secondary sync signals occupy the 31 tones on either side of the DC sub
carrier in the 5th and 6th OFDM symbols respectively, of the 0th and 10th slots in every
radio frame.
The 5 adjacent tones on top and bottom of sync signals are not used so 62 tones are used
or a total of 62*15kHz = 930kHz ≈ 1MHz bandwidth.
Timing Synchronization offset is 0.1/ Bs = 0.1μsec which is less than cyclic prefix length
of 0.5μsec.
7. With the help of neat diagrams, explain how the timing and frequency
synchronization is performed by the receiver to demodulate an OFDM signal.
Sol:
a) Timing Synchronization
Since the time window is T=1μs and a rectangular window is used, the frequency
response of each sub carrier becomes a sinc function with zero crossings every 1/T =
1MHz.
This can be confirmed by using Fourier Transform
where .
If the timing window is slid to left or right, a unique phase change will be introduced to
each of the sub carriers.
In the frequency domain, if the carrier frequency synchronization is perfect, the receiver
samples at the peak of each sub carrier where the desired sub carrier amplitude is
maximized and ICI is zero.
In the case, the perfect timing synchronization is not maintained, it is still possible to
tolerate a timing offset of τ sec without any degradation in performance as long as
.
As long as , the timing offset simply results in a phase shift per sub
carrier of which is fixed for all sub carriers.
The acceptable range of τ is referred to as timing synchronization margin.
The SNR loss is approximated as .
The SNR decreases quadratically within the timing offset.
Longer OFDM symbols are increasing immune from timing offset.
Since , timing synchronization errors are not that critical as long as induced
phase change is corrected.
b) Frequency Synchronization
As long as the frequency offset , there is no interference between the sub carriers.
Frequency offset ≈ .
The matched filter receiver corresponding to sub carrier l can be simply expressed for the
case of rectangular windows as where .
Since LTs is the duration of the data portion of the OFDM symbol, .
The ICI between sub carriers l and l+m using a matched filter is simply the inner product
between them given as
and .
The total average ICI energy per symbol on sub carrier l is given as
is constant that depends on various assumptions and is the average symbol energy.
The SNR loss induced by frequency offset is given by
When a high peak signal is transmitted through a nonlinear device such as a High Power
Amplifier (HPA) or Digital to Analog Converter (DAC), it generates out of band energy
(spectral regrowth) and in band distortion (constellation tilting and scattering) which
cause degradation and affect the system performance.
The nonlinear behavior of HPA can be characterized by AM/AM and AM/PM responses.
To avoid undesirable nonlinear effects, a waveform with high peak power must be
transmitted in the linear region of HPA by decreasing the average power of input signal
which is called Input Back Off (IBO) and results in a proportional Output Back Off
(OBO).
High Back Off reduces the power efficiency of HPA and limits the battery life for mobile
applications.
The input back off is defined as
9. Compare OFDM transmitter and receiver with SC-FDE transmitter and receiver
with block diagram.
Sol:
Similar to OFDM, SC-FDE maintains 3 benefits:
a) Low complexity even for severe multipath channels.
b) Excellent BER performance.
c) Decoupling of ISI from other types of interference.
The only difference between OFDM and SC-FDE system is that the IFFT is moved to the
end of the receive chain rather than operating at the transmitter, to create a multi carrier
waveform.
The transmitted signal is simply a sequence of QAM symbols which have low PAR on
the order of 4-5dB depending on constellation size.
Because of the application of cyclic prefix, the received signal appears to be circularly
convolved i.e. .
Therefore, .
SC-FDE has a lower complexity transmitter and higher complexity receiver compared to
OFDM.
While OFDM has high PAR and more subjected to clipping and cause spectral dispersion,
SC-FDE has low PAR and nominally more dispersive spectrum compared to OFDM.
In a cellular system like LTE, uplink utilizes SC-FDE whereas downlink utilizes OFDM.
Module - 5
1. Write the block diagram of OFDMA downlink transmitter and explain the principle
of operation.
Sol:
K users share the L sub carriers with each user being allocated Mk sub carriers.
∑kMk =L and each sub carrier has only one user assigned to it.
At each receiver, the user cares only about its Mk sub carriers, but still has to apply an L-
point FFT to the received digital waveform in order to extract the desired subset of sub
carriers.
An OFDMA downlink receiver must demodulate the entire waveform which wastes
power but digital separation of users is simple.
Categorized as
a) Downlink Transport Channels
b) Uplink Transport Channels
a) Downlink Transport Channels
i) Downlink Shared Channel (DL-SCH)
Used for transmitting the downlink data, including both control and traffic data,
and thus it is associated with both logical control and logical traffic channels.
Supports H-ARQ, dynamic link adaption, dynamic and semi-persistent resource
allocation, UE discontinuous reception, and multicast/broadcast transmission.
The concept of shared channel transmission originates from HSDPA, which uses
the High-Speed Downlink Shared Channel (HS-DSCH) to multiplex traffic and
control information among different UEs. By sharing the radio resource among
different UEs the DL-SCH is able to maximize the throughput by allocating the
resources to the optimum UEs.
ii) Broadcast Channel (BCH)
A downlink channel associated with the BCCH logical channel and is used to
broadcast system information over the entire coverage area of the cell. It has a fixed
transport format defined by the specifications.
iii) Multicast Channel (MCH)
Associated with MCCH and MTCH logical channels for the multicast/broadcast
service.
Supports Multicast/Broadcast Single Frequency Network (MBSFN) transmission,
which transmits the same information on the same radio resource from multiple
synchronized base stations to multiple UEs.
iv) Paging Channel (PCH)
Associated with the PCCH logical channel.
It is mapped to dynamically allocated physical resources, and is required for
broadcast over the entire cell coverage area.
It is transmitted on the Physical Downlink Shared Channel (PDSCH), and supports
UE discontinuous reception.
The Radio Interface Protocol Architecture and the SAP between different layers
LTE is based entirely on shared and broadcast channels and contains no dedicated
channels carrying data to specific UEs. This improves the efficiency of the radio interface
and can support dynamic resource allocation between different UEs depending on their
traffic/QoS requirements and their respective channel conditions.
1. Logical Channels
Tell What to Transmit
Logical channels are used by the MAC to provide services to the RLC.
Each logical channel is defined based on the type of information it carries.
In LTE, there are two categories of logical channels depending on the service they
provide:
a) Logical Control Channels
b) Logical Traffic Channels
The Logical Control Channels are used to transfer control plane (system
configuration and management) information.
i) Broadcast Control Channel (BCCH)
ii) Multicast Control Channel (MCCH)
iii) Paging Control Channel (PCCH)
iv) Common Control Channel (CCCH)
v) Dedicated Control Channel (DCCH)
The Logical Traffic Channels are used to transfer user plane information.
i) Dedicated Traffic Channel (DTCH)
ii) Multicast Traffic Channel (MTCH)
2. Transport Channels
Tells How to Transmit.
The transport channels are used by the PHY to offer services to the MAC.
A transport channel is basically characterized by how and with what characteristics
data is transferred over the radio interface, that is, the channel coding scheme, the
modulation scheme, and antenna mapping.
Categorized as
a) Downlink Transport Channels
b) Uplink Transport Channels
3. Physical Channels
It is Actual Transmission.
Each physical channel corresponds to a set of resource elements in the time-frequency
grid that carry information from higher layers. The basic entities that make a physical
channel are resource elements and resource blocks.
Categorized as
a) Downlink Physical Channels
b) Uplink Physical Channels
Downlink Physical Channels are classified as
i) Physical Downlink Control Channel (PDCCH)
ii) Physical Downlink Shared Channel (PDSCH)
iii) Physical Broadcast Channel (PBCH)
iv) Physical Multicast Channel (PMCH)
v) Physical Hybrid-ARQ Indicator Channel (PHICH)
vi) Physical Control Format Indicator Channel (PCFICH)
Uplink Physical Channels are classified as
i) Physical Uplink Control Channel (PUCCH)
ii) Physical Uplink Shared Channel (PUSCH)
iii) Physical Random Access Channel (PRACH)
9. Write the Frame Structure Type 2 and explain the various fields applicable to TDD
mode.
Sol:
It is applicable to the TDD mode.
Each radio frame of frame structure type 2 is of length Tf = 30720 · Ts = 10 ms,
which consists of two half-frames of length 5 ms each.
Each half-frame is divided into five subframes with 1 ms duration.
There are special subframes, which consist of three fields: Downlink Pilot TimeSlot
(DwPTS), Guard Period (GP), and Uplink Pilot TimeSlot (UpPTS).
These fields are already defined in TD-SCDMA and are maintained in the LTE TDD
mode to provide sufficiently large guard periods for the equipment to switch between
transmission and reception.
10. Write the structure of Downlink Resource Grid and explain the types of resource
allocation.
Sol:
The physical resource in the Downlink in each slot is described by a time-frequency grid,
called a Resource Grid.
Example of resource allocation type 0 and type 1, where RBG size P=4
In type 2 resource allocations that are defined for the DCI format 1A, 1B, 1C, and 1D,
PRBs are not directly allocated. Instead, VRBs are allocated, which are then mapped onto
PRBs. A VRB is of the same size as a PRB.
There are two types of VRBs:
a) VRBs of the localized type b) VRBs of the distributed type.
For each type of VRB, a pair of VRBs over two slots in a subframe are assigned together
with a single VRB number, nVRB. VRBs of the localized type are mapped directly to
Physical Resource Blocks such that the VRB number nVRB corresponds to the PRB
number nPRB = nVRB.
For resource allocations of type 2, the resource assignment information indicates a set of
contiguously allocated localized VRBs or distributed VRBs. A one-bit flag indicates
whether localized VRBs or distributed VRBs are assigned.