<p><span style="FONT-SIZE: 11px;">1 Introduction........................................................................................ 1-1<br/>1.1 Purpose ................................................................................................................1-1<br/>1.2 Scope ...................................................................................................................1-2<br/>1.3 Organization ........................................................................................................1-2<br/>1.4 Revision history...................................................................................................1-3<br/>1.5 References ...........................................................................................................1-3<br/>1.6 Technical assistance ............................................................................................1-3<br/>1.7 Terms and definitions..........................................................................................1-4<br/>1.8 Recommendations summary ...............................................................................1-6<br/>2 User Experience ................................................................................ 2-1<br/>2.1 Latency ................................................................................................................2-1<br/>2.2 Throughput ..........................................................................................................2-2<br/>2.3 Always-on connectivity.......................................................................................2-2<br/>2.4 Content and applications .....................................................................................2-2<br/>2.5 Voice quality .......................................................................................................2-3<br/>2.6 Other factors affecting user experience...............................................................2-3<br/>2.7 Packet data call....................................................................................................2-3<br/>3 Simultaneous Voice and High-Speed Data Users........................... 3-1<br/>3.1 Fundamentals.......................................................................................................3-1<br/>3.2 Prioritization of voice and data services..............................................................3-1<br/>3.3 Walsh code management.....................................................................................3-2<br/>3.4 Voice and data multiplexing efficiency...............................................................3-5<br/>3.4.1 Voice/data scenarios ...............................................................................3-6<br/>3.5 Recommendations ...............................................................................................3-7<br/>4 Forward Link Air Interface ................................................................ 4-1<br/>4.1 Fundamentals.......................................................................................................4-1<br/>4.1.1 High-speed data channels .......................................................................4-1<br/>4.1.2 Throughput .............................................................................................4-2<br/>4.2 SCH configuration issues ....................................................................................4-4<br/>Contents Deploying and Operating Packet Data Services over cdma2000™ 1X<br/>iv QUALCOMM Proprietary 80-V3469-1 X2<br/>4.2.1 FER Setpoint .......................................................................................... 4-5<br/>4.2.1.1 Recommendation ................................................................... 4-5<br/>4.2.2 Turbo versus convolutional coding ........................................................ 4-6<br/>4.2.2.1 Recommendation ................................................................... 4-7<br/>4.2.3 RC3 versus RC4..................................................................................... 4-7<br/>4.2.3.1 Recommendation ................................................................... 4-8<br/>4.2.4 F-SCH soft handoff ................................................................................ 4-8<br/>4.2.4.1 Recommendation ................................................................... 4-8<br/>4.2.5 Switching the SCH active set................................................................. 4-9<br/>4.2.5.1 Recommendation ................................................................... 4-9<br/>4.2.6 Latency of SCH assignments ............................................................... 4-10<br/>4.2.6.1 Recommendation ................................................................. 4-12<br/>4.3 SCH assignment policies .................................................................................. 4-12<br/>4.3.1 Individually assigned SCH................................................................... 4-12<br/>4.3.1.1 Option A – infinite duration................................................. 4-13<br/>4.3.1.2 Option B – pseudo-infinite assignment................................ 4-13<br/>4.3.1.3 Option C – pseudo-infinite assignment................................ 4-14<br/>4.3.1.4 Option D – fixed-assignment duration................................. 4-14<br/>4.3.2 Shared SCH.......................................................................................... 4-15<br/>4.3.3 Recommendation.................................................................................. 4-16<br/>4.4 FL packet data scheduler algorithms ................................................................ 4-17<br/>4.4.1 Fundamentals ....................................................................................... 4-17<br/>4.4.2 Round-robin scheduling ....................................................................... 4-17<br/>4.4.3 Maximum C/I scheduling..................................................................... 4-18<br/>4.4.4 Priority scheduling ............................................................................... 4-18<br/>4.4.5 Recommendation.................................................................................. 4-18<br/>4.5 RLP ................................................................................................................... 4-19<br/>4.5.1 Fundamentals ....................................................................................... 4-19<br/>4.5.2 Throughput........................................................................................... 4-19<br/>4.5.3 Handling of undetected physical layer frame errors ............................ 4-21<br/>4.5.4 RLP delayed frame detection ............................................................... 4-24<br/>4.5.5 RLP retransmission timer aging between SCH assignments ............... 4-24<br/>4.5.6 Bypassing the sync exchange with the RLP_BLOB............................ 4-24<br/>4.5.7 Efficient NAK formats......................................................................... 4-25<br/>4.5.8 Recommendation.................................................................................. 4-25<br/>4.6 FFPC ................................................................................................................. 4-26<br/>4.6.1 Coordinating/synchronizing FFPC....................................................... 4-26<br/>4.6.2 FPC modes ........................................................................................... 4-28<br/>4.6.3 Recommendation.................................................................................. 4-28<br/>4.7 Admission control policies ............................................................................... 4-29<br/>4.7.1 Fundamentals ....................................................................................... 4-29<br/>4.7.2 Impact of admission control on FL throughput.................................... 4-29<br/>4.7.3 Recommendation.................................................................................. 4-30<br/>Deploying and Operating Packet Data Services over cdma2000™ 1X Contents<br/>80-V3469-1 X2 QUALCOMM Proprietary v<br/>5 Reverse Link Air Interface ................................................................ 5-1<br/>5.1 SCH assignment policies.....................................................................................5-1<br/>5.1.1 Fundamentals..........................................................................................5-1<br/>5.1.2 Recommendation....................................................................................5-2<br/>5.2 ROLPC and RL gain control settings..................................................................5-2<br/>5.2.1 ROLPC ...................................................................................................5-2<br/>5.2.2 RL gain control setting ...........................................................................5-3<br/>5.2.2.1 Recommendations ..................................................................5-3<br/>5.3 SCRM..................................................................................................................5-4<br/>5.3.1 Fundamentals..........................................................................................5-4<br/>5.3.2 Role of REV_SCH_DTX_DURATION.................................................5-4<br/>5.3.3 Retry order as a mechanism to throttle MS SCRMs...............................5-4<br/>5.3.4 Base station response to an SCRM.........................................................5-5<br/>5.3.5 Timing of R-SCH burst assignment .......................................................5-5<br/>5.3.5.1 Efficient ESCAMs..................................................................5-6<br/>5.3.5.2 Minimum start time in ESCAM .............................................5-6<br/>5.3.5.3 Channel assignment delay ......................................................5-6<br/>5.3.6 MSM-specific SCRM implementation details........................................5-7<br/>5.3.6.1 How the requested rate is chosen............................................5-7<br/>5.3.6.2 How the duration is chosen ....................................................5-8<br/>5.3.6.3 Reasons for a mobile to SCRM ..............................................5-8<br/>5.3.6.4 Timing of mobile SCRMs ......................................................5-9<br/>5.3.6.5 Mobile reaction to an R-SCH assignment ..............................5-9<br/>5.3.6.6 Examples ..............................................................................5-10<br/>5.3.7 Recommendation..................................................................................5-13<br/>5.4 P1 vs. P2 operation............................................................................................5-14<br/>5.4.1 Fundamentals........................................................................................5-14<br/>5.4.2 Advantages and drawbacks of P1 operation.........................................5-15<br/>5.4.3 Advantages and drawbacks of P2 operation.........................................5-15<br/>5.4.4 Recommendation..................................................................................5-15<br/>5.5 Reverse Link (RL) admission control ...............................................................5-16<br/>5.5.1 Fundamentals........................................................................................5-16<br/>5.5.2 Recommendation..................................................................................5-17<br/>6 Access Network................................................................................. 6-1<br/>6.1 Dormancy ............................................................................................................6-1<br/>6.1.1 Fundamentals..........................................................................................6-1<br/>6.1.2 PPP state in the PDSN ............................................................................6-1<br/>6.1.3 Dormancy timers ....................................................................................6-2<br/>6.1.3.1 Inactivity timer .......................................................................6-2<br/>6.1.3.2 Slotted timer ...........................................................................6-3<br/>6.1.3.3 Dormant (reorigination) timer ................................................6-3<br/>6.1.4 Packet zone boundaries ..........................................................................6-3<br/>6.1.5 PDSN handoffs .......................................................................................6-3<br/>6.1.6 Recommendations ..................................................................................6-4<br/>Contents Deploying and Operating Packet Data Services over cdma2000™ 1X<br/>vi QUALCOMM Proprietary 80-V3469-1 X2<br/>6.2 Network monitoring and dimensioning .............................................................. 6-4<br/>6.2.1 Network monitoring fundamentals......................................................... 6-4<br/>6.2.1.1 System monitoring process .................................................... 6-5<br/>6.2.1.2 Usage models ......................................................................... 6-6<br/>6.2.1.3 Element models...................................................................... 6-6<br/>6.2.2 Control and optimization........................................................................ 6-6<br/>6.2.2.1 Dormant mode optimization .................................................. 6-7<br/>6.2.2.2 Average call holding time ...................................................... 6-7<br/>6.2.2.3 Activity factors for data ......................................................... 6-7<br/>6.2.3 Recommendations.................................................................................. 6-8<br/>6.3 Network latency .................................................................................................. 6-8<br/>6.3.1 Fundamentals ......................................................................................... 6-8<br/>6.3.2 Network transmission delay................................................................... 6-9<br/>6.3.2.1 Recommendations.................................................................. 6-9<br/>6.3.3 Call setup delays .................................................................................. 6-10<br/>6.3.3.1 IS-2000 call setup/signaling................................................. 6-10<br/>6.3.3.2 PPP setup.............................................................................. 6-11<br/>6.3.3.3 Recommendations................................................................ 6-11<br/>6.4 Network parameters .......................................................................................... 6-12<br/>6.4.1 TCP/IP parameters ............................................................................... 6-12<br/>6.4.1.1 Fundamentals ....................................................................... 6-12<br/>6.4.1.2 Path MTU discovery ............................................................ 6-12<br/>6.4.1.3 Asymmetric transmissions, header compression ................. 6-12<br/>6.4.1.4 Recommendation ................................................................. 6-13<br/>6.4.2 PPP parameters and negotiation........................................................... 6-13<br/>6.4.2.1 Recommendations................................................................ 6-14<br/>6.5 IP network architecture ..................................................................................... 6-15<br/>6.5.1 Radius/authentication architecture for multiple services ..................... 6-15<br/>6.5.1.1 Recommendations................................................................ 6-15<br/>6.5.2 Supporting IPv4 and IPv6 .................................................................... 6-15<br/>6.5.2.1 Recommendations................................................................ 6-16<br/>7 Summary and Conclusions............................................................... 7-1<br/>Deploying and Operating Packet Data Services over cdma2000™ 1X Contents<br/>80-V3469-1 X2 QUALCOMM Proprietary vii<br/>Figures<br/>Figure 2–1 Example packet data call ...............................................................................2-4<br/>Figure 2–2 Forward link packet trace of a typical HTTP session....................................2-5<br/>Figure 3–1 Example Walsh code tree usage (RC3) .........................................................3-3<br/>Figure 3–2 Multiplexing voice and data over the same carrier (3 different scenarios) ...3-6<br/>Figure 4–1 Comparison of turbo versus convolutional coding........................................4-6<br/>Figure 4–2 Effect of SCH assignment latency on throughput .......................................4-10<br/>Figure 4–3 Effect of SCH assignment latency on throughput .......................................4-11<br/>Figure 4–4 SCH assignment latency with regular 20 msec signaling messages............4-11<br/>Figure 4–5 SCH Assignment Latency with mini-messages (5 msec<br/>signaling frames)..................................................................................................4-12<br/>Figure 4–6 Delaying decision on RLP reset when L_SEQ < L_V(R) avoids<br/>unnecessary RLP reset .........................................................................................4-21<br/>Figure 4–7 Delaying decision on RLP reset when L_SEQ < L_V(R) confirms<br/>that the transmitter is out of sync .........................................................................4-22<br/>Figure 4–8 Delaying sending a NAK when L_SEQ >> L_V(R) avoids sending a<br/>NAK for frames not yet sent ................................................................................4-23<br/>Figure 4–9 Delaying sending a NAK when L_SEQ >> L_V(R) confirms that a<br/>long sequence of frames were erased...................................................................4-23<br/>Figure 5–1 Minimum timing from an SCRM sent to the mobile encoding the<br/>R-SCH....................................................................................................................5-5<br/>Figure 5–2 SCRM sent, R-SCH received ......................................................................5-10<br/>Figure 5–3 SCRM sent, ESCAM received ....................................................................5-10<br/>Figure 5–4 SCRM sent, ESCAM received with short burst assignment .......................5-11<br/>Figure 5–5 F-SCH rate change ......................................................................................5-11<br/>Figure 5–6 SCRM sent, ESCAM received but with mobile wait ..................................5-12<br/>Figure 5–7 R-SCH event................................................................................................5-12<br/>Figure 5–8 Retry order sent by base station...................................................................5-13<br/>Figure 5–9 P1 vs. P2 operation possibilities ..................................................................5-14<br/>Figure 6–1 System monitoring process diagram..............................................................6-5<br/></span></p><br/>