Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
Access Technologies
Dedicated Channel: An individually-assigned,
dedicated pathway through a
transmission medium for one
user’s information
FDMA TDMA
"Confidential information -- may not be copied or disclosed without permission".
Power Power
cy cy
en en
qu Tim
qu
Tim Fre e
e Fre
CDMA
Power
y
enc
qu
Tim Fre
e
The transmission medium is a resource that can be divided into individual channels
according to different criteria depending on the technology used:
Here’s how the three most popular multiple access techniques divide their channels:
• FDMA Frequency Division Multiple Access
- each user on a different frequency,
- a channel is a frequency.
• TDMA Time Division Multiple Access
- each user on a different window period in time (“time slot”),
- TDMA usually uses FDMA to divide the frequency band into smaller
frequency channels, which are then divided in a time division fashion
(GSM),
- a channel is a specific time slot on a specific frequency.
• WCDMA Wideband Code Division Multiple Access
- each user uses the same frequency all the time, but mixed with different
distinguishing code patterns,
- WCDMA usually uses FDMA to divide the frequency band into smaller
frequency channels, which are then divided in a code division fashion
(UMTS),
- a channel is a unique (set of) code pattern(s), and a specific frequency.
Duplex Technologies
W-CDMA: FDD or TDD
Code Multiplex &
Power Time Frequency Division
UMTS USER 2
"Confidential information -- may not be copied or disclosed without permission".
Power DL
Time Code Multiplex
UL
UMTS USER 2 &
DL Time Division
DL
TDD UMTS USER 1
UL
666.67 μs
μ
5 MHz Frequency
UMT/TRD/CN/0005 01.02/EN October, 2000 Basic WCDMA Elements 3-4
The possibility to operate in either FDD or TDD mode is allowed for efficient
utilization of available spectrum according to frequency allocation in different
regions. FDD and TDD are defined as follows:
• FDD: A duplex method whereby the Uplink and the Downlink transmissions use
2 separate frequency bands:
- Uplink 1920 MHz - 1980 MHz; Downlink 2110 MHz - 2170 MHz.
- Bandwidth: each carrier is located on the center of a 5 MHz wide band.
- Channel separation: nominal value of 5 MHz that can be adjusted.
- Channel raster: 200 kHz (center frequency must be a multiple of 200 kHz).
- Tx-Rx frequency separation: nominal value of 190 MHz. This value can
be either fixed or variable (minimum of 134.8 and maximum of 245.2 MHz).
- Channel number: the carrier frequency is designated by the UTRA
Absolute Radio Frequency Channel Number (UARFCN). This number is
sent by the network (for the uplink and downlink) on the BCCH logical
channel and is defined by Nu= 5 * (Fuplink MHz) and ND= 5 * (Fdownlink MHz).
• TDD: A duplex method by which the Uplink and the Downlink transmissions are
carried over the same frequency using synchronized time intervals. The carrier
uses a 5 MHz band. The available frequency bands for TDD will be:
1900-1920 MHz and 2010-2025 MHz.
FDD mode is the preferred mode for macro-cellular applications.
TDD mode is the preferred mode for the unpaired part of the spectrum. Because
each time slot can be assigned a different direction, the TDD mode offers a great
flexibility to manage the duplex and asymmetric traffic. The TDD spectrum will be
used for low mobility coverage in urban areas. TDD mode will not be available in
R99. "Confidential information -- may not be copied or disclosed without permission".
x(t)
Power spectrum
Data sequence a2Tbit = Ebit
Tbit
+a
"Confidential information -- may not be copied or disclosed without permission".
-a
Frequency
x Tchip
spreading sequence
1/Tbit
+1 Tchip = Echip
-1
1/Tchip
= +a
transmitted sequence
a2Tchip
-a
1/Tchip
Data Transmitted
Modulation
sequence signal
Note
The bearer data rate corresponds to the bit rate just before modulation (after
channel coding, interleaving, etc.).
"Confidential information -- may not be copied or disclosed without permission".
received sequence
+a a2Tchip
"Confidential information -- may not be copied or disclosed without permission".
Frequency
-a
1/Tchip
x Tchip
spreading sequence Tchip = Echip
+1
-1 1/Tchip
a2Tbit = Ebit
= +a
Tbit
Data sequence
-a
1/Tbit
To be able to perform the despreading operation, the receiver must not only know
the sequence used to spread the data signal, but the spreading sequence of the
received signal and the locally generated spreading sequence must also be
synchronized. This synchronization must be accomplished at the beginning of the
reception and maintained until the whole signal has been received.
This synchronization is only possible in downlink.
C1,0 = 1
C4,2 = 1 -1 1 -1 High data rates: low SF
Low data rates: high SF
C2,1 = 1 -1
C4,3 = 1 -1 -1 1
SF = 1 SF = 2 SF = 4 SF = 8 à 512
The channelization codes are Orthogonal Variable Spreading Factor (OVSF) codes.
They are used to preserve orthogonality between different physical channels. They also
increase the clock rate to 3.84 Mcps. The OVSF codes are defined using a code tree.
In the code tree, the channelization codes are individually described by Cch,SF,k , where SF is
the Spreading Factor of the code and k the code number, 0 ≤ k ≤ SF-1.
A channelization sequence modulates one user’s bit. Because the chip rate is constant, the
different lengths of codes enable to have different user data rates. Low SFs are reserved
for high rate services while high SFs are for low rate services.
The length of an OVSF code is an even number of chips and the number of codes (for one
SF) is equal to the number of chips and to the SF value.
The generated codes within the same layer constitute a set of orthogonal codes.
Furthermore, any two codes of different layers are orthogonal except when one of the two
codes is a mother code of the other. For example C4,3 is not orthogonal with C1,0 and C2,1,
but is orthogonal with C2,0.
Each Sector of each Base Station transmits WCDMA Downlink Traffic Channels with up to
512 code channels.
Code tree repacking may be used to optimize the number of available codes.
Exercise: Find code Cch,8,3 and code Cch,16,15
OVSF shortage
Scrambling enables neighboring cells to use the same channelization codes. This allows
the system to use a maximum of 512 OVSF codes in each cell. Notice that the use of an
OVSF code forbids the use of the other codes in its branch. This reduces considerably the
number of available codes especially for high rate services. This may lead to an OVSF
shortage. In such a case, secondary scrambling codes are allocated to the cells and enable
the re-use of the same OVSF in the same cell.
"Confidential information -- may not be copied or disclosed without permission".
T0 synchronisation no T0 synchronisation
1 -1 -1 1 -1 1 1 -1 1 -1 -1 1 -1 1 1 -1
Cj Cj
"Confidential information -- may not be copied or disclosed without permission".
1 1 -1 -1 -1 -1 1 1 * Ck
1 1 -1 -1 -1 -1 1 1 *
Ck
1 -1 1 -1 1 -1 1 -1 1 1 1 -1 1 1 1 -1 =4
=0
+ +
No correlation Small correlation
Orthogonal Non orthogonal
USER 1 1 -1 1
*
Code 1: Cch (SF= 8 ) 1 -1 -1 1 -1 1 1 -1
"Confidential information -- may not be copied or disclosed without permission".
= -1
1
+
USER 2 1 -1 1 1 -1 1
*
Code 2: Cch (SF= 4 ) 1 -1 1 -1
1
= -1
Transmitted
Signal = 0
The different downlink physical channels are spread with different OVSF and added
together synchronously at the BTS.
What are the spreading factors in both cases? Find the name Cch,SF,k of the OVSF
codes used to spread the signals.
Find the shape of the transmitted signal.
1 1 1 1 1 1 1 1
1 1 1 1
1 1 1 1 -1 -1 -1 -1
1 1
1 1 -1 -1 1 1 -1 -1
1 1 -1 -1
1 1 -1 -1 -1 -1 1 1
1
1 -1 1 -1 1 -1 1 -1
1 -1 1 -1
1 -1 1 -1 -1 1 -1 1
1 -1
1 -1 -1 1 1 -1 -1 1
1 -1 -1 1
1 -1 -1 1 -1 1 1 -1
SF = 1 2 4 8
Received 0
Signal
"Confidential information -- may not be copied or disclosed without permission".
-2
Code 2
* 1
-1
2
= 0
-2
2 2 0 0 -2 -2 0 0 0 0 2 2 2 2 0 0 0 0 -2 -2 0 0 2 2
Soft Bits + + + +
=4 = -4 = 4 = 4 = -4 = 4
The channelization code of some physical channels is fixed. For example, the
OVSF code of the primary CPICH is always Cch,256,0. Generally, the channelization
code is assigned by the RNC.
A time slot is a unit of time which carries chips. Each time slot lasts 0.667 ms and
is made of 2560 chips. The number of bits in a time slot depends on the spreading
factor used. It is equal to 10*2k bits, with k varying from 0 to 6 on the UL path, and
from 0 to 7 on the DL path.
In the first case, it corresponds to a SF ranging from 256 to 4. In the second case,
to a SF ranging from 512 to 4.
A radio frame is a processing unit which consists of 15 time slots. Its duration is
10 ms. It is always made of 38400 chips. This gives us a fixed chip rate of
3.84 Mcps.
The System Frame Number (SFN) is broadcast by the BCCH, and goes from 0 to
4095. It is used for paging and system information scheduling. Other
synchronization counters have been defined, like BFN (Node B frame number, from
0 to 4095), RFN (RNC frame number, from 0 to 4095) and CFN (connection frame
number, from 0 to 255 or 0 to 4095 for PCH).
An hyper frame has been defined for ciphering and integrity procedures. The
hyper frame number (HFN) is a 20 bit long sequence transmitted these procedures.
Scrambling Codes - PN
PN Sequences Properties
c long,1,n
"Confidential information -- may not be copied or disclosed without permission".
X25 + X3 + 1
X25 + X3 + X2 + X + 1
clong,2,n
All the physical channels in the uplink are scrambled. In uplink, the scrambling code
can be described as either long or short, depending on the way it was constructed.
The scrambling code is always applied to one 10 ms frame. Different scrambling
codes will be allocated to different mobiles.
The figure above explains how long scrambling sequences are constructed. In
UMTS, Gold codes were chosen for their very low peak cross-correlation. Let’s see
how they are constructed.
First, the shift registers are filled up with 25 bits each. For the upper register, these
bits correspond to the representation of the scrambling sequence number n. We
will explain later what this scrambling number corresponds to, but we can say for
now that it stands on 24 bits. So the first 24 shift registers correspond to these 24
bits and the last one is initialized to 1. For the lower register, all the cells are
initialized to 1.
At every clock transition, the bits of each register move one cell down, and the
modulo-2 additions are made. The output sequence of each register is 225 -1 bits
long. The two outputs are summed up (modulo-2) to create the real-valued Gold
sequence. Then, this sequence is NRZ coded (0=“+1” and 1=“-1”) to create the
real-valued long scrambling sequence clong,1,n. The long scrambling sequence
clong,2,n is a 16,777,232 chip shifted version of the first one (which corresponds to the
modulo-2 additions on the figure above).
Finally, a complex addition between the two sequences is made to form the
complex-valued long scrambling sequence clong,n. This sequence is 225-1 chips
long. A scrambling code is obtained by choosing a 38,400 chip long part of this
sequence. There is a total of 2 25-1 possible scrambling code sequences. But since
the scrambling sequence number n used to initialize the upper register is constituted
of only 24 bits, only 2 24 long scrambling codes exist.
"Confidential information -- may not be copied or disclosed without permission".
Cell #512
Secondary scrambling code #15
The scrambling codes used in downlink are constructed very much like the long
uplink scrambling codes. They are created with two 18 cell shift registers.
First, the two shift registers are filled up. The upper one is filled up with zeros,
except for the first cell which is initialized at 1. All the cells of the lower register are
set to 1. At every clock transition, the bits of each register move one cell down, and
the modulo-2 additions are made. The two 218-1 bit long outputs (x and y) are then
combined to form a Gold code. 218-1 different Gold codes can be formed. After
NRZ coding of the bits, a complex scrambling code Sdl,n of length 38,400 is formed.
218-1 = 262,143 different scrambling codes can be formed using this method.
However, not all of them are used. The downlink scrambling codes are divided into
512 sets, of one primary scrambling code and 15 secondary scrambling codes
each.
The primary scrambling codes are scrambling codes n=16*i where i=0…511. The
15 secondary scrambling codes associated to one primary scrambling code are
n=16*i + k, where k=1…15. For now 8192 scrambling codes have been defined.
Each scrambling code k is associated with a left alternative scrambling code
(k+8192) and a right alternative scrambling code (k+16,384), that may be used in
compressed mode. In that case, the left alternative scrambling code is used if
n<SF/2 and the right one is used if n>SF/2, where Cch,SF,n is the channelization code
used for the non-compressed frames.
There is a total of 512 primary codes. They are further divided into 64 primary
scrambling code groups of 8 primary scrambling codes each. Each cell is allocated
one and only one primary scrambling code. The group of the primary scrambling
code is found by the mobiles of the cell using the SCH, while the specific primary
scrambling code used is given by the CPICH. The primary CCPCH and the primary
CPICH channels are always scrambled with the primary scrambling code of the cell,
while other channels can be scrambled by either the primary or the secondary
scrambling code.
"Confidential information -- may not be copied or disclosed without permission".
DS-CDMA Codes
• Scrambling codes distinguish cells (DL) and users (UL)
• OVSF (channelization) codes separate different physical channels
transmitted by the same BTS or UE
Scrambling code 1
"Confidential information -- may not be copied or disclosed without permission".
User 1 signal
Scrambling code 2
OVSF code
OVSF code 2 BTS
User 2 signal
User 2 signal
Scrambling code 3
OVSF code 3
OVSF code
User 3 signal User 3 signal
Downlink Uplink
RAKE Receiver
Take advantage of
multi-path diversity
"Confidential information -- may not be copied or disclosed without permission".
RX Delay (τn)
Delay τ 1 C(t-τn)
τn
D(t) α +β
(α β ) D(t)
TX β D(t)
C(t) C(t-τ1)
RX Delay (τ1)
Σ
Delay τ 0
τ1 α D(t)
RX Delay (τ0)
BTS
C(t-τ0)
τ0
Another receiver, which has been under study for a certain time now, works in a
totally different way. Multi-user detection (MUD) removes the unwanted multiple
access signals through a complex algorithm. Its goal is to cancel the intra-cell
interference.
By doing so, increased capacity and coverage are expected. Also, this would
cancel the near-far problem, but power control would still be needed to limit inter-cell
interference.
This receiver is a bit more complex than the rake receiver.
BTS
UE2
BTS
4
3 BTS
4 BTS
1
5 2 UE1
BTS
6
BTS
BTS BTS
1&2: direct paths (no interference)
3&5: interfering indirect paths
from other users’ data
BTS
4&6: self-interfering indirect paths
Eb / No
Eb / No = C / I x processing gain
Power spectrum
"Confidential information -- may not be copied or disclosed without permission".
a2Tbit = E bit
Eb/No
required
Unwanted power
from other sources
Echip
In conventional radio technologies (AMPS, TDMA and GSM), the desired signal
must be strong enough to override interferences. The figure of quality is the C/I
(carrier to interference ratio).
Co-channel users are kept at a safe distance by careful frequency planning to keep
the interference at a low level. Nearby users and cells must use different
frequencies.
In WCDMA all users occupy the same frequency band at the same time! The
figure of quality is the Eb/No (Energy per bit to interference spectral density ratio).
At the receiver, as the codes are orthogonal and known, only the power of the
intended user is despread.
After despreading (decoding), correct data recovery requires a given Eb to No ratio
that corresponds to a binary error rate (BER). Under this Eb/No, the noise will
generate too many errors. The noise is mainly generated by the other users
transmitting at the same time and at the same frequency, but using a different set of
codes.
Therefore, in order not to cross this maximal noise level, all the users have to share
the power. In WCDMA the Time-Frequency plane is not divided amongst the mobile
subscribers as done in TDMA or FDMA. So the common shared resource is power.
The despreading process results in a processing gain. The larger the Spreading
Factor, the larger the gain. This means that using a larger Spreading Factor, we can
reduce the power of transmission (and therefore the background noise). Thanks to
this property, spread signals can operate at negative signal to noise ratios (dB
scale), given that the processing gain is high enough.
Example: A narrow-band signal requires an Eb/No of 12 dB to achieve a certain bit
error rate performance. In that case, the spread signal with a processing gain of
20 dB would require a Ec/No of how much?
"Confidential information -- may not be copied or disclosed without permission".
Power spectrum
"Confidential information -- may not be copied or disclosed without permission".
Eb/No
Power
control
a2Tbit = Ebit
Eb/No
required
Maximum noise level
Unwanted power
from other sources
Power
, Interference , Capacity .
WCDMA interferences come mainly from nearby users. Transmit power on all users
must be tightly controlled so their signals reach the base station at the same signal
level. This way, interferences are controlled and the famous near-far problem is
alleviated.
Power control is also done in downlink to decrease the inter-cell interference.
The Eb/No target is set for every service, and for each environment. Every
constructor tries to have the lowest Eb/No target possible. For example, it could be
worth 6.1 dB for 12.2 kbps speech in downlink, in a dense urban area.
Power Control
1. MS Access_1 with estimated power
Closed Loop
2. BTS sends Power Control bits 1. RNC sets SIR target
to UE (1500 times/second) for service
3. MS Tx 4. RNC calculates
BLER for Tx
6. BtS continues
Power Control Node B 5. RNC sends new
(BTS) SIR target
UE RNC
Inner Loop
Outer Loop
Downlink Power Control is also used, where it is the UE that sends the TPC bits
to the BTS (the RNC determining the target BLER, and sending it to the UE).
"Confidential information -- may not be copied or disclosed without permission".
Coverage Limits
F
Eb/No Eb/No
"Confidential information -- may not be copied or disclosed without permission".
required required
SF = 128
S
Max Interference level Max Interference level
Transmitted power
Transmitted power
User 2 needs more for the UL &
DL for the same quality as user 1
UE2
UE1
BTS
Speech 8 kbps Data 144 kbps
The higher the SF, the less power is required
For a given noise level, as the processing gain is smaller for high rate user data, the
acceptable path loss is lower and therefore the range of the cell is smaller.
If 2 UEs have the same path loss, the one using the lowest SF will have to transmit
at a higher power level. Its Eb/No target shall not necessarily be higher, but it will
be more difficult to reach due to the lower processing gain.
a2T c = Ec
a2T c = Ec
As said before, a service necessitating a high bit rate will use a low spreading
factor. On the other hand, a low bit rate service will use a high spreading factor.
Having a high spreading factor is a huge benefit since it provides a high processing
gain and therefore enables to use a lower power of transmission.
High bit rate services will have a low processing gain and will need to increase their
power to reach their Eb/No target. Thus, high bit rate services will need a higher
transmit power to reach a certain Eb/No target than low bit rate services. Therefore,
they will create more interference for other users and the capacity of the cell will be
lower. This is very important for the dimensioning on the radio interface, since the
shared resource is power. Radio resource management will be done by the RNC
and will help operators manage the traffic.
That being said, different services have different Eb/No targets. Normally, a high bit
rate service will need a Eb/No a tad lower than low bit rate services. But high bit
rate services will still create much more interference than services requiring low bit
rates.
Priority Level 1
Gold Preemption Yes
Comes From HLR data
User Max BR
Guaranteed BR
384 kbit/s
144 kbit/s
etc... etc...
Priority Level 2 R A B QoS attributes
Silver Preemption No Traffic class
Maximum bitrate
User Max BR
Guaranteed BR
144 kbit/s
64 kbit/s Guaranteed bit rate
etc... etc... Delivery order
Maximum SDU size
Priority Level 3
Brown Preemption No
SDU error ratio
Residual bit error ratio
User Max BR
Guaranteed BR
144 kbit/s
16 kbit/s Delivery of erroneous SDUs
etc... etc... Transfer delay
Traffic handling priority
etc... Pre-emption Capability
Pre-emption Vulnerability
Queueing
In UMTS, a lot of different services will be available to users. High bit rate services
create a lot of interference on the radio interface and can lower the capacity of the
network. This is why radio resources have to be managed. The goal for the
operator is to maximize its QoS during busy hours and to stimulate traffic and
subscriber satisfaction out of busy hours. A maximum of capacity should be used at
all times.
Radio Resource Management (RRM) is a very important part of the end-to-end
QoS. It will be possible for the operator to manage the traffic on the radio interface
depending on the system load, and on other parameters. This should be done at
call admission, and during the communication.
RRM will be done dynamically and will enable the upgrade and downgrade of a
service from an end-to-end view, thus enabling the intelligent resource management
concept. The upgrade or downgrade should be seamless to the user.
On the radio interface, the upgrade or downgrade will be done using the AMR
control rate algorithm of the RNC for speech, and by reconfiguring the transport and
physical channels for packet services (web browsing, FTP, e-mails, etc.).
Coverage Limits
Cell Radius for a 50% Load
SF = 128
"Confidential information -- may not be copied or disclosed without permission".
SF = 32
SF = 4
2080 m
2670 m
The radius of a cell varies with the Spreading Factor and, as we will see, the
interference level (or the number of active subscribers) in the cell. The figures are
given for a traffic load of 50% of the maximum traffic acceptable in the cell.
Coverage-Capacity Tradeoff
Uplink Limits (1/2)
BS Receiver
Lowest Despread Signal
Eb/No
"Confidential information -- may not be copied or disclosed without permission".
Processing
Gain
UE1 UE2
UE3
x kbps x kbps x kbps
BTS
Consider UE 1 transmitting at the boarder of the cell. That is to say UE1 transmits at
full power and is received at the minimum power to access the cell (equal to the
receiver sensitivity). After despreading, in order to decode UE1, a noise level lower
than the maximum noise floor fixed by the processing gain and the Eb/No is
needed. As far as the interference generated by users UE2 and UE3 do not cross
this floor, UE1 is correctly decoded.
Coverage-Capacity Tradeoff
Uplink Limits (2/2)
BS Receiver
Lowest Despread Signal Eb/No
Eb/No
"Confidential information -- may not be copied or disclosed without permission".
Processing Processing
Gain Gain
Cell Breathing
BTS
The more loaded the cell is, the smaller it becomes.
UMT/TRD/CN/0005 01.02/EN October, 2000 Basic WCDMA Elements 3-27
The interference generated by UE2 to UE4 cross the maximum noise level. This
increases the BER of UE1. To maintain a good communication quality, UE1 has to
be handed over to another cell. This is called cell breathing.
In a WCDMA system, the cell size depends on the level of experienced interference.
If high interference level is detected by the base station, mobile users near the cell
boundary will be handed over to other neighboring base stations, therefore
decreasing its effective cell size.
The Npole formula gives the theoretical capacity of a cell as a function of the intra
and inter-cell interference, the processing gain, the voice activity factor and the
target Eb/No.
Coverage-Capacity Tradeoff
Downlink Limits (1/2)
BS Power Amplifier
50 W
"Confidential information -- may not be copied or disclosed without permission".
0W
BTS
BTS
Consider a BTS transmitting with UE1, UE2 and UE3. The further the UE is, the
more power is needed from the BTS to be able to reach it. When UE4 asks for an
access, the BTS doesn’t have not enough power capacity to add the power
intended to UE4 although they are very close from each other.
In that case, UE can be handed over to another BTS (if possible), or the system can
degrade the quality of communication for the other UEs in order for the BTS to be
able to reach it.
Coverage-Capacity Tradeoff
Downlink Limits (2/2)
BS Power Amplifier
50 W
"Confidential information -- may not be copied or disclosed without permission".
0W
BTS
BTS
In order to satisfy the request of UE4, UE1 is handed over to another cell if that is
possible. If not, the access to UE4 could be denied.
Macro-Diversity
Serving RNC (SRNC) and Drift RNC (DRNC)
Data DL1
Data DL2 Data DL
Data UL1
Data UL
Data UL2
"Confidential information -- may not be copied or disclosed without permission".
SRNC
Data DL1
Data UL
Data UL1
Node B Data UL
(BTS) Data DL1
Data UL
Data DL
Data DL2 Core
Data UL Network
Data UL2
UE
Data DL2
Data DL2
Data UL2
Node B DRNC
(BTS)
Compressed Mode
Measurements done
• inter-frequency power measurements
• acquisition of control channel of other system/carrier
"Confidential information -- may not be copied or disclosed without permission".
One frame
(10 ms) Transmission gap available for
inter-frequency measurements
Because the bits of one frame have to be transmitted in a smaller period of time, the
effective number of data transmitted in one frame is reduced. Therefore, in order to
keep the same quality (BER, FER, etc.), the instantaneous transmission power has
to be increased. "Confidential information -- may not be copied or disclosed without permission".
UMT/TRD/CN/0005 01.02/EN 3-31 October, 2000
Basic WCDMA Elements
STTD
PICH – X –
PDSCH – X X
AICH – X –
CSICH – X –
b 0 b1 b2 b3 Antenna 1
b0 b 1 b 2 b3
-b 2 b 3 b 0 -b 1 Antenna 2
Channel bits
Questions
2) Give the relation between chip rate, bit rate and spreading fact or:
3) True or false: A high spreading factor is needed for high bit rate services?
"Confidential information -- may not be copied or disclosed without permission".
5) What is the name of the receiver used in UMTS? What is it used for?
8) What’s the name of the scheme used for measurements before inter-frequency handovers?