W (Level1) UMTS Radio Resource Management 20050712 A 1 (1) .0

Download as ppt, pdf, or txt
Download as ppt, pdf, or txt
You are on page 1of 90

UMTS Radio Resource Management

ISSUE 1.0

Wireless Curriculum Development Section

Preface
Radio

Resource Management (RRM) is responsible for

utilization of the air interface resources.


RRM

is needed to guarantee Quality of Service (QoS),

to maintain the planned coverage area and to offer high


capacity.

Confidential Information of
Huawei.

Security Level: Internal

Course Objectives
Upon

completion of this course,you will be able to:

Understand the principles of RRM.

Understand

the

basic

RRM

algorithms: Channel Configuration,


Power

Control,

Mobility

Management, Load Control, AMR


Mode Control.

Confidential Information of
Huawei.

Security Level: Internal

Course Contents
Chapter 1 Introduction to RRM
Chapter 2 Channel Configuration
Chapter 3 Power Control
Chapter 4 Mobility Management
Chapter 5 Load Control
Chapter 6 AMR Mode Control

Confidential Information of
Huawei.

Security Level: Internal

Introduction to RRM
RRM:

Radio Resource Management

RRM

is responsible for supplying optimum coverage, offering the

maximum planned capacity, guaranteeing the required quality of


service (QoS) and ensuring efficient use of physical and transport
resources.
Power

is the ultimate radio resource. The best way to utilize the radio

resource is to control the power consumption strictly.

Increasing the transmission power of a certain user can improve his QoS.

However, due to the self-interference, the increasing would result in more


interference on other users and consequently reduce the receiving QoS.

Confidential Information of
Huawei.

Security Level: Internal

Concepts
Some

useful concepts: UTRAN, RAB, RB, RL

RAB
RB
UE

RL

RNC
NodeB

UTRAN
Confidential Information of
Huawei.

Security Level: Internal

CN

Concepts
UTRAN:

Handles all radio-related functionality, including the


services of RAB (Radio Access Bearer) setup, maintenance
and release.

RAB

The service that the access stratum provides to the

non-access stratum for transfer of user data between User


Equipment and CN.
RB

The service provided by the layer2 for transfer of user


data between User Equipment and Serving RNC

RL

A "radio link" is a logical association between single


User Equipment and a single UTRAN access point. Its
physical realization comprises one or more radio bearer
transmissions

Confidential Information of
Huawei.

Security Level: Internal

Functionality of UTRAN
Handles

all radio-related functionality, including the services of


RAB (Radio Access Bearer) setup, maintenance and release.
Guarantee the QoS (Quality of Service) of RAB.
QoS commonly includes 3 requirements :

Bit rate of data transfer.

Time delay of data transfer.

BER/FER.

Confidential Information of
Huawei.

Security Level: Internal

Objectives of RRM
Objectives

of RRM:

Guarantee QoS of the services requested by CN.

Enhance system coverage.

Increase system capacity.

Confidential Information of
Huawei.

Security Level: Internal

Functionalities of RRM
Channel

Configuration: is required to guarantee the QoS and

to maximize the system throughput.


Power

Control: is needed to keep the interference levels at

minimum in the air interface and to provide the requested


QoS.
Handover:

is needed in cellular systems to handle the mobility

of the user when he or she is moving from the coverage area


of one cell to another.
Load

Control: is needed to ensure that the system is not

overload and remains stable.


Confidential Information of
Huawei.

Security Level: Internal

RRM Algorithms in the Call Flow (1)


RAB ASSIGNMENT QoS)
CN
Iu

QoS mapping

Channel configuration
--fundamental
channel configuration

Access control

Load control
--access control

RNC

Load control
--load balance

Request of
code resource
Configuration
of access layer

Confidential Information of
Huawei.

Security Level: Internal

Channel configuration-code resource


management

RRM Algorithms in the Call Flow(2)

Load control
--load balance

Channel setup and


call initiated

Power control
open loop

Power control

Power control
close loop

Change of
service rate

Channel configuration
--DCCC AMRC

Handover
Call end
Resource release

Confidential Information of
Huawei.

Mobility management

Channel configuration-code resource management

End
Security Level: Internal

Classification of RRM
Based on the different objects, RRM is classified as:
Connection

oriented RRM, which guarantees QoS of

connection and minimizes the radio resource allocated for the


connection.

Channel configuration, power control, handover

A dedicated entity is created to manage the resource


configuration for each connection.

Cell

oriented RRM, which maximizes users in cells and thus

increases system capacity while guaranteeing cell stability.

Code resource management, load control

A dedicated entity is created for each cell to manage its


resource.

Confidential Information of
Huawei.

Security Level: Internal

Procedure of RRM
Fundamental procedure of radio resource management
Measurement

control

Measurement

UE, NodeB, RNC

Measurement

report

Decision
The

implementation of resource control

Confidential Information of
Huawei.

Security Level: Internal

Review
Contents

Review:

RRM concepts

RRM objectives and functionalities

RRM Algorithms in the Call Flow

RRM procedure

Confidential Information of
Huawei.

Security Level: Internal

Course Contents
Chapter 1 Introduction to RRM
Chapter 2 Channel Configuration
Chapter 3 Power Control
Chapter 4 Mobility Management
Chapter 5 Load Control
Chapter 6 AMR Mode Control

Confidential Information of
Huawei.

Security Level: Internal

Channel Configuration
Fundamental
Dynamic
Code

channel configuration algorithm

channel configuration algorithm

resource management algorithm

Confidential Information of
Huawei.

Security Level: Internal

Fundamental Channel Configuration


Fundamental

channel configuration is to mapping the RAB QoS

features requested by CN into the corresponding parameters and


configuration mode on each AS layer
QoS

requested by CN

Traffic Classes
Conversational
Streaming
Interactive
Background

Rate demand

Quality demand BLER

Confidential Information of
Huawei.

Security Level: Internal

QoS Mapping
RAB

RB

Radio Bearers

RLC entity

RLC Sublayer


RB

DTCH

DTCH

DCCH

Mac-d
TrCH

Mac-c
TrCH

TrCH

Coding& RM&Mux
CCTrCH
DPDCH
Confidential Information of
Huawei.

DTCH

TrCH

Coding& RM&Mux

DPCCH
Security Level: Internal

Logical Channels
MAC Sublayer
Chansport Channels
Physical Layer

RB and RLC Parameter Configuration


RB

parameters
RB number

RLC

parameters

Different RLC transfer modes


Transparent mode
Unacknowledged mode
Acknowledged mode

Different logic channel parameters

Confidential Information of
Huawei.

Security Level: Internal

MAC Parameter Configuration


MAC

parameters

The mapping/multiplexing relation between logic channel and


transport channel

Different types and parameters of transport channel


Dedicated channel
Common channel

Different configurations of MAC entity


MAC-d/MAC-c

Priority configuration of MAC sub layer

TFCS configuration

Confidential Information of
Huawei.

Security Level: Internal

PHY Parameter Configuration


PHY

parameters

Mapping relation from transport channel to physical channel

Coding scheme
Convolutional
Turbo
Non

Interleaving length

Rate Matching Attribute (RMA)

Spreading Factor (SF)

Power offset

Other physical channel parameters, e.g., diversity mode, etc.

Confidential Information of
Huawei.

Security Level: Internal

Signaling Used by Fundamental


Channel Configuration on Air Interface
RB

setup

RB

reconfiguration

RB

release

Transport
Physical

channel reconfiguration

channel reconfiguration

The service may already be setup before. Therefore, when these


parameters of all layers are configured, any impact on the current
service should be avoided and the multiplexing with the current
service should be taken into account.

Confidential Information of
Huawei.

Security Level: Internal

Example of RB Setup
Configuration in L2 before Setup

Configuration in L2 after Setup

Signalling
bearer

Signalling
bearer

RB1

RLC

RLC

DCCH

DTCH

RLC
MAC-d

DCCH

MAC-d

Channel Switching

Channel Switching
MUX

MAC-c

RNTI MUX

MAC-c

RNTI MUX

MUX

MUX

TF Select

TF Select

Common channel (FACH)


Confidential Information of
Huawei.

Common channel (FACH)

Security Level: Internal

Channel Configuration
Fundamental
Dynamic
Code

channel configuration algorithm

channel configuration control algorithm

resource management algorithm

Confidential Information of
Huawei.

Security Level: Internal

Dynamic Channel Configuration


DCCC:
Object

Dynamic Channel Configuration Control

of DCCC: Best Effort (BE) service

Objective

of DCCC

Meet bandwidth requirement of users to the greatest degree

Make best usage of resource on air interface

Meet the fluctuant requirement of users on data transfer

Save downlink channel code (OVSF code) resource

Achieve bandwidth on
demand

Confidential Information of
Huawei.

Security Level: Internal

BE Service
Features

DL Transport Channel
Traffic Volume

of BE service

Signalling
bearer

rate of service source changes


largely

Threshold

Less demand on time delay

More demand on bit error rate

RLC uses acknowledged mode,

Configuration in L2

MAC-d

RLC

RLC

DCCH

DTCH

Channel Switching

thus all data should be buffered in


RLC Buffer.
TFC Select
DCH1

Confidential Information of
Huawei.

Security Level: Internal

DCH2

Decision of DCCC
Decision

of DCCC

Measurement report on traffic volume of RLC Buffer

Decide whether to change the bandwidth used by UE dynamically


based on the measurement result.

Consider whether there is limitation on air interface during the


decision of reconfiguration. This is done by measuring the
transmitting power of UE in both downlink and uplink.

The uplink & downlink DCCC


decisions are the same, but are
made respectively.
Confidential Information of
Huawei.

Security Level: Internal

Implementation of DCCC
Implementation

of DCCC

RB reconfiguration/ transport channel reconfiguration


Cell-FACH-->Cell-DCH
Cell-DCH-->Cell-DCH, include reduction/increment of bandwidth
Cell-DCH-->Cell-FACH

DCCC

also restricts the selection of TF at MAC layer based on

the request of congestion control.

Confidential Information of
Huawei.

Security Level: Internal

Effect of DCCC
Bandwidth

Allocation on Demand
System capacity

Traditional channel
configuration

Rate of service source


DCCC

Allocation of DCCC
Confidential Information of
Huawei.

Security Level: Internal

Channel Configuration
Fundamental
Dynamic
Code

channel configuration algorithm

channel configuration algorithm

resource management algorithm

Confidential Information of
Huawei.

Security Level: Internal

OVSF
Cch,4,0 =(1,1,1,1)
Cch,2,0 = (1,1)
Cch,4,1 = (1,1,-1,-1)
Cch,1,0 = (1)
Cch,4,2 = (1,-1,1,-1)
Cch,2,1 = (1,-1)
Cch,4,3 = (1,-1,-1,1)
SF = 1

SF = 2

SF = 4

OVSF code tree


Confidential Information of
Huawei.

Security Level: Internal

Code Usage
Strategy

and performance indicator of code allocation

Usage

Bandwidth used / Total bandwidth.

Better if higher.

Keeping the codes unused with spreading factor as small as


possible will higher the usage.

C(8,0)

C(16,0)
C(16,1)

C(4,0)

C(16,2)
C(8,1)

Confidential Information of
Huawei.

C(16,3)

C(8,0)

C(16,0)
C(16,1)

C(4,0)

C(16,2)
C(8,1)

Security Level: Internal

C(16,3)

Complexity of code allocation


Strategy

and performance indicator of code allocation

Complexity

More multi-code used will increase complexity

As simple as possible

Make the most of unique-code utilization

C(8,0)

C(16,0)
C(16,1)

C(4,0)

C(16,2)
C(8,1)

Confidential Information of
Huawei.

C(8,0)

C(16,1)

C(4,0)

C(16,2)
C(8,1)

C(16,3)
Security Level: Internal

C(16,0)

C(16,3)

OVSF code allocation


Principles

of code allocation

Increase the usage of code

Reduce the complexity of code allocation scheme

Increase system capacity

Confidential Information of
Huawei.

Security Level: Internal

Review
Contents

view:

Fundamental channel configuration algorithm

DCCC (Dynamic Channel Configuration Control)

Code resource management algorithm

Confidential Information of
Huawei.

Security Level: Internal

Course Contents
Chapter 1 Summary of RRM
Chapter 2 Channel Configuration
Chapter 3 Power Control
Chapter 4 Mobility Management
Chapter 5 Load Control
Chapter 6 AMR Mode Control

Confidential Information of
Huawei.

Security Level: Internal

Introduction
Near-far

effect in the uplink

Signal is
submerged by
signal from UE
near base
station

One UE
can block
the whole
cell
In

the downlink, the capacity is determined by the transmit code power for

each connection. Therefore, it is essential to keep the transmission power at


a minimum level while ensuring adequate signal quality at the receiving end.

Confidential Information of
Huawei.

Security Level: Internal

Classification of Power Control


Power

Control

Uplink power control

Compared with
open loop power
control, inner
loop and outer
loop power
control are called
closed loop
power control

Open loop power control


Inner loop power control
Outer loop power control

Downlink power control


Open loop power control
Inner loop power control
Outer loop power control

Confidential Information of
Huawei.

Security Level: Internal

Open Loop Power Control


Convergence
of inner loop
power
control
Accurately

power

time

calculate initial

transmitting power of inner

power

loop needed to lessen the


time of convergence
Reduce

the impact on

system load
Confidential Information of
Huawei.

time
Security Level: Internal

Open-Loop Power Control


The

uplink and downlink frequencies of WCDMA are within the

same frequency band.

Uplink open-loop power control

Based on the calculation of the open-loop power control, the UE


sets the initial powers for the first PRACH preamble and for the
uplink DPCCH before starting the inner-loop power control.

Downlink

open-loop power control

In the down link, the open-loop power control is used to set the
initial power of the downlink channels based on the downlink
measurement reports from the UE.

Confidential Information of
Huawei.

Security Level: Internal

Inner Loop Power Control


Inner

loop power control:

Measure and compare SIR of received signal

1500Hz

Inner loop

Set SIRtar

Transmit TPC
NodeB

Objective of
power control:
balance the
received energy
per bit of
different
UEs at
Confidential Information of
Huawei.

UE

Security Level: Internal

Each UE has
its own
power
control
loop

BLER--SIR
The

aim of the outer-loop PC algorithm is to maintain the quality of

the connection at the level defined by the quality requirements of


the bearer service.
According

to principles of wireless communication, BLER may

change with the wireless environment under fixed SIR.

Confidential Information of
Huawei.

BLER

BLER

SIRSecurity Level: Internal

Different
curves
correspond
with different
multi-path
environment.

Outer Loop Power Control

Traffic
data with
steady BLER
can be
acquired

Measure&compare
BLER of received data

Measure BLER
of transport
channel
Measure&compare
SIR of received signal
Inner loop

Outer loop
Set BLERtar
RNC

Confidential Information of
Huawei.

Transmit TPC

Set SIRtar

10-100Hz

NodeB

Security Level: Internal

UE

Multi-Service
One

special aspect of WCDMA is to multiplex several

services on one connection, even one service can


mapping to several TrCHs.

How to guarantee the


BLERtar belonging to several
services or TrCHs in cases of
multi-service or multi-TrCH
on one connection used?

Confidential Information of
Huawei.

Security Level: Internal

Multiplexing of Transport Channel


TrCH1

TrCH2

Channel coding and


the other operations

Channel coding and


the other operations

Ratematching

Ratematching

TrCHMultiplexing
CCTrCH

Confidential Information of
Huawei.

RMA (Rate Matching


Attribute) different
from each TrCH

Security Level: Internal

Power Control in Multi-Service


Rate

matching is realized by bit stream puncturing and

replication when transport channel data mapping to CCTrCH.


RMA

defines the gain in the procedure of rate matching

(different rate matching has different gain)


Different

RMAi is defined according to each transport

channels BLERtar, actually RMAi shows the relative gain


between each transport channel.
When

one transport channels BLER guaranteed by outer loop

PC, the BLERs of all other transport channels which mapping


to the same CCTrCH will be guaranteed also.
Confidential Information of
Huawei.

Security Level: Internal

Downlink Power Control


Measure and compare BLER

1500Hz

UE Layer 3
Outer
loop Set SIRtar

10-100Hz

Transmit TPC
Inner loop

NodeB

UE physical layer
Measure and compare SIR

Downlink inner loop and outer loop power control

Confidential Information of
Huawei.

Security Level: Internal

Power Control in Soft Handover (SSDT)


In
conventional
downlink
power
control
algorithm,
all base
stations
transmit
signal to UE
SSDT
All

UE
chooses
the cell
with the
smallest
path loss
and the
best
signal to
transmit
DPDCH

:Site Selection Diversity Transmit

cells in active set transmit DPCCH in downlink. The cell transmitting

DPDCH is chosen by UE per 10ms or a longer period of time.


Confidential Information of
Huawei.

Security Level: Internal

Downlink Power Balance


Due

to, for example, signalling errors in the air interface it is

possible that each cell interpreting this TPC differently when in SHO.
As a consequence, one cell lowers its transmitting power while the
other cell might increase it, and therefore the downlink power are
drifting apart.
The transmission power levels of the
connections from the cells in SHO is
forwarded to the RNC after they have
been averaged. From these
measurements the RNC derives a
reference power value which is sent to
the cells.

Confidential Information of
Huawei.

SRNC

Security Level: Internal

Review
Contents

view:

Closed Loop Power Control

Uplink inner loop power control

Uplink outer loop power control

Downlink inner loop power control

Downlink outer loop power control

Open Loop Power Control

Downlink Power Balance

Confidential Information of
Huawei.

Security Level: Internal

Course Contents
Chapter 1 Summary of RRM
Chapter 2 Channel Configuration
Chapter 3 Power Control
Chapter 4 Mobility Management
Chapter 5 Load Control
Chapter 6 AMR Mode Control

Confidential Information of
Huawei.

Security Level: Internal

UE Modes/states
Idle

mode
In idle mode the UE is identified by non-access stratum identities
such as IMSI, TMSI and P-TMSI. In addition, the UTRAN has no
own information about the individual idle mode UEs, and can
only address e.g. all UEs in a cell or all UEs monitoring a
specific paging occasion. .

Confidential Information of
Huawei.

Security Level: Internal

UE Modes/states
Connected

mode

When at least one signalling connection exists, the UE is in


connected mode and there is normally an RRC connection
between UE and UTRAN. The UE position can be known on
different levels:
UTRAN Registration Area (URA) level
The UE position is known on URA level. The URA is a set of cells
Cell level
The UE position is known on cell level. Different transport channel
types can be used for data transfer:
Common transport channels (RACH / FACH, DSCH, CPCH)
Dedicated transport CHannels (DCH)

Confidential Information of
Huawei.

Security Level: Internal

UE Modes/States

Assuming that there exists an RRC connection, there are two basic
families of RRC connection mobility procedures, URA updating and
handover.
URA updating is a family of procedures that updates the UTRAN
registration area of a UE when an RRC connection exists and the
position of the UE is known on URA level in the UTRAN
Handover is a family of procedures that adds or removes one or several
radio links between one UE and UTRAN when an RRC connection exists
and the position of the UE is known on cell level in the UTRAN

Confidential Information of
Huawei.

Security Level: Internal

Classification of Handover
Handover

Soft handover
Softer handover

Hard handover
Intra-frequency hard handover
Inter-frequency hard handover
Inter-RAT handover Between WCDMA and GSM

Confidential Information of
Huawei.

Security Level: Internal

Soft Handover
Data UE
received/
sent
Source BS

N o GAP of communication

Target BS
UE move

Features

time

of soft handover

Seamless handover with no disconnection of the radio access bearer.

To enable a sufficient reception level for maintaining communications by


combining the received signal at symbol level from multiple cells in case the UE
moves to the cell boundary area.

The macro-diversity gain achieved by combining the received signal in the


NodeB (softer handover) or in the RNC (SHO) improves the uplink signal quality
and thus decreases the required transmission power of the UE.

Confidential Information of
Huawei.

Security Level: Internal

Softer Handover
For

soft handover, the combination of multiple RL uses maximum

ratio combination (RAKE combination) in downlink and selection


combination in uplink.
When

the two cells in soft handover belong to the same NodeB,

maximum ratio combination could be used in uplink. In this case


the handover is softer handover.
Softer

handover has higher priority in handover schemes

because maximum ratio combination has larger gain than


selection combination.

Confidential Information of
Huawei.

Security Level: Internal

Soft Handover Measurement


Active

set

Including all cells currently participating in a SHO connection of a


terminal.

Neighbor

Set/Monitored Set

This set includes all cells being continuously monitored/measured


by the UE and which are not currently included in the active set.

Confidential Information of
Huawei.

Security Level: Internal

Soft Handover Measurement

Confidential Information of
Huawei.

Security Level: Internal

Hard Handover
Data UE
received/
sent
Source BS

Target BS
UE move

Confidential Information of
Huawei.

time

Security Level: Internal

Hard Handover
Data UE
received/
sent
Source BS

GAP of communication

Target BS
UE move

Features

time

of hard handover:

HHO causes a temporary disconnection for RT radio access bearer


and is lossless for NRT bearers.

The UE must either be equipped with a second receiver or support


compressed mode to execute inter-system/inter-RAT measurement.

Confidential Information of
Huawei.

Security Level: Internal

Application of Hard Handover in 3G


Intra-frequency

hard handover

When inter-RNC SHO cannot be executed or is not allowed.

Inter-frequency

hard handover

Needed in certain areas due to network planning

Load balance between frequencies

Inter-RAT

handover

2G-3G smooth evolution

The finite coverage range of initial phase of 3G

Confidential Information of
Huawei.

Security Level: Internal

Selection of Handover Scheme


Handover

scheme should be selected based on the traffic QoS

Soft handover can provide better service quality.

Soft handover uses more system resource.

Different sizes of active set and soft handover area use different
system resource and provide different QoSs.

Hard handover would bring gap during calls.

Hard handover uses less system resource.

Consider

both the QoS requirement and the occupation of

system resource by handover.


Make

a tradeoff between occupation of system resource and QoS

Confidential Information of
Huawei.

Security Level: Internal

Introduction of Compressed Mode


Compressed

Mode

Intra-frequency neighbors can be measured simultaneously with


normal transmission by UE using a RAKE receiver.

Inter-frequency or inter-RAT neighbors measurements require the


UE measuring on a different frequency, this has either to be done
with multiple receivers in the UE or in the compressed mode.

CM is to stop the normal transmission and reception for a certain


period of time, enable the UE to measure on the other frequency.

Confidential Information of
Huawei.

Security Level: Internal

Compressed Mode

Objective of compressed mode: for UE


to realize measurement and
synchronization to target cell when
inter-frequency handover and inter-RAT
handover is required.
Confidential Information of
Huawei.

Security Level: Internal

Classification of Compressed Mode

Downlink

compressed mode

To create time for UEs measurement and synchronization.

3 optional schemes -- SF/2, rate matching/puncturing, higher layer


scheduling

Uplink

compressed mode

To avoid the interference on its own downlink measurement and


synchronization when UE is measuring certain target cells.

Whether compressed mode is needed is determined by UEs


capacity.

2 optional schemes -- SF/2, higher layer scheduling.

Confidential Information of
Huawei.

Security Level: Internal

Features of Compressed Mode


Features

of compressed mode

All parameters of compressed mode are configured by UTRAN.

The use of compressed mode would reduce the system


performance.

Complex algorithm is needed to decide when to


enter compressed mode.
Complex algorithm is needed to decide what
parameters are needed in the compressed mode.
Confidential Information of
Huawei.

Security Level: Internal

SRNS Relocation
CN
SRNS

Advantages

CN
DRNS

RNS

of SRNS relocation

Reducing data flow on Iur interface

Improving the systems adaptability.

Reducing the time delay

Problem

SRNS

of SRNS Relocation: a large amount of signaling is needed to

interact.
Confidential Information of
Huawei.

Security Level: Internal

Review
Contents

view:

UE RRC State Transition

Handover Classifications

Compress Mode

SRNC Relocation

Confidential Information of
Huawei.

Security Level: Internal

Course Contents
Chapter 1 Summary of RRM
Chapter 2 Channel Configuration
Chapter 3 Power Control
Chapter 4 Mobility Management
Chapter 5 Load Control
Chapter 6 AMR Mode Control

Confidential Information of
Huawei.

Security Level: Internal

Definition of air interface load

Wideband

power-based uplink loading:

UL

Wideband

I own I oth

PrxTotal

power-based downlink loading:

DL
Confidential Information of
Huawei.

PtxTotal

Ptx max
Security Level: Internal

Definition of air interface load

Throughput-based

uplink loading:

KN

1
(1 i )
W
k 1
1
k Rk

UL

Throughput-based

downlink loading:

DL 1 iDL

Confidential Information of
Huawei.

k Rk k

k 1
N

Security Level: Internal

Interference Margin (IM) vs. Load Factor


An

example of downlink interference (noise rise) vs. downlink

loading with balanced links is depicted as:

Confidential Information of
Huawei.

Security Level: Internal

Classification of Load Control

Technical

classification of load control:

Call Admission Control

Load balance between cells

Congestion control

Confidential Information of
Huawei.

Security Level: Internal

Admission Control

AC

is used to decide whether a new RAB is admited or a current

RAB can be modified.


Admission
The

control is done in uplink and downlink separately.

strategy is that a new bearer is admitted only if the total load

after admittance stays below the thresholds defined by RNP.

Confidential Information of
Huawei.

Security Level: Internal

Load Balance
Load

balance between cells

Load balance between intra-frequency cells


Cell breathing

Load balance between inter-frequency cells


Inter-frequency load balance

Potential user control

Confidential Information of
Huawei.

Security Level: Internal

Cell Breathing
CRNC

The objective of load


banlance is to share
the load of some
"hot" cells in
surrounding cells
with low load, thus
to increase the usage
of system capacity.

cell breathing
Confidential Information of
Huawei.

Security Level: Internal

Potential User Control


Potential

user control

To avoid the load imbalance effectively when UE enters DCH state


by making UE in idle mode or non-DCH connected mode camp in
cells with low load in advance.

To achieve the objective by changing the cell selection and reselection parameters dynamically.

Potential user control is done by using system message.

Confidential Information of
Huawei.

Security Level: Internal

Congestion Control
The

measures to make full use of system resource admission

control, load balance between cells, packet scheduling are not


enough to guarantee the absolute stabilization, hence congestion
control technology must be introduced.
Objective

of congestion control

To ensure the system load is below the absolutely steady threshold.

Methods

of congestion control

Temporarily reducing the QoS of traffic with low priority

Temporarily reducing the QoS of CS traffic in some extreme


conditions

Confidential Information of
Huawei.

Security Level: Internal

Course Contents
Chapter 1 Summary of RRM
Chapter 2 Channel Configuration
Chapter 3 Power Control
Chapter 4 Mobility Management
Chapter 5 Load Control
Chapter 6 AMR Mode Control

Confidential Information of
Huawei.

Security Level: Internal

AMR Coding

WCDMA system uses Adaptive Multi-Rate (AMR) speech code,


which is linear prediction coding.

Confidential Information of
Huawei.

Security Level: Internal

AMR Speech
Features

of AMR speech:

At a certain load level (which corresponds with SIR of UE), the Mean
Opinion Score (MOS) the users experience

does not increase

linearly with the speech rate which UE uses. That is, at a certain load
level, the most appropriate AMR speech rate used to acquire the
highest MOS does not refer to the highest rate, but an appropriate
middle rate.

The limitation of UEs maximum transmitting power restricts the


coverage of uplink AMR speech. To increase the uplink coverage of
AMR speech, uplink rate should be reduced without worsening the
UEs speech quality.

Confidential Information of
Huawei.

Security Level: Internal

MOS--CIR

Confidential Information of
Huawei.

Security Level: Internal

AMR Mode Control


Hence,

AMR mode control is to weigh the load level, and:

Reduce AMR speech rate on heavy load condition, thus


reduce the system load and improve speech quality relatively.

Increase AMR speech rate on light load condition, thus


improve QoS.

The

AMR speech mode control can be done every 20ms!

Reducing

of AMR speech rate can widen the uplink

coverage effectively.

Confidential Information of
Huawei.

Security Level: Internal

TFO

TFO(Tandem Free Operation)

Core Network

MSC
Server

Control
Plane

RANAP
H.248
RNC

UE

MGW
Iu Framing +TC

TFO

MSC
Server
RANAP
H.248

MGW
+TC Iu Framing

User
Plane

UTRAN
Radio Bearer

ISUP

Iu Bearer

CN bearer
End to end connection

Confidential Information of
Huawei.

Security Level: Internal

RNC

UTRAN
Iu Bearer

Radio Bearer

UE

Features of TFO
Features:
Need

not code transfer (Tandem)no need to transfer AMR speech

code to 64kbps PCM code, transmit AMR speech codes directly in


the network.

Advantages:
Enhance

voice quality, lower the noise brought by coding and

decoding.
Less

CN transmission bandwidth is needed.

Requirements:
Restricted
Only

by rate control in the other side when AMR mode adjusted.

the code rate supported by both sides can be used when TFO

adopted.
Confidential Information of
Huawei.

Security Level: Internal

Review
AMR

Mode Control

Confidential Information of
Huawei.

Security Level: Internal

Conclusion

RRM

(Radio Resource Management)

RRM

can be divided into:

Channel Configuration, Power Control, Load Control,


Mobility Management, AMR Mode Control, Handover etc.
Completion

of this course will help you well

understanding RRM in WCDMA.

Confidential Information of
Huawei.

Security Level: Internal

Confidential Information of
Huawei.

Security Level: Internal

You might also like