Mastering
TD-LTE
Air Interface
'$SieénsAvi a eas
2100 Lakeside Blvd, Suite 300
Richardson, Tk 75082
Phone: +1.972.664.0727
Fax +1972.664.0729
Iyou have any questions, concerns or comments regarding this course please write to us at
{
[email protected]
© 2012 Award Solutions, Inc.
All rights reserved, This course book and the material and information contained init (‘course material) are
‘owned oy Award Solutions, Inc. "Award". The course material shall not be modified, reproduced,
disseminated, or transmitted by or in any medium, form, or means, electronic or mechanical, including
photocopying. recording, or any information retrieval system, in whole or in par, without the prior express
‘written consent of Award. The unauthorized use, modification, reproduction, dissemination or transmission of
‘the course material, in whole or in pat is strictly prohibited
This course book is designed to be distributed as a student guide with the courses taught by Award’s
authorized employees and contractors. It is not designed to be a standalone text book. Award makes no
representations of warranties and disclaims all implied warranties with respect to the information contained
herein of products derived from use of such information and undertakes no obligation to update or otherwise
‘modify the information orto notify the purchaser or user of any update or obsolescence. Awards total liability,
in connection with the course material is the amount actually feceived by Award from the purchaser/user for
the purchase of the course material.
BL Ite @ laee Gevenaricn
‘The GPP and LTE logos are the property of Third Generation Partnership Project (SGPP). The 3GPP2 logo Is
property of Third Generation Partnership Project (2GPP2) and its organization partners. The content ofthis
‘document is based on 3GPR/LTE and 3GPP2 specifications which are available at www.3g0p.0rg, and
www. 3002.0.Award Solutions, Inc. provides exceptional taining and
consulting in advanced wireless and Internet technologies.
Our proven experience enables us to offer a complete suite
of services: Cutting edge technology training, customized
‘raining solutions, and advanced technology consulting,
‘Our products and services provide our clients with
innovative, flexible, and costeffective solutions that help
rapidly boost workforce productivity and competence to
‘more quickly meet markat demands, Our areas of expertise
include’
+ Technology for Business + WiMAX
+ Emerging Trends + te &ANEV-DO
+ ue + GSM & GPRS/EDGE
+ IP Convergence &IMS + Wireless Fundamentals
+ UMTS/HSPA/HSPA+
‘The level of technical depth in our training courses gives
students unique benefits that they can apply immediately.
‘We offer a range of courses appropriate for audiences
heeding a high-level overview, as well as engineers looking,
Tor technical detals
Knowledge Services
Asa knowledge-based company, Avard Solutions is.
recognized for Being the expert, and equipping each cllent
to "become an expert." Our instructors and consultants
are bestin-class, having achieved substantial industry
‘experience in areas such as product definition and
development, network deployment, and network and
systems ongineering.
Award Solutions constantly keeps a finger on the pulse
ofthe industry, always researching new technologies,
fend updating our curriculums to stay on the cutting edge
with changes to existing courses and the addition of new
‘Whether you are a training manager looking to train others,
‘ora team lead responsibie for enhancing your team's skis,
‘Award Solutions can meet your technology training needs.
Not only do our Subject Matter Experts (SMEs) understand
‘the technology, they know how to teach, emphasize the
Overview of Services
ey points, repeat what's important, and bring in analogies
and examples as needed. They are focused on knowledge
transfer and don’t teach just “by the book,” instead
‘adapting tothe students’ needs. They bring invaluable
knowledge into the classroom because they can relate the
‘theory to real-world experiences.
‘We offer a multitude of delivery methods and services:
On-site Instructor Led Training: Full classroom
experience and interactivity that comes with i
person training,
=) Web-based Instructor Led Training:
‘Acconvenient alternative to on-site taining,
without losing the benefits of a live instructor,
» __ Mentoring Programs and Performance
‘Workshops: A mi of classroom training and
hands-on applications of the concepts.
Public Courses: Instructor Led taining for
individuals or small groups of professionals. Visit
‘our website forthe full schedule of upcoming
sessions.
Self-Paced eLearning: A tiexible, cost-effective
solution, allowing your tear to take training
‘online at their own pace when their schedule
permits
Custom Learning Solutions (CLS): Trsining
programs created and tallored to your specific
needs.
Consulting Services: Maximize your investment,
‘augment your team ar receive guidance from
Award Solutions’ experts,
Ifyou are interested in or have any questions regarding,
Award Solutions wraining or services, please visit Award's
website at www.awardsolutions.com or contact us at +1-
972-664-0727 ext, 306 or toll fre at +1-877-472-9273 ext
306,
‘Sélinibms © 2012 Aer Solutons hc, worwawan
TLATAWHROInstructor Led Training
Technology for Business UMTS (WCDMA)/HSPA/HSPA+
{ioud Computing for Google Apps. Adoy Exploring UMTS (COMA) 2 days
The M2M Eoosyten, tay aploring HSPAF (87, RB & RO) 2 days
Unified Communications and IMS 1 ay Mastering UMTS Core Networks (399 0 R7) 3 days
IP Convergence for Sales ana Marketing sens 08Y Mastering UMTS Raho Prtocels ang Signal in da)
LIE Services for Enterprise Customers (EVDO), Loay Mastering HSPA Protocols and Signaling, 3 days
LTE Services for Enterprise Customers (UMTS). Loay HPAt Protocals and Signaling. 2 doys
— -Mult-Carior HSPA+ (RB & RO), ‘day
TT IMS in UMTS (RB) Networks. 3 days
Emerging Trends SGP Packet Core Networks (#99 10 R) 2 days
(OFDM and MIMO Fundamentals, sone 8 GPP Packet Switched Core Networks and Backed. days
$$ LUMIS/HSPRVHSPAE A nte19¢2 3 days
FF UMTS Transport Network Planing. 4 days
ue LUMTS/HISPA (WCDMA) RF Design Mentorngvnnnnn® GY
“The Road t LTE... semanas LOY UMTS (WCOMA) RF Optimization Mentoring, 10 aays
LTE Essemias day LUMTS/HSPA# RF Optimization Workshop. 4 cays
Mastering LTE. 2 days
Exploring IPG for LTE Networks. 2 days
Voice and IMS in LTEEPC NetWothS nnn JOYS wimax
Exploring TOLTE. 2 days Exploring WMA enn 2 days
Mastering LIE Ar interface 2 days
+ Mastering TOLTE Ar ntrface.
LE Protocols and Signaling. 3.days 41x & 1xEV-DO
LTE and 45/xEV-00 (eHRPD} Interworkng 2 days ‘Lxand 4x6V-00 Fundamentals rv CYS
UTE and GSM/UMTS Intermorking, 2 cays
LTE-EPC Networks and Signaling 3 days
+ LTE Advanced (R10) Technical Overview 2 days GSM and GPRS/EDGE
LTE AF Planning and Design Certfcation Workshop .5 days {GSM Performance Workshop, 3 days
# TOLTE RF Planning and Design Certffeation Workshop 5 days GPRS and EDGE Performance Werkshon, 3 days
LTE-EPC Planning and Design Certication Workshop . Gays
Wireless Fundamentals
IP Convergence & IMS Wireless and 36 Basics, aay
IP Convergence Essentials Lowy xaloring G5M/EGPRS/UMTS/HSPA/HSPAY 5 days
Emernet BocknaulEssemtais = Loay Soc ota Tae
IP Convergence for Sales and Marketing ‘Says s
TL con Pe xplcing Wireless Landscape and IP Convergence. 2a
ues wees 7 oda Joting Wireless Technologles and NetWOrkS.exn.-8 0OYS
Exploring IMS (RS) Same Fundamentals of RF Engineering 2 days
Exploring SIP VoIP and IP Convergence, 4 cays
Exploring Ethormet Backnau 2 days
Voice and video over IP Protocols and Technologies..2 days
> Exploring iP Routing anc Ethernet Briceing. days = new cours)
Ethemet Backnau! Planning. 3 days
‘iP Signaling, 2 days
4 IPV6 Networking Workshop for LTE Networks 3 days
IP Networking Workshop for 2xEV-00/LTE. 4 cays
IP Networking Workshop for HSPA/LTE 4 cays
IP Netwotking Workshop for 46 Backns 4 aay
Betdudns ©2012 sward Souter, ne. wwnanwardeelutenscom +L87747AWAROEmerging Trends
‘Overview of OFDM (). 2 hours
Muttole Antenna Techniques (€) xenon 3 NOUS
ue,
Welcome to LTE 2) vw NOME
LTE Overviw ‘Shours
LTE SAE Evolved Packet Core (EPC) Overview (2) ....3 hours
LTE Air ntrface $gnaling Overview (2). hours
{% Overview of Pv6 for LTE Networks. ‘3 hours
ced eLearning
UMTS (WCDMA)/HSPA/HSPA+
Welcome to UMTS f) sn 1.5 HOU
‘Overview of UMTS (2), 2 nours
LUMTS/WCDMA Ar interface Fundamentals (9) ann 3 ROU'S
UMTS Sigraing) ‘hours
UMTS Mobily 6). hours
HSDPA (RB) ‘Shows
HSUPA (RE) (2) san 25 NOUS
HSPAt Overview (R7) (0) hours
+ VOLTE Overview Shours 4x & 4xEV-DO
{DEV-00 Networks (Re¥ 0} (2-0 Shows
{DEV.DO Networks (Rev A) ) hours
‘wimax
Overview of WIMAX () sven NOUS =
ss GSM and GPRS/EDGE
‘Welcome to GSM/GPRS) 18 hous
IP Convergence & IMS
Welcome to P Networking). ‘ hours Wireless Fundamentals
1P Convergence Overview “4 rows iarORneTel a
‘Overview of MPLS fe) 35 nous Welcome to Wireless Networks () nour
Overview oF MS fo) 25hours (Overview of 36 Wireless Networks). 15 pours
Voice an¢ Video over IP (Val) Overview ), ‘Shows
IP Quality of Service (908) ). ‘Shours
‘Session Intltion rotoc! (SP) (e). 2houts
Etharnet Backraul Overview (2) Shouts
HIP 893165 (2s - ‘hour
+ IP Routing ) ‘tour
% QoS in IP Notworks (6). nc ROUT
+ To? and Transport Layer Protocals (0). “1 nour
+ Ethernet Basics) ‘hour
+ Ethernet VIANS () nour
1 Etnemet BAB On - ‘hour
+ interconnecting IP Networks (). ‘hour
+ Welcome to v6 () ‘hour
(e) eLeaming Course
Riles: ©2022 fart Solutions Ino, wwwawerdsoutions.com 4,877.47 AVARDa
aTable of Contents
Chapter 4.
Introduction...
Motivation for TD-LTE
Network Architectures and Interfaces.
Air Interface.
LTE Protocols and Interfaces...
LTE Devices.
Life of an LTE Mobile..
Chapter 2
‘TD-LTE Technology
OFDMA and SC-FDMA.
LTE Frame Structure ..
Multiple Antennas..
A Closer Look at PHY Layer Processing,
Chapter 3
‘System Acquisition
Overview of System Acquisition...
Processing of Synchronization Signals and PBCH.
Acquiring SIBs.
Version 1.061Table of Contents
Chapter 4
‘System Access Operation
Random Access Process Overview.
Random Access Parameters.
RRC Connection Establishment.
Chapter 5
‘TD-LTE Call Setup.
Security.
Default EPS Bearer Setup.
Chapter 6
Downlink Operations.
Channel Quality.
Scheduler .
Downlink Transmission ..
Hybrid ARQ...
Additional Material,
Chapter 7
Uplink Operations..
Overview of UL Transmission 193
Request for UL Resources. " 198
UL Grant Allocation . 202
BSR Reporting.. 206Table of Contents
UL Grant for Data Transmission .209
‘Transmission on the PUSCH .. 244
ULHARQ 218
Additional Material... 225
Chapter 8
Mobility and Power Control
Mobility...
Cell Selection and Reselection
Tracking Area Update.
Handover nu 1.248
Power Control 1258
Additional Material.
‘Appendix A
OFDM Essentials
Appendix 8
Advanced Antenna Techniques
ABrief Overview of Advanced Antenna Techniques for LTE
DL Trat
Operations Using Multiple Antennas...
Step 4: Quantifying DL Channel Conditions.
Step 2: Scheduling and Resource Allocation..
Step 3: Resource Allocation and Data Transmission...
Step 4: HARQ..Table of Contents
Uplink Transmission
Acronyms
References.1 Introduction
Chapter 1:
Introduction1 | Introduction
Objectives
After completing this module, you will be able to:
Describe the motivation for TD-LTE / TDD LTE
Discuss the goals and requirements of LTE
Sketch the LTE access and core network
architectures and interfaces
Compare FDD LTE and TDD LTE/TD-LTE
Mention key functions of the layers of the LTE air
interface protocol stack
Explain the steps of a typical LTE call
References:
[1) 3GPP TS 36.300 - EUTRA and EUTRAN Overall
Description (Stage 2)
(2) 3GPP TS 36.211 through 36.214: Physical Layer
Folated docurnonts1| Introduction
Motivation for TD-LTE1 | Introduction
‘EATRA
+ Downlink: 300 Mbps
> Uplink: 75 Mbps
+ OF OM are MIMO
Dm
LTE: Long Term Evolution
ra
Spree
The 3G Partnership Project (9GPP) Is responsible for
defining the Long Term Evolution program for 3GeP
networks, called LTE. 3GP focuses on twee key areas:
+ Evolved Universal Terestrial Radio Access (G-UTRA):
This air interface is based on an OFDM physical layer
and ublizes MIMO techniques to increase the data
rates. It supports more tran 300 Mbps in the
downlink to the Usor Equipment (UE) and more than
50 Mbps in the uplink, using @ scalable channel
bbanciwicth of up to 20 MHz
+ Evolved Univercal Terrostial Radlo Access Network
(EUTRAN}: Unlike the Node 8 and Racio Network
Controller (RNG) ofthe UTRAN, the E-UTRAN has only
fone node: the evolved Node B, oF eNB. The eNB is
responsibie for tne physical layer operations of OFOM
‘and MIMO, and is also responsible for echeduling of
downlink and uplink resources, handovers, ane Racio
Resource Management (RRM,
Evolved Packet Core (EPC): 3GPP ROO through RE
used circuit (Moblo Switching Center, MSC) and
packet (Serving GPRS Support Node, SGSN, and
Gateway GPRS Support Node, GGSN) core network
smponents. In LTE, the network is moving to
simplified Peased networks, replacing the current
network comgonents with Mobily Management
Enutles and Serving Gateways (MMES/S.GWS) and
Packet Data Network Gateways (P-GWS)| Introduction
Definition of TD-LTE
TODATE/ TATE
+ Both UL & OL share a
common frequency f,
+ Simple UE Transceiver
FODATE
+ UL& DL requires a par of
frequency carers tf,
[Haiee00 LTE
+ UL& DL requires a palr of
frequency carriors tf,
+ ther ULor DL at ven time
LTE access technologies support Time Division Duplex
(TOD), Frequency Division Duplex (FDD}, and Halt-#DO (H
DD) modes. In FOD mode, a pair of spectrum chunks are
provided for inthe uplink and downlink. At @ given instant,
lwansmission occurs in one spectrum chunk, and
reception occurs in another spectrum chunk. in TO-LTE
‘algo known a6 TOD mode, the availabe frame duration is
vided into different parts in the time domain for the
Uplink and downlink, The number of uplink and downlink
subframes are (statically, in practice) configurable in TDD
‘mode. H-FDD is @ special case of FOD where an HED
device uses different frequencies to transmit and receive
while communicating with an FDD oNB. However, it
‘ransmits and receives at afferent times.
OFDMAtased multiple access technology is used for
downlink transmission for al the FDD, TDD and H-#DD
mades. The SCFOMA multiple access technology is used
for uplink tranemission in ali the FOD, TOD and H-FOD
modes.1| Introduction
Potentially attractive
fe slaue
ree
Motivation for TD-LTE
rome
oar e ys
The motivations for TDATE are:
TDD Spectrum: TDD LTE (or TO-LTE) can be depo
using an unpaled bane where both uplink and
downlink communication will share 9 common
‘requency spectrum. Like in the case of LTE FDD, TD-
LTE supporis scalable bandwidths from 1.4 MHz to
20 MHz depending on the frequency band. The
availablity of huge chunks of unpaired spectrum for
broadband allows TD-LTE to explolt the avatabie
resources ata lower cost when compared with that of
the FDD spectrum.
Comprehensive Ecosystem: The overall network
architecture remeine the came, while very few
changes are required in tne protocol stack as
smpared to FOD systoms. Both FOD and TDD
systems are harmonized using the same OFDMA and
SCFDMA access solutions and the protecol stack,
‘except for the minor changes due to the switching
between the UL and DL.
Potent for Lower Cost eNB and UE: For TDD
systems, the devices do nat require duplexer systems
tallow simutanoous transmission and recoption like
FOD systems. This enables simpler and economical
NBs and UES.
Efficiency of LTE: TO-LTE uses the same bandwiath
‘and access methods as the FOD systems. This allows
TTDALTE to provide high spectral efficiency like FOD,
but the maximum date rates achievable willbe less
compared to FOD due to the sharing of radio
resources betwaen the ULand DL.
Potentially Attractive for Asymmetric Services: Since
roadoanc communications re datecenvic and
‘essentially asymmetric in nature, TDATE can exalt
offiient scheduling schemes to support data
Evolution Path for Legacy TDD Systems: TOLTE
supports an evolution path for both High Chip Rate
(HOR) UMTS TOD and Low Chip Rate (LCR) UMTS TOD
systems (or TO-SCDMA).1| Introduction
‘The Evolved UTRAN (EUTRAN) Is designed to moot a
umber of vary challenging performance goals, in order to
meet the evolving expectations of the subscribers and the
operators.
+ Scalabiiy: The system must be deployable In
markets with dfferent available bandwictns, ranging
from 1.4 Mie 020 Miz
+ Latency: Latency in the Control Plane (Plane) for
Idlemode to activemade transitions must be less
than 100 ms, while the User Plane (U-ans) dolay
must be less than § ms (Ex: one-way eNB to UE
olay)
+ Data Rates: Peak data rates must be at least 300
‘Mos on the downlink ana 50 Mbps on the uplink. On
‘average, user data rates should be three to four times
what HSDPA offers, and two to three times what
HSUPA can provide.
+ InterRAT Handover Delays: Handover of realtime
services must take less than 300 ms, while non-real
time applications must take less than 500 ms,
‘cel Coverage: Performance targets must be mat out
10.8 cell rads of 5 km. Beyond that, no more than a
light degradations slowed out to 30 km.
Mobility: The system must be optimized for relatively
low speeds (< 15 km/h), but should be able to
maintain active connections up to 500 km/h.
asicaly, advanced antenna techniques and tink
‘adaptation techniques work well at iower speeds.1| Introduction
Die
‘TDD vs. FOD
‘Simpler
UE and eNodeB:
Designs due to
Potential for reduced UE
k due to
reciprocity
annel
Foie en)
Ree Mec)
aa bis
tet rey
(Cenc)
LTE FDD
TD-LTE vs. LTE FDD
TDD slightly
3s efficient due
Roaecmeruieet)
‘The main differences between TDLTE ang LTE FOD are
hignlignted here, A simple, yet also the most significant
difference, of course is the duplexing approach that these
systems utlize. In general, FOD spectrum is symmetric by
nature due to the way regulations are created. In
words, the government agencies usuelly have sym
bandwiatn for uplink and downlink for FDD such 95 10
MHz in the DL and 10 Miz in the UL From the
perspectwe of the standard, though, LTE does support
asymmetsic bandwidth in the UL and OL. TO.LTE ean he
configured to favor ene link ovar the other. Due to the
existence of an ackitional guard time in TO-LTE, TDATE is
slighty less efficient than LTE FOD. Since TO-TE uses the
same frequency bandwith forthe DL and the UL, the eNB.
can potentially observe the UL chennei concitions to infer
the DL channel conditions due to channel reciprociy
Hence, In theory, frequency and the amount of UE
feedback about the DL channel conditions could be lower
In TO-LTE. Sinco only transmission ar reception is done at
2 given instant, the designs of the UE and the eNB are
‘much simpler
her1] Introduction
Network Architectures
and Interfaces1. Introduction
Bay
Sioa
aes
ad
econ
en
eet
Sineesnstant
ein
Sikes elseicsollar
GK)
GaN eres 2
iia
Ke
eNB and E-UTRAN
The primary difference between the UTRAN end E-UTRAN,
architectures isthe abeence of a Reio Network Contrllor
(RNC), The functionality of the RNC has now been moved
into the eNBs.
'An eNB's responsible forthe following functions:
‘+ Radio Resource Management (RRM) functionalities
like radio bearer control and radio admission conta
‘+ IP noador compression and encryption of the user
cata seam,
+ Uplink/dowalinkredio resource location,
‘+ Transfer of paging messages over the ar,
+ Transfer of Broadcast Control Channel (BCCH)
information over tha air,
+ Selection of tne Mobility Managemer
during cal,
Entity (MME)
+ Mobilty control in the active state,
The eNBs are connected to the MME and Serving
Gateways (MME/S-GW) via the $1 interface. An ENB is
‘able to communicate with mutiple gateways, in order to
10
enable lead sharing and
Interconnected by the x2
hhendovere and cata transfer,
redundancy, oNBs re
Interface,
to coordinate1] Introduction
GERAN
ETA)
Evolved Packet Core (EPC)
Optional based on
‘operator configuration
Now entities in the Evolved Packet Core (EPC) include the
Mobility Management Entity (MME), the Serving Gateway
(SW), and the Packet Daca Notwork (PON) Gateway (P
ow.
+ MME: The MME: Is responsible for menaging and
storing UE contexts, generating temporary identiirs
to the UES, idle-state mobiity control, citributing
paging messages to eNBs, secutty control, end
Evalved Packet System (EPS) bearer control
+ Gateways: There are two geteways in LTE, one facing
toward the EUTRAN (the S-GW) and one facing
toward the extornal packet data network (the P-GW)
|A.UE has only one SGW but it may have multiple P
ews,
+ Sonving Gateway: The SGW Is responsibie for
‘anchoring the user plane for inter-eNB handover and
inter-3GPP mobily, similar to a GOSN in @ pre-LTE
retwark.
+ PON Gateway: This gateway is responsible for
ring the user lane for moblty between 3GRP
access systems and nonSGPP access systems,
Similar in nature to a Home Agent in Mobile IP, the P.
GW allocates che user's IP address, and forwards
packets intended for the user to the appropriate &
GW. It also provides suppor for charging, lawful
interception and policy enforcement.
a1 | Introduction
Functional Split
/ ~
a |
| aera
| | ‘Evolved Packet Gore 7
| = concton on
Ln wie
{(_ Snort NAS Security|
Leona” _|
| [Pitessurement Testa |
1 Lcontiraton nesity__||
| Resoaree aL ml
1 Latccaton contol |
I If” Senving Gateway) {PON Gateway
i | porpraaes
i i 1 Lecatction
i oy
| | ee | [eset rene
i } if
In the E-UTRAN architecture, each NE ie now responsible
for al of the functions that used to be divided between the
[Node 8¢ and the RIC. These include:
+ Implementation of all of the Layer 4 and Layer 2
sublayers (Physical Layer, Medium Access Control,
Radio Link Conttol and Packet Data Convergence
Protocol as woll as Racto Resource Control,
+ Admission contol,
‘+ Allocation and management ofall radio resources,
‘+ Control and processing of RF measurements,
+ Control of mability while in the connected state,
inthe EPC, the MME is responsioe for high-evel security
functions (Such as authentication) and manages mobiliy
while in the idle state. i also determines the
characteristics of the EPS bearer based on the requested
service and QoS requirements
The S:GW acts as an anchor point for the EPS bearer
allowing traffic to low seamlessly between the UE and the
network during nter.cell handovers,
2
Te P-GW Is similar to @ Mobile IP Home Agent (HA)
allocating IP adaresses for the UES and performing any
necessary packet filtering for any necessary firewall and
packet routing functions.1| Introduction
Air Interface
131 | Introduction
LTE-Uu User Plane
Header compression, ciphering
Same for bath TOD
* Minor changes between
TOD and FOD_
Duplicate and outoForder detection, segmentation and
concatenation, missing packet retransmission
serambiing, KARQ
MAC | Packt format selection, scheduling, Mullen
adding
PRY | OFDIA/SCFOMA, Coding, modulation intereaving,
cre
The LIEU air interface ie divided into a user plane (for
user traffic and a control plane (for signaling. The user
plane supports the exchange of packets over the radio
bearer between the UE and the serving eNB and is divided
Into the folowing layers and sublayers,
Layer 1 (the PHY or Phyeleal Layer) i responcible for the
actual racio transmission and includes coding for forward
rection, modulation, bit interleaving, serambiing
and other funetions needed to minimize erro
radio link. The PHY Layer also manages the operation of
Hybrid ARQ (HARQ), which provides a fast error-correction
mechanism through incremental redundancy. There are
major changes in functioning of the physical layers lke
the frame structure, Duplexing, mapping of channe's, and
resourge allocations for UL and OL.
over the
Layer 2s divided into the following sublayers:
+ The Medium Access Control (MAC) sublayer handles
the scheduling of uplink and downlink resources and
determines the transport format to be used. I also
takes care of multiplexing packets into a single
tvansmission and inserts padcing bits as required.
14
MAC layer has some minor mocifcation Ike HARQ
bundling and Rancom access to suite the TDD mode
of operations.
Radio Link Control (RLC) performs segmentation and
concatenation to optimize the use of the available
resources, and tracks which packets were sont and
received. Oupicate packets are clscarded, outot
1, and missing
sequence packets ate reorder
packets are retransmitted
Packet Data Convergence Protocol (PDCP)
implements Robust Header Compression (ROHC) and
ny required ciphering (encryption) functions. Both
LC and PDCP sublayer Functions for both TOD ane
FOD LTE are some,
1 user plane terminates atthe eNB,1| Introduction
LTE-Uu Control Plane
oi [omen
NAS [Non-Access Stratum signaling,
RRC | System information broadcast, paging, RAC connection
‘and radio bearer management, handover, UE
‘measurement contro!
Tho LTE-Uu contol plane cartes the signaling necessary
to set up and manage the racio bearer. In addition to the
sublayers described for the user plane, the control plane.
also includes Radio Resource Control (RRC), which
handles:
‘+ Broadcasting of system information blocks (SIBs) and
other evernaad information,
+ Paging of ile UES,
+ Setting up anc managing signaling radio bearers,
+ Setting up and managing atic radio besrers,
+ UE measurement contol and report processing, and
+ Handover contol and coordination.
In action, the control plane also carries Non-Access
Stratum (NAS) signaling destined for the core network,
‘The RAC terminates at the eN2, while NAS signaling Is
carried transparently across the oNB to the MME.
151 | Introduction
LTE Protocols and
Interfaces1] Introduction
© One logieal S1AP
connection per UE
+ Multiple UES supported
via a single SOTP
cru
uoP
®.
[Data Link Laye|
ers
$1 Interface
One or more GTP
tunnels per user
+ DSCP marking is
supported for oS
The St interface connects the E-UTRAN to the EPC. The
‘81 is spit into 2 contol plane (Cpiane), called the $1:
IMME, and a user plan (U-plane), calles the $1.U. The S1-
MME carries signaling messeges between the eNB and
the MME, while the S3-U carries user traffie between the
NB and the SW,
The SLMME carries $1 Application Protocol (S4AP)
messages, using Stream Control Trensmission Protocol
(SCTP) over IP to provide guaranteed data delivery; each
SSCTP association between an eN and a MME can
support multiie UES, The S1:MME is cesponsible for EPS
bearer setup and rotease procedures, handover signaling,
aging, and NAS signaling anspor.
‘The SLU consiste of @ GPRS Tunneling Protocol - User
Plane (GTP) tunnel running on the User Datagram
Protocol (UDP), which provides nor-gusranteed
dolvery, One GTP tunnel is established for each radio
bearer in order to cary user trafic between the eNB and
the selected SW.
data
‘The S1U also implements Differentiated Services Code
Point (OSCP) marking of packets. The 6-bi DSCP value
‘ascigned to each IP packet identifies a pre-determined
level of service and @ corresponding packet priority, which
is used to implement the aporopriate QoS behavior for the
Fu1] Introduction
X2 Interface
ow
+ Multicel radio resource
‘management
+ Handover
* Load management
+ User packet tunneling
@
@-
ene
UDe
®
Bata unk tye
Uplane So
sen
SCTP
Data Link Layer
‘The X2interface allows eNlBs to communicate drecty with
‘ach other and coordinate their activities. Like St, the X2
is splitinto separate C-lane and Uplane functionality.
‘The X2 Cplane cartios X2 Application Protocol (K2AP)
‘messages between eNVBs, and also uses SCTP for reliable
delivery. X2AP is used to manage intraLTE (inter-eNB)
rmoblity and handovers, UE context transfers, intereel
inerference management, and_ various. ertorhandling
functions. The X2 Utane is very similar to S2-U, and uses
GTPAUto tunnel user traffic between eNBS.
184 | Introduction
LTE Devices1| Introduction
LTE Device Capabilities
aloe Dota tes
Cte ee veligt
he a fo fu foe
1 ma 5 [10
2 (2210002020 | gngy aia
14, {ea)2010-2008 | SPS,
3_|'a,| 22+) | (asy eso: too | 49M) 04. | St | 100
“aa (264030. 1900 soe reas
2 (sn s910- 1930, sso
, {58)2570: 2620 | oon
2 (20) 1820. 1920 | 2S i
5 ute 1920 | Poa, 75 | s00
tio) 2360-2100 | 1606
“Note: Multiple transmit entennas are
Ret: 36PP 1S 36.306
Five diferent categories of LTE devices nave been
defined, similar to HSDPA anc HSUPA catagories for UMTS
vices. The categories define some of the basic physical
capabillies of te UE.
The categories difer arimarlly in the peak data rate that
‘each supports, ranging trom § Mops on the uplink and 10
Mops on the downlink fora Catogory 4 dovice, to 75 Mbps
fon the uplink and 300 Mbps on the downlink for a
Category 5 device, LTE UE categories algo specity the
Dandwidth supported, the multiple antenna tecnniaues,
frequency band, modulation schemes, soft butfer and the
data rate.
‘Support for mutipie transmit antens
downlink, ang only @
only applies to the
alogory § LTE UE suoports 64QaM
modulation on the uplink
Note that the actual peak data rates in a given
ployment may be lower than shown here, cue to the
configuration
201 | Introduction
Life of an LTE Mobile1 | Introduction
Life of an
B Default bearer setup and iP
‘address allocation for always-on
once
“.uthentication and
secur
‘Stach Request from
Ueto MME
‘ZRRC signaling
connection setup
ToL newwore
‘acquisition upon UE
power up
LTE Mobile
6. Setting up of addtional detaut
‘and/or dedicated EPS bearers
(Fneesea)
7. DLand UL resource
allocation by eN8
‘scheduler
BUassisted network
‘controled hard
handover
40 dle mage for UE in
‘absence of data activity
{11 Powerof detach
{A typical UE must go through @ numbar of steps before
ean even request a service, and setting up and managing
the service itself requires several adciional steps,
\Wmen a UE arives of powers up In an EUTRAN, must:
1. Acquire the network by scanning for an eNB,
synchronizing with the network, and listening for
system information over the broadcast channels,
2 Establish | signaling conection in order to
communicate witn the eNB.
3. Request an attach to tha core network in order to
regster and receive service.
4, Pass authentication with the core network and
‘exchange of securty algorithms and keys,
5. Establish a Default EPS bearer with the default
Packet Data Network (Example: Internet PDN or IMS
PON) and assign an IP address to provide always-on
‘xperionce to the User
6. Once the Default bearer with the default PON based
on the UE subscription is established, one Defauit
bearer with each of the other PON subscribed.
22
Dedicated bearer may tien be established If tne oS
of Services do not map to that of Dofault bearer
Once this intial setup sequence is complete, the UE can
then request the resources needed to run one or more
‘plications:1] Introduction
Life of an LTE Mobile (continued)
16 Setting up of additional defaut
and/or dedicated EPS bearers
(if needea)
5. Defaut bearer setup and
‘aderess allocation for always-on
experince
7.DLand UL resource
7 Aare ad ‘location by eNB
‘secur scheduler
SUE Beslated neo
‘Br Nttach Request from
UE to MME
RRC aenaling
connection setup
10, dle mode for UE Ta
‘absence of data activly
TDL natwor {LL Poworf detach
acquisition upon UE
powerup as
The UE uses the signaling connection to send a
corvice request to the care network.
UE's capabilities and subscription
‘the core network tells the eNB what sort
(of radio bearer to eet up forthe UE.
9. Onco tno radio boarar Is established, the UE can
begin sending scheduing requests and receiving
scheduling grants, allowing it to sond and receive
User traffic and signaling over the radio bearer.
10. If the RF environment changes the UE may request a
handover to another eNB in order to maintain the
1L1. When the UE ne longer requires the raclo bearer, it
can release the corresponding resources.
‘As long. as the signaling connection romsins in place, the
UE can submit addtional service requests at ary time
without havingto go through tne inital setup process.
23.1 | Introduction
24
Summary
+ Key features of TD-LTE / TOD LTE are:
~ TDATE is deployed using an unpaired spectrum
— Potentially efficent for asymmetric data services, and
— Economic user devices and eNodes,
+ Example features of an LTE network are:
~ Air interface based on OFDM and MIMO,
= EUTRAN with only eNBs and lack of RNC, and
~ IP-based packot switched EPC and lack ofa circuitswitched core
network.
+ Key features of the air interface are:
= Support for TOD, FOD, and H-FDD
— OFDMA for high spectral efficiency,
— Support for various multile-antenna techniques,
= Scalable bandwidth (1.4 to 20 Mii) to achieve data rates greater
-iadathan 300 Mbps in the OL and more than 50 Mbps in the UL.1] Introduction
Review Questions
1. What were the motivating factors behind TD-LTE?
.. Which functions does the eNB perform?
3. What path does user traffic take through the E-
UTRAN and EPC?
4. Highlight the top three key differences among the
UE categories.
5. List example functions occurring in the life of a
UE.
XN
6
25262 | TD-LTE Technology
Chapter 2:
TD-LTE Technology2 | TD-LTE Technology
Objectives
After completing this module, you will be able to:
Explain the key characteristics of the LTE TDD
downlink and uplink
Illustrate LTE frame structure type 2 for TDD
and resource blocks
Explain subframe patterns and UL/DL
configurations in support of TD-LTE.
Identify the physical, transport and logical
channels in TDD LTE and how they relate to one
another
Specify the use of multiple antennas in TDD LTE
References:
[1] 36.300 ~ E-UTRA and E-UTRAN Overall Description
(Stage 2)
[2] 36.211-36.214: Physical Layer related documents
282 | TD-LTE Technology
OFDMA and SC-FDMA2 | TD-LTE Technology
ire
efficiency
no
nee
(incu
LTE Downlink
fo) Y/Y
Sires
e
NB
Tureen)
resource allocation
‘The E-UTRA uses Orthogonal Frequency Multiple Access +
(OFDMA) as its fundamental transmission technology on
the downlink in order to take advantage of the benefits
OFDMA offers:
‘+ High Spectral Efiiency: OFDMA makes better use of
‘the avallable spectrum than CDMA techrologes +
providing significantly higner data rates for a gven
bandwith,
‘+ Robust Against Multipath Interference: The relatively
large OFDM symbol time means that the short delay
soreads typically found in wireless networks have
‘minimal Impact on the qualty of the signal. Use of a
Qyelle Prefix (GP) furtner reduces the effect of
multipath interference,
“+ Support for MIMO: OFDMA innarently lends itself to
implementing Multiple Input Mulple Output (MIMO)
‘and other multple-antenaa techniques.
Resource Allocation: Users can be allocated
resources in both the time domain (eymbots) and
frequency domain (subcarriers). This provides 3
‘tremendous level of exbilly for the eNB to maximize
the effective use ofthe available resources.
Reduced Receiver Complexity: Te use of Fast Fourier
‘Transform (FFT) and laverse Fast Fourier Transform
IFFT) processing greatly simplifies the design of the
transmitter and receiver.2 | TD-LTE Technology
LTE Uplink
SC-FDMA
Reduced Peak-to-
erect
Gee)
Ceremeiectd
ieee
en
eae all
Meena
‘Tho effective managemant of transmit power, complexity,
fang cot are Kay determining factors for handset design.
To that end, LTE has chosen a somewhat different
solution forthe uplink, Single Cartier Frequency Division
[Multipte Recess (SC-FDMA). Although very similar in nature
to OFDMA, SCFOMA has a number of unique
characteristics which are particulary attectve on the UE
side
+ PeaktosAverage Power Ratio (PAPR) Reduction: Large
rumbers of independent symbols are not summed to
create the transmitted signal, which greatly reduces
the PAPR experience by the UE.
+ Lower Maximum Power Requirement: Because ofthe
lower PAPR, less power backoff is needed, and &
ower amplifier with a lower rating (and lower cost)
be used,
+ Better Col-tdge Performance or Large Cells
Reduction in PAPR can be exploited to improve the
link bude, o to improve colLedge performance.
+ Complexity: SCFOMA needs more processing blocks.
atthe transmitter and receiver.
at2 | TD-LTE Technology
SC-FDMA and PAPR
Peak
High PAPR.
‘SC-FDMA
‘A major challenge associated with OFDM is the high Pek
tesAverage Power Ratio (PAPR) of the transmitted signal
‘The very high peaks are a direct consequence ofthe IFFT
‘summing multiple independent symbols, which are all
integer number of eyeles over the symbol time; whenever
the symbols add constructively, the result is a peak of
ower. Signals with a high PAPR either require highly
linear power amplifiers (which are expansive) or must be
lipped (which intioduces astortion).
The transmiters in an SCFDMA system also use multiple
subeartiers 10 transmit information symbols; however,
they transmit the symbols sequentially rather than in
parallel. Relative to OFDMA, this approach reduces the
fluctuations n the transmitted wavetorm.
322| TDLTE Technology
OFDMA vs. SC-FDMA
‘Modulation
OFDMA
aooio14a
‘SC-FDMA
sooto114
in OFDMA systems the ansmitter uses multiple
subcarriers to modulate the information in parallel, and
than gends them through an lnverse Fast Fourier
Transform (FFD), which Isa weighted summation of these
independent symbols
‘An SCFOMA gystom uses a single carier to modulate the
information symbols sequentialy. On the transmitter side,
the adeltlonal block of the SC-FOMA is @ Discrete Fourier
Transform (OFT), This block tvansforms @ time-domain
madulated symbol stream into the frequency domain.
‘Then, the frequency domain information 's mapped to @
wider range (spreading) and goes through an IFFT, which
twansforms the frequency domain information back into
the time domain, SCFDMA Is also referred to as DFT-
spread OFDMA. Since the individual symbols are
serialized and distributed across multiple subcarriers, the
PAPR Isques associated with traditional OFDMA
\ransmissions are recuced
33,2 | TD-LTE Technology
eon
Come 14 | 3 | 5
iret
ee og
LTE Transmission Parameters
FFT aze | 256 | 512
fetedie 6 | is | 25
Comsat
Ieee?
Error coding
10 | as | 20
ims a
15
som | 536 | 2008
so | 75 | 100
Tor6
BPSK, QPSK (Signaling)
PSK, 16QAM, 644M (Data)
Rate 1/3 Convolutional (Physical Layer Sraling)
Rete 1/3 Turbo (Data and RRC Signaling Messages)
Some key OFDMA/SC-FDMA transmission parameters are
provided in ths table, LTE is @ scalable systom so the
subcartior pacing (15 lz) s tne same regardless of tne
‘amount of spectrum. A 10 MHz system, for example, has
a total of 1024 subcarriers, cut of which 50 resource
blocks (RBs) (50"12 = 600 subcarers) are for
assignment to users, One RB consists of 12 subcartiess.
The remaining 1024-600 = 424 subcarriers donot
ransmit anything, St
fight sida of the center 600 subcarriers. minimizes
interference between the LTE system and the adjacent
system, Since a 10-ms radio frame hes 10 subframes,
rame Is 2 ms long. Furthermore, two slots
per subframe, yelcinga 0.5.ms slot. When a normal eyclc
prefix (CP) Is used, seven symbols exist in @ slot, and,
when an extended CP is used, six symbols exist. The data
channels support the madulation schemes of QPSK,
16QAM, and B4QAM for flexibility and higher throughout
Control signaling uses BPS& and QPSK for reliably,
“nul” subeariers on the lott and
a42| TDLTE Technology
LTE Frame Structure2 | TD-LTE Technology
Frame structure type 2
{ Framona ] Framen
Fromentt }] Framene2 }
108
2.
Te
cers a
Rig
peices
‘The Frame structure tye 2, applicable only to LTE TOD is,
fa shown in the figure. The frame duration is 10ms lke in
‘the case of LTE FOD.
|A TDD frame is shared among both UL and OL
transmissions with a switching period in between them.
Switch point periodicty for both
‘supported. The stenderd defines the table for upink and
downlink allocations for batn ewitch point periodicity. In
case of § ms switch point periodicity, each radio frame of
+10 ms lengtn consists of two halftrames of Sms length.
Haltttames are indexed 0 of 4 to inform the UES of
possible PRACH instance. Each halframe consists of four
subframes of length 1ms and three special fields OwPTS,
GP, and UsPTS of 4s longth. Subframes 1 and 6 are
reserved for uplink transmission, All other subframes are
defined as two time slats of 0.5ms each.
5ms and 10 ms is
In case of 10 ms switeh-point periodicity, subframe 4 are
special fields DwPTS, GP and UpPIS
‘ranemission, Al other subtrames are defined as two ime
slots of 0.5ms each,
reserved for
36
There are seven different configurations from 0 to 6
supported my TDLTE standards. Each configuration
defines subtrames lows. uplink/downlink
tranemission snd special folds.
wien2| TD-LTE Technology
UL: DL Configuration for TDD LTE
| Switching.
Periodicity
Sms
Sms
sms | 4a
4oms_| 7:3
a aisaIa
aE I s0ms_| 8:2
EUS STOUSTOSNSIED) 45,5
Sms
TOLTE suppers seven configuration of different UL/OL
letributions. The network broadcasts the support which
fone of tase configurations Is supported in the cell
torough Ute subframesssignment field in the System
Information Block 2 to. Configurations 01,2 and 6
support a Sms snitching periodicity to enable deployment
of symmetric and time sensitive apalictions. While
configurations 3, 4 & 5 supports switching perioacity of
410ms, These configurations help in further enhancing the
spectral efficiency by allowing only one switching betwean
DL/UL and back In every 10ms. But the limitation of such
2 system is that these configurations will increase the
latency of data substantially making it diffeutt to deploy
time sensitve applications.
‘The configuration 0 is @ hesvily loaded UL scheme while
Configuration 5 is OL loaded. Configurations 2 and 4 are
similar in nature except for the periodicity in switching.
(Configuration 6 ie very unique in the sense that first Sms
's UL loaced while second naif frame Is DL loaded.
*#Nole the DL/UL distibution assumes. the Special
subframe carry DL Data hence accounted along with DL
subtrames,
372 | TD-LTE Technology
Special Subframe (S)
Frome n
+ Bis Switching Pertdiciy
* Compatible with WIMAX and
UiRATDD
+ ome Switching Periodicity
* Compatible with LTE FOD
‘Siar Period
TD.LTE supports an a new type of subframe called the
Special subframe to make way for switching between DL.
mado to UL mode. This enable both the UE and the oN
to adjust itself to either
daa
remit the data or {0 recelve
‘The Spe
eupports two types of switching perogieiy. First Sms
periodicity to accommodate delay sensitive (and also
symmetic) applications lke voice. Also Sms periodicity
makes it feasible for UE to have compatible operations
with WIMAX and TOSCDMA/UTRA TDD whien also has 3
frame structure of Sms, The lower sido of using Sms
perladicty Is the additional signaling overhead and
‘wastage of resources for preparation to switching between
DL to UL and vice versa.
jal eubtrame fe denoted a ‘S' eubframe, TDLTE
Second a 10ms periodety wil over come the limitations
of higher signaling and provide good spectral efficiency
But can anly support asymmetric delay insensitive
applications. Voice applications will be dificut to
implement with tis king of frame structure.
38
‘The S- subframe is of 1ms duration and consists of 3
fields ~ DL Pilot Time Slot (DWPTS), Guars Period (GP) and
UL Plot Time Slot (UpPTS)2 | TD-LTE Technology
Example UL/DL Configurations
Example Applications of
UL/DL Configurations
Conia
Pena
re eeey
hier}
Sree ate)
Seven uplink/downlink configurations gve significant
flexioilty to service operators while deploying a TOLTE
system, The operators can choose a specific configuration
based on the expected trafic patter. For example, when
the majorty of traffic Is symmetric and delay-sensiive
configuration ane with the same number of DL and UL
‘subtrames would be quit sultabe. This configuration aiso
has a fast § ms switching between the downlink anc the
uplink Ifthe downlink trafic is quite significant compared
to the uplink trafic and realtime requirements are
somewhat relaxed, which is the case for services euch as
Web browsing, configuration three with 67 percent DL and
33 percent UL could be sppropriate. Stretching the
agymmetty further, configuration five allows 89 percent
DL and 21 percent UL. Broadcast and multicast services
uch as TV channels can be offered best using such @
configuration. Since uplink trafic Is exzected to be quite
light and since bidirectional real-time constraints do not
‘xis. configuration five would work very wal
Conia
pias
Clr
Ree aes
Seen
392 | TD-LTE Technology
Special Subframe Configuration
efelels| ole
elwlofele|mlolals
R/Slole S/S)
Ref: SGPPTS 36.211
‘The above slide shows the nine configurations supported
by TDD LTE Special subframe, The specific configuration
supported in the Cell is broadcast using,
specialSubframePatterns field in the System Information
Block 2. The DwPTS field ean span any of the folowing:
3, 9, 10,11 & 42 OFDM symbols. DWPTS cartes only
contol information when 3 symbo! long and carry both
control snd data for other configurations. The UPPTS can
be either 1 or 2 OFDM symbois. UpPTS carries either
sounding reference signal or PRACH with preamble format
4. While the Guard period (GP) can be 4, 2, 3, 4, 9 or 10,
(OFDM symbol long. The GP fields determines the sizeof
the cal,
402 | TD-LTE Technology
DL Pilot Time Slot (DwPTS)
‘S-Subfreme
CZ.
DweTs
(@/9710/11/12 OFDM | GA UpeTS
symbols)
+ Shortened DL subframe
+ Variable leneth (OFM symbols)
+ Carries PCFICH, PHICH, POCCH,
Primary Syne Signal and POSCH
ie
‘The name DwPTS (DL Pilot Time Slot is cartied forward
from the LOR UTRA with a difference that this eld is not
Just used for OL synchronization but also to camry the
regular downlink channels PCFICH, PHICH, POCCH and
POSCH channols of the LTE. Hence we can visualize
[DWPTS as a short OL subframe with less number of OFOM.
symbols. TDLTE specifications supports variable length
‘DwPTS field that can be configured by the operators. The
DDL synchronization with the Primary Syne signal that is
ahvays sent on the OFDM symbol 2. To exploit the
avaliable tesources the POCCH channel occupy @
‘maximum of 2 OFDM symbols here instead of 3 OFDM
‘symbols in the regular DL subframes.
DWPTS field carries both control and traffic data in
‘addition to providing synchronization on the DL
an2 | TDATE Technology
UL Pilot Time Slot (UpPTS)
$-Subhame
i
i “) vwers
tore
| OwPTs: CF OrOM
i syne
LULeynchronization with RACH
“UL channel estimation with SRS
3
w
N
t
i
x
x
y
t
‘
sith Legal come! —_ Transport Gham! Pry! Channel
Physical channels serve the following purposes:
‘The POCCH carries the Downlink Canto! Information
{O0), which includes resource allcations and the
corresponding modulation and coding schemes,
ower control commands, channel quailty requests,
‘and other commands for the UE.
‘The PCFICH carries the Control Format Incicator (OF,
Which Indicates now many symbols the POCCH
cocupies in each subframe,
‘The PHICH carries the Hybrid ARQ Indicator (HD,
Wich is used to ACK and NACK ongoing uplink data
‘vansmissions.
‘Tne PUCCH carries the Uplinx Contol Information
(UC), which includes echeauling requests, channel
‘uality reports, and Hybrid ARQ ACKS ang NACKS for
downlink transmissions.
472 | TD-LTE Technology
eet
iin
Physical Signals
Reference Signals
(Channel Estimation and
Coherent Demedulaton)
‘Synchronization Signals
(Powerup Synchronization)
ence Signal (DMRS)
eric)
We clear the confusion that sometimes obscures the
difference between Physical channels and Physical signals
by noting thet physical Channels carry upperlayer
information and physical signals do not.
Prysical Channels carry, for example, vratfic channels,
which can carry email or enable an FTP transfer. Physical
signels, on the other hand, have nothing in them from
outside the Prysical Layer itself. A plot reference or @
souncing reference are examples ofa physica signal
+ Reference Signals: Reference signals (also known as
pilots) provide @ known or predictable pattern that
allows the UE to decode the physical channels and
estimate cownlink channel conditions. Reference
signals may be cell-specific (common to all UES) oF
especie,
‘+ Synchronization Signals: Synchronization signals
allow UES to detect and identity calls during inital
system acquisition and provide an initia! timing,
reference.
4a.
‘Tho UE also provides reference or pilot signals to allow the
network estimate uplink channe! conditions and to
coherently demodulate its transmissions.2 | TD-ALTE Technology
DL Subframe Resource Mapping |
porch | Slot 20, | Sot 2n¢ |
SdH (Uber
Resource Blocks
De
In every DL subframe, the first one, two, or three OFDM
‘symaols contain one or more PDCCHS, which ceny
scheduling assignments and other control informetion.
‘Tho exact number of OFDM symbols used is specified in
the PCFICH, which appears in symbol O of the even:
humbered slots (in other words, the first slot of each
subframe). The PHICH may also appear inthe first symbol,
2 required. The remaining symbols in the two slots,
contain the PDSCHs, which carry user data and signaling
Information to specific users.
49.2 | TD-LTE Technology
DL Reference Signals
\ siot.2n I Siot2net
ze a a
ile z Z
zfs 5 a
z z z
oz ee SS 238
worn
ln TDD LTE ike in FOD mode, one reference signal 1s
lwansmitied per antenna port to estimate te channel
response for each antenna cn the downlink. The location
of each reference signal within a resource block depends
fon the rumber of antennas and the siot within the
subftame; the reference signals for four-antenna system
(antenna ports 0, 1, 2 and 3) are illustrated here. These
reference signals are transmitted on beth DL. subtremes
‘and the DwPTS felds of Special Subframe.
Colspecifc reference signals play an important role in
channel estimation and system acquisition. During
channel estimation, the receiver compares the received
symbols with known reference symbols and estimates the
‘channel response for channel equalization purposes.
502 | TD-LTE Technology
| Siot2n
UL Subframe Resource Mapping
| sotanea
3
8
3 pun
g
nfo
cr wie
olslofstalslelolsialslals
{nthe uplink, the Physical Uplink Control Channel (PUCCH)
‘cuples one or more resoures blocks at each ond of the
system Danowidin and performs. frequency hopping
‘betweon the first and second slots within a subframe. The
reeouree blocks between the PUCCHS are used for
Physieal Uplink Shared Channol (PUSCH), and may do
frequency hopping between slots. The PUSCH carries
userpecific vatfic and/or RRC signaling messages. The
Phyeical Random Access Channel (PRACH) occupies six
‘esouree blacks over one or more consecutive subframes,
‘adjacent tothe PUCCH on the UL subframes. The PRBs at
‘which the PRACH appears and the number of instances
within the UL subtrome is configured as broadcast
Information in the System information Btoek (S18).
et2| TO-LTE Technology
Special Subframe Resources
Porich | Siot 2n i Slot Qn |
le
rates €
x
3 R
8 a e
8 POBCH{Use B) g
5 Be
3 e|s
g ®
i
Jpogcx fading :
PpscHl (System proaficast sits) 2
sfelalalsislolilelslaksle
D,PTS
‘A Special subtrame (or SSubfeame) carries the PCFICH,
POOH, PHICH and PDSCH channels ike the DL
subframes. The PDCCH channel spens @ maximum of 2
(OFDM symbols and the POSCH channel the rest of the
(OFDM symbols in the OwPTS field to achieve maximum
spectral efficioncy on the DL. The UpPTS field aliows for
either RACH using preamble format 4 o UL channel
estimation through Sounding Reference Signal (SRS)
For example, the $ Subframe configuration 4 with normal
CP te shown in the above slige. Where DwPTS, GP and
LUpPTS occupies 12, 1 and 4 OFDM symbols each.
522 | TD-LTE Technology
Exercise
True or False?:
‘L. The PCFICH informs the UEs in a cell about the
number of OFDM symbols used by the PDCCH. -~
2. The PDCCH can allocate DL resources to a UE;
however, it cannot allocate UL resources to the
UE.
3. The PDSCH can carry traffic and UE-specific
signaling messages. \/
4. The PHICH enables the UE to improve UL
throughput by carrying ACK/NACK. v
532 | TD-LTE Technology
Multiple Antennas
542 | TD-LTE Technology
Multiple-Antenna Techniques in LTE
Multiple-Antenna Techniques
Soe
Diversity MIMO/Spatial Multiplexing Beamforring
= 1, 1 a
Receve —Tansmt SUMING musa ‘SoMa } Speciai Case
Dwerety very (Binge User (utp User = (Spatial Dision | oF SUMIMO
mano. 4 MIMO) Mame Aces)
oe
This slide shows the muttiple-antenna techniques used in
LTE. The underiying essumption is thatthe signals out of
aitferent antennas experience citferent facing
+ Diversity: versity techniques Increase tn
robustness and thus coverage, Including receive
diversity and transmit civersity. With transmit
diversity, the same data stream is sent to the same
ser and experiences independent fading. So, the
signal quality is enhances by combining them.
+ Muttiplenput Muttiple-Outeut (MIMO): Alco knawn as,
spatial multiplexing, different deta streams are ser
fom different antennas. If the streams are sent to
the some user, it is called Single-User MIMO (SU:
MIMO) and can inciease the data rate fort
the streams are sent to different users, itis called
Multiuser MIMO (MUMIMO) and can increase
capacity forthe cel.
user.
+ Beamforming: Spatisl Division Multiple Access
(SDMA) is the most complicated beamforming and
te theoretical foundation of MUMIMO, So, in
practice, MU-MIMO Is equlvalent to SDMA and can be
Viewed a8 MIMO plus Bearforming (BF). For simple
beamforming, it can be implemented as a special
case of SU-MIMO, where a single stroam is sent out
552 | TD-LTE Technology
Two basie forms of diversity aro
transmit diversity
56
Generic Diversity Techniques
Transmit diversity Receive diversity
‘Multiple antennas atthe i:
eee
Peet
De)
aarti
Sere)
with
Receive Diversiy: This form of civersity is
implemented at the receiver. Multiple antennas are
used at the receiver. The BS transmits just one signal,
but multiale copies of the same signal are received
because of the multiple antennas. These signals,
experience different fading charactonstes, and the
probably thet all signals experience a fade at the
ame time is low. Hence, the qualty of the combined
all signal is kely to be good. The advantage of
receive diversity is better performance compared to a
single receive antenne, On the other hand, the
cisacvantage is increased cost at the terminal whon
receive dversity's implemented atthe terminal.
Transmit Diversiy: Tris form of diversity is
Implemented st the transmitter. The transmitter
twansmits @ signal, possibly in diferent forms, from
rrultiple antennas at the same time. With transmit
Civersity, multile copies of the same data stream are
sent to the same user end each stroam experiences
Independent fading. Thus, multiple copies of
fe diversity and essentially the same signal are recelved at
terminal, providing aversity benefits, as ie the
ive diversity, Howover, transmit cvorsity has
‘an added benefit, it can be Implemented at the BS
without raquiting multiole antennas at the MS.In Single Usor MIMO (SU-MIMO), also known as Spatial
“Multptexing (SN), each antenna caries a separate data
stream on each frequency assigned to the user. Each
receiver picks up the combined signal an each frequency,
containing the sum of all symbols sent in each symbol
time. The multiple copies of the same received signal,
‘long with the UE's knowledge of the MIMO. matrix
chamel (derived from reference signals from each
transmit antenna), allow the UE to extract each of the
original symbols,
This diagram illustrates @ 22 MIMO eystom, with two
transmit antennas and two receive antennas. The signal
between transmit antenna 1 and receive antenna 4 is
quantified by the channel response hy,. Each of the four
possible paths has its
charactereties. Accurate channel charecterization al
each transmit antenna ta independently deliver 8 citforent
data stream, potentially increasing the peak data retes
linearly with the number of transmit antennas; a 2x2
system can double the data rate, while a 4x4 system can
quacrupte i
‘own channel response
2 | TD-LTE Technology
Single User MIMO (SU-MIMO)
bch antenna transmits a
‘Separate data seam
ath receiver detects the
combination of al symbols on
‘each frequency
Tne net result @ significant higher date rate, since
‘each transmit antenna is sending a separate data stream
in parallel using the same frequency and time resources,
‘atthe cost of increased receiver complexity.
872 | TD-LTE Technology
Arena
WY ee
ETS phase
wt
t
pela
het |
i
'
j
'
Beamforming Concept
Stanal 4
After Boamforring,
Powar= (2a = axe
Beamformingis a signat-processing technique that mimics
‘leer hardware methods that used veriabieengtn cables
ong to aifferont antenna elements. The modern signal
processing methods are widely used in electronic antenna
arrays for the diecuonal vansmission oF reception of
Signals. The improvement derived from nacrowed and
directional beams, when compared with omnidirectional
receptions, Is known as the
transmi/receive gain or loss,
tranemissions ot
Boamforming results in spatial selectivity, which is
achieved by using adaptive or fied receive/transmit
beam patterns. The beam patterns come from the
Gifferent relative phase shits observed
antennas at cifferent points in space. A mobile, for
example, st @ certain point rolatve to two antennas
transmitting the same information at cifferent relative
phase offsets wil "see" varying degrees of constructive or
structive combing of the two waveforms from each of
the two antennas at afferent points
ween the
58
When tranemitting. @ beamformer controls the relative
phase of the signals from each transmitter antenna in
cotder to create a pattern of constructive and destructive
interference in the wave front atthe rocover2 | TD-LTE Technology
MU-MIMO: SDMA Implementation
Radio channels in cell B: 200
cell throughput: 80 Mbps
“Danette rout eee
rawbach: Poona high iterternce
MUSMIMO in LTE provides mult-stream transmission to
‘muliple users simultaneousy. Tis increases the system
‘throughput. Also, it increases the sum date-rate and
Fedduces the latency of mobile users as compared to other
multiple access schemes like TOMA, In MU-MIMO inter
user interference 's a major challenge and needs to be
taken care at the transmitter so as to save UE power
consumption and keep them as simple a8 possible, The
Mult User MIMO (MU-MIMO) theory is based on SDMA
concept, Le, use of epatal sharing ofthe channel by the
sor. It Schedules multiple usors in one time frequency
Sot. It needs extra hardware but no extra bandwidth
592 | TD-LTE Technology
PUSCH and UL Antenna Selection
Antenna Port 0. . *
con
oon
y ene
Pusch
Trait)
Basie Contents:
UL resoute allosation (RAs, hopping, MCS), TPC, DMRS, CQ!
Request
CRC forthe DCI:
26 bts
‘Maske with
(UE ID .e., CANT)
(GUE transit antenna selection mask (0 oF for antenns
ort Oor 2),
When closedttoop antenna selection is enabled the NB
tell its UE which ofits antennas to use on its PUSCH with
‘an impli signaling mechanism within the UL scheduling
rant on the eNB's DL Contr! Information (OC directes
toward the UE. The DCI includes all kinds of information
useful to the UE: Radio Bearer (RB) assignments,
prescribed hopping sequences {ON ar OFF, intra or intr
Subrame frequency hopping in oxpict or predefined
patterns), the applicable Modulation and Coding Scheme
(Mi), Transmit Power Control (TPC) far the UE, the power
of the Demodulation Reference Signal (OMRS) relative to
the eNB's carrier power, and the COI requests. The OC's
message includes 2 16-it Cyalic Redundancy Count
(GRC), a type of biock coding which ie masked with the
UE's 1D (]CRNTE oF CeI-ANTH and the eNB's antenna
preferences (antenna port 0 or antenna port 4).
602 | TD-LTE Technology
MU-MIMO in the UL
i arte A Teantenna
UEL Goals UE2
Breer gat any
* Keep terminal cost lowe
Miers
Pier ore
i(reauency tie slot
While MU-MIMO can significantly increase capacity and/or
‘throughput in the downlink, it can also be applied in t
Uplink. The goal of uplink MU-MIMO is to increase uplink
‘sector throughput with just one transmit antenna at the
UE, Note thatthe cost of the UE fs kegt low inthis case. I
we start using multisle transmit antennas at
Would need to worry about the cost of
transit power requirements, processing power, end
complexity.
antennas,
Consider a system in which we want to implement uplink
(2x2) MU-MIMO, To have two tansmit antennas in the
uplink, we wil use one antenna fom one UE end another
antenna ftom another UE. The eNB uses two reooive
‘antennas to receive signa's from two transmit antennas,
‘The basic operation of uplink MU-MIMO is similar to that
{or downlink MUMIMO. Basically, one transmit antenna
sends out one data stream, and another transmit antenna
sends out another data stream. Two UES use the same
radio resource Yrequency time sla) In order to use uplink
MULMINO, two UES need to locate in goad radio candtion,
Uplink MU-MINO can increase UL s
example,
throughout. For
2 system with one transmit antenna and one
receive antenna yields a sector throughput of 10 Mbps in
the uplink, uplink (2x2) MUMIMO can provide sector
throughout of 20 Mbps in the uplink
612 | TD-LTE Technology
A Closer Look at PHY
Layer Processing2 | TD-LTE Technology
MAC POU
Physical Layer Processing
Code Block Segmentation
A number of steps are required at the PHY layer to
prepare packets for transmission over the alr. The exact
sequence is slightly different between the uplink and
downlink due to the use of SC-FOMA instoad of OFDMA;
however, the initial stops are identicet:
4. A checksum (CRO) Is calculated for the MAC layer
Packet Data Unit (PDU) which contains the
Information to be sent over the alt. This CRC is
‘appended to the end of the bits in the transgort
block.
2. ifthe POU is large it may be segmented into smaller
blocks to match the assigned transport block size. If
0, 8 separate ORC is caleulated for each transport
bioek
Channet coding is applied to the block for forward
error correction, ether 3 4/3 convolutional coder (for
signaling) ora 1/3 Turbo coder (for data),
A, Rate matching allows the effective rate of the
\vansmigsion to maton the actual channe! conditions,
‘The resutting code blocks aro concatenated into the
code word to be tranemited. Note that the contents
ofthe original MAC POU may be spread over muitite
62 | TD-LTE Technology
onthe
1
64
Si
Downlink PHY Processing
‘Scrambling
Modulation
ayer Mapping
pyr
(OFDM Signat Generation
sumo
“Transmit Diversity
+ Spatiat Multiplexing
Enna
rink the code words are processed as folows:
The code word |s scrambled with the appropiate
scrambling code. This identifies the source of the
\tansmission and randomizes the interference.
The bits are then modulated with the appropriate
adulation scheme (BPSK or QPSK for signaling,
QPSK, 16QAM oF 64QAM for data). The higher the
‘adulation scheme the fewer symbo's are needed to
trangeit the data,
if muttiple antenna techniques are being used the
‘symbols are mapped to up to 4 layers (one layer for
each transmit antenna). Precoding dstibutes the
‘gmools to the appropriate antennas based on
feedback ror the UE.
(On each antenna the syinbols are mapping to the
Individual resource elements (subcarriers) essigned
tome UE
The contents of all of the subcarriers (in the
‘frequency domain) are combined in an Inverse Fast
Fourier Transtorm (IFFT) to create a single wideband
signal (in the time domain). A Qyelic Prete (CP) is
added 10 aliminste the effects of multipath. The
resulting OFDM symbol is transmitted over the
designated radio carier and the process begins again
with the next set of symbols2 | TD-LTE Technology
Uplink PHY Processing
‘SC-FDMA Signal Generation
nen
noe
‘The uplink process is simiiar to the downtink process: rmultigath. The resuiting OFDM symbol is transmitted
cover the designated radio carrier and the process
begins again withthe next set of symoals.
1. The code word is scrambled with the aporopriate
soramaling code, This identifies the source of the
‘wansmiseion, and randomizos the interference.
2. The bits are then modulated with the appropriate
modulation schome (BPSK or QPSK for signaling
QPSK, L6QAM oF 64QAM for date). The higher the
‘modulation scheme tne fewer symoos are needed t
rani the data
3, A Discrete Fourier Transform (OFT) function spreads
the modulation symbols across a set of frequencies
to avoid the PAPR problems associated with normal
(OFDMA operations.
4, The output ofthe OFT is then mapped to ino resource
clements (subcarriers) assigned to the UE.
The contents of all of the subcarriers (in the
frequency domain) assigned to the UE are combined
In an inverse Fast Fourier Transform (IFFT) to create a
single wideband signal (in the time domain). A Cycle
Prefix (CP) Is added to eliminate the effects of
652 | TD-LTE Technology
66
Summary
+ Characteristics of the LTE Physical Layer are:
= OFDMA in the DL and SC-FDMA in the UL,
= Channel bandwidth of 4.4 to 20 MHz, and
— Resources are assigned per subframe,
+ LTE TDD utilizes Frame Structure Type 2
* Frame Structure Type 2 consists of DL, UL and Special
subframes
+ LTE supports multiple antenna techniques, including:
= Transmit and receive diversity,
= Spatial multiplexing (MIMO), and
= Beamforming (Spatial Division Multiple Access).
aie.2 | TD-LTE Technology
Review Questions
11. Why was SC-FDMA chosen for the uplink?
2. Describe the relationship among sub-frames, slots,
resource blocks (RBS), modulation symbols, and sub- ~
carriers,
3. How much is the overhead of reference signals in LTE?” @ |;
4, How do multiple-antenna techniques Improve coverage
and/or throughput? 7°
5. Which physical channels carry user traffic in the UL and
DL? Pusch, PDSCH
6. Which physical channel carries the DL and UL resource
allocations? PRCCH
er683 | System Acquisition
Chapter 3:
System AcquisitionObjectives
After completing this module, you will be able to:
* Explain the steps involved in system acquisition
+ Describe how UE achieves DL synchronization
* Discuss the roles played by various signals and
channels in network acquisition
+ Summarize the processing of relevant channels
+ Specify the basic steps of the cell selection
procedure
References:
am
2
8
4
51
(6)
70
SGP TS 36.211 - EUTRA Prysleal enannels and
medulation
GPP TS 36,213 ~ EUTRA Physical ayer procedures,
GPP TS 36.300 - EUTRA and EUTRAN Overall
description stage 2
‘3GPP TS 36.306 ~ EUTRA User Equipment (UE) radio
access capablities
GPP TS 36.321 ~ E-UTRA Medium Accoss Control
(@4AC) Protocol specification
GPP TS 36.331 - E-UTRA Radio Resource Control
(RRC) Protocel specification
.3 | System Acquisition
Overview of System
Acquisition3 | System Acquisition
Physical Contol Format
Indieaton Channel
Pinsical Downlink Contol
UE | channet
[| Prsica: Downing Sores
anne!
Downlink Channels
UL Powor Control, HARG,
‘Sit Timing
Synchronization
Frame Timing
Synchronization
‘Waster information Book
Format of he POCCH
‘ULand OL locations
“Trai, Signaling
Broadcast, Paging
eNB
‘Mer powerup, the UE goes through the process of tying
te find an LTE network such that it ean receive services,
“Tho frst thing thas todo is synchronize with the downlink
\ranemissions of the eNB and follow that up with several
‘other steps. The eNB uses several downlink channels to
_ssiot the UE with the overall Network Acquisition process
‘The Primary Synchronization Signal is used to obtain sub
framelevel synchronization, The Primary Syne Signal
repeatedly broadcasts one of tice possible 62-at codes
to help the UE recognize where slot transmissions begin
and ene.
‘The Secondary Synchronization Signal is used to obtain
frame-level synchronization and the Physical Layer Call
dentiy. The Secondary Syne Signal repeatedly broadeaste
one of 168 possible 62-bit codes to help the UE recognize
where fr
transmissions begin and end. The Secondary
Syno Signal information carried on the
within a frame are different. This difference is used to
Identty the beginning of tne frame.
wo subtrames
2
Both the primary and secondary sync signals ore
transmitted on the conter 62 st nd together
Uniquely identify the cell using one of 504 possible
Physical Layer igentiies.
System information Is periodicaly broadcast by all LTE
{eNBs. The Master Information Block {MIB} ype of system
Information is ropes
1 NB on the Prysical Broadcast Channel (PECH). The
MiB contains very few but very important LTE system
parameters that are essential in systern acquisition. The
MIB information is packed 2s a System Information
Master (SIM) message and broadcast on the PBCH every
40 ms. Four frames ate needed to tranamt one copy of
the MIB.
edly and poriocically transmitted by3 | System Acquisition
ao
Jace
Primary Syne Signal
‘Secondary Syne Signal
Physical Control Format
Indication Chane!
Physical Downlink Gantrol
Chane
Physical Downiink Shared
Channel
Downlink Channels (Continued)
Taster Information Block
| Format of the POCcH
Cio
Frame Timing
Synchronization
UL Power Contra, RAR,
‘UL end Dl Allocations
Traffic, Signaling,
areadeast, Paging
eNB
‘The Physical Control Format Incieation Channa! (@CFICH)
is used by the eNB to inform the LES about the number of
(OFDM symbols used for POCCHS.
‘The Physical Downlink Control Channel (POOGH) is the
channel used by the eNE to carry eontial Information to
‘the UE, The POCCH channel carries an ACK/NAK response.
10 the uplink channel. Also this channel cartes wansport
format allocation, the UL scheduling grant and resource
allocation information for the UE.
“The Physical Downlink Shared Channel POSCH) is used to
carry user data, paging and control signals and broadcast
information,
733 | System Acquisition
ao
Process of Network Acquisition
Soci
fein
‘The UE performs the functions shown in the slide in
‘sequence during inal cell selection. With the completion
‘of call selection procedure the UE will have downlink
‘syncnrorization withthe eNB. Following the power-up, the
LUE undergoes a sories of herdware tests to vert intogriy
ff memory and other peripherats. It selects a frequency
band to acquire an LTE systom based on its configured
list, At this point, the UE stil has no knowledge of any
‘operator's presence. It simply tres to acquire the network.
Tne UE scans for the syne signals to scquire frequency
‘and ume synenronization. Once the UE sequires primary
and secondary syne signal information, it gains knowledge
about both synchronization and physical cell identity. Now,
the UE Is ready to download the master information
broadcast through a broadeact cnanncl to select system
banawitn,
Now, the UE decodes the contro signal information from
the PCFICH channel and reads the POCCH channel to find
‘out the system information resources on the shared
‘channel (PDSCH.
74
‘Then, the UE decodes the System Information Broadcast
(SIB) messages to acquire the PLMN ID of the network. I
the PLMIN ID of the network matches withthe PLMN 1D list
of the UE, then UE runs the coll selection algorithm. I all
‘election Is successful, tren UE tries to acquire TOD
Configurations to know the OLUL subtrames and UL
synchronization through the intial aecess procedure, else
the UE acquires anather LTE cell and restarts the process
eeein.3 | System Acquisition
Processing of
Synchronization
Signals and PBCH3 | System Acquisition
Downlink Synchronization
Seen
‘The UE performs the functions shown in the side in
‘sequence during Physical Layer Cell Identity (Pci
‘2cquisition. After completion of power-up tests, the UE
Intates OL synchronization and the PCI acauisition
procedure.
‘The first step in the process i the frequency scquisiion
procedure, where the UE tres to acquire the center 1 MHz
(72 subearrirs * 15 ktHe = 3.08 MHz) bandwith to
decode tne primary syne signal, secondary sync signal anc
‘2 set of system information parameters. The eNB
transmits this information on the subcarriers within the 4
MHz bandwidth. This mechanism of using only the
‘smallest possitie bandwidth configuration of 1 MHz
provides a consistent way for UES of different capebilties
to acquite networks that may be operating with ary of the
possible bandwidth configurations (1.4 MHz, 3 MHz, 5
‘Hz, 10 Miz, 25 Miz, 20 Miz)
‘Next, the UE tries to acquire the primary syne signal to get
slot synchronization. The primary syne signal repeatedly
broadcasts one of three possible 62-bit codes to help the
UE recognize where slot transmissions begin and end.
‘Using the primary syne information, the UE tres to acquira
76
‘the secondary sync signal to acquite frame
synchronization. The secondary syne signal repeatedly
broadcasts one of 168 possible 62:bit codes to nolp the
UE recognize where frame transmissions begin and end,
‘The secondary syne signa information carried on the two
‘sulbframes within a frame are different. This difference is
Used to identify the beginning of the frame. Soth the
primary and secondary syne signale are transmitted on
the conter 62 subcarriers, and together uniquely identify
the cell by using one of 504 possible PC.3 | System Acquisition
Frequency Locations for Acquisition
_ Syne Signals (62 subcariors) A
4 =a BCH (GRBs)
Look t coer 62 subcaties
“round progrrimad eareet
Heauoney fo setae yz senate
‘The slige shows the UE frequency acquisition procedure in
LTE, The EUTRA cell search procedure supports a
‘scalable overall transmission bandwidth of 1.6 MHz to 20,
[Mtiz, corresponding to sik of more Resource Blocks (RBs).
Each RB consists of 12 subcarriers per OFDM symbol, Te
UE first detects te central part of the spectrum
rogardiess of recenng bandwidth capability.
In this figure, the cell operates at 2 20 MHz bandwidth.
‘The UE detects the center spectrum of the 20 MHz
spectrum. The primary synchronization and secondary
‘synchronization signals are carried on 62 subcarriers and
Physical Broadcast Channel (PBH) information is always
‘spread over six RBs (72 subcariets). They carry 620i
sequences that occupy the center 62 subcarriers wile
five subcarriers on either side are reserved for further
use, Onee the UE detects primary synchronization and
secondary synchronization signals, i acquires all timing
related parameters. As the PECK is tmo-aligned with the
syne signals, the UE acquires the BCH channel and reads,
the system information, One essential piece of
Information sent on the BCH is the ansmission
Dbandivicth for actual data transmission.
73 | System Acquisition
Slot Synchronization in TD-LTE
Frame
ed a Ti
Some
Holtframes: a a
Sms a
subtrames
of@)?[sl4*lslel714[2
Slots
i=0fi=aqiF 2[=3
5 ms
‘OFDM Symbols
(for Normaice) — |“
{of 3 Primary She Signal sequancas ave ransmitad on Time Sot 2 and Slot 12
‘ter power-up, the UE tres to obtain time and frequency
‘synchronization withthe system. For thi, the UE needs to
dotoct signals to ceteet where the slot/subtrame/trame
begins and ends. LTE defines two types of synchronization,
signals: the primsty synchronization signal and the
secondary synchronization signal. The primary
‘synchronization signal is used to obtain. slotlovel
synchronization and detect GP (normal or extended CP)
The primary and secondary synchronization signals,
‘together faciitate TOO frame structure recognition (as
‘opposed to FDD frame structure).
Primary synchronization signals consist of one of three 62:
eymbo| ZadofF-chu sequences in @ cell, and are always
\wansmittes on the third OFDM symeol of slots 2 and 12
(OFDM symbo! 2 ofthe rst slots in subframes 1 and 8) in
‘ TOLTE system. Detection of the primary end secondary
synchronization signals during specific OFDM symbols
lmplicty informs the UE whether the E-UTRAN is using
TDD or FDD in hat cel. n an FOD system, the lat OFDM
symbol during slot © and slot 10 contains the primary
synceronizstion signal
783 | System Acquisition
UMTS LCR TDD Frame Structure
Frame
na a me
‘subframe
The Frame structure, applicable for UMTS Low Chip Rate switches from reception to transmission mode slong with
(LeR} Time Division Duplex (TDD) Is as shown in the figure. two way propagation dotay.
The frome duration i¢ 20me lke In tne case of UMTS/LTE
FDD and consists of 2 Suatrames of Sms each
‘A UMTS LOR TDD Subframe is shared among both UL and
DL transmissions with a switching point in between them.
1A Subtrame consists of 7 Time slats 0 through 6 each
having duration of 675 US that ean be ether used for DL
(oF UL tranemigsion, The tlrst time eit © and the second
time slot 4 are always used for DL & UL transmissions.
respectively. Between those two time slots, Switching
point allows the communicating devices (UEs ard NodeBs)
to switen from transmission to reception mode or vice
‘Switching point consst of three special fields Downlink
Pilot Time Slot (OwPTS), Guard Period (GP), and Uplink
Pilot Time Siot (UpPTS),
The DwPTS of 7 US duration and UpPTS of 125 US are
Used for DL and UL synchronization respectively. The
Gusrd period Is of 75 uS duration allows the Node8 to
‘switch from transmission to reception mode, while UE
793 | System Acquisition
Frame Synchronization in TD-LTE
ta tone 5 z
——+
setane a
o[t
se
ole F2
Jorou amon
| Crtornermarcr) ma —
“+ of 188 Secondary Sync Signal sequences & transmitted during Slots 1 and 14.
eaves ners eine es
Sustain niss wa oaacn
‘AMter the primary syne signal acquisition, the UE tries to References:
detect the secondary synchronization signal. Secondary
synehronization signals are found in the ast OFDM symbol
in slots 1 and 41 (the thvee OFOM symbols preceding the
primary synchronization signal). Secondary signals are one {2} SGPP_ standard contibutlons: 1.062990, RA-
of 188 G2bit_msequences. Each msequence 063089, R1-063197,
corresponds to a unique Gell Group 1D and is made of two
concatenated 32-bit mseauence groups. The groups are
mixed diferently in slots 4 and 41, which helps the UE
determine the start of a new fame. Again, detection oF
the primary and secondary synchronization signs during
specific eymbo's imply informs the UE whether the E
UTRAN is using TDD o¢ FDD in that eel [2]. In an FOD
system, the second tolast OFDM symbol during set O and
slot 10 contains the secondery synchronization signal
Furthermore, such timing structure provides comoatbilty
‘with legacy UMTS Low Chip Rate TOD (LCR-TOD) networks
{also known a6 TD-SCDMA networks)
{1} 36 Americes, “3GPP LTE for TDD Spectrum in the
“Americas,” Novernber 2009.Physical Cell ID
Secondary Sync (No*)
Primary Syne (No?)
Physical Layer Cell ID
LTE defines 604 unique Physical Layer Cell Identties.
These identities. are arranged as 168 unique 62bi
‘Sequences representing unique cell group Kentites. Each
‘ofthese sequence is then serambled with one ef three 62:
bit zedoffchu sequences to get 168 * 3 = 504 unique cell
Identities. Each eN transmits one of the 168 unique 62-
bit sequences on the secondary syne signal and one of the
tivee unique scrambling sequences on the primary syne
‘signal (.e., secondary syne signals are serambled with one
of the thvee unique zadof.chu sequences transmitted on
the primary syne signal). The UE first acquires the primary
syne signal to know the unique 62-bit zadoff-chu
sequence (fiom a set of three sequences) and get time
synchronized with the system. Using ths information, the
UE tes coherent detection of tho secondary syne
‘information to extract frame timing and the PCI. Hence,
‘the UE can easily decode the secondary sync signal and
igontify the unique PCI,
3 | System Acquisition
aL3 | System Acquisition
PBCH
UE
Master Information Block (MIB)
Master Information Block
{OL System Bandwidth, System Frame Number,
ltl Antenna Configuration, PHICH Configuration
MiB information repeated
in 4 consecutive rames
ens
_—
toms
Radio Frames!
Slot
Subtrame 0
Subtrame 9
aii | Center 72 subcarriers in the Dandwidth used ]
SF System Frome Number
‘Tne Master information block (MIB) is important system
Information that an eNB broadcasts every 40 ms with 2
repeat broadcast every radio frame (10 ms) on the PBCH.
‘The logical and transport channe! for the MIB broadcast
Infoxmation are the BOCH ang BCH respectively. The MIB
information and parameters include:
+ Physical Layer parameters lke
bandwidth, MIMO trensmit antennas (MIMO
Information is masked with the CRC of MIB), and
reference signal help @ UE configuration to receive
and transmit messages.
the LTE downtink
+ The system N) helps in
synchronization and provides a source of reference to
find the system information blocks.
Frame Number (
~ System Frame Number (SFN, mod 4 = 0) starts
the tranemission of now MIB information on the
Pack
= In each of these four radio frames, four symbols
x72 subcarriers are used to send the MIB,
82
In each ofthese four radio frames, the came MIB
Information is peated
IMIB content only changes at SEN mod3 | System Acquisition
BCH Processing
| mansport Block 7 -
OR
‘GRC Atchment_—) ——_
4: _ [Transport Block [areRem
ee Sie
Raya Ker,
pS teribi
ing
i
oseners
“1
‘This side shows the BCH processing in sequence. The first
step in BCH processing is the CRC’ computation of the
lranspert block that contains MIB information, The
computed CRC Is then appended to the transport block.
Talking convolution coding with the rate 1/3 and
constraintiengih seven is used at the channel cocing
block. The three output streams of the channel coding
forms the data (Party 1 and Party 2 sub packets) where
the data packet contains exclusively data bits while parity
1 and 2 eub-packets contain only parity bis essential for,
error correction. All three subspackets are of the same
length equal to that of the transport block. At the rate
‘matching, combining of the three sub-packets with
‘puncturing yields a single sub-packet that forms a code
\word. The code word is now applied to the Physical Layer
‘processing for system informiation broadcast on the PACH.
833 | System Acquisition
PBCH Processing
a
34
rows
5 | Sent
econ ie
(Moos. =2 | Ce ofowa
| Sent |
Layee: Ce)
‘yak Procecing Mate
‘This slide shows the PACH processing in sequence. The
MIB information contained in the code word Is fst
‘rambled with the cell 1D. The randomization ofthe bits
will provide the receiver (UE) with a means to identity the
‘source of transmission (eNB). The scrambled codeword
bits are now mapped to complex valued symbols using the
(QPSK modulation scheme, This provides & modulation
fain of two, The complex value symbols of the code word
is then layer mapped and multiplied by a suitable
precoding mattix to derive multiple streams for MIMO
transmission - 2, multiple copies of the same code word
is tranemited on cifferent antennas (mapped on different
layers). LTE supports two or four antennas for transmit
diversity. Resource-eloment mapping and OFOMA signal
generation are pxetormed separately for different layers.
‘The procoded data stream is mapped on the scheduled
radio resources by the resource-clement mapper. Final,
‘the MIB information is transmitted on the PBCH after
‘OFDMA signal generation,
843 | System Acquisition
Exercise: Locate the Signals/Channel
* Map the Primary and Secondary sync signals on
the LTE resource grid.
Map the Physical Broadcast Channel on the LTE
resource grid.
Questions to ask yourself include:
—Which and how many RBs?
— Which symbols?
as3 | System Acquisition
Acquiring SIBs‘Ariswors tre
How many OFDMA symbols are
+ Where are SiBs ? POSCH
+ How to find PUSCH? PDCCH
Control Format Indicator (CFI)
‘Why does a UE Need to look at PCFICH here?
+ How many symbols occupied by POCCH? PCFICH
(Once the UE has read the PBCH, it needs to read the
FPCFICH, The PCFICH carries the Control Format Indicator
(CF) fle, which indleates tothe UE the number of OFDM
‘symbols in the sub‘rame that wil erry the POCCH. The:
POCCH eatties information about the radio resourees for
the POSCH that will eary the SIB information. The CFI
Information s-3.2-bi number, containing a number - one
to four - indicating the POCCH channel. LTE supports a
‘maximum of three OFDMA symbols to carry the POCCH
‘when the number of RBs is 10 oF more in cases of FDD.
3 | System Acquisition
a73 | System Acquisition
PCFICH Processing
J eave
‘Block Coane
goa
ode werd (22 is)
Seramoior
1b and Sotsrane No}
(ape + ee ec
4/2/3 Pecoding Nate
(2-2
Se
mitseg ea trant | =)-(s)-
‘The PCFICH fs @ physical only signal that carries the CFI.
This slide details the PCFICH processing In sequence.
Block ceding with rate 1/26 is performed on the nt CFI
to generate a 22bit code word. The code word is then
serembled with cell ID and the subframe number. The
seramibling Sequence enables the UE to identify the eB
‘and the subframe number to which the CF is received.
[Modulation converts 32 coded symbols to 36 modulation
symbols.
883 | System Acquisition
Time-Frequency Location of PCFICH
MMM Resource Element Group (REG)
4150 subcarrirs for 10 MH2
4 REGS for 16 QPSK modulation symbols
(Spocitc subcarrier location of the REGS:
function of Physical cel ID (PCH), Bandwidth)
‘The 32 bit CFI information fs transmitted using QPSK
rmadulation; therefore, CFI codeword has 16 symbols. Also
POFICH is always transmitted on the fist OFDM symbol of
the subframe as shown in the slide. Recall that the
Resource Element Group (REG) consists of four or sx
subcarriers for one OFOM symbol duration (le, 4 or 6
resource elements) snd enables transmission of four
‘medulation symbols. Each REG in the frst OFDM symbol
has four subcariers to carry 4 modulation symbols while
two subcarriers cary reference signals. Therefore
twansmission of 46 symbol CF requires four REGS. These
‘our REGS are distributed aoross the system bandwidth on
(OFDM symbol 0. These four REGS present PCFICH,
PCFICH is a function of banewidth and the physical cell 1D.
in LTE the maximum bandwidth support is. 20MHz with
4100 RBs or 1200 Subcariers. Hence maximum qumber
of REGS possible is 1200/6 = 200. But each PCFICH
‘occupies four REGS ina cali 3, more than one cell
(eNB) can have tne same PCFICH channel. Care must be
taken while system planning to ensure neighooring cells
‘do not hava the same PCFICH channel interfering with one
another.
thre
‘The four REGS that form POFICH ina collis given by
REG 1=pmodn
REG-2= (p+ a)modh
REGS =(p+2.q)modh
REG 4=(p+a.q)modh
Were,
B= Wgc/2)(Mo¥ Od 2. Ny")
= Lower bouns Ng*/2) -Nect/2
= Nga
Not Physical Cell identity (0 to 603}
Net Resource block size (42 subcarriers
Nea Downlink Bandwicth (six to 100 RBS),
293 | System Acquisition
Resource Element Groups
Why? Control channel mapping
‘Sub cartiers
23
OFDM SymmboS
+ 1 REG: 4 modulation
symbols
+ REGs occupy up to 4
OFDM symbols in DL
Subframe
+ REGs occupy up to 2
OFDM symbols in
Special Subtrame
><: Reference
Signals
Resource oloment groups aro used for defining the
mapping of control channels to resource elements.
Frequency diversity is obtained for the cantrol channel by
distributing mociulation symbols over a larger frequency
bandwicth
In the first OFDM symbol of the fist slot in 2 subframe,
there are two resource element groups in a physical
resource block, For PRE 0, the first resource element
‘70Up includes six subcarriers from 0 to 5 and the second
resource element group includes sx subcarriers from 6 to
44. AS an example, with one antenna port, reference
lgnal will ome on subcarriers 0 and 6, With two of four
antenna ports, reference signal could exist on subcarriers
0, 3, 6 and 9. In the second OFDM symbol, two REGS.
exits in a PRE in case of four reference signals and three:
REGS exst inn @ PRE in case of one or two reference
signals. In tho third OFDM symbol of tne frst lot in a sub.
frame, there ore three resource element goups in
physical resource block. In the fourth OFDM symbol of the
fist slat in a sub-rame, there are three resource element,
groups in a pkysical resource block in case of normal CP
‘and two REGS in a physical resource block in case of
90
‘extonded CP. n case of 3 REGS por PRB, the first REG has
four subcarriers from 0 to 3, the second REG has four
‘euvcarrirs from 4 to 7, and the third REG also has four
subcarriers from 8 to 11,3 | System Acquisition
Based on the information tranemitted on the PCFICH, the
UE knows how to read the POCCH channel information.
The DL Contol Information (OCH field of the POCCH
carries the scheduling information about resources
allocated on the PDSCH for carrying SIBs, user signaling
information end user traffie. The OC! information is
scrambled with a 16-bit Syeteminformation Radio
Network Temporary Identity (SERNTI) (OsFFFF) for
Identfication of SIBs. Several DCI formats have been
ofined to carry resource allocation and packet formats
‘or the POSCH and the PUSCH transmission,
DL Control Information (DCI)
+ Gonveys POSCH resource
‘allocation forSIBs (and user
signaliog/tati)
+ Scrambling: Function of S-RNTI
on3 | System Acquisition
PDCCH Processing
ay eng cevouton Coy
PoccH
Codewords
PogcH, FOGCH, POCCH,
Mutilexod
ode rss
ate Matching
| ca Seema
(cou Se No)
cae) ~
Layer Mapping: Predetermined
‘Vayk Precoding Matis
Muliple Antenna Sonera: ranamit buses
——
=) -()
(ae 2-2)
PDCCH transport block processing is similiar to that for the
PBCH transport block, The first step in PDOCH processing
'S the GRC computation of the transport block that
contains the OCI, The computed GRCis then appended to
the transport bock. Taititing convolution coding with &
rate 1/3 and constraintiengin seven is used at the
channel coding block. The three output streams of the
channel coding forms the data, party 4 and parity 2 sub
packets where tho data packet contains exclusively data
bits while party 1 and 2 eub-packets contains only parity
Bits essential for e1ror correction. All three sub-packets
are of the same length equal to that of transport block. At
the rate matching, combining of tne tres. sub-packets
with puncturing yields @ single sub-packet that forms a
code word, The code word is submitted to the Physical
Layer processing
streams for tansmission
is mapped on
resource-clement mapper.
Muluple POCCH code words are multiplexed and then
scrambled. Next, they are mapped to complex valued
symbols using the QPSK modulation scheme, This
provides @ modulation gain of two. The complex value
symbols of the code word is then layermepped and
muitipied by a sutable precoding matrix to derive multiple
92
LTE supports. two or four
nas for transmit diversity. The precoded data stream
e scheduled radio
esaurces by the
Finally, POCCHs are combined
with other channols to generate an OFDMA.3 | System Acquisition
System Information Block Type 1
+ 80me TT
eNB
+ Cell, wecking area coae
NE + Gell baring status
+ @Bxievin
+ ToD configuration
+ “Scheduling information for
ther SiBs
a
ENT SANE SAND SUNS SANA SPINS SENG SHUT
"ae
SIB type 4 Is important system informetion that an eNB
broadcasts every 80 ms witha repeat broadcast every two
rach frames (20 ms) on the POSCH. SIB type 1 messages
help the UE in eell selection. The logical and transport
channels for the SIB that broadcast information are the
BCCH and DL-SCH respactwoly. The parameters in SIBL
Inctude:
+ PLM IDs ofthe network operator,
+ Cell 1D and tracking area code information useful for
the UE on mobility,
+ Coll barring status to indieate whether the UE can
latch on to the cal or not,
+ Qfxtevmin,a scalar quantity that helps cell selection,
+ Available UL/DL radio subtrames and the special
subframe pattem (DwPTS/GP/UGPTS), and
+ Scheduling information that indicates when
transmission of other SIB6 starts and what the
periodicity is.
933 | System Acquisition
System Information Block Type 2
‘Access Probability Factor
ULBandwidth
UL Ole Pref
RACH Configuration
Ns
SIB type 2 holps the UE access a coll, The SIB type 2
parameters are:
+ Recess Probablity factor: A scalar that indicates the
‘success rate of inital access.
+ ULEARFON: Indicates the UL LTE carrer frequency.
‘+ ULBandwidth: Indicates the UL bandwiath
+ UL OVcle Prefix: Indicates the use of Cjtic Profi
(Normal or Extended) on the UL when DL uses either
‘Normal of Extended CP.
+ PRACH Configuration: Indicates the physical
resourees for the inital random access in terms of
subframe number
+ RACH Root Sequence: A logical root sequence to
generate cell-specific preambles for random access
inition
oaSIB Mapping
T= 80ms
SEN . Wa
1a
3 | System Acquisition
TE > corirrine oar cr
> seine
This slide shows tne hysical resource mapping of SIB
information on the PDSCH. SiB 1 nas a periodicity of 80
ime (8, overy eight radio frames). Tne SIB 4 inforration Is
‘ranemitted on subframe § of evennumbered radio
frames. n subframe 5, the scheduler at the eNB decides
‘where IB information should be waasmites. This,
information wi be conveyed in the POCCH. SIBs otter
then SIB 1 are scheduled based on the eNB scheduler
decsions,
5 HB > serene eres
953 | System Acquisition
‘Aeauire acter
rece
Cell Selection Summary
== )
Information aqui
ae ib
Stay lfermaton seul)
Init Asons Probedure
‘This slides shows the flow chert describing the intial cell,
selection procedure
4. The Initia! cel) selection process starts with DL
symohronization and bandwidth selection. The OL
‘synchronization procedure includes frequency
‘synchronization, slot synchronization with primary
sync signal_and PCI acquisition, and frame
‘synchronization with the secondaty syne. signal
acquisition. I any of these procedures fal, the UE wil
restart the whole procedure with another LTE cel.
Once the DL synchronization Is successful, the UE
‘ties to decode the MIB on the PACH. The MIB
provides the UE with bandwidth information. The UE
will now scale the FFT size in accordance with tre
system bandwidth information acquire,
2. Tho second stop inthe cel selection procedure is SiB
‘ype 1 acquisition. with successful bandwiath
selection, the UE tries to decade the DCI information
+0 know the SIB resources and receive the SIB type 2.
Information. For cali selection, the UE requires the
PLMIN 10 of the network, cell barring status and Rc
levmin threshold from SIB type 4. The UE frst checks
96
the PLMN ID. If i fail, the UE restarts the cell
selection procedure again with a new LTE cell
Otherwise, ifthe UE found a matching one, it checks
the coll-barred status in the SIB typo 4. I tho cll is
barred to latch on, the UE restarts the cell selection
procedure again with @ new LTE cell. It checks
another important parameter, Ri-lovmin threshold. If
the measured signal strength is higher than this
threshold, the UE proceeds to decade the SIB type 2
message on the PSH. Othenwisa, it repeats the coll
soloction procedure once again with a new LTE cel.
(On suecessful reception of SiB ype 2 Information, the
UE checks withthe accass probably factor. I it finds
a favorable value, then the UE will select the coll and
Initiate @ random access procedure to register with
‘the network. The UE starts the call selection
procedure again with @ new LTE cel3 | System Acquisition
Summary
+ AUE uses primary and secondary syne signals for timing
and frequency synchronization, identification of the Physical
Cell ID and for determination Duplexing schemes.
+ The UE reads the MIB on the PBCH to retrieve critical
system information such as system bandwidth,
+ The PCFICH informs the UE which symbols carry the
PDCCHs.
‘+ The PDCCH specifies the PDSCH resources that contain
SIBs (among other things).
+ The cell selection procedure involves the selection of a
suitable cell based on the signal strength
+ System Information Block 4 informs all the UES of TOD
Configuration
“i
973 | System Acquisition
98
Exercise
Pretend that you are a UE and you have just
experienced Power-up/Power-on.
1. Describe the order in which you will process the
following signals/channels:
-PDSCH, PCFICH, PDCCH, PECH, Primary Sync,
Secondary Sync
2. Specify the main purpose of a given channel
during network acquisition.3 | System Acquisition
True or False?
4. Tho UE can easiy figure out the PHY Layer Cel 1D jut by observing the
primary and secondary synehronization signals. -V/
2. The UE learns about the system bandieth based on the way iis
programmed or configured. x (MIB) PRCH
3, PBCH cares ll IDs so thatthe UE learns about the system. x 99
4, Resource Element Groupe (REG) are defined so that the UE knows
‘what primary and secondary synchronization sequences to look for
«uring network acquisition. \
° sh
5, SIB2 informs the Ues about the TDD configuration of the cell. -
991004. System Access Operation
Chapter 4:
System Access
Operation4 | System Access Operation
Objectives
After completing this module, you will be able to:
+ Summarize the random access process
+ Discuss the role of System Information Block 2
* Specify the format and use of a preamble
+ Show how the PRACH is mapped to radio
resources
+ Explain how collision and contention resolution
are managed
+ List examples of random access characteristics,
unique to TD-LTE
References:
a)
2)
8)
coy
(5)
(9)
102
GPP TS 36.211 ~ EUTRA Pnysical channels and
‘modulation
3GPP TS 36.213 ~ EUTRA Physical layer procedures
3GPP TS 36,300 - E-UTRA and EUTRAN Overall
description stage 2
_aGPP TS 36.306 - EUTRA User Equipment (UE) radio
access capabilities
aGPP TS 3
{MAG} Protocol specication
‘3GPP TS 36.394
{RRC) Protoco!
.321 = E.UTRA Medium Access Contrl
EUIRA Radio Resource Control
pecifeation4. System Access Operation
Random Access
Process Overview4 | System Access Operation
Random Access Procedures
Contention-Based
+ UE‘nitiated
+ Random preamble
+ Risk of collision
Ric
eNB
Non-Contention-Based
+ eNBinitiated
+ Assigned preamble
+ Guaranteed success
an
LIE suppons two types of random access procedures.
\mich one is used depends on the specifi circumstances.
+ Cantention-Based access is the “normal” access
process, and is used on inital system access when &
radio link is lost, when uplink synchronization is lost,
‘and during some handover scenarios. The UE initiates
the process by transmitting @ randomly chosen
preamble over the RACH, and then waits for a
cortesconding uplink assignment from the eNB.
‘fore it ean transmits message.
+ Non-Contention-Based access is used when the UE is
already in communication with the eNB, The network
imtiates the process by sending an allocsted
‘preamble to the UE indicating ven it can transmit.
Since the eNB controls the process, there are no
Ceolisions with ether UES and latency Is significantly
reduced.
1044 | System Access Operation
Contention-based Random Access
fi
Siaticcn)
Screen
Rao)
ena
Noncontenon asad
+ Dedleted Random Assess Preamble sllocatod in Step 0
+ Oniysteps 1 and 2 appeabe
“The bssic steps involved in contonton-based access are:
4. Random Aecess Preamble Transmission: Once @ UE
has eelected a call it listens to the system overhead
information transmitted an the downlink. The system
Information blocks (SIBs) provide configuration
parameters for the network, SIB 2, In particular,
includes Key parameters for intial system access,
The UE selects a random preamble and! sends it over
the PRACH, The transmit opportunity is identified by
the RandomAccess Ragia Network Temporary ID, or
RARNTI. In LTE FDD, the RA-RNTI identities t
frame number and ranges from one to 10. It is
fbvious that multiple UES may transmit in the seme
‘eub-rame and thus use the same RANT!
e eub-
2. Random Access Response: The eNB all
resources for tne UE end sends 3 response on the
POCGH identitying which UE group the allocation is for
by using the RA RNTI, Within each ARNT) group, the
A preamble identifier is used to identiy a specific
UE, The random access response contains the timing
‘adjustment, UL resource allocation, and CellSpeciic
Radio Network Temporary ID, or GRNT.
108 uplink
1054| System Access Operation
fen
eevee
Guisiee aaa
Scere
Bicuresni)
Neneontaton Based Random Access:
+ Dodiotes Random Access Preamble allocate in Step O.
+ ontystos 4 and 2 applicable
Contention-based Random Access
'3 Scheduled Transmission: The UE uses the allocated
resources to transmit its message (euch as an RRC
Connection Request), and includes its assigned C-
RNTI and a 48-bit randomly chosen UE Contention
Resolution Identity,
4, Contention Resolution: The eNB sends a contention
resolution message on the downlink and adaresses to
emp C-RNTL if the UE sees its tomp CRNTI and
Contention resolution ID in the grant, then its
transmission was successfully recelved. The temp C-
RNTI is promoted to the GRNT, If the UE has 90 C-
NTI yet. If the UE already has @ CRNTI but loses UL
synchronization, the UE'S C-RNTI is kept and the temp
GRNT ig discarded. Otnerwise,
fr other failure and the UE must retry the access
attempt
Non Contention-based access is used when the UE is
‘already in communication with the eNB. The network
intiates the process by sending an allocated preamble to
the UE indicating when it can transmit. Since the eNB
controls the process, there are no collisions witn othor
Es, and latency i eigificamty reduce.
1064 | System Access Operation
Random Access
Parameters4 | System Access Operation
Step 0: SIB2 Parameters
| Access Parameters
* Access probability
vet
Power Parameters.
+ Initial target power
* Power ramp step
+ Maximum number of attempts
oa
+ Access barring
SIB Type 2 provides @ numoer of detailed parameters
needed to generate the preambles and control
transmissions on te RACH. These parameters include:
+The configuration of the Physical Random Access
Channel {PRACH) such as the format to be used for
tne random acces preamble, the subframes and
tte mupl instances within a subframe that can be
Used for access. Multiple instances of PRACH are
supported in TOD made to compensate for the less
‘number of UL slats evsilable withthe UES.
+ Access control settings for managing when UEs can
attempt to access the coll, including access
protabiities for different access. classes (which
determine whether the UE can proceed with the
‘access attempt oF must wait some period of time),
‘and access barring information (which limits which
UES can aooess the cal
+ Information on how to select a valid random access
preamble for this cell, based on the roat sequence
index and eyetc shit, as well as the number of non:
dedicated of sequences,
108
Settings for controling the amount of power to be
‘used wnen transmitting the preamble, starting with
the inital target power lovel, and increasing by the
power step until either tne access Is cuccesstul or the
‘maximum number of attempts is reached.4 | System Access Operation
Step 1: Transmitting Preamble
Petnmencmcomr
RACH/PRACH
ee ene
In te slide above are the steps to process the parameters
before the random access preamble is sent.
There are five possible formats for the random access
preamble, iffering by the length of the felds within the
preamble, Bigger preambles take longer to transmit and
are better suited for larger cells. The speetic format to be
sedis cet in IB 2
SIB 2 also incicates the transmit opportunity, i.e, when (in
which Frequency Resources, system frames and sub:
frames) the preamble may be sent.
‘The specific preamble sequence to be transmitted is
selected randomly using the sequence root index and
cyolie shit information from SIB 2. There are a total of 64
different sequences availabe in each coll
The initial target power level determines how loud the
preamble transmission can be to start. The goal is to
estimate the minimum amount of power needed for the
preamble to bo successfully recolved by the eNB. If no
response is received, the UE will Uy again inereasing its
power (by the power step value) until i reaches the
‘maximum number of attemps allowed.
1094 | System Access Operation
co edge)
een
iis
as) E
pee en
Preamble Format
alan
[Sequence |r
@.
‘Sequence
Xms (42,3)
(0r2 OFDM symbols
This slide explains why different preamble formats are
needed. In LTE, & UE has not synchronized with the
network in the uplink when it sends out random access
preamble. So the random access sequences sent by the
LUE at the cel edge and the UE near the eN may arrive at
the eNB at citferent moments, But the preamble should
ot interfere with the tnformation/sup-rame the eNG
receives before and after the preamble, Le., the non:
synchronized preambles are received within a
window.
‘As shown inthe figure, the preamble from the UE near the
NB arrives the earliest and the preamble from the UE at
the cell edge arrives the latest. The difference between
the artival moments is te guard time, which is equal to
te round.ttip delay plus the delay spread. Obviously, the
length ofthe rtmines the cell size; a longer
guard time supports larger cel size.
time
In oder to adress altferent coll sizes, five preamale
formats are defined for LTE TOD. Depending on the
speci forme (formats 0 to 3), 8 preamble may occupy
fone, two, oF three consecutive subrames. Preamble
format 4 occupies only 2 OFDM symbols in UpPTS field of
110
the special subframe and support a cel size < 1.4 Km of,
radius. The cyclic extension or preamble repetition can be
used to lengthen the preamble.
Note that the preamble format is determined at the
network planning stage, and only one format is used for
spect coll4 | System Access Operation
Preamble Formats
Guard
Time
oP Sequence Ea
Preamble
Cod Col
[re Sey
© | t0as25us | s0o¥e | Asubirame | 96.875 ps | -1¢ km
1 [asaarsys | a00ys | 2subtrames | 518.625 ys | ~75km
2 | 20625us | i600ps* | 2subttemes | 193.755 | -28 km
3 | esaarsus | 1600 ys" | Ssubtrames | 715.625 us | ~103 kn
ZOrOM ae
4 | saseus | 2333s | Synto | o4ys | “46
sidayt, 800 vs sequence repeated
et. GPP TS 36.241
Here are the details of five supported preamble formats
for LTE TDD. A preamble of formats 0 to 3 consists of a
cyclic prefix (to handle multipath interference) fellowed by
{an 800 ps sequence, The sequence may be repeated in
some formats, The taal length ofthe eye pref and the
sequence(e} determines haw long it takes to transmit the
preamble. Sinea the actual physica transmission occur in
‘nts of eubrames (1 ms), the remainingtime determines
how far away the UE ean be without overlapping snother
Ue's access attempt (the guard time).
Preamble format 4 occupies 2 OFDM symbols and is
intonded for use in the UpPTS field of a Special Subtrame,
LTE TOD supports more than one PRACHS within @ UL
sublrame or UpPTS unlike the FOD system wnere
maximum of one PRACH is defined per subframe, For
further details, rofer 3GPP TS 36.214 - Physical Channels
and Modulstion4 System Access Operation
Radio Frame Info (p,°)
+All Radio frames
+ Even Radio frames only
+ Odd Radio frames only
HALE Frame infotta!)
+ First Hatt Freme
+ Second Half Frame
PRACH Configuration for LTE TDD
Unlike the LTE FOO ease where all the ten subframes,
the UL, the LTE TDD has oniy limited
rhumber of subtrames for the UL. This leads to a case
whore multiple PRACH channels are mapped to the
Ssubframes to support equal opportunities for RACH 8s
with LTE FOO, Multiple PRACH chennels in each
ssubframes are informed ta the UES through @ Quadruple
PRACH Configuration. The Quadruple consists of
were avaliable
Frequency Resource Index ya): Indieates the exact GRBs
ina particular subframe time instance,
Radio Frame Info hy): indicates whether the PRACH
(Channel occurs every radio frame or only in even Radio
frames or only in odd Radio Frames.
HALF Frame Infotty?) = indicates whether the PRACH
‘occurs inthe first haf frame or the second half frame.
Uplink Subtrame number (ty) : Indicates the exact UL
‘subframe number from the start of the UL switching point
in a Radia frame.
124 | System Access Operation
TDD PRACH Configuration
lsutrames og gg lg lg lg 7g
lot cont
nas 7280
DD PRACH Configuration index 48 with
:DL Configuration 1 & Preamble format 0.
1 r | i] pea
‘enas/72 80
Fronuoney Oomain $s Rs and mulbe instances within subfome
Time Darin Yansrit opportunity fs efned in 36° 36.214
able 713 PRADH configuration” and broadcast a \B2
sila,
‘This slide shows how the PRACH is mapped to the physical _configutaion exemple is ilustrated here, which consumes
resource, 418 percent of tre UL resources of a 10 MH system.
In LTE TDD, beth UL and OL transmissions share the same
andwista, Hence the number of UL subttames avaliable
for UE transmission is very less. as compared to FOD
version, To support same number of PRACH channels as
FDD mode, Each UL subframes support more than one
RACH instances. In frequency domain @ PRACH
sx consecutive resource blocks, the Frequency location
‘and the number of PRACH instances are determined by
the parameter prach-Confignto
The times when a random access can
determined by the speciic PRACH configuration. SIB 2
Identities whien ane of 64 possible “transmit opportunity
patterns will be used In that coll. For exemple, PRACH
onfiguration index 18 with UL:DL Configuration of ibe.
DL and 2UI subframes per Sms) indicates that preamble
format 0 will be used, the random access can be sent in
any half frames with in @ system frame, and the access
can appear on all UL subrames (2, 3,7 and 8}. On the UL
sub‘rames 3 and 8 two instances of PRACH is supported
con the ether extremes of the Bandwidth, This
gent are
1134 | System Access Operation
meg
electro
Subcarriers for Preamble Formats 0-3
11.08 MH2/1.25 kll=864 subcartons
6 Bex 12
subearrers
72x15 We
91.08 Miz
Fes
ya
(Guard betweor PRACH.
& PUCCH/PUSCH to avoid interference
X'S have a close look at the subcarrier mapping of
PRACH for Proambie formats O to 3 that occurs only in U
Normally, six resource blacks contain (6 * 12 =) 72, 15
ke subcarco ing @ total of 72.4 15 = 1.08 Mi
of spectrum, Random access preambles, however, use
864 1.25 kH subcarriers within the same amount of
spectrum. The preamble itself uses 839 of those
subcarriers in the center of the resource blocks with tre
remaining 25 used as glard subcaniers to avoid
interference with adjacent sub4| System Access Oper:
Only in UpPTS
et
Subcarriers for Preamble Format 4
‘Subcarier spacing7.5 kiiz
1.08 MHa/7.5 kite
6RBsx12
#72 subcarriers
72x18 ue
=1.08 Mi
6
For the PRACH, with preamble format 4, Random access.
proambies, uso 144 7.8 KHz subcarrier: within the
spectrum aguivalont to 6 resource blocks, T
ieelf uses 139 of those suocariers in the center of the
resource blocks with the remaining § used as guard
subcartiers to avoid interference with adjacent
subcarriers4 | System Access Operation
PRACH Transmitter Block Diagram
e |.
Mapping
{LTA
ovate
EH Prefix
Further
ee)
ers
processing
‘eam
‘The selected Zadolfchu sequence (le, the random
‘access preamble) Ie processed ike any other uplink
channel, using SC-FDMA, The sequence is fist applied to
2 Discrete Fourier Transform (OFT to transform the signal
The transformed signal is then mapped onto the
appropriate set of 1.25 KHz PRACH subcarriers for
preambles formats 0 to 3 while the preamble of format &
Is mapped to 7.5 kHz PRACH subcarriers. The modulation
mapped subcarriers are then appliod to an Inverse Fast
Fourier Transform (IFFT) to generate a wiceband Single
carrer lke me domain signal. A cyclic prefix is added to
provide protection from mulipatn interference and the
resulting signal fs transmitted over the at.
1164 || System Access Operation
Transmit Power
Se
Preamble Transmission Power
‘Subirames|
The rancom access is often the frst transmission from the
UE and itis short transmission (less than 3 ms at most).
CConsequenty, there is no opportunity to de power contvol
of the PRACH from the network. Instoad, the UE must
estimate the minimum amount of power it needs to send
the access without causing excessive interference.
‘Tho UE receives a number of key parameters for PRACH
power control in SIB 2, including
+ Preamble Initial Received Target Power: The power
level the eNB would like to receive for a random
‘access, The default value s-104 dBm,
+ Power Ramping Stop: The smount of additional power
to be used every time the random access is
attempted again This can be O, 2,4 or 6 dB,
+ Preamble Trans Max: The maximum numberof times.
2 random access can be attempted before the UE
v0 Up, toa maximum of 20 attempts
+ RA Response Window Size: The number of sub:
frames the UE will wait fora response after a random
‘access, between two and 10 sub frames,
The UE will determine the initial power leve! based on the
Preamble Infial Received Target Power value end an
‘estimate ofthe uplink path oss (PL) as follows:
Peat = erin (Pr
Power + PL)
Preamble Initial Received Targot
Where Paar is the maximum transmit power of the UE,
based on its category.
If the eNB falls to responc to the random access in the
designated time window (RA Response Window Size, then
it can repeat the random access (after walting at least
four more sub-rames), increasing lis power level by the
Power Ramping Step value. If no response Is received
attr Preamble Trans Max attempts the UE will return an
‘access failed” indication,
a74 | System Access Oper:
Step 2: Random Access Response
PDCCH/PDSCH
eNB
MAC Random Access Response
Cie ese
\orabactatineator ‘Timing Adjustment (TA) (24 bits)
[Or RA Preamble Identifier} | UL Grant (20 bits)
‘Temporary C-RNTI (46 bits)
The random access is carried by the POCCH, which
addresses to a group of UES with the same RARNTI, end
by tho POSCH, which cartios the MAC random access
If tne eNB tells the UE to back of, @ Backoff Indicator MAC
header is used. Otherwise, a MAC header carries the RA
preamble identifier, which is used to distinguish between
LUE® with the came RA-RNTI
The MAC PDU contains the timing adjustment, the UL
grant, and a temporary CRNTI
184| System Access Operation
eeu
en
ra
NG
No. ZL
Reception of RA Response
ae ta
Identifier
Nei
eset
Yes
Backoff and Retransmit
ey U
Yes
ores
aut
on
oe
eye
Since the UE does not know exactly when to expect @
response from the eNB (it only knows how fong to wait),
‘each random access respanse must identify which access
attempt it relates to. Tis is eocorplished by using tne RA.
RNTI in the POCCH, and including the received RA
preamble identifier In the MAC header, Since the UE
kenows when i sent the random access, it knaws which RA
NTI to look for. listens to tne RA response until the RA
‘window expires.
‘There are our possible responses from the eNB:
1 The RARNTI and RA preamble identifier in the
response match the UE's random access. This is the
‘success case and the UE can proceed to the next
step,
2. The RARNTI matches but no RA preamble identifier is,
found, Ths is @ colision with another UE and the UE
must back off ana ty again
‘3, Nelther the RA-RNT nor the RA preamble mateh. The
response is intended for someone else. The UE must
continue to wait for te response. If the RA window
‘expires, tho UE wil back off and try again.
4
Note that the eNB can also explicitly tell the UE to
back off in the response if there is 2 colision, or even
f the random access was otherwise successful. This
‘can be used for access control to soread out inital
access attempts overtime.
1194 | System Access Operation
Step 3: Uplink Transmission
oo
Random Access Response (RAR)
‘POGGH and POSCH
[__‘Seheduted ansmission > Transmission
it ULSCH/PUSCH
In the success case, the random access response from
the eNB Includes the additonal information (the uplink
gant) that tne UE needs in order to send its transmission
(such as an RRC Connection Request message) to the
network,
‘The POCCH indicates where the UE can find its Random
‘Access Response (RAR). The POCCH is addressed to the
RARNTL, which depends on the subframe the UE nas.
sed for sending a preamble.
IF the UE needed to use tne random accose procedures to
request intial uplink grants, te inital uplink gant
Information will be sent in a MAC RAR message as
Indieated in the slide. The RAR includes the timing
‘advance command, UL grant, and temporary CRNTL. The
uplink grant Gefines the resource black allocation to be
used.
1204 | System Access Operation
Step 4: Contention Resolution
POCCH and
a POSCH eNB
Ca
atch
Yes Yes | Random access process comoiete
Yes No Contention, Back off and try again
No TT [Waianae ater
Te UE will watch for contention resolution from tho eNB.
Iti receives one, it verifies thet the temporary CRNTI in
the assignment matches its temporary CRNTI, fa UE
contention resolution IDis algo included, the UE will check
that it matches the one it sent previous. If all ofthe IDs
match, the UE knows that its intial access was successful,
and its temporary CRINTI becomes its actual CRNTI ifthe
UE already has a C-RNTI bofore the random access
resumes its CRNT
ifthe UE Is unable to match the 1Ds within a given number
of subframes (the Contention Resolution Timer, given in
SIB 2 set between eight and 64 subframes) the
contention resolution process has failed, and the UE must
back off and go back to step two of the random access
procedure,
aaa4 | Systom Access Operation
RRC Connection
Establishment
‘ila4 System Access Operation
RRC Connection Establishment
Rice esnicnen)
Teena
Before the UE can receive any services from the LTE
network, an RRC connection must be established. The
RRC connection is a logical connection betwaen the E:
UTRAN and the UE, and is used forall signaling between
the UE and the EUTRAN, The EUTRAN can also use the
RRC connection to track the location and state of the UE
troughout ino ie of ts calls or data sessions.
The RRC connection setup process begins with an RRC
Connection Request from the UE, This message carries
the UE's identity (ts STMS!) and a cause value indicating
the reason for the request. Since an idle UE does not have
‘an exsstng connection, this message must be sent using
the RACH,
The eNB responds with an RRC Connections Setup
message, containing the parameters needed to configure
the signating radio bearers (SRBs) and data radio bearers
(ORB). The setup message wil also include the UE's
‘assigned C-RNTI this 1D wil be used in all future signing
‘to uniquely identity the UE.
‘The UE then acknowledges the successful configuration of
‘the RRC connection with an RRC Connection Setup
‘Complete message, along with an RRC transaction ID and
2 dedicated Non-Access Straturn (NAS) message for the
MME. Tne UE may also include the PLMIN ID, MME group
ID and MME cade, i it knows the specific MME tnat it
reeds to communicate with. A his point, the UE moves to
the RRC Connected state.
1234 | System Access Operation
124
Summary
+ The Random Access Channel (RACH) is used to support intial network.
~ Multiple UEs can access the network at the same time.
— Randomly selected preambles are used to minimize the risk of
collisions,
+ System Information Block 2 (SIB2) provides the parameters the UE.
needs lke PRACH configuration, PRACH instances, Access controls,
Preamble selection & Power management
+ LTETDD supports Multiple PRACH Instances within a subframe.
+ In LTE TDD, Preamble formats 0-3 can occur in any UL subframe while
Preamble format 4 will always occur In UpPTS fied.
+ LTETDD support both 4.25KH2 and 7.5KH? subcarrier spacing for
PRACH channel
“aie4 | System Access Operation
Review Questions
What information does the UE receive from SIB 2?
Why is there a need to define multiple preamble formats?
Why is there a need to support multiple PRACH instances?
How will the UE know the PRACH instance?
Which preamble format is suitable for very small size cell?
How does the UE know whether its access attempt is
successful?
7. Why does the UE increase its PRACH power if the network
does not respond?
8. What is the primary reason of non-contention-based random
access?
OO rONE
ae
1255 | TDLTE Call Setup
Objectives
After completing this module, you will be able to:
* Define an EPS bearer
+ List the key steps involved in setting up a data
session
* Illustrate how mobility is handled from a network
perspective
References:
[1] GPP TS 36.331, "Radio Resource Control (RRC)
Protocal specification
[2] 36° 23.401, “General Packet Radio Service (GPRS)
fenhancoments for Evolved Universal Terrestial
Radio Access Network (E-UTRAN) access’
[3] 3GPP TS 24.301, "NonAccess'Stratum (NAS)
protocol for Evolved Packet System (EPS), Stage 3”
128|_signatir
This picture shows a highlevel view of the main
procedures of Network Attachment. Network Altachment
12 UE needs to resieter
with the network to receive servicgs. AMter the UE has
acquired the network and nas establishes @ Signaling,
Radio Bearer (SRB) with the eNB, it performs an initial
‘attach procedure, During the inital attach procecure, the
{ENB selects an MME and then establishes a UE-specifc,
SL signaling bearer withthe MME.
The next step is authentication. Authentication in LTE 1s
mutual authentication (Le, te UE and
‘authenticate each other). Then, the serving gateway (5:
W) and packet gateway (P-GW) are selected by the MME.
The always-on IP connectivity for users of the Evolved
Packet System (EPS) Is enabled by establishing a default
EPS bearer between the UE and PGW. The attach
procedure may tigger ene or muitisle dedicated bearer
establishment procedures to establish dedicated EPS
bearers for that UE, The IP address can be allocated
uring default bearer setup, or it can be allocated after
efault beater setup.
network
Network Attach
MME Selection and sa |}
ing bearer setup
5 | TD-LTE Call Setup
Wit» a successful Attach procedure a
established for the UE in the MME, and 2 default bearer is
establishes between the UE end the P-GW, thus enabling,
always-on IP connectivity tothe UE,5 | TD-LTE Call Setup
We
1A, Attach Request
Step 1: Initial Attach
Garam)
su
MME,
40. Initial UE Message
1D. DLNAS Transport
4 SLM Bearer
4A, Attach Request: The UE initistes the attach procedure
by the transmission of an Attach Request message,
which contains the International Mobile Subscriber
Identity (IMS), old Globally Unique Temporary 1
(GUTH, 0° Packet-Temporary Mobile Subseriber 1D (P-
‘TMSI), the UE network eapabily, PON Connectivity
request, Protocol Configuration Option (PCO), PLAIN
ID and olé tracking atea ID (TAI) to the eNB, UE
network capabilities Include security algortnms, Key
generation the inter-RAT HO
Jpported by the UE. The PDN connectivity procedure
is used by the UE to trigger creation of default
bearer to a PON. The default bearer creation
messages can be transmitted independenty or
igeybacked using the Attach-relatod messages. The
default bearer creation to the default APN Is done
with the Attach procedure. Default bearer creation to
thor PONS can be done during Attach or at a later
stage. The PCO indicates ifthe UE is requesting fo
Iva or IPV6, or IPv4 and IPV6; both address the
capability ofthe IP stack associated with the UE.
Cerivatives and
1B, MME Selection: Ate recestion ofthe attach request,
130
the eNB selects @ MME. One eNB Is connected to
‘multiple MMEs in a MME Pool Area, soit has a choice
to select any MME, A poo! area provides network
redundancy. one core network node fails, ts load
can be cistributed te another MME. It also provides.
load balancing by connecting eNBS to multisie MMES
‘and sharing traffic on these multiple nodes to avoia
network congestion. Load balancing between MMES
‘enables the network to ensure equally laced MMES
within @ pool area. It also enables UES to be
registered with an appropriate MME to balance the
load between various MMES. This is achieves by
setting a weight factor for each MME such that the
probability of the eNB sclocting an MME ic
proportional tos weight factor. The wolaht factor 1s,
proportional to the capacity of an MME node relative
tocther MME nodes, ¢¢, 3 newly installed MME may
have a much higher weight set. This alows the new
MME to be quickly loaded to its capacity. The MME
Load Rebalancing functionality permits registeres
UES to be moved from one MME to ancther MME
(within @ poo! area) for MME maintonanco periods.
the5 | TD-LTE Call Setup
Step 41: Initial Attach (Continued)
Lrewu
>
Gat)
;
‘1A. Attach Request Ne
——1A. Attach Request. _
40. Initial UE Message
41D. DLNAS Transport
TE SEMME Bearer
1G, Initial UE Message: With the successful selection of
fan MME the, the UE sends an intial UE message (an
SLAP message) to the selected MME containing the
eNB SLAP UE Identity. Also, the attach request
‘massage Is plggybacked on this initial UE message.
41D, DL NAS Transport: The MME processes the Attach
request message snd sends back a NAS reply, ke an
Identty request or Authentication request. The NAS
reply from the MME is cartied on the S1-AP DL NAS
Transport messege. This message carties the MME
SLAP UE Identity. Recestion if the MME S1/AP UE
Identity in the 81-AP message comsletes the S1-MME
bearer establishment procedure,
AE, S1:MME Bearer sotup is complete.
1315 | TD-LTE Call Setup
Security
1325 | TD-LTE Call Setup
E26. authentication Reauest
Step 2: Authentication and Security
8 ew
ue MME 2A, Authentication Data Request
en
pera
i
Steril)
and Compares
Coie
2A, Authentication Data Request! The network may
Intiate the authentication and key agreement
procedure (AKA) during the attach and routing area
update procecures. In the above scenario, we
consider thet the MME is inating the AKA procedure
uring the intial attach procedure, The UE sends the
first NAS message, Attach Request, 10 the LIE
network requesting for registration. This message
‘contains the identity of the UE - 2 referonce number
1 tho last used security parameters called Key Set
Idantifiers and UE capabilities, which includes security
Information tke the encryption and integrity
algorithms supported by the UE.
2B, IMSI-> K: The MME uses the IMSI number of the UE
that i received in the Attach Request message to
request security perametors from the HSS/AUG.
2, Authentication Data Response: AL the AUC, the IMSI is
‘mapped te a secure parameter called the Subscriber
Key (K). The HSS/AUC uses K,
2 randomyy generated number called
RAND, in a predefined set of algorithms to generate
the secuny parameters: KRES, Kyaye 2nd AUTN. XRES
‘Authentication
20.
26.
Is used by the MME to authenticate the UE.
MME Stores Kygue and XRES: Kigye is the key
parameter to gonorate the otner parameters
necessary for eneryation and Integrity procedures. An
‘Authentication Token (AUTN) is used by the UE to
‘authenticate the network, The HSS provides these
security parameters to MME in the Authentication
Data Response,
Authentication Request: The MME stores all the
parameters sent by the HS$ and sends the AUTN,
KShye 89d RAND to the UE in the NAS
‘Authentication and Ciphering Request message. The
MME may have muitile sets of EPS authentication
vectors stored, Both the MME and UE share an
Identifier called the Key Set Identifier (KSI) to dently
the set of Keys being used. The KSI enables the UE
‘and MME to gyno with the security context when tne
LUE moves from Idle to active mode. This parameter i
similar to Cipnering Key Sequence Number (CKSN) in
legacy GSM/GPRS networks. Using S:,AP Downlink
NAS Traneport and RRC DL Information transfer
messages, the NAS messsgo can be routed to the UE,
1335 | TD-LTE Call Setup
(Continued)
ay
IME 2A. Authentication Data Request
Tea
Key (Kane RAN
°
2G. Authentication Response.
Step 2: Authentication and Security
i pe
K EAS and NAS Seouniy procedures >
2F. UE Generates and Compares: At this point, the UE
generates a local AUTN and validates the network.
Moreover, it also calculates the Kuse end the
responce value (RES)
2, Authentication Response: Kysye Is stored in te UE to
generate NAS and AS security keys while RES is sent
back to the MME in the NAS Authentication Response
0
2H, MME Compares: The MME now compares the RES
provided by the UE and the one received by the HSS.
In cases of @ successful match, the UE is regarded as
authenticated.
21 Securty Mode procedures: After a successful
authentication procodure, the network intistes the
security procedures for the Access Stratum and the
Non-Acoees Stratum, After the successful conclusion
of the security procedures, the signaling messages
between the UE and the MME/SGW are being
ciphered and integrity checked, and the trafic path is
also ciphered
1345 | TD-LTE Call Setup
S-GW and P-GW Selection
Ba sel we
ME
gs
Update Location Request
Update Location Ansner |
i 2 Son ai |
ey Paw)
@ |
Mme
Update Location Request: Mter successful authentication
fond secunty procedures, the MME updates the HSS witn
the current location of the UE using tne Update Location
massage. The HSS replies back with tho UE's subscristion
information in the Insert Subscriber Data message to the
MME, The subscription information lists all Information
‘about the services that the UE is registered to with APN
configurations. The APN configuration carries tno PDN
type, QoS characteristics (Ike QCl, ARP and AMER), PDN
connectivity (1PV4,IPv6 or both) and the type of IP address
(static or dynamic} supported by that PON, Subscription
data also incieates whether the UE is allowed to connect
to the P-GWon the visited network fr that service.
ava
na
Update Location Answer: The MME leas about the
default APN from tie subscription information, and
initiates the ereatlon of the default bearer toward the
default APN, The MME maps each APN to a particular P-
(GW, The P-GW is selected based an tne subscription dat,
In LTE, the P-GW con support either GPRS Tunneling
Protocel (GTP) or Proxy MIP (PMIP). The mobilty
‘mechanism supported by the P-GW selected plays a cole
in selecting the S.GW.
1355 | TD-LTE Call Setup
Default EPS Bearer
Setup
ae5 | TD-LTE Call Setup
8 a
UE
A LUE Capability Enquiry (DCOH/SRBA)
f weccopabinpRequest
LUE capability Information (OCCH/SREA)
Sas eie ets on Veruca
FDD and/or TDD bands)
[oecommiiyRarcontttist | ‘
Finding the UE Capabilities
‘After the RRC connection establishment, the network
learns about the UEs’ racio cepabilly including the
support to TOD (through a specific TDD band) through the
UE Capability Enquiry and UE Capebilty. Information
messages. The eNB can retrieve the UE's radio capability
through tne UE Capabllty Enquiry message. This message
is tanemitted on the DCCH/SRBA In the acknowledged
mode, Using the capability enguily message, the eNE
requests that the UE provide its radio access capabilities
for Duplexing mode, radio access technologies supported
(og, EUTRA) and the security capabilles such as tne
‘lgorthms supported for integrity heck and encryption.
In responee to the UE capability Inquly, the UE returns its
capabilties associated with duplex, access and security
modes.
+ LTE TOD euppot Is Indicated through E-UTRA Band
into
+ Italso tists varius air interface protocol parameters
supported by the UE
+ IF the UE supports other RATS, ft lists relevant
{frequency band information
4375 | TD-LTE Call Setup
ae
30. Create Session Response
Step 3: Default EPS Bearer Setup -|
| 30. create Session Response |
ooo
o
Pow
‘Mter selection of the S-GW, the next important step is to
create tho default EPS bearer. The EPS bearer has three
portions assoc'ated with i: one is the radio bearer
‘bolwaen the UE and the ENB, the second Is the SLU
tunnel between the eNB and the SQW, and the third is
the 85/88 tunnel between the S-GW and the PGW. The
MME keeps track of all the bearers created for a UE
through @ bearer idontity. The MME initiates the bearer
creation procedure based on the subscription information
from the HSS. During the attach procedure, GTP-C control
tunnols are set up between the S-GW and P-GW and also
between the MME and SGW to vansfer signaling
‘messages. One control tunnel exsts per PON per UE,
‘The order in which the tires portions of the bearer are
created is as follows:
1. 85/38 dofaut bearer, $5 control bearer,
2 S11 control bearer, SLU Bearer S-GW endpoint
creation,
3. Default radio bearer,
4, SLU bearer completion
138
3A, Create Session Request: The MME sends a Create
38.
Session Roquest to the SQW. In this request, the
MME sends the GTP.C MME tunnel 1D, APN, APN.
AMR, PON type, PCO, default bearer context
information and, optionally, other bearer contexts
Each bearer context information includes the TFTS,
bearer ID, QoS and charging characteristics,
Create Session Request: The SGW and P.GW create
the §5/S8 default bearer and also the $5 contto|
bearer. The S-GW creates endpoints for the
bearer and sends them to the P-GW using the Create
‘Session Request message. It alsa sends the UE's PCO
parameter at enable the P-GW to decide whether to
allocate an IP address during the default bearer
creation oF not, and if 0, should it be IPv4,IPv6, oF
both
fault5 | TD-LTE Call Setup
Step 3: Default EPS Bearer Setup - |
(continued)
@ re is
MME sw Pow
| 24. create Session Request
‘__ 36, Greate Session Request :
| _38, Create Seosion Reguest___t
| 26. create Session Response.
3D. Create Session Response
‘soe
30. Create Session Response: In the above scenario, we
consider the case of the PGW all nip
‘adarees to the UE during tne default
The PGW rotuns a Greate Session Response
message to the SGW. This message contains the P.
(GW tunne! IDs for the default bearer, and also the IP
adsress.
3D, Create Session Response: The S-GW replies to the
IMME with the Create Session Response message. In
this response, the SGW transmits tunnel IDs to
establish default bearers between the S-GW and the
eNB. Note that the creation of the default bearers
between the S.GW and the eNB is coordinated by the
MME. A GTP tunne! for transfering the signaling
messages between the SGW and PGW is also
ated her.
1385 | TD-LTE Call Setup
UE
| GELARC Connection Reconfiguration
(attach Aooopt)
Step 3: Default EPS Bearer Setup - Il
fq SE BRE Connection Recooligieon 5
@
MME
3E_Intal Context Sotup Request
(astach Aecert)|
3E, Initial Context Sotup Request: The MME sends an
[tach Accept message, which contains the GUTI and
TAI Ist, This also contains the default bearer context
request, which, in turn, cari all the bear
Information and te IP address given by the PGW.
Tne Attach Accept 's embedded in the Iritat Context
Setup Request SLAP message, which contains
‘additional information on the radio bearers. that
needs to be created by the eNB. A default radio
bearer is always created; along wit it, otner bearers
may aiso be created. The bearer context information
in the Initial Context Setup Request message carries
the S1.U S-GW tunnel iD endpoint for the St-U bearer
between the S-GW and eNB,
3F, RRC Connection Reconfiguration: The eNB maxes 8
note of the S-GW tunnel IDs and forwards the Attach
[Accept message to the UE using the RRC Connection
Reconfiguration message. The eNB sends default
radio bearerrelated parameters in the ARC
connestion reconfiguration message.
140
36. RRC Connection Reconfiguration Complete: The UE
now sends the RRC Connection Reconfiguration
Complete message to the eNB. This completes the
establishment of the default EPS radio bearer.
3H, Intlal Context Setup Response: The eNB informs the
MME of the successful set up of the default radio
bearer with an Initial Context Setup Response
message,5 | TD-LTE Call Setup
Step 3: Default EPS Bearer Setup - Ill
we qe ye
MME cw Pow
on
SL UL Information Transfer (Attach Accopt): The UE
finishes the process by sending an Attach Complete
‘message to the eNB (caried in an Uptink infrmation
Transfer message over the air interface), indicating
the successful completion of the network attach. The
UE begins using the NAS security mechanisms
(encryption and integrity checking),
J, Uplink NAS Traneport (Attach Accept; The eNB
‘forwards this messoge to the MME in an Uplink NAS
Transport mescage), and provides information about
its end of the default $1.0 b
3K, Modify Bearer Request: The MME sends an Undate
Bearer Request (eNB address, eNB TEID, EPS
1D) messege to the SGW,
L. Modify Bearer Response: Finally, the S-GW
acknowledges by sending the Updete Bearer
Response (EPS Bearer Mantiy) message to the MME.
This completes the establishment of the default S4.U
EPS access bearer. The endioend default EFS
bearer establishment is complet.
aaa5 | TD-LTE Call Setup
Network Mobility
‘Tho endtocens EPS bearer Is maintained rogardless of
how far the UE may move during ite data session. Only
those portions of the bearer that are directly affected by
the UE's mobilty are reconfigured, and segments that are
ro longer required are released.
When the UE moves to another eNB, a new radio bearer is
established, and a new 81. bearer Is sat up to connect
‘back to the S-GW, The provious radio and 1 bearers are
released,
Ifthe UE moves to 4 location that isnot reachable by the
current S-GW, a new 85/88 bearer must be established to
connect the new S.GW with the POW.
Throughout this process, the UE remains connected to its
PGW, and its assigned EPS bearers continue to doliver
traffic with the corresponding QoS. The endto-end path is
undisturbed and any extemal servers or users are
uasfected by the UE's modi
1425 | TD-LTE Call Setup
Summary
+ Evolved Packet Service (EPS) bearers carry traffic between
the UE and the PDN Gateway.
— Adefault EPS bearer is always available while the UE is
connected.
— Additional dedicated EPS bearers may be configured to
provide particular QoS capabillties for new services.
+ After the RRC Connection has been established for
signaling, the UE must:
= Rogister with the network and be authenticated, and,
— Establish a default bearer and receive its IP address.
1435 | TD-LTE Call Setup
Review Questions
‘1. Why do the UE and the network perform
mutual authentication?
2. How does network learn about FDD and TDD
capabilities of the UE?
3. Why does the EPS bearer not pass through the
MME?
4. At what point in the process does the UE learn
its IP address?
5. What value does the default EPS bearer
provide?
| fnss9 Albus Confizmas Thal Ihe VF fs Valid gubsos bbe
and Hak gh 2a allowed to Aecelue seinice of Nowak
fiom Wok s+ Gommurleatirg eg, lejbmate
The OB Con
seusice
QR prsvz “Tle @mode@ about te Vet duplex Capabilily Througe,
vE Capability enguity message
4g Auge Te mmE only Prouldes Contr) fudons, it Ly not Envolued
tn aciud dads baffic
Dy Mae Duiyy Ht Radio Beaux Configerabon exchange fers
get up te deft Zacllo Beat:
LPS Geaser powder, bathe ‘alway on! aky
© ys, Te Acfaule
Corpatatiy hed tte VE Con use a dong as ads Gmmeded
Av nett, T4 tte DePaul Gos Paro mele on nd —
sider for a farsi abar Applicaton, AdAHon af af 26 | Downlink Operations
Chapter 6:
Downlink Operations6 | Downlink Operations
Objectives
After completing this module, you will be able to:
‘Sketch the overall flow of downlink operations in TD-LTE
List the TD-LTE techniques that provide flexibility,
Discuss how UEs estimate and report channel quality
(CQI/PMI/RI)
Describe the key factors in downlink scheduling
Show the structure of the PDCCH and PDSCH for both
regular DL subframes and DwPTS field of special
subframes
Explain how UEs receive data over the PDSCH
Explain the operation and benefits of HARQ Bundling,
and HARQ Multiplexing
References:
[a] 36pP 7S 36.211
rmadulation
EVIRA Physical channels and
[2] SGPP TS 36.212 ~ EUTRA Multiplexing end channel
coding
[5] 3GPP TS 36.215 - E-UTRA Physical layer procedures,
[4] 36° Ts 26.300 -
doscription stage 2
EUIRA and EUTRAN Overall
(5] 3GPP Ts 36.321 - EUTRA Meclum Access Control
(MAC) Protocol specification
1466 | Downlink Operations
oa
Overview of DL Traffic Operations
ay
@ CQ, PMI, Rr Stain
Pu un the
ve 2 Soe Scheduling
‘Algorithm
Du Resource Scene) DESH)
—— Serco
>= THARQ ACKs/NACKS —
Lets discuss an overviow of the downlink (DL) tratic
‘operation. Multiple UES may be assigned tothe DL-SCH by
‘the eNB shoe it Ie a snared channel. OL-SCH operations
are summarized inthe folowing four step procedure:
4. The first step in the sequence is the Channel Quality
Indicator (6Qh reporting by ali the UES assigned to the
ULSCH, Each device measures its racio conditions
‘and provides the eNB with an accurate Idea of the
current recatuing condition. The eNS gathers the CQL
reports from all he UEs before proceeding tothe next
step. The UES may report the CQI value in subframe
units. Other feedback includes the PMI and Rin
‘support of multipleantenna techniques.
2. The scheduler is executed at the NS
which user's data should be transmit
stanearcs de not specty a scheduling aigorthm.
Hence, the scheduling agri and the assignment
approach wil differ trom one implementation to
another. A suitable multipleantenna technique is
chosen for a given UE.
nest, The
ata fe tansmitted to the selected user. When the
scheduler selects @ user, it uses the CQl value
reported by the UE end the cata buffer waiting for
transmission to decide the resource blocks, data rete,
land modulation scheme for the transmission, The
eNB uses tho solacted configuration to send the data
over the ait. Information on how the data. is
trangmitted ie sent on the POCCH,
‘The UE receives the data and verifies the checksum.
Irene vansmission was received propery, the UE that
received the data ansmits an ACK to the eNB. Ifthe
transmitted information was received with enor, the
UE sends @ NACK to the oNE,
ar6 | Downlink Operations
Flexibility in TD-LTE
| Variable Number of HARO.
{ Salavaing
)
| HARQ Bundling |
il
ARQ Moltplexing
IMLTE FDO, UL ACK/NACK feedback was always reported
fon the 4th subframe efter each DL transmission on a)
subframe, But in TOLTE this may not bo possible due to
the unavailabity of subfiames as UL transmission. Hence
to maintain low latencies, TO-TE supports the ACK/NACK
feedback on the nest available UL subframe leaving a
variable gap for UE to process the data,
TDLTE uses variable HARQ process (from 4 upto 15
Parallel processes) as eusinst standard 8 HARQ process
Used in the FOD system to maximize the network
throughput. Here the adeitional HARQ processes aro used
to film the gaps created by the asymmetry in the UL/OL.
resouree distribution where the UE is stil waiting for the
UL slots for transmitting the ACK/NACK feedback, TO-LTE
Supports two methods HARQ. bundling ané HARQ
‘multiplexing schemes to exploit this scenano by allowing
UE to combined ACK/NACK info for a selected group of DL
Subframes and tranemit as a single feedback on the UL.
‘This will enhanco both network throughout and coverage
‘on the UL while Battery power can also be conserved. The
logic of HARQ Bundiing/Muliplexing can be extended in
[MIMO scenarios by utilizing Spatial Buncling schemes of
148
Toure,
Spatial Bundling allows @ UE to send a single ACK/NACK
feedback for the mutiple DL streams of data received
from multiple antenna ports.6 | Downlink Operations
Channel Quality6 | Downlink Operations
vet
Periodic/ Aperodie COI Reporting”)
ae
@
CQI Measurement and Reporting
a CQI Report [PUCCH/PUSCH] >
\
\
NB:
Sub-bang/Wide Banach)
Reporting
In LTE the coding and modulation schemes for downlink
tranemission are not fed; instoas, they are determines
ynamicaly, ased on Channel Quality Incieator (CQN)
reports from the UE to which the data is Deing sent
While on tho POSCH the UES continuously moni
reference signals embedded within the downlink racio,
channel. The measured qualiy of these signals determine
the largest block size and modulation rate that the UE is
capable of receiving, while stil achieving the target error
rate (a transport black etror rate of 10% or less). This
Information is encoded as a CQ! index which Idertiies a
particular enty in the QI modulation and coding table
defined inthe standards. Ths index is reported tothe eNB
Using either the Physical Uplink Control Channel (PUCCH
lorthe Physical Uplink Shared Channel (PUSCH).
When and how often the UE reports is determined by the
otwork. Periodic reporting causes the UE ta report the
(CQl at regular intervals, as specified by the network. Since
the UE may not have PUSCH resources allocated when it
comes time to send @ report it wil use the PUGCH forall
periodic reports, Both widedand CQl and UE-selected sub-
band CQI can be reported on a periodic basis. Periodic
150
reports are appropriate for both frequency-selectve
scheduling (where the network assigns resources in @
paricular subband) and frequency non-selective
scheduling (where the allocated resources may appear
‘anywmrere inthe entire banc),
‘The CQ! reper itze'f consists of the 4 bit CQ! value plus (if
needed) 2 1- of 2-bit subsband label indicating which sub:
bane the CQl rer
elates to,
Aperiodie reports are sent only when the network explicitly
requests them as part of an uplink scheduling grant, The
LUE uses the allocated PUSCH resources to report the CQI
Information and can send a report as often as every sub
frame (1 me}, Aperiodic reports ean be used for witeband
Ql, and UE-selectod subband and higherlayor
Configured (networkselacted) subband measurements,
but apply only to frequeneyselectiva scheduling,
situations6 | Downlink Operations
PUCCH and aperiodic
( acute |
(Ceperting on the PUSH:
| various transmission modes
(cero
Feedback Reports
Reporting of
Conn)
ca
| "Basie use orreponts: support
ane Transmit Dersiy),
(Ex wlan tony and
| wdebona etoithd t porty
( biterent pe ot nude oo
| ——
‘
‘Specine feedback jee
‘and relevant parameters
(Cx-periodicity of reports)
configured by RRC
UES send their feedback reports in order to support the
various vansmission modes open to them, atleast insofar
as they are able to support thse modes. The mode,
type of feedback and the applicable parameters are part
of RRC configurations as isthe frequency af the feedback
reports themselves. UES send their feedback to the eNB
petiadically on the PUCCH, or non-periodcaly on the
PUSCH. PUCCHbased feedback is inherently. periodic
(eg, once every few miliseconds), PUSCH-based
reporting is inherently aperlace since the reports goto the
NB along with the user's data, whenever it occurs. There.
are, therefore, different kinds of feedback reports from
UES. OI feedoack can be wideband (referring to the
entire allocated spectrum, 633, 10 MM, oF they can be
sub-band reports in which a particular 00 value applies to
‘each substan
CConsi¢er the UE providing subband CQI to an eNB. Upon,
receiving this kind of CQI feedback, the eNB can decide
\whien subband 1s most favorable for high-speed data
‘wanzmissions and apply the highest order modulation
appropriate for the sub-band. This is called frequency:
selective scheduling. Likewise, PMI feet
wideband or it can be sub vanced.
ick can be
RI feedback influences Ql
Techniques, including open- and closedioop spatial
muttiploxing and divers, Ried!
inalations, yiels 4bi wideband CQ! reports. Closedioop
spatial multiplexing with “RI>4” indications yiale two 4-bt
‘wideband CQl reports, where each of the CQl values refers
to diferent code words transmitted from the eNB. A code
word is the outout ofa tutbo coder
reports. Singjeantenna
1516 | Downlink Operations
CQI Table
utot Rane
0
308
ea
For a single transmit antenna, there are 16 possible CQ!
values, as shown here. The higher the 0QI index the
higher the modulation scheme, the lower the effective
coding rate, and the higher the spectral efficiency of the
corresoonding downlink transmission. The coding rate
Indicates. how many “real” data bits are present out of
1024 bits, while the efficiency provides the number of
Information bits per mocilation symbol.
For example, OQ1 Index 6 means that the UE can recelve
602/1024 = 0.5879 data bite per coded bit, whieh
20.5879 = 1.1758 data bits per symbol,
since a single QPSK symbol carries two bits.
tranclates &
1526 | Downlink Operations
PMI In Closed-Loop MIMO
Reference signals
Evaluate
options
< Preferred codebook index
t=] MIMO data transmission
Closesoop MIMO uses a predefined codebook
(precoding) to allow the receiver to inform she transmitter
(of which MIMO parameters or coefficients to use for data
‘Mansmission, This enhencement is quite useful when the
channel conditions on the downlink and uplink are very
different. This Is often the case in Frequency Division
Duplex, or FOD, systems, where the downlink and uplink
use frequencies 108 of Mz apart.
‘The UE observes the downlink channel conditons using
the reference signals sent over each antenna; each
antenna uses a slighty diferent referonce signal, to allow
‘the UE to tell them apart. The UE then evaluates t
‘options in its codebook, and determines which entry best
‘matches the observed conditions, The UE informs the eNB
of it recommendation, and the eNB adjusts ts
transmicslons accordingly, potentially avoiding the use of
antennas exnerieneing significant impairments. in this,
‘example, the UE has indicates that only two of the four
‘antennas should be used for data transmission.
1836 | Downlink Operations
Scheduler6 | Downlink Operations
Inputs for Downlink Scheduler
‘The slgorithm to be used for scheduling downlink
resources is nat epecifed in the standarcs; each vendor Is.
responsible for implementing their own solution. That
sald, any scheduler can take into account 8 number of
possible Inputs in order to make optimal use of the
available resources, These inpuls may Include:
+ QoS Requirements: Subscription parameters. and
application requirements (euch 98 guaranteed bit
rates) determine the amount of resources needed
and the scheduling strategy (persistent vs. nom
persistent allocations, Intervals between allocations,
and s0 on)
+ Uplink Feedback: The reported COI values and the
ACK/NAGK indications from tne UES determine how
‘quickly the UE can receive date and how soon the
scheduler can move on tothe next packet.
“+ Butfer Status: The size ofthe queues in the eNB, and
the age of the gackets, can influence how urgently @
particular UE needs to be served.
+ TDD Configuration and Special Subframe Pattern:
‘TDD UL/DL Configuration and the Special Subframe
Pattern information will ffect the resource avaltabilly
‘and latency due to switching periodic.
LUE Capabiities: The physical cazabilties of the UE
Itseif establish the types of allocations it can handle.
‘raffie Model: Traffle patterns may influence how
resources are allocated by, for exampi limiting the
dota rates offered to any single user during busy
periods inthe network
Radio Resources: The actual radio resources
‘themselves (the subcartiers and symbols grouped
into Resource Blocks) are the Key Input into the
‘scheduler function. The more resources there are the
‘mote can be allacated tothe users.
1556 | Downlink Operations
a
Downlink Scheduler Outputs
Regardless of the actual algorithm used, the outout of the
schedblor is the same. The scheduler must decide:
+ Which users will recetve resources in the next
Intoval tan solect one or more users among al the
RRC-connected users.
+The transport block size {the number of bits) to be
ent to each user. It needs to deetde how much of the
resources should be given to individual scheduled
users. This depends on the QoS of this user, the
available resources, the amount of data buffered for
this user, the user's radio conditions, the resources
required for on-going transmissions (ce-transmission
‘of packets that were NACKed!, etc
+ The number of resource blocks required. This is,
determined based on the transport block size and
‘coding.and modulation scheme used.
+The specifi coded bits to be sent. The eNB decides,
the actual encoded symbols that It would send among
the turbo-encoded symbo's.
156
The modulation scheme to be used. The eNB
determines this based on the UF's radio condition,
The duration of the allocation (persistent or non-
persistent). The eNB supports both persistent and
on-persistent scheduling. The duration of non:
persistent allocation is only for this subframe.
The HARQ Bundling/Multplexing mechanism is
decided only for the cell edge UES to improve
coverage.6 | Downlink Operations
Resources
nba
Resource —— [rant ]ra nt]Rena]Re nal
(fee a fea n2]aan2]aso2| RB 2]
sou Block :
i wea [roe
& = wea | Fae
a wea [re
Te basic unit of resource allocation is a resource
clement, which consists of one subcarrier for ane symbol
A resour 3 holds one modulation symbol that can
represent two, four or six bits of data, depending on the
‘modulation schome being used (QPSK, 16QAM, or
4 QAM).
Resource elements are organized into resource blocks
that contain 12 consecutive subearrors over six or seven,
symbols, depending on the 829 of the cycle prefix boing
used; thus, @ single resource block holds 72 or 84
symbols. A resource block is the smallest resource that
can be assigned toa UE.
For efficient allocation purposes, resource blocks may be
s7oUped Into resource block groups, each of which holds
cone, two, three, or four resource blacks, depending on the
system bandwith
a576 | Downlink Operations
Non-Persistent Scheduling
a
Scheduler performs
ynamie scheduling
br
ieee
overhead a
are valid for one sub
Gee
‘This side illustrates the dynamic resource allocation
scheme In the downlink, where the resoutee allocation
Interval can be as s
location applies only
corresponding Dol is re
te receive adeitional data
fort a one miligecond. The resource
the eubrame in which the
od (@
allocation). At the end of the sub-frame, the
allocated resources nd must wait
er the POSCH
loses the
another DClin order
While this epproach allows the transmission format to
‘adapt to current radio conditions on every allacation the
‘addtional signaling overhead and scheduling delays make
on-persistent
sensitive or bursty applications.
158
locations. suitable only for non-delay-6 | Downlink Operations
Downlink Transmission
1596 | Downlink Operations
PDCCH (QPsk)
ver
ee OLE 2)
UES PDSCH (QPSK, 160%M or 64QAM)
$e
Oo
Generic Downlink Transmission
(nce the scneduler has made its decision it wil format the
packet for transmission over the PDSCH. Since the POSCH
|g a shared channel the UES do not Know when their
transmissions will be ent, what radlo resources have
been assigned to them, and what formats are being used.
‘The eN8 uses the POCCH to convey this information
Each UE was assigned a CellSpecific Radio Network
‘Temporary 1D (C-RNTH when it frst accessed the network
This GANT! Is used to identity which usors nave data in
the POSCH; each UE scans tne contents of the POCCH for
Downlink Control Information (OC) associated with its C-
NTI, If there i a maten, the corresponding allocation
information tells the UE where to look in the PDSCH and
how to decode the data
1606 | Downlink Operations
coe | Aniiome
PDCCH and PDSCH
The Physical Downlink Control Channel (POCCH) carries
control information from the eN8 to the UES. A POCGH is a
set of Control Channel Elements (CCES) each of which
contains an uplink assignment, a downlink assignment,
‘and uolink power control
The content of @ CCE may be common tll UES or may be
specific to a pancular UE.
snmands, of other information
A resource element group
Clements (iit appears in sot 0) or four resource elements
(in gots 1, 2 and 3}. A CCE occupies nine resource
‘element groups and 8 single POCCH may contain one, two,
four or eight CCES, depencing on which of the four
possible PDOCH formats is being used. The Physical
Control Format Indicator Channel, of PCFICH, tells the UES
what the format of the POCCH is, POCCHS aro always
found in the fist one to four slots of each sub-trame; the
exact numberof siots le determined by the PDCCH format
‘and the number of resource biocks lathe radio channel.
cits of altner sx resource
Each UE will sean one er more POCCHS looking at t
CES to determine whether they contain information that
pertains to that UE. In the case of a downlink resource
‘assignment, the OCE will contain DC! associated with the
UE's assigned C-RNTL
‘The POSCH contains the actual data and occupies the
remaining resource elements in the suoframe thet ere
not being used for other purposes (such as reference
signals)
To maximize the network throughput TDLTE allow data
DwPTS field in special subfreme
‘much similar to DL. subtrames.
\wensmission on the
1616 | Downlink Operations
Downlink Control Information (DCI)
In order for the UE to be able to find and decode its data
fon the POSCH, it must fist be told what resources are
‘boing used, which bits are being sent, and how the data,
was encoded. The PDCCH contains (among ether things)
BCt blocks that provide uplink allocations, downlink
allocations and power control commands for specific UES.
‘location DCIs desoribe the specifies of the uplink or
downlink recources allocated to a single UE while power
contro OCs may include commands for multiple UES.
Dols come in multple sizes and formats depending. on the
‘spceiic information being carried:
+ Format 0: Used for uplink (PUSCH) allocations;
+ Format 4: Used for type 0 or ype 1. downlink (POSCH)
allocations;
+ Format 4A, 18, 2C and 4D: Used for Type 2 downlink
(POSCH)alocations;
+ Format 2 and 2A: Used for type 0 or type 2 downlink
(POSCH) allocations in spatial multiplexing (mutiple
antenna) systems:
162
Format 3 and 3
adjustments,
Ised for PUCCH and PUSCH power
For downlink data transmissions Format 1 is the primary
eI format. Formats 1A, 18, 10 and 10 are shorter
formats used for specific allocation sconarios (0,
‘assignment of Virtual Resource Blocks and antenna
precoding),6 | Downlink Operations
DCI Format 1
— Now oot
me Naat} enam>)(iGheeu
re Power || ond UE
enroy_J Lido
hee 2 Tuo | wv [ee | ow
es toms ree nea 2)
nano) | Wbillara
ea ne) | edincany bt
resoures verson acsgnant
(I Format 4 provides al of the information a UE needs to
correctly locate and decode @ covnlink vensmission over
the POSCH, The fields include:
Resource allocation type: AO" indicates that tno UE +
Ie being assigned entire resource block groups
(RAGE), whieh nave between one and four resource
blocks (depending on the total number of RBS in the
° ay the UE is being
assigned specific RBs within the REGS,
ne) Ingicates
Allocation: A fitmap of the RBGS being assigned
(allocation type 0) of of the REGS and RBS within the
BGs {allocation type 4). The total number of bits
«seo depends on the number of RBGS available.
Modulation and coding: The modulation and coding
feeheme Is selected by the eNN8, based on the CQ!
reponts trom the UE
HARQ process: An index to the specific Hybric ARQ
(HARQ) process buffer (Mex 15) that this transmission
Felates to. This allows tne UE to combine and decode
‘elated parts ofthe same packet transmission.
New data Indicator This flag indicates that this
twansmission isthe start of a new packet, and that
‘any data in the HARQ buffer should be discarded.
Redundancy version: This fleld indleates which s
coding bis is being sent (eystematic, parity 4, oF
parity 2), so that they can be interpreted correctly by
the decoder.
‘Transmit power control: Provides closedoop
(up/down) power commands to manage the PUCCH
‘and PUSCH power evel.
Downlink Assignment Index: DAI field is very specific
to TOD en and is apslicable for TOD configurations 1.
to 6, This field indicates qumber of subtrames that
were packed in 2 group to allow the UE to verify that
the missing during HARQ
Bundting/Muplexing.
re subtrames
1636 | Downlink Operations
DCI Format 1 (Continued)
anes Tages} Tansmil) (iene
——
SEE J | noe URE) oe
‘modulation and onto! ‘entity
— f
1 | ts) Process fz bn 2b oi |
mop of obrdaR® ) (og | \
fedundanoy Dabinink
se ee vwesion| Assignment
+ Padding: An extra “O° bit is added when necessary to
‘ensure thatthe total length of the DCl is correct.
+ Oyellc redundancy check: This field actually serves
two purposes: It provides a verification that the other
fields in the OCI are correct and it Is also used to
Identity which UE the DC! is for. The calculated CRC
value is sorembiea withthe C-RNTI of the UE. Each UE
reading the OCI will also calculate the GRC and
Sseramble the result with it own C-RNTI If the result
‘matches what is n the ORC fied, then the UE knows.
(2) thatthe D1 is fr i, and (2) te felds are correct.
1f the result does not match, the UE will ignore the
a
+ Downlink Assignment indox (DAN: In case of TOLTE,
‘there is @ possibilty that @ UE may provide a wrong
ACK/NACK feedback with both HARQ bundling and
HARQ multiplexing due to one or more missing DL
ssubtrames in @ gjoup. This 2 bt fleld informs the
total number of subframes in a group that contained
Downlink data to @ UE to ensure at the ACKYNACK will
'be forthe entice DL. subframes in that group.
1646 | Downlink Operations
Downlink Allocations
subcarriers.
A subframe
022946601234 5 6 Symbols
Aslot
In each sub-rame, the UE scans the POCCH (located in
the frst one to four symbols ofthe frst slot) looking for
Deis witn a matching CRNTI. If it finds one, the UE can
ead the related allocation Information, including:
‘The allocated resources that will map to one oF more
resource blocks,
Te modulation and coding scare used, and
‘Tne nature ofthe bits inthe transmission (new data,
HARQ process, systematic versus party bits, et).
Once the UE processes the DCI, it knows exactly wien and
winere to ook for its data, and how to decode it. Note that
any other UE could also locate the came data; however,
since all transmissions are encrypted, the UE would be
Lneble to read the information.
1656 | Downlink Operations
PDSCH on DL Subframe
DCI Format 4
wor [epee
‘Number and
location of
Resource
Blocks
Resource
Blocks
‘Size of Tiansport Block
sd Modulation Scheme
‘The allocation fied in the DC! tes the UE which resource
blacks nave beon assigned to itwithin the sub-rame. The
‘pectic subcarrors carving the UE's date depends on the
‘ype ofthe allocation (virtual vs. physical resource blocks,
localized vs. distributed assignments, frequency hopping,
te). Note that tne allocated subcarriers may be different
between the fist slot and the second
Once the resource blocks have been Identified and
mapped to the ptysical subcarriers tne UE can then
extract its coded data bits. The modulation and coding
scheme field in the DCI is an index into @ table that
Identities the modulation scheme used (QPSK, 416QAM or
G4QAM) and the transport block size (TBS) index; for
example, MCS value 20 corresponds to 64QAM
mocuiation and TS indox 18.
‘The actual transport block size is determined from
another table, using the TBS index and the numer of
physical resource blocks the UE has been assigned; the
‘transport block can range from 16 bits atthe smallest toa
maximum of 75,376 bits
166
Note that, although resources are allocated in units of
resource blocks (which contain sic or seven symbols), the
‘actual allocation spans the entre subframe (up to 13
‘symbols, not counting the POCCH}6 | Downlink Operations
PDSCH on DwPTS Field
CI Format 1
Special surame
Pattern 7 (10:2:2)
bie
‘Number and Ele
ra slslla)\ee
Blocks 1]3 a8
(Ea RSS
Block Size supportable na
The POSCH transmission on the DWPTS field of Special
subframe is a shortened form of the regular DL. subfreme
transmission. Due to the limited number of sym
avaliable in eubframes 1 and 6, overhead reduction is
desirable, Henee, the number of OFOM symbo's that can
be consumed by the POCCHS is limited to two in these
subtrames.
‘Tne allocation fold in the OCI lists the resource blocks
‘that nave been assigned to it within the DWPTS field. Again
‘spectic subcarriers carrying the UE's data depends on tne
‘ype ofthe allocation (virtual ws, physical resource blocks,
localized vs. distibuted assignments, frequency hopping
etc). Note that the allocated subcarriers may ge afferent,
between the fist sit and the eocond
‘once the resource blocks have bean identified and
‘mapped to the physical subcarriers, the UE tien looks at
the MCS schemes to determine the actual vansport block
size, The transport block is usually about 60% to
70%{depends on the vendor implementation) of wnat
table indicates.
Note:
1. although resources are allocated in units of resource
blocks (which contain six or seven symbols), tre
factual allocation spans the entire OWPTS
field (Pattern 7: up to 8 symbols, not counting the
Pocet).
li. No POSCH wil be carried on DWPTS forthe pattorns
(and 6 with Normal GP and 0 and 4 with Extended
cr.
1676 | Downlink Operations
Sere)
fons
In order forthe UE to be able to find and decode its data
fon the POSCH it must first be told what resources are
bing used, which bits ere being sent, and how the data,
was encoded, The POCCH contains (among other things)
Downlink Control Information (OCH blocks which provide
Uplink allocations, downlink alocations and power control
corrmnands for spectic UES. Allocation Otis describe the
saectics of tre uplink or downtink resources allocated toa
singe UE while power control OCls may include
commands for multiple UES.
Cis come in multiple sizes and formats depending on the
pectic information being cared. Let's review some
formate useful with DL resource allocation,
+ Format 1: Used for Type 0 or Type 2 downlink
(POSCH) allocations
+ Format 4A, 48, 1C and 40: Used for Type 2 downlinis
DSCH) allocations.
+ Format 2 and 2A: Used for Type 0 or Type 4 downlink
{POSCH) allocations in spatial multiplexing (multiple
antenna) systems with Format 2 for closecoop SM
‘and 2A for open iacp SM.
168,
PDCCH and DL Resource Allocation
(Weis)
2 ra
enna
For one codeword: Type 0 or 1 resouros allocation
For one codeword: Compact Type 2 resource allocation
Like Abt with precoding info
Very compact resource allocation
Compact resource allocation with precoding info & power offset
Type 0 & 4 allocation for two codewords CLSM with precoding
Type 0&4 allocation for two codewords OLSM with precoding
l
For dowalink data transmissions Format 4 i the primary
Del forat; Formats 1A, 18, 10 end 1D are shorter
mats used for specific allocation scenarios (et,
assignment of virtual resource locks and antenna
precosing)6 | Downlink Operations
Layer Mapping For MIMO
Purpose: Increase throughput by sending different
modulation symbols on different “layers.”
In LTE’e Spatial Multiplexing (SM), up to two code words,
the outouts of channel coders, can be mapped onto
ACK/NAGK Bundle
(both Subtrames 0&1) | |" Sandie (both Subtrames 5 & 6)
TTOLLTE Configuration 1 HARG Bundling is as shown in the
slide above.
‘This configuration supports 2 HAR Bundles each of size
2 subtremes (Subframes 081. and Subtrames 5&6). For
tne subframes O81 a single HARQ ACK/NACK is
transmitted on subframe 7 while for subframes 586 itis
at subtrame 2 of the next radio frame.
Subframe 4 has no HARQ bundling and the HARQ
feedback is on the subframe 8.
1s6 | Downlink Operations
HARQ Multiplexing
‘ODL Data Packet on SubframeT
Cal 1 Di Data Packet on Subframe,
<2 DL Data Packet on Subframe k
ene
a "SDL Data Packet
Bundle
HARQAGK/NAGK on Subframe =k >>
oan eore)
ACK/NAC tor Subrame
en “ranaision
AN eieien ACKUNACK fr Sutrame
AcwyNAcK tt Subtame y ‘faremison
TDLTE supports one more type of HARQ feedback
‘mechanism called HARQ Multiplexing which is very similar
to the HARQ bundling. HARQ Multiplexing also uses the
grouping of suotrames for bundling but the single HARQ
ACK/NACK feedback for the gioup consists of typically
{bjt information where each bit represents the ACK/NACK
corresponding to each DL subframe transmission.
In case of MIMO, each bit of the KARQ multiplexing
represont the spatialy bundled ACK/NAGK information
rived through logical AND" function of HAR
ACK/NACK due to each codeword.
1766 | Downlink Operations
Summary
+ arable number of HARQ processes, variable HARQ feedback timing, HARQ
Bundiing/Muttipiexing provide Mexiity in TOLTE
+ DL data can be transmitted on POSCH of both DL. subframe and DwPTS fields
+ Downlink operations occur on a subframe (1.ms) cycle.
= UES port channel qually(CQD tothe eNB. The CQ reports provide an estimate of
the U's curent rac contin - hi asus tho eNB In dotarmiring the
cendn/mecaaton scheme
= The oN atoctes avadoba resoucas (resource blocks) based ons propary
scheduling agar.
= The UES montor the PDCCH or source atlocaton and use te Information to
‘ecace the POSH,
= The UEs previ feedback to fform the eX it aona informations needed 2
‘2eoce the wansmissions.
+ HARQ Bundling/Multiptexing in TO-LTE supports combining of multiple HARAQ
AGK/NACKS fora sat of subtrames into 9 single ACK/NACK feedback report,
_
amv6 | Downlink Operations
Exercise
Match the information elements to the physical
channel (or channels) that can carry them.
PUCCH
€ HAR canal HARE mutt ploxing and Spabal Bundling
7. The VE doe mt knows ohtad Sf He which packet |
burdle af. packets the bammission Aeled ed 4 Gnd
thaek, wlth procew'y, bu fle tu Bits Should be added-
g2)
»
v)
J
6 | Downlink Operations
Review Questions
4. What is the purpose of CQI reporting?
2. How does the UE's CQI report influence its PDSCH
allocation?
3. How does the UE know how to decode the PDSCH?
4, Why are there so many ways to allocate resources?
5. What are the differences between dynamic and semi-
persistent allocations?
6. What are the different HARQ schemes supported for
downlink transmissions in TD-LTE?
7. Why does the eNB include a HARQ process ID and Dal
fields in the allocation?
8. What might the eNB do if it receives a HARQ NACK from
_, the UE?
54 provider an estimate cf Channel CondiBon hich oll be exed by
nods h select transmission format that acheive The pe falmance
atau)
the CAT Identifies the mare bontfoat Block ancl madulecbion scheint “He
ve beled St support of that tint-
ha VE munis the PDCCH fot Dz addioned + it ( basedon Hae
uigned CRNTL) and les The abla chon Gud mes in ferrrabion zn
deternite whith Posc Awoutte elemek conteh St bits
Prowides GFlenibl de selrdlblalal , minionize Signal siesta
supports ob ffetsl audewna theme, alloiat fp pote pip tcrelolar
Loardivesoy 4]
Dynande- Cast far Dee seh from Qin adage & chongiy Reckio
condttion , higher signeliny ethead - .
Semi Reaishusti= Last cuit fot ny» fe farrmence nny cree
oucg tin p suitable eX Atal- time oppWoahfon-
dhe6 | Downlink Operations
Additional Material6 | Downlink Operations
Packet Processing
aes
(oe We
The number of rest
ee blocks and the modulation
scheme assigned by the schedular determine the size of
the transport block (the numberof its) that will be sent to
the UE. Each transport block is procassed a follows:
+ CRC Attachment: The eNB calculates @ 24-dk
checksum and adds it to the end of the transport
block
+ Segmentation: ifthe transpor block ane GRC is larger
than the maximum code block size (6144 bits), then
the biock is segmented into amaller blocks and an
Additional 24-bit CRC is added to each block.
+ Channel Coding: Each block is coded with 2 4/3 rate
turbo coder, which generates thro output streams.
(One stream contains the orginal input data (the
systematic, ofS, bits) walle the other streams contain
the ettor detection and correction bits (the parity, or
Pt and P2, bit)
+ Interteaving Each output
separatoly to provide bit
transmission eros.
interleaved
any
‘separation
Rate Matching: The interloavea are
combined into a circular butter and then pruned (oits
Femoved) or padded (bits added) to produce the
requires numberof bits fr transmission,
Concatenation: The segments are concatensted to
create the final code word to be transmitted over the
PDSCH,
ten6 | Downlink Operations
PDSCH Transmission
imino
Cena
‘The content of the POSCH consists of all of the code words
to be sent to the selected UES in the next subframe. The
POSCH is generated as follows:
+ Multiptexing: The code words to be sent to each UE
‘are muttploxed together.
+ Scrambling: Each code word 's scrambled using the
UE CRNTI, the siot number within the frame, and
the Physical Layer Coll 1D.
+ Modulation: The scrambled bts are modulated using
the selected modulation scheme (QPSK, 46QAM, or
64 QAM), creatinga set of modulation symbols.
+ Layer Mapping: (f multiie transmit entennas are
being used, the maduiation symbols are assigned 10
the appropriate layers (one layer per antenn
+ recoding: Degending on tne antenna scheme being
used, the medulation symools may be preceded
before transmission.
+ Resource Element Mapping: The moculation symbols
in each layer are assigned to the allocated resource
elements (subcariers and symbol).
182
OFDMA Signal Generation: All of the modulation
symbols to be transmitted in each symbol interval
‘over all subcarriers are combined in an Inverse Fast
Fourier Transtorm (IFFT) operation to create a single
\widesand OFOM symbol. A cycle profx Is added to
provide protection from multipath interference, and
the results vansmitted over the radio channelVirtual Resource Block: VRB
Physical Resource Block: PRE,
Physical and Virtual Resource Blocks
VRB # PRE #
6 | Downlink Operations
Without Frequency ] With Frequency
Hopping Hopping
vaox=PRBX | VRBX=PRBY
vrex=prex | VRAX= PREZ
50 PRBS
op [2 a9
Tow PRB | sot g
Within a given VRB oF PRE | 5.6 yn)
subcarriers are consecutive
in frequency domain
Users find their DL. data on physical resource blocks
(Rs), which, In the physical roaim of the 10 MHz
allocation, for example, provides 50 PRBS numbered, as
shown in the slice, from "0"
‘Transmission Bandwlcth through "49" on the high end.
fon the low end of the
Fast- or moderately-moving mobiles can enjoy the benefit
of a litle gain with froqueney nopping. We Imolement.
feequency hoppingin OFOMA by mapping Virtual Resource
‘looks (VRBs) to PRBS in such a way that 2 user's,
presenco in the OFDMA signal is notin orderly PRBS; his,
presence chenges, the PREs actualy used change, with
each slot. Recall that
millisecond subframe and that we allow rate changes
‘every millisecond or every subframe. The UE recelving is
(OFDMA signal from an eNB "knows" how the assigned DL
\VRBs map to a changing azeignment of PRBS that appear
to “cance” about in the tranemission bandwisth. In order
forthe UE to "know" whieh PRBS actualy carry its VRS, it
has to convert the assigned VRES with a formula or
algortim that maps VRS to PRBS: the mapping changes
with each slot and i influenced by other fact
the PCI. Whatever the mapping, the actual PRBS are
there are two slots in one
fore such as
alwys composed of adjacent subcarrier.
‘The notion that a UE might have to “strain” or expena
adeitional processing power to recover its VRBS i an
ilusion, because a UE has to recover ail the RBs and al
the actual PRA in the entire OFOMA signal via FFT. I's
rot much effort to sort through all the recovered RBS to
fing the designated VRBs that are present in certain PRBS.
Slow-maving mobiles do benefits from
‘eequency hopping because channel-selective signaling ts
fast enout for slawmovers to distinguieh “good” PRES In
‘one part of the spectrum from "bad" ones in another part
‘here is plenty of timo for the eNB to react appropriately to
cheno! condivons mage known tot by the UE's feedback
mechanisms.
1836 | Downlink Operations
Type O Resource Allocation
located REGS,
10 MHz
<—{reco [rae 1 [Rac 2 [Ras 3 }- Ppp —fres 25 ]Res 25]
PREG
+ Allocation fora UE: Bitmap with each bit cortesponding to one
Resource Blook Group (RGB)
+ Number of PRG/RBG: Function of system bandwidtn
+ Another example: 5 MHz, 25 PAs, two PRBS per RBG, number
‘Of RBGS « cal (25/2) = 13,
Resources can be allocated to a UE using different
methods depending on the number of resources being
allocated,
Type 0 resource allocation dlvices tne aval
Into Resource Block Groups (REGs}, each one of which
contains one, two, three or f
ir PRs, For @ 20 MHz
system, there are 25 REGS, each containing four PRES; a
'5 MHz system has only 12 RBGs, each containing two
PRBS.
In a Type 0 allocation, the UE receives a bitmap of RBGS
assigned
it. €aen ‘27 bt indicates that the
corresponding REG and all of tie PRBS within tnat RBG
have been assigned to the UE. In theory, @ UE can be
assigned al of tre downlink resources wit
ingle Type 0
allocation. Type 0 resource allocetion is & good choice for
‘small system bandwicth where both the bitmap siza and
allocation grenuiartys smal
1846 | Downlink Operations
Type 4 Resource Allocation
eG Subcot 2 ae
acs]
0G Subset 2
+ locaton to UE: One of three RAG cubsets and PRBS wthin an ROG subset
1 Number of RBG evbete~ Number of PRBS in on REG function of estem BM)
+ Finer reslation than Type 0
1 sat SW ean be alosatod per UE
oa
‘Type 4 allocation proves better granularity than Type 0.
‘The RBGs are grouped Into several subsets by putting
every K RBG into the same subset. The k Is decidec by
system bandwidth. For 10 MHz, Is equal to 3. Within
each REG subset, a bitmap is used to allocate resource in
tho pranularty of one PRB.
For 2 10 MHz bandwith, we begin by configuring REGS,
‘each with their PRBs, of which tnete are 17 as shown in
the aide. Then, we define REG eubeets (three in te slice:
RBG subsets 0, 1, and 2). AS an example, consider an
allocation, described by a bitmap, within REG Subset “0.”
if the UE's bitmap Is *100000010000000001," then,
according to the slide, only three PRBs were actually
assigned tothe UE.
‘The advantage of Type 2 resource allocations is that a UE
‘can get as few as one PRB, The disadvantage is that a UE
can never get the entire bandwidth assigned since the
assignments are confined toa single RBG subset.
185.6 | Downlink Operations
Virtual Resource Blocks
Localized VRB. ‘Distributed VRB
[ol CEPEEE
:
:
4 4
al °
‘Slot Stot 1 SktO Sita)
[A Virtual Resource Block (VRB) is defined for Type 2
resource allocation, which uses a stating point plus length
‘an allocation parameter instead af the bitrnap used by
‘Type O and Type 4. VRBS are mapped to PRAS using
predefined slgorthms. There are two types of VRB:
localizes and distributed. For te localzed VRB, the LVER
‘number equals the PRE number in both slots of 2 sub-
frame. For the distibuted VRB, the DVRB number is
mapped to PRB number differently in slot Oand siot 1 ofa
subframe. Within each resource block the 12 subcarriers
‘are consecutive for both the PRB and VRB.
Distributed VRBs are mapped to PRAS that may be
‘scattered acrees the available spectrum, and the mapping
may chenge every slot (frequency hopoing). This
istibuted mapping and hopping approach avoids
frequencyselective fading and interference. The
‘silojw [(SPS= Persistent new tranamission + Dynamic revanemission
+ SPS Roloase: Tho SPS roloase in the DL is explicit. It
is sent on the POCCH with tie SPS CRINT and NDI =
(0. The same as SPS activation, addtional constraints
in DCI are set to protect against false release. OC!
Format 1A is used for SPS relesse and the OCI
constraints Include: the HARQ process number set to
"000," MCS is set to "11111," RV's eet to "00," and
resource block assignment is set to all"1"s, After the
UE detects the SPS release for the OL, it sends an
ACK. SPS nas the advantages in reducing control
signaling overheads and recueing latency delays. But
the link adaptation parameters are saved and
‘modulation and coding remains the same throughout
transmission, This makes scheduling unacjustable to
the channel concition and, thus, the likelinoed of a
transmission fellure wil increase overtime,
1907| Uplink Operations
eae
Chapter 7:
Uplink Operations7 | Uplink Operations
Objectives
After completing this module, you will be able to:
* Describe the TD-LTE uplink traffic operation
procedure
* List parameters in a UL grant
+ Explain how UL frequency hopping is done
+ List the characteristics of a UL HARQ
+ Explain the concept of TTI bundling
map them to physical resources
* List the TD-LTE characteristics for UL operations
* List the UL physical channels and signals, and
References:
[2] 3GPP TS 36.211 - EUTRA Physical chennels and
smadulation
[2]. SGPP TS 36.212 ~ EUTRA Multiplexing and channel
coding
[3] 3GPPTS 36.213 - E-UTRA Physica layer procedures
[4] 3GPP TS 36.300 — EUTRA and EUTRAN Overall
eccrption stage 2
GPP TS 26,221 - EUTRA Medium Access Control
(Mac) protocol specification
[6] 3GPP TS 36.331 - EUTRA Radio Resource Contra
(RRC) protocol specication
1927 | Uplink Operations
Overview of UL
Transmission
1937 | Uplink Operations
Be
Cornea
ec
Ges
UL Traffic Operations - Overview
1. Scheduling request
PUCCH/PRACH
2. UL grant
PDCCH
3, Buffer Status Report and/or data
PUSCH
4, Additional UL grants,
L 6_HARQ ACK/NACK.
or
ore
fone
Uplink tranemiselons igo use a shares channel, the
Physical Uplink Shared Channel (PUSCH}.In order to avoid
contention between UES attempting to transmit data at
the same time, all uplink operations are managed by the
eNB as well. In order to send data on the uplink, eact
active UE must use @ siesten process.
41. If the UE has data to send, but it has not been
allocates PUSCH resources, it must first cond 2
scheduling request to the eNB. In mast cases, the UE
will use the Physical Uplink Control Channel (PUCCH)
to sond its request; however, if a radio bearer is not
active (eg, the UE iS currently idle), it must use a
Physical Random Access Channel (PRACH) to start
the process,
2. The eNB responds with an uplink grant to the UE
POCCH, Note that this initial eran is usually quite
small,
3, The UE uses the uplink grant to send its Butfer Status
Report (BSR), Indicating how much data it needs to
send. Ifthe grant is large enough, the UE may also
start sending some data as well
194
4
Based on the &SR and available uplink resources, the
eNB determines whether an adeltional (arge*) grant
is needed. The new grant is also conveyed on the
PoccH
“The UE begins transmitting its data on the PUSCH,
‘The eNB receWes the UF's transmissions, and
responds with HARQ Acks or Nacks as appropriate on
the Physical HARQ Indicator Channel (PHICH),7 | Uplink Operations
Processes
Varisbie Number ofFHARQ | f
(07) \
TD-LTE UL
Differe
subframe offset (4t0 7),
(from Resource Grant
\oriabie UL transmission )
TD-LTE UL Characteristics
‘lyon the next available PHICH
{NAC eeabae orion
epost J
Hof Pal
{Multiple Ut Grants
fon single OL.
Subtrame
ICH Groups:
J
Similar tothe DL. traffic operation differences betwaen LTE
FDD and TDLTE, the UL trafic operations undergo
changes. Instead of the UL grants being valid four
ssubtrames later, tls now valid 8 configurable number of
uotrames later in TD.LTE. The number of HARQ
‘processes is no longer fled at eight; it varies from one to
Seven to accommodate various UL/DL. configurations.
(Once the eNB receives a packet from the UE, it sends a
HARQ ACK/NACK after a configu‘able number of
‘subtrames (which 's four in LTE FOD) on the PHIGH. To
liminate ambiguity of resource allocation, additional
fiolds are present in the OCI formats for TO-LTE, Since the
umber of HARQ ACKS/NACKS would be different
‘dopending on the UL/DL configuration and the number of
users, @ variable number of PHICH groups as 2 function of
LUL/DL configuration are defined,
1957 | Uplink Operations
UL Transport and PHY Channel Mapping
Random Aces | PRACH
Shennl (RACH)
‘Shared Grannel | [Fsea Ut Shared Choe cny data baer
uisem ote epee on etace ie YAR or
Seamaster 2PM an
PUCGHT | Paes Uk enema cro START
uncle) EX/NACK. OPM a
‘wins | Deedulaten erence sal Koon UE wd
NB tp oberon dent otc
SS | Sooper soa rep chars
conor pononngana few Vi sneaang
This slide shows the available resources for the UTE
Uplink, ft lists LTE uplink transport channels, physical
channels/signals, as wel as their mapping,
‘There are two U
transport channels, the:
4. Random Access Channel (RACH) maps to the Physical
RACH (PRACH), which carries
messages (or preamble).
random access
2. Uplink Shared Gnannel (ULSCH) maps tothe Physical
UL Shared Channel {PUSCH), whichis the channel for
UL data tansmission. i also carries Butfer Status
Reports (BSR), HARQ.ACKs/NACKS, and Crannel
Quality Indicators (COIs). In case of TT bundling
supported, the HARQ ACK/NACK refers to te bundle
of subframes.
‘The Physical Uplink Control Channel (PUCCH) caries
Uslink control information inclusing scheduling requests
(SR), HARQ ACKS/NACKS, ang COIs. At any time, @ UE
‘ean tansmit on ether the PRACH, PUSCH, or PUOGH, Dut
‘only on ane of thom.
196
In ation to physical enannls, there are also two types,
cof physical Reference Signals (RS).
4. The Demodulation RS (OM RS) is transmitted with
data oF contro! messages and helps the eNB with
channel estimation ang coherent demodulation.
2. The Sounding RS (SRS) is scheduled by the eNB and
transmitted on PUSCH resources. It helps with UL
channel condition mantoring and efficient scheduling
by resource grants that can optimize the network
throughout,7 | Uplink Operations
UE Preparation for UL Transmission
Pn Tiree
ch logical channel fone
When data arrives in the UE butter for transmission, the
UE scheduler will process it and propare for UL data
transmission. The scheduler frst checks to see if there Is.
‘a UL grant available, IF none is available, the UE needs to
end a scheduling request (SR), If on is available, the
scheduler considers the data in the buffer for each logical
channel with different priorities and their Qos
requitemont, then fonns packets for UL transmission.
During the UL transmission, SSRs are sent to the eNB to
notify it ofthe UL buffer status. The oN will assign more
UL grants needed.
A.UE maintains the logical channel buffer status for each
logical chennel. When @ scheduling request needs to be
sent, the UE sends the logesl channel identity of the
highest priorty logical channel that nas data waiting in ts
buffer to @ higher layer. Whenever a new data
transmission happens, @ logical channel with ignor
prion is allocated resources frst
1977 | Uplink Operations
Request for UL
Resources
ae
1987 | Uplink Operations
Step1: Scheduling Request From UE
Data arrival in UE buffer, need grant,
hheduling request (SR) on th
eNB
Gere
fe
\Wnen new data arives in the UE buffer, and there is no
UL gant availabe, the LE will end an SR on the PUCCH.
The PUCCH resources ere assigned to each UE when
transitioning from the RRC Idle to RRC Connected state. if
f (8 no SR resource avallaale on the PUCCH, the UE
will start a random access process using the PRACH to
send af
‘SR. The purposo of the SR is to request the
PUSCH for UL data transmission
1987 | Uplink Operations
UL Control Information and PUCCH
Transport Channel Coding Format PUCCH Format
Wh
Indes by =
o |resare | pee) [acu [rpmsuesn| *
absence HARGESR iat 2
wwe | A? lsseasvs [Egy | oa Eg
‘Reed “witna it) ey
cal | ns | sete || Hegel | a gitsete
(20, n) “with 2 bits) a
The uplink control information Includes an SR, HARQ
ACIYNACK, and CQl. This slide shows how UL control
information ig channel coded, and which PUCCH format is
Used to carry them.
There is no coding for an SR; itis indicated by “present” or
‘abseni.” The SR #s carried by PUCCH Format 1 or PUCCH
ast.
The channel coding for an HAR ACK/NACK i straight
forward: "0° for ACK and "1" for NACK. LTE TOD mode can
use two HAR ACK/NACK its to support ACK/NACK.
bundling and mutislexing. Tne HARQ ACK/NACK is carried
by PUCCH Format 12/2. with TTI bundling the
ACKYNACKS for the fame ie carried on
PUCCH Format 2a/2b.
ndiod
The CQI uses Reed Miler channel coding and has 20
‘urput bits. These 20 bits are carried by PUCCH Forat 2
or 22/20.
2007 | Uplink Operations
PUCCH Resource Mapping
PUCCH format 1/1a/tb DMRS for PUCCH format 2/22/26
(TK
DMRS for
1 | PUCCH
PuccH format
Format =F Vie/16
2/20/20
nas 1UL Subframe (1. ms)
[A PUCCH occupies one resource block in each slot and
frequeney hopping between the first and second
slots within @ subframe. For exemple, assume 10 MHz of
system bandwidth, @ PUCCH with Format 1/ta/tb
occupies (slot 0, RB n) and (slot 4, RB 49-n). Another
PUCCH with Format 2/24/20 occupies (slat 0, RB 49-0)
and (alot 2, RB n), The total number of resource blocks in
2 slot used for PUCCH transmission Is configured by @
igher layer
Demodulation reference signals (OM RSs) are transmitted
together witn the PUCCH to help demodulation. As shown,
In the figure, PUCCH Format 1/12/1b occupies OFDM
symbols 2, 3, 4 in the mile of the slot; PUCCH Format
2/2a/2b occupies OFDM symbols 1 and 5 inthe slot.
2017 | Uplink Operations
UL Grant Allocation7 | Uplink Operations
Step 2: UL Grant From eNB
CI Format 0
aoe] os er
FS ic. RE Poe
In order for the UE to be able to find the resource grant for
PUSCH, it must frst be told what resources are to be
sed, which bits are to be sent, and how the data is to be
‘encoded. The POCCHS contsin (among other things) DCI
blocks that provide uplink allocations and power
cominands for specific UES. Allocation DCIs describe the
specifics of the uplink or downlink resources allocated to &
single UE while power control DCls may include
commands for multiple UES.
(cis come In multiple sizes and formats depending on the
specific information being carried. DCI Format 0 is used
for uplink (PUSCH) allocations
2037 | Uplink Operations
DCI Format 0
ae New Data MRS
Indicator _ [_Cvetig Shit
Dowalink
Assignment
i
Farnat] veo eaaea
Not
‘wre | oe | Gre rs
c2oiy [ae | (ots) hf
on ee
re | ee 2 |p|
(3 bits) | (2 bits) ‘}a bin}
Hopping Selected
tno | | modulation and
coding scheme.
Transmit
Power
Control
‘Only for VL/L
Config
‘ter receiving the scheduling request, the eNB sends an
uplink grant on the POCCH using DCI Format 0. The UE's
16-bit CRNTIis implicit encoded in the CRC.
‘The resource allocation information includes:
+ Format Type: a bit value to differentiate OCI format ©
‘and 1A.
+ Hopping flag indicates ifthe frequency hopping is on
ore
Hopping type ifthe hopping flag is on: there are two
types of hopping, via grant or a predefined pattern.
‘The hopping type Indicates which type fs used.
+ Resource grant assignment: indicates then
‘consecutive physical resource blocks allocated to the
UE by starting position and length.
+ Modulation end coding scheme (MCS): indicates
which MICS should be used for the UL transmission,
+ New Data incicator: a one bit value to inform the eB.
‘bout a new transmission or retransmission.
+ Transmit Power Command:
+ DMRS Cyalle Shi
two bit power contro
Information to increase or decrease the power in
steps,
three bit information suggesting
the gele shit.
+ UL Index: 2 two bit value to support multiole UL
resource grants
+ DAE @ two bit field indicates mumber of subframes.
‘that were packed in group to allow the eNB to verity
that there no missing subframes during subframe
bundling
+ CQI Pol @ one bit value to inform whether aperiodic
(QI is solicited from the base station (oN).7 | Uplink Operations
Multiple UL Grants in a subframe
re
UEL Sins ark {|
q corner) ene
uE2 arineg
‘sit
In case of multiple UL grants being associated with 2 UE
‘on a single subframe, there can be two scenarios:
+ Two DG! format 0 information associated with a UE's C
NTI where each OCI formst © addressing the
resource grant, MCS, TPC command, HARQ details se
related toa particular subframe transmission.
+ A single OC! format 0 adcressing the resource grant,
MCS, TPC command, HARQ detsils are related to
muttiple subframe transmission.
‘The above side shows an examale case where UE 4 Is
assigned with DCI format 0 each to inform resources in
fone subframe and UE 2 is assigned multiple subtrame
resources with a single DOI format 0. This is decoded by
‘the UE through the UL index for UL/OL. Configuration 0.7 | Uplink Operations
BSR Reporting7 | Uplink Operations
Step 3: Buffer Status Reporting
prec)
oy
Bee
wth highest priority
evening on the amount of UL resources allocated by
‘the eNB, the UE transmits the user data and the BSR to
‘the eN@ on the allocated PUSCH. The BSR is to report the.
amount of data in the UE's buffer, Based on the received
{8SR, the aN allocates adaltional UL grants to UE.
‘The BSR indicates the number of bis in the butfer and the
logeal channel ID of the highest priory data that
demands resoure. in adation to the BSR, Ifa UL grant is
stl availabe, the UE can sand data as well
2077 | Uplink Operations
Types of BSR
‘tee BSRs eft in MAG POU as MAC Control Eleiment
There are three scenatlos for sending. BSR to the eNB:
1, Now UL date arrives ina UE butter or a UE moves toa
ew cel this s 8 “Regular BSR.
2. The Periodic BSR timer expres, in which case the
SR ig a "Periodic BSR." The Periodic BSR timer is
restarted,
3. The number of padding bits in a data message to be
transmitted is larger than the size ofthe BSR so that
adingit space is used to send a BSR. This is
referred to as.a “Padding BSR."
2087 | Uplink Operations
UL Grant for Data
Transmission7 | Uplink Operations
UL-SCH Scheduler at the eNB
oom
erie:
Ries
Wectia ete ar
Was inte
Cee
As with the downlink, the eNB uses a scheduler
mechanism to determine how best to allocate uplink
resources; like the downlink, the uplink scheduler is not
standardized. The goal of the uplink scheduler is to
maximize each UE's performance, while minimizing uplink
interference.
Typical inputs include the scheduler requests and BSRS
recoived from the UES, along with 2 view of each UE's
Physical capablitios, including the UE's eategory and the
‘amount of transmit power it has available, The size of the
‘ants previously given to the UE and the success of the
results (based on HARQ ACKS and NACKs) should also
{actor Into the decision, as will the QoS requirements for
‘the radio bearers.
Based on its. internal algorithms, the scheduler
determines the eppropriate grants (in torms of resources
‘and power) and transport formats for each UE.
2107 | Uplink Operations
ie
Transmission on the
PUSCH7 | Uplink Operations
Step 5: Data Transmission on PUSCH
pusct
All parameters specified by eNB
UE (eg, RBS, frequency hopping, and MCS)
eNB
The eNB sends a UL grant in the POCCH, assigning one or
more resource blocks and deciding the Modulation and
(Coding Scheme (MCS) the UE needs to use. This grant
‘apples to a sub-rame that is four miliseconds (ms) after
the sub-rame thet carries the grant. After getting the UL
gant, the UE transmits data (user traffic or signaling) on
the PUSCH using the allocated PRBS, frequency hopping,
pattern, and MCS, If the UE stil has data to send (the UL
buffer isnot empty yet), the UE may decide to send a BSR.
Pigevoacked on user data.
212