hash
stringlengths
32
32
doc_id
stringlengths
5
12
section
stringlengths
4
595
content
stringlengths
0
6.67M
14ce710049a3c611ebb26f3972649957
21.978
8.3 Message Flows
14ce710049a3c611ebb26f3972649957
21.978
8.3.1 Proposed Registration process
This section outlines a possible registration process based on the SIP REGISTER method, which allows CAMEL subscription information to be stored in the SIP Proxy Server/IPSSF. IETF RFC 2543 [4] defines the term Registrar for registration purposes and it is the SIP registrar that accepts the REGISTER method. In this section it has been assumed that the SIP Proxy Server and the SIP registrar are co-located. This registration process is in addition to the PDP transport layer registration (GPRS Attach/Detach and PDP context establishment as found in UMTS 24.080 and UMTS 29.060). With the SIP REGISTER method, it is assumed that registration with a location server takes place. As this is outside the scope of SIP to specify, the information flows for this procedure are not shown, but are assumed to take place. Unlike H.323, registration with a server is not mandatory. Only users that wish to receive incoming calls need to register with a SIP Proxy server and a location server. Callers placing calls are not required to register. The information flows for the registration procedure are shown in Figure 21 and elaborated in the following text: {1} The MS attaches to the network using existing GPRS procedures. This involves an attach request to the SGSN and a location update sequence between the SGSN and the HLR. {2} The MS activates a PDP context to establish an IP session with the local proxy SIP server in the visited network. Mechanisms for the discovery of the SIP Proxy server are for further study. {3} The MS sends a REGISTER method to the SIP Proxy server. {4} The SIP Proxy server notifies the IPSSF/VLR of the registration attempt. The IPSSF in turn notifies the HLR. The HLR responds with an InsertSubscriberData message which contains the CAMEL Subscription Information (CSI) which includes the Originating CSI (O-CSI) and Terminating CSI (T-CSI). The applicability of the Supplementary Service CSI (SS-CSI) is for further study. {5} The SIP Proxy server acknowledges that the registration process has been completed by a 200 OK response message. {6} Once the registration process is complete, the PDP session with the SIP Proxy Server may be terminated. Figure 21: Proposed registration procedure
14ce710049a3c611ebb26f3972649957
21.978
8.3.2 Mobile Originating Call with CAMEL interaction
This section deals with the mobile originating calls that require interaction with CAMEL. The call flows are shown in Figure 22 and are further explained below: {1} The MS wishes to place a VoIP call. A PDP context is established to allow an IP session to be established over the GPRS network. {2} The User Agent Server in the MS initiates a SIP request by issuing an INVITE method to the SIP Proxy server. {3} The VLR functionality in the IPSSF is checked to determine if the calling party has previously registered. If no registration found, then step {4} is followed. If the IPSSF determines that the calling user has a valid registration then step {5} is followed. {4} The IPSSF establishes a dialogue with the HLR of the subscriber’s network. An UpdateLocation message is sent to the HLR. The HLR responds by sending an InsertSubscribersData message, which may contain the CAMEL Subscription Information, including O-CSI, T-CSI and the SS-CSI. {5} The O-CSI data is analysed and if the necessary triggering criteria are met, the gsmSCF is invoked via an InitialDP message. {6} The SIP Proxy server will route the call based on the instructions received by the service logic in the gsmSCF. The remainder of the information flows will vary according to the service logic and are not shown. Figure 22: MO Call with CAMEL interaction
14ce710049a3c611ebb26f3972649957
21.978
8.3.3 Mobile Terminating Call with CAMEL interaction
This section deals with the CAMEL interaction for mobile terminated calls. A CAMEL service is triggered if the triggering criteria held in the called subscriber’s T-CSI matches the characteristics of the incoming call. The information flows are shown in Figure 23 and further explained below: {1} The terminating SIP Proxy server receives an INVITE method. {2} The T-CSI is analysed and the triggering criteria are check against the particulars of the incoming call. A terminal must register with a server to be able to accept incoming call and has been assumed that since this registration has taken place; the T-CSI is available at the server. {3} If the necessary triggering criteria are met, the gsmSCF is invoked and a CAP dialogue established between the IPSSF and the gsmSCF. {4} Instructions are received from the gsmSCF on how the call is to be routed. {5} The SIP Proxy server will route the call based on the instructions received by the service logic in the gsmSCF. A network initiated PDP context is established in order to deliver the INVITE method to the User agent server. As the rest of the information flows will vary according to the service logic, the remained of the information flows are not shown. Figure 23: MT Call with CAMEL interaction
14ce710049a3c611ebb26f3972649957
21.978
8.4 State Models
14ce710049a3c611ebb26f3972649957
21.978
8.4.1 Mapping SIP message to CAMEL Basic Call State Models
This section deals with how the Originating Basic Call State Model (O-BCSM) Points in Call (PICs) and Detection Points (DPs) or ‘triggers’ are mapped to the appropriate SIP messages. Although a mapping is possible, there is not always the same analogy between the circuit switched environment that the CAMEL BCSM were designed for and the packet environment, and as a result a direct mapping is not always possible. The state models for the CAMEL O-BCSM and the T-BCSM are based on the emerging CAMEL Phase 3 draft specifications as identified in reference[11]. For simplicity, the information flows in the Figures of the following subsections do not show the flows between the GPRS network nodes (SGSN and GGSN) and between the gsmSCF and IPSSF.
14ce710049a3c611ebb26f3972649957
21.978
8.4.2 Mapping to Originating BCSM for MO calls
The mapping between the SIP methods and responses for O-BCSM relating to Mobile Originating Calls are shown in Figure 24. Only the successful case is described. Further work is necessary to describe all other scenarios. The information flows are further described below : {1} INVITE method arrives at the proxy server, indicating that the MS has requested to set up a call. SIP Proxy server determines if O-CSI exists for this user. {2} Analysis of the O-CSI takes places and if necessary triggering criteria are met, gsmSCF is invoked. DP CollectedInfo may be reported. {3} Instructions received from the gsmSCF on how the call is to be routed, together with which EDPs are armed. State Routing_And_Alerting entered. INVITE method forwarded to destination. {4} A response ‘200 OK’ indicates that the destination has accepted in session invitation, indicating that a session has been established. State O_Active is entered, DP O_Active may be reported to the gsmSCF and an ACK is sent to the originating party. {5} Either party may release the call with a BYE method. On receipt of the BYE, transition to the PIC O_Null&Authorise_Oriigination_Attempt_Collect takes place and the DP O_Disconnect may be reported to the gsmSCF. Figure 24: Message flows and corresponding CAMEL O-BCSM for successful call establishment
14ce710049a3c611ebb26f3972649957
21.978
8.4.3 Terminating BCSM for MT Calls
The mapping between the SIP methods and responses for T-BCSM and Mobile Terminating Call is shown in Figure 25. The information flows further described below : {1} INVITE method arrives at the destination SIP Proxy server. Server/IPSSF determines if a T-CSI exists for the called user {2} T-CSI is analysed and if necessary triggering criteria are met, gsmSCF is invoked. Transition to state TerminatingCallHandling and DP Terminating_Atttempt_Authorised may be reported. {3} Call accepted by the terminating party. DP T_Answer may be reported to the gsmSCF, state T_Active entered. {4} Either party may terminate the call by sending a BYE and transition to PIC T_Null takes place and the DP T_Disconnect may be reported. Figure 25: Message flows and corresponding PIC in the CAMEL T-BCSM for successful call delivery
14ce710049a3c611ebb26f3972649957
21.978
8.4.4 Unsuccessful MT Call Delivery
This subsection explores the mapping and the reporting of the DPs that may be encountered when the call is not successfully established. The information flows are shown in Figure 26 and further explained below: {1} INVITE method arrives at the destination SIP proxy server. Server/IPSSF determines is a T-CSI exists for the called user {2} T-CSI is analysed and if necessary triggering criteria are met, gsmSCF is invoked. Transition to state TerminatingCallHandling and DP Terminating_Atttempt_Authorised may be reported. {3} The destination does not accept the incoming call – reason response may be any value in 4xx response range. The mapping of client error codes (4xx) to the possible Detection Points in PIC Terminating_Call_Handling is not all that straight forward. For example, the DP T_CallHandlingFailure can capture most of the 4xx error codes, and T_Busy can be mapped on to 486 Busy Here, it is not clear how T_Abandon and T_No_Answer can be mapped on to the error codes. Although further work is required, the problem is not unique to GSM and CAMEL. Work in other standards organisations needs to be investigated to determine similar issues. Figure 26: Message flows and corresponding PIC in the CAMEL T-BCSM for unsuccessful call establishment.
14ce710049a3c611ebb26f3972649957
21.978
8.5 CAMEL Integration
Integration of CAMEL functions with SIP Proxy Server functions may require enhancements to SIP standards or CAMEL standards. Some initial work has been done to identify the standards that may need to be enhanced and to assess the extent of the changes required.
14ce710049a3c611ebb26f3972649957
21.978
8.5.1 Impact on SIP Standards
Section 8.4 describes and illustrates how SIP messages may be mapped to O_BCSM and T_BCSM Detection Points (DPs) at the SIP Proxy Server/SSF. When studying the Figures it can be seen that some CAMEL Phase 3 DPs (such as O_Active) have good correspondence with SIP messages at the SIP Proxy Server, while other DPs require more detailed analysis. At this level of analysis it seems likely that changes to SIP may not be needed.
14ce710049a3c611ebb26f3972649957
21.978
8.5.2 Impact on CAMEL and other UMTS Standards
It is likely that some functional modelling additions and some CAP message information element additions will be needed. It is also likely that some HLR/VLR data and MAP protocol additions may be needed. It is of course very difficult to assess and describe exactly how much effort and meeting time is required to effect these changes. In comparison to previous CAMEL work on Phase 1, Phase 2 and Phase 3, in the author's opinion the effort required is probably more than was necessary to complete GPRS inter-working in CAMEL Phase 3, but probably less than the work necessary to complete CAMEL Phase 1. The major impact of these changes concerns documents 22.078, 23.018, 23.078, 29.078 and 29.002
14ce710049a3c611ebb26f3972649957
21.978
8.6 Service Impacts
The combination of CAMEL and SIP (as described in this report) may support some GSM supplementary services, such as unconditional call forwarding (subject to some re-engineering) and perhaps most operator specific services (depends on the extent of any reduced functionality necessary for integration). Every service needs to be studied in detail to determine exactly what can be supported. Interworking with SIP extensions for call control services is another aspect. Again every service needs to be studied in detail.
14ce710049a3c611ebb26f3972649957
21.978
8.7 Multimedia Evolution
The proposal in this report is focused on voice not multimedia. Control of multimedia services requires further study. However, the proposal does not in any way preclude CAMEL evolution to control multimedia services supported by SIP. It is likely that further enhancements to the protocols and functions listed in section 8.5.2 (e.g.. MAP, CAP, HLR, VLR, CSE) may be necessary, depending on the nature of the multimedia service support required.
14ce710049a3c611ebb26f3972649957
21.978
8.8 Advantages
The following advantages have been identified:  Maximises the re-use of existing functional entities, protocols and services. Such reuse decreases the development and ownership costs allowing existing familiar 2G services to be provided to 3G subscribers at an early stage. Minimum changes to the CSE for the support of legacy services. There are several IN/CAMEL services already deployed such as PrePaid, VPN, Mobile Number Portability, etc which may be used in a voice over IP network.
14ce710049a3c611ebb26f3972649957
21.978
8.9 Disadvantages
The following disadvantages have been identified:  This approach is not in line with the work currently underway in ETSI SPAN 3 (Services and Protocols), in particular a work item addressing IN support for voice over IP on the H.323 architecture and associated protocols in association with the TIPHON project.  Introduces new functional entity ‘IPSSF’, which provides the necessary mapping between the SIP Proxy Server and the CSE. However, this functional entity is based on the functions already provided by a VMSC/GMSC, where already standardised process such as the gsmSSF can be reused. The interface between the SCS/CSCF and the IPSSF requires further study.
14ce710049a3c611ebb26f3972649957
21.978
9 Work in other Standards Groups
14ce710049a3c611ebb26f3972649957
21.978
9.1 3GPP
14ce710049a3c611ebb26f3972649957
21.978
9.1.1 System Architecture Working Group 2 (S2)
The 3GPP S2 group has overall system architecture responsibility for the GSM/GPRS evolved system within the 3GPP organisation and also has close linkage with the ETSI SMG12 (GSM/GPRS) system architecture group. The S2 group is investigating the architectural impacts and linkages involved with providing IN (CAMEL) based features into the mobile environment including the impacts of aspects such as roaming, Mobile Originated and Terminating calls, interactions with GSM standardised supplementary services and distributed service control/SSF issues across network boundaries. Items currently under study include the addition of CAMEL features for GPRS (beyond CAMEL Phase 3) and the opportunities to include further location based capabilities. CAMEL is also continuing into the UMTS area to include the Open Service Architecture (OSA) aspects. 3GPP document 23.121 specifies architectural requirements.
14ce710049a3c611ebb26f3972649957
21.978
9.2 ETSI
14ce710049a3c611ebb26f3972649957
21.978
9.2.1 TIPHON
TIPHON Working Group 7 is studying the implementation of TIPHON networks in a mobile environment, and has been in existence since the beginning of 1999. TIPHON mobility is user and service mobility in the context of the VoIP application. The group has an understanding with 3GPP S2 to liase over IP activities. It is currently planning on producing 3 main documents: 07.001 Analysis of existing roaming techniques applicable to TIPHON mobility services 07.002 Investigation of synergies and common requirements between TIPHON networks and wireless systems as they are currently being developed by other bodies. 07.003 Mobility and Access to Wireless Systems: Extensions to Requirements, Architectures and Protocols However, at the present moment only 07.001 has any significant text associated with it. The document is a review of existing mobile networks and specifically lists supplementary services as an open issue. In section 5.1 the GSM network is described, and CAMEL identified as the Intelligent Network service within GSM used to provide service mobility where the end user should not see any difference in the services provided by the IN nodes irrespective of the user’s location and terminal used. Similarly section 5.7 describes the GPRS network, section 5.9.4 introduces Session Initiation Protocol, and section 5.10 details the mobile extension to H.323. At the July 1999 TIPHON 14 meeting, working group 7 discussed a document (14TD054) received from ITU-T SG16 for information concerning new work recently approved on mobility for H.323. The contribution stirred discussion, as the solution was seen as conflicting with the general attempt within TIPHON to work towards a layered architecture.
14ce710049a3c611ebb26f3972649957
21.978
9.2.2 SPAN3
ETSI SPAN (Services and Protocol for Advanced Networks) is ETSI’s core competence centre for fixed networks standardisation including IP based networks. SPAN3 (formerly SPS3) is the competence centre for IN Activities, including generic operations for INAP mobility. SPS3 work on Core INAP CS-3 has been split into two streams. CS-3.1 comprises CS2 and CAMEL Phase 3, while CS-3.2 looks at fixed network requirements and will be based on the ITU CS3 output. Both are due for completion by the end of 1999 and will be merged in Core INAP CS4, due for completion at the end of 2000. CS-3.2 contains a work item addressing IN support for voice over IP based on the H.323 architecture and associated protocols in conjunction with the TIPHON project. A liaison statement from SPS3 to TIPHON entitled “Using Intelligent Networks in a Tiphon Architecture” was written in June 1999, giving the following proposals - The IN infrastructure shall be independent of the IP telephony signalling protocol (SIP, H.323,…). - The call control and consequently IN control shall be at least at the edge of the network i.e. nearest to the user in a Local Exchange and between two operators in an Inter-operator Gateway.
14ce710049a3c611ebb26f3972649957
21.978
9.3 IETF
The Routing area contains the IP Routing for Wireless/Mobile Hosts (mobileIP) Working Group. It has developed routing support to permit IP nodes (hosts and routers) using either IPv4 or IPv6 to seamlessly roam among IP sub-networks and media types. The group has produced an Internet draft entitled “Requirements on Mobile IP from a Cellular Perspective” which considers MobileIP as a macro-mobility solution for cellular networks. This document does not address the issues surrounding the provision of supplementary services. The Transport area contains the IP Telephony (iptel) working group and the Media Gateway Control (MEGACO) working group. The Internet draft “SIP Call Control Services” describes a set of extensions to SIP which allow for various call control services. Example services include blind transfer, transfer with consultation, multi-party calls, bridged conferences, and ad-hoc conferencing. The Internet draft “Accessing IN services from SIP networks” proposes a mapping from the states of the IN call model to the states of SIP, an Internet call signalling protocol.
14ce710049a3c611ebb26f3972649957
21.978
9.4 ITU-T
14ce710049a3c611ebb26f3972649957
21.978
9.4.1 SG11
Study Group SG11 is responsible for studies relating to signalling requirements and protocols for telephone, N-ISDN, B-ISGN, UPT, mobile and multimedia communications. SG11 is responsible for most of the Q-Series standards, including Q.931. Questions under study by the group include: 5/11 Intelligent network capability sets 6/11 New signalling capabilities and requirements for advanced broadband multimedia services 7/11 Signalling, call handling and management requirements for universal personal telecommunications and for user mobility in future public land mobile systems 13/11 Network signalling for the support of broadband services and third generation land mobile networks (FPLMTS) 22/11 Intelligent Network Application Protocol (INAP) 24/11 Signalling requirements for emerging land mobile and satellite mobile - Network and Inter-network Signalling Requirements
14ce710049a3c611ebb26f3972649957
21.978
9.4.2 SG16
Study Group16 is responsible for studies relating to multimedia service definition and multimedia systems, including the associated terminals, modems, protocols and signal processing. SG16 is responsible for the H-Series standards, including H.323, as well as parts of the T-, G-, and F-Series. Questions under study by the group include: 13/16 Packet switched multimedia systems and terminals This question covers the H.323 standard, of which Annex H studies H.323 Mobility. The annex has the following objectives:  Define functional requirements for H.323 mobility at the application level in a transport independent way.  Examine whether any new messages or message elements need to be created in H.323 for supporting mobility  Facilitate interoperability for implementation of H.323 mobility over any specific networking environment such as wireless/PSTN
14ce710049a3c611ebb26f3972649957
21.978
10 Questions & Answers
Early drafts of this FTR were presented to 3GPP CN WG2a and a small number of questions were raised. The questions and answers are recorded here. Q. In our work, are we considering IN control of RAS signalling or for call control or both? A. Control of RAS signalling is out of scope. Q. How does the architecture support the playing of tones and announcements? A. This is a problem not unique to CAMEL and is one of many issues that we have not addressed. We felt that it is appropriate to address this aspect as part of a more detailed study. Q. Are we only considering CAP over SS7? A. We have not excluded the possibility of CAP over IP, this possibility depends on the outcome of SIGTRAN work and the MAP over IP work in CN2B. CAMEL control of VoIP services is independent of whether SS7 or IP is used for the lower layer signalling transport. Q. What considerations are there for 'fast start' and what impact does this have? A. Requires further study. Q. How are we incorporating the work output from MEGACO? A. As far as we are aware MEGACO work does not directly impact CAMEL control of VoIP services but further study is required.
14ce710049a3c611ebb26f3972649957
21.978
11 Conclusions & Recommendations
This report has demonstrated how CAMEL can be used to control VoIP services in an all IP network using H.323 or SIP. The analysis has been carried out at a high level sufficient to identify that further detailed design and specification work should lead to a viable solution provided the architectural assumptions used in this report are correct. At this level of analysis no preference for H.323 or SIP was evident. Based on this evidence, either H.323, SIP or both could be successfully employed. Use of CAMEL is one service creation approach for H.323/SIP-based services. There are also alternative H.323/SIP and IN interworking options identified in the report. Finally use of “next generation” architectures may enable other types of service creation which are not based on IN. The overall options need to be reviewed to select which of them will be most appropriate for R00 considering service and technical aspects. Based on this analysis the use of CAMEL is technically feasible and would provide a service evolution path from R99, but detailed comparison with other options has not been included. Finalisation of the architecture and service creation principles for R00 is urgently needed so that work on the selected option(s) can start. It is also necessary to decide what standardised service(s) are required for H.323/SIP and which service(s) will be implemented using tool-kits. Annex A: Change history Change history Date TSG # TSG Doc. CR Rev Subject/Comment Old New Jun 2000 CN#08 NP-000252 Approved by TSG CN 2.1.1 3.0.0
4131cd5fefdadf4075e3ec0993ed8fe4
34.901
1 Scope
The present document describes the statistical theory and concepts applied in the conformance test of the user equipment (UE) so as to improve test speed.
4131cd5fefdadf4075e3ec0993ed8fe4
34.901
2 References
The following documents contain provisions which, through reference in this text, constitute provisions of the present document. • References are either specific (identified by date of publication, edition number, version number, etc.) or non‑specific. • For a specific reference, subsequent revisions do not apply. • For a non-specific reference, the latest version applies. In the case of a reference to a 3GPP document (including a GSM document), a non-specific reference implicitly refers to the latest version of that document in the same Release as the present document. [1] 3GPP TS 34.121: "Terminal Conformance Specification; Radio transmission and reception (FDD)". [2] 3GPP TS 34.122: " Terminal Conformance Specification; Radio transmission and reception (TDD)". 3. Definitions, symbols and abbreviations Definitions, symbols, abbreviations and equations used in the present document are listed in TR 21.905 [5] and TR 25.990 [6].
4131cd5fefdadf4075e3ec0993ed8fe4
34.901
3.1 Definitions
For the purposes of the present document, the following additional terms and definitions apply.
4131cd5fefdadf4075e3ec0993ed8fe4
34.901
3.2 Symbols
For the purposes of the present document, the following symbols apply: […] Values included in square bracket must be considered for further studies, because it means that a decision about that value was not taken
4131cd5fefdadf4075e3ec0993ed8fe4
34.901
3.3 Abbreviations
For the purposes of the present document, the following abbreviations apply: BER Bit Error Ratio BLER Block Error Ratio DUT Device under Test
4131cd5fefdadf4075e3ec0993ed8fe4
34.901
3.4 Equations
Void.
4131cd5fefdadf4075e3ec0993ed8fe4
34.901
4 Introduction
This technical report includes two distinct approaches made to determine total test time optimisation. For ease of understanding they are just referred to here as the first and second approach. Furthermore the two approaches differ a little in that they use slightly different terminology.
4131cd5fefdadf4075e3ec0993ed8fe4
34.901
4.1 First approach
The first approach is found in clauses 5 and 6. It reflects TS 34.121 in that the symbols, abbreviations and equations are consistent with TS 34.121.
4131cd5fefdadf4075e3ec0993ed8fe4
34.901
4.2 Second approach
The second approach is found in clauses 7 to 11 and does not directly reflect TS 34.121 although it does use the existing theory from TS 34.121. The difference is that it refines the theory and derives further approaches for test time reduction. Some of the symbols, abbreviations and equations have local meaning and these are identified in clause 7. 5. Definitions of distribution functions and parameters to be used Summary
4131cd5fefdadf4075e3ec0993ed8fe4
34.901
5.1 Properties of the Poisson Distribution
Description of a statistical experiment by a distribution function and basic characteristics of the distribution.
4131cd5fefdadf4075e3ec0993ed8fe4
34.901
5.2 Equivalence between Poisson Distribution and Chi Square Distribution
Here it is shown, that both distributions are equal. Just the form is different. On the other hand there are two inverse cumulative operations. One of them is useful for our purpose.
4131cd5fefdadf4075e3ec0993ed8fe4
34.901
5.3 Confidence interval
In a single test we apply ns samples and measure ne errors. The result can be member of different distributions each characterized by another parameter NE. We ask for two of them: 1) The worst possible distribution NEhigh , containing our measured ne with [D= 0.0085%] probability in the sense 0.000085= (2) ni is the integration variable ne is the measured value NE is the variable to tune in order to make the integral consistent. The result of the inverse cumulative operation is NEhigh 2) The best possible distributions NElow , containing our measured ne with [D=0.0085%] probability in the sense 0.000085= (3) The result of the inverse cumulative operation is NElow To illustrate the meaning of the range between NElow and NEhigh: In the case our measured value ne is a rather untypical result (just [0.0085%] probability) nevertheless the final result NE can still be found in this range, called confidence interval. The probabilities D in (1) and (2) can be independent like in GSM, but we want to have them dependent and equal. The inverse cumulative Chi Squared distribution gives the wanted results: Inputs: number of errors ne, measured in this test. Probabilities D and the complementary probability 1- D Output: NE, the parameter describing the average of the distribution. E.G.: (4) (5) Figure 5‑6: Confidence Interval Same as the width of the distributions the confidence interval increases proportional to SQR(ne), that means, it increases absolutely, but decreases relatively to the measured number of errors.
4131cd5fefdadf4075e3ec0993ed8fe4
34.901
5.4 Application of the confidence interval to decide the outcome of the test
If we find the entire confidence range, calculated from a single result ne, on the good side of the specified limit we can state: With high probability 1-D, the final NE is better than the limit. If we find the entire confidence interval, calculated from a single result ne, on the bad side of the specified limit we can state: With high probability 1-D, the final NE is worse than the limit. With each new test we update our preliminary data for ns, ne and ber. For each new sample we calculate the confidence interval and check it against the test limit. Once we find the entire confidence interval on the good side of the specified limit we allow an early pass. Once we find the entire confidence interval on the bad side of the specified limit we allow an early fail. If we find the confidence interval on both sides of the specified limit, it is evident neither to pass nor to fail the DUT early. Transcription of the above text into formulas: The current number of samples ns is calculated from the preliminary ber and the preliminary ne ber = ne/ns (6) BERlim = NElimit / ns (7) for abbreviation in the formula: bernorm = ber/BERlimit = ne/ NElimit (normalised ber) Early pass stipulates: NEhigh < NElimit (8) Early fail stipulates: NElow > NElimit (9) The early fail and the early pass limit are displayed in Figure 5‑7: early pass limit (10) early fail limit (11) Figure 5‑7: Early pass and early fail curves
4131cd5fefdadf4075e3ec0993ed8fe4
34.901
5.6 Test time reduction
Using 5.4 the outcome of the test is connected with two qualities, a good one and a worse and variable one. Introducing the bad DUT factor M, the quality of the test is now uniform and test time is further reduced.
4131cd5fefdadf4075e3ec0993ed8fe4
34.901
5.7 Calculation of the intersection coordinates (maximum number of sample and the normalized test limit)
Calculus for intersection co-ordinates of the early pass and early fail limit.
4131cd5fefdadf4075e3ec0993ed8fe4
34.901
5.8 Wrong decision risk F
5.1 to 5.6 applies the wrong decision risk for a single test step D. However it is desirable to have a predefined wrong decision risk for the entire test F. The approach to derive F from D this is explained here.
4131cd5fefdadf4075e3ec0993ed8fe4
34.901
5.1 Properties of the Poisson distribution
NOTE: The following text is expressed in terms of BER=bit error ratio. However it can be used for BLER (Block error ratio) as well. Even for 1- Success Ratio, used in RRM delay tests, the theory can be used. With a finite number of samples (ns), the final bit error ratio BER cannot be determined exactly. Applying a finite ns, we measure a number of errors (ne). ne/ns =ber is the preliminary bit error ratio. In a single test we apply a predefined number of samples ns and we measure a number of errors (ne). ne is connected with a certain differential probability in the Poisson distribution. We don't know the probability and the position in the distribution conducting just one single test. Repeating this test infinite times, applying repeatedly the same ns, we get the complete Poisson distribution. The average number of errors is NE. NE/ns is the final BER. Poisson Distribution: dpois(ne,NE)=(NEne/ne!)e-NE (1) e.g. : Figure 5‑1: Example of Poisson distribution curve The Poisson distribution has the variable ne and is characterised by the parameter NE. Real probabilities to find ne between two limits are calculated by integrating between such limits. Note: The Poisson distribution is an approximation: Independent error occurrence is described by the binomial distribution. If the BER approaches 0 the Poisson distribution approximates the binomial distribution.
4131cd5fefdadf4075e3ec0993ed8fe4
34.901
5.2 Equivalence between Poisson distribution and Chi Square distribution
The experiment, the Poisson distribution is based on, is having observed a certain number of samples (ns), the number of events (ne) is counted to calculate the ratio ne/ns. The experiment, the Chi Square distribution is based on, is having observed a certain number of events (ne), the number of samples (ns) is counted to calculate the ratio ne/ns. Poisson and Chi Square are valid only if ne<<ns Figure 5‑2: Comparison of Chi-Squared and Poisson distribution The dotted blue function is the Chi-squared distribution, using the parameters of the Poisson distribution. We scaled, offset and changed the interpretation of variable and parameter such that both distributions match. The Poisson distribution is a discrete distribution. Such scaled the Chi Squared distribution interpolates the Poisson distribution exactly for all NE (degenerated for NE=ne=0). The experiment of the Chi Square distribution is always terminated by an event, In contrast the experiment of the Poisson distribution almost never is terminated by an event because of ne/ns-->0. This explains that the Poisson distribution needs one event more, to equal in its form the Chi Square distribution 2*dchisq(2*NE,2*ne) = dpois(ne-1,NE) describes the experiment, terminated by an error. 2*dchisq(2*NE,2*(ne+1)) = dpois(ne,NE) describes the experiment, terminated by any sample. The terminating error may be the artificial error at the beginning of the test, or the last error, causing the fail. In the next comparison shows dpois versus dchisq. The first 3D plot shows the Poisson distribution: (Figure 5‑1) Variable: ne Range 0 to 10 Column in the table 0 to 10- axis in the plot Parameter: NE Range 0 to 10 Row in the table 0 to 100 axis in the plot The second 3D plot shows the Chi Square distribution: (Figure 5‑4) Variable: NE Range 0 to 10 Column in the table 0 to 100- axis in the plot Parameter: ne Range 0 to 10 Row in the table 0 to 10 axis in the plot Columne 0 is degenerated Table 5‑1: Poisson distribution calculation Figure 5‑3: 3D plot for Poisson distribution ne Table 5‑2: Chi-squared distribution calculation Figure 5‑4: 3D plot for Chi-squared distribution Observation: 1) The rows in Poisson distribution correspond the columns in the scaled Chi-squared distribution and vice versa. 2) Poisson distribution at ne=0 versus NE is the exponential distribution Chi-squared distribution at ne=0 (degree of freedom=1) versus NE is also the exponential distribution see the next plot: Figure 5‑5: Comparison between Poisson and Chi-squared distribution Inverse Cumulative Operation: We have seen: Chi Square and Poisson both describe the same array: ne versus NE. The figures above show, that NE and ne in both functions are not commutative. Hence there are two inverse operations (a) and (b): D= = 2* (a) with D=wrong decision probability or confidence level (input). ni is the integration variable ne is the measured value.(input, discrete) It is the integration limit NE (real) is tuned such that the integral is consistent. It returns an NE as a function of the two parameters D and ne. qchisq(D,ne) D= = 2* (b) NI is the integration variable NE (real) is the integration limit ne (discrete) is tuned such that the integral is consistent. It returns ne as a function of the two parameters D and NE: qpois(D,NE) Our target requires a). This is usually called the Inverse Cumulative Chi Square function. (b) is the solution for another target. This is usually called the Inverse Cumulative Poisson function. (a) returns a greater NE than (b) returns with respect to ne. (easily visible in the figures) The difference (a)-(b) is small. This is also visible from the figures: ne and NE are close to commutative. (a) returns a continuous NE, (b) returns a discrete ne.
4131cd5fefdadf4075e3ec0993ed8fe4
34.901
5.5 Test time reduction
Whichever ne we propose as a final stop condition e.g. ne =200, the test can leave the area between the early pass and the early fail limit through the open end of the right side of Figure 5-7. This situation needs an arbitrary pass or fail decision. E.g. pass, if the test hits the vertical 200-error line. This situation has the following drawback: The test has two different qualities. A good one, when the test hits an early pass or early fail limit, and a worse and variable one, when the test hits the vertical 200 error line; variable, depending on the height, it crosses the line. The quality of the test in terms of wrong decision risk is variable in the range D up to as bad as 50%. We can replace the situation against a better trade-off: Instead a test with different qualities against one limit, we design a test with a fixed uniform quality against two limits, (gaining further test time reduction). We maintain the definition of the early fail limit: (a) We fail a DUT and accept the probability of D= 0.0085% that it is actually better than the limit. We propose a meaningful redefinition of the early pass limit: (b) We pass a DUT and accept the probability of D=0.0085% that it is actually worse than M times the limit (M>1).(M = Bad DUT factor) This produces the following consequences: (1) The early pass limit is shifted upwards by the factor of M (2) The early fail and the early pass limit intersect. (3) The intersection coordinates are: the normalized test limit and the maximum number of events Transcription of the above text into formulas: berlimbadpass: early pass limit against the bad DUT limit (12) berlimfail: early fail limit against the specified limit (13) Figure 5‑8: Early pass and early fail curves with multiplication factor M
4131cd5fefdadf4075e3ec0993ed8fe4
34.901
5.6 Calculation of the intersection coordinates
initial guess of target number of events root finds the zero of the function target number of events normalized test limit
4131cd5fefdadf4075e3ec0993ed8fe4
34.901
5.7 Wrong decision risk F
Provided a single BER trajectory with final BER on the limit hits the early fail limit. If a fail is decided at this instant of the test, the wrong decision risk is as small as D. For each member of a large population of DUTs a wrong decision can happen, with probability D, accumulating to an amount F > D for the entire population. D is the wrong decision risk based on the statistical totality of samples with BER on the limit. F is the wrong decision risk based on the statistical totality of DUTs with BER on the limit. (The same holds for a bad DUT, hitting the early pass limit.) We call D the wrong decision risk at a single test step and F the wrong decision risk for the entire test. For a real test it is desirable to define in advance the wrong decision risk F of the entire test. An exact theory is not available for this problem. It is proposed to derive D from F by the following simulation: A large population of DUTs with BER on the limit (limit-DUT) is simulated and decided against the early pass and early fail bound, with a free D-parameter in the early pass and fail limit. The simulation will show, that a certain fraction F (D<F<1) falsely fails. The complementary simulation is: A large population of DUTs with M*BER (bad DUT) is simulated and decided against the early pass and early fail bound, with a free D-parameter in the early pass and fail limit. The simulation will show, that a certain fraction F (D<F<1) falsely passes. Both false decision fractions are approximately equal and represent the wrong decision probability F for the entire test. D is tuned such that F corresponds to the predefined wrong decision probability.
4131cd5fefdadf4075e3ec0993ed8fe4
34.901
6 F to D conversion in BER BLER tests
4131cd5fefdadf4075e3ec0993ed8fe4
34.901
6.1 Conversion F to D
Annex F.6.1 in TS 34.121 gives a statistical approach for BER BLER tests. It gives early pass and early fail conditions. The formulas for this condition contain the parameter D, the wrong decision probability for a single test step. However it is desirable to have a wrong decision probability for the entire test F. This contribution explains the way, how to derive F from D and gives results for a set of parameters.
4131cd5fefdadf4075e3ec0993ed8fe4
34.901
6.2 Introduction
Provided a single BER trajectory with final BER on the limit hits the early fail limit. If a fail is decided at this instant of the test, the wrong decision risk is as small as D. For each member of a large population of DUTs a wrong decision can happen, with probability D, accumulating to an amount F > D for the entire population. D is the wrong decision risk based on the statistical totality of samples with BER on the limit. F is the wrong decision risk based on the statistical totality of DUTs with BER on the limit. (The same holds for a bad DUT, hitting the early pass limit.) We call D the wrong decision risk at a single test step and F the wrong decision risk for the entire test. For a real test it is desirable to define in advance the wrong decision risk F of the entire test. An exact theory is not available for this problem. It is proposed to derive D from F by the following simulation: A large population of DUTs with BER on the limit (limit-DUT) is simulated and decided against the early pass and early fail bound, with a free D-parameter in the early pass and fail limit. The simulation will show, that a certain fraction F (D<F<1) falsely fails. The complementary simulation is: A large population of DUTs with M*BER (bad DUT) is simulated and decided against the early pass and early fail bound, with a free D-parameter in the early pass and fail limit. The simulation will show, that a certain fraction F (D<F<1) falsely passes. Both false decision fractions are approximately equal and represent the wrong decision probability F for the entire test. D is tuned such that F corresponds to the predefined wrong decision probability.
4131cd5fefdadf4075e3ec0993ed8fe4
34.901
6.3 The simulation procedure
4131cd5fefdadf4075e3ec0993ed8fe4
34.901
6.3.1 Equal pass and fail probability
A population of DUTs on the limit is established. Quantity 10 000 Preselected BER 1% An early fail and an early pass limit is established. With D (wrong decision risk) and M (bad DUT factor) With target ne and test limit as a side result. D is tuned in the inner loop M and Fpredefined are varied in the outer loop During the simulation A member of the population leaves the statistical totality if An error happens and the early fail limit is hit (false fail) An error happens and the early pass limit is hit or crossed (correct pass) The fraction false fails / 10 000 = F is recorded. Inner loop: In repeated trials D is tuned, such that F ≤ Fpredefined (conservative approach). Having decided for a specific D the simulation is repeated again 10 times and Fmin, Fmax, and Fmean are recorded. The complementary simulation is done with a population of bad DUTs (same quantity, same M, same Fpredefined , same D) Observation 1: the false pass fraction is slightly lower than the false fail fraction. Hence the result is even more conservative for the false pass. Outer Loop: M is varied from 1.1 to 1.5 in steps of 0.1 Fpredefined is varied from 0.2 %, 0.5 %, 1%, 2% to 5%. Observation 2: For lower wrong decision risks F the false decisions in 10 000 DUT are less. Hence the variance of F in the 10 repetitions relatively increases. For lower wrong decision risks F the simulation time increases. Hence the compensation of the increasing variance of F by more repetitions is limited by the simulation time, or vice versa: the simulation results for F converge to a final value, investing infinite effort for simulations. For practical and security reasons the Ds for lower Fs are decided more conservative than the equivalent ones for higher Fs.
4131cd5fefdadf4075e3ec0993ed8fe4
34.901
6.3.2 Unequal pass and fail probability
For statistical test, frequently repeated, a single false fail can fail the composite test. This can be combated by a decreased false fail risk. This costs test time. A single false pass does not have this effect on the composite test. Hence it is not necessary to consume increased test time due to decreased false pass risk for the pass probability. Hence unequal pass and fail probabilities are treated for very low false fail risk. A population of DUTs on the limit is established. Quantity 10 000 Preselected BER 1% In the complementary simulation a population of bad DUTs is established (same parameters) Common for both simulations: An early fail limit is established with Dfail and an early pass limit is established with Dpass (D wrong decision risk Dfail < Dpass) and M (bad DUT factor) With target ne as a side result. Dfail and Dpass are tuned independently in the inner loop M is varied in the outer loop During the simulation A member of the population leaves the statistical totality if An error happens and the early fail limit is hit (false fail) For the complementary simulation: (correct fail) An error happens and the early pass limit is hit or crossed (correct pass) For the complementary simulation: (false pass) The fraction false fails / 10 000 = Ffail and the fraction false pass/10 000 = Fpass are recorded. Inner loop: In repeated trials Dfail and Dpass are tuned independently , such that F fail and Fpass ≤ Fpredefined (conservative approach). Having decided for a specific Dfail and Dpass the simulation is repeated again 10 times and Fmin fail, Fmax fail, and Fmean fail and Fmin pass, Fmax pass, and Fmean pass are recorded. Observation 3: The Dpass must be slightly lower than the equivalent D in the case for equal probabilities (a). Due to lower Dfail the target number of errors increases (e.g. 345  403), accumulating more single step wrong decisions. This is compensated by a lower Dpass.
4131cd5fefdadf4075e3ec0993ed8fe4
34.901
6.4 Result of the simulation: M-F array
Table 6‑1: M-F table 7. Definitions, symbols and abbreviations Definitions, symbols, abbreviations and equations used in the present document are listed in TR 21.905 [5] and TR 25.990 [6].
4131cd5fefdadf4075e3ec0993ed8fe4
34.901
7.1 Definitions
For the purposes of the present document, the following additional terms and definitions apply. Wrong Decision Probability: Chance of incorrect judgement based on the given test results. Significance Level: Chance of incorrect judgement based on the given test results. This term is exchangeable with Wrong Decision Probability. Individual Significance Level: The significance level of a simple test or a single decision. Denoted by "D". Total Significance Level: The significance level of a test system as a whole (a set of simple tests.) Denoted by "F". Confidence Coefficient (Level): In this report, this is defined by 1 – Significance Level. Specified Error Ratio: General term that is referred to BER/BLER or other error ratios that are specified in the test specifications (TS34.121 and TS34.122.) Average Error Ratio: The error ratio specific to a DUT whose value can be determined by averaging the infinite number of measurement data of error ratio. Early Pass/Fail Criteria: a set of simple tests, each of which consists of a pair of thresholds of the measured error ratio.
4131cd5fefdadf4075e3ec0993ed8fe4
34.901
7.2 Symbols
For the purposes of the present document, the following symbols apply: […] Values included in square bracket must be considered for further studies, because it means that a decision about that value was not taken C Confidence Coefficient (Confidence Level) D Individual Significance Level Dp Individual Significance Level of an early pass criterion Df Individual Significance Level of an early fail criterion F Total Significance Level Fp Total Significance Level of a set of early pass criteria Ff Total Significance Level of a set of early pass criteria M Bad DUT factor R0 Specified error ratio R Measured error ratio (rate) (calculated from the measured error count and time duration or sample number) Rth Threshold level against measured error ratio Rth-p Threshold of an eraly pass test Rth-f Threshold of an eraly fail test r Average error ratio (rate) of DUT
4131cd5fefdadf4075e3ec0993ed8fe4
34.901
7.3 Abbreviations
For the purposes of the present document, the following abbreviations apply: BER Bit Error Ratio BLER Block Error Ratio DUT Device under Test pdf Probability Distribution Function CDF Cumulative Distribution Function
4131cd5fefdadf4075e3ec0993ed8fe4
34.901
7.4 Equations
Chi-square distribution: of a degree of freedom n where is gamma function. Exponential distribution:
4131cd5fefdadf4075e3ec0993ed8fe4
34.901
8 Introduction
BER/BLER measurements are inherently statistical processes, and a statistical approach should be introduced in order to make a BER/BLER test method objective and accurate. In the GSM standard specifications, this has been achieved by introducing "wrong decision probability (significance level)" and "bad DUT factor." That is, the standard requires the test method to give a well-defined (predictable) "wrong decision probabilities", Ff / Fp or confidence coefficients Cf (= 1 - Ff)/Cp (= 1 - Fp). Here, it should be noted that the significance levels are defined against the population of UEs with two error rates (0.01 and 0.015). These parameters, the significance level and bad DUT factor, should be determined a priori, since there seems to be no good reason to pick a set of values rather than others. So, it would be a reasonable decision to employ the same value with GSM standard: F = 0.002 (0.2 %) and M = 1.5 for BER and BLER measurements since we now have a long enough experience to prove the validity of these parameters. The GSM standard recommends that BER/BLER should be calculated after 200 errors were observed and the resultant BER/BLER should be compared against a threshold (around 1.24 R0). This test method gives the significance level presented above. However, this method is not optimal from the viewpoint of test time. Apparently, if the DUT population consists of very good UEs (UE with a very low BER), it would take a long time to observe 200 errors. In practice, such a situation is unacceptable, so some supplementary criterion should be used. For example, if a UE doesn't report any bit/block errors for the certain time period, it should pass the test. This supplementary criterion may save many of the potentially time-consuming cases, but still not optimised for the test time. In this report, a more sophisticated method will be developed to optimise the test time by introducing the early pass/fail criteria, whose basic idea was inspired by I-95 standard.
4131cd5fefdadf4075e3ec0993ed8fe4
34.901
9 Statistical characteristics of testing processes
4131cd5fefdadf4075e3ec0993ed8fe4
34.901
9.1 Exact probability distribution functions
BER/BLER measurements treat phenomena that are characterized as: 1) The experiment consists of a sequence of independent trials. 2) Each trial has two possible outcomes, E (Error) or N (Non Error). 3) The probability of E (r = f(E)) is constant from one trial to another. That is, the BER/BLER measurement can be reduced to observation of Bernoulli sequences. Many other test objects, such as RRM delay measurements results, can also be reduced to a process that is characterized by these requirements. In these case, the outcomes are either "Pass or Successful (the measured delay was within the limit value, for example)" or "Fail (the delay exceeded the limit)." Our objective is to find a way to tell whether r is larger than R0*M or smaller than R0 with a certain significance level from the result of a certain number of trials. This report proposes to use a set of many simple tests, instead of a single simple test. Here, a test is a comparison of resultant error rate against a predefined criterion (a threshold value). Practically speaking, there would be two ways to do this comparison: a) To do the comparison for every trial, or b) To do the comparison each time an error is observed. For method a) above, the probability of giving an error number, m, is given by a binomial distribution, . Where r: average error rate, m: the number of errors, s: the number of samples. The resultant error ratio, R, is m/s, and its probability can be derived from the equation above. On the other hand, for method b), the probability that m-th error is observed at the s-th sample follows a negative binomial distribution, . The error rate R is again given by m/s.
4131cd5fefdadf4075e3ec0993ed8fe4
34.901
9.2 Approximation with continuous distributions
In this section, the notion r for average error ratio is used for average error rate too. The distributions introduced above are exact, but sometimes they are very time-consuming to simulate the process on a computer. So, it is convenient to use appropriate continuous distribution functions that approximate the discrete functions. If r is very low (that is, m/s << 1), the phenomenon described in the previous section can be reduced to the one that satisfies following requirements: 1) Every error can be described by the time at which it occurred. 2) Each error occurs independently 3) The average error rate r (= m/T) is constant throughout the testing. It is known that the time interval between the consecutive errors, t, should follow an exponential distribution. Again, there are two possibilities to determine the measured error rate R and test it against the criteria: a) To calculate R after the predetermined time period, or b) To calculate R when m-th error is observed. In case a), the probability that m errors are observed within the certain time period, T follows the Poisson distribution. Where : average error count in the time duration T, so = rT. So, the function can be represented as: The measured error rate, R, is given by m/T. For the test method b), the time to m-th error, T, follows an m-Erlang distribution. Where (x, n) is a chi-square distribution function of a degree of freedom n. m-Erlang distribution’s CDF is given by This function can be transformed to a function of R(=m/T), mERCDF(). Apparently, the CDF is a function of (R/r) and this means the distribution does not depend on the absolute value of average or measured error rate. This would make a handling very easy. Almost all the RF and RRM measurements that require the statistical approach are of the discrete nature, and then the continuous pdf is accurate only for smaller r values. It’s hard to tell the exact condition under which the approximation should be good, but it can be said that we cannot use the continuous pdf when r = 0.1. This subject will be discussed in the chapters below.
4131cd5fefdadf4075e3ec0993ed8fe4
34.901
9.3 Simple test criteria and significance level
For BER/BLER testing, our test can be reduced to a comparison of the measured error rate, R against a threshold. It would follow the procedure like: if R < Rth-p then the DUT passes else if R > Rth-f then the DUT fails else no decision should be made Where Rth-p and Rth-f are the threshold for pass and fail criteria, and in general Rth-p Rth-f. The significance level for the first test, Fp, is defined as the probability that a bad DUT (r > R0 M) should pass. Similarly, Ff is defined as the probability that a good DUT (r < R0) should fail in this test. The severest condition from the viewpoint of the significant level is that r = R0M and r = R0 for bad DUT and good DUT population respectively. So, it would be reasonable to define the significance levels for such populations. Now that it is presumed that r of the DUT population is unique (R0 or M*R0), we can calculate the probability distribution of R according to the functions introduced in the previous chapter. For a pdf, f(R: r, m), the threshold can be determined so that: (1) (2) Where, it should be noted that x takes only discrete values that are given by m/s. For the continuous pdf’s, the summation should be replaced with integration, or using their CDF (F(R: r, m)) (1’) (2’) When we choose an appropriate combination of M, m, and D(= Dp = Df), we can set the Rth so that the outcome of the test is either of Pass or Fail. For GSM standard, M = 1.5, D = 0.2 %, and then m = 200 and Rth = 1.24 R0. This can be derived from both of m-Erlang distribution (mERCDF(R:m,r) above) and the negative binomial distribution.
4131cd5fefdadf4075e3ec0993ed8fe4
34.901
10 Early Pass/Fail termination of testing
4131cd5fefdadf4075e3ec0993ed8fe4
34.901
10.1 Framework of test method
If a UE reported 50 block errors for the first 100 frames, we would intuitively know that the UE should be bad (its average BLER should be higher than 0.01), even though the number of the observed errors is much smaller than 200. We are quite sure about that, since it should be very rare for a UE with an average BLER of 0.01 to report 50 block errors out of 100 frames. This can be shown using the binomial distribution, which gives its probability as The probability that 50th error should occur at 100th sample is given by negative binomial distribution: We can safely say that both cases should be very unlikely. That is, r cannot be 0.01 and should be much larger. This suggests that, for very good or very poor UEs, the test sequence can be terminated at earlier stages, and as a result, the test time can be cut short. This is the origin of the idea of "early pass/fail criteria." Such the test method will consist of many simple tests and its pseudo script would look like: m = 0 for each s: # repeat for sample forever if an error is reported: m = m + 1 R = m/s if R > Rth_f(m): # fail test UE failed break # stop procedure else if R < Rth_p(m): UE passed break else continue This method is straightforward. Each time an error reported, the error rate should be calculated and then compared with thresholds that depend on m. However, there is till a room for improvement from viewpoint of test time reduction. The problem is apparent if we imagine the case in which no errors occur at all. The test would not be completed within a finite time period. Assume that the no error samples last long enough after the m-th error. If the duration is long enough and the error rate calculated from imaginary (m +1)th error is lower than Rth_p(m + 1), the UE can be considered to have passed the test. This idea would be implemented like: m = 0 for each s: # repeat for sample forever if an error is reported: m = m + 1 R = m/s if R > Rth_f(m): #fail test UE failed break else: # if not error if s > Tdp(m): #pass test UE passed break else: continue Where Tdp(m) is a predefined time duration (in sample number) which gives R < Rth_p for (m +1)th error. To make the test method complete, a table like the example below should be prepared: m Rth_p Tdp Rth_f 0 --- 417 --- 1 0.0024 540 --- 2 0.0034 750 0.031 3 0.0040 800 0.025 … … … … Where, "---" means "any decision should not be made at that error count." For example, while no error is reported, any decisions should not be made based on the error rate, and only when the time duration in terms of the number of samples exceeds 417, DUT is decided to pass.
4131cd5fefdadf4075e3ec0993ed8fe4
34.901
10.2 Early Pass/Fail criteria
As described in the previous section, once the framework of the test procedure is established, a test can be defined by presenting the table of Rth_p, Tdp, and Rth_f. These values will be referred to as "Early Criteria." The requirements for such criteria should be: 1) F should be 0.2 % for BER/BLER measurement, and 5% for RRM delay measurement and others. 2) The test shall be terminated in a finite time period (in terms of the number of samples.) Presuming these requirements, we will try to minimize the test time. There seems to be a broad freedom in choosing a set of early criteria. However, it would be a good start point to choose these criteria so that they provide a constant D at each error count m. When the error-count based and discrete distribution approach is presumed, the pdf to be used is a negative binomial distribution, nBi(s: r, m) = nBi(m/R: r, m). Then, equation (1) and (2) will be: (3) (4) Using these equations, Rth_f and Rth_pcan be determined and from the latter, Tdp can also be derived. The problem is how to determine D. The target is clear; we have to get an F of 0.2%, but the population keeps changing in the procedure (some DUT hit either of the criteria and will be removed from the population), so it seems almost impossible to determine D to give a predefined F by an analytical method. So an experimental method should be used to determine D values, which goes like: 1) Pick a D value 2) Calculate Rth_p and Rth_f 3) With a simulation with random generator of Bernoulli distribution of r = R0 and r = R0M, and the criteria above, determine F value. 4) If the resultant F value is not close enough to the target F value (total significance level), start over with step 1) with a slightly different D value. In the experiments that give results shown in this report bisection method was sued to perform this iteration efficiently, anda binomial distribution generator was used as Bernoulli generator. The simulations have been done for a population of 100,000 devices. The resultant criteria for typical parameters are given in the following tables. Table 10‑1: Early Pass/Fail criteria for RRM delay measurements (R0=0.1, F=0.05) m Rth-p Tdp Rth-f 0 `--- 32 --- 1 0.03125000 46 --- 2 0.04347826 57 --- 3 0.05263158 68 0.75000000 4 0.05882353 79 0.50000000 5 0.06329114 89 0.41666667 6 0.06741573 98 0.35294118 7 0.07142857 108 0.30434783 8 0.07407407 117 0.28571429 9 0.07692308 126 0.26470588 10 0.07936508 136 0.25000000 11 0.08088235 144 0.23404255 12 0.08333333 153 0.22641509 13 0.08496732 162 0.21666667 14 0.08641975 171 0.21212121 15 0.08771930 179 0.20547945 16 0.08938547 188 0.20000000 17 0.09042553 197 0.19540230 18 0.09137056 205 0.18947368 19 0.09268293 213 0.18627451 20 0.09389671 222 0.18348624 21 0.09459459 230 0.18103448 22 0.09565217 238 0.17741935 23 0.09663866 247 0.17557252 24 0.09716599 255 0.17266187 25 0.09803922 263 0.17123288 26 0.09885932 271 0.16883117 27 0.09963100 280 0.16666667 28 0.10000000 288 0.16568047 29 0.10069444 296 0.16384181 30 0.10135135 304 0.16216216 31 0.10197368 312 0.16062176 32 0.10256410 320 0.15920398 33 0.10312500 328 0.15789474 34 0.10365854 336 0.15668203 35 0.10416667 344 0.15555556 36 0.10465116 352 0.15450644 37 0.10511364 360 0.15352697 38 0.10555556 368 0.15261044 39 0.10597826 376 0.15175097 40 0.10638298 383 0.15094340 41 0.10704961 391 0.15018315 42 0.10741688 399 0.14946619 43 0.10776942 407 0.14878893 44 0.10810811 415 0.14814815 45 0.10843373 423 0.14705882 46 0.10874704 430 0.14649682 47 0.10930233 438 0.14596273 48 0.10958904 446 0.14545455 49 0.10986547 454 0.14454277 50 0.11013216 462 0.14409222 51 0.11038961 469 0.14366197 52 0.11087420 477 0.14285714 53 0.11111111 484 0.14247312 54 0.11134021 492 0.14210526 55 0.11178862 500 0.14138817 56 0.11200000 508 0.14105793 57 0.11220472 516 0.14039409 58 0.11240310 523 0.14009662 59 0.11281071 531 0.13981043 60 0.11299435 539 0.13921114 61 0.11317254 546 0.13895216 62 0.11355311 554 0.13839286 63 0.11371841 561 0.13815789 64 0.11408200 569 0.13763441 65 0.11423550 577 0.13742072 66 0.11438475 584 0.13692946 67 0.11472603 592 0.13673469 68 0.11486486 600 0.13627255 69 0.11500000 607 0.13609467 70 0.11532125 615 0.13565891 71 0.11544715 622 0.13523810 72 0.11575563 630 0.13508443 73 0.11587302 637 0.13468635 74 0.11616954 645 0.13454545 75 0.11627907 653 0.13416816 76 0.11638591 660 0.13380282 77 0.11666667 668 0.13368056 78 0.11676647 675 0.13333333 79 0.11703704 683 0.13299663 80 0.11713031 690 0.13289037 81 0.11739130 698 0.13256956 82 0.11747851 705 0.13225806 83 0.11773050 713 0.13216561 84 0.11781206 720 0.13186813 85 0.11805556 728 0.13157895 86 0.11813187 735 0.13149847 87 0.11836735 743 0.13122172 88 0.11843876 750 0.13095238 89 0.11866667 758 0.13088235 90 0.11873351 765 0.13062409 91 0.11895425 773 0.13037249 92 0.11901682 780 0.13012730 93 0.11923077 788 0.13006993 94 0.11928934 795 0.12983425 95 0.11949686 803 0.12960437 96 0.11955168 810 0.12938005 97 0.11975309 818 0.12916112 98 0.11980440 825 0.12911726 99 0.12000000 832 0.12890625 100 0.12019231 840 0.12870013 101 0.12023810 847 0.12849873 102 0.12042503 855 0.12830189 103 0.12046784 862 0.12826899 104 0.12064965 870 0.12807882 105 0.12068966 877 0.12789281 106 0.12086659 884 0.12771084 107 0.12104072 892 0.12753278 108 0.12107623 899 0.12735849 109 0.12124583 907 0.12733645 110 0.12127894 914 0.12716763 111 0.12144420 922 0.12700229 112 0.12147505 929 0.12684032 113 0.12163617 936 0.12668161 114 0.12179487 944 0.12652608 115 0.12182203 951 0.12637363 116 0.12197687 958 0.12622416 117 0.12212944 966 0.12621359 118 0.12215321 973 0.12606838 119 0.12230216 981 0.12592593 120 0.12232416 988 0.12578616 121 0.12246964 995 0.12564901 122 0.12261307 1003 0.12551440 123 0.12263210 1010 0.12538226 124 0.12277228 1017 0.12525253 125 0.12291052 1025 0.12512513 126 0.12292683 1032 0.12500000 127 0.12306202 1039 0.12487709 128 0.12319538 1047 0.12475634 129 0.12320917 1054 0.12475822 130 0.12333966 1062 0.12464046 131 0.12335217 1069 0.12452471 132 0.12347989 1076 0.12441093 133 0.12360595 1084 0.12429907 134 0.12361624 1091 0.12418906 135 0.12373969 1098 0.12408088 136 0.12386157 1106 0.12397448 137 0.12386980 1113 0.12386980 The resultant thresholds (criteria) for BER, BLER and RRM Delay measurements are shown in Figure 10‑1,Figure 10‑2 and Figure 10‑3 respectively. Figure 10‑1: Early Pass/Fail Criteria for BER Measurement (R0= 0.001, F = 0.002) Figure 10‑2: Early Pass/Fail Criteria for BLER Measurement ( R0= 0.01, F = 0.002) Figure 10‑3: Early Pass/Fail for RRM Delay Measurement (R0 = 0.1, F = 0.05)
4131cd5fefdadf4075e3ec0993ed8fe4
34.901
10.3 Estimating the test time
The final goal of this report is to reduce the total test time, so each set of criteria should be rated by estimating its test time. This task is fairly simple, and can be done using almost the same simulation program used in the previous section. The sample number at which the measurement is terminated is recorded and averaged to give the test time of the criteria. The estimation is repeated for various average error rates, r. Some results are shown in Figure 10‑4 through Figure 10‑6. <Figure will be inserted here> Figure 10‑4: Test Time for BLER Measurement (R0 = 0.001, F = 0.002) Figure 10‑5: Test Time for BLER Measurement (R0 = 0.01, F = 0.002) Figure 10‑6: Test Time for RRM Delay Measurement (R0 = 0.1, F = 0.05) In Figure 10‑7, the BLER test time (Figure 10‑5) is compared with a conventional test method, in which no early criteria are not incorporated. Apparently, the required test time is the time to see 200 errors, and the test time is simply given by 200/r. It should be noted that the averaged test time values almost coincide at r = 0.0124, and the early criteria greatly reduce the test time in the areas of r << 0.0124 and of r >> 0.0124. Figure 10‑7: Reduction of the Test Time by Employing Early Criteria
4131cd5fefdadf4075e3ec0993ed8fe4
34.901
10.4 Minimizing the test time
The criteria set in Section 10.2 ("constant D criteria") were chosen in an arbitrary way, and there is no guarantee that that should give the shortest test time. So, to seek the optimized method, some other criteria that are basically a variation of the "constant D criteria" will be proposed and their test time will be estimated in the following subsections.
4131cd5fefdadf4075e3ec0993ed8fe4
34.901
10.4.1 Truncation
As a matter of fact, while the simple test is terminated at m = 200 (F = 0.2%), the cross point of the criteria is located at m = 374 for the "constant D criteria." Moreover, only few DUTs survive till later stages. So, it seems to be a good idea truncating the procedure at a little earlier stage. This means that Rth_p and Rth_f should be to 1.24 R0 at an m value between 200 and 374 in the criteria table. The change is simple, but has an impact on F, so we have to re-evaluate D. The results are shown in Figure 10‑8, which shows no significant improvement in the test time, while the (rare) maximum test time of 1000 samples were reduced to 700 as shown in Figure 10‑9. In the figure, the red solid line shows the average test time as a reference. Figure 10‑8: Test Time by Truncated Early Criteria (R0 = 0.1, F = 0.05) Figure 10‑9: Maxim Test Time by Truncated Early Criteria (R0 = 0.1, F = 0.05)
4131cd5fefdadf4075e3ec0993ed8fe4
34.901
10.4.2 Decimation
If the simple tests (comparisons) were done at a smaller number of m, that would result in a smaller F value. In other words, a larger D value can be employed for a certain F value, this can mean a reduced test time since the criteria curve with a higher D value will be located at more left hand side. The real expected advantages are that such method can be presented by a much shorter table and that it may reduce the requirement for calculation. The resultant test time values for the criteria with every m, and one with every 10 m points are shown in Figure 10‑10. Apparently, the decimation didn’t improve the test time. Figure 10‑10: Test time of 1:10 Decimated Criteria (R0 = 0.1, F = 0.05)
4131cd5fefdadf4075e3ec0993ed8fe4
34.901
10.4.3 Composite criteria
The results of the simulation stated above show that almost all the devices are picked out at relatively early stages, and only few reach later stages. This observation would lead to the idea that the test time could be reduced if stricter criteria at the later stages. Suppose that each threshold in a criterion, Rth-fix(m) / Rth_var(m), have individual significance levels, Dfix / Dvar, respectively. A new criteria, Rth_com(m), can be built by merging these two criteria like, That is, the composite threshold, Rth-com, is a weighted average of Rth-fix and Rth-var. Where mmax corresponds to the cross point of pass/fail criteria of Rth-fix , and Dfix > Dvar. The experimental method to find D value witch meets the requirement for F was introduced in Section 10.2, and it can be easily modified to find Dvar for a fixed Dfix. The resultant D values are listed in Table 10‑2. Table 10‑2: Combinations of D values to give F = 0.05 (R0 = 0.1) Dfix Dvar mmax Comment --- 0.005125 143 Reference 0.01 0.00425 118 0.02 0.00250 92 0.03 0.001125 77 Using these criteria, the test time was evaluated, and the results are shown in Figure 10‑11. In comparison with the reference ("Constant D" criteria), the composite criteria give a slightly shorter test time in the worst case (r = 1.24 R0), but these give a longer test time for r < R0. Figure 10‑11: Test time for composite test criteria
4131cd5fefdadf4075e3ec0993ed8fe4
34.901
11 Accuracy of Continuous Distributions
As stated in clause 9.2, the negative binomial distributions can be approximated by m-Erlang distribution. In this Appendix, we will discuss about how good this approximation is. For continuous distributions, Equation (1’) and (2’) determine early Pass/Fail thresholds, and these can be transformed to more specific forms shown below by presuming m-Erlang distribution. There is no explicit way to know Rth from D , but is a continuous function, so Newton method can be employed to find Rth . The Early Pass/Fail criteria obtained this way are compared with those from negative binomial distributions in Figure 11‑1 through Figure 11‑3. For the first two cases (Figure 11‑1and Figure 11‑2), the two approaches show a good agreement. However, in Figure 11‑3, there is a significant difference between them. This difference results in a significant difference in the test time as shown in Figure 11‑4. The difference is largest for a marginal UEs (r ~ 0.124). Figure 11‑1: Comparison of Early Pass/Fail Criteria for BER Measurement (R0 = 0.001, F = 0.002) Figure 11‑2: Comparison of Early Pass/Fail Criteria for BLER Measurement (R0 = 0.01, F = 0.01) Figure 11‑3: Comparison of Early Pass/Fail Criteria for RRM Delay Measurement (R0 = 0.1, F = 0.05) Figure 11‑4: Comparison of Test Time (R0 = 0.1, F = 0.05) Annex A: Change history T Meeting Doc-1st-Level CR Rev Subject Cat Version-Current Version-New Doc-2nd-Level TP-20 Approval of the report 2.0.1 3.0.0
d832899f12f9cb7303ee0f37d0629dd2
36.276
1 Scope
The present document provides an overview and overall description of the LTE-based 5G terrestrial broadcast comprising: - a service delivering Free To Air content [2]; - a radio network comprising only MBMS-dedicated cells or FeMBMS/Unicast-mixed cells [3] as transmitters; and - Receive Only Mode (ROM) devices and UEs supporting FeMBMS [4] as receivers. Details of the radio interface protocols and procedures are specified in companion specifications of the 36 series. This document is a 'living' document, i.e. it is permanently updated and presented to TSG-RAN meetings.
d832899f12f9cb7303ee0f37d0629dd2
36.276
2 References
The following documents contain provisions which, through reference in this text, constitute provisions of the present document. - References are either specific (identified by date of publication, edition number, version number, etc.) or non‑specific. - For a specific reference, subsequent revisions do not apply. - For a non-specific reference, the latest version applies. In the case of a reference to a 3GPP document (including a GSM document), a non-specific reference implicitly refers to the latest version of that document in the same Release as the present document. [1] 3GPP TR 21.905: "Vocabulary for 3GPP Specifications". [2] 3GPP TS 22.101: "Service aspects; Service principles". [3] 3GPP TS 36.300: "Evolved Universal Terrestrial Radio Access (E-UTRA) and Evolved Universal Terrestrial Radio Access Network (E-UTRAN)". [4] 3GPP TS 23.246: "Multimedia Broadcast/Multicast Service (MBMS); Architecture and functional description". [5] 3GPP TS 26.346: "Multimedia Broadcast/Multicast Service (MBMS); Protocols and codecs". [6] 3GPP TS 36.331: "Radio Resource Control (RRC) Protocol". [7] 3GPP TS 24.116: "Stage 3 aspects of system architecture enhancements for TV services". [8] 3GPP TS 36.211: "E-UTRA; Physical Channels and Modulation". [9] 3GPP TR 36.776: " Study on LTE-based 5G terrestrial broadcast". [10] 3GPP TR 38.913: "Study on scenarios and requirements for next generation access technologies". [11] 3GPP TR 36.440: " General aspects and principles for interfaces supporting Multimedia Broadcast Multicast Service (MBMS) within E-UTRAN". [12] 3GPP TS 24.117: "TV service configuration Management Object (MO)". [13] 3GPP TS 36.213: "E-UTRA; Physical layer procedures". [14] 3GPP TS 36.304: "E-UTRA; Procedures in idle mode". [15] 3GPP TS 36.133: "E-UTRA; Requirements for support of radio resource management". [16] 3GPP TS 36.321: "E-UTRA; MAC protocol specification".
d832899f12f9cb7303ee0f37d0629dd2
36.276
3 Definitions, symbols and abbreviations
d832899f12f9cb7303ee0f37d0629dd2
36.276
3.1 Definitions
For the purposes of the present document, the terms and definitions given in 3GPP TR 21.905 [1] and the following apply. A term defined in the present document takes precedence over the definition of the same term, if any, in 3GPP TR 21.905 [1].
d832899f12f9cb7303ee0f37d0629dd2
36.276
3.2 Symbols
For the purposes of the present document, the following symbols apply: <symbol> <Explanation>
d832899f12f9cb7303ee0f37d0629dd2
36.276
3.3 Abbreviations
For the purposes of the present document, the abbreviations given in 3GPP TR 21.905 [1] and the following apply. An abbreviation defined in the present document takes precedence over the definition of the same abbreviation, if any, in 3GPP TR 21.905 [1]. DRX Discontinuous reception eMBMS Evolved MBMS FeMBMS Further enhanced MBMS HPHT High power high tower ISD Inter-site distance LPLT Low power low tower MPMT Medium power medium tower NAS Non-access startumstratum MBMS Multimedia Broadcast/Multicast System MBSFN Multicast/Broadcast Single Frequency Network MNO Mobile Network Operator NR New RadioPBCH Physical Broadcast Channel PDSCH Physical Downlink Shared Channel PSS Primary synchronization signal RAT Radio Access TechnologyROM Receive only mode RRC Radio Resource Control RRM Radio resource management SC-PTM Single Cell Point To Multipoint SSS Secondary synchronization signal TV Television
d832899f12f9cb7303ee0f37d0629dd2
36.276
4 Introduction
<Definition of LTE-based 5G broadcast: Dedicated network, ROM devices> <Motivation> <Use cases> <Quick overview of the Rel.14 and Rel.16 work> <Network scenarios: LPLT, MPMT, HPHT> <Receiver types: rooftop, car-mounted,…>
d832899f12f9cb7303ee0f37d0629dd2
36.276
4.1 General
The main aspects of the LTE-based 5G terrestrial broadcast described in this specification are: - radio network comprising only MBMS-dedicated cells or FeMBMS/Unicast-mixed cells [3] as transmitters; and - ROM devices and UEs supporting FeMBMS [4] as receivers. NOTE: ROM devices support only ROM service [5]. ROM service uses one of the reserved TMGI values [7]. MBMS-dedicated cells support only MBMS transmission and do not support uplink transmission. MBSFN subframes of a MBMS-dedicated cell does not have control region and can therefore be 100% allocated to MBMS. Non-MBSFN subframes, also called Cell Acquisition Subframes (CAS), which have the control region, are used for transmission of the system acquisition signals (PSS/SSS), PDCCH, and system information on PBCH and PDSCH. CAS are transmitted with periodicity of 40ms and use subframes with f = 15 kHz. PBCH of a MBMS-dedicated cell uses a different scrambling sequence initialization than PBCH of a non-MBMS-dedicated cell, which prevents UEs not supporting MBMS-dedicated cell from camping on it. For more information about MBMS-dedicated cell see 3GPP TS 36.300 [3]. ROM devices support MBMS transmission but do not support uplink transmission. ROM devices may not have USIM. As such, ROM devices do not support two-way signalling procedures with the network, including connection establishment procedures and security procedures. ROM devices only support the idle mode. Not all idle mode procedures are supported, as described in subclause 7.3. For more details on ROM devices see clause 7, 3GPP TS 36.300 [3] subclause 15.11, 3GPP TS 23.246 [4] Annex D and 3GPP TS 24.116 [7] clause 4. NOTE 1: As a matter of implementation, a cellular device can host a ROM device and a traditional UE capable of unicast. Such device is further described in 3GPP TS 36.246 [4] Annex E and called ROM device with independent unicast. The co-hosted UE is connected to a different cell from the MBMS-dedicated cell serving the co-hosted ROM device. If the co-hosted UE and ROM device share baseband resources, the co-hosted UE can use MBMSInterestIndication signalling procedure, specified in TS 36.331 [6], to inform the serving RAN about the baseband resources occupied by the co-hosted ROM device and therefore not available for unicast. NOTE 2: There may be awareness at the application layer of the ROM device with independent unicast. How this awareness is created is outside of the scope of specifications.
d832899f12f9cb7303ee0f37d0629dd2
36.276
4.2 Use cases and requirements
In Release 14, the use cases and scenarios for eMBMS services based on LTE have been expanded to include terrestrial broadcasting (the feature also referred to as "EnTV"). This included new requirements: - network dedicated to TV broadcast via eMBMS; - SFN deployments with ISD significantly larger than a typical ISD associated with legacy cellular deployments; - support for ROM device. NOTE: At the upper layers, the requirements included the support for Free to Air service [2] and for eMBMS network sharing [4]. In Release 16, gap analysis documented in TR 36.776 [9] compared the Release 14 LTE terrestrial broadcasting capabilities with the requirements for 5G dedicated broadcast networks in TR 38.913 [10]. As a result of this analysis, the following two requirements were deemed unfulfilled by Release 14 LTE eMBMS: 1. Support for service over large geographic area, including SFN with ISD > 100km; 2. Support for mobility scenarios including speeds of up to 250 km/h. In relation to the first requirement, the new ISD of 125 km, referred to as HPHT network, with omni-directional transmitters was defined. The following two ISD were also included in the evaluation: - 15 km, referred to as LPLT network with sectorized cells; - 50 km, referred to as MPMT network with omni-directional transmitters. The first requirement is associated with receivers with high-gain rooftop directional antennas, low mobility and a predominantly line-of-sight channel. The second requirement is associated with receivers in cars, with external omni-directional antennas. In addition to the above two requirements, a third requirement was added related to improving the CAS reception for both large ISD and high mobility scenarios.
d832899f12f9cb7303ee0f37d0629dd2
36.276
4.3 Enhancements targeting LTE terrestrial broadcast
In Release 14, the following key RAN enhancements were made to the specifications to enable LTE terrestrial broadcast: - MBMS-dedicated cell [3]; - MBSFN subframes using f = 1.25 kHz [8]; - New information blocks on PBCH and PDSCH of CAS [3], [6]: - MIB-MBMS is transmitted with a 40ms periodicity and updated every 160 msMIB-MBMS with a 40ms periodicity, containing resource allocation for SIB1-MBMS on PDSCH; and - SIB1-MBMS is transmitted with an 80ms periodicity and updated every 160 msSIB1-MBMS, with an 80ms periodicity, containing information relevant for receiving MBMS service and, optionally, the scheduling of other system information blocks; - MBMSInterestIndication RRC signalling procedure (see subclause 4.1). NOTE: For upper layer enhancements, see 3GPP TS 23.246 [4] Annex D and E, 3GPP TS 24.116 [7], 3GPP TS 24.117 [12] and 3GPP TS 26.346 [5] (ROM service aspects). In Release 16, the following RAN enhancements were made to address the use cases described in subclause 4.2: - Transmission using f = 0.37 kHz, the cyclic prefix duration of 300µs and the symbol duration of 3ms, for the support of large ISD; - Subframes using f = 2.5 kHz, the cyclic prefix duration of 100µs and the symbol duration of 0.5ms, for the support of high mobility; - PDCCH enhancements: - CFI indication in MIB [6] to avoid the need to decode PCFICH; - New aggregation level 16; and - Repetition of PBCH within the CAS to increase PBCH robustness. Editor’s note: Further Rel.16 enhancements may be added to the list.
d832899f12f9cb7303ee0f37d0629dd2
36.276
5 Architecture
d832899f12f9cb7303ee0f37d0629dd2
36.276
5.1 General
d832899f12f9cb7303ee0f37d0629dd2
36.276
5.2 Network elements
d832899f12f9cb7303ee0f37d0629dd2
36.276
5.3 Interfaces
d832899f12f9cb7303ee0f37d0629dd2
36.276
5.4 Protocol stack
The network architecture for LTE-based 5G terrestrial broadcast is described in 3GPP TS 36.300 [3] subclause 15.1.1, with the exception that only: - ROM reception via MBMS-dedicated cell; or - MBMS reception via FeMBMS/Unicast-mixed cell is supported. RAN interfaces for LTE-based 5G terrestrial broadcast are described in 3GPP TS 36.300 [3] subclause 15.1.1 and in 3GPP TS 36.440 [11]. In case of a MBMS-dedicated cell, the counting procedure is not supported by the eNB. User plane and control plane protocol stack for LTE-based 5G terrestrial broadcast is described in 3GPP TS 36.300 [3] subclause 15.1.2 and subclause 15.1.3, respectively. NOTE: For upper layer architecture, see 3GPP TS 23.246 [4].
d832899f12f9cb7303ee0f37d0629dd2
36.276
6 Protocol aspects
d832899f12f9cb7303ee0f37d0629dd2
36.276
6.1 Physical layerFrame structure and numerologies
d832899f12f9cb7303ee0f37d0629dd2
36.276
6.1.1 Frame structure and numerologies
6.1.2 Channels and signalsOnly frame structure type 1 is supported. All numerologies specified in 3GPP TS 36.211 [8] are supported. For subframes using f other than 0.370 kHz, the frame structure is according to Figure 6.1-1. For transmissions using f = 0.370 kHz, the frame structure is shown in Figure 6.1-2. Figure 6.1-1: Frame structure type 1 for subframes not using f = 0.370 kHz Figure 6.1-2: Frame structure type 1 for transmissions using f = 0.370 kHz
d832899f12f9cb7303ee0f37d0629dd2
36.276
6.2 MBMS Transmission
MBMS transmission is performed according to 3GPP TS 36.300 [3] subclause 15.3.3. MCCH configuration and scheduling is performed according to 3GPP TS 36.300 [3] subclause 15.3.5 and 3GPP TS 36.331 [6] subclause 5.8.1. In case of a MBMS-dedicated cell, the MBMS counting configuration is not supported. MCCH information acquisition is performed according to 3GPP TS 36.300 [3] subclause 15.3.5 and 3GPP TS 36.331 [6] subclause 5.8.2. In case of a MBMS-dedicated cell, only RRC_IDLE is supported.
d832899f12f9cb7303ee0f37d0629dd2
36.276
6.1.3 Physical layer procedures
d832899f12f9cb7303ee0f37d0629dd2
36.276
6.32 MAC Layer
<BCH and MCH aspects only>MAC layer supports only: - BCH reception for BCCH; - DL-SCH reception for BCCH; and - MCH reception for MCCH/MTCH. BCH reception and DL-SCH reception in the MAC layer use transparent MAC [16], i.e. single MAC PDU per TTI with no headers. HARQ entity uses the dedicated broadcast HARQ process, defined in [16]. MCH reception in the MAC layer is specified in 3GPP TS 36.321 [16] subclause 5.12 and in 3GPP TS 36.300 [3] subclause 15.3.3.
d832899f12f9cb7303ee0f37d0629dd2
36.276
6.43 RLC layer
BCCH uses the RLC-TM mode. MTCH and MCCH use the RLC-UM mode. RLC operation for MTCH and MCCH is described in 3GPP TS 36.300 [3] subclause 15.3.3.
d832899f12f9cb7303ee0f37d0629dd2
36.276
6.54 RRC layer
RRC layer supports only: - System information reception (see 3GPP TS 36.331 [6] subclause 5.2) in MBMS-dedicated cell; and - MBMS reception (see 3GPP TS 36.331 [6] subclause 5.8) in MBMS-dedicated cell and in FeMBMS/Unicast-mixed cell. For system information reception, the following applies: - only BCCH-BCH-Message-MBMS and BCCH-DL-SCH-Message-MBMS message class is supported; - acquisition of system information messages is performed according to 3GPP TS 36.331 [6] subclause 5.2.3b. For MBMS reception, the following applies: - MBMS counting procedure and MBMS interest indication procedure are not supported.
d832899f12f9cb7303ee0f37d0629dd2
36.276
6.5 Idle mode
d832899f12f9cb7303ee0f37d0629dd2
36.276
7 ROM aspects
d832899f12f9cb7303ee0f37d0629dd2
36.276
7.1 General
Since a ROM device does not support uplink transmission or two-way signalling procedures, and does not comprise USIM, it cannot support all the physical layer procedures of the conventional UE. By the same token, only a subset of idle mode procedures and RRM requirements applicable to a conventional UE will be supported. The following subsections provide an overview of the physical layer and idle mode procedures and the RRM requirements applicable to a ROM device.