Добавил:
Опубликованный материал нарушает ваши авторские права? Сообщите нам.
Вуз: Предмет: Файл:

755

.pdf
Скачиваний:
0
Добавлен:
15.11.2022
Размер:
4.07 Mб
Скачать

364

3G Evolution: HSPA and LTE for Mobile Broadband

Uplink resource reserved for

Uplink resources

random access preamble

used for data

transmission

transmission

1.08

MHz

 

1 ms

10 ms frame

Figure 17.4 Principal illustration of random-access-preamble transmission.

transmissions. Within the reserved resources, the random-access preamble is transmitted.

In the frequency domain, the random-access preamble has a bandwidth corresponding to six resource blocks (1.08 MHz). This nicely matches the smallest bandwidth in which LTE can operate, which is six resource blocks as discussed in Chapter 16. Hence, the same random-access preamble structure can be used, regardless of the transmission bandwidth in the cell. For deployments using larger spectrum allocations, multiple random-access resources can be defined in the frequency domain, providing an increased random-access capacity.

A terminal carrying out a random-access attempt has, prior to the transmission of the preamble, obtained downlink synchronization from the cell-search procedure. However, the uplink timing is, as already discussed, not yet established. The start of an uplink frame at the terminal is defined relative to the start of the downlink frame at the terminal. Due to the propagation delay between the base station and the terminal, the uplink transmission will therefore be delayed relative to the downlink transmission timing at the base station. Therefore, as the distance between the base station and the terminal is not known, there will be an uncertainty in the uplink timing corresponding to twice the distance between the base station and the terminal, amounting to 6.7 µs/km. To account for this uncertainty and to avoid interference with subsequent subframes not used for random access, a guard time is used, that is the length of the actual preamble is shorter than 1 ms. Figure 17.5 illustrates the preamble length and the guard time. With the LTE preamble length of approximately 0.9 ms, there is 0.1 ms guard time allowing for cell sizes up to 15 km. In larger cells, where the timing uncertainty may be larger than the basic guard time, additional guard time can be created by not scheduling any uplink transmissions in the subframe following the random-access resource.

The preamble is based on Zadoff–Chu (ZC), sequences [131] and cyclic shifted sequences thereof. Zadoff-Chu sequences are also used for creating the uplink reference signals as described in Chapter 16, where the structure of those sequences

LTE access procedures

 

 

365

 

 

 

Guard

 

 

0.9 ms preamble

time

Near user

Other users

Preamble

Other users

Medium distance user

Other users

Preamble

Other users

Far user

Other users

Preamble

Other users

 

 

1 ms random access subframe

 

Figure 17.5 Preamble timing at eNodeB for different random-access users.

 

 

 

 

 

 

 

 

 

 

 

(Not used, provides guard time)

N-point

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

root

 

 

Cyclic

 

 

CP

 

 

 

 

 

 

 

 

 

Zadoff–

 

 

 

 

 

 

CP

N-point Zadoff–Chu sequence

 

 

 

 

 

shift

 

 

insertion

 

 

 

 

 

Chu

 

 

 

 

 

 

0.1ms

0.8 ms

0.1ms

 

 

 

 

 

 

 

 

sequence

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

Figure 17.6 Random-access-preamble generation.

is described. From each root Zadoff–Chu sequence XZC(u)(k), m − 1 cyclically shifted sequences are obtained by cyclic shifts of MZC/m each, where MZC is the length of the root Zadoff–Chu sequence.

Cyclically shifted ZC sequences possess several attractive properties. The amplitude of the sequences is constant, which ensures efficient power amplifier utilization and maintains the low PAR properties of the single-carrier uplink. The sequences also have ideal cyclic auto-correlation, which is important for obtaining an accurate timing estimation at the eNodeB. Finally, the cross-correlation between different preambles based on cyclic shifts of the same ZC sequence is zero at the receiver as long as the time cyclic shift N/m used when generating the preambles is larger than the maximum round-trip propagation time plus the maximum delay spread of the channel. Therefore, thanks to the ideal cross-correlation property, there is no intra-cell interference from multiple random-access attempts using preambles derived from the same Zadoff–Chu root sequence.

The generation of the random-access preamble is illustrated in Figure 17.6. Although the figure illustrates generation in the time-domain, frequency-domain generation can equally well be used in an implementation. Also, to allow for frequency-domain processing at the base station (discussed further below), a cyclic prefix is included in the preamble generation.

366

 

3G Evolution: HSPA and LTE for Mobile Broadband

 

 

 

1ms subframe

UE close to NodeB

CP

N-point Zadoff–Chu sequence

UE far from NodeB

 

CP

N-point Zadoff–Chu sequence

0.8 ms sampling window

 

 

t

 

 

 

 

 

 

 

 

IFFT

 

*

i 2 i 1

i 1

i 2

outputs

FFT

IFFT

 

 

 

 

 

 

 

 

Interval i

 

 

 

*

 

 

 

 

Frequency-domain representation

Sequence i detected, delay estimate t

 

of Zadoff–Chu root sequence

 

 

 

 

Figure 17.7 Random-access-preamble detection in the frequency domain.

Preamble sequences are partitioned into groups of 64 sequences each. As part of the system configuration, each cell is allocated one such group by defining one or several root Zadoff–Chu sequences and the cyclic shifts required to generate the set of preambles. The number of groups is sufficiently large to avoid the need for careful sequence planning between cells.

When performing a random-access attempt, the terminal selects one sequence at random from the set of sequences allocated to the cell the terminal is trying to access. As long as no other terminal is performing a random-access attempt using the same sequence at the same time instant, no collisions will occur and the attempt will, with a high likelihood, be detected by the network.

The base-station processing is implementation specific, but thanks to the cyclic prefix included in the preamble, low-complexity frequency-domain processing is possible. An example hereof is shown in Figure 17.7. Samples over a window are collected and converted it into the frequency-domain representation using an FFT. The window length is 0.8 ms, which is equal to the length of the ZC sequence without a cyclic prefix. This allows to handle timing uncertainties up to 0.1 ms and matches the guard time defined.

The output of the FFT, representing the received signal in the frequency domain, is multiplied with the complex-conjugate frequency-domain representation of the root Zadoff–Chu sequence and the results is fed through an IFFT. By observing the IFFT outputs, it is possible to detect which of the shifts of the Zadoff–Chu root sequence has been transmitted and its delay. Basically, a peak of the IFFT output in

LTE access procedures

367

interval i corresponds to the i-th cyclically shifted sequence and the delay is given by the position of the peak within the interval. This frequency-domain implementation is computationally efficient and allows detection of multiple random-access attempts using different cyclic shifted sequences generated from the same root Zadoff–Chu sequence; in case of multiple attempts there will simply be a peak in each of the corresponding intervals.

17.2.2Step 2: Random access response

In response to the detected random access attempt, the network will, as the second step of the random-access procedure, transmit a message on the DL-SCH, containing:

The index of the random-access preamble sequence the network detected and for which the response is valid.

The timing correction calculated by the random-access-preamble receiver.

A scheduling grant, indicating resources the terminal shall use for the transmission of the message in the third step.

A temporary identity used for further communication between the terminal and the network.

In case the network detected multiple random-access attempts (from different terminals), the individual response messages of multiple mobile terminals can be combined in a single transmission. Therefore, the response message is scheduled on the DL-SCH and indicated on a L1/L2 control channel using an identity reserved for random-access response. All terminals which have transmitted a preamble monitors the L1/L2 control channels for random-access response. The timing of the response message is not fixed in the specification in order to be able to respond to sufficiently many simultaneous accesses. It also provides some flexibility in the base-station implementation.

As long as the terminals that performed random access in the same resource used different preambles, no collision will occur and from the downlink signaling it is clear to which terminal(s) the information is related. However, there is a certain probability of contention, that is multiple terminals using the same random access preamble at the same time. In this case, multiple terminals will react upon the same downlink response message and a collision occurs. Resolving these collisions is part of the subsequent steps as discussed below. Contention is also one of the reasons why hybrid ARQ is not used for transmission of the random-access response. A terminal receiving a random-access response intended for another terminal will have incorrect uplink timing. If hybrid ARQ would be used, the

368

3G Evolution: HSPA and LTE for Mobile Broadband

timing of the ACK/NAK for such a terminal would be incorrect and may disturb uplink control signaling from other users.

Upon reception of the random-access response in the second step, the terminal will adjust its uplink transmission timing and continue to the third step.

17.2.3Step 3: Terminal identification

After the second step, the uplink of the terminal is time synchronized. However, before user data can be transmitted to/from the terminal, a unique identity within the cell (C-RNTI) must be assigned to the terminal. Depending on the terminal state, there may also be a need for additional message exchange.

In the third step, the terminal transmits the necessary messages to the network using the resources assigned in the random-access response in the second step. Transmitting the uplink message in the same manner as scheduled uplink data instead of attaching it to the preamble in the first step is beneficial for several reasons. Firstly, the amount of information transmitted in absence of uplink synchronization should be minimized as the need for a large guard time makes such transmissions relatively costly. Secondly, the use of the ‘normal’ uplink transmission scheme for message transmission allows the grant size and modulation scheme to be adjusted to, for example, different radio conditions. Finally, it allows for hybrid ARQ with soft combining for the uplink message. The latter is an important aspect, especially in coverage-limited scenarios, as it allows for the use of one or several retransmissions to collect sufficient energy for the uplink signaling to ensure a sufficiently high probability of successful transmission. Note that RLC retransmissions are not used for the uplink RRC signaling in step 3.

An important part of the uplink message is the inclusion of a terminal identity as this identity is used as part of the contention-resolution mechanism in the fourth step. In case the terminal is in LTE_ACTIVE state, that is, is connected to a known cell and therefore has a C-RNTI assigned, this C-RNTI is used as the terminal identity in the uplink message. Otherwise, a core-network terminal identifier is used and the radio-access network needs to involve the core network prior to responding to the uplink message in step 3.

17.2.4Step 4: Contention resolution

The last step in the random access procedure consists of a downlink message for contention resolution. Note that, from the second step, multiple terminals performing simultaneous random-access attempts using the same preamble sequence

LTE access procedures

369

in the first step listen to the same response message in the second step and therefore have the same temporary identifier. Hence, in the fourth step, each terminal receiving the downlink message will compare the identity in the message with the identity they transmitted in the third step. Only a terminal which observes a match between the identity received in the fourth step and the identity transmitted as part of the third step will declare the random access procedure successful. If the terminal has not yet been assigned a C-RNTI, the temporary identity from the second step is promoted to the C-RNTI; otherwise the terminal keeps its already assigned C-RNTI.

The contention-resolution message is transmitted on the DL-SCH, using the temporary identity from the second step for addressing the terminal on the L1/L2 control channel. Since uplink synchronization already has been established, hybrid ARQ is applied to the downlink signaling in this step. Terminals with a match between the identity they transmitted in the third step and the message received in the fourth step will also transmit a hybrid-ARQ acknowledge in the uplink.

Terminals which do not find a match between the identity received in the fourth step and the respective identity transmitted as part of the third step are considered to have failed the random-access procedure and need to restart the random-access procedure from the first step. Obviously, no hybrid-ARQ feedback is transmitted from these terminals.

17.3Paging

Paging is used for network-initiated connection setup. An efficient paging procedure should allow the terminal to sleep with no receiver processing most of the time and to briefly wake up at predefined time intervals to monitor paging information from the network.

In WCDMA, a separate paging-indicator channel, monitored at predefined time instants, is used to indicate to the terminal that paging information is transmitted. As the paging indicator is significantly shorter than the duration of the paging information, this approach minimizes the time the terminal is awake.

In LTE, no separate paging-indicator channel is used as the potential power savings are very small due to the short duration of the L1/L2 control signaling, at most three OFDM symbols as described in Chapter 16. Instead, the same mechanism as for ‘normal’ downlink data transmission on the DL-SCH is used and the mobile-terminal monitors the L1/L2 control signaling for downlink scheduling assignments. A DRX cycle is defined, which allows the terminal to sleep most of the time and only briefly wake up to monitor the L1/L2 control signaling. If the

370

 

 

3G Evolution: HSPA and LTE for Mobile Broadband

 

 

Possibility to page this terminal

 

 

UE receiver circuitry

 

UE receiver circuitry

 

 

 

 

 

 

switched off

 

switched off

Subframe

 

 

 

 

 

 

 

DRX cycle

Figure 17.8 Discontinous reception (DRX) for paging.

terminal detects a group identity used for paging when it wakes up, it will process the corresponding paging message transmitted in the downlink. The paging message includes the identity of the terminal(s) being paged and a terminal not finding its identity will discard the received information and sleep according to the DRX cycle. Obviously, as the uplink timing is unknown during the DRX cycles, no ACK/NAK signaling can take place and consequently hybrid ARQ with soft combining cannot be used for paging messages.

The DRX cycle for paging is illustrated in Figure 17.8.

18

System Architecture Evolution

In this chapter an overview of the System Architecture Evolution (SAE) work in 3GPP is given. Furthermore, in order to understand from where the SAE is coming from, the core network used by WCDMA/HSPA is discussed. Thus, the system architecture of WCDMA/HSPA and LTE, their connections, similarities, and differences are briefly described. The term system architecture describes the allocation of necessary functions to logical nodes and the required interfaces between the nodes. In the case of a mobile system, such as WCDMA/HSPA and LTE/SAE, most of the necessary functions for the radio interface have been described in the previous chapters. Those functions are normally called radio access network functions. However, in a mobile network several additional functions are needed to be able to provide the services: Charging is needed for the operator to charge a user; Authentication is needed to ensure that the user is a valid user; Service setup is needed to ensure that there is an end-to-end connection; etc. Thus there are functions not directly related to the radio access technology itself, but needed for any radio access technology (and in fact there are functions that are needed also for fixed accesses). Those functions are normally called core network functions. The fact that there are different types of functions in a cellular system have lead to that the system architecture is divided into a radio-access network part and a core-network part (Figure 18.1).

Core network

Radio access network

Figure 18.1 Radio access network and core network.

371

372

3G Evolution: HSPA and LTE for Mobile Broadband

18.1Functional split between radio access network and core network

In the process of specifying the WCDMA/HSPA and the LTE/SAE systems, the first task in both cases was to distribute functions to the Radio Access Network (RAN) and Core Network (CN), respectively. Although this may initially appear to be a simple task, it can often turn out to be relatively complicated. The vast majority of the functions can easily be located in either RAN or the core network, there are some functions requiring careful attention.

18.1.1Functional split between WCDMA/HSPA radio access network and core network

For WCDMA/HSPA, the philosophy behind the functional split is to keep the core network unaware of the radio access technology and its layout. This means that the RAN should be in control of all functionality optimizing the radio interface and that the cells should be hidden from the core network. As a consequence, the core network can be used for any radio access technology that adopts the same functional split.

To find the origin of the philosophy behind the WCDMA/HSPA functional split, it is necessary to go back to the architecture of the GSM system, designed during the 1980s. One of the problems with the GSM architecture was that the core network nodes have full visibility of the cells in the system. Thus, when adding a cell to the system, the core network nodes need to be updated. For WCDMA/HSPA, the core network does not know the cells. Instead, the core network knows about service areas and the RAN translates service areas into cells. Thus, when adding a new cell in a service area, the core network does not need to be updated.

The second major difference compared to GSM is the location of retransmission protocols and data buffers in the core network for GSM. Since the retransmission protocols were optimized for the GSM radio interface, those protocols were radio interface specific and hence were not suitable for the WCDMA/HSPA radio interface. This was considered as a weakness of the core network and hence all the buffers and the retransmission protocols were moved to the RAN for WCDMA. Thus, as long as the radio access network uses the same interface to the core network, the Iu interface, the core network can be connected to radio access networks based on different radio access technologies.

Still, there are functional splits in WCDMA/HSPA that cannot solely be explained with the philosophy of making the core network radio-access-technology

System Architecture Evolution

373

independent. The security functions are a particularly good example. Again, the background can be traced back to GSM, which has the security functions located at different positions for circuit-switched connections and packet-switched connections. For circuit-switched connections, the security functions are located in the GSM RAN, whereas for packet-switched connections, the security functions are located in the GSM core network. For WCDMA/HSPA, this was considered too complicated and a common security location was desired. The location was decided to be in the RAN as the radio resource management signaling and control needed to be secure.

Thus the RAN functions of WCDMA/HSPA are:

coding, interleaving, modulation, and other typical physical layer functions;

ARQ, header compression, and other typical link layer functions;

radio resource management, handover and other typical radio resource control functions; and

security functions (that is ciphering and integrity protection).

Functions necessary for any mobile system, but not specific to a radio access network and that do not boost performance, was placed in the core network. Such functions are:

charging;

subscriber management;

mobility management (that is keeping track of users roaming around in the network and in other networks);

bearer management and quality-of-service handling;

policy control of user data flows; and

interconnection to external networks.

The reader interested in more details about the functional split is referred to the relevant 3GPP documents [89, 90].

18.1.2Functional split between LTE RAN and core network

The functional split of the LTE RAN and core network is similar to the WCDMA/HSPA functional split. However, a key design philosophy of the LTE RAN was to minimize the number of nodes and find a solution where the RAN consists of only one type of node. At the same time, the philosophy behind the LTE core network is, to the extent possible, be as independent of the radio access technology as possible. The resulting functional split is that most of the functions

Соседние файлы в предмете [НЕСОРТИРОВАННОЕ]