Beruflich Dokumente
Kultur Dokumente
ROMAIN MASSON
XR-EE-KT 2006:002
Abstract
The thesis project has been carried out at the standardization department of
LG Electronic Mobile Comm. LG is a member of 3GPP (3rd Generation Partnership Project), the organization which standardizes UMTS (Universal Mobile
Telecommunication Services). The third generation (3G) mobile telecommunication systems are deployed and the need of 3G long term evolution (LTE) is
pointed out to meet the future demand. This evolution is based on a new air
interface. Several new technology components such as OFDM are presented as
potential candidates. Members of 3GPP are currently considering the evolution
of the radio access technology in order to ensure their competitiveness. One field
of research concerns the Physical Random Access Channel (RACH), used during the initial access. This project proposes to analyze the new requirements, to
highlight the new air interface candidates, to compare different channel designs
and to provide a first examination of the subject.
Acknowledgements
First of all, I would like to thank Patrick Fischer and Dragan Vujcic for their
advice, their time and for giving me the chance to perform my Master Thesis
as part of the standardization team at LG Electronic Mobile Comm. I would
also like to show gratitude to the whole S&AT (Standardization and Advanced
Technology) group for their warm welcome and hospitality. I was very pleased
to work in such a pleasant working environment. Last but not least, I would
like to thank my examiner at KTH, Erik Larsson, and my advisor Xi Zhang.
Contents
1 Introduction
1.1 Background . . . . . . . . . . . . . . . . . . . . .
1.1.1 3GPP . . . . . . . . . . . . . . . . . . . .
1.1.2 LTE . . . . . . . . . . . . . . . . . . . . .
1.1.3 RACH . . . . . . . . . . . . . . . . . . . .
1.2 Problem definition . . . . . . . . . . . . . . . . .
1.2.1 A new air interface . . . . . . . . . . . . .
1.2.2 Several possible scenarios . . . . . . . . .
1.2.3 Requirements and RACH purpose . . . .
1.2.4 Design . . . . . . . . . . . . . . . . . . . .
1.3 Research approach . . . . . . . . . . . . . . . . .
1.3.1 Multiple Access protocols . . . . . . . . .
1.3.2 Air interface analysis . . . . . . . . . . . .
1.3.3 Existing random access channels analysis
1.3.4 List different scenarios . . . . . . . . . . .
1.3.5 Implementation . . . . . . . . . . . . . . .
1.3.6 Evaluation and Analysis . . . . . . . . . .
2 Multiple Access Protocols
2.1 General . . . . . . . . . . .
2.2 The pure Aloha protocol . .
2.3 The Slotted Aloha protocol
2.4 The CSMA protocol . . . .
2.5 The Reservation protocols .
2.6 Temporary conclusion . . .
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
1
1
1
1
2
2
2
3
3
4
4
4
4
4
4
4
5
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
7
7
7
8
8
10
11
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
13
13
13
14
15
16
17
18
19
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
Contents
21
21
21
21
22
23
24
24
27
27
28
28
31
32
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
45
45
46
46
48
49
50
50
51
53
53
54
55
55
56
Contents
6.4.6
6.4.7
6.4.8
57
58
58
61
63
List of Tables
4.1
24
5.1
5.2
38
39
6.1
46
11
List of Figures
2.1
2.2
2.3
2.4
2.5
2.6
2.7
2.8
2.9
.
.
.
.
.
.
.
.
.
7
8
8
9
10
10
11
11
12
3.1
3.2
3.3
3.4
3.5
3.6
3.7
3.8
3.9
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
14
14
15
15
16
17
17
18
19
4.1
4.2
4.3
4.4
4.5
4.6
4.7
4.8
4.9
4.10
4.11
4.12
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
22
23
25
26
27
28
29
29
30
31
32
32
5.1
5.2
5.3
5.4
33
34
35
5.5
13
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
35
36
14
List of Figures
5.6
5.7
5.8
5.9
37
38
40
42
6.1
6.2
6.3
6.4
6.5
6.6
6.7
6.8
6.9
6.10
6.11
System overview . . . . . . . . . . . . . . . . . . . . . . . . . . .
Multipath radio environment . . . . . . . . . . . . . . . . . . . .
The TU channel impulse response . . . . . . . . . . . . . . . . .
The scattering nature of the paths . . . . . . . . . . . . . . . . .
The Jakes coefficients used in a multipath scheme . . . . . . . . .
Additive white Gaussian noise . . . . . . . . . . . . . . . . . . . .
A signature is defined as a code and a frequency band . . . . . .
Correlators at the NodeB . . . . . . . . . . . . . . . . . . . . . .
The NodeB procedure when detecting in the frequency domain .
Averaging procedure . . . . . . . . . . . . . . . . . . . . . . . . .
Several sets of FFT/IFFT are performed to detect the presence
of a signature . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Threshold tuning: missing probabilities . . . . . . . . . . . . . .
Threshold tuning: false alarm rate . . . . . . . . . . . . . . . . .
The impact of the number of OFDM symbols on the detection rate
The impact of the transmission bandwidth . . . . . . . . . . . . .
Timing estimation error variance for each mapping scheme . . . .
Impact of the delay between two attempts . . . . . . . . . . . . .
Gain of performance with frequency hopping at 3km/h, BW =
500 kHz . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Gain of performance with frequency hopping at 3km/h, BW =
1.25 MHz . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Gain of performance with frequency hopping at 3km/h, BW = 5
MHz . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Gain of performance with power ramping . . . . . . . . . . . . .
Impact of the difference between uplink and downlink shadow
fading . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
45
46
47
47
49
49
50
51
51
52
6.12
6.13
6.14
6.15
6.16
6.17
6.18
6.19
6.20
6.21
6.22
52
53
54
54
55
56
56
57
57
58
59
60
List of Abbreviations
3GPP . . . . . . . . . . . . . . . . . . . . . .
A
ACK . . . . . . . . . . . . . . . . . . . . . . .
ADSL . . . . . . . . . . . . . . . . . . . . . .
AI . . . . . . . . . . . . . . . . . . . . . . . . .
AICH . . . . . . . . . . . . . . . . . . . . . .
ARIB/TTC . . . . . . . . . . . . . . . .
ATIS . . . . . . . . . . . . . . . . . . . . . . .
Acknowledgment packet
Asymmetric Digital Subscriber Line
Acquisition Indicator
Acquisition Indication Channel
Association of Radio Industries and Business /
Telecommunication Technology Committee
Alliance for Telecommunications Industry Solutions
B
BCH . . . . . . . . . . . . . . . . . . . . . . .
BPSK . . . . . . . . . . . . . . . . . . . . . .
BS . . . . . . . . . . . . . . . . . . . . . . . . .
Broadcast Channel
Binary Phase Shift Keying
Base Station
C
CA . . . . . . . . . . . . . . . . . . . . . . . .
CAZAC . . . . . . . . . . . . . . . . . . . .
CCSA . . . . . . . . . . . . . . . . . . . . . .
CD . . . . . . . . . . . . . . . . . . . . . . . .
CDMA . . . . . . . . . . . . . . . . . . . . .
CID . . . . . . . . . . . . . . . . . . . . . . . .
CP . . . . . . . . . . . . . . . . . . . . . . . . .
CSMA . . . . . . . . . . . . . . . . . . . . .
CTS . . . . . . . . . . . . . . . . . . . . . . .
Collision Avoidance
Constant Amplitude Zero Auto Correlation sequence
China Communications Standards Association
Collision Detection
Code Division Multiple Access
Connection Identifier
Cyclic Prefix
Carrier Sense Multiple Access
Clear To Send packet
D
DFT . . . . . . . . . . . . . . . . . . . . . . .
DFTs OFDMA . . . . . . . . . . . . .
E
EDGE . . . . . . . . . . . . . . . . . . . . .
E-UTRA . . . . . . . . . . . . . . . . . . .
ETSI . . . . . . . . . . . . . . . . . . . . . . .
F
15
16
List of Abbreviations
FDMA . . . . . . . . . . . . . . . . . . . . .
FFT . . . . . . . . . . . . . . . . . . . . . . .
H
HSDPA . . . . . . . . . . . . . . . . . . . .
I
ICI . . . . . . . . . . . . . . . . . . . . . . . . .
IEEE . . . . . . . . . . . . . . . . . . . . . .
IFDMA . . . . . . . . . . . . . . . . . . . .
IFFT . . . . . . . . . . . . . . . . . . . . . .
ISI . . . . . . . . . . . . . . . . . . . . . . . . .
L
LAN . . . . . . . . . . . . . . . . . . . . . . .
LFSR . . . . . . . . . . . . . . . . . . . . . .
LTE . . . . . . . . . . . . . . . . . . . . . . .
M
MAC . . . . . . . . . . . . . . . . . . . . . .
N
NACK . . . . . . . . . . . . . . . . . . . . .
Negative Acknowledgment
O
OFDM . . . . . . . . . . . . . . . . . . . . .
OFDMA . . . . . . . . . . . . . . . . . . .
P
PAPR . . . . . . . . . . . . . . . . . . . . . .
PRBS . . . . . . . . . . . . . . . . . . . . . .
PRMA . . . . . . . . . . . . . . . . . . . . .
Q
QAM . . . . . . . . . . . . . . . . . . . . . .
QPSK . . . . . . . . . . . . . . . . . . . . .
R
RACH . . . . . . . . . . . . . . . . . . . . .
RNG-REQ . . . . . . . . . . . . . . . . .
RNG-RES . . . . . . . . . . . . . . . . .
RTS . . . . . . . . . . . . . . . . . . . . . . .
S
SIM . . . . . . . . . . . . . . . . . . . . . . . .
SNR . . . . . . . . . . . . . . . . . . . . . . .
SS . . . . . . . . . . . . . . . . . . . . . . . . .
List of Abbreviations
17
T
TDMA . . . . . . . . . . . . . . . . . . . . .
TTA . . . . . . . . . . . . . . . . . . . . . . .
TTI . . . . . . . . . . . . . . . . . . . . . . . .
TU . . . . . . . . . . . . . . . . . . . . . . . .
U
UE . . . . . . . . . . . . . . . . . . . . . . . . .
UCD . . . . . . . . . . . . . . . . . . . . . . .
UMTS . . . . . . . . . . . . . . . . . . . . .
UTRA . . . . . . . . . . . . . . . . . . . . .
User Equipement
Uplink Channel Descriptor
Universal Mobile Telecommunication System
UMTS Terrestrial Radio Access
Chapter 1
Introduction
1.1
1.1.1
Background
3GPP
1.1.2
LTE
With enhancements such as HSDPA and Enhanced Uplink, the 3GPP radioaccess technology will be highly competitive for several years. However, to
ensure competitiveness for the next 10 years and beyond, a long-term evolution
of the 3GPP radio-access technology needs to be considered.
1
Chapter 1. Introduction
1.1.3
RACH
1.2
1.2.1
Problem definition
A new air interface
One of the main changes in the LTE system compared to UMTS is the air
interface. The way to modulate the signal is completely different. In the third
generation systems, WCDMA (Wideband Code Division Multiple Access) is
the most widely adopted technology. We propose to highlight the characteristic
items of WCDMA:
1.2.2
The RACH design for LTE is just initiated. A few contributions have been
shared and are discussed in the 3GPP meetings. This project intends to give an
overview of the actual discussion and to investigate some possible scenarios. By
now, there is no unique solution. Everything is under reflection. The subject is
still widely open, hence there is no use considering a particular random access
scheme. The purpose of the project is to analyze a number of design parameters
in order to find out the more probable configurations.
1.2.3
The LTE requirements concerning the RACH are different from the UMTS ones.
While the RACH as defined in the 3G systems is mainly used to register the
terminal after power-on to the network, the LTE RACH will have to deal with
new constraints.
In an OFDM based system, orthogonal messages can be sent. This leads to
a new way of designing the physical layer. A major challenge in such a system is
to maintain uplink orthogonality among UEs. Hence both frequency and time
synchronization of the transmitted signals from the UEs are needed. Frequency
synchronization can be achieved by fixing the UE local oscillator to the downlink
broadcast signal. The remaining frequency misalignment at the Node B is due
to Doppler, which cannot be estimated nor compensated and hence requires no
further consideration. However, the timing estimation has to be performed by
the NodeB when measuring the received signal. This can be achieved during a
random access. The UE can then receive a timing advance command from the
NodeB and adjust its uplink transmission timing accordingly.
Consequently one purpose of the LTE random access procedure is to obtain
uplink time synchronization.
1.2.4
Chapter 1. Introduction
Design
The project proposes to give an idea of the RACH design within the LTE system.
By considering the 3GPP contributions and by analyzing the new physical layer
properties, a first approach can be completed.
1.3
1.3.1
Research approach
Multiple Access protocols
1.3.2
Obviously, it appears essential to examine the candidates for the new air interface. A theoretical analysis of each candidate for the uplink transmission
(IFDMA and DFTs OFDMA) has been achieved and is presented. These two
modulation schemes have a particular frequency structure and it is interesting
to see how the signal is created.
1.3.3
An efficient way to learn how to design the new channel was to examine the
existing procedures in several systems. Much time has been spent to analyze
the UMTS RACH procedure and the WiMax ranging procedure. This phase
was an essential part of the study and was extremely helpful to understand the
problematic.
1.3.4
According to the 3GPP contributions on the subject and the previous analysis,
a set of different scenarios has been achieved. These configurations try to fit
the LTE requirements and the 3GPP members ideas. Each situation is tested
and compared to the others. The goal is to obtain primary results to help the
design of the channel.
1.3.5
Implementation
All the simulations are performed using Matlab 7.1 with the Signal Processing
and the Communication System Toolboxes. The purpose of the program should
not be restricted to the RACH transmission. Indeed, it should be used for further researches by the Standardization team at LG MobileComm. The program
contains a GUI which allows the user to tune some parameters before launching
a simulation.
1.3.6
The last part of the project consists obviously in evaluating each scenario. The
design of a RACH implementation has to balance a number of factors e.g. detection probability, false alarm probability, time offset estimation and latency.
Within the limitations set by the air interface it is necessary to optimize these
parameters to system requirements.
Chapter 2
General
The RACH is a shared channel, i.e. several UEs are allowed to use it at the
same time. The key problem is that many UE can attend to access a same
base simultaneously, leading to collisions. To make a transmission successful,
interference must be avoided or at least controlled.
There exist two types of multiple access protocols: the conflict-free and the
contention protocols. Conflict-free protocols are those ensuring a successful
transmission, whenever made, for the reason that it will not be interfered by
another transmission. Conflict-free transmission can be achieved by allocating
the channel resources (in time or frequency slots) to the users. Examples of
conflict free protocols are TDMA (Time Division Multiple Access) and FDMA
(Frequency Division Multiple Access). In a contention scheme, a transmission
is not guaranteed to be successful. Hence, the protocol must stipulate a way to
resolve conflicts so that all messages are eventually transmitted successfully.
2.2
t
Waits for acknowledgment
Random
helps to ensure that the packets do not continue to collide indefinitely. To know
if a packet has been received or not, the UE waits for an acknowledgment from
the NodeB.
The pure Aloha protocol is not efficient in the sense that the vulnerable
period is two packet long (see Figure 2.2 ). For this reason, collisions are very
probable and the capacity of the channel considerably reduced. A simple way
to improve the principle is to use the Slotted Aloha protocol.
2.3
2.4
The CSMA protocols (Carrier Sense Multiple Access) are used for example
in Ethernet, AppleTalk and Wireless LAN. They are characterized by sensing
the channel before transmitting i.e. the transmission is performed only if the
channel is sensed idle. If the medium is sensed busy, the station will defer its
transmission to a later time. These protocols are very effective when the channel
is not highly loaded and lead to excellent delay performances. However one can
observe that the method does not prevent from collision. Indeed, if two users
sense the channel idle at the same moment and decide to transmit, a collision
will happen. There exist two types of CSMA protocols: CSMA-CD (Collision
Detection) and CSMA-CA (Collision Avoidance).
station range
Figure 2.4: The hidden terminal problem: Station A senses the channel as free
and hence decides to transmit. A collision happens at the node
10
Tdata1
Station A
RTC
Tdata1
DATA
t
NodeB
CTS
Tdata1
t
Station B
RTC
Tdata1
Defer access
station range
RTC range
B
CTS range
Figure 2.6: The station A, which is not able to hear the signal from B, receives
the CTS packet. The collision is avoided.
2.5
Reservation schemes are designed to have the advantages of both the Aloha and
the TDMA approaches. They require a continuous broadcast of information
(from the node) and a good synchronization between the different stations.
Two types of reservation methods exist: the implicit reservation and the explicit
reservation.
PRMA (Packet Reservation Multiple Access) is an implicit reservation
protocol. The principle, which combines contention and reservation, is
very simple. The frame is divided into equal time slots. First all terminals
have to use the slotted Aloha protocol for contention with other terminals.
Once a station obtains a slot successfully (i.e. without collision), the slot is
automatically assigned to this station in the following frames. As soon as
the station stops using the slot, other stations can compete to reserve it. In
case of successful access, the NodeB has to broadcast the acknowledgment.
Before transmitting, a station knows which slots are available by listening
to the broadcast information. An illustration of the procedure is provided
11
s1
frame i
R8
active terminals
frame i+1
R8
active terminals
frame i+2
s2
s3
s4
R2
4,5
s5
s6
R6
R3
R2
R7
R1
R2
R7
R4
R5
Available slot
R3
4,5
Reserved slot
requesting terminals
Contention
phase
Reservation
phase
Contention
phase
Reservation
phase
2.6
Temporary conclusion
In an OFDM based system, it is achievable and very useful to introduce frequency multiplexing. The designer can consequently have the benefit of an
additional degree of freedom when trying to avoid collision probability. In this
way, several options are under considerations. Now slots are not only defined
in the time domain. A slot is characterized by a time index and a frequency
12
Data
Radio frame
Chapter 3
3.1
3.1.1
Basic OFDM
Properties and main advantages
Chapter 2
Black TEAM
Demodulation. Symbols are transformed back to bits. The inverse of the estimated channel
response is used to compensate the channel gain.
Chapter
2
Black TEAM
Demodulation.
Symbols are transformed back to bits. The inverse of the estimated
channel
response
Deinterleaver
inverse
The stream of bits fills the matrix column
is used(Interleaving
to compensate
theoperation).
channel gain.
by column. Then, the bits leave the matrix row by row.
Chapter 2
Deinterleaver
(Interleaving
operation).
of bits
fillsestimated
the matrix
column
Demodulation.
Symbols areinverse
transformed
back toThe
bits.stream
The inverse
of the
channel
byConvolution
decoder. bits
Theleave
decoder
performs
the by
Viterbi
column.isThen,
thechannel
matrix gain.
row
row. decoding algorithm to generate
response
used tothe
compensate
the
transmitted bits from the coded bits.
Black TEAM
Convolution
decoder.
The decoder
performs the
generate
Deinterleaver
(Interleaving
inverse operation).
TheViterbi
stream decoding
of bits fillsalgorithm
the matrixtocolumn
transmitted
bits
from
the
coded
bits.
by
column.
Then,
the
bits
leave
the
matrix
row
by
row.
2.2 OFDM
System
Demodulation.
Symbols
are transformed back to bits. The inverse of the estimated channel
14 toChapter
Chapter
3. Air
interface
candidates
for uplink
access
14 is used
3. Air
interface
candidates
for
uplink access
response
compensate
the
channel
gain.
Convolution
decoder.
Theand
decoder
performs
the Viterbi
decoding algorithm to generate
This section
introduces
OFDM
key system
aspects
are considered.
2.2
OFDM
System
transmitted
bits from inverse
the coded
bits.interface candidates
Deinterleaver
(Interleaving
operation).
The stream
bits fills
the
matrix column
14
3. Air
forofuplink
access
ChapterChapter
2
Black TEAM
2.2.1
Evolution
ofOFDM
OFDM
by column.
Then,
the bits
leave
matrix
row are
byconsidered.
row.
This
section
introduces
andthe
key system
aspects
e2..f1 .t
2.2
Demodulation. Symbols are transformed back to bits. The inverse of the estimated channel
OFDM System
!"*
!")
!"'
!")(
(
( ( the different
was proposed,
where
carriers
are (orthogonal
eachare
other.
With OFDM,
it is pos(
( in the $frequency
nels are
overlapping
domain buttostill
orthogonal,
the basis
(
(
(
(
(
(
!"'( in the frequency domain, thus increasing the transmission
sible to have overlapping
subchannels
(
(
(
( ( are represented in
(
!"*( Figure 3.2.
2.3. This carrier spacing provides optimal
rate. Thefunctions
basis functions
are( represented
in Figure
!"%(
( ((
(
(
(
(
!"#$%&'()(*(+"&,'-((
./
spectral
efficiency.( ((
(
!")(
(
!"*
!")
(!"%
!"'
(!"'
(
(
(
(
(
(
(
(
(
(
(
(
(
!"#
$"#
!"%
%"#
&
&"#
'
'"#
!(
(
(
(!"%(
!"#$%&'()*+',%-./#/012'314"4'5$06-"/04'"0'10',!78'494-&:'
!"'(
(
$(
(!"%(2.3: Basis functions in OFDM system
Figure
(!"#
( ( $ $"# in% OFDM
Figure
3.1: Basis (!"'
functions
system
(
%"#
&
&"#
'
'"#
#
!"%(
(
(!"'(
!"*(
!"#( !"#$%&'()*+',%-./#/012'314"4'5$06-"/04'"0'10',!78'494-&:'
$
$"#
%
%"#
&
&"#
'
'"#
#
has grown to be the
most
popular
communication
system
in
Figure
2.3:
Basis
functions
in
OFDM
(
Figure 3.1: Basis functions
in OFDMsystem
system
!(
!
( (
( (
( (
( (!"!# OFDM
Today,
high-speed
$%&'(&#)*+,(-#
( (
!")(
communications.
(
Today,
has grown to be the most popular communication system in high-speed
!"!# OFDM
$%&'(&#)*+,(-#
!"#$%&'()*+',%-./#/012'314"4'5$06-"/04'"0'10',!78'494-&:'
(01(,'2&'(%,(3#41%#41(,'%",5,1#64%-(%"',75"(%"&(%'#1834884,1(,9&'(%"&(:"#11&6(#(:-:64:($'&;4<(48(
3.1.2 communications.
The
key elements:
IFFT/FFT
(!"%(
2.3:
ininOFDM
( Figure
!"'
(
(
Figure
3.1:Basis
Basisfunctions
functions
OFDMsystem
system
(#22&2=(+"48(48(2,1&(>-(%#?415(%"&(8(6#8%(8-3>,68(,;(%"&(;'#3&(#12($7%(#(:,$-(,;(%"&3(41(%"&(
01(,'2&'(%,(3#41%#41(,'%",5,1#64%-(%"',75"(%"&(%'#1834884,1(,9&'(%"&(:"#11&6(#(:-:64:($'&;4<(48(
3.1.2 The key elements: IFFT/FFT
(!"'
(
The
key
components
of
an
OFDM
system
are' the
inverse
FFT (Fast Fourier
#22&2=(+"48(48(2,1&(>-(%#?415(%"&(8(6#8%(8-3>,68(,;(%"&(;'#3&(#12($7%(#(:,$-(,;(%"&3(41(%"&(
+"48(
@466(
3#?&(
%"&(
%"&(
(>&5411415( ,;( %"&( ;'#3&=(
!"#( #68,(
$
$"#
%
%"# ,7%$7%(
&
&"# ;',3(
'"#
#0AB+( $&'4,24:=( +"&( 8451#6(
!"%
(
Page
11
The key
of@466(
an#68,(
OFDM
system
are
the%"&(
inverse
FFT in
(Fast
Fourier
>&5411415(
,;(
%"&(
3#?&(
%"&(
,7%$7%(
;',3(
0AB+(
$&'4,24:=(
+"&(
8451#6(
Today,
OFDM
hasat
grown
tocomponents
be;'#3&=(
the+"48(
most
communication
system
high-speed
11
!"!#
$%&'(&#)*+,(-#
Transform)
the transmitter
FFTpopular
atand
thePage
receiver.
operations
per(@466(1,@(#$$&#'(#8(8",@1(>&6,@=(
@466(1,@(#$$&#'(#8(8",@1(>&6,@=(
Transform)
at theand
transmitter
FFT
at theThese
receiver.
These operations
per( mappings
communications.
!(
( ( forming linear
forming
linear
mappings
between data
N complex
data
symbols
and N complex
between
N complex
symbols
X(n)
and X(n)
N complex
!"#$%&'()*+',%-./#/012'314"4'5$06-"/04'"0'10',!78'494-&:'
( OFDM symbols x(k), result in robustness against fading multipath channel. As
Figure
2.3:
Basis
functions
in
OFDM
system
(
3.1.2
The
key
elements:
IFFT/FFT
01(,'2&'(%,(3#41%#41(,'%",5,1#64%-(%"',75"(%"&(%'#1834884,1(,9&'(%"&(:"#11&6(#(:-:64:($'&;4<(48(
OFDM symbols
x(k),
result
against
multipath channel. As
(
Figure
Basis
(
= D3.1:
< ! ;in
C ( robustness
( functions
#in
8 OFDM
" <fading
! / ( system
(!"%(
mentioned
above, the
reason
transform the high data rate stream into N
( mentioned=Dabove,
< !4D<;
( reason
# (8transform
" < ! /is( (tothe
CC!( (the
(
D)=EC(
#22&2=(+"48(48(2,1&(>-(%#?415(%"&(8(6#8%(8-3>,68(,;(%"&(;'#3&(#12($7%(#(:,$-(,;(%"&3(41(%"&(
is to
high ( data rate (stream into
N
The
key
components
of
an
OFDM
system
are
the
inverse
FFT
(Fast
Fourier
4
D<
C
!
(
(
(
(
(
(
D)=EC(
>&5411415(
,;( %"&(
;'#3&=(
+"48(
@466(
#68,(
%"&(( 11
,7%$7%(
;',3(
%"&( 0AB+( $&'4,24:=(
+"&(
Today,
has
grown
to
the?3#?&(
communication
system
in8451#6(
high-speed
(!"'
!"!#lowOFDM
$%&'(&#)*+,(-#
( ( !"#
(
=$D <be
C !$"#
D%most
0CPage
& %"# popular
/ "&"#
< fading
" ; '! . ( during
data
rate
streams,
experiencing
a& flat
!
'"#
# the transmission.
( each
0
Transform)
at
the
and
FFT
at
the
receiver.
These
operations
per; !. transmitter
@466(1,@(#$$&#'(#8(8",@1(>&6,@=(
> E!
communications.
the
data
set
be
( Suppose
; transmitted is
( ( linear
=D< C(F"&1(%"&(8&1%(8451#6("#9&(>&&1(248%,'%&2(>-(:"#11&6(43$&';&:%4,18(#12(1,48&(%"&('&:&49&'(@466(
!!?
D0Cto
& between
(
/N
" <complex
" ; ! . ( data symbols X(n) and N complex
( forming
mappings
3.1.2
The
key
elements:
IFFT/FFT
01(,'2&'(%,(3#41%#41(,'%",5,1#64%-(%"',75"(%"&(%'#1834884,1(,9&'(%"&(:"#11&6(#(:-:64:($'&;4<(48(
!"#$%&'()*+',%-./#/012'314"4'5$06-"/04'"0'10',!78'494-&:'
0 "/
5&%(#(8451#6(#::,'2415(%,(%"48G(
( OFDM
symbols
x(k),
inX(1),
robustness
against
fading multipath
channel. As
Figure
2.3:result
Basis
functions
in )OFDM
system
(
#22&2=(+"48(48(2,1&(>-(%#?415(%"&(8(6#8%(8-3>,68(,;(%"&(;'#3&(#12($7%(#(:,$-(,;(%"&3(41(%"&(
X(2),
X(N
(
( < !...,
( mentioned
=Dcomponents
< ! %;D<CC(#the
# ((8
"system
/ ( /are
<(C "reason
.D < an
CBasis
! &DOFDM
<is
C ( to
"the
< in
#
;high
!inverse
. ( dataFFT
( (Fast
D)=)C( N
functions
OFDM
system
The key
of
the
Fourier
above,
transform
rate
stream
into
F"&1(%"&(8&1%(8451#6("#9&(>&&1(248%,'%&2(>-(:"#11&6(43$&';&:%4,18(#12(1,48&(%"&('&:&49&'(@466(
>&5411415(
,;(Figure
%"&(
;'#3&=(4 D3.2:
+"48(
@466(
#68,(
3#?&(
%"&( 11
,7%$7%(
;',3(
%"&(
0AB+( $&'4,24:=(
+"&( 8451#6(
Page
(
4 D<
C Transform)
! (data (rateatstreams,
( each experiencing
(
D)=EC(
5&%(#(8451#6(#::,'2415(%,(%"48G(
the transmitter
and
FFT ata (the
These the
operations
per@466(1,@(#$$&#'(#8(8",@1(>&6,@=(
low
flat receiver.
fading (during
transmission.
; !.
> E!
0
;
0 "/
Today,
has grown
to be the most popular communication system in high-speed
@"&'&(H(2&1,%&8(:,19,67%4,1=(
!"!# OFDM
$%&'(&#)*+,(-#
0
( ; !.
> E!between N complex data symbols X(n) and N complex
((Suppose
formingthe
linear
mappings
data
set
be
is! . (
communications.
; transmitted
(
;(
%,@#'28( &#:"( ,%"&'( %"',75"( %"&( %'#1834884,1(
D0((Cto
&:"#11&68(
( "#9&(//%,(
" '&3#41(
% (D< C #( 4 D< C " =.DD<<CC !+"&(
&
D
<
C?(87>(
"
<< #" ;; !,'%",5,1#6(
.(
(
D)=)C(
!
(
;,'( %"&3(
1,%( %,( 41%&';&'&( @4%"( &#:"( ,%"&'=( +"48( 48( ;76;466&2( %"',75"( %"&( :-:64:( $'&;4<( %"#%( @#8(
OFDM symbols
0 " /x(k), result in robustness against fading multipath channel. As
01(,'2&'(%,(3#41%#41(,'%",5,1#64%-(%"',75"(%"&(%'#1834884,1(,9&'(%"&(:"#11&6(#(:-:64:($'&;4<(48(
#22&2=(+"&(:-:64:($'&;4<(84376#%&8(#(:-:64:(8%'7:%7'&(41(%"&(IBAJ(8451#6K(8,(%"#%(%"&('&:&49&2(
(
(
=
D
<
!
;
C
(
(
#
8
"
<
!
/
(
( @"&'&(H(2&1,%&8(:,19,67%4,1=(
X(2),
..., X(N
)
8451#6( :,''&8$,128(
:-:64:(
:,19,67%4,1=(
%"48( 0AB+(
AB+( :#1(
78&2( ;,'(
mentioned above,
the reason%,(X(1),
is#( to
transform
the+"',75"(
high
data
rate#12(
stream
into>&(N
#22&2=(+"48(48(2,1&(>-(%#?415(%"&(8(6#8%(8-3>,68(,;(%"&(;'#3&(#12($7%(#(:,$-(,;(%"&3(41(%"&(
3,276#%4,1(#12(2&3,276#%4,1(#12(5&%('45"%('&876%=(
4 D< C ;'#3&=(
! (data (rate
( #68,(
(
(during
>&5411415(
%"&(
+"48(
@466(
3#?&(
%"&( 11
,7%$7%(
;',3(
%"&( 0AB+(
$&'4,24:=( +"&( 8451#6(
each experiencing
a ( flat fading
the D)=EC(
transmission.
3.1.2 ,;(F"&1(%"&(8&1%(8451#6("#9&(>&&1(248%,'%&2(>-(:"#11&6(43$&';&:%4,18(#12(1,48&(%"&('&:&49&'(@466(
The
key
elements:
IFFT/FFT
( low
( streams,
Page
0 #
5&%(#(8451#6(#::,'2415(%,(%"48G(
C D 0;C!.#7!A D 9>DE<! CC
@466(1,@(#$$&#'(#8(8",@1(>&6,@=(
+"&(;(87>(:"#11&68("#9&(%,('&3#41(,'%",5,1#6(%,@#'28(&#:"(,%"&'(%"',75"(%"&(%'#1834884,1(
Suppose
the
; transmitted is
( (
=D< Cdata
! ?set
D0Cto
& be
(
/ " < " ; !.(
# 7!A
( ;,'(%"&3(1,%(%,(41%&';&'&(@4%"(&#:"(,%"&'=(+"48(48(;76;466&2(%"',75"(%"&(:-:64:($'&;4<(%"#%(@#8(
!"/ D B7!A D ? D0CC $ .D< C " &D< CC # ( (
(
(
(
D)=LC(
< CC " 7!A/D&"D <<CC
an
system
FFT
(Fast Fourier
< C #4 D< C " .D< C ! &#D<?0of
CD0( C 7!A
(( D.DOFDM
## ; ! . ( are the
( inverseD)=)C(
#22&2=(+"&(:-:64:($'&;4<(84376#%&8(#(:-:64:(8%'7:%7'&(41(%"&(IBAJ(8451#6K(8,(%"#%(%"&('&:&49&2(
( The key % Dcomponents
# ? D 0C @ D 0C " & !D 0C X(1), X(2), ..., X(N )
(8451#6( :,''&8$,128(
%,(
#(
:-:64:(
:,19,67%4,1=(
+"',75"(
%"48(
0AB+(
#12(
AB+(
:#1(
>&(
78&2(
;,'(
( = D < at
( Transform)
!
;
C
(
(
#
8
"
<
!
/
(
(
the
transmitter
and
FFT
at
the
receiver.
These
operations
perF"&1(%"&(8&1%(8451#6("#9&(>&&1(248%,'%&2(>-(:"#11&6(43$&';&:%4,18(#12(1,48&(%"&('&:&49&'(@466(
3,276#%4,1(#12(2&3,276#%4,1(#12(5&%('45"%('&876%=(
@"&'&(H(2&1,%&8(:,19,67%4,1=(
4 D< C ! (
(5&%(#(8451#6(#::,'2415(%,(%"48G(
(
(
(
(
D)=EC(
forming (linear
mappings
between
N
complex
data
symbols
X(n)
and
one
OFDM
(
0
; !.
(C D0C #7!A
D 9 D< CC( # > E! ;
+"&(;(87>(:"#11&68("#9&(%,('&3#41(,'%",5,1#6(%,@#'28(&#:"(,%"&'(%"',75"(%"&(%'#1834884,1(
symbols
composed
result
in robustness
against fad(
(
=% DD<<CC#4!D<!
D!0&CDN
&
"
.(
C " .D?
<?Cof
<$C (.complex
((C "(&D< CC # / samples
/ "<< "
# ;;! .!(x(k),
(
D)=)C(
;,'(%"&3(1,%(%,(41%&';&'&(@4%"(&#:"(,%"&'=(+"48(48(;76;466&2(%"',75"(%"&(:-:64:($'&;4<(%"#%(@#8(
# 7!A D B7!A
D
D
0
CC
D
<
0 "/
( (
(
(
D)=LC(
(
channel.
As
mentioned
above,
the
reason
is
to
transform
the high
#22&2=(+"&(:-:64:($'&;4<(84376#%&8(#(:-:64:(8%'7:%7'&(41(%"&(IBAJ(8451#6K(8,(%"#%(%"&('&:&49&2(
( ing multipath
# ? D0C 7!A D.D< CC " 7!A D&D< CC #
@"&'&(H(2&1,%&8(:,19,67%4,1=(
:,''&8$,128(
%,(N
#( :-:64:(
:,19,67%4,1=(
+"',75"(
%"48( 0AB+(
#12( AB+(
:#1( >&( 78&2( ;,'(a flat fading
F"&1(%"&(8&1%(8451#6("#9&(>&&1(248%,'%&2(>-(:"#11&6(43$&';&:%4,18(#12(1,48&(%"&('&:&49&'(@466(
data rate8451#6(
stream
into
low
data
rate
streams,
each
experiencing
!
#
"
?
D
0
C
@
D
0
C
&
D
0
C
(
3,276#%4,1(#12(2&3,276#%4,1(#12(5&%('45"%('&876%=(
5&%(#(8451#6(#::,'2415(%,(%"48G(
( transmission. Suppose the data set to be transmitted is
( +"&(;(87>(:"#11&68("#9&(%,('&3#41(,'%",5,1#6(%,@#'28(&#:"(,%"&'(%"',75"(%"&(%'#1834884,1(
( during the
;,'(%"&3(1,%(%,(41%&';&'&(@4%"(&#:"(,%"&'=(+"48(48(;76;466&2(%"',75"(%"&(:-:64:($'&;4<(%"#%(@#8(
C
D
7!A
D 9CD<( CC #((
% D < C #4 D< C " .D0<CC#!
&D<
/ " < # ; !.(
(
D)=)C(
# #22&2=(+"&(:-:64:($'&;4<(84376#%&8(#(:-:64:(8%'7:%7'&(41(%"&(IBAJ(8451#6K(8,(%"#%(%"&('&:&49&2(
7!A D B7!A D ? D0CC $ .D< C " &D< CC #
(
8451#6(
:,''&8$,128( %,( #( :-:64:( :,19,67%4,1=(
+"',75"(
0AB+( #12(
78&2( ;,'(
( ( X(2),
( %"48(X(N
( AB+( :#1( >&(
D)=LC(
X(1),
...,
)
(
# 3,276#%4,1(#12(2&3,276#%4,1(#12(5&%('45"%('&876%=(
? D0C 7!A D.D< CC " 7!A D&D< CC #
@"&'&(H(2&1,%&8(:,19,67%4,1=(
(
# (? D0C @ D0C " &!D0C
+"&(
;( 87>(N
:"#11&68(
"#9&(
'&3#41( ,'%",5,1#6(
%,@#'28(The
&#:"( Figure
,%"&'( %"',75"(
%"&( %'#1834884,1(
#7!A
# number
C D0Cthe
D 9 D< CC%,(
( is
where
total
of sub-carriers.
3.3 illustrates
a basic
;,'( %"&3( 1,%( %,( 41%&';&'&( @4%"( &#:"( ,%"&'=( +"48( 48( ;76;466&2( %"',75"( %"&( :-:64:( $'&;4<( %"#%( @#8(
#
$
"
#
7!A
D
B7!A
D
?
D
0
CC
.
D
<
C
&
D
<
CC
block scheme of an OFDM transmission
#22&2=(+"&(:-:64:($'&;4<(84376#%&8(#(:-:64:(8%'7:%7'&(41(%"&(IBAJ(8451#6K(8,(%"#%(%"&('&:&49&2(
( (
(
(
D)=LC(
# ? D0C 7!A
.D<:-:64:(
CC " 7!A :,19,67%4,1=(
D&D< CC #
8451#6( :,''&8$,128(
%,( D#(
%"48( 0AB+( #12( AB+( :#1( >&( 78&2( ;,'(
The (discrete-time
representation +"',75"(
of the signal
after a normalized IFFT is:
3,276#%4,1(#12(2&3,276#%4,1(#12(5&%('45"%('&876%=(
# ? D0C @ D0C " &!D0C
(
(
C D 0C #7!A D 9 D < CC #
# 7!A D B7!A D ? D 0CC $ .D < C " &D < CC #
( (
(
(
D)=LC(
# ? D 0C 7!A D .( D < CC " 7!A D&D < CC #
# ? D 0C @ D 0C " & !D 0C
(
15
x(k)
IFFT
s(k)
CP
r(k)
channel
y(k)
CP
Y(n)
FFT
Figure 3.3: Basic OFDM transmission (CP stands for Cyclic Prefix)
N 1
kn
1 X
x(k) =
X(n)e2j N
N n=0
k = 0..N 1
(3.1)
At the receiver side, the data is recovered by performing FFT on the received
signal,
N 1
kn
1 X
Chapter 2
Black TEAM
y(k)e2j N
n = 0..N 1
(3.2)
Y (n) =
N k=0
An N-point FFT only requires N log(N ) multiplications, which is much more computationally
The need
of awith
cyclic
prefix
efficient 3.1.3
than an equivalent
system
equalizer
in time domain.
delay of all reflected paths of the OFDM transmitted signal, see Figure 2.5.
channel impulse response
h(t)
t
0
tmax
Cyclic prefix is a crucial feature of OFDM to combat the effect of multipath. Inter symbol
interference (ISI) and inter channel interference (ICI) are avoided by introducing a guard interval
The cyclic prefix is a crucial feature of OFDM to combat the effect of mulat the front, which, specifically, is chosen to be a replica of the back of OFDM time domain
tipath.
Inter Symbol Interference (ISI) and Inter Channel Interference (ICI)
waveform.
are
avoided
by introducing
Figure 2.6 illustrates
the idea. a guard interval at the front, which, specifically, is
chosen to be a replica of the back of OFDM time domain waveform. Figure 3.5
illustrates the idea.
The idea behind this is to convert the linear convolution (between signal and
channel response) to a circular convolution. In this way, the FFT of circulary
FRAME
CP
convolved signals is equivalent to a multiplication in the frequency domain and
the data can be recovered properly (Y (n) depends only on X(n) and not on
X(i) with i 6= n).
t
0
tc > tmax
Figure
Adding
a cyclic
prefix
to a
frame
=
DF2.6:
T (y(k))
= DF
T (IDF
T (X(n))
h(k) + e(k))
= the
X(n).DF
T (h(k))
+ DF Tare
(e(k))
From above expressions
subcarrier
waveforms
now given by
Y (n)
s(k) =
x(k + N )
"N 1
n
j2k N
x(n) = 1N
k=0 X(k).e
M k < 0
0k <N 1
(3.3)
(3.4)
(2.3)
The idea behind this is to convert the linear convolution (between signal and channel response) to a circular convolution. In this way, the FFT of circulary convolved signals is equivalent
to a multiplication in the frequency domain. However, in order to preserve the orthogonality
property, tmax should not exceed the duration of the time guard interval. As shown below, once
the above condition is satisfied, there is no ISI since the previous symbol will only have effect
16
CP
Frame
t
0 tcp > tmax
(3.5)
(3.6)
y(k)
= x
(n) h(k)
=
M
X
(3.7)
h(k)
x(k n)
(3.8)
h(k)x(k n)N
(3.9)
n=1
M
X
n=1
= x(k) h(k)
(3.10)
Thus, there is no ISI since the previous symbol will only have effect over
samples within [0, tmax] and orthogonality is maintained so that there is no
ICI.
3.1.4
17
0
0
0
0
0
0
0
0
user 1
modulation
spreading
S/P
modulation
spreading
S/P
0
0
0
0
0
0
0
0
user 2
IFFT
IFFT
3.2
DFTs OFDMA
modulation
S/P
FFT
mapping
IFFT
18
S/P
FFT
IFFT
S/P
FFT
IFFT
S/P
FFT
IFFT
localized
equidistant
randomized
3.3
IFDMA
Whereas a DFTs OFDMA transmitter builds the signal in the frequency domain,
the IFDMA signal is realized in the time domain. The process is very simple.
If N is the number of used sub carriers among Ntot sub carriers, then the N
symbols data are repeated Nrep = Ntot /N times. This creates a comb-shaped
spectrum as illustrated in Figure 3.9. The users are separated by assigning a
different phase shift to each one.
We can notice that the process is equivalent to a DFTs OFDMA process
with equidistant mapping. Indeed, if we note xs (n) the input symbols, X(m)
the signal after FFT, Xmap (l) the signal after mapping and x(k) the signal after
IFFT, we get:
x(k)
NX
tot 1
2jlk
(3.11)
l=0
N 1
Xmap (m
m=0
tot
Ntot 2jmkN
)e Ntot N
N
(3.12)
N 1
X(m)e
2jmk
N
for k = 0..Ntot 1
(3.13)
for k = 0..N 1
(3.14)
m=0
= xs (k)
and since e
2jmk
N
=e
2jm(k+N )
N
, we get :
Ntot
1
N
19
Ntot
frequency
shift
N/Ntot
repetitions
modulation
CP
sK
N symbols
s1
s2
sN
Time domain
Nrep
repetitions
s1
s2
sN
s1
s2
sN
s1
s2
sN
s1
s2
sN
S
Frequency domain
f
Nrep -1
free subcarriers
N used subcarriers
3.4
General comparison
20
Chapter 4
This section proposes to describe the RACH procedure within UMTS. Understanding the mechanism in the current working system is very useful in order to
acquire a practical knowledge on the subject. Even if the air interface is totally
different, some aspects are still exploitable.
4.1.1
RACH purpose
Within a UMTS system, RACH is used for initial access, i.e. the procedure
where the UE sends a first message to the network. It is characterized by
the small amount of transmitted data. The initial access is associated with a
connection request message containing the reason of the request. There exist
several reasons for sending a connection request, as defined in [1]. The different
types of calls are listed below:
Originating call: the UE wants to setup a connection after power-on to the
network. It can be a request for speech connexion or for data streaming
for example.
Terminating call: the UE answers to paging. The downlink Paging Channel (PCH) is used to reach a mobile station which is not currently maintaining a connection with the network. Hence, if the UE receives a request
to set a connection over this channel, it answers over the RACH and sets
up a connection.
Registration: the UE wants to register only to location update. In this
way, the network will, after the process, be aware of the mobiles position.
4.1.2
Collision handling
22
message
(10 or 20 ms)
timing offset
Acquisition Indicator
4096 chips
4.1.3
23
permits also to acquire information about the power to apply regarding the
request message. The procedure is depicted in Figure 4.2.
Pm p
P
message
(10 or 20 ms)
(4.1)
(4.2)
4.1.4
A preamble is a short signal which consists of 4096 chips. It does not contain
the identity of the user. It is simply a sequence of 256 repetitions of Hadamard
codes of length 16. Hence, there exist 16 different preamble signatures (one for
each code). The preamble signatures are listed in Table 4.1.4:
Also a scrambling code related to the cell identity is applied to the preamble.
Before any attempt, the UE selects randomly a signature and sends the related
preamble. If the base station detects successfully the preamble, it can send
back an AI. This indicator contains a replica of the preamble so that the UE
can be aware of its target. The AI can take 2 values (positive acknowledgment
ACK or negative acknowledgment NACK) depending on whether the message
transmission is allowed or not. Since a NodeB is able to detect two different
signatures in the same access slot, a problem occurs only when two UEs have
selected the same signature and the same access slot which is a very unlikely
case.
24
Preamble
signature
P0 (n)
P1 (n)
P2 (n)
P3 (n)
P4 (n)
P5 (n)
P6 (n)
P7 (n)
P8 (n)
P9 (n)
P10 (n)
P11 (n)
P12 (n)
P13 (n)
P14 (n)
P15 (n)
0
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
-1
1
-1
1
-1
1
-1
1
-1
1
-1
1
-1
1
-1
2
1
1
-1
-1
1
1
-1
-1
1
1
-1
-1
1
1
-1
-1
3
1
-1
-1
1
1
-1
-1
1
1
-1
-1
1
1
-1
-1
1
4
1
1
1
1
-1
-1
-1
-1
1
1
1
1
-1
-1
-1
-1
5
1
-1
1
-1
-1
1
-1
1
1
-1
1
-1
-1
1
-1
1
6
1
1
-1
-1
-1
-1
1
1
1
1
-1
-1
-1
-1
1
1
Value of
7
8
1
1
-1 1
-1 1
1
1
-1 1
1
1
1
1
-1 1
1 -1
-1 -1
-1 -1
1 -1
-1 -1
1 -1
1 -1
-1 -1
n
9
1
-1
1
-1
1
-1
1
-1
-1
1
-1
1
-1
1
-1
1
10
1
1
-1
-1
1
1
-1
-1
-1
-1
1
1
-1
-1
1
1
11
1
-1
-1
1
1
-1
-1
1
-1
1
1
-1
-1
1
1
-1
12
1
1
1
1
-1
-1
-1
-1
-1
-1
-1
-1
1
1
1
1
13
1
-1
1
-1
-1
1
-1
1
-1
1
-1
1
1
-1
1
-1
14
1
1
-1
-1
-1
-1
1
1
-1
-1
1
1
1
1
-1
-1
4.1.5
The message can be either 10ms or 20ms. Spreading and scrambling are applied to the message part. The message part scrambling code has a one-to-one
correspondence to the scrambling code used for the preamble part. Spreading
is performed using Orthogonal Variable Spreading Factor (OVSF) codes. The
code-tree is showed in the Figure 4.3.
Spreading factors from 256 to 32 have been defined to be possible for the
message part. A direct mapping between the preamble signature and the message part spreading code node is applied. Each preamble signature points to one
of the 16 nodes in the code-tree that corresponds to SF = 16 (Spreading Factor).
The sub-tree below the specified node is used for spreading of the message part.
Explicitly, the message is spread by the channelization code Cch,SF,m where SF
s
is the spreading factor and m = SF. 16
(s is the signature index).
4.1.6
This section describes step by step the procedure for the RACH access in the
UMTS system. We first detail the MAC approach, and then the physical procedure is analyzed. Before the initiation of the RACH procedure, the following
information is received from the higher layers:
The preamble scrambling code
The message length (either 10ms or 20ms)
The number of slots between the last preamble and the message (3 or 4)
15
1
-1
-1
1
-1
1
1
-1
-1
1
1
-1
1
-1
-1
1
25
C4,0 = (1,1,1,1)
C2,0 = (1,1)
C4,1 = (1,1,-1,-1)
C1,0 = (1)
C4,2 = (1,-1,1,-1)
C2,1 = (1,-1)
C4,3 = (1,-1,-1,1)
SF = 1
SF = 2
SF = 4
SF = 8
26
start
get RACH
parameters
Nmax, Mmax, NB
M=0
M=M+1
draw random
integer k and
wait k x 10ms
M < Mmax
draw random
integer k and
wait k x 10ms
end
Physical
RACH
procedure
No ACK
info
wait NB x 10ms
NACK
ACK
send
message
end
27
start
get RACH
parameters
Nmax, Pinit , ...
N=0
P = Pinit
N=N+1
report
No ACK
N < Nmax
P=P+P
Transmit a
preamble in the
next available
access slot
No ACK
info
NACK
Report
NACK
ACK
Report
ACK
4.2
4.2.1
28
4.2.2
Ranging overview
BS
t
DL sync
established
SS
wave trip
Obtain UL
parameters
UL
parameters
acquired
Ranging
Registration
4.2.3
There exist several candidates regarding the physical layer in the 802.16e standard. This section focuses on the OFDMA PHY given that it is very similar to
the LTE system.
Firstly, a dedicated ranging channel is defined. Collision between data transmissions and random accesses can not occur, i.e. ranging access does not interfere with data. To illustrate this concept, the frame structure for the TDD
mode is depicted in Figure 4.7.
29
f
ranging slot
number
6
subchannels
10
11
empty
t
ranging allocation
30
Acquire downlink
synchronization
and transmission
parameters
Send an initial
ranging code in
a ranging slot
random
backoff
no
response
response
success
continue
adjust
parameters
adjust
parameters
wait for
ressources
31
the BS. The request is anonymous in the sense that the SS identity is not
present in the signal.
In case of successful detection, the BS broadcasts a ranging response message that announces the received ranging code and the ranging slot where
the code has been detected. In this way, the SS can identify the response
which corresponds to its request. Timing and power correction are also
included in the response, as well as a status notification. The status can
be either success or continue:
Success status: the BS subsequently provides bandwidth allocation
for the SS to send a Ranging Request (RNG-REQ) with the appropriate
timing and power adjustments.
Continue status: The SS adjusts its timing offset and transmission
power based on the response information, selects a new ranging slot and
ranging code and starts again the ranging process.
After sending the RNG-REQ, the SS waits for the RNG-RSP (response)
containing its primary CID.
The procedure can end if the maximum transmission power or the maximum
number of attempts has been reached.
4.2.4
Signatures
The codes are binary pseudo random codes generated by a PRBS (Pseudo Random Bit Sequence) generator. This kind of signature provides good cross correlation properties. The polynomial for the PRBS generator is 1+x4 +x7 +x15 . It
is initialized by the seed 0, 0, 1, 0, 1, 0, 1, 1, s0, s1, s2 , s3 , s4 , s5 , s6 where s6 is the
most significant bit, and s6 : s0 = UL IDcell (cell identity which is part of the
transmission parameters broadcasted by the BS). The Figure 4.10 represents
the PRBS in the case UL IDcell= 0.
Initialization
sequence
10
11
12
13
14
15
ck
32
4.2.5
Ranging signal
The initial ranging signal consists of two consecutive and identical OFDM symbols. In order to prevent from discontinuity between the two OFDM symbols, a
method using post and cyclic prefix is performed. A ranging frame is illustrated
in Figure 4.11.
CP
ranging symbol k
CP
ranging symbol k
144 bits
PRBS
144 symbols
BPSK
S
/
P
mapping
IFFT
ex:2048
24 subcarriers
6 subchannels
P
/
S
Chapter 5
5.1
5.1.1
3GPP members seem to agree on the fact that one of the main purposes of
the random access is to obtain fine time synchronization. The synchronization
procedure prior to the random access only gives access to the slot and frame
synchronization in the downlink. In other words, the mobile receives from a
broadcast signal the start and the end of slots and frames but the transmission
delay implies a time shift between the transmission and the reception of the
broadcast signal. Hence, the mobile can not estimate when to send its data so
that the NodeB receives them at the beginning of a slot.
The RACH procedure could be a solution to adjust the timing offset at the
UE side by informing the UE how to compensate for the round trip delay.
timing offset
NodeB
t
UE
wave trip
t
sync signal
RACH signal
34
subsequent uplink signals could be correctly decoded and would not interfere
with other users.
5.1.2
Power adjustments
In WCDMA, the power adjustment is performed using power ramping. Implicitly, the power to apply relies on the last preamble power. There is no feedback
from the NodeB to inform the UE about its power adjustments. In the E-UTRA
random access, the use of power ramping is still under consideration. This will
be explained under section 4.1.3. In case power ramping is not performed, one
can imagine a power adjustment procedure during the random access in order
to obtain the uplink power to apply for the very next transmission:
The UE either estimates a suitable transmission power from the open-loop
power control or transmits with maximum power.
In case of successful detection, the NodeB estimates the power adjustments
to apply to the uplink signal and includes this estimation in its acquisition
response.
A proper power adjustment would permit an optimal amount of transmitted
energy and hence a better battery life.
5.1.3
Resource request
Prior to sending any data, the UE has to obtain resources for transmission. The
NodeB acts as a scheduler and provides the UEs with scheduling information.
The E-UTRA random access could be an approach to request bandwidth and
time resources. One can imagine several possible solutions:
The RACH procedure is only used to acquire timing and/or power adjustments. The only purpose is to be synchronized within a fraction of the
cyclic prefix. Then a subsequent resource request has to be performed in
order to acquire resource reservation. The resource request procedure is
still contention-based but the system is synchronized.
NodeB
Response
with timing
adjustments
broadcast
signal
(slots and frames)
RACH signal
Resource assignment
Resource request
UE
unsynchronized
synchronized
35
Signature
(a code)
Message
(with resource
request)
Figure 5.3: The resource request could be part of the RACH signal
The random access signal is only composed of a signature but a signature
implicitly points to a certain resource request. One can envisage several
sets of signatures, with each set corresponds to a particular frequency
band and time interval to transmit the following data. Then, in case of
successful detection, both the UE and the NodeB implicitly know which
resource will be subsequently used.
resources for
data transmission
f
set 2
set 1
set 3
Signatures
set n
set
n-1
Figure 5.4: One to one correspondance between the sets of signature and the
available resources
5.2
5.2.1
36
identity, the desired amount of resources, the reasons of request, the nature of
the access (initial or periodic), etc. In case the signature and the message are
transmitted over the same subcarriers, the NodeB can use the signature as a
pilot to decode the message.
5.2.2
It has been agreed that orthogonal contention based and scheduled access channels are used. Two options are envisaged when designing the transmission bandwidth allocation to random and reservation access. The first one consists in assigning the whole given system bandwidth to the random access during specified
sub frames. In the second option, only a part of the given system bandwidth is
allocated to RACH access. This is depicted in the following figure:
RACH
access
(a)
(b)
37
5.2.3
With the aim of allowing for an accurate timing estimation, the signal bandwidth has to be chosen wide enough. In order to recover the following signals
emitted by the UE, an accuracy of less than a CP is needed. We will see that
a CP corresponds to a duration order of 1 s. This leads to a required signal
bandwidth in the order of 1 MHz. Hopefully, this can be supported by the
narrowest spectrum allocation in the E-UTRA (1,25 MHz).
5.2.4
A random access signal is transmitted during a specified sub frame, i.e. a RACH
sub frame, which lasts 0.5 ms. To avoid interferences with the next following sub
frame, guard interval is required, i.e. the random access signal is made shorter
than 0.5 ms. The goal is to prevent the NodeB from receiving a RACH signal
during a sub frame dedicated for data transmission. The duration of the guard
interval should depend on the cell size. A larger cell size implies a longer round
trip delay between the downlink broadcasted signal and the uplink transmission
and this time shift has to be taken into account.
guard interval > maximal
round trip delay
RACH signal
subframe dedicated
to data tansmission
t
1 TTI
5.3
Signal parameters
As mentioned in [3], the parameters for uplink transmission scheme within LTE
(SC FDMA and OFDMA concepts) are specified in Table 5.3.
The FFT size is adapted to the given system bandwidth. In this way, the
sub-carrier spacing is kept constant in any system bandwidth, which was part of
the LTE requirements. f is always equal to 15 kHz. Also the time duration of
an OFDM symbol is also constant regardless of the system bandwidth: 66.67s.
38
System
BW
Subframe
duration
Subcarrier
spacing
Sampling
frequency
1,25 MHz
FFT size
Number of
occupied
subcarriers
128
76
2,5 MHz
5 MHz
10 MHz
15 MHz
20 MHz
0,5 ms
15 kHz
1,92 MHz
3,84 MHz
7,68 MHz
15,36 MHz
23,04 MHz
30,72 MHz
(2 3, 84
MHz)
(4 3, 84
MHz)
(6 3, 84
MHz)
(8 3, 84
MHz)
256
512
1024
1536
2048
151
301
601
901
1201
( 12 3, 84
MHz)
S
/
P
FFT
Nc
map
IFFT
1024
P
/
S
CP
D/A
15,36
MHz
baseband
signal
Nc x 15 kHz
CP
0
15,36 MHz
1 OFDM
symbol
0,66 s
39
10 MHz
1,25 MHz
10 km
100 s
400 s
No
Signature only, no message part
5.4
Power ramping
In WCDMA, the random access is carried out in the same frequency band
and time slots as the uplink data transmission. This prevents from assigning resources for random access but leads to interference. Therefore, a power ramping
method, as mentioned in section 4.1.3, is performed to control the interference
caused by the UE. A maximum power transmission would cause too much interuser interference and would result in a deterioration of data reception, which is
to be highly avoided. As mentioned earlier, E-UTRA random access is made
orthogonal to data transmission. In this way, no special procedure is necessary to control interference. Power ramping could hence be avoided to allow
for faster detection. However, a trade off between detection delay and energy
consummation has to be found. Transmitting every random access with high
power would obviously result in shorter latency but the risk would be to waste a
precious amount of energy. Also, in case of narrow transmission bandwidth (i.e.
1.25 MHz), power ramping could be a solution to prevent from being stuck in a
deep fading dip. Moreover, power ramping is an efficient method to overcome
a saturation due to high traffic load. Indeed, in case of high traffic load, many
UE are likely to use the same frequency band at the same time interval. Then,
if every UE tries to access the network by sending a powerful signal, the SIR
(Signal to Interference Ratio) will become very low and the detection rate will
decrease. The use of the power ramping method would permit a lower interference level among the unsynchronized users. Finally, power ramping could also
be useful to provide different priority classes among users. For example, one
can imagine that an emergency call is allowed to perform power ramping while
a simple call is not. The differentiation could as well be made by allocating
different step size values to different user categories.
As a proposal, the following solution is given:
1.25 MHz transmission bandwidth: power ramping is used to overcome
deep localized fading. The used step size is function of the priority class
40
5.5
Frequency hopping
Frequency hopping is a simple solution to avoid deep frequency fading. It consists in choosing randomly a different frequency band for each successive attempt
(see Figure 5.8).
v
c
41
For instance, if the UE is moving with a velocity equal to 120 km/h, the
maximum Doppler frequency shift is 222 Hz (typical system with a carrier frequency of 2 GHz) and the coherence time is then equal to 0.8 ms. Consequently
we can consider in this case that frequency hopping is useless because the environment changes significantly every 2 TTIs. Meanwhile, with a velocity equal
to 3 km/h (pedestrian case), the coherence time is in the order of 32 ms and
then frequency hopping can provide great improvement.
5.6
Signature format
The signatures are pseudo noise codes. The goal is to obtain good cross correlation properties in order to achieve high detection rate and low false alarm rate.
Ideally, the autocorrelation and cross correlation of the codes should be:
E for n = 0
(5.1)
i,i (n) = E[si (k)si (k + n)] =
0 otherwise
i,j (n)
(5.2)
Also it must be easy to reproduce the signature at the receiver side. Hence
a noise-like waveform is not under consideration. Several techniques exist to
obtain pseudo random codes. A common method is to generate a maximum
length sequence (m-sequence) by using a Linear Feedback Shift Register (LFSR).
For instance, the WiMAX signatures are generated this way. The sequences are
implemented based on the recursion formula given by:
s(n) =
L
X
gi s(n i)
(5.3)
i=1
5.7
Subcarriers mapping
Once a complex pseudo random code is generated, the next step consists in
mapping the values to the sub-carriers. Here again, several possibilities could
be adopted. In the DFTs OFDMA case, an FFT may be applied prior to
the mapping. Since the input is already pseudo random, this will not change
the performances significantly. However, this would permit to use the same
transmission chain as for data communication.
Regarding the mapping procedure, the 3 mentioned schemes (localized, randomized and equidistant) can be used. Let us compare the performances when
the timing offset is estimated by performing a simple correlation in the time
domain at the receiver side. The figure below represents the autocorrelation
function of a given signature with each of the mapping schemes.
42
localized
randomized
equidistant
1800
1600
1400
1200
1000
800
600
400
200
2600
2650
2700
2750
2800
2850
2900
2950
3000
5.8
5.8.1
This section proposes to develop the random access procedure at the UE side.
The steps in italic are still under consideration.
The UE listens to a downlink broadcast signal to obtain the transmission
timing. It is also informed of the available signatures, frequency bands
and time slots for a random access.
Open-loop power control can be used to obtain a suitable transmission
power. The path loss is estimated from a downlink signal and the UE
estimates the transmission power to achieve a certain SNR target. The
uncertainty comes from the shadowing variance which is different from
uplink to downlink (different carrier frequency).
The UE selects randomly a signature, a time slot and a frequency band
among the available set.
43
A burst containing the chosen signature is sent over the selected frequency
band and time slot.
The burst may contain a payload part providing a signalling message (amount
of needed resource, reason of request, etc.).
The UE monitors a specified downlink channel for response from the
NodeB.
In case of positive answer:
The UE decodes the response and adapts its transmission timing.
If the response contains power control information, the UE adapts
also its transmission power.
Scheduling request and random access can be linked. In this case, the
UE obtain resources for transmission and is able to send data on a reservation channel. Otherwise, a subsequent resource request is performed.
If the UE does not receive any response from the NodeB:
A new attempt is performed: the UE selects a new signature, a new
frequency band and sends a new burst in a RACH sub-frame after a random back-off time.
The transmission power may be increased (power ramping method).
An alternative method could be used to ensure a better timing control:
The NodeB could send a first response with timing information. Then
the UE would have to transmit a new burst with appropriate timing correction. If the NodeB considers the timing correct, a positive response is sent
without any timing information. Otherwise another message is sent with
timing information. This would ensure better timing control but would
imply latency in the procedure.
5.8.2
NodeB procedure
The NodeB correlates the received signal in the RACH sub-frame with all possible signature sequences. The detection can be either performed in the time
domain or in the frequency domain. This will be analyzed in the following section. A detection variable is computed for each signature. It corresponds to the
ratio between the peak and the mean power value of the correlation function .
=
maxn (n)
PN
n=1 (n)
1
N
(5.4)
Once the detection variable exceeds a certain threshold, the signal is considered detected. The timing offset is then computed from the peak position.
From the value of the detection variable, the NodeB could also estimate a power
adjustment. The NodeB response should include the identity of the signature
sequence (signature, frequency band, time slot), thus indicating to which access
the answer is linked.
Chapter 6
Implementation and
Simulation
6.1
System overview
PRBS
QPSK
S/P
FFT
mapping
IFFT
CP
P/S
channel
decision
Detection
46
6.2
6.2.1
Channel modeling
Frequency selective and Time varying channel
47
-4
-6
-8
-10
-12
-14
t
1
delay (s)
pA (a) =
p ()
a a2 /22
e
i2
1
2
a0
0 < 2
(6.1)
(6.2)
48
2i
M
X
2n
)t] + 2cos()cos(2fD t)(6.3)
N
2n
)t] + 2sin()cos(2fD t)(6.4)
N
n=1
yi (t)
2i
M
X
n=1
By taking N = 4M + 2, = 0 and =
x2i (t) = i2 (M + 1),
n
M,
yi2 (t) = i2 M,
we get:
and
(6.5)
= x(t + kTs )
= y(t + kTs ) for k = 1..K
(6.6)
(6.7)
The coefficients for the next 5 paths are computed with a shifted initial
time instant value:
xi (k)
yi (k)
6.2.2
After filtering by the preceding channel, additive white Gaussian noise is added
to the signal.
49
x2(k) + j y2(k)
0,2 s
+
s(k)
r(k)
x6(k) + j y6(k)
x
5 s
TU
channel
6.2.3
Shadowing variance
(6.10)
(6.11)
(6.12)
(6.13)
50
Then if we note the correlation factor between uplink and downlink shadow
fading, the effective SNR can be modeled by:
p
SN R = SN Rtarget + (1 )N (0, 1) + (1 2 )N (0, 1)
(6.14)
Where N(0,1) is a zero-mean and unitary Gaussian variable.
As mentioned in [4], the tests performed from a GSM system at 1900 MHz
show an average correlation factor of 0.9 in a suburban environment. Since
there are no further considerations regarding the used frequencies in uplink and
downlink within LTE, this value will be used in a simulation to test the impact
of this phenomenon.
6.3
Detection analysis
At the NodeB side, the objective is to detect which signature has been sent
during a certain TTI and estimate the timing offset. For this purpose, two
detection methods have been analyzed. This part proposes to explain the two
methods.
6.3.1
The first basic method consists in performing a correlation for each signature in
the time domain. A signature is defined as a code and a frequency band. The
NodeB has a record of the resulting time domain signals for each combination
of code and frequency band.
0
band 1
band 2
2
1
IFFT
codes
QPSK
si,j
FTT
band j
n-1
0
51
correlator
S1,1
received subframe
correlator
S1,2
correlator
Si,j
6.3.2
The second method is performed in the frequency domain, i.e. an FFT is performed at the NodeB. The block scheme is given in Figure 6.9.
c*
channel
CP
demapping
FFT
IFFT
detection
Figure 6.9: The NodeB procedure when detecting in the frequency domain
Whereas the UE transmission is unchanged compared to the time domain
method, the NodeB procedure is completely different. First, the NodeB performs an FFT which size corresponds to the given system bandwidth. Then,
for each RACH signature (frequency band and code), the used sub carriers are
extracted and multiplied by the complex conjugate of the code. After that, an
IFFT is performed to achieve detection and timing estimation. The number
of FFT/IFFT operations corresponds to the number of OFDM symbols in the
random access signal. Assuming that the message is composed of 4 OFDM
symbols and that the part of the code related to the symbol k is noted ck , the
Figure 6.10 illustrates the procedure. Averaging is used to reduce the impact
of noise.
Several sets of FFT/IFFT can be required in order to detect the signature in
the RACH sub frame. As mentioned earlier, the goal is to estimate the timing
offset within a fraction of the CP. To achieve this, several sets, spaced by the
duration of the CP, are performed until the detection peak is found within the
CP interval. This is depicted in the Figure 6.11.
When the peak is located within the first CP interval, the analyzed piece of
signal corresponds to the transmitted RACH signal with a precision equal to
the length of the CP.
Note: Unlike the time domain detection, this method requires a CP.
52
received subframe
remove CP
demapping
FFT
c1*
remove CP
demapping
FFT
c2*
IFFT
remove CP
demapping
FFT
c3*
IFFT
remove CP
demapping
FFT
c4*
IFFT
IFFT
Averaging
received subframe
CP duration
received subframe
CP duration
Figure 6.11: Several sets of FFT/IFFT are performed to detect the presence of
a signature
53
6.4
Simulation results
The set of simulations is used to analyze the performances of our system for
different values of the SNR. The SNR is computed as the ratio of the transmitted
signal variance (average power) over the noise power:
Several elements are considered:
The missing probability, i.e. the probability of missing a signature.
The probability of false alarm when another code is sent in the same
frequency band.
The timing estimation variance.
The necessary number of attempts to access the network.
The total transmitted energy.
Several parameters are tested in order to evaluate their impact on the performances.
6.4.1
Threshold tuning
10
!1
missing probabilities
10
!2
10
Th = 11 dB
Th = 11.5 dB
Th = 12 dB
Th = 12.5 dB
!3
10
!4
10
!5
10
!30
!25
!20
SNR (dB)
!15
!10
54
10
Th = 10.5
Th = 11
Th = 11.5
Th = 12
!2
10
!3
10
!4
10
!5
10
!30
!25
!20
!15
SNR (dB)
!10
!5
For the following simulations, the time domain detection which is simpler
and faster will be used.
6.4.2
The signature duration is a key parameter in the random access design. The
longer the signal is, the better the detection will be. But there are two limitations: the needed guard time and the potential payload duration. The missing
proabilities are provided for 3 signature durations (1, 3 and 5 OFDM symbols)
in Figure 6.14. Four or five OFDM symbols seem a reasonable duration. This
would lead to good detection and allow a subsequent payload transmission.
Missing probabilities (BW = 1.25 MHz)
10
!1
missing probabilities
10
!2
10
1 OFDM symbol
3 OFDM symbols
5 OFDM symbols
!3
10
!4
10
!30
!28
!26
!24
!22
!20
!18
SNR (dB)
!16
!14
!12
!10
Figure 6.14: The impact of the number of OFDM symbols on the detection rate
55
6.4.3
10
!1
missing probabilities
10
!2
10
32 used subcarriers
75 used subcarriers
300 used subcarriers
!3
10
!4
10
!5
10
!30
!28
!26
!24
!22
!20
!18
SNR (dB)
!16
!14
!12
!10
6.4.4
As we mentioned in section 5.7, the mapping scheme has an impact on the timing
estimation. While the detection probability is similar in each case, the timing
estimation is disastrous with an equidistant mapping. In order to compare the
results given by each mapping, we evaluate the timing error variance, i.e, the
timing estimation error (in number of samples) is stored for each successful
detection and the error variance is computed as :
=
K
1 X
e(k)2
K
k=1
56
9000
randomized
localized
equidistant
8000
7000
6000
5000
4000
3000
2000
1000
0
!28
!26
!24
!22
!20
!18
SNR (dB)
!16
!14
!12
!10
Figure 6.16: Timing estimation error variance for each mapping scheme
6.4.5
number of attempts
8
7
6
5
4
3
2
1
!22
!20
!18
!16
SNR target (dB)
!14
!12
!10
57
6.4.6
Frequency hopping is a clever way to benefit from frequency diversity and improve the performances of the procedure. In case of frequency selective channel (TU for instance), frequency hopping would help from staying stuck in a
frequency deep fading. The improvement provided by this technique depends
highly on the transmission bandwidth. The TU channel does not present wide
deep fading (Bm 200 kHz) and hence, the enhancement will be significant for
narrow transmission band (see Figure 6.18 and Figure 6.19).
BW = 500 kHz
7
constant frequency band
frequency hopping
number of attempts
1
!22
!20
!18
!16
SNR target (dB)
!14
!12
!10
BW = 1.25 MHz
5
constant frequency band
frequency hopping
4.5
number of attempts
4
3.5
3
2.5
2
1.5
1
!22
!20
!18
!16
SNR target(dB)
!14
!12
!10
58
number of attempts
1
!22
!21
!20
!19
!18
!17
!16
SNR target (dB)
!15
!14
!13
!12
6.4.7
Power ramping
The power ramping method provides great enhancement for low initial SNR
target. The results are given in Figure 6.21. Logically, it allows the UE to be
detected fastly and we can notice that the power ramping ensures energy saving.
However, the results must be considered with prudence. The present simulation is performed from a link model. Only one user is represented and interferences caused by the others (other cells) are not taken into account.
Note: The transmitted energy is computed as :
=
E
I X
K
X
|si (k)|2
i=1 k=1
where si is the RACH signal for the attempt i, I is the number of attempts and
K the number of transmitted samples per attempt.
Theoretically,
Pt .I.K
E=
Fs
=
Here, the noise is fixed to 0 dB and the indicated energy corresponds to E
E.Fs
.
N0 .
6.4.8
In this section, we try to analyze the fact that the uplink fading is different from
downlink fading. This phenomenon implies a wrong estimation of the uplink
fading and hence a wrong initial power allocation. Two scenarios are assumed:
the realistic case (red curve) where the correlation factor between uplink
and downlink fading is equal to 0,9.
59
step =
step =
step =
step =
Transmitted Energy
700
600
0 dB
1 dB
2 dB
3 dB
500
400
300
200
100
0
!28
!26
!24
!22
!14
!12
!10
!8
!10
!8
120
100
80
60
40
20
!28
!26
!24
!22
!14
!12
60
The Figure 6.22 shows the effect of this difference in terms of performances.
We notice a significant deterioration in case the correlation factor between uplink and downlink fading is not equal to 1.
Note: The ideal case was assumed in earlier simulations in order to analyze
the system as a function of the actual SNR.
12
correlation factor = 0.9
correlation factor = 1
number of attempts
10
0
!22
!20
!18
!16
SNR target (dB)
!14
!12
!10
Figure 6.22: Impact of the difference between uplink and downlink shadow
fading
Chapter 7
62
References
[1] 3GPP TS 25.331 (V6.6.0) Technical Specification Group Radio Access
Network; Radio Resource Control (RRC); Protocol Specification (Release
6), June 2005.
[2] IEEE P802.16e-D11 Air Interface for Fixed and Mobile Broadband Wireless Access Systems, September 2005.
[3] 3GPP TR 25.814 (V0.4.1) Specification Group Radio Access Network;
Physical Layer Aspects for Evolved UTRA (Release 7), November 2005.
[4] Eldad Perahia, Donald C. Cox. IEEE 944854 Shadow Fading Correlation
Between Uplink and Downlink, 2004.
[5] IEEE P802.16-REVd/D5 Air Interface For Fixed Broadband Wireless Access Systems, May 2004.
[6] IEEE C802.16e-04/143 Ranging Enhancement for 802.16e OFDMA
PHY, June 2004.
[7] 3GPP TSG RAN WG1 - R1-050475 PAPR comparison of uplink MA
schemes, May 2005.
[8] 3GPP TSG RAN WG1 - R1-051391 Random Access Transmission for
Scalable Multiple Bandwidths in Evolved UTRA uplink, May 2005.
[9] 3GPP TSG RAN WG1 - R1-050584 EUTRA Uplink Numerology and
Design, June 2005.
[10] 3GPP TSG RAN WG1 - R1-051445 E-UTRA Random Access, November
2005.
[11] 3GPP TSG RAN WG2 - R2-052502 On RACH access systems, October
2005.
[12] 3GPP TS 25.211 (V5.6.0) Technical Specification Group Radio Access
Network; Physical channels and mapping of transport channels onto physical channels (FDD) (Release 5), September 2004.
[13] 3GPP TS 25.212 (V6.6.0) Technical Specification Group Radio Access
Network; Multiplexing and channel coding (FDD) (Release 6), September
2005.
[14] 3GPP TS 25.213 (V5.5.0) Technical Specification Group Radio Access
Network; Spreading and modulation (FDD) (Release 5), December 2003.
63
64
References
[15] Yang Yang, Tak-Shing Peter Yum. Analysis of Power Ramping Schemes
for UTRA-FDD Random Access Channel, 2004.
[16] Harri Holma and Antti Toskala, editors. WCDMA for UMTS, Radio Access
For Third Generation Mobile Communications. Wiley, 2000.
[17] B. Walke, P. Seidenberg, and M. P. Althoff, editors. UMTS the fundamentals. Wiley, 2003.
[18] Heikki Kaaranen, Ari Ahtiainen, Lauri Laitinen, Siamk Naghian, and Valtteri Niemi, editors. UMTS Networks, Architecture, Mobility and Services.
Wiley, 2001.