throbber
1
`
`APPLE 1033
`
`

`
`3G EVOLUTION: IISPA AND LTE FOR MOBILE BROADBAND
`
`2
`
`

`
`3G Evolution
`
`HSPA and LTE for Mobile Broadband
`
`Second edition
`
`Erik Dahlman, Slzfan Parkvall, Johan Skiild and Pct Bcming
`
`AMSTERDAM ' DOST“! ' HEDEJERO ' LONDON" NEW YORK ' OXJVMID
`PARIS - SAN DIRK) ' SAN FIANCIEYJ ' SINGAPORE ~ SYDNEY ' TOKYO
`Academic P.-using Inpdnloflnccviu
`
`3
`
`

`
`Aqnlcrnic Press is in lrlprim of Elsevier
`1..hIaaeHouse,Jon1an Hlll, (mom, 0x2 em
`30 Cnrponle Drive. Bnllingon. MA 01803
`First edition 20:0
`Second edilion2€08
`
`capyxigme zoos. Erik Dahlmln, Stelan Parkvall. Johan sumo -an Per Bemmx.
`Published by Elsevier Lad. All mm: reserved
`The light of Erik Dahlmnn. Stefan Parlmll. Johm sum and Pet Beminz no he
`iaitifiednstheuuhalxoflhix workhnshenlnmedinurudamewimlfn
`Copyright, Designs and Patents Act I988
`No pm ofthis plislicalion may be rupmducad. mm: in a retrieval nylun or
`Innsmitwd in any form or by any means electmnk, mechanicd, pholnoopying,
`rwonling or umemlse without the prior written petmission of the publbhnr
`Permission may be sought dlreclly frum Eeeviefi Scizuw & Technology High:
`Dqumrnent In Oxford. UK: phone (+44) (0) 1865 843830. fax (+44) (0) 1865 853333;
`email; pennissioc:Oe1sevier.com. Alternatively you can submit you! rerpest unline by
`visiting the Elneviar websue at hnprl/wwweloevleuaom/louldpeanissions. and selecting:
`obwmnepumhhnwmwmflmmm
`Notice
`No nwonsibility is swurned by the publiuher io(:uIyin_mry' andlordmage to penons
`0‘, “WWW .5 _ mm 0, Pmum mbm,y_ lemma ammfin 0‘ [mm use
`propenuon 01 any mcmoas, produas. inslrmtions or ideas contained in ma mania! rmin
`Emu. “hm, c_uM_m in mama“ Dm
`30 evo1uliol:HSPA and LTE for mobile bmadlnnd. - 2nd at
`1. Bmunband oommunixanu syslems — Standards
`2. Mobile communication
`systans — sundaxds
`3. Cdlnlar mleplmne systems - Sumdu-da
`ézlyasdfi
`I‘“'"''’' °'C“"""" C°'"“" N°"b‘” 1003931273
`ISBN: mo. I2.374538—5
`
`vim our wgbmg at ¢13¢vi¢;.1im¢,com
`
`Typeset by Charon Tec 1.Ad., A Macmillan Company. (w1lw.maani|lanm|mions.com)
`P‘med_ndmmdhG‘mBflumbyMPGB°°hm~3mnin_CmIwnll
`08091011 in 10987654321
`
`VVorldng together to grow
`lib;-afjes
`oountfics
`u-wucelscviezconi
`I ww-w.bonhid.o|g | www.sd2re.oIg
`I—‘l\'l"‘\-IH-x‘
`‘?‘.’,"*‘-'-’:
`5.-|rr~i":-I:1-§.m«.uu
`
`_.~
`
`.
`V
`;
`
`'
`
`3
`3
`‘
`5
`s
`
`A
`;‘
`‘
`
`U3‘ "f F'8'“‘”
`List of Ihblas
`
`Preface
`
`Acknowledgements
`Li“ of Acronyms
`
`PIN. I: Introduction
`
`1 Backgroundol'3G evolution
`,
`'
`' '
`1'] Hismr} and backgmmd of 3G '
`.
`. . .
`1.1.] Before 3G . . .
`.
`.
`.
`. . .
`.
`. . .
`.
`1.1.2 Early 3G discussio .
`. . . . . .
`1.1.3 Research on 3G .
`.
`. .
`.
`. . . . . . .
`1.1.4
`3G sumdardiuxion starts .
`.
`. . .
`Snmdaxdiufion , , . , _
`_
`_
`_
`_ _ _
`_
`_ _ _
`_
`_
`_
`‘ ' _ V V
`.
`L11
`-"K standardization process _ .~ .
`.
`. .
`.
`.
`.
`.
`.
`. .
`. . .
`.
`.
`. . . .
`.
`. . ,
`. . . .
`. . .
`.
`.
`.
`1.2.3
`IMT-ZOKX) activities in ITU .
`.
`.
`Spectrum for 3G and systems beyond 3G.
`. . .
`.
`
`1.2
`
`1.3
`
`.
`. . .
`.
`. . . . .
`.
`. . . .
`.
`.
`. .
`.
`
`.
`.
`.
`.
`
`.
`.
`.
`.
`
`I
`.
`.
`.
`
`.
`.
`. . . . .
`.
`.
`. . . . .
`. . . . . . .
`.
`.
`.
`. . .
`.
`
`.
`. . . .
`.
`. . . .
`.
`. . .
`.
`.
`. . . .
`
`. . .
`. . .
`. . .
`. . .
`
`.
`.
`.
`.
`
`I
`.
`.
`
`. I _ '
`. . . .
`.
`.
`.
`,
`
`_
`.
`.
`
`.
`
`.
`
`.
`
`.
`
`.
`
`. _ I
`. . .
`.
`.
`.
`. .
`
`_
`.
`.. 9
`. I]
`13
`
`2
`
`'I‘herrwtivesbehin¢ltIie3GevoIufion. . . . . . . .. . . . . . . ............l5
`2.1 Driving forces .
`.
`.
`. . . . .
`. . . . . .
`.
`.
`.
`.
`.
`.
`.
`.
`.
`.
`.
`.
`.
`.
`.
`.
`.
`.
`.
`.
`. . .
`.
`.
`.
`.
`. 15
`2-1-1
`Technology advancements .
`.
`.
`. .
`.
`. .
`. .
`.
`.
`. . .
`. . . .
`.
`.
`.
`.
`. . . 16
`2.1.2
`Services .
`.
`.
`.
`. .
`, _ . _ .
`,
`.
`.
`.
`,
`_
`_
`_
`,
`,
`,
`. _ ,
`_
`_ , , _
`_
`,
`‘ _ _
`_
`,
`.
`_
`. 17
`2.1.3 Cosundperfommnce .
`.
`.
`.
`.
`.
`, .
`.
`. . . . . . . . .
`. . . . . .
`.
`. . .. 20
`3GeV°l“"°":N°R’d‘°A°°°ssN°tw°””PV'°a°h°‘
`and mi evolved core network.
`.
`.
`.
`.
`.
`.
`.
`. . .
`. . . .
`.
`. . . .
`. . . . . .
`.
`. . .
`. 21
`2.2.1 Radio Access Network evotutlon .
`. . . .
`.
`. . . .
`. . . .
`.
`.
`.
`.
`.
`.
`. 21
`2.2.2 An evolved core network: system sxchitedure
`evolution.
`. .
`4 . .
`.
`.
`. . .
`.
`.
`.
`. . .
`. . .
`.
`.
`. .
`.
`.
`. . . . . . .
`
`. . . . 24
`
`. . .
`
`4
`
`

`
`Figure 1.1 The stauilunltzzuion plums and iterative pmcw.
`
`3. Derailcd spccrflcatioru, where every interface is specified in detail.
`4. Terring and venficazion, where the interface specifications um provcn to
`work with real-life equipment.
`
`These phases at: ovcrlapping and itcntive. As an example. requirements can be
`added, changed. or dropped during the later phases if the technical solutions call
`for it. Likcwisc. thc technical solution in the detailed specifications can change
`due to problems found in the testing and verification phme.
`
`Standardization starts with the requirements phase, where the standard: body
`decides what should he achieved with the standard. This phase is usually min-
`tively short.
`
`In the architecture phase, the stand.-trds body decides about the architecture. i.e.
`the principlcs of how to meet the requirements. The architecture phase includes
`decisions about refcrcnce points and interfaces no be standardized. This phase is
`usually quite long and may change the requirements
`
`After the architecture phase, the detailed specification phase starts. It is in this
`phase the details for each of the identified interfaces are specified. During the
`detailed specification of the interfaces. the standards body may find that it has
`to chnnge decisions done either in the architecture or even in the requirements
`phascn.
`
`Finally. the testing and verification phase starts. it is usually not a part of the
`actual standardiution in the standards bcdics. but takes place in parallel through
`testing by vendors and interoperability mung bctween vmdors. This phase is
`the: final proof of the standard. During the testing and verification phase, errors
`in the standard may still be found and those errors may change decisions in the
`detailed standard. Albeit not common. changes may need to he done also tothe
`architecture or the requirements. To verify the standard, products are needed.
`Hence. the implementation of the produas starts after (or during) the detailed
`specification phase. The testing and verification phase ends when there are
`
`Figure 1.2
`
`JGPP organlaulon
`
`stable test specifications that can be used to verify that the equipment is fulfilling
`the standard.
`
`Normally, it takes one to two years from the time when the standard is com-
`pleted until commercial pmducts are out on the market. However, if the standard
`is built from scratch, it may trace longer time since there are no stable compo-
`nents to build from.
`
`1.2.2 3GF‘P
`
`The 77u‘rd-Generation Partnznhip Pmjtct (3CrP1’) is the s mg
`body that specifies the 3G UTRA and GSM systcma. 3GP? is a parmership project
`formed by the standards bodies El‘Sl. ARIB. 'I'I‘C. '['l'A, CCSA and ATIS. 3GPP
`consists of several Technical Specifications Groups (T308 ). (see Figure 1.2).
`
`A parallel partnership project called 3Gl’P2 was formed in 1999. It also devel-
`ops 3G specifications. but for odm2000. which is the 3G technology developed
`
`5
`
`

`
`l0
`
`-
`
`30 balutloru HSPA and LTl:‘faI Mobile Blbadnnd
`
`from the 2G CDMA-bmcd standard IS-95. It is also a global project. and the
`organizational partner: are ARIB. CCSA, TIA, ’I'I‘A nnd’ITC.
`'
`
`SGPP TSG RAN is the technical specification group that has developed WCDMA.
`its evolution HSPA. as well as LTE. and is in the forefront of the technology. TSG
`RAN consists of five working groups (W68):
`
`. RAN WGl dealing with the physical layer specifications.
`. RAN WG2 dealing with the layer 2 and layer 3 radio interface q)ecificntion.s.
`. RAN WG3 dealing with the listed RAN interfncm, for example interfaces
`betweennodeaintlte RAN,bu:also theinterfnce betweentheRANandt.he
`core network.
`. RAN WG4 dealing with the radiofrequency (RF) and radio resource man-
`agemen! (RRM) performance requirements.
`. RAN WG S dealing with tho terminal oonfonnnnw testing.
`
`The scope of 361’? when it was formed in [998 was to produce global specifi-
`cations for a 3G mobile rystem based on an evolved GSM core networlr. including
`the WCDMA-based radio access of the UFRA FDD and the TD-CDMA-based
`radioaooessoftiieUTRATDDmodeTheta:ktomaintainanddeveloptlie
`GSM/EDGE specifications was added to BGPP at a later stage. The UTRA (and
`GSM/EDGE) specifications are developed, maintained and approved in 2-GPP.
`After approval, the organizmional partners transpose tkmm into (appropriate deliv-
`erablcs as standards ineach region.
`
`In parallel with the initial 3GPP work, a 3G sysmm based on TD—SCDMA was
`developed in China. TD-SCDMA was eventually merged into Release 4 of the
`SGPP specifications as an additional TDD mode.
`
`The work in 3GPP is carried out with relevant ITU recommendations in mind
`and the result of the work is also submitted to ITU. The organizational part-
`ners are obliged to identify regional requirements that may lead to options in the
`standard. Examples are regional frequency bands and special protection require-
`ments local to a region. The specifications are developed with global wanting
`and circulation of terminals in mind. This implies that many regional require-
`ments in eesence will be global requirements for all terminals, since A roaming
`terminal has to meet the stdctest of all regional requiremrs. Regional options
`in the specifications are thus more common for base stations than for terminals.
`
`The specifications of all releases can be updated after each set of TSG meetings,
`which occur 4 times a year. The SGPP documents are divided into releases, where
`
`Flgtlw L3 Rllmau o]3GPP xplcijicatiaurfur UTIM.
`
`each releasehas aset offeanmzs added compared to theprevious release. The fea-
`tures are defined in Work Item; agreed and undenaken by the TSGS. The releases
`up to Release 8 and some main femunes of those are shown in Figure 1.3. The
`date shown for each release is t.he day the content of the release was frozen. For
`historical remain. the first release is numbered by the year it was fravat (1999),
`while the following releases are numbered 4, 5, etc.
`
`For the WCDMA Radio Access developed in TSG RAN, Release 99 contains
`all features needed to meet the IMT-2000 requirements as defined by I'lU.
`There are circuit-switched voice and video services, and data services over both
`packet-switched and circuirswlnched bearers. The'i'int major addition of radio
`access features to WCDMA is Release 5 with High Speed Downlink Packet
`Access (HSDPA) and Release 6 with Erilrw-wed Uplink These two are together
`refen-ed to as HSPA and are described in more detail in Part III of this book.
`With HSPA, UTRA goes beyond the definition of a 3G mobile system and also
`encompasses broadband mobile data.
`
`With the inclusion of an Evolved UTRAN (LTE) and the related System
`Architecture Evolution (SAE) in Release 8. further steps are when in terms of
`broadband capabilities. The specific solutions chosen for LTE and SAE are
`described in Part IV of this book.

`
`1.2.3 IMT-2000 activities in ITU
`
`The present rru work on so takes place in ITU-R Working Party 50‘ (wpsn),
`where 3G systems are referred to as IM'I‘-2000. WPSD does not write technical
`
`"De war): on [MT-21m wax nmedlrnmwoildng Puty 8FInWurklnghrty5D inzoon
`
`6
`
`

`
`36 Evaluubit: HSPA and LTEfurMabt'l¢ Broadband
`
`The motives behind the 36 evolution
`
`21
`
`Flxunzl Thabirmu dalayrarvlcespacethal lr Inportanrtocaverwhendaslgningartsw
`nellrdauystenn
`
`of the mobile-communication systems need to stop at a reasonable level. a level
`that the technology available at the time of standardization can provide.
`
`2. 1.3 Cost andperformance
`There is nnotlter important driving factor for future mobile—corn1n1InicaIi0n sys-
`tems and that is the cost of the service provisioning. The technology advancement
`thatenables new services can also be utilimd to pmvide better mobile-oommunh
`cation systems using more advanced technical features. Here [P technology is not
`onlyya key enabler to allow for new services to pop up. but also a way of reduc-
`ing coat of new services. The reason is that IP as a bearer of new services can be
`used to intmduce new services as they come. not requiring an extensive special
`design of the system Of course. this requires that rhcdevices used in the mobile-
`connnunicalion system can be programmed by third-party providers and that the
`operators allow third—party service provides to use their network for communication.
`
`Another important factor ‘n that operators need to provide the services to all the
`users. Not only one user needs to get the low delay, high data rule, etc. that its
`service needs. but all the users with their,dt'fl'erent service needs should be served
`efficiently. The proomsing capmity evolution and Moore‘: law help also for this
`problem. New techniques are enabled by the higher processing power in the
`devices — techniques that delivers more bits of data per hertz. Furthermore. the
`coverage is increased with more advmoed antemas aml receivers. This enables
`the operators to deliver Lhc services to more users from one base stIl.ion._ thus
`requiring fewer sites. Fewer sites imply lower operational and capitalization costs.
`In essence. the operators need fewer bme stations and sites to provide the service.
`
`if they were provided with the
`Obviously, all services would be ‘happy’
`highest data rate, lowest delay. and lowest jitter that the system can provide.
`Unfortunately. this is unattainable in practice and contradictory to the operator
`goal of an efficicnt system: in other words, the more delay tr service can lundle
`the more eflicient the system can be. This, the cost of providing lowest possi-
`ble delay, jitter and call setup time is somewhat in conflict with the need of the
`mobile-network operator to provide it to all die users. Hence, there is a trade-off
`between mar experience and system perfomtance. The better the syaern per-
`fonnance is, the lower the costof the network. However. the end users also need
`to get adequate performance which often is in conflict with the system perform-
`ance. thus the operator cannot only optimize for system perfurrnance.
`
`2.2 3G evolution: Two Radio Access Network approaches
`and an evolved core network
`2.2. 1 Fladio Access Network evolution
`
`TSG RAN organized a workshop on JGPP long—te.rm Evolution in the fall of
`2004. The workshop was the starting point of the development of the Long-
`Term Evolution (LTE) radio interface. Afler the initial requirement phase In the
`spring of 2005, where me targets and objectives of LTE were settled, the techni-
`cal specification group TSG SA launched a corresponding work on the System
`Architecture Evolution. since it was felt that the LTE radio interface needed a
`suitable evolved system architecture.
`.
`
`The result of the LTE workshop was that a study item in 3GPP TSG RAN
`was created in December 2(X)4. Ihe first 6 months were spent on defming the
`requirements. or design targets. for LTE. These were documented in a 3GPP
`technical report [86] and approved in June 2005. Chapter I3 will go through
`the requirements in more detail. Most notable are the requirements on highdatza
`rate at the cell edge and the importance of low delay. in addition no the normal
`capacity and peak data rate requirements. Furthermore. spectrum flexibility and
`maximum commonality between PDD and TDD solutions are pronounced.
`
`During the fall 2005, 3GPP TSG RAN WGI made extensive studies of different
`basic physical layer technologies and in December 2005 the TSG RAN plcnary
`decided that the LTE radio access should be based on OFDM in the downlink
`and single carrier FDMA in the uplink.
`.
`
`TSG RAN and its working groups then worked on the LTE. specifications and
`the specifications were approved in December 2007. However. 3GPl’ TSG RAN
`did not stop working on LTE when the fi.|‘8l version of the specifications was
`
`7
`
`

`
`437.
`
`3G Evnludnn: HSPA and LTEjor Mobile Broaaand
`
`In case of a relatively small 31 and a relatively large system bandwidth, a sin-
`gle subfr-arrte may he suflicicnt for the transmission of the SI. In other cuu,
`multiple subfmmes may be needed for the transmission of a single S]. In the
`latter case, instead of segmenting each SI into sufficiently small blocks tint
`are separately channel coded and transmitted in separate subfiamcs. the com-
`plete S1 is channel coded and mapped to multiple, not necessarily consecutive
`subfraines.
`
`Sirnflar to the case of the BCH, terminals that are experiencing good channel
`conditions may then be able decode the complete SI afler receiving only a sub-
`set of the subframes to which the coded S1 is mapped, while terminals in bad
`positions need to receive more subfrarncs for proper decoding of the 51. This
`approach has two benefits:
`
`0 Similar to BCH decoding, terminals in good position: need to receive fewer
`subframes. implying the possibility for reduced terrninal power consumptiort
`0 The use of larger code blocks in combination with 'l\rrho coding leads to
`improved channel-coding gain.
`
`18.3 Random access
`
`A fundamental reqiiircrnent for any cellular system is the pomhility for the ter-
`minal to request a connection setup, commonly referred to as randnm accnrs. ln
`LTE, random access is used for several purposes, including:
`
`for initial access when establishing a radio link (moving from RRCJDLB to
`RRC_C()NNECTED: see Chapter l5 for a discussion on different terminal
`states)‘,
`to re-establish a radio link after radio link failure;
`for handover when uplirtk synchronization needs to be established to the
`new cell;
`to establish uplink synchronization if uplink or downlink data arrives when
`the terminal is in RRC_CONN'ECTED and the nplink is not synchronized;
`as a scheduling request if no dedicated scheduling-request resources haw
`been configured on PUCCH (see Chapter 19 for a discussion on uplink
`scheduling procedures).
`
`Establishment of uplink syncll-onization is the main objective for all the cases
`above: when establishing an
`radio link (i.e.. when moving from RRC_
`IDLE to RRC_CONNECI'ED).
`the random-access procedure also serves the
`purpose of-assigning a unique identity, the C-RNTI. to the terminal.
`
`l‘'-?
`.v'-:_.‘
`.635
`
`1Syndwrivc to
`nmmnz Imru
`(ham urn -eaten)
`5tqa1—Rendcmacc0ecptoambtn
`stop?-Rancornaccassrvsmnso
`
`Atirrauaiilrtinmn
`
`5993-RRC*'fl"‘|'09
`
`Orfiyifufilsnatltnnvwrthaflcdsfi
`tlnlnl random access)
`
`Figure Iltll Oturview ofrlu nmdanr-acce.r.t pmccdure
`
`The basis for random access is a contention-based procedure. illustrated in
`Figure 18.8, andconsiscs of four steps:
`
`1. The flrst step consists of tnnsrnission of a rarxiorh-access preamble, allowing
`the eNodeB to estimate the transmission timing of the terminal. Uplink synchro-
`nimtion is necessary as the terminal otherwise cannot transmit any uplink data.
`. The second step consists of the network transmitting a timing advance com-
`mand to adjust the terminal transmit timing. based on the timing estimate in
`the tint step. In addition to establishing trplinlt synchronization, the second
`step also assigns uplink resources to the temtinal to be used in the third step
`in the random-accent procedure.
`. The third step consists of tmnsmission of the l'l10bll9r‘CInliI'Ibl identity to
`the network using the UL-SCH similar to nom1al scheduled data. The exact
`content of this signaling depends on the state of the terminal. in particular
`whether it is previously lcnown to the network or not.
`. The fourth and final step consists of transmission of a contention-resolution
`message from the network to the terminal on the DL-SCH. This step also
`resolves any contention due to multiple terminals trying to access the system
`using the same rmdom—acccss resource.
`
`Only the first step uses physical-layer processing specifically designed for ran-
`dom access The lmt three steps utilize the same physical-layer processing as
`
`8
`
`

`
`434
`
`3G Evoblawl: HSPA and LIFf0rM0bI'le Bmadbald
`
`LTEasters’procedure:
`
`435
`
`used for normal uplink and downlink dam transmision. In the following, each
`of those steps is dwcribcd in more detail.
`
`step. Hence. from the preamble the temiinal used, the cNodeB, will get some
`guidance on the amount of uplink resources to be granted to the terminal.
`
`Additionally. for handover purposes it is possible to use the randorn—access
`mechanism in a contentioo—free manner as described further below. in this case
`only the firsl two steps of the procedure are used as there is no need for conten-
`tion resolution in a contention-fi'ee scheme.
`
`18.3. 1 Step 1: Random-access preamble transmission
`The first step in the rmdorn—aocess procedure is the tmnsntission of at random-
`acoem preamble. The main purpose of the preamble transmission is to indicate
`to the base station the presence of a rmdormaooefi attempt and to allow the
`base station to estimate the delay between the eNodeB and the terminal. The
`delay estimate will be used in the second step to adjust the uplink tinting.
`
`The time-frequency resource on which the random-access preamble is transmit-
`md upon is known as the Plrfirioal Random Accu: Clraruul (PRACH). The net-
`work broadcasts information to all terminals in which time-frequency resources
`rnndom—acwes prcamblc transmission is allowed (i.e.. the PRACH resources, in
`SIB-2). As part of the first step of the random-acce procedure, the terminal
`selects one prcarnble to transmit on the PRACH.
`
`In each cell, there are 64 preamble sequences available. 'I\v‘o subsets of the 64
`sequences are defined as illustrated in Figure 18.9. where the set of sequences
`In each subset is signaled as part of the system lnformaflon. When performing
`a (contention-based) random-access attempt, the terminal at random selects one
`sequence in one of the subsets. As long as no other terminal is performing a
`random-access attempt using the same sequence at the same time instant. no
`collisions will occur and the attempt will, with a high likelihood. be detected by
`the eNodeB.
`
`The subset to select the preamble sequence horn is given by the amount of data
`the terminal would like to transmit on the UL-SCH in the third random-access
`
`PIOQMDIO OM DD
`
`PGOBFIWIQ *l .1
`
`F07 oontnntlcn-tree ICCBOQ
`
`64 Pnnmbtos In ouch col
`
`Figure 18.9 Preamble subsets
`
`If the terminal has been requested to perform a contention-ftcc random access,
`for example, for handover to a new cell. the preamble In use is explicitly indi-
`cated from the eNodeB. To avoid collisions, the eNodcB should preferably
`select theconlention-free preamble from sequences outside the two subsets used
`for contention-based random: access.
`
`18.3.1.1 PFIACH time-frequency resources
`In the frequency domain, the PRACH resource. illustrated in Figure 18.10,
`has a bandwidth corresponding to six resource blocks (l.08MHz). This nicely
`rnatdres the smallest uplink cell bandwidth of six resource block: in which LTE
`can operate. Hence. the same random-access preamble structure can be used.
`regardless of the transmission bandwidth in the cell.
`
`In the time domain, the length of the preamble region depends on configured
`preamble as will be discussed further below. The basic random-access resource
`is lms in duration, but there is also the possibility to configure longer pream-
`bles. Also, note that the eNodeB uplink scheduler in principle can reserve an
`arbitrary long random-access region by simply avoiding scheduling terminals in
`multiple subsequent suMrames.
`
`Typically. the eNodeB avoids scheduling any uplink transmissions in the time-
`frequency resources uxd for random access. This avoids interference between
`UL-SCH transmissions and random-access attempt:
`from difiemnt
`termi-
`nals. The random-access preamble is said to be orthogonal to user data, unlike
`WCDMA where uplinlt data nnrtsrrtisaion and random-access attempts share the
`same resources. However. from a specification perspective. nothing prevents the
`uplink scheduler to schedule rnrnsrniuions in the mntbm-access region. Hybrid-
`ARQ retransmissions are an example of this: synchronous non-adaptive hybrid-
`ARQ retransmissions may overlap with the random—ar>oeas region and it is up to
`the implementation to handle this. either by moving the retrat-emissions in the
`frequency tkarnain as diswssod in Chapter [9 or by handling the interference at
`the eNodeB receiver
`
`For FDD, there is at most one random-access region per subframe, that is, multi-
`ple random-access attempts are not multiplexed in the frequency domain. From
`a delay perspective, it is better to spread out the random-access opportunities in
`the time domain to minimize the average waiting time before a random-access
`attempt can be initialized. For TDD. multiple randon1—access regions can be
`
`9

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket