PDA

View Full Version : Download Qualcomm-Guidelines for Deploying & Operating Packet Data Services Over cdma2000 1x



T_ADD
2011-06-13, 07:08 AM
Table of Contents:


1 Introduction........................................................................................ 1-1
1.1 Purpose ................................................................................................................1-1
1.2 Scope ...................................................................................................................1-2
1.3 Organization ........................................................................................................1-2
1.4 Revision history...................................................................................................1-3
1.5 References ...........................................................................................................1-3
1.6 Technical assistance ............................................................................................1-3
1.7 Terms and definitions..........................................................................................1-4
1.8 Recommendations summary ...............................................................................1-6
2 User Experience ................................................................................ 2-1
2.1 Latency ................................................................................................................2-1
2.2 Throughput ..........................................................................................................2-2
2.3 Always-on connectivity.......................................................................................2-2
2.4 Content and applications .....................................................................................2-2
2.5 Voice quality .......................................................................................................2-3
2.6 Other factors affecting user experience...............................................................2-3
2.7 Packet data call....................................................................................................2-3
3 Simultaneous Voice and High-Speed Data Users........................... 3-1
3.1 Fundamentals.......................................................................................................3-1
3.2 Prioritization of voice and data services..............................................................3-1
3.3 Walsh code management.....................................................................................3-2
3.4 Voice and data multiplexing efficiency...............................................................3-5
3.4.1 Voice/data scenarios ...............................................................................3-6
3.5 Recommendations ...............................................................................................3-7
4 Forward Link Air Interface ................................................................ 4-1
4.1 Fundamentals.......................................................................................................4-1
4.1.1 High-speed data channels .......................................................................4-1
4.1.2 Throughput .............................................................................................4-2
4.2 SCH configuration issues ....................................................................................4-4

4.2.1 FER Setpoint .......................................................................................... 4-5
4.2.1.1 Recommendation ................................................................... 4-5
4.2.2 Turbo versus convolutional coding ........................................................ 4-6
4.2.2.1 Recommendation ................................................................... 4-7
4.2.3 RC3 versus RC4..................................................................................... 4-7
4.2.3.1 Recommendation ................................................................... 4-8
4.2.4 F-SCH soft handoff ................................................................................ 4-8
4.2.4.1 Recommendation ................................................................... 4-8
4.2.5 Switching the SCH active set................................................................. 4-9
4.2.5.1 Recommendation ................................................................... 4-9
4.2.6 Latency of SCH assignments ............................................................... 4-10
4.2.6.1 Recommendation ................................................................. 4-12
4.3 SCH assignment policies .................................................................................. 4-12
4.3.1 Individually assigned SCH................................................................... 4-12
4.3.1.1 Option A – infinite duration................................................. 4-13
4.3.1.2 Option B – pseudo-infinite assignment................................ 4-13
4.3.1.3 Option C – pseudo-infinite assignment................................ 4-14
4.3.1.4 Option D – fixed-assignment duration................................. 4-14
4.3.2 Shared SCH.......................................................................................... 4-15
4.3.3 Recommendation.................................................................................. 4-16
4.4 FL packet data scheduler algorithms ................................................................ 4-17
4.4.1 Fundamentals ....................................................................................... 4-17
4.4.2 Round-robin scheduling ....................................................................... 4-17
4.4.3 Maximum C/I scheduling..................................................................... 4-18
4.4.4 Priority scheduling ............................................................................... 4-18
4.4.5 Recommendation.................................................................................. 4-18
4.5 RLP ................................................................................................................... 4-19
4.5.1 Fundamentals ....................................................................................... 4-19
4.5.2 Throughput........................................................................................... 4-19
4.5.3 Handling of undetected physical layer frame errors ............................ 4-21
4.5.4 RLP delayed frame detection ............................................................... 4-24
4.5.5 RLP retransmission timer aging between SCH assignments ............... 4-24
4.5.6 Bypassing the sync exchange with the RLP_BLOB............................ 4-24
4.5.7 Efficient NAK formats......................................................................... 4-25
4.5.8 Recommendation.................................................................................. 4-25
4.6 FFPC ................................................................................................................. 4-26
4.6.1 Coordinating/synchronizing FFPC....................................................... 4-26
4.6.2 FPC modes ........................................................................................... 4-28
4.6.3 Recommendation.................................................................................. 4-28
4.7 Admission control policies ............................................................................... 4-29
4.7.1 Fundamentals ....................................................................................... 4-29
4.7.2 Impact of admission control on FL throughput.................................... 4-29
4.7.3 Recommendation.................................................................................. 4-30

5 Reverse Link Air Interface ................................................................ 5-1
5.1 SCH assignment policies.....................................................................................5-1
5.1.1 Fundamentals..........................................................................................5-1
5.1.2 Recommendation....................................................................................5-2
5.2 ROLPC and RL gain control settings..................................................................5-2
5.2.1 ROLPC ...................................................................................................5-2
5.2.2 RL gain control setting ...........................................................................5-3
5.2.2.1 Recommendations ..................................................................5-3
5.3 SCRM..................................................................................................................5-4
5.3.1 Fundamentals..........................................................................................5-4
5.3.2 Role of REV_SCH_DTX_DURATION.................................................5-4
5.3.3 Retry order as a mechanism to throttle MS SCRMs...............................5-4
5.3.4 Base station response to an SCRM.........................................................5-5
5.3.5 Timing of R-SCH burst assignment .......................................................5-5
5.3.5.1 Efficient ESCAMs..................................................................5-6
5.3.5.2 Minimum start time in ESCAM .............................................5-6
5.3.5.3 Channel assignment delay ......................................................5-6
5.3.6 MSM-specific SCRM implementation details........................................5-7
5.3.6.1 How the requested rate is chosen............................................5-7
5.3.6.2 How the duration is chosen ....................................................5-8
5.3.6.3 Reasons for a mobile to SCRM ..............................................5-8
5.3.6.4 Timing of mobile SCRMs ......................................................5-9
5.3.6.5 Mobile reaction to an R-SCH assignment ..............................5-9
5.3.6.6 Examples ..............................................................................5-10
5.3.7 Recommendation..................................................................................5-13
5.4 P1 vs. P2 operation............................................................................................5-14
5.4.1 Fundamentals........................................................................................5-14
5.4.2 Advantages and drawbacks of P1 operation.........................................5-15
5.4.3 Advantages and drawbacks of P2 operation.........................................5-15
5.4.4 Recommendation..................................................................................5-15
5.5 Reverse Link (RL) admission control ...............................................................5-16
5.5.1 Fundamentals........................................................................................5-16
5.5.2 Recommendation..................................................................................5-17
6 Access Network................................................................................. 6-1
6.1 Dormancy ............................................................................................................6-1
6.1.1 Fundamentals..........................................................................................6-1
6.1.2 PPP state in the PDSN ............................................................................6-1
6.1.3 Dormancy timers ....................................................................................6-2
6.1.3.1 Inactivity timer .......................................................................6-2
6.1.3.2 Slotted timer ...........................................................................6-3
6.1.3.3 Dormant (reorigination) timer ................................................6-3
6.1.4 Packet zone boundaries ..........................................................................6-3
6.1.5 PDSN handoffs .......................................................................................6-3
6.1.6 Recommendations ..................................................................................6-4

6.2 Network monitoring and dimensioning .............................................................. 6-4
6.2.1 Network monitoring fundamentals......................................................... 6-4
6.2.1.1 System monitoring process .................................................... 6-5
6.2.1.2 Usage models ......................................................................... 6-6
6.2.1.3 Element models...................................................................... 6-6
6.2.2 Control and optimization........................................................................ 6-6
6.2.2.1 Dormant mode optimization .................................................. 6-7
6.2.2.2 Average call holding time ...................................................... 6-7
6.2.2.3 Activity factors for data ......................................................... 6-7
6.2.3 Recommendations.................................................................................. 6-8
6.3 Network latency .................................................................................................. 6-8
6.3.1 Fundamentals ......................................................................................... 6-8
6.3.2 Network transmission delay................................................................... 6-9
6.3.2.1 Recommendations.................................................................. 6-9
6.3.3 Call setup delays .................................................................................. 6-10
6.3.3.1 IS-2000 call setup/signaling................................................. 6-10
6.3.3.2 PPP setup.............................................................................. 6-11
6.3.3.3 Recommendations................................................................ 6-11
6.4 Network parameters .......................................................................................... 6-12
6.4.1 TCP/IP parameters ............................................................................... 6-12
6.4.1.1 Fundamentals ....................................................................... 6-12
6.4.1.2 Path MTU discovery ............................................................ 6-12
6.4.1.3 Asymmetric transmissions, header compression ................. 6-12
6.4.1.4 Recommendation ................................................................. 6-13
6.4.2 PPP parameters and negotiation........................................................... 6-13
6.4.2.1 Recommendations................................................................ 6-14
6.5 IP network architecture ..................................................................................... 6-15
6.5.1 Radius/authentication architecture for multiple services ..................... 6-15
6.5.1.1 Recommendations................................................................ 6-15
6.5.2 Supporting IPv4 and IPv6 .................................................................... 6-15
6.5.2.1 Recommendations................................................................ 6-16
7 Summary and Conclusions............................................................... 7-1