SlideShare ist ein Scribd-Unternehmen logo
1 von 28
DL-SCH/PDSCH
Astrini Kusumawardhani

1
Outline
•
•
•
•

Introduction
DL-SCH and PDSCH Encoding
DL-SCH and PDSCH Decoding
Smoke Test PDSCH

2
Introduction

3
Introduction

Figure 1. The radio interface protocol architecture and the SAPs between different layers.

4
Introduction

Figure 2. Mapping Transport Channel to Physical Channels

Figure 3. Mapping Control Information Channels to Physical Channels

5
DL-SCH and PDSCH
Encoding

6
DL-SCH/PDSCH Encoding Scheme

Figure 4. DL-SCH/PDSCH Processing Scheme

7
Pre-processing before DL-SCH Encoding (1)

1. MAC sends MCS and data to DL-SCH.
Example:
MCS = 1, Data.data = random, Data.size = 100, BW = 10 Mhz.

2. Determine RBG size (based on Table 7.1.6.1-1 [36.213])
BW = 10 MHz
NRB = 50
So, RBG size = 3.

3. Determine RBG bitmap available
N_RBG = NRB / RBG_size = 50 / 3 = 17

4. Determine I_TBS and Qm from MCS (based on Table 7.1.7.1-1 [36.213])
MCS = 1
So, Qm = 2, I_TBS = 1

8
Pre-processing before DL-SCH Encoding (2)

5. Determine N_PRB and TBS, from I_TBS and data.size
I_TBS = 1
Data.size = 100
Find, TBS near 100 then get TBS = 208.
For TBS =208, get N_PRB = 6.

6. Determine allocated RBG
RBG_allocated = N_PRB / RBG_size = 6 / 3 = 2.

7. Determine RBG Bitmap
1000000001000000000000000

RBG allocated

8. Encoding PCFICH (to inform UE about how many symbols the DCI spans in that
subframe) : CFI = 3
9. Encoding PDCCH (to encode DCI that carries information related to
downlink/uplink scheduling assignment )
9
Review Pre-processing
•
•
•
•
•
•
•
•
•

MCS = 1
Data.data = random; Data.size = 100
BW = 10 MHz; NRB = 50
RBG_size = 3
N_RBG = 17
I_TBS = 1; Qm = 2
TBS = 208; N_PRB = 6
RBG_allocated = 2
RBG_bitmap = 1 0 0 0 0 0 0 0 0 1 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0

Figure 5. Pre-processing Result
10
DL-SCH Encoding (1)

1. Add CRC

CRC24A:
B = TBS + CRC = 208 + 24 = 232 bits.

11
DL-SCH Encoding (2)
2. Code Segmentation

For this example:
B = 232
So,
L=0
C+ = 1; K+ = 232
C- = 0; K- = 0

B = 232; Z = 6144
if (B≤Z)
{ L = 0; C = 1; B’ = B}

if (B>Z)
{ L = 24;

if(C==1)
{C+ = 1; K+ = B ;
C- = 0; K- = 0 }

if(C>1)
{C*K+ ≥ B’ ; K- < K+ ;
; C+ = C – (C-) }

; B’ = B + C.L}

12
DL-SCH Encoding (3)
3. Channel Coding – Turbo Coding

Code Rate = input / output = 1/3
Turbo coding consists of:
1. Constituent Encoders
2. QPP Interleaver

= 1* 3 = 3 rows

= 0* 3 = 0 rows

13
DL-SCH Encoding (4)
4. Rate Matching – Turbo Rate Matching

Turbo rate matching steps:
1. Sub-interleaver
2. Bit-collection
3. Bit-Selection
What is desired code-rate?
Input
: 3*col
Output : lte_tch_param.G
Code-rate = input / output

lte_tch_param.G = ???
For this example:

14
DL-SCH Encoding (5)
5. Code Block Concatenation

15
Review DL-SCH Encoding

16
PDSCH Encoding (1)

1. Scrambling
Using pseudo-random sequence generation.
Pattern:
Scrambling initialization is performed in each frame, using :

Total output = 1284 bits.

17
PDSCH Encoding (2)
2. Modulation
QPSK, 16QAM, 64QAM
MCS = 1
Qm = 2

based on Qm.
QPSK

Total output = 642 symbols.

18
PDSCH Encoding (3)
3. Resource Element Mapping

19
Review PDSCH Encoding

20
DL-SCH and PDSCH
Decoding

21
DL-SCH/PDSCH Decoding Scheme

PDSCH

DL-SCH

22
PDSCH Decoding

1.

Resource Element Demapper

2.

Demodulation Mapper
Using Soft-Demodulation, which are bit 0 = negative and bit 1 = positive.

3.

Descrambling

23
Pre-Processing before DL-SCH Decoding
1. MAC sends MCS, RBG bitmap, RBG size, and BW.
MCS = 1; RBG bitmap = 1 0 0 0 0 0 0 0 0 1 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 ;
RBG size = 3; BW = 10 MHz.

2. Calculate N_PRB = RBG_allocated * RBG_size = 2 * 3 = 6.

3. Determine I_TBS and Qm from MCS . Then, get TBS.
I_TBS = 1 and Qm = 2

TBS = 208

4. Determine code-block segmentation

24
DL-SCH Decoding

25
Smoke Test PDSCH

26
Smoke Test PDSCH

Result :

27
References
1.
2.
3.
4.

Standard 3GPP TS 36.211 V9.1.0 (2010-03) – Physical Channels and Modulation.
Standard 3GPP TS 36.212 V9.3.0 (2010-09) – Multiplexing and Channel Coding.
Standard 3GPP TS 36.213 V9.3.0 (2010-09) – Physical Layer Procedures.
Jing Zhu, Haitao Li. (2011). “On The Performance of LTE Physical Downlink Shared Channel”.
International Conference on Computer Science and Network Technology.
5. http://www.steepestascent.com/content/mediaassets/html/LTE/Help/PDSCH.html
6. http://www.sharetechnote.com/html/BasicProcedures_LTE.html

28

Weitere ähnliche Inhalte

Was ist angesagt?

Chroma From Luma Status Update
Chroma From Luma Status UpdateChroma From Luma Status Update
Chroma From Luma Status UpdateLuc Trudeau
 
Presentation of 'Reliable Rate-Optimized Video Multicasting Services over LTE...
Presentation of 'Reliable Rate-Optimized Video Multicasting Services over LTE...Presentation of 'Reliable Rate-Optimized Video Multicasting Services over LTE...
Presentation of 'Reliable Rate-Optimized Video Multicasting Services over LTE...Andrea Tassi
 
IOEfficientParalleMatrixMultiplication_present
IOEfficientParalleMatrixMultiplication_presentIOEfficientParalleMatrixMultiplication_present
IOEfficientParalleMatrixMultiplication_presentShubham Joshi
 
Project seminar ppt_steelcasting
Project seminar ppt_steelcastingProject seminar ppt_steelcasting
Project seminar ppt_steelcastingRudra Narayan Paul
 
Axes Tech
Axes TechAxes Tech
Axes Techncct
 
Accelerate Reed-Solomon coding for Fault-Tolerance in RAID-like system
Accelerate Reed-Solomon coding for Fault-Tolerance in RAID-like systemAccelerate Reed-Solomon coding for Fault-Tolerance in RAID-like system
Accelerate Reed-Solomon coding for Fault-Tolerance in RAID-like systemShuai Yuan
 
Resource element lte explanations!
Resource element lte explanations!Resource element lte explanations!
Resource element lte explanations!Bobir Shomaksudov
 
Exploring Parallel Merging In GPU Based Systems Using CUDA C.
Exploring Parallel Merging In GPU Based Systems Using CUDA C.Exploring Parallel Merging In GPU Based Systems Using CUDA C.
Exploring Parallel Merging In GPU Based Systems Using CUDA C.Rakib Hossain
 
Modul 5 bss parameter
Modul 5   bss parameterModul 5   bss parameter
Modul 5 bss parameterWijaya Kusuma
 
Modul 4 signalling dimensioning
Modul 4   signalling dimensioningModul 4   signalling dimensioning
Modul 4 signalling dimensioningWijaya Kusuma
 
Implementation of Bitcoin Miner on SW and HW
Implementation of Bitcoin Miner on SW and HWImplementation of Bitcoin Miner on SW and HW
Implementation of Bitcoin Miner on SW and HWJoe Jiang
 
National Society of Black Engineers 36th Annual Conference Toronto Presentation
National Society of Black Engineers 36th Annual Conference Toronto PresentationNational Society of Black Engineers 36th Annual Conference Toronto Presentation
National Society of Black Engineers 36th Annual Conference Toronto PresentationMeltin Bell
 

Was ist angesagt? (13)

Chroma From Luma Status Update
Chroma From Luma Status UpdateChroma From Luma Status Update
Chroma From Luma Status Update
 
Presentation of 'Reliable Rate-Optimized Video Multicasting Services over LTE...
Presentation of 'Reliable Rate-Optimized Video Multicasting Services over LTE...Presentation of 'Reliable Rate-Optimized Video Multicasting Services over LTE...
Presentation of 'Reliable Rate-Optimized Video Multicasting Services over LTE...
 
IOEfficientParalleMatrixMultiplication_present
IOEfficientParalleMatrixMultiplication_presentIOEfficientParalleMatrixMultiplication_present
IOEfficientParalleMatrixMultiplication_present
 
Project seminar ppt_steelcasting
Project seminar ppt_steelcastingProject seminar ppt_steelcasting
Project seminar ppt_steelcasting
 
Axes Tech
Axes TechAxes Tech
Axes Tech
 
Accelerate Reed-Solomon coding for Fault-Tolerance in RAID-like system
Accelerate Reed-Solomon coding for Fault-Tolerance in RAID-like systemAccelerate Reed-Solomon coding for Fault-Tolerance in RAID-like system
Accelerate Reed-Solomon coding for Fault-Tolerance in RAID-like system
 
Resource element lte explanations!
Resource element lte explanations!Resource element lte explanations!
Resource element lte explanations!
 
Exploring Parallel Merging In GPU Based Systems Using CUDA C.
Exploring Parallel Merging In GPU Based Systems Using CUDA C.Exploring Parallel Merging In GPU Based Systems Using CUDA C.
Exploring Parallel Merging In GPU Based Systems Using CUDA C.
 
Modul 5 bss parameter
Modul 5   bss parameterModul 5   bss parameter
Modul 5 bss parameter
 
Modul 4 signalling dimensioning
Modul 4   signalling dimensioningModul 4   signalling dimensioning
Modul 4 signalling dimensioning
 
Implementation of Bitcoin Miner on SW and HW
Implementation of Bitcoin Miner on SW and HWImplementation of Bitcoin Miner on SW and HW
Implementation of Bitcoin Miner on SW and HW
 
Stream
StreamStream
Stream
 
National Society of Black Engineers 36th Annual Conference Toronto Presentation
National Society of Black Engineers 36th Annual Conference Toronto PresentationNational Society of Black Engineers 36th Annual Conference Toronto Presentation
National Society of Black Engineers 36th Annual Conference Toronto Presentation
 

Andere mochten auch

A 01-quick-introduction-to-digital-communication-system
A 01-quick-introduction-to-digital-communication-systemA 01-quick-introduction-to-digital-communication-system
A 01-quick-introduction-to-digital-communication-systemPT. Fusi Global Teknologi
 
LTE ADVANCED PPT
LTE ADVANCED PPTLTE ADVANCED PPT
LTE ADVANCED PPTTrinath
 
Chap 2. lte channel structure .eng
Chap 2. lte  channel structure .engChap 2. lte  channel structure .eng
Chap 2. lte channel structure .engsivakumar D
 
Throughput Calculation for LTE TDD and FDD System
Throughput Calculation for  LTE TDD and FDD SystemThroughput Calculation for  LTE TDD and FDD System
Throughput Calculation for LTE TDD and FDD SystemSukhvinder Singh Malik
 
LTE - Long Term Evolution
LTE - Long Term EvolutionLTE - Long Term Evolution
LTE - Long Term EvolutionArief Gunawan
 

Andere mochten auch (10)

Cell Reference Signal and Mapping
Cell Reference Signal and MappingCell Reference Signal and Mapping
Cell Reference Signal and Mapping
 
Carrier Aggregation for LTE-A
Carrier Aggregation for LTE-ACarrier Aggregation for LTE-A
Carrier Aggregation for LTE-A
 
A 01-quick-introduction-to-digital-communication-system
A 01-quick-introduction-to-digital-communication-systemA 01-quick-introduction-to-digital-communication-system
A 01-quick-introduction-to-digital-communication-system
 
lte advanced
lte advancedlte advanced
lte advanced
 
IoT in LTE
IoT in LTEIoT in LTE
IoT in LTE
 
LTE ADVANCED PPT
LTE ADVANCED PPTLTE ADVANCED PPT
LTE ADVANCED PPT
 
LTE Essential Patent Analysis 1Q 2010
LTE Essential Patent Analysis 1Q 2010LTE Essential Patent Analysis 1Q 2010
LTE Essential Patent Analysis 1Q 2010
 
Chap 2. lte channel structure .eng
Chap 2. lte  channel structure .engChap 2. lte  channel structure .eng
Chap 2. lte channel structure .eng
 
Throughput Calculation for LTE TDD and FDD System
Throughput Calculation for  LTE TDD and FDD SystemThroughput Calculation for  LTE TDD and FDD System
Throughput Calculation for LTE TDD and FDD System
 
LTE - Long Term Evolution
LTE - Long Term EvolutionLTE - Long Term Evolution
LTE - Long Term Evolution
 

Ähnlich wie Fusi PDSCH

Performance Improved Multipliers Based on Non-Redundant Radix-4 Signed-Digit ...
Performance Improved Multipliers Based on Non-Redundant Radix-4 Signed-Digit ...Performance Improved Multipliers Based on Non-Redundant Radix-4 Signed-Digit ...
Performance Improved Multipliers Based on Non-Redundant Radix-4 Signed-Digit ...IJMTST Journal
 
2016 03-03 marchand
2016 03-03 marchand2016 03-03 marchand
2016 03-03 marchandSCEE Team
 
Introduction of GPS BPSK-R and BOC
Introduction of GPS BPSK-R and BOCIntroduction of GPS BPSK-R and BOC
Introduction of GPS BPSK-R and BOCPei-Che Chang
 
Design and implementation of qpsk modulator using digital subcarrier
Design and implementation of qpsk modulator using digital subcarrierDesign and implementation of qpsk modulator using digital subcarrier
Design and implementation of qpsk modulator using digital subcarrierGongadi Nagaraju
 
ADF4113 Frequency Synthesizer 驅動程式實作
ADF4113 Frequency Synthesizer 驅動程式實作ADF4113 Frequency Synthesizer 驅動程式實作
ADF4113 Frequency Synthesizer 驅動程式實作Simen Li
 
Iaetsd design and implementation of pseudo random number generator
Iaetsd design and implementation of pseudo random number generatorIaetsd design and implementation of pseudo random number generator
Iaetsd design and implementation of pseudo random number generatorIaetsd Iaetsd
 
Sereial com. ppt
Sereial com. pptSereial com. ppt
Sereial com. pptgaurav5345
 
129966862758614726[1]
129966862758614726[1]129966862758614726[1]
129966862758614726[1]威華 王
 
Minimum-Bandwidth Nyquist-Rate Signaling
Minimum-Bandwidth Nyquist-Rate SignalingMinimum-Bandwidth Nyquist-Rate Signaling
Minimum-Bandwidth Nyquist-Rate SignalingDaeYoung (DY) KIM
 
8051 serial communication
8051 serial communication8051 serial communication
8051 serial communicationcanh phan
 
Performance Evaluation & Design Methodologies for Automated 32 Bit CRC Checki...
Performance Evaluation & Design Methodologies for Automated 32 Bit CRC Checki...Performance Evaluation & Design Methodologies for Automated 32 Bit CRC Checki...
Performance Evaluation & Design Methodologies for Automated 32 Bit CRC Checki...VIT-AP University
 
Sdcch 121130233301-phpapp02
Sdcch 121130233301-phpapp02Sdcch 121130233301-phpapp02
Sdcch 121130233301-phpapp02Rasim Levashov
 
15CSL48 MP&MC manual
15CSL48 MP&MC manual15CSL48 MP&MC manual
15CSL48 MP&MC manualRLJIT
 

Ähnlich wie Fusi PDSCH (20)

ucttirm
ucttirmucttirm
ucttirm
 
Performance Improved Multipliers Based on Non-Redundant Radix-4 Signed-Digit ...
Performance Improved Multipliers Based on Non-Redundant Radix-4 Signed-Digit ...Performance Improved Multipliers Based on Non-Redundant Radix-4 Signed-Digit ...
Performance Improved Multipliers Based on Non-Redundant Radix-4 Signed-Digit ...
 
2016 03-03 marchand
2016 03-03 marchand2016 03-03 marchand
2016 03-03 marchand
 
Introduction of GPS BPSK-R and BOC
Introduction of GPS BPSK-R and BOCIntroduction of GPS BPSK-R and BOC
Introduction of GPS BPSK-R and BOC
 
Design and implementation of qpsk modulator using digital subcarrier
Design and implementation of qpsk modulator using digital subcarrierDesign and implementation of qpsk modulator using digital subcarrier
Design and implementation of qpsk modulator using digital subcarrier
 
ADF4113 Frequency Synthesizer 驅動程式實作
ADF4113 Frequency Synthesizer 驅動程式實作ADF4113 Frequency Synthesizer 驅動程式實作
ADF4113 Frequency Synthesizer 驅動程式實作
 
Iaetsd design and implementation of pseudo random number generator
Iaetsd design and implementation of pseudo random number generatorIaetsd design and implementation of pseudo random number generator
Iaetsd design and implementation of pseudo random number generator
 
Sereial com. ppt
Sereial com. pptSereial com. ppt
Sereial com. ppt
 
Mikroc gps
Mikroc gpsMikroc gps
Mikroc gps
 
129966862758614726[1]
129966862758614726[1]129966862758614726[1]
129966862758614726[1]
 
Lpc 17xx adc
Lpc 17xx adcLpc 17xx adc
Lpc 17xx adc
 
R1 081483
R1 081483R1 081483
R1 081483
 
Minimum-Bandwidth Nyquist-Rate Signaling
Minimum-Bandwidth Nyquist-Rate SignalingMinimum-Bandwidth Nyquist-Rate Signaling
Minimum-Bandwidth Nyquist-Rate Signaling
 
8051 serial communication
8051 serial communication8051 serial communication
8051 serial communication
 
report cs
report csreport cs
report cs
 
Performance Evaluation & Design Methodologies for Automated 32 Bit CRC Checki...
Performance Evaluation & Design Methodologies for Automated 32 Bit CRC Checki...Performance Evaluation & Design Methodologies for Automated 32 Bit CRC Checki...
Performance Evaluation & Design Methodologies for Automated 32 Bit CRC Checki...
 
Sdcch 121130233301-phpapp02
Sdcch 121130233301-phpapp02Sdcch 121130233301-phpapp02
Sdcch 121130233301-phpapp02
 
Dds 2
Dds 2Dds 2
Dds 2
 
Tdm to vo ip 2
Tdm to vo ip 2Tdm to vo ip 2
Tdm to vo ip 2
 
15CSL48 MP&MC manual
15CSL48 MP&MC manual15CSL48 MP&MC manual
15CSL48 MP&MC manual
 

Kürzlich hochgeladen

presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Evaluating the top large language models.pdf
Evaluating the top large language models.pdfEvaluating the top large language models.pdf
Evaluating the top large language models.pdfChristopherTHyatt
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdflior mazor
 

Kürzlich hochgeladen (20)

presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Evaluating the top large language models.pdf
Evaluating the top large language models.pdfEvaluating the top large language models.pdf
Evaluating the top large language models.pdf
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 

Fusi PDSCH

  • 2. Outline • • • • Introduction DL-SCH and PDSCH Encoding DL-SCH and PDSCH Decoding Smoke Test PDSCH 2
  • 4. Introduction Figure 1. The radio interface protocol architecture and the SAPs between different layers. 4
  • 5. Introduction Figure 2. Mapping Transport Channel to Physical Channels Figure 3. Mapping Control Information Channels to Physical Channels 5
  • 7. DL-SCH/PDSCH Encoding Scheme Figure 4. DL-SCH/PDSCH Processing Scheme 7
  • 8. Pre-processing before DL-SCH Encoding (1) 1. MAC sends MCS and data to DL-SCH. Example: MCS = 1, Data.data = random, Data.size = 100, BW = 10 Mhz. 2. Determine RBG size (based on Table 7.1.6.1-1 [36.213]) BW = 10 MHz NRB = 50 So, RBG size = 3. 3. Determine RBG bitmap available N_RBG = NRB / RBG_size = 50 / 3 = 17 4. Determine I_TBS and Qm from MCS (based on Table 7.1.7.1-1 [36.213]) MCS = 1 So, Qm = 2, I_TBS = 1 8
  • 9. Pre-processing before DL-SCH Encoding (2) 5. Determine N_PRB and TBS, from I_TBS and data.size I_TBS = 1 Data.size = 100 Find, TBS near 100 then get TBS = 208. For TBS =208, get N_PRB = 6. 6. Determine allocated RBG RBG_allocated = N_PRB / RBG_size = 6 / 3 = 2. 7. Determine RBG Bitmap 1000000001000000000000000 RBG allocated 8. Encoding PCFICH (to inform UE about how many symbols the DCI spans in that subframe) : CFI = 3 9. Encoding PDCCH (to encode DCI that carries information related to downlink/uplink scheduling assignment ) 9
  • 10. Review Pre-processing • • • • • • • • • MCS = 1 Data.data = random; Data.size = 100 BW = 10 MHz; NRB = 50 RBG_size = 3 N_RBG = 17 I_TBS = 1; Qm = 2 TBS = 208; N_PRB = 6 RBG_allocated = 2 RBG_bitmap = 1 0 0 0 0 0 0 0 0 1 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 Figure 5. Pre-processing Result 10
  • 11. DL-SCH Encoding (1) 1. Add CRC CRC24A: B = TBS + CRC = 208 + 24 = 232 bits. 11
  • 12. DL-SCH Encoding (2) 2. Code Segmentation For this example: B = 232 So, L=0 C+ = 1; K+ = 232 C- = 0; K- = 0 B = 232; Z = 6144 if (B≤Z) { L = 0; C = 1; B’ = B} if (B>Z) { L = 24; if(C==1) {C+ = 1; K+ = B ; C- = 0; K- = 0 } if(C>1) {C*K+ ≥ B’ ; K- < K+ ; ; C+ = C – (C-) } ; B’ = B + C.L} 12
  • 13. DL-SCH Encoding (3) 3. Channel Coding – Turbo Coding Code Rate = input / output = 1/3 Turbo coding consists of: 1. Constituent Encoders 2. QPP Interleaver = 1* 3 = 3 rows = 0* 3 = 0 rows 13
  • 14. DL-SCH Encoding (4) 4. Rate Matching – Turbo Rate Matching Turbo rate matching steps: 1. Sub-interleaver 2. Bit-collection 3. Bit-Selection What is desired code-rate? Input : 3*col Output : lte_tch_param.G Code-rate = input / output lte_tch_param.G = ??? For this example: 14
  • 15. DL-SCH Encoding (5) 5. Code Block Concatenation 15
  • 17. PDSCH Encoding (1) 1. Scrambling Using pseudo-random sequence generation. Pattern: Scrambling initialization is performed in each frame, using : Total output = 1284 bits. 17
  • 18. PDSCH Encoding (2) 2. Modulation QPSK, 16QAM, 64QAM MCS = 1 Qm = 2 based on Qm. QPSK Total output = 642 symbols. 18
  • 19. PDSCH Encoding (3) 3. Resource Element Mapping 19
  • 23. PDSCH Decoding 1. Resource Element Demapper 2. Demodulation Mapper Using Soft-Demodulation, which are bit 0 = negative and bit 1 = positive. 3. Descrambling 23
  • 24. Pre-Processing before DL-SCH Decoding 1. MAC sends MCS, RBG bitmap, RBG size, and BW. MCS = 1; RBG bitmap = 1 0 0 0 0 0 0 0 0 1 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 ; RBG size = 3; BW = 10 MHz. 2. Calculate N_PRB = RBG_allocated * RBG_size = 2 * 3 = 6. 3. Determine I_TBS and Qm from MCS . Then, get TBS. I_TBS = 1 and Qm = 2 TBS = 208 4. Determine code-block segmentation 24
  • 28. References 1. 2. 3. 4. Standard 3GPP TS 36.211 V9.1.0 (2010-03) – Physical Channels and Modulation. Standard 3GPP TS 36.212 V9.3.0 (2010-09) – Multiplexing and Channel Coding. Standard 3GPP TS 36.213 V9.3.0 (2010-09) – Physical Layer Procedures. Jing Zhu, Haitao Li. (2011). “On The Performance of LTE Physical Downlink Shared Channel”. International Conference on Computer Science and Network Technology. 5. http://www.steepestascent.com/content/mediaassets/html/LTE/Help/PDSCH.html 6. http://www.sharetechnote.com/html/BasicProcedures_LTE.html 28

Hinweis der Redaktion

  1. LTE (long-term evolution) was designed primarily for high-speed data services.LTE radio interface is designed based on a layered protocol stack, divided into 4 layer shown in figure 1:Packet Data Convergence Protocol (PDCP)Radio Link Control (RLC)Medium Access Control (MAC)Physical Layer (PHY) = the actual transmission and reception of data in forms of transport blocks.To efficiently support various Quality of Services classes of services, LTE adopts a hierarchical channel structure. There are three different channel types defined in LTE—logical channels (what to transmit), transport channels (how to transmit), and physical channels (actual transmission).Three type of channels:Logical channels : used by the MAC to provide services to the RLCTransport channels :used by the PHY to offer services to the MACPhysical channels : The main function of PHY is the actual transmission and reception of data in forms of transport blocks.
  2. Control Information Channels: DCI, CFI, HI, UCI (uplink).DCI is scheduler. A scheduler is a key element in BS and it assigns the time and frequency resources to different users in the cell. CFI indicates how many symbols DCI spans.Today, we’ll discuss about DL-SCH and PDSCH.DL-SCH used for transmitting the downlink data.PDSCH used to transmit the downlink shared channel (DL-SCH).
  3. Encoding is performed in Base Station (BS).
  4. In SISO (single input single output), layer mapper and precoding steps do almost nothing.
  5. DL-SCH used for transmitting the downlink data.CRC is used for error detection in transport blocks.Transport block is divided by cyclic generator polynomial G-CRC24A to generate 24 parity bits.
  6. Minimum code block size = 40. if less than minimum, add filler bits in the beginning to achieve total 40.Maximum code block size = 6144. if greater than maximum, segment the code block.
  7. Turbo coding = forward error correction and improves channel capacity by adding redundant information.Encoder using Parallel Concatenated Convolutional Code (PDCCC), consist of 1st and 2nd constituent encoder, also Quadratic Permutation Polynomial (QPP).
  8. Rate-matching block creates an output bitstream with a desired code-rate.
  9. Used to transmit the downlink shared channel (DL-SCH).Scrambling created using a length-31 Gold sequence generator and initialized using radio network temporary identifier (n-RNTI), cell ID (n-cellID), slot number (n-s), and codeword index (q = {0,1}). Because of SISO, q = 0.
  10. The modulation mapper takes binary digits, 0 or 1, as input and produces complex-valued modulation symbols, x=I+jQ, as output.QPSK = pair of bits are mapped to one complex-valued modulation symbols.
  11. Decoding is performed in User Equipment (UE).
  12. Demodulation : hard-decision (make firm decision whether one or zero is transmitted) and soft-decision (provides with some side information together with the decision).We use soft-decision demodulation, called viterbi. Tahanterhadap noise.
  13. Integration test to verify the data received in UE based by comparing with data transmitted in BS.