hash
stringlengths 32
32
| doc_id
stringlengths 5
12
| section
stringlengths 4
595
| content
stringlengths 0
6.67M
|
---|---|---|---|
14ce710049a3c611ebb26f3972649957 | 21.978 | 8.3 Message Flows | |
14ce710049a3c611ebb26f3972649957 | 21.978 | 8.3.1 Proposed Registration process | This section outlines a possible registration process based on the SIP REGISTER method, which allows CAMEL subscription information to be stored in the SIP Proxy Server/IPSSF. IETF RFC 2543 [4] defines the term Registrar for registration purposes and it is the SIP registrar that accepts the REGISTER method. In this section it has been assumed that the SIP Proxy Server and the SIP registrar are co-located. This registration process is in addition to the PDP transport layer registration (GPRS Attach/Detach and PDP context establishment as found in UMTS 24.080 and UMTS 29.060). With the SIP REGISTER method, it is assumed that registration with a location server takes place. As this is outside the scope of SIP to specify, the information flows for this procedure are not shown, but are assumed to take place.
Unlike H.323, registration with a server is not mandatory. Only users that wish to receive incoming calls need to register with a SIP Proxy server and a location server. Callers placing calls are not required to register. The information flows for the registration procedure are shown in Figure 21 and elaborated in the following text:
{1} The MS attaches to the network using existing GPRS procedures. This involves an attach request to the SGSN and a location update sequence between the SGSN and the HLR.
{2} The MS activates a PDP context to establish an IP session with the local proxy SIP server in the visited network. Mechanisms for the discovery of the SIP Proxy server are for further study.
{3} The MS sends a REGISTER method to the SIP Proxy server.
{4} The SIP Proxy server notifies the IPSSF/VLR of the registration attempt. The IPSSF in turn notifies the HLR. The HLR responds with an InsertSubscriberData message which contains the CAMEL Subscription Information (CSI) which includes the Originating CSI (O-CSI) and Terminating CSI (T-CSI). The applicability of the Supplementary Service CSI (SS-CSI) is for further study.
{5} The SIP Proxy server acknowledges that the registration process has been completed by a 200 OK response message.
{6} Once the registration process is complete, the PDP session with the SIP Proxy Server may be terminated.
Figure 21: Proposed registration procedure |
14ce710049a3c611ebb26f3972649957 | 21.978 | 8.3.2 Mobile Originating Call with CAMEL interaction | This section deals with the mobile originating calls that require interaction with CAMEL.
The call flows are shown in Figure 22 and are further explained below:
{1} The MS wishes to place a VoIP call. A PDP context is established to allow an IP session to be established over the GPRS network.
{2} The User Agent Server in the MS initiates a SIP request by issuing an INVITE method to the SIP Proxy server.
{3} The VLR functionality in the IPSSF is checked to determine if the calling party has previously registered. If no registration found, then step {4} is followed. If the IPSSF determines that the calling user has a valid registration then step {5} is followed.
{4} The IPSSF establishes a dialogue with the HLR of the subscriber’s network. An UpdateLocation message is sent to the HLR. The HLR responds by sending an InsertSubscribersData message, which may contain the CAMEL Subscription Information, including O-CSI, T-CSI and the SS-CSI.
{5} The O-CSI data is analysed and if the necessary triggering criteria are met, the gsmSCF is invoked via an InitialDP message.
{6} The SIP Proxy server will route the call based on the instructions received by the service logic in the gsmSCF. The remainder of the information flows will vary according to the service logic and are not shown.
Figure 22: MO Call with CAMEL interaction |
14ce710049a3c611ebb26f3972649957 | 21.978 | 8.3.3 Mobile Terminating Call with CAMEL interaction | This section deals with the CAMEL interaction for mobile terminated calls. A CAMEL service is triggered if the triggering criteria held in the called subscriber’s T-CSI matches the characteristics of the incoming call. The information flows are shown in Figure 23 and further explained below:
{1} The terminating SIP Proxy server receives an INVITE method.
{2} The T-CSI is analysed and the triggering criteria are check against the particulars of the incoming call. A terminal must register with a server to be able to accept incoming call and has been assumed that since this registration has taken place; the T-CSI is available at the server.
{3} If the necessary triggering criteria are met, the gsmSCF is invoked and a CAP dialogue established between the IPSSF and the gsmSCF.
{4} Instructions are received from the gsmSCF on how the call is to be routed.
{5} The SIP Proxy server will route the call based on the instructions received by the service logic in the gsmSCF. A network initiated PDP context is established in order to deliver the INVITE method to the User agent server. As the rest of the information flows will vary according to the service logic, the remained of the information flows are not shown.
Figure 23: MT Call with CAMEL interaction |
14ce710049a3c611ebb26f3972649957 | 21.978 | 8.4 State Models | |
14ce710049a3c611ebb26f3972649957 | 21.978 | 8.4.1 Mapping SIP message to CAMEL Basic Call State Models | This section deals with how the Originating Basic Call State Model (O-BCSM) Points in Call (PICs) and Detection Points (DPs) or ‘triggers’ are mapped to the appropriate SIP messages. Although a mapping is possible, there is not always the same analogy between the circuit switched environment that the CAMEL BCSM were designed for and the packet environment, and as a result a direct mapping is not always possible. The state models for the CAMEL O-BCSM and the T-BCSM are based on the emerging CAMEL Phase 3 draft specifications as identified in reference[11].
For simplicity, the information flows in the Figures of the following subsections do not show the flows between the GPRS network nodes (SGSN and GGSN) and between the gsmSCF and IPSSF. |
14ce710049a3c611ebb26f3972649957 | 21.978 | 8.4.2 Mapping to Originating BCSM for MO calls | The mapping between the SIP methods and responses for O-BCSM relating to Mobile Originating Calls are shown in Figure 24. Only the successful case is described. Further work is necessary to describe all other scenarios. The information flows are further described below :
{1} INVITE method arrives at the proxy server, indicating that the MS has requested to set up a call. SIP Proxy server determines if O-CSI exists for this user.
{2} Analysis of the O-CSI takes places and if necessary triggering criteria are met, gsmSCF is invoked. DP CollectedInfo may be reported.
{3} Instructions received from the gsmSCF on how the call is to be routed, together with which EDPs are armed. State Routing_And_Alerting entered. INVITE method forwarded to destination.
{4} A response ‘200 OK’ indicates that the destination has accepted in session invitation, indicating that a session has been established. State O_Active is entered, DP O_Active may be reported to the gsmSCF and an ACK is sent to the originating party.
{5} Either party may release the call with a BYE method. On receipt of the BYE, transition to the PIC O_Null&Authorise_Oriigination_Attempt_Collect takes place and the DP O_Disconnect may be reported to the gsmSCF.
Figure 24: Message flows and corresponding CAMEL O-BCSM for successful call establishment |
14ce710049a3c611ebb26f3972649957 | 21.978 | 8.4.3 Terminating BCSM for MT Calls | The mapping between the SIP methods and responses for T-BCSM and Mobile Terminating Call is shown in Figure 25. The information flows further described below :
{1} INVITE method arrives at the destination SIP Proxy server. Server/IPSSF determines if a T-CSI exists for the called user
{2} T-CSI is analysed and if necessary triggering criteria are met, gsmSCF is invoked. Transition to state TerminatingCallHandling and DP Terminating_Atttempt_Authorised may be reported.
{3} Call accepted by the terminating party. DP T_Answer may be reported to the gsmSCF, state T_Active entered.
{4} Either party may terminate the call by sending a BYE and transition to PIC T_Null takes place and the DP T_Disconnect may be reported.
Figure 25: Message flows and corresponding PIC in the CAMEL T-BCSM for successful call delivery |
14ce710049a3c611ebb26f3972649957 | 21.978 | 8.4.4 Unsuccessful MT Call Delivery | This subsection explores the mapping and the reporting of the DPs that may be encountered when the call is not successfully established. The information flows are shown in Figure 26 and further explained below:
{1} INVITE method arrives at the destination SIP proxy server. Server/IPSSF determines is a T-CSI exists for the called user
{2} T-CSI is analysed and if necessary triggering criteria are met, gsmSCF is invoked. Transition to state TerminatingCallHandling and DP Terminating_Atttempt_Authorised may be reported.
{3} The destination does not accept the incoming call – reason response may be any value in 4xx response range. The mapping of client error codes (4xx) to the possible Detection Points in PIC Terminating_Call_Handling is not all that straight forward. For example, the DP T_CallHandlingFailure can capture most of the 4xx error codes, and T_Busy can be mapped on to 486 Busy Here, it is not clear how T_Abandon and T_No_Answer can be mapped on to the error codes. Although further work is required, the problem is not unique to GSM and CAMEL. Work in other standards organisations needs to be investigated to determine similar issues.
Figure 26: Message flows and corresponding PIC in the CAMEL T-BCSM for unsuccessful call establishment. |
14ce710049a3c611ebb26f3972649957 | 21.978 | 8.5 CAMEL Integration | Integration of CAMEL functions with SIP Proxy Server functions may require enhancements to SIP standards or CAMEL standards. Some initial work has been done to identify the standards that may need to be enhanced and to assess the extent of the changes required. |
14ce710049a3c611ebb26f3972649957 | 21.978 | 8.5.1 Impact on SIP Standards | Section 8.4 describes and illustrates how SIP messages may be mapped to O_BCSM and T_BCSM Detection Points (DPs) at the SIP Proxy Server/SSF. When studying the Figures it can be seen that some CAMEL Phase 3 DPs (such as O_Active) have good correspondence with SIP messages at the SIP Proxy Server, while other DPs require more detailed analysis. At this level of analysis it seems likely that changes to SIP may not be needed. |
14ce710049a3c611ebb26f3972649957 | 21.978 | 8.5.2 Impact on CAMEL and other UMTS Standards | It is likely that some functional modelling additions and some CAP message information element additions will be needed. It is also likely that some HLR/VLR data and MAP protocol additions may be needed. It is of course very difficult to assess and describe exactly how much effort and meeting time is required to effect these changes. In comparison to previous CAMEL work on Phase 1, Phase 2 and Phase 3, in the author's opinion the effort required is probably more than was necessary to complete GPRS inter-working in CAMEL Phase 3, but probably less than the work necessary to complete CAMEL Phase 1.
The major impact of these changes concerns documents 22.078, 23.018, 23.078, 29.078 and 29.002 |
14ce710049a3c611ebb26f3972649957 | 21.978 | 8.6 Service Impacts | The combination of CAMEL and SIP (as described in this report) may support some GSM supplementary services, such as unconditional call forwarding (subject to some re-engineering) and perhaps most operator specific services (depends on the extent of any reduced functionality necessary for integration). Every service needs to be studied in detail to determine exactly what can be supported. Interworking with SIP extensions for call control services is another aspect. Again every service needs to be studied in detail. |
14ce710049a3c611ebb26f3972649957 | 21.978 | 8.7 Multimedia Evolution | The proposal in this report is focused on voice not multimedia. Control of multimedia services requires further study. However, the proposal does not in any way preclude CAMEL evolution to control multimedia services supported by SIP. It is likely that further enhancements to the protocols and functions listed in section 8.5.2 (e.g.. MAP, CAP, HLR, VLR, CSE) may be necessary, depending on the nature of the multimedia service support required. |
14ce710049a3c611ebb26f3972649957 | 21.978 | 8.8 Advantages | The following advantages have been identified:
Maximises the re-use of existing functional entities, protocols and services. Such reuse decreases the development and ownership costs allowing existing familiar 2G services to be provided to 3G subscribers at an early stage.
Minimum changes to the CSE for the support of legacy services. There are several IN/CAMEL services already deployed such as PrePaid, VPN, Mobile Number Portability, etc which may be used in a voice over IP network. |
14ce710049a3c611ebb26f3972649957 | 21.978 | 8.9 Disadvantages | The following disadvantages have been identified:
This approach is not in line with the work currently underway in ETSI SPAN 3 (Services and Protocols), in particular a work item addressing IN support for voice over IP on the H.323 architecture and associated protocols in association with the TIPHON project.
Introduces new functional entity ‘IPSSF’, which provides the necessary mapping between the SIP Proxy Server and the CSE. However, this functional entity is based on the functions already provided by a VMSC/GMSC, where already standardised process such as the gsmSSF can be reused.
The interface between the SCS/CSCF and the IPSSF requires further study. |
14ce710049a3c611ebb26f3972649957 | 21.978 | 9 Work in other Standards Groups | |
14ce710049a3c611ebb26f3972649957 | 21.978 | 9.1 3GPP | |
14ce710049a3c611ebb26f3972649957 | 21.978 | 9.1.1 System Architecture Working Group 2 (S2) | The 3GPP S2 group has overall system architecture responsibility for the GSM/GPRS evolved system within the 3GPP organisation and also has close linkage with the ETSI SMG12 (GSM/GPRS) system architecture group.
The S2 group is investigating the architectural impacts and linkages involved with providing IN (CAMEL) based features into the mobile environment including the impacts of aspects such as roaming, Mobile Originated and Terminating calls, interactions with GSM standardised supplementary services and distributed service control/SSF issues across network boundaries. Items currently under study include the addition of CAMEL features for GPRS (beyond CAMEL Phase 3) and the opportunities to include further location based capabilities. CAMEL is also continuing into the UMTS area to include the Open Service Architecture (OSA) aspects.
3GPP document 23.121 specifies architectural requirements. |
14ce710049a3c611ebb26f3972649957 | 21.978 | 9.2 ETSI | |
14ce710049a3c611ebb26f3972649957 | 21.978 | 9.2.1 TIPHON | TIPHON Working Group 7 is studying the implementation of TIPHON networks in a mobile environment, and has been in existence since the beginning of 1999. TIPHON mobility is user and service mobility in the context of the VoIP application. The group has an understanding with 3GPP S2 to liase over IP activities. It is currently planning on producing 3 main documents:
07.001 Analysis of existing roaming techniques applicable to TIPHON mobility services
07.002 Investigation of synergies and common requirements between TIPHON networks and wireless systems as they are currently being developed by other bodies.
07.003 Mobility and Access to Wireless Systems: Extensions to Requirements, Architectures and Protocols
However, at the present moment only 07.001 has any significant text associated with it. The document is a review of existing mobile networks and specifically lists supplementary services as an open issue. In section 5.1 the GSM network is described, and CAMEL identified as the Intelligent Network service within GSM used to provide service mobility where the end user should not see any difference in the services provided by the IN nodes irrespective of the user’s location and terminal used. Similarly section 5.7 describes the GPRS network, section 5.9.4 introduces Session Initiation Protocol, and section 5.10 details the mobile extension to H.323.
At the July 1999 TIPHON 14 meeting, working group 7 discussed a document (14TD054) received from ITU-T SG16 for information concerning new work recently approved on mobility for H.323. The contribution stirred discussion, as the solution was seen as conflicting with the general attempt within TIPHON to work towards a layered architecture. |
14ce710049a3c611ebb26f3972649957 | 21.978 | 9.2.2 SPAN3 | ETSI SPAN (Services and Protocol for Advanced Networks) is ETSI’s core competence centre for fixed networks standardisation including IP based networks. SPAN3 (formerly SPS3) is the competence centre for IN Activities, including generic operations for INAP mobility. SPS3 work on Core INAP CS-3 has been split into two streams. CS-3.1 comprises CS2 and CAMEL Phase 3, while CS-3.2 looks at fixed network requirements and will be based on the ITU CS3 output. Both are due for completion by the end of 1999 and will be merged in Core INAP CS4, due for completion at the end of 2000.
CS-3.2 contains a work item addressing IN support for voice over IP based on the H.323 architecture and associated protocols in conjunction with the TIPHON project. A liaison statement from SPS3 to TIPHON entitled “Using Intelligent Networks in a Tiphon Architecture” was written in June 1999, giving the following proposals
- The IN infrastructure shall be independent of the IP telephony signalling protocol (SIP, H.323,…).
- The call control and consequently IN control shall be at least at the edge of the network i.e. nearest to the user in a Local Exchange and between two operators in an Inter-operator Gateway. |
14ce710049a3c611ebb26f3972649957 | 21.978 | 9.3 IETF | The Routing area contains the IP Routing for Wireless/Mobile Hosts (mobileIP) Working Group. It has developed routing support to permit IP nodes (hosts and routers) using either IPv4 or IPv6 to seamlessly roam among IP sub-networks and media types. The group has produced an Internet draft entitled “Requirements on Mobile IP from a Cellular Perspective” which considers MobileIP as a macro-mobility solution for cellular networks. This document does not address the issues surrounding the provision of supplementary services.
The Transport area contains the IP Telephony (iptel) working group and the Media Gateway Control (MEGACO) working group.
The Internet draft “SIP Call Control Services” describes a set of extensions to SIP which allow for various call control services. Example services include blind transfer, transfer with consultation, multi-party calls, bridged conferences, and ad-hoc conferencing. The Internet draft “Accessing IN services from SIP networks” proposes a mapping from the states of the IN call model to the states of SIP, an Internet call signalling protocol. |
14ce710049a3c611ebb26f3972649957 | 21.978 | 9.4 ITU-T | |
14ce710049a3c611ebb26f3972649957 | 21.978 | 9.4.1 SG11 | Study Group SG11 is responsible for studies relating to signalling requirements and protocols for telephone, N-ISDN, B-ISGN, UPT, mobile and multimedia communications. SG11 is responsible for most of the Q-Series standards, including Q.931. Questions under study by the group include:
5/11 Intelligent network capability sets
6/11 New signalling capabilities and requirements for advanced broadband multimedia services
7/11 Signalling, call handling and management requirements for universal personal telecommunications and for user mobility in future public land mobile systems
13/11 Network signalling for the support of broadband services and third generation land mobile networks (FPLMTS)
22/11 Intelligent Network Application Protocol (INAP)
24/11 Signalling requirements for emerging land mobile and satellite mobile - Network and Inter-network Signalling Requirements |
14ce710049a3c611ebb26f3972649957 | 21.978 | 9.4.2 SG16 | Study Group16 is responsible for studies relating to multimedia service definition and multimedia systems, including the associated terminals, modems, protocols and signal processing. SG16 is responsible for the H-Series standards, including H.323, as well as parts of the T-, G-, and F-Series. Questions under study by the group include:
13/16 Packet switched multimedia systems and terminals
This question covers the H.323 standard, of which Annex H studies H.323 Mobility. The annex has the following objectives:
Define functional requirements for H.323 mobility at the application level in a transport independent way.
Examine whether any new messages or message elements need to be created in H.323 for supporting mobility
Facilitate interoperability for implementation of H.323 mobility over any specific networking environment such as wireless/PSTN |
14ce710049a3c611ebb26f3972649957 | 21.978 | 10 Questions & Answers | Early drafts of this FTR were presented to 3GPP CN WG2a and a small number of questions were raised. The questions and answers are recorded here.
Q. In our work, are we considering IN control of RAS signalling or for call control or both?
A. Control of RAS signalling is out of scope.
Q. How does the architecture support the playing of tones and announcements?
A. This is a problem not unique to CAMEL and is one of many issues that we have not addressed. We felt that it is appropriate to address this aspect as part of a more detailed study.
Q. Are we only considering CAP over SS7?
A. We have not excluded the possibility of CAP over IP, this possibility depends on the outcome of SIGTRAN work and the MAP over IP work in CN2B. CAMEL control of VoIP services is independent of whether SS7 or IP is used for the lower layer signalling transport.
Q. What considerations are there for 'fast start' and what impact does this have?
A. Requires further study.
Q. How are we incorporating the work output from MEGACO?
A. As far as we are aware MEGACO work does not directly impact CAMEL control of VoIP services but further study is required. |
14ce710049a3c611ebb26f3972649957 | 21.978 | 11 Conclusions & Recommendations | This report has demonstrated how CAMEL can be used to control VoIP services in an all IP network using H.323 or SIP. The analysis has been carried out at a high level sufficient to identify that further detailed design and specification work should lead to a viable solution provided the architectural assumptions used in this report are correct. At this level of analysis no preference for H.323 or SIP was evident. Based on this evidence, either H.323, SIP or both could be successfully employed.
Use of CAMEL is one service creation approach for H.323/SIP-based services. There are also alternative H.323/SIP and IN interworking options identified in the report. Finally use of “next generation” architectures may enable other types of service creation which are not based on IN. The overall options need to be reviewed to select which of them will be most appropriate for R00 considering service and technical aspects. Based on this analysis the use of CAMEL is technically feasible and would provide a service evolution path from R99, but detailed comparison with other options has not been included.
Finalisation of the architecture and service creation principles for R00 is urgently needed so that work on the selected option(s) can start. It is also necessary to decide what standardised service(s) are required for H.323/SIP and which service(s) will be implemented using tool-kits.
Annex A:
Change history
Change history
Date
TSG #
TSG Doc.
CR
Rev
Subject/Comment
Old
New
Jun 2000
CN#08
NP-000252
Approved by TSG CN
2.1.1
3.0.0 |
4131cd5fefdadf4075e3ec0993ed8fe4 | 34.901 | 1 Scope | The present document describes the statistical theory and concepts applied in the conformance test of the user equipment (UE) so as to improve test speed. |
4131cd5fefdadf4075e3ec0993ed8fe4 | 34.901 | 2 References | The following documents contain provisions which, through reference in this text, constitute provisions of the present document.
• References are either specific (identified by date of publication, edition number, version number, etc.) or non‑specific.
• For a specific reference, subsequent revisions do not apply.
• For a non-specific reference, the latest version applies. In the case of a reference to a 3GPP document (including a GSM document), a non-specific reference implicitly refers to the latest version of that document in the same Release as the present document.
[1] 3GPP TS 34.121: "Terminal Conformance Specification; Radio transmission and reception (FDD)".
[2] 3GPP TS 34.122: " Terminal Conformance Specification; Radio transmission and reception (TDD)".
3. Definitions, symbols and abbreviations
Definitions, symbols, abbreviations and equations used in the present document are listed in TR 21.905 [5] and TR 25.990 [6]. |
4131cd5fefdadf4075e3ec0993ed8fe4 | 34.901 | 3.1 Definitions | For the purposes of the present document, the following additional terms and definitions apply. |
4131cd5fefdadf4075e3ec0993ed8fe4 | 34.901 | 3.2 Symbols | For the purposes of the present document, the following symbols apply:
[…] Values included in square bracket must be considered for further studies, because it means that a decision about that value was not taken |
4131cd5fefdadf4075e3ec0993ed8fe4 | 34.901 | 3.3 Abbreviations | For the purposes of the present document, the following abbreviations apply:
BER Bit Error Ratio
BLER Block Error Ratio
DUT Device under Test |
4131cd5fefdadf4075e3ec0993ed8fe4 | 34.901 | 3.4 Equations | Void. |
4131cd5fefdadf4075e3ec0993ed8fe4 | 34.901 | 4 Introduction | This technical report includes two distinct approaches made to determine total test time optimisation. For ease of understanding they are just referred to here as the first and second approach. Furthermore the two approaches differ a little in that they use slightly different terminology. |
4131cd5fefdadf4075e3ec0993ed8fe4 | 34.901 | 4.1 First approach | The first approach is found in clauses 5 and 6. It reflects TS 34.121 in that the symbols, abbreviations and equations are consistent with TS 34.121. |
4131cd5fefdadf4075e3ec0993ed8fe4 | 34.901 | 4.2 Second approach | The second approach is found in clauses 7 to 11 and does not directly reflect TS 34.121 although it does use the existing theory from TS 34.121. The difference is that it refines the theory and derives further approaches for test time reduction. Some of the symbols, abbreviations and equations have local meaning and these are identified in clause 7.
5. Definitions of distribution functions and parameters to be used
Summary |
4131cd5fefdadf4075e3ec0993ed8fe4 | 34.901 | 5.1 Properties of the Poisson Distribution | Description of a statistical experiment by a distribution function and basic characteristics of the distribution. |
4131cd5fefdadf4075e3ec0993ed8fe4 | 34.901 | 5.2 Equivalence between Poisson Distribution and Chi Square Distribution | Here it is shown, that both distributions are equal. Just the form is different. On the other hand there are two inverse cumulative operations. One of them is useful for our purpose. |
4131cd5fefdadf4075e3ec0993ed8fe4 | 34.901 | 5.3 Confidence interval | In a single test we apply ns samples and measure ne errors. The result can be member of different distributions each characterized by another parameter NE. We ask for two of them:
1) The worst possible distribution NEhigh , containing our measured ne with [D= 0.0085%] probability in the sense
0.000085= (2)
ni is the integration variable
ne is the measured value
NE is the variable to tune in order to make the integral consistent.
The result of the inverse cumulative operation is NEhigh
2) The best possible distributions NElow , containing our measured ne with [D=0.0085%] probability in the sense
0.000085= (3)
The result of the inverse cumulative operation is NElow
To illustrate the meaning of the range between NElow and NEhigh:
In the case our measured value ne is a rather untypical result (just [0.0085%] probability) nevertheless the final result NE can still be found in this range, called confidence interval.
The probabilities D in (1) and (2) can be independent like in GSM, but we want to have them dependent and equal.
The inverse cumulative Chi Squared distribution gives the wanted results:
Inputs: number of errors ne, measured in this test.
Probabilities D and the complementary probability 1- D
Output: NE, the parameter describing the average of the distribution.
E.G.:
(4)
(5)
Figure 5‑6: Confidence Interval
Same as the width of the distributions the confidence interval increases proportional to SQR(ne), that means, it increases absolutely, but decreases relatively to the measured number of errors. |
4131cd5fefdadf4075e3ec0993ed8fe4 | 34.901 | 5.4 Application of the confidence interval to decide the outcome of the test | If we find the entire confidence range, calculated from a single result ne, on the good side of the specified limit we can state: With high probability 1-D, the final NE is better than the limit.
If we find the entire confidence interval, calculated from a single result ne, on the bad side of the specified limit we can state: With high probability 1-D, the final NE is worse than the limit.
With each new test we update our preliminary data for ns, ne and ber. For each new sample we calculate the confidence interval and check it against the test limit.
Once we find the entire confidence interval on the good side of the specified limit we allow an early pass.
Once we find the entire confidence interval on the bad side of the specified limit we allow an early fail.
If we find the confidence interval on both sides of the specified limit, it is evident neither to pass nor to fail the DUT early.
Transcription of the above text into formulas:
The current number of samples ns is calculated from the preliminary ber and the preliminary ne
ber = ne/ns (6)
BERlim = NElimit / ns (7)
for abbreviation in the formula: bernorm = ber/BERlimit = ne/ NElimit (normalised ber)
Early pass stipulates:
NEhigh < NElimit (8)
Early fail stipulates:
NElow > NElimit (9)
The early fail and the early pass limit are displayed in Figure 5‑7:
early pass limit
(10)
early fail limit
(11)
Figure 5‑7: Early pass and early fail curves |
4131cd5fefdadf4075e3ec0993ed8fe4 | 34.901 | 5.6 Test time reduction | Using 5.4 the outcome of the test is connected with two qualities, a good one and a worse and variable one. Introducing the bad DUT factor M, the quality of the test is now uniform and test time is further reduced. |
4131cd5fefdadf4075e3ec0993ed8fe4 | 34.901 | 5.7 Calculation of the intersection coordinates (maximum number of sample and the normalized test limit) | Calculus for intersection co-ordinates of the early pass and early fail limit. |
4131cd5fefdadf4075e3ec0993ed8fe4 | 34.901 | 5.8 Wrong decision risk F | 5.1 to 5.6 applies the wrong decision risk for a single test step D. However it is desirable to have a predefined wrong decision risk for the entire test F. The approach to derive F from D this is explained here. |
4131cd5fefdadf4075e3ec0993ed8fe4 | 34.901 | 5.1 Properties of the Poisson distribution | NOTE: The following text is expressed in terms of BER=bit error ratio. However it can be used for BLER (Block error ratio) as well. Even for 1- Success Ratio, used in RRM delay tests, the theory can be used.
With a finite number of samples (ns), the final bit error ratio BER cannot be determined exactly.
Applying a finite ns, we measure a number of errors (ne).
ne/ns =ber is the preliminary bit error ratio.
In a single test we apply a predefined number of samples ns and we measure a number of errors (ne). ne is connected with a certain differential probability in the Poisson distribution. We don't know the probability and the position in the distribution conducting just one single test.
Repeating this test infinite times, applying repeatedly the same ns, we get the complete Poisson distribution. The average number of errors is NE. NE/ns is the final BER.
Poisson Distribution:
dpois(ne,NE)=(NEne/ne!)e-NE (1)
e.g. :
Figure 5‑1: Example of Poisson distribution curve
The Poisson distribution has the variable ne and is characterised by the parameter NE.
Real probabilities to find ne between two limits are calculated by integrating between such limits.
Note: The Poisson distribution is an approximation: Independent error occurrence is described by the binomial distribution. If the BER approaches 0 the Poisson distribution approximates the binomial distribution. |
4131cd5fefdadf4075e3ec0993ed8fe4 | 34.901 | 5.2 Equivalence between Poisson distribution and Chi Square distribution | The experiment, the Poisson distribution is based on, is having observed a certain number of samples (ns), the number of events (ne) is counted to calculate the ratio ne/ns.
The experiment, the Chi Square distribution is based on, is having observed a certain number of events (ne), the number of samples (ns) is counted to calculate the ratio ne/ns.
Poisson and Chi Square are valid only if ne<<ns
Figure 5‑2: Comparison of Chi-Squared and Poisson distribution
The dotted blue function is the Chi-squared distribution, using the parameters of the Poisson distribution. We scaled, offset and changed the interpretation of variable and parameter such that both distributions match. The Poisson distribution is a discrete distribution. Such scaled the Chi Squared distribution interpolates the Poisson distribution exactly for all NE (degenerated for NE=ne=0).
The experiment of the Chi Square distribution is always terminated by an event,
In contrast the experiment of the Poisson distribution almost never is terminated by an event because of ne/ns-->0. This explains that the Poisson distribution needs one event more, to equal in its form the Chi Square distribution
2*dchisq(2*NE,2*ne) = dpois(ne-1,NE) describes the experiment, terminated by an error.
2*dchisq(2*NE,2*(ne+1)) = dpois(ne,NE) describes the experiment, terminated by any sample.
The terminating error may be the artificial error at the beginning of the test, or the last error, causing the fail.
In the next comparison shows dpois versus dchisq.
The first 3D plot shows the Poisson distribution: (Figure 5‑1)
Variable: ne Range 0 to 10 Column in the table 0 to 10- axis in the plot
Parameter: NE Range 0 to 10 Row in the table 0 to 100 axis in the plot
The second 3D plot shows the Chi Square distribution: (Figure 5‑4)
Variable: NE Range 0 to 10 Column in the table 0 to 100- axis in the plot
Parameter: ne Range 0 to 10 Row in the table 0 to 10 axis in the plot
Columne 0 is degenerated
Table 5‑1: Poisson distribution calculation
Figure 5‑3: 3D plot for Poisson distribution
ne
Table 5‑2: Chi-squared distribution calculation
Figure 5‑4: 3D plot for Chi-squared distribution
Observation:
1) The rows in Poisson distribution correspond the columns in the scaled Chi-squared distribution and vice versa.
2) Poisson distribution at ne=0 versus NE is the exponential distribution
Chi-squared distribution at ne=0 (degree of freedom=1) versus NE is also the exponential distribution
see the next plot:
Figure 5‑5: Comparison between Poisson and Chi-squared distribution
Inverse Cumulative Operation:
We have seen: Chi Square and Poisson both describe the same array: ne versus NE.
The figures above show, that NE and ne in both functions are not commutative.
Hence there are two inverse operations (a) and (b):
D= = 2* (a)
with D=wrong decision probability or confidence level (input).
ni is the integration variable
ne is the measured value.(input, discrete) It is the integration limit
NE (real) is tuned such that the integral is consistent.
It returns an NE as a function of the two parameters D and ne. qchisq(D,ne)
D= = 2* (b)
NI is the integration variable
NE (real) is the integration limit
ne (discrete) is tuned such that the integral is consistent.
It returns ne as a function of the two parameters D and NE: qpois(D,NE)
Our target requires a). This is usually called the Inverse Cumulative Chi Square function.
(b) is the solution for another target. This is usually called the Inverse Cumulative Poisson function.
(a) returns a greater NE than (b) returns with respect to ne. (easily visible in the figures)
The difference (a)-(b) is small. This is also visible from the figures: ne and NE are close to commutative.
(a) returns a continuous NE, (b) returns a discrete ne. |
4131cd5fefdadf4075e3ec0993ed8fe4 | 34.901 | 5.5 Test time reduction | Whichever ne we propose as a final stop condition e.g. ne =200, the test can leave the area between the early pass and the early fail limit through the open end of the right side of Figure 5-7. This situation needs an arbitrary pass or fail decision. E.g. pass, if the test hits the vertical 200-error line. This situation has the following drawback: The test has two different qualities. A good one, when the test hits an early pass or early fail limit, and a worse and variable one, when the test hits the vertical 200 error line; variable, depending on the height, it crosses the line. The quality of the test in terms of wrong decision risk is variable in the range D up to as bad as 50%. We can replace the situation against a better trade-off:
Instead a test with different qualities against one limit,
we design a test with a fixed uniform quality against two limits,
(gaining further test time reduction).
We maintain the definition of the early fail limit:
(a) We fail a DUT and accept the probability of D= 0.0085% that it is actually better than the limit.
We propose a meaningful redefinition of the early pass limit:
(b) We pass a DUT and accept the probability of D=0.0085% that it is actually worse than
M times the limit (M>1).(M = Bad DUT factor)
This produces the following consequences:
(1) The early pass limit is shifted upwards by the factor of M
(2) The early fail and the early pass limit intersect.
(3) The intersection coordinates are:
the normalized test limit
and the maximum number of events
Transcription of the above text into formulas:
berlimbadpass: early pass limit against the bad DUT limit (12)
berlimfail: early fail limit against the specified limit (13)
Figure 5‑8: Early pass and early fail curves with multiplication factor M |
4131cd5fefdadf4075e3ec0993ed8fe4 | 34.901 | 5.6 Calculation of the intersection coordinates | initial guess of target number of events
root finds the zero of the function
target number of events
normalized test limit |
4131cd5fefdadf4075e3ec0993ed8fe4 | 34.901 | 5.7 Wrong decision risk F | Provided a single BER trajectory with final BER on the limit hits the early fail limit. If a fail is decided at this instant of the test, the wrong decision risk is as small as D. For each member of a large population of DUTs a wrong decision can happen, with probability D, accumulating to an amount F > D for the entire population.
D is the wrong decision risk based on the statistical totality of samples with BER on the limit.
F is the wrong decision risk based on the statistical totality of DUTs with BER on the limit.
(The same holds for a bad DUT, hitting the early pass limit.)
We call D the wrong decision risk at a single test step and F the wrong decision risk for the entire test. For a real test it is desirable to define in advance the wrong decision risk F of the entire test. An exact theory is not available for this problem. It is proposed to derive D from F by the following simulation:
A large population of DUTs with BER on the limit (limit-DUT) is simulated and decided against the early pass and early fail bound, with a free D-parameter in the early pass and fail limit. The simulation will show, that a certain fraction F (D<F<1) falsely fails.
The complementary simulation is:
A large population of DUTs with M*BER (bad DUT) is simulated and decided against the early pass and early fail bound, with a free D-parameter in the early pass and fail limit. The simulation will show, that a certain fraction F (D<F<1) falsely passes.
Both false decision fractions are approximately equal and represent the wrong decision probability F for the entire test. D is tuned such that F corresponds to the predefined wrong decision probability. |
4131cd5fefdadf4075e3ec0993ed8fe4 | 34.901 | 6 F to D conversion in BER BLER tests | |
4131cd5fefdadf4075e3ec0993ed8fe4 | 34.901 | 6.1 Conversion F to D | Annex F.6.1 in TS 34.121 gives a statistical approach for BER BLER tests. It gives early pass and early fail conditions. The formulas for this condition contain the parameter D, the wrong decision probability for a single test step. However it is desirable to have a wrong decision probability for the entire test F. This contribution explains the way, how to derive F from D and gives results for a set of parameters. |
4131cd5fefdadf4075e3ec0993ed8fe4 | 34.901 | 6.2 Introduction | Provided a single BER trajectory with final BER on the limit hits the early fail limit. If a fail is decided at this instant of the test, the wrong decision risk is as small as D. For each member of a large population of DUTs a wrong decision can happen, with probability D, accumulating to an amount F > D for the entire population.
D is the wrong decision risk based on the statistical totality of samples with BER on the limit.
F is the wrong decision risk based on the statistical totality of DUTs with BER on the limit.
(The same holds for a bad DUT, hitting the early pass limit.)
We call D the wrong decision risk at a single test step and F the wrong decision risk for the entire test. For a real test it is desirable to define in advance the wrong decision risk F of the entire test. An exact theory is not available for this problem. It is proposed to derive D from F by the following simulation:
A large population of DUTs with BER on the limit (limit-DUT) is simulated and decided against the early pass and early fail bound, with a free D-parameter in the early pass and fail limit. The simulation will show, that a certain fraction F (D<F<1) falsely fails.
The complementary simulation is:
A large population of DUTs with M*BER (bad DUT) is simulated and decided against the early pass and early fail bound, with a free D-parameter in the early pass and fail limit. The simulation will show, that a certain fraction F (D<F<1) falsely passes.
Both false decision fractions are approximately equal and represent the wrong decision probability F for the entire test. D is tuned such that F corresponds to the predefined wrong decision probability. |
4131cd5fefdadf4075e3ec0993ed8fe4 | 34.901 | 6.3 The simulation procedure | |
4131cd5fefdadf4075e3ec0993ed8fe4 | 34.901 | 6.3.1 Equal pass and fail probability | A population of DUTs on the limit is established. Quantity 10 000
Preselected BER 1%
An early fail and an early pass limit is established. With D (wrong decision risk) and M (bad DUT factor)
With target ne and test limit as a side result.
D is tuned in the inner loop
M and Fpredefined are varied in the outer loop
During the simulation
A member of the population leaves the statistical totality if
An error happens and the early fail limit is hit (false fail)
An error happens and the early pass limit is hit or crossed (correct pass)
The fraction false fails / 10 000 = F is recorded.
Inner loop: In repeated trials D is tuned, such that F ≤ Fpredefined (conservative approach).
Having decided for a specific D the simulation is repeated again 10 times and Fmin, Fmax, and Fmean are recorded.
The complementary simulation is done with a population of bad DUTs
(same quantity, same M, same Fpredefined , same D)
Observation 1: the false pass fraction is slightly lower than the false fail fraction.
Hence the result is even more conservative for the false pass.
Outer Loop: M is varied from 1.1 to 1.5 in steps of 0.1
Fpredefined is varied from 0.2 %, 0.5 %, 1%, 2% to 5%.
Observation 2: For lower wrong decision risks F the false decisions in 10 000 DUT are less.
Hence the variance of F in the 10 repetitions relatively increases.
For lower wrong decision risks F the simulation time increases.
Hence the compensation of the increasing variance of F by more repetitions is limited by the simulation time, or vice versa: the simulation results for F converge to a final value, investing infinite effort for simulations.
For practical and security reasons the Ds for lower Fs are decided more conservative than the equivalent ones for higher Fs. |
4131cd5fefdadf4075e3ec0993ed8fe4 | 34.901 | 6.3.2 Unequal pass and fail probability | For statistical test, frequently repeated, a single false fail can fail the composite test. This can be combated by a decreased false fail risk. This costs test time.
A single false pass does not have this effect on the composite test. Hence it is not necessary to consume increased test time due to decreased false pass risk for the pass probability. Hence unequal pass and fail probabilities are treated for very low false fail risk.
A population of DUTs on the limit is established. Quantity 10 000
Preselected BER 1%
In the complementary simulation
a population of bad DUTs is established (same parameters)
Common for both simulations:
An early fail limit is established with Dfail and an early pass limit is established with Dpass (D wrong decision risk Dfail < Dpass) and M (bad DUT factor)
With target ne as a side result.
Dfail and Dpass are tuned independently in the inner loop
M is varied in the outer loop
During the simulation
A member of the population leaves the statistical totality if
An error happens and the early fail limit is hit (false fail)
For the complementary simulation: (correct fail)
An error happens and the early pass limit is hit or crossed (correct pass)
For the complementary simulation: (false pass)
The fraction false fails / 10 000 = Ffail and the fraction false pass/10 000 = Fpass are recorded.
Inner loop: In repeated trials Dfail and Dpass are tuned independently , such that F fail and Fpass ≤ Fpredefined (conservative approach).
Having decided for a specific Dfail and Dpass the simulation is repeated again 10 times and Fmin fail, Fmax fail, and Fmean fail and Fmin pass, Fmax pass, and Fmean pass are recorded.
Observation 3: The Dpass must be slightly lower than the equivalent D in the case for equal probabilities (a).
Due to lower Dfail the target number of errors increases (e.g. 345 403), accumulating more single step wrong decisions. This is compensated by a lower Dpass. |
4131cd5fefdadf4075e3ec0993ed8fe4 | 34.901 | 6.4 Result of the simulation: M-F array | Table 6‑1: M-F table
7. Definitions, symbols and abbreviations
Definitions, symbols, abbreviations and equations used in the present document are listed in TR 21.905 [5] and TR 25.990 [6]. |
4131cd5fefdadf4075e3ec0993ed8fe4 | 34.901 | 7.1 Definitions | For the purposes of the present document, the following additional terms and definitions apply.
Wrong Decision Probability: Chance of incorrect judgement based on the given test results.
Significance Level: Chance of incorrect judgement based on the given test results. This term is exchangeable with Wrong Decision Probability.
Individual Significance Level: The significance level of a simple test or a single decision. Denoted by "D".
Total Significance Level: The significance level of a test system as a whole (a set of simple tests.) Denoted by "F".
Confidence Coefficient (Level): In this report, this is defined by 1 – Significance Level.
Specified Error Ratio: General term that is referred to BER/BLER or other error ratios that are specified in the test specifications (TS34.121 and TS34.122.)
Average Error Ratio: The error ratio specific to a DUT whose value can be determined by averaging the infinite number of measurement data of error ratio.
Early Pass/Fail Criteria: a set of simple tests, each of which consists of a pair of thresholds of the measured error ratio. |
4131cd5fefdadf4075e3ec0993ed8fe4 | 34.901 | 7.2 Symbols | For the purposes of the present document, the following symbols apply:
[…] Values included in square bracket must be considered for further studies, because it means that a decision about that value was not taken
C Confidence Coefficient (Confidence Level)
D Individual Significance Level
Dp Individual Significance Level of an early pass criterion
Df Individual Significance Level of an early fail criterion
F Total Significance Level
Fp Total Significance Level of a set of early pass criteria
Ff Total Significance Level of a set of early pass criteria
M Bad DUT factor
R0 Specified error ratio
R Measured error ratio (rate) (calculated from the measured error count and time duration or sample number)
Rth Threshold level against measured error ratio
Rth-p Threshold of an eraly pass test
Rth-f Threshold of an eraly fail test
r Average error ratio (rate) of DUT |
4131cd5fefdadf4075e3ec0993ed8fe4 | 34.901 | 7.3 Abbreviations | For the purposes of the present document, the following abbreviations apply:
BER Bit Error Ratio
BLER Block Error Ratio
DUT Device under Test
pdf Probability Distribution Function
CDF Cumulative Distribution Function |
4131cd5fefdadf4075e3ec0993ed8fe4 | 34.901 | 7.4 Equations | Chi-square distribution: of a degree of freedom n
where is gamma function.
Exponential distribution: |
4131cd5fefdadf4075e3ec0993ed8fe4 | 34.901 | 8 Introduction | BER/BLER measurements are inherently statistical processes, and a statistical approach should be introduced in order to make a BER/BLER test method objective and accurate.
In the GSM standard specifications, this has been achieved by introducing "wrong decision probability (significance level)" and "bad DUT factor." That is, the standard requires the test method to give a well-defined (predictable) "wrong decision probabilities", Ff / Fp or confidence coefficients Cf (= 1 - Ff)/Cp (= 1 - Fp). Here, it should be noted that the significance levels are defined against the population of UEs with two error rates (0.01 and 0.015).
These parameters, the significance level and bad DUT factor, should be determined a priori, since there seems to be no good reason to pick a set of values rather than others. So, it would be a reasonable decision to employ the same value with GSM standard: F = 0.002 (0.2 %) and M = 1.5 for BER and BLER measurements since we now have a long enough experience to prove the validity of these parameters.
The GSM standard recommends that BER/BLER should be calculated after 200 errors were observed and the resultant BER/BLER should be compared against a threshold (around 1.24 R0). This test method gives the significance level presented above.
However, this method is not optimal from the viewpoint of test time. Apparently, if the DUT population consists of very good UEs (UE with a very low BER), it would take a long time to observe 200 errors. In practice, such a situation is unacceptable, so some supplementary criterion should be used. For example, if a UE doesn't report any bit/block errors for the certain time period, it should pass the test. This supplementary criterion may save many of the potentially time-consuming cases, but still not optimised for the test time.
In this report, a more sophisticated method will be developed to optimise the test time by introducing the early pass/fail criteria, whose basic idea was inspired by I-95 standard. |
4131cd5fefdadf4075e3ec0993ed8fe4 | 34.901 | 9 Statistical characteristics of testing processes | |
4131cd5fefdadf4075e3ec0993ed8fe4 | 34.901 | 9.1 Exact probability distribution functions | BER/BLER measurements treat phenomena that are characterized as:
1) The experiment consists of a sequence of independent trials.
2) Each trial has two possible outcomes, E (Error) or N (Non Error).
3) The probability of E (r = f(E)) is constant from one trial to another.
That is, the BER/BLER measurement can be reduced to observation of Bernoulli sequences. Many other test objects, such as RRM delay measurements results, can also be reduced to a process that is characterized by these requirements. In these case, the outcomes are either "Pass or Successful (the measured delay was within the limit value, for example)" or "Fail (the delay exceeded the limit)."
Our objective is to find a way to tell whether r is larger than R0*M or smaller than R0 with a certain significance level from the result of a certain number of trials.
This report proposes to use a set of many simple tests, instead of a single simple test. Here, a test is a comparison of resultant error rate against a predefined criterion (a threshold value). Practically speaking, there would be two ways to do this comparison:
a) To do the comparison for every trial, or
b) To do the comparison each time an error is observed.
For method a) above, the probability of giving an error number, m, is given by a binomial distribution,
.
Where r: average error rate, m: the number of errors, s: the number of samples. The resultant error ratio, R, is m/s, and its probability can be derived from the equation above.
On the other hand, for method b), the probability that m-th error is observed at the s-th sample follows a negative binomial distribution,
.
The error rate R is again given by m/s. |
4131cd5fefdadf4075e3ec0993ed8fe4 | 34.901 | 9.2 Approximation with continuous distributions | In this section, the notion r for average error ratio is used for average error rate too.
The distributions introduced above are exact, but sometimes they are very time-consuming to simulate the process on a computer. So, it is convenient to use appropriate continuous distribution functions that approximate the discrete functions.
If r is very low (that is, m/s << 1), the phenomenon described in the previous section can be reduced to the one that satisfies following requirements:
1) Every error can be described by the time at which it occurred.
2) Each error occurs independently
3) The average error rate r (= m/T) is constant throughout the testing.
It is known that the time interval between the consecutive errors, t, should follow an exponential distribution.
Again, there are two possibilities to determine the measured error rate R and test it against the criteria:
a) To calculate R after the predetermined time period, or
b) To calculate R when m-th error is observed.
In case a), the probability that m errors are observed within the certain time period, T follows the Poisson distribution.
Where : average error count in the time duration T, so = rT. So, the function can be represented as:
The measured error rate, R, is given by m/T.
For the test method b), the time to m-th error, T, follows an m-Erlang distribution.
Where (x, n) is a chi-square distribution function of a degree of freedom n. m-Erlang distribution’s CDF is given by
This function can be transformed to a function of R(=m/T), mERCDF().
Apparently, the CDF is a function of (R/r) and this means the distribution does not depend on the absolute value of average or measured error rate. This would make a handling very easy.
Almost all the RF and RRM measurements that require the statistical approach are of the discrete nature, and then the continuous pdf is accurate only for smaller r values. It’s hard to tell the exact condition under which the approximation should be good, but it can be said that we cannot use the continuous pdf when r = 0.1. This subject will be discussed in the chapters below. |
4131cd5fefdadf4075e3ec0993ed8fe4 | 34.901 | 9.3 Simple test criteria and significance level | For BER/BLER testing, our test can be reduced to a comparison of the measured error rate, R against a threshold. It would follow the procedure like:
if R < Rth-p then the DUT passes
else if R > Rth-f then the DUT fails
else no decision should be made
Where Rth-p and Rth-f are the threshold for pass and fail criteria, and in general Rth-p Rth-f.
The significance level for the first test, Fp, is defined as the probability that a bad DUT (r > R0 M) should pass. Similarly, Ff is defined as the probability that a good DUT (r < R0) should fail in this test.
The severest condition from the viewpoint of the significant level is that r = R0M and r = R0 for bad DUT and good DUT population respectively. So, it would be reasonable to define the significance levels for such populations.
Now that it is presumed that r of the DUT population is unique (R0 or M*R0), we can calculate the probability distribution of R according to the functions introduced in the previous chapter. For a pdf, f(R: r, m), the threshold can be determined so that:
(1)
(2)
Where, it should be noted that x takes only discrete values that are given by m/s.
For the continuous pdf’s, the summation should be replaced with integration, or using their CDF (F(R: r, m))
(1’)
(2’)
When we choose an appropriate combination of M, m, and D(= Dp = Df), we can set the Rth so that the outcome of the test is either of Pass or Fail. For GSM standard, M = 1.5, D = 0.2 %, and then m = 200 and Rth = 1.24 R0. This can be derived from both of m-Erlang distribution (mERCDF(R:m,r) above) and the negative binomial distribution. |
4131cd5fefdadf4075e3ec0993ed8fe4 | 34.901 | 10 Early Pass/Fail termination of testing | |
4131cd5fefdadf4075e3ec0993ed8fe4 | 34.901 | 10.1 Framework of test method | If a UE reported 50 block errors for the first 100 frames, we would intuitively know that the UE should be bad (its average BLER should be higher than 0.01), even though the number of the observed errors is much smaller than 200. We are quite sure about that, since it should be very rare for a UE with an average BLER of 0.01 to report 50 block errors out of 100 frames. This can be shown using the binomial distribution, which gives its probability as
The probability that 50th error should occur at 100th sample is given by negative binomial distribution:
We can safely say that both cases should be very unlikely. That is, r cannot be 0.01 and should be much larger.
This suggests that, for very good or very poor UEs, the test sequence can be terminated at earlier stages, and as a result, the test time can be cut short. This is the origin of the idea of "early pass/fail criteria."
Such the test method will consist of many simple tests and its pseudo script would look like:
m = 0
for each s: # repeat for sample forever
if an error is reported:
m = m + 1
R = m/s
if R > Rth_f(m): # fail test
UE failed
break # stop procedure
else if R < Rth_p(m):
UE passed
break
else
continue
This method is straightforward. Each time an error reported, the error rate should be calculated and then compared with thresholds that depend on m. However, there is till a room for improvement from viewpoint of test time reduction. The problem is apparent if we imagine the case in which no errors occur at all. The test would not be completed within a finite time period.
Assume that the no error samples last long enough after the m-th error. If the duration is long enough and the error rate calculated from imaginary (m +1)th error is lower than Rth_p(m + 1), the UE can be considered to have passed the test. This idea would be implemented like:
m = 0
for each s: # repeat for sample forever
if an error is reported:
m = m + 1
R = m/s
if R > Rth_f(m): #fail test
UE failed
break
else: # if not error
if s > Tdp(m): #pass test
UE passed
break
else:
continue
Where Tdp(m) is a predefined time duration (in sample number) which gives R < Rth_p for (m +1)th error.
To make the test method complete, a table like the example below should be prepared:
m
Rth_p
Tdp
Rth_f
0
---
417
---
1
0.0024
540
---
2
0.0034
750
0.031
3
0.0040
800
0.025
…
…
…
…
Where, "---" means "any decision should not be made at that error count." For example, while no error is reported, any decisions should not be made based on the error rate, and only when the time duration in terms of the number of samples exceeds 417, DUT is decided to pass. |
4131cd5fefdadf4075e3ec0993ed8fe4 | 34.901 | 10.2 Early Pass/Fail criteria | As described in the previous section, once the framework of the test procedure is established, a test can be defined by presenting the table of Rth_p, Tdp, and Rth_f. These values will be referred to as "Early Criteria."
The requirements for such criteria should be:
1) F should be 0.2 % for BER/BLER measurement, and 5% for RRM delay measurement and others.
2) The test shall be terminated in a finite time period (in terms of the number of samples.)
Presuming these requirements, we will try to minimize the test time.
There seems to be a broad freedom in choosing a set of early criteria. However, it would be a good start point to choose these criteria so that they provide a constant D at each error count m. When the error-count based and discrete distribution approach is presumed, the pdf to be used is a negative binomial distribution, nBi(s: r, m) = nBi(m/R: r, m). Then, equation (1) and (2) will be:
(3)
(4)
Using these equations, Rth_f and Rth_pcan be determined and from the latter, Tdp can also be derived. The problem is how to determine D. The target is clear; we have to get an F of 0.2%, but the population keeps changing in the procedure (some DUT hit either of the criteria and will be removed from the population), so it seems almost impossible to determine D to give a predefined F by an analytical method.
So an experimental method should be used to determine D values, which goes like:
1) Pick a D value
2) Calculate Rth_p and Rth_f
3) With a simulation with random generator of Bernoulli distribution of r = R0 and r = R0M, and the criteria above, determine F value.
4) If the resultant F value is not close enough to the target F value (total significance level), start over with step 1) with a slightly different D value.
In the experiments that give results shown in this report bisection method was sued to perform this iteration efficiently, anda binomial distribution generator was used as Bernoulli generator. The simulations have been done for a population of 100,000 devices.
The resultant criteria for typical parameters are given in the following tables.
Table 10‑1: Early Pass/Fail criteria for RRM delay measurements (R0=0.1, F=0.05)
m
Rth-p
Tdp
Rth-f
0
`---
32
---
1
0.03125000
46
---
2
0.04347826
57
---
3
0.05263158
68
0.75000000
4
0.05882353
79
0.50000000
5
0.06329114
89
0.41666667
6
0.06741573
98
0.35294118
7
0.07142857
108
0.30434783
8
0.07407407
117
0.28571429
9
0.07692308
126
0.26470588
10
0.07936508
136
0.25000000
11
0.08088235
144
0.23404255
12
0.08333333
153
0.22641509
13
0.08496732
162
0.21666667
14
0.08641975
171
0.21212121
15
0.08771930
179
0.20547945
16
0.08938547
188
0.20000000
17
0.09042553
197
0.19540230
18
0.09137056
205
0.18947368
19
0.09268293
213
0.18627451
20
0.09389671
222
0.18348624
21
0.09459459
230
0.18103448
22
0.09565217
238
0.17741935
23
0.09663866
247
0.17557252
24
0.09716599
255
0.17266187
25
0.09803922
263
0.17123288
26
0.09885932
271
0.16883117
27
0.09963100
280
0.16666667
28
0.10000000
288
0.16568047
29
0.10069444
296
0.16384181
30
0.10135135
304
0.16216216
31
0.10197368
312
0.16062176
32
0.10256410
320
0.15920398
33
0.10312500
328
0.15789474
34
0.10365854
336
0.15668203
35
0.10416667
344
0.15555556
36
0.10465116
352
0.15450644
37
0.10511364
360
0.15352697
38
0.10555556
368
0.15261044
39
0.10597826
376
0.15175097
40
0.10638298
383
0.15094340
41
0.10704961
391
0.15018315
42
0.10741688
399
0.14946619
43
0.10776942
407
0.14878893
44
0.10810811
415
0.14814815
45
0.10843373
423
0.14705882
46
0.10874704
430
0.14649682
47
0.10930233
438
0.14596273
48
0.10958904
446
0.14545455
49
0.10986547
454
0.14454277
50
0.11013216
462
0.14409222
51
0.11038961
469
0.14366197
52
0.11087420
477
0.14285714
53
0.11111111
484
0.14247312
54
0.11134021
492
0.14210526
55
0.11178862
500
0.14138817
56
0.11200000
508
0.14105793
57
0.11220472
516
0.14039409
58
0.11240310
523
0.14009662
59
0.11281071
531
0.13981043
60
0.11299435
539
0.13921114
61
0.11317254
546
0.13895216
62
0.11355311
554
0.13839286
63
0.11371841
561
0.13815789
64
0.11408200
569
0.13763441
65
0.11423550
577
0.13742072
66
0.11438475
584
0.13692946
67
0.11472603
592
0.13673469
68
0.11486486
600
0.13627255
69
0.11500000
607
0.13609467
70
0.11532125
615
0.13565891
71
0.11544715
622
0.13523810
72
0.11575563
630
0.13508443
73
0.11587302
637
0.13468635
74
0.11616954
645
0.13454545
75
0.11627907
653
0.13416816
76
0.11638591
660
0.13380282
77
0.11666667
668
0.13368056
78
0.11676647
675
0.13333333
79
0.11703704
683
0.13299663
80
0.11713031
690
0.13289037
81
0.11739130
698
0.13256956
82
0.11747851
705
0.13225806
83
0.11773050
713
0.13216561
84
0.11781206
720
0.13186813
85
0.11805556
728
0.13157895
86
0.11813187
735
0.13149847
87
0.11836735
743
0.13122172
88
0.11843876
750
0.13095238
89
0.11866667
758
0.13088235
90
0.11873351
765
0.13062409
91
0.11895425
773
0.13037249
92
0.11901682
780
0.13012730
93
0.11923077
788
0.13006993
94
0.11928934
795
0.12983425
95
0.11949686
803
0.12960437
96
0.11955168
810
0.12938005
97
0.11975309
818
0.12916112
98
0.11980440
825
0.12911726
99
0.12000000
832
0.12890625
100
0.12019231
840
0.12870013
101
0.12023810
847
0.12849873
102
0.12042503
855
0.12830189
103
0.12046784
862
0.12826899
104
0.12064965
870
0.12807882
105
0.12068966
877
0.12789281
106
0.12086659
884
0.12771084
107
0.12104072
892
0.12753278
108
0.12107623
899
0.12735849
109
0.12124583
907
0.12733645
110
0.12127894
914
0.12716763
111
0.12144420
922
0.12700229
112
0.12147505
929
0.12684032
113
0.12163617
936
0.12668161
114
0.12179487
944
0.12652608
115
0.12182203
951
0.12637363
116
0.12197687
958
0.12622416
117
0.12212944
966
0.12621359
118
0.12215321
973
0.12606838
119
0.12230216
981
0.12592593
120
0.12232416
988
0.12578616
121
0.12246964
995
0.12564901
122
0.12261307
1003
0.12551440
123
0.12263210
1010
0.12538226
124
0.12277228
1017
0.12525253
125
0.12291052
1025
0.12512513
126
0.12292683
1032
0.12500000
127
0.12306202
1039
0.12487709
128
0.12319538
1047
0.12475634
129
0.12320917
1054
0.12475822
130
0.12333966
1062
0.12464046
131
0.12335217
1069
0.12452471
132
0.12347989
1076
0.12441093
133
0.12360595
1084
0.12429907
134
0.12361624
1091
0.12418906
135
0.12373969
1098
0.12408088
136
0.12386157
1106
0.12397448
137
0.12386980
1113
0.12386980
The resultant thresholds (criteria) for BER, BLER and RRM Delay measurements are shown in Figure 10‑1,Figure 10‑2 and Figure 10‑3 respectively.
Figure 10‑1: Early Pass/Fail Criteria for BER Measurement (R0= 0.001, F = 0.002)
Figure 10‑2: Early Pass/Fail Criteria for BLER Measurement ( R0= 0.01, F = 0.002)
Figure 10‑3: Early Pass/Fail for RRM Delay Measurement (R0 = 0.1, F = 0.05) |
4131cd5fefdadf4075e3ec0993ed8fe4 | 34.901 | 10.3 Estimating the test time | The final goal of this report is to reduce the total test time, so each set of criteria should be rated by estimating its test time. This task is fairly simple, and can be done using almost the same simulation program used in the previous section. The sample number at which the measurement is terminated is recorded and averaged to give the test time of the criteria. The estimation is repeated for various average error rates, r.
Some results are shown in Figure 10‑4 through Figure 10‑6.
<Figure will be inserted here>
Figure 10‑4: Test Time for BLER Measurement (R0 = 0.001, F = 0.002)
Figure 10‑5: Test Time for BLER Measurement (R0 = 0.01, F = 0.002)
Figure 10‑6: Test Time for RRM Delay Measurement (R0 = 0.1, F = 0.05)
In Figure 10‑7, the BLER test time (Figure 10‑5) is compared with a conventional test method, in which no early criteria are not incorporated. Apparently, the required test time is the time to see 200 errors, and the test time is simply given by 200/r. It should be noted that the averaged test time values almost coincide at r = 0.0124, and the early criteria greatly reduce the test time in the areas of r << 0.0124 and of r >> 0.0124.
Figure 10‑7: Reduction of the Test Time by Employing Early Criteria |
4131cd5fefdadf4075e3ec0993ed8fe4 | 34.901 | 10.4 Minimizing the test time | The criteria set in Section 10.2 ("constant D criteria") were chosen in an arbitrary way, and there is no guarantee that that should give the shortest test time. So, to seek the optimized method, some other criteria that are basically a variation of the "constant D criteria" will be proposed and their test time will be estimated in the following subsections. |
4131cd5fefdadf4075e3ec0993ed8fe4 | 34.901 | 10.4.1 Truncation | As a matter of fact, while the simple test is terminated at m = 200 (F = 0.2%), the cross point of the criteria is located at m = 374 for the "constant D criteria." Moreover, only few DUTs survive till later stages. So, it seems to be a good idea truncating the procedure at a little earlier stage.
This means that Rth_p and Rth_f should be to 1.24 R0 at an m value between 200 and 374 in the criteria table. The change is simple, but has an impact on F, so we have to re-evaluate D.
The results are shown in Figure 10‑8, which shows no significant improvement in the test time, while the (rare) maximum test time of 1000 samples were reduced to 700 as shown in Figure 10‑9. In the figure, the red solid line shows the average test time as a reference.
Figure 10‑8: Test Time by Truncated Early Criteria (R0 = 0.1, F = 0.05)
Figure 10‑9: Maxim Test Time by Truncated Early Criteria (R0 = 0.1, F = 0.05) |
4131cd5fefdadf4075e3ec0993ed8fe4 | 34.901 | 10.4.2 Decimation | If the simple tests (comparisons) were done at a smaller number of m, that would result in a smaller F value. In other words, a larger D value can be employed for a certain F value, this can mean a reduced test time since the criteria curve with a higher D value will be located at more left hand side. The real expected advantages are that such method can be presented by a much shorter table and that it may reduce the requirement for calculation.
The resultant test time values for the criteria with every m, and one with every 10 m points are shown in Figure 10‑10. Apparently, the decimation didn’t improve the test time.
Figure 10‑10: Test time of 1:10 Decimated Criteria (R0 = 0.1, F = 0.05) |
4131cd5fefdadf4075e3ec0993ed8fe4 | 34.901 | 10.4.3 Composite criteria | The results of the simulation stated above show that almost all the devices are picked out at relatively early stages, and only few reach later stages. This observation would lead to the idea that the test time could be reduced if stricter criteria at the later stages. Suppose that each threshold in a criterion, Rth-fix(m) / Rth_var(m), have individual significance levels, Dfix / Dvar, respectively. A new criteria, Rth_com(m), can be built by merging these two criteria like,
That is, the composite threshold, Rth-com, is a weighted average of Rth-fix and Rth-var. Where mmax corresponds to the cross point of pass/fail criteria of Rth-fix , and Dfix > Dvar.
The experimental method to find D value witch meets the requirement for F was introduced in Section 10.2, and it can be easily modified to find Dvar for a fixed Dfix. The resultant D values are listed in Table 10‑2.
Table 10‑2: Combinations of D values to give F = 0.05 (R0 = 0.1)
Dfix
Dvar
mmax
Comment
---
0.005125
143
Reference
0.01
0.00425
118
0.02
0.00250
92
0.03
0.001125
77
Using these criteria, the test time was evaluated, and the results are shown in Figure 10‑11. In comparison with the reference ("Constant D" criteria), the composite criteria give a slightly shorter test time in the worst case (r = 1.24 R0), but these give a longer test time for r < R0.
Figure 10‑11: Test time for composite test criteria |
4131cd5fefdadf4075e3ec0993ed8fe4 | 34.901 | 11 Accuracy of Continuous Distributions | As stated in clause 9.2, the negative binomial distributions can be approximated by m-Erlang distribution. In this Appendix, we will discuss about how good this approximation is.
For continuous distributions, Equation (1’) and (2’) determine early Pass/Fail thresholds, and these can be transformed to more specific forms shown below by presuming m-Erlang distribution.
There is no explicit way to know Rth from D , but is a continuous function, so Newton method can be employed to find Rth .
The Early Pass/Fail criteria obtained this way are compared with those from negative binomial distributions in Figure 11‑1 through Figure 11‑3.
For the first two cases (Figure 11‑1and Figure 11‑2), the two approaches show a good agreement. However, in Figure 11‑3, there is a significant difference between them. This difference results in a significant difference in the test time as shown in Figure 11‑4. The difference is largest for a marginal UEs (r ~ 0.124).
Figure 11‑1: Comparison of Early Pass/Fail Criteria for BER Measurement (R0 = 0.001, F = 0.002)
Figure 11‑2: Comparison of Early Pass/Fail Criteria for BLER Measurement (R0 = 0.01, F = 0.01)
Figure 11‑3: Comparison of Early Pass/Fail Criteria for RRM Delay Measurement (R0 = 0.1, F = 0.05)
Figure 11‑4: Comparison of Test Time (R0 = 0.1, F = 0.05)
Annex A:
Change history
T Meeting
Doc-1st-Level
CR
Rev
Subject
Cat
Version-Current
Version-New
Doc-2nd-Level
TP-20
Approval of the report
2.0.1
3.0.0 |
d832899f12f9cb7303ee0f37d0629dd2 | 36.276 | 1 Scope | The present document provides an overview and overall description of the LTE-based 5G terrestrial broadcast comprising:
- a service delivering Free To Air content [2];
- a radio network comprising only MBMS-dedicated cells or FeMBMS/Unicast-mixed cells [3] as transmitters; and
- Receive Only Mode (ROM) devices and UEs supporting FeMBMS [4] as receivers.
Details of the radio interface protocols and procedures are specified in companion specifications of the 36 series.
This document is a 'living' document, i.e. it is permanently updated and presented to TSG-RAN meetings. |
d832899f12f9cb7303ee0f37d0629dd2 | 36.276 | 2 References | The following documents contain provisions which, through reference in this text, constitute provisions of the present document.
- References are either specific (identified by date of publication, edition number, version number, etc.) or non‑specific.
- For a specific reference, subsequent revisions do not apply.
- For a non-specific reference, the latest version applies. In the case of a reference to a 3GPP document (including a GSM document), a non-specific reference implicitly refers to the latest version of that document in the same Release as the present document.
[1] 3GPP TR 21.905: "Vocabulary for 3GPP Specifications".
[2] 3GPP TS 22.101: "Service aspects; Service principles".
[3] 3GPP TS 36.300: "Evolved Universal Terrestrial Radio Access (E-UTRA) and Evolved Universal Terrestrial Radio Access Network (E-UTRAN)".
[4] 3GPP TS 23.246: "Multimedia Broadcast/Multicast Service (MBMS); Architecture and functional description".
[5] 3GPP TS 26.346: "Multimedia Broadcast/Multicast Service (MBMS); Protocols and codecs".
[6] 3GPP TS 36.331: "Radio Resource Control (RRC) Protocol".
[7] 3GPP TS 24.116: "Stage 3 aspects of system architecture enhancements for TV services".
[8] 3GPP TS 36.211: "E-UTRA; Physical Channels and Modulation".
[9] 3GPP TR 36.776: " Study on LTE-based 5G terrestrial broadcast".
[10] 3GPP TR 38.913: "Study on scenarios and requirements for next generation access technologies".
[11] 3GPP TR 36.440: " General aspects and principles for interfaces supporting Multimedia Broadcast Multicast Service (MBMS) within E-UTRAN".
[12] 3GPP TS 24.117: "TV service configuration Management Object (MO)".
[13] 3GPP TS 36.213: "E-UTRA; Physical layer procedures".
[14] 3GPP TS 36.304: "E-UTRA; Procedures in idle mode".
[15] 3GPP TS 36.133: "E-UTRA; Requirements for support of radio resource management".
[16] 3GPP TS 36.321: "E-UTRA; MAC protocol specification". |
d832899f12f9cb7303ee0f37d0629dd2 | 36.276 | 3 Definitions, symbols and abbreviations | |
d832899f12f9cb7303ee0f37d0629dd2 | 36.276 | 3.1 Definitions | For the purposes of the present document, the terms and definitions given in 3GPP TR 21.905 [1] and the following apply. A term defined in the present document takes precedence over the definition of the same term, if any, in 3GPP TR 21.905 [1]. |
d832899f12f9cb7303ee0f37d0629dd2 | 36.276 | 3.2 Symbols | For the purposes of the present document, the following symbols apply:
<symbol> <Explanation> |
d832899f12f9cb7303ee0f37d0629dd2 | 36.276 | 3.3 Abbreviations | For the purposes of the present document, the abbreviations given in 3GPP TR 21.905 [1] and the following apply. An abbreviation defined in the present document takes precedence over the definition of the same abbreviation, if any, in 3GPP TR 21.905 [1].
DRX Discontinuous reception
eMBMS Evolved MBMS
FeMBMS Further enhanced MBMS
HPHT High power high tower
ISD Inter-site distance
LPLT Low power low tower
MPMT Medium power medium tower
NAS Non-access startumstratum
MBMS Multimedia Broadcast/Multicast System
MBSFN Multicast/Broadcast Single Frequency Network
MNO Mobile Network Operator
NR New RadioPBCH Physical Broadcast Channel
PDSCH Physical Downlink Shared Channel
PSS Primary synchronization signal
RAT Radio Access TechnologyROM Receive only mode
RRC Radio Resource Control
RRM Radio resource management
SC-PTM Single Cell Point To Multipoint
SSS Secondary synchronization signal
TV Television |
d832899f12f9cb7303ee0f37d0629dd2 | 36.276 | 4 Introduction | <Definition of LTE-based 5G broadcast: Dedicated network, ROM devices>
<Motivation>
<Use cases>
<Quick overview of the Rel.14 and Rel.16 work>
<Network scenarios: LPLT, MPMT, HPHT>
<Receiver types: rooftop, car-mounted,…> |
d832899f12f9cb7303ee0f37d0629dd2 | 36.276 | 4.1 General | The main aspects of the LTE-based 5G terrestrial broadcast described in this specification are:
- radio network comprising only MBMS-dedicated cells or FeMBMS/Unicast-mixed cells [3] as transmitters; and
- ROM devices and UEs supporting FeMBMS [4] as receivers.
NOTE: ROM devices support only ROM service [5]. ROM service uses one of the reserved TMGI values [7].
MBMS-dedicated cells support only MBMS transmission and do not support uplink transmission. MBSFN subframes of a MBMS-dedicated cell does not have control region and can therefore be 100% allocated to MBMS. Non-MBSFN subframes, also called Cell Acquisition Subframes (CAS), which have the control region, are used for transmission of the system acquisition signals (PSS/SSS), PDCCH, and system information on PBCH and PDSCH. CAS are transmitted with periodicity of 40ms and use subframes with f = 15 kHz. PBCH of a MBMS-dedicated cell uses a different scrambling sequence initialization than PBCH of a non-MBMS-dedicated cell, which prevents UEs not supporting MBMS-dedicated cell from camping on it. For more information about MBMS-dedicated cell see 3GPP TS 36.300 [3].
ROM devices support MBMS transmission but do not support uplink transmission. ROM devices may not have USIM. As such, ROM devices do not support two-way signalling procedures with the network, including connection establishment procedures and security procedures. ROM devices only support the idle mode. Not all idle mode procedures are supported, as described in subclause 7.3. For more details on ROM devices see clause 7, 3GPP TS 36.300 [3] subclause 15.11, 3GPP TS 23.246 [4] Annex D and 3GPP TS 24.116 [7] clause 4.
NOTE 1: As a matter of implementation, a cellular device can host a ROM device and a traditional UE capable of unicast. Such device is further described in 3GPP TS 36.246 [4] Annex E and called ROM device with independent unicast. The co-hosted UE is connected to a different cell from the MBMS-dedicated cell serving the co-hosted ROM device. If the co-hosted UE and ROM device share baseband resources, the co-hosted UE can use MBMSInterestIndication signalling procedure, specified in TS 36.331 [6], to inform the serving RAN about the baseband resources occupied by the co-hosted ROM device and therefore not available for unicast.
NOTE 2: There may be awareness at the application layer of the ROM device with independent unicast. How this awareness is created is outside of the scope of specifications. |
d832899f12f9cb7303ee0f37d0629dd2 | 36.276 | 4.2 Use cases and requirements | In Release 14, the use cases and scenarios for eMBMS services based on LTE have been expanded to include terrestrial broadcasting (the feature also referred to as "EnTV"). This included new requirements:
- network dedicated to TV broadcast via eMBMS;
- SFN deployments with ISD significantly larger than a typical ISD associated with legacy cellular deployments;
- support for ROM device.
NOTE: At the upper layers, the requirements included the support for Free to Air service [2] and for eMBMS network sharing [4].
In Release 16, gap analysis documented in TR 36.776 [9] compared the Release 14 LTE terrestrial broadcasting capabilities with the requirements for 5G dedicated broadcast networks in TR 38.913 [10]. As a result of this analysis, the following two requirements were deemed unfulfilled by Release 14 LTE eMBMS:
1. Support for service over large geographic area, including SFN with ISD > 100km;
2. Support for mobility scenarios including speeds of up to 250 km/h.
In relation to the first requirement, the new ISD of 125 km, referred to as HPHT network, with omni-directional transmitters was defined. The following two ISD were also included in the evaluation:
- 15 km, referred to as LPLT network with sectorized cells;
- 50 km, referred to as MPMT network with omni-directional transmitters.
The first requirement is associated with receivers with high-gain rooftop directional antennas, low mobility and a predominantly line-of-sight channel.
The second requirement is associated with receivers in cars, with external omni-directional antennas.
In addition to the above two requirements, a third requirement was added related to improving the CAS reception for both large ISD and high mobility scenarios. |
d832899f12f9cb7303ee0f37d0629dd2 | 36.276 | 4.3 Enhancements targeting LTE terrestrial broadcast | In Release 14, the following key RAN enhancements were made to the specifications to enable LTE terrestrial broadcast:
- MBMS-dedicated cell [3];
- MBSFN subframes using f = 1.25 kHz [8];
- New information blocks on PBCH and PDSCH of CAS [3], [6]:
- MIB-MBMS is transmitted with a 40ms periodicity and updated every 160 msMIB-MBMS with a 40ms periodicity, containing resource allocation for SIB1-MBMS on PDSCH; and
- SIB1-MBMS is transmitted with an 80ms periodicity and updated every 160 msSIB1-MBMS, with an 80ms periodicity, containing information relevant for receiving MBMS service and, optionally, the scheduling of other system information blocks;
- MBMSInterestIndication RRC signalling procedure (see subclause 4.1).
NOTE: For upper layer enhancements, see 3GPP TS 23.246 [4] Annex D and E, 3GPP TS 24.116 [7], 3GPP TS 24.117 [12] and 3GPP TS 26.346 [5] (ROM service aspects).
In Release 16, the following RAN enhancements were made to address the use cases described in subclause 4.2:
- Transmission using f = 0.37 kHz, the cyclic prefix duration of 300µs and the symbol duration of 3ms, for the support of large ISD;
- Subframes using f = 2.5 kHz, the cyclic prefix duration of 100µs and the symbol duration of 0.5ms, for the support of high mobility;
- PDCCH enhancements:
- CFI indication in MIB [6] to avoid the need to decode PCFICH;
- New aggregation level 16; and
- Repetition of PBCH within the CAS to increase PBCH robustness.
Editor’s note: Further Rel.16 enhancements may be added to the list. |
d832899f12f9cb7303ee0f37d0629dd2 | 36.276 | 5 Architecture | |
d832899f12f9cb7303ee0f37d0629dd2 | 36.276 | 5.1 General | |
d832899f12f9cb7303ee0f37d0629dd2 | 36.276 | 5.2 Network elements | |
d832899f12f9cb7303ee0f37d0629dd2 | 36.276 | 5.3 Interfaces | |
d832899f12f9cb7303ee0f37d0629dd2 | 36.276 | 5.4 Protocol stack | The network architecture for LTE-based 5G terrestrial broadcast is described in 3GPP TS 36.300 [3] subclause 15.1.1, with the exception that only:
- ROM reception via MBMS-dedicated cell; or
- MBMS reception via FeMBMS/Unicast-mixed cell
is supported.
RAN interfaces for LTE-based 5G terrestrial broadcast are described in 3GPP TS 36.300 [3] subclause 15.1.1 and in 3GPP TS 36.440 [11]. In case of a MBMS-dedicated cell, the counting procedure is not supported by the eNB.
User plane and control plane protocol stack for LTE-based 5G terrestrial broadcast is described in 3GPP TS 36.300 [3] subclause 15.1.2 and subclause 15.1.3, respectively.
NOTE: For upper layer architecture, see 3GPP TS 23.246 [4]. |
d832899f12f9cb7303ee0f37d0629dd2 | 36.276 | 6 Protocol aspects | |
d832899f12f9cb7303ee0f37d0629dd2 | 36.276 | 6.1 Physical layerFrame structure and numerologies | |
d832899f12f9cb7303ee0f37d0629dd2 | 36.276 | 6.1.1 Frame structure and numerologies | 6.1.2 Channels and signalsOnly frame structure type 1 is supported. All numerologies specified in 3GPP TS 36.211 [8] are supported. For subframes using f other than 0.370 kHz, the frame structure is according to Figure 6.1-1. For transmissions using f = 0.370 kHz, the frame structure is shown in Figure 6.1-2.
Figure 6.1-1: Frame structure type 1 for subframes not using f = 0.370 kHz
Figure 6.1-2: Frame structure type 1 for transmissions using f = 0.370 kHz |
d832899f12f9cb7303ee0f37d0629dd2 | 36.276 | 6.2 MBMS Transmission | MBMS transmission is performed according to 3GPP TS 36.300 [3] subclause 15.3.3.
MCCH configuration and scheduling is performed according to 3GPP TS 36.300 [3] subclause 15.3.5 and 3GPP TS 36.331 [6] subclause 5.8.1. In case of a MBMS-dedicated cell, the MBMS counting configuration is not supported.
MCCH information acquisition is performed according to 3GPP TS 36.300 [3] subclause 15.3.5 and 3GPP TS 36.331 [6] subclause 5.8.2. In case of a MBMS-dedicated cell, only RRC_IDLE is supported. |
d832899f12f9cb7303ee0f37d0629dd2 | 36.276 | 6.1.3 Physical layer procedures | |
d832899f12f9cb7303ee0f37d0629dd2 | 36.276 | 6.32 MAC Layer | <BCH and MCH aspects only>MAC layer supports only:
- BCH reception for BCCH;
- DL-SCH reception for BCCH; and
- MCH reception for MCCH/MTCH.
BCH reception and DL-SCH reception in the MAC layer use transparent MAC [16], i.e. single MAC PDU per TTI with no headers. HARQ entity uses the dedicated broadcast HARQ process, defined in [16].
MCH reception in the MAC layer is specified in 3GPP TS 36.321 [16] subclause 5.12 and in 3GPP TS 36.300 [3] subclause 15.3.3. |
d832899f12f9cb7303ee0f37d0629dd2 | 36.276 | 6.43 RLC layer | BCCH uses the RLC-TM mode.
MTCH and MCCH use the RLC-UM mode. RLC operation for MTCH and MCCH is described in 3GPP TS 36.300 [3] subclause 15.3.3. |
d832899f12f9cb7303ee0f37d0629dd2 | 36.276 | 6.54 RRC layer | RRC layer supports only:
- System information reception (see 3GPP TS 36.331 [6] subclause 5.2) in MBMS-dedicated cell; and
- MBMS reception (see 3GPP TS 36.331 [6] subclause 5.8) in MBMS-dedicated cell and in FeMBMS/Unicast-mixed cell.
For system information reception, the following applies:
- only BCCH-BCH-Message-MBMS and BCCH-DL-SCH-Message-MBMS message class is supported;
- acquisition of system information messages is performed according to 3GPP TS 36.331 [6] subclause 5.2.3b.
For MBMS reception, the following applies:
- MBMS counting procedure and MBMS interest indication procedure are not supported. |
d832899f12f9cb7303ee0f37d0629dd2 | 36.276 | 6.5 Idle mode | |
d832899f12f9cb7303ee0f37d0629dd2 | 36.276 | 7 ROM aspects | |
d832899f12f9cb7303ee0f37d0629dd2 | 36.276 | 7.1 General | Since a ROM device does not support uplink transmission or two-way signalling procedures, and does not comprise USIM, it cannot support all the physical layer procedures of the conventional UE. By the same token, only a subset of idle mode procedures and RRM requirements applicable to a conventional UE will be supported. The following subsections provide an overview of the physical layer and idle mode procedures and the RRM requirements applicable to a ROM device. |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.