Professional Documents
Culture Documents
ASSET3g Technical Reference Guide
ASSET3g Technical Reference Guide
Is the information helpful does it answer your question about the program ?
Are there any words that you would like to be put into the index ?
Contents
Appendix A Array Descriptions
Arrays (Simulator)
Pathloss Arrays
Pilot Coverage Arrays
Handover Arrays
Uplink Noise Arrays
Downlink Noise Arrays
Uplink Coverage Arrays
Downlink Coverage Arrays
Coverage Balance Arrays
Soft Blocking Arrays
Hard Blocking Arrays
HSDPA Arrays
All Servers Array
1
3
3
6
7
7
8
9
10
10
11
12
14
15
15
23
27
29
29
39
40
41
42
43
43
44
45
46
47
48
48
49
50
50
50
51
52
FCC Calculations
53
Frequency Calculations
54
Page i
58
58
60
61
61
61
61
62
62
63
64
64
65
65
66
66
66
68
68
69
69
70
72
73
73
74
75
Page ii
CDMA2000 Notation
78
78
80
81
81
81
82
82
83
83
84
85
85
86
86
86
86
87
87
88
88
89
90
91
91
92
93
94
95
96
97
98
99
99
100
101
102
106
106
108
108
109
109
109
109
110
111
111
111
112
112
112
113
Page iii
114
115
115
116
117
118
119
119
119
120
HDR Outline
IP Packet Transmission Time for HDR
IP Packet Queueing Delay for HDR
Throughput for HDR
120
121
122
124
126
Preliminary Tests
126
126
134
134
134
136
References
136
137
138
139
139
139
140
140
Glossary of Terms
Index
Page iv
127
128
129
130
131
APPENDIX A
Array Descriptions
This section describes the different types of array available in ASSET3g. The ranges of
arrays available may vary according to which technology you are using, which
licences you have, and which processes you have chosen to run.
The following types of array are described:
Arrays (Simulator)
For information on creating and displaying arrays, see Using Arrays in the ASSET3g
User Reference Guide.
In This Section
Arrays (Simulator)
Arrays (5.0 Simulator)
2g and 2.5g (Non-Sim) Arrays
Arrays (Simulator)
This is an overview of the arrays generated by the Simulator in ASSET3g.
All these arrays are produced on a per carrier basis.
Most of them have a dependency on terminal type because body loss and terminal
antenna gain are always included in the link budget.
Many of them depend on whether the terminal is considered to be indoor or outdoor.
Indoor arrays use the in-building parameters for the clutter type at each pixel (that is,
indoor loss and indoor shadow fading standard deviation). Indoor terminals are
always taken to be slow moving.
Page 1
Coverage arrays can be displayed even if no snapshots have been run, but you should
note that in these circumstances the arrays represent coverage in an unloaded
network. To obtain coverage arrays for a loaded network, you must run some
snapshots. The key purpose of running snapshots is to provide measures of system
load.
Arrays for coverage tend to have a weak dependence on the number of snapshots run,
and the arrays change little after a relatively small number of snapshots have been
performed (10s of snapshots in most cases). This is because only a small number of
snapshots are needed to get an idea of the average noise rise and average DL traffic
power on each cell.
Arrays for hard or soft blocking probabilities have a strong dependence on the
number of snapshots run. This is because blocking is evaluated by reporting the
proportion of snapshots that would block further connections. For example, if only 1
snapshot has been run, then all blocking probabilities will be either 0% or 100%. If 5
snapshots have been run then all blocking probabilities will belong to the set {0%,
20%, 40%, 60%, 80%, 100%}.
Here is an example of the arrays you can generate on the Map View when using the
Simulator:
Example of the Simulator arrays appearing in the Map View Data Types
Page 2
Pathloss Arrays
DL Loss
Dependencies: Terminal, Carrier, Indoor
The lowest downlink loss. Represents average values and is therefore calculated with
fades of 0dB.
Nth DL Loss
Dependencies: Terminal, Carrier, Indoor
The Nth lowest downlink loss. Represents average values and is therefore calculated
with fades of 0dB.
Page 3
RSCP Coverage OK
Dependencies: Terminal, Carrier, Indoor
This is a thresholded version of the RSCP Coverage Probability array and has just 2
values (Yes/No). It has the advantage of being quicker to calculate than the RSCP
Coverage Probability array. A value of Yes means that the RSCP coverage
probability meets the coverage reliability level specified in the Sim Display Settings
tab of the Array Settings dialog box.
Number of RSCP OK
Dependencies: Terminal, Carrier, Indoor
This is the number of covering cells with a satisfactory RSCP. A cell is counted as
having a satisfactory RSCP if its RSCP coverage probability meets the coverage
reliability level specified in the Sim Display Settings tab of the Array Settings dialog
box.
Pilot Ec/Io & Nth Best Pilot Ec/Io
Dependencies: Terminal, Carrier, Indoor
These are the highest (and Nth highest) Ec/Io values. They represent average values
and are therefore calculated with fades of 0dB.
Pilot Ec/Io Coverage Probability
Dependencies: Terminal, Carrier, Indoor
This is the probability that the Best DL Cell (by RSCP) satisfies the Ec/Io requirement
specified on the terminal type. This probability depends on the standard deviation of
shadow fading for the clutter type at the pixel. If this standard deviation has been set
to zero, then there are only three possible coverage probabilities: 0% if the
requirement is not satisfied, 50% if the requirement is satisfied exactly, and 100% if
the requirement is exceeded.
Pilot Ec/Io Coverage OK
Dependencies: Terminal, Carrier, Indoor
This is a thresholded version of the Pilot Ec/Io Coverage Probability array and has
just 2 values (Yes/No). It has the advantage of being quicker to calculate than the
Pilot Ec/Io Coverage Probability array. A value of Yes means that the pilot Ec/Io
coverage probability meets the coverage reliability level specified in the Sim Display
Settings tab of the Array Settings dialog box.
Page 4
Page 5
Handover Arrays
The aim of the following arrays is to provide the planner with an idea of potential
handover areas, and to indicate areas of pilot pollution. All arrays are based on mean
Pilot Ec/Io levels calculated with fades of 0dB.
Available Soft/Softer Cells
Dependencies: Terminal, Carrier, Indoor
This is the number of suitable HO candidates for the Best DL Cell (by RSCP). If the
Ec/Io level of the best DL cell is below the Ec/Io requirement on the terminal type,
then no result is given. Otherwise all the other cells are checked to see if their pilot
Ec/Io levels make them suitable HO candidates.
Available Soft Cells
Dependencies: Terminal, Carrier, Indoor
This is the number of suitable soft HO candidates for the Best DL Cell (by RSCP). If
the Ec/Io level of the best DL cell is below the Ec/Io requirement on the terminal
type, then no result is given. Otherwise all the other cells (on different sites to the best
cell) are checked to see if their pilot Ec/Io levels make them suitable HO candidates.
Available Softer Cells
Dependencies: Terminal, Carrier, Indoor
This is the number of suitable softer HO candidates for the Best DL Cell (by RSCP). If
the Ec/Io level of the best DL cell is below the Ec/Io requirement on the terminal
type, then no result is given. Otherwise all the other cells (on the same site as the best
cell) are checked to see if their pilot Ec/Io levels make them suitable HO candidates.
Active Set Size
Dependencies: Terminal, Carrier, Indoor
This is the potential size of the active set. It is related to the Available Soft/Softer Cells
array by: Active Set Size = min (1 + Available Soft/Softer Cells, Max Active Set Size).
Pilot Polluters
Dependencies: Terminal, Carrier, Indoor
If the Pilot Pollution Threshold specified in the Simulation Wizard is XdB then:
For UMTS, the number of pilot polluters at a location is the number of cells that are
not in the active set, but provide an Ec/Io level within XdB of the best Ec/Io in the
active set. Therefore the pilot pollution threshold in UMTS is a relative quantity.
A typical threshold value for UMTS is 6dB.
For CDMA2000, the number of pilot polluters at a location is the number of cells that
are not in the active set, but provide an Ec/Io level higher than XdB. Therefore the
pilot pollution threshold in CDMA2000 is an absolute quantity.
A typical threshold value for CDMA2000 is -15dB.
Page 6
Page 7
Page 8
Page 9
Page 10
Page 11
HSDPA Arrays
HSDPA - Best DL Cell by SINR
Dependencies: Carrier
This is the cell that provides the highest SINR level for the terminal.
HSDPA - SINR
Dependencies: Terminal, Carrier, Indoor
This is the highest SINR level. It represents an average value and is therefore
calculated with fades of 0dB.
HSDPA - DL Eb/No Margin
Dependencies: Terminal, Carrier, Indoor, Service, HSDPA Bearer, Speed
This is the extent to which the Eb/No requirement of the HSDPA bearer is exceeded.
The cell of interest is chosen by examining the SINR levels of cells that support the
HSDPA bearer, and choosing the cell with the largest level.
HSDPA - DL Coverage Probability
Dependencies: Terminal, Carrier, Indoor, Service, HSDPA Bearer, Speed
This is the probability of satisfying the Eb/No requirement of the HSDPA bearer. The
cell of interest is chosen by examining the SINR levels of cells that support the
HSDPA bearer, and choosing the cell with the largest level. The probability depends
on the standard deviation of shadow fading for the clutter type at the pixel. If this
standard deviation has been set to zero, then there are only three possible coverage
probabilities: 0% if the requirement is not satisfied, 50% if the requirement is satisfied
exactly, and 100% if the requirement is exceeded.
HSDPA - DL Coverage Probability OK
Dependencies: Terminal, Carrier, Indoor, Service, HSDPA Bearer, Speed
This is a thresholded version of the HSDPA - DL Coverage Probability array and has
just 2 values (Yes/No). It has the advantage of being quicker to calculate than the
HSDPA - DL Coverage Probability array. A value of Yes means that the coverage
probability meets the coverage reliability level specified in the Sim Display Settings
tab of the Array Settings dialog box.
HSDPA - Achievable DL Bearer
Dependencies: Terminal, Carrier, Indoor, Service, Speed
The purpose of this array is to provide a composite coverage plot for the HSDPA
bearers of a service. The array shows the highest priority HSDPA bearer with
acceptable coverage. i.e. with HSDPA - DL Coverage Probability meeting the
coverage reliability level specified in the Sim Display Settings tab of the Array
Settings dialog box.
Page 12
Page 13
Best Servers by Pilot Strength (according to the threshold set in the Array Settings
dialog box). This will work even if you have not yet run any snapshots because it
relates to the power in the cell and path loss, not to any simulation results.
Best Servers by Ec/Io. This requires snapshots to have been run because it relates
to attempted connections. Lines are only drawn if a terminal has been served on
that pixel.
Page 14
3g Service Arrays
3g Carrier Arrays
GSM Arrays
Example of the Service Arrays under the Simulator heading in the Data Types list
As with all the arrays, you can change the display properties by double-clicking the
array in the list of Data Types. For this array, you can set up colours and percentage
categories to display different coverage probabilities.
Page 15
Enter the number of the server array you want displayed on the map. This number
must be less than or equal to the number of covering cells that you have specified
during the set-up of the 5.0 Simulator wizard.
Cell
32A
32A
34A
36B
35B
32A
32A
35B
36B
10
35B
This would mean that at that pixel, coverage probability for the 1st best server would
be 4/10, or 40% for cell 32A. Coverage probability for the 2nd best server would be
3/10 or 30%, for cell 35B. Coverage probability for the 3rd best server would be 2/10
or 20%, for cell 36B. Coverage probability for the 4th best server would be 1/10 or
10%, for cell 34A. There is no 5th best server in this case.
Page 16
Note : To define the downlink achieved Eb/Io, use the same equation substituting
Eb/No for Eb/Io.
As with all the arrays, you can change the display properties by double-clicking the
item in the list of Data Types.
Background, for example e-mail arrival notification, best effort traffic, 10s
delay < 4s
Page 17
No Server Array
This array (GSM only) displays the areas where there is not enough power for calls to
be transmitted.
When you specify a desired coverage probability for the uplink and downlink, the
array displays the regions in which the desired coverage probability is attained.
The downlink coverage probability is defined as:
You can change the colours for this array in the display properties dialog box. Also in
this dialog box, set thresholds for uplink and downlink coverage probability.
Anything under the thresholds you set will be considered to be a failed link.
Page 18
Page 19
This array will be displayed as the average percentage blocking per service.
This array will be displayed as the average percentage blocking per service.
Page 20
A strictly soft handover means that if there are multiple handover cells for a service
on a terminal, then all of the handovers are soft. If any of the handovers are softer, the
service is deemed to be in softer handover.
Page 21
This array is displayed as the average percentage blocking for this service.
Page 22
Example of the Carrier Arrays under the Simulator heading in the Data Types list
Best Servers by Pilot Strength (according to the threshold set in the Array Settings
dialog box). This will work even if you have not yet run any snapshots because it
relates to the power in the cell and path loss, not to any simulation results.
Best Servers by Ec/Io. This requires snapshots to have been run because it relates
to attempted connections. Lines are only drawn if a terminal has been served on
that pixel.
Page 23
Page 24
Interactive, for example interactive games or www browsing, 250ms delay < 4s
Streaming, for example ftp, audio & video traffic, 4s delay < 10s
Background, for example e-mail arrival notification, best effort traffic, 10s delay
Page 25
Page 26
Example of the GSM Arrays under the Simulator heading in the Data Types list
Best Signal Strength (according to the threshold set in the Array Settings dialog
box). This will work even if you have not yet run any snapshots because it relates
to the power in the cell and path loss, not to any simulation results.
Best Server by C/I. This requires snapshots to have been run because it relates to
attempted connections. Lines are only drawn if a terminal has been served on that
pixel.
Page 27
Page 28
Example of the 2g/2.5g Arrays under the Coverage heading in the Data Types list
Page 29
Page 30
LMU Arrays
Location Measurement Units (LMUs) are used to locate a subscriber and/or their
mobile equipment. LMU arrays can indicate geographically where a mobile station
can be measured by more than three separately located base stations (through
position triangulation).
The mobile can only receive effective signals where:
1
The received signal strength at the mobile station is above the signal strength
threshold that you have set in the Array Settings dialog box.
The total C/I due to inteference from the other cells at the mobile station is above
the C/I threshold that you have set.
MS Measured Cells
ASSET3g then calculates and stores the worst interfering sub-cell, based on a
consideration of every other serving cell entry in the Nth Best Server array for that
pixel.
The calculations in steps 1 and 2 are based on:
Each serving cell entry in the Nth Best Server array, where the signal strength
is equal to or greater than the received signal strength threshold in the Array
Settings dialog box
Each carrier of the serving cell, where the carrier is on a control layer
ASSET3g then post-processes the array to calculate the average C/I for each pixel,
and each serving cell entry in the Nth Best Server array.
Tip : In the Map Information Window (accessed from the View menu in the Map
View), if you hover over a cell, the number of cells that could be measured by the
LMU is displayed for each array that has been calculated.
Page 31
Page 32
To display this on the map, ensure Average Data Rate per Timeslot (GPRS) is selected
in the list of data types to display. The area covered by each GPRS sub-cell is
displayed on the map in the colour corresponding to its average data rate per
timeslot.
When displayed on the map, the array has different colours representing the different
service levels in a kb/s/timeslot. For example:
High (Multimedia)
>12kb/s (Red)
7-12kb/s (Green)
Low (e-mail)
2-7kb/s (Blue)
As with other arrays, you can double-click the item from the Data Types list on the
Map View to change the displayed colours and categories for the array.
EGPRS-enabled cells
Frequency hopping
The EGPRS Data Rate array determines coverage for cells that support EGPRS and
includes the effect of Frequency Hopping and DTX. The array calculates a pixel's
average C/I value, ignoring the signal (C) from non-EGPRS cells but considering
interference for all cells, both EGPRS and non-EGPRS.
Note : If you are taking traffic into account for interference and the 8-PSK traffic mix of
any subcell is greater than zero, ASSET3g assumes that the percentage of the traffic is
8-PSK (which uses less power because of the APD and causes less interference).
When the average C/I value for each pixel has been determined, the array converts it
from a signal to noise ratio to a data rate per timeslot by referring to the Coding
Scheme. For details, see the ASSET3g User Reference Guide.
It works out two of these data rates, one for the best GMSK available, and one for the
best 8-PSK available, and then chooses the one that gives the best overall data rate to
store.
You can specify the cell layer/carrier layer combinations to be considered when
calculating the EGPRS data rate array by selecting the appropriate combinations in
the Interference tab of the Array Settings dialog box.
As with other arrays, you can double-click the item from the Data Types list on the
Map View to change the displayed colours and categories for the array.
Page 33
>12kb/s (Red)
7-12kb/s (Green)
Low (e-mail)
2-7kb/s (Blue)
As with other arrays, you can double-click the item from the Data Types list on the
Map View to change the displayed colours and categories for the array.
Page 34
Interference Arrays
Note : When creating one of the Interference arrays, ASSET3g requires a Best Server
array in memory. If this is not the case, a Best Server array will be automatically
created. However, if you later create subsequent Interference arrays after making
changes to the network, ASSET3g does not automatically create a fresh Best Server
array.
Therefore, in cases where you suspect the Best Server array in memory has become
out of date for any reason, you should explicitly create both the Best Server array and
the required Interference array when running the Array Creation wizard. For
example:
Example of creating Best Server array and required Interference array in the Coverage/Interference wizard
Page 35
Page 36
Page 37
Page 38
APPENDIX B
Description
Co-channel Traffic
Co-channel Area
The area served by cell A that would be affected by interference if A and B were
to be assigned the same carrier.
The area served by cell A that would be affected by interference if A and B were
to be assigned adjacent carriers.
The values for area are obtained by averaging the probability of interference over the
region where A is the best server. The average is taken over all pixels in the
appropriate coverage array.
For traffic, the value to be averaged is the probability of interference x the traffic (in
mE) at that pixel. Thus it is necessary to have a traffic raster available to make this
calculation.
Page 39
Description
Determines the co-channel C/I levels for all of the possible interfering
frequencies that may be used by the MS-BTS connection.
Each pixel presents the worst C/Ic level and frequency.
Determines the adjacent channel C/I levels for all of the possible interfering
frequencies that may be used by the MS-BTS connection.
Each pixel presents the worst C/Ia level and frequency.
Determines the combined co-channel/adjacent channel C/I levels for all of the
possible interfering frequencies that may be used by the MS-BTS connection.
Each pixel presents the worst C/I level and frequency.
Page 40
Field Name
Description
Sums the co-channel C/I levels for all possible interfering frequencies and
presents the average C/Ic level.
Sums the adjacent channel C/I levels for all possible interfering frequencies
and presents the average C/Ia level.
Sums the combined co-channel and adjacent C/I levels for all possible
interfering frequencies and presents the average C/(Ic_Ia) level.
For non-frequency hopping networks sums all of the co-channel C/I levels for
an interfering frequency.
Each pixel presents the total C/I level, server and interfering sub-cells and
interfering frequency.
For non-frequency hopping networks sums all of the adjacent channel C/I
levels for an interfering frequency.
Each pixel presents the total C/I level, server and interfering sub-cells and
interfering frequency.
Note : The worst connection and the worst interferer calculations are the same in the
case of a non-frequency hopping network.
The Worst Connection Array calculates the C/I per connection, summing over all
interferers, and then selects the connection with the lowest C/I.
The algorithm for this is as follows:
Where:
For each non-hopping carrier fi in the serving sub-cell, C/I(fi) is calculated.
For the hopping frequency group in the serving sub-cell, a single C/I(FH) is
calculated.
Page 41
(2)
Where:
is the averaged C/I for the hopping carriers.
is the number of hopping frequencies.
is the number of non-hopping frequencies.
is frequency Diversity Gain.
is the fractional loading, calculated as follows:
, where
Page 42
, then
If
, then
Where:
For each (non-hopping) carrier f1 in the serving sub-cell, C/I(f1) is calculated.
The worst interferer is calculated as follows:
Where:
For each (non-hopping) carrier fi in the serving sub-cell, C/I(fi) is calculated.
Page 43
Page 44
C/I (dB)
-10
0.5000000000
-9
0.4880000000
-8
0.4650000000
-7
0.4300000000
-6
0.3880000000
-5
0.3500000000
-4
0.3200000000
-3
0.3000000000
-2
0.2700000000
-1
0.2500000000
0.2200000000
0.2000000000
0.1700000000
0.1500000000
0.1200000000
0.1000000000
0.0900000000
0.0780000000
0.0660000000
0.0550000000
10
0.0450000000
11
0.0370000000
12
0.0300000000
13
0.0260000000
14
0.0200000000
15
0.0150000000
16
0.0120000000
17
0.0080000000
18
0.0060000000
19
0.0040000000
20
0.0020000000
21
0.0007000000
22
0.0001000000
23
0.0000070000
24
0.0000004000
25
0.0000000100
C/I (dB)
26
0.0000000001
27-45
0.0000000000
1 is used if
, is used if
, 0 is used otherwise
Where:
C/I(i)
SSC(i)
i,j
A particular frequency
SIC(K,i)
Interfering cell
L(K,j)
V(K,j)
f (i)
Page 45
This graph shows the relationship between the Probability of Bit Error and the C/I:
BERAV(serving cell) is calculated as the average BER(i) for all frequencies in the cell:
Where:
x Number of FH frequencies per TRX
mFH
nTRX
Where:
is the number of TRX allocated to the hopping carrier layers
is the number of hopping carriers
Page 46
1 is used if
, is used if
, 0 is used otherwise
P(i) = f(C/I(i))
P(i) is the Probability of interference, and is calculated from the cumulative normal
distribution of combined standard deviation of serving and interfering cell models.
and
PTOT = Average of all P(i) in the cell
This picture shows an example conversion curve:
Page 47
Page 48
Where:
=
The adjacent channel interference caused on allocation i by allocation j (Units: 200*mE or 20,000*km2)
The separation costs (from equipment, neighbours, exceptions or close separations) between
allocations i and j
The handover count and intermodulation interference costs associated with allocation i
Where:
are sub-cells
and
and
is the C/I or C/A separation count for all TRX combinations on subcells
Page 49
The number of TRX required is determined using the Channel to Transceiver Map by
increasing the number of TRX from 1 until the maps
and
) traffic load (
):
) can then be
and the
Where:
is total shared traffic channels required
is average (long term) number of TS required for Circuit Switched traffic (=
is average (long term) number of TS required for HSCSD traffic (=
)
)
Page 50
) the
HSCSD Blocking
Blocking is calculated from Erlang B or C using the number of HSCSD TS currently
allocated to the cell and the HSCSD load in timeslot Erlangs.
= HSCSD traffic load
=timeslots allocated to CS
= number of CS timeslots that may be allocated to HSCSD
Erl = Erlang B or C functions returning blocking given traffic and channels
Summary blocking is the average of the four separate blocking values weighted by
the known distribution.
Page 51
Where:
e
Page 52
FCC Calculations
This section describes the algorithms used to calculate the data provided in the FCC
report.
Antenna Height AAT
The Antenna Height AAT is calculated in metres.
The calculation is:
Antenna height + Site ground height + Radial average terrain elevation
The Radial average terrain elevation is the average ground height mapped along a
radial of between 3 km and 16 km from the site. If the mapping data prevent this then
it will not be calculated and this will be flagged in the FCC report.
Note : Feature height data and clutter heights are ignored in the calculation.
The best available resolution of the map data is used for this calculation. If the best
map data is 1000 m resolution then you will receive a warning noting that the map
data is of insufficient resolution for the FCC form.
Used Antenna Height
The Used Antenna Height AAT (metre) is subject to some minimum values according
to the FCC category and, the ERP.
Category
Minimum
32dBu Served
N/A
Minimum of 30 metres
32dBu Unserved
ERP>=10 W
Minimum of 30 metres
ERP<=10 W
Minimum of 3 metres
N/A
Minimum of 8 metres
Gulf of Mexico
Note : You will receive a warning if the Average Radial distance exceeds 40.2 km (79.1
km for Gulf of Mexico cells).
Transmitting ERP Watts
The transmitting ERP for a cardinal radial is the radiated power in Watts taking into
account the antenna gain for the azimuth, the down tilt and the base station
powers/losses.
Note : You will receive a warning if the ERP exceeds 500W.
Used ERPS
This is the value of the transmitting ERP which is used in the calculations, it is the
Transmitting ERP subject to certain minima.
Used ERP is the maximum of:
0.1 W
Maximum ERP/500
Page 53
32dBu Served
and
32 dBu Unserved
Gulf of Mexico
Frequency Calculations
Two frequency calculations are used when you create a Frequency Plan report.
Effective Frequency Re-use
The effective frequency re-use is an approximate indication of the quality of the
hopping network.
It can be calculated for each subcell and also the average of these calculated to give a
figure for the network as a whole.
Where:
REFF is the Effective Frequency Re-use for a subcell
NF is the total number of carriers available to hopping TRX on the subcell (note: this is
not the MA list length)
NTRX is the number of hopping TRX on the subcell
Page 54
Frequency Load
The average frequency load is another approximate indication of the quality of the
hopping network.
It can be calculated for each subcell and also the average of these calculated to give a
figure for the network as a whole.
Where:
LFREQ is the Frequency Load of a subcell
LFRACTION is the Fractional Load of a subcell
LHW is the Hardware Load of a subcell
NTRX is the number of hopping TRX on the subcell
NMA is the MA list length (i.e. all carriers assigned to hopping carrier layers on the
subcell)
E is the traffic that could be carried by the timeslots of hopping TRX on the subcell, at
a user specified Grade of Service (GoS), i.e.
NCSTS is the total number of timeslots installed this value is derived from the Carrier
to Timeslot map using NTRX.
Page 55
Page 56
APPENDIX C
UMTS Algorithms
In This Section
Notation for UMTS
List of Principal Symbols for UMTS
UMTS Basic Formulae
UMTS Uplink Noise Rise
UMTS Uplink Load
UMTS Frequency Re-Use Efficiency
UMTS Air Interface and User Bitrates
UMTS Shadow Fade Modelling
UMTS Power Control Error Modelling
UMTS Service Activity Modelling
UMTS Activity Factor Calculation For Packet Services (Web Model)
UMTS Transmit/Receive Diversity Modelling
UMTS Terminal Speed Modelling
UMTS Overview of a Snapshot
UMTS Scenario Prioritisation
UMTS Connection Evaluation
UMTS Blocking Probability
Note : The UMTS algorithms in this section are relevant to both the 5.0 and the 5.1
Simulator. However, this section does not include HSDPA and OTSR algorithms
(which are supported in the 5.1 Simulator only).
If you are registered for a customer web account, you can access our Knowledgebase
on the Support website. This contains a specialised document named UMTS Static
Simulations 5.1, which provides details of all the algorithms and outputs related to the
5.1 Simulator.
Page 57
( E b N o ) Kj
Page 58
Symbol
Description
A , A
Uplink (downlink) adjacent carrier interference ratio. Gives fractional power leakage from
carrier
to carrier .
( E b N o ) Jj
Uplink
E b No
( E b N o ) Jj
Downlink
( E c I o ) Jj
Pilot
G j G j
G antenna
J
G antenna
j
G mha
J
Boltzmann constant
E b No
E c Io
Symbol
Description
Lmha
J
LJj LJj
Lpathloss
Jj
Lantenna
Jj
Lcable
J
Lbody
j
N thermal
j
N thermal
J
Pj
Terminal TX power
Ppilot
J
Pcommon
J
Psync
J
Ptraffic
Jj
Ptotal
J
R total
j
R total
J
(SIR ) Jj
Pilot SIR
Temperature
Chip rate
mha
J
Page 59
Symbol
Description
cable
J
Lcable
J
)
(1)
(2)
(3)
(4)
(5)
(6)
(7)
(8)
(9)
(10)
(11)
Page 60
(12)
This is expressed in dB in the Cell Uplink Report.
(13)
This is expressed as a percentage in the Cell Uplink Report.
(14)
This is expressed as a percentage in the Cell Uplink Report.
G j G j
,
The User Bitrate is used purely to calculate traffic (data throughput) on a cell.
Page 61
For each terminal in a snapshot, a set of correlated fades to cells is generated using the
following procedure.
Note : All the random numbers mentioned below are independent and normally
distributed with zero mean and unit variance.
1
where is the standard deviation of the shadow fading at the pixel (in dB).
The above procedure is performed whenever a terminal is initialised at the beginning
of a snapshot. Fades for different terminals are uncorrelated, even if the terminals are
located in the same pixel.
Page 62
The standard deviation of power control error parameter controls the distribution of
achieved E b No values for successfully served terminals. If the standard deviation is
set to zero, the E b No values for each successfully served terminal are achieved
perfectly (ignoring quantisation and any lower limit on the link power). In a real
system this is not the case since imperfect power control produces a (log-normal)
distribution of achieved E b No values at a cell.
The simulator models imperfect power control by including a log-normal error on the
uplink and downlink transmit powers of successfully served terminals. The errors on
the uplink and downlink are uncorrelated, and are applied after all other handover
gains and margins have been considered. Terminals are never considered as having
failed to make a connection if the resulting error makes them transmit at too high or
too low a power.
Ptotal
= + Ppilot
+ Pcommon
+ Psync
+ j + j Ptraffic
J
J
J
J
Jj
j
(9)
(10)
(11)
all have a dependence on
ASSET3g Technical Reference Guide
Version 5.1
or
.
Page 63
Where:
= Average packet time period (s)
= Size of a Packet (bytes)
= the Max Bit Rate the particular service supports (bit/s)
= Average session time period (s)
= Number of packet calls per session
= Reading time between packet calls (s)
= Number of packets within a packet call
= Inter arrival time between packets in a packet call (s)
= Retransmission factor (%)
Page 64
),
where is a random number taken from a normal distribution of zero mean and unit
variance.
Gathering of Results
Page 65
UMTS Iterations
An iteration involves sequentially evaluating the terminals (precisely once) to see if
they can make a connection to the network. After each terminal is evaluated, the noise
in the network (at cells and terminals) is updated before moving on to evaluate the
next terminal.
A terminal may connect to the network in a variety of different ways (connection
scenarios). For example a terminal may have several different cells or carriers that it
may use. Each of the connection scenarios for a terminal is evaluated in turn until one
that allows a successful connection is found. If no scenario can produce a successful
connection to the network, the link powers for the terminal are set to zero, and the
reasons for failure of the first scenario are recorded.
Terminals which fail to make a connection in an iteration are not removed from the
simulation, since success or failure in an iteration does not necessarily ensure the
same result in a subsequent iteration. In fact, the state (succeeded/failed) of a terminal
is determined purely by its state in the final iteration of a snapshot when convergence
has been achieved.
Page 66
<4
End of
Iteration 3
Eb/No
<4
Eb/No
Eb/No
End of
Iteration 7
End of
Iteration 5
<4
Eb/No
<4
After the first iteration, the majority of served terminals fail to meet their
requirement. This is because terminals evaluated at the beginning of the first iteration
see little or no interference and so have their TX powers set to low values. By the end
of the first iteration, the noise in the system will have increased due to interference
from the newly served terminals. Hence terminals evaluated at the beginning of the
first iteration will no longer attain their desired by the end of the first iteration. In fact,
only the last terminal served is guaranteed to achieve its desired.
Successive iterations produce increasingly accurate pictures of network noise, and a
larger proportion of the terminals meet their requirement. By the seventh iteration in
the example above, practically all the served terminals meet their requirement, and
the system noise no longer changes significantly between iterations. The iterations
have converged to produce a plausible picture of served and failed terminals in the
network. Any remaining distribution in the achieved values of served terminals is
largely due to quantisation of link powers, or from specifying a non-zero power
control error standard deviation.
E b No values.
If the percentage change in total uplink and downlink interference changes by an
amount smaller than the specified threshold, for 15 consecutive iterations, then the
iterations are deemed to have converged. The default threshold is a 1% change.
Page 67
Carrier
Carrier load status (overloaded/underloaded). If any covering cell uses the above
carrier and exceeds its load balance threshold, then the carrier load status is set
to overloaded. Otherwise the carrier load status is set to underloaded.
Primary cell
Ec Io of primary cell
UL bearer
DL bearer
The rules for prioritising scenarios during connection evaluation are (in order of
decreasing importance):
Page 68
Uplink evaluation
Downlink evaluation
E c I o levels for
The connection scenario being examined sets the candidate primary cell. This cell is
checked to see if it has a sufficient number of primary resources available, and to see
if it provides an adequate pilot SIR level at the terminal. If these conditions are met,
the cell is flagged as the primary cell of the candidate active set.
The remaining covering cells are evaluated to see if they can be handover cells. Cells
with a low downlink linkloss are checked before cells with a higher downlink
linkloss. A handover cell must have a sufficient number of handover resources
available, and provide an level that is within the handover margin of the level of the
primary cell. Each cell that satisfies these requirements is flagged as a handover cell
of the candidate active set unless the active set size limit specified by the primary cell
has been reached.
Page 69
N o for each
Eb N o values achieved
Check terminal power does not break noise rise limit on any
cells.
For each cell in the candidate active set, the terminal transmit power required to meet
the uplink E b No is calculated. This lowest of these values is then quantised
according to the quantisation level specified for the terminal. We call the resulting
power P
base
base
E b No values on cells in the candidate active set are calculated. The difference
between these two values (in dB), together with the terminal speed, allows the
following quantities to be determined from the tables that you supply in the Services
dialog box.
Page 70
The Power Control Headroom ( H ) is also called shadow fade margin. This is an
overhead on the transmit power a terminal requires to make the uplink. It is a
function of terminal speed, and the overhead is largest for slow moving terminals.
The overhead ensures that the uplink power control is able to compensate for deep
fades at a cell border.
power rise
power rise
= 1.
pch
After all the above quantities have been calculated, the terminal is checked to see if it
has sufficient power to make the uplink. The actual transmit power of the terminal
(
) is given by
(17)
Page 71
The terminal is also checked to see if it will break the noise rise limit on any of the
covering cells. When calculating the interference, the terminal power is taken as
When calculating the interference produced on other cells, the terminal power is
taken as
E b No requirement without breaking a noise rise limit, then the terminal fails to be
is finally given a random (logserved. If the uplink can be successfully achieved,
normal) adjustment to model the effect of imperfect power control.
Iterate
until
Eb/No
achieved
or not
changing
between
iterations
T.
Increase/Decrease
Page 72
The difference between the two best Ec Io values of cells in the candidate active set is
calculated. This figure, together with the terminal speed, determines the downlink
Pixels with high traffic should have more influence on cell blocking probability
than pixels with low traffic.
Pixels in coverage holes should not influence cell blocking probability, even if they
contain high traffic.
A service may use some bearers more frequently than others. Frequently used
bearers should have more influence on the blocking probability than infrequently
used bearers.
Page 73
users per
.
(19)
(20)
Lost Call Cleared: In an LCC system, blocked users do not try again.
(22)
Lost Call Held: In an LCH system, blocked users persistently retry until connected.
(23)
Page 74
This is NOT a blocking probability and it should never be treated as one. The failure
rate can be an order of magnitude lower than both the LCC and LCH blocking
probabilities.
Page 75
Page 76
APPENDIX D
CDMA2000 Algorithms
In This Section
CDMA2000 Notation
List of Principal Symbols for CDMA2000
CDMA2000 Basic Formulae
CDMA2000 Uplink Noise Rise
CDMA2000 Uplink Load
CDMA2000 Frequency Re-Use Efficiency
CDMA2000 Air Interface and User Bitrates
CDMA2000 Shadow Fade Modelling
CDMA2000 Power Control Error Modelling
CDMA2000 Service Activity Modelling
CDMA2000 Activity Factor Calculation For Packet Services (Web Model)
CDMA2000 Transmit/Receive Diversity Modelling
CDMA2000 Terminal Speed Modelling
PN Code Assignment Algorithm for CDMA2000
CDMA2000 Overview of a Snapshot
CDMA2000 Scenario Prioritisation
CDMA2000 Connection Evaluation
Calculation of Equivalent Control Overhead Factors for CDMA2000
CDMA2000 Blocking Probability
CDMA2000 Downlink Evaluation
Note : The CDMA2000 algorithms in this section are relevant to both the 5.0 and the
5.1 Simulator. However, this section does not include all the algorithms which are
supported in the 5.1 Simulator.
If you are registered for a customer web account, you can access our Knowledgebase
on the Support website. This contains a specialised document named CDMA2000
Static Simulations 5.1, which provides details of all the algorithms and outputs related
to the 5.1 Simulator.
Page 77
CDMA2000 Notation
This list describes the notation symbols used in this section:
Eb Nt .
(E
N )
b
t Kj represents the
As an example, the quantity
between terminal j and sector K using carrier .
Description
A , A
Uplink (downlink) adjacent carrier interference ratio. Gives fractional power leakage from
carrier
to carrier .
( E b N t ) Jj
Uplink
Eb Nt
( E b N t ) Jj
Downlink
( E c I o ) Jj
Pilot
G j G j
G antenna
J
G antenna
j
G mha
J
Boltzmann constant
Eb Nt
E c Io
Page 78
Symbol
Description
Lmha
J
LJj LJj
Lpathloss
Jj
Lantenna
Jj
Lcable
J
Lcombiner
J
Lsplitter
J
Lbody
j
N thermal
j
N thermal
J
N excess
J
Pj
Terminal TX power
Pbroadcast
J
gnment
Pcommonassi
J
rol
Pcommoncont
J
rcontrol
Pcommonpowe
J
ontrol
Pdedicatedc
J
Ppilot
J
Ppaging
J
g
Pquickpagin
J
Psync
J
Ptraffic
Jj
Ptotal
J
R total
j
Page 79
Symbol
Description
R total
J
Temperature
Chip rate
Uplink (downlink) service activity factor
mha
J
cable
J
Lcable
J
)
(2)
(3)
(4)
(5)
(6)
(7)
Page 80
(8)
(9)
(10)
Page 81
G j G j
gain (
bitrate.
The User Bitrate is used purely to calculate traffic (data throughput) on a sector.
For each terminal in a snapshot, a set of correlated fades to sectors is generated using
the following procedure:
Note : All the random numbers mentioned are independent and normally distributed
with zero mean and unit variance.
1
.
.
is then set to
(14)
where
is the standard deviation of the shadow fading at the pixel (in dB).
Page 82
achieved
perfectly (ignoring quantisation and any lower limit on the link power). In a real
system this is not the case since imperfect power control produces a (log-normal)
distribution of achieved
E b N t values at a sector.
The simulator models imperfect power control by including a log-normal error on the
uplink and downlink transmit powers of successfully served terminals. The errors on
the uplink and downlink are uncorrelated, and are applied after all other handoff
gains and margins have been considered. Terminals are never considered as having
failed to make a connection if the resulting error makes them transmit at too high or
too low a power.
Page 83
Calculation of Interference
Equations:
(9)
(10)
and
(11)
or
Where:
= Average packet time period (s)
= Size of a Packet (bytes)
= the Max Bit Rate the particular service supports (bit/s)
= Average session time period (s)
= Number of packet calls per session
= Reading time between packet calls (s)
= Number of packets within a packet call
= Inter arrival time between packets in a packet call (s)
= Retransmission factor (%)
Page 84
E b N t requirement on the
E Nt
downlink (uplink). When defining a service, you must specify two b
(receive) diversity on a sector effectively reduces the
).
)
)
where
is a random number taken from a normal distribution of zero mean and
unit variance.
Page 85
Find the best PN code to assign and then assign it to the sector.
The PN code calculation continues until all sectors have been assigned a PN code.
2.1e+78 if the code is not unique with respect to the neighbouring sectors
-10,000,000 if the code does not clash with neighbouring, nearby or interfering
sectors
100,000 + max interfering power, if the code clashes with nearby or interfering
sectors
Page 86
On a particular pixel, the strongest power is determined for every supported carrier
in turn. The best signal to interference ratio (SIR) is found for each of these strongest
carriers via the equation:
SIR = covering sector power / (interference + covering sector power)
Interference is the noise contribution from overlapping carriers on sectors with the
same PN code as the best carrier. A running total of SIR for all carriers on the sector is
kept along with the number of pixels on which the sectors carriers were the best
server. Quality is calculated as SIR/best server area *100 for each sector.
Gathering of Results
Page 87
CDMA2000 Iterations
An iteration involves sequentially evaluating the terminals (precisely once) to see if
they can make a connection to the network. After each terminal is evaluated, the noise
in the network (at sectors and terminals) is updated before moving on to evaluate the
next terminal.
A terminal may connect to the network in a variety of different ways (connection
scenarios). For example a terminal may have several different sectors or carriers that it
may use. Each of the connection scenarios for a terminal is evaluated in turn until one
that allows a successful connection is found. If no scenario can produce a successful
connection to the network, the link powers for the terminal are set to zero, and the
reasons for failure of the first scenario are recorded.
Terminals that fail to make a connection in an iteration are not removed from the
simulation, since success or failure in an iteration does not necessarily ensure the
same result in a subsequent iteration. In fact, the state (succeeded/failed) of a terminal
is determined purely by its state in the final iteration of a snapshot when convergence
has been achieved.
The following diagram illustrates how a snapshot converges with successive
t values
iterations. Each histogram shows the distribution of achieved uplink b
for successfully served terminals. All terminals are running a service with an uplink
requirement of 6 dB.
End of
Iteration 1
<4
End of
Iteration 3
Eb/No
<4
Page 88
Eb/No
Eb/No
End of
Iteration 7
End of
Iteration 5
<4
Eb/No
<4
After the first iteration, the majority of served terminals fail to meet their
requirement. This is because terminals evaluated at the beginning of the first iteration
see little or no interference and so have their TX powers set to low values. By the end
of the first iteration, the noise in the system will have increased due to interference
from the newly served terminals. Hence terminals evaluated at the beginning of the
first iteration will no longer attain their desired by the end of the first iteration. In
fact, only the last terminal served is guaranteed to achieve its desired .
Successive iterations produce increasingly accurate pictures of network noise, and a
larger proportion of the terminals meet their requirement. By the seventh iteration in
the example above, practically all the served terminals meet their requirement, and
the system noise no longer changes significantly between iterations. The iterations
have converged to produce a plausible picture of served and failed terminals in the
network. Any remaining distribution in the achieved values of served terminals is
largely due to quantisation of link powers, or from specifying a non-zero power
control error standard deviation.
E b N t values.
If the percentage change in total uplink and downlink interference changes by an
amount smaller than the specified threshold, for 15 consecutive iterations, then the
iterations are deemed to have converged. The default threshold is a 1% change.
Page 89
Carrier
Primary sector
Ec Io of primary sector
UL bearer
DL bearer
Required
(HDR only)
The rules for prioritising scenarios during connection evaluation are (in order of
decreasing importance):
Page 90
(HDR only)
Uplink evaluation
Downlink evaluation
Ec I o level for
Ec I o levels for
The connection scenario being examined sets the candidate primary sector. This sector
is checked to see if it has a sufficient number of primary resources available, and to
see if it provides an adequate Ec Io level at the terminal. If these conditions are met,
the sector is flagged as the primary sector of the candidate active set.
Each of the remaining sectors that have a pathloss to the terminal are evaluated to see
if they can be handoff sectors. Sectors with low downlink linkloss are checked before
sectors with a higher downlink linkloss. A handoff sector must have a sufficient
number of handoff resources available, and provide an Ec Io level that is above the
T_DROP level specified on the primary sector. Each sector that satisfies these
requirements is flagged as a handoff sector of the candidate active set unless the
active set size limit specified by the primary sector has been reached.
Page 91
N t for each
Eb N t values achieved
Check terminal power does not break noise rise limit on any
sectors.
For each sector in the candidate active set, the terminal transmit power required to
power
E b N t values on sectors in the candidate active set are calculated. The difference
between these two values (in dB), together with the terminal speed, allows the
terminal power reduction (
in the Services dialog box.
Page 92
Eb Nt
After the terminal power reduction has been calculated, the terminal is checked to see
if it has sufficient power to make the uplink. The actual transmit power of the
terminal (
) is given by:
(16)
The uplink
where
The terminal is also checked to see if it will break the noise rise limit on any of the
covering sectors. When calculating the interference, the terminal power is taken as
Page 93
F1
and
Active Fundamental
Bearer
Inactive Fundamental
Bearer
(Active
Period)
F2
1
(Inactive
Period)
The ratio of transmit powers for the active and inactive fundamental bearers
is given by the ratio of their (
and
Page 94
is given by:
S1
F1
F2
Active Fundamental
Bearer
P
Pilot
1
(Inactive
Period)
(Active
Period)
Page 95
F1
F2
Active Fundamental
Bearer
P
Pilot
1
(Inactive
Period)
(Active
Period)
Page 96
and
.
is given by:
F1
and
(Active Period)
F2
1-
(Inactive Period)
The ratio of transmit powers for the active and inactive fundamental bearers
is given by the ratio of their (
is given by:
Page 97
active period.
and
are the fundamental channel powers in the active and
inactive periods periods.
S1
F1
(Active Period)
F2
1-
(Inactive Period)
The ratio of fundamental powers to the power of the active supplemental bearer
and
is given by the ratio of their (
processing gains as follows:
Page 98
) requirements and
is given by:
Pixels with high traffic should have more influence on cell blocking probability
than pixels with low traffic.
Pixels in coverage holes should not influence cell blocking probability, even if they
contain high traffic.
A service may use some bearers more frequently than others. Frequently used
bearers should have more influence on the blocking probability than infrequently
used bearers.
Page 99
users per
.
(18)
(19)
Lost Call Cleared: In an LCC system, blocked users do not try again.
(21)
Lost Call Held: In an LCH system, blocked users persistently retry until connected.
(22)
This is NOT a blocking probability and it should never be treated as one. The failure
rate can be an order of magnitude lower than both the LCC and LCH blocking
probabilities.
Page 100
Page 101
Iterate
until
Eb/Nt
achieved
or not
changing
between
iterations
Increase/Decrease
The difference between the two best Ec Io values of sectors in the candidate active set
is calculated. This figure, together with the terminal speed, determines the downlink
Page 102
The downlink powers for sectors in the candidate active set are calculated iteratively.
The iterative procedure involves setting all downlink powers to the same (non-zero)
value
factor of
, then
E b N t requirement is
Note : Individual downlink powers are kept within the limits that you supply
throughout the iterative procedure, so sectors will never be allowed to transmit more
power than they have available.
Page 103
Page 104
APPENDIX E
HDR Algorithms
In This Section
HDR Notation
List of Principal Symbols for HDR
HDR Basic Formulae
HDR Uplink Noise Rise
HDR Uplink Load
HDR Frequency Re-Use Efficiency
HDR Air Interface and User Bitrates
HDR Shadow Fade Modelling
HDR Power Control Error Modelling
HDR Service Activity Modelling
HDR Transmit/Receive Diversity Modelling
HDR Terminal Speed Modelling
Overview of a HDR Snapshot
Scenario Prioritisation for HDR
HDR Connection Evaluation
Calculation of Uplink Equivalent Control Overhead Factor for HDR
HDR Coverage Probability and Blocking
About the HDR Quality of Service Algorithm
Page 105
HDR Notation
This list describes the notation symbols used in this section:
(E
N )
b
t Kj represents the
As an example, the quantity
between terminal j and cell K using carrier .
A , A
Page 106
Description
Uplink (downlink) adjacent carrier interference ratio. Gives fractional power leakage from carrier
carrier .
( E b N t ) Jj
Uplink
( I or I oc ) Jj
Pilot
G j
G antenna
J
G antenna
j
G mha
J
Boltzmann constant
Lmha
J
Eb Nt
(I or I oc )
to
Symbol
Description
LJj LJj
Lpathloss
Jj
Lantenna
Jj
Lcable
J
Lcombiner
J
Lsplitter
J
Lbody
j
N thermal
j
N thermal
J
N excess
J
Pj
Terminal TX power
Prated
J
R total
j
R total
J
Temperature
Chip rate
mha
J
cable
J
Lcable
J
).
Page 107
(2)
(3)
(4)
(5)
(6)
(7)
(8)
Page 108
processing gain. The uplink processing gain ( j ) is calculated by dividing the system
chiprate by the air interface bitrate of the uplink bearer.
The User Bitrate of the uplink bearer is used purely to calculate traffic (data
throughput) on a cell.
Page 109
For each terminal in a snapshot, a set of correlated fades to cells is generated using the
following procedure:
Note : All the random numbers mentioned in the following procedure are independent
and normally distributed with zero mean and unit variance.
1
(12)
where
is the standard deviation of the shadow fading in the pixel (in dB).
E b N t values at a cell.
The simulator models imperfect power control by including a log-normal error on the
uplink and transmit powers of successfully served terminals. The errors on the uplink
are applied after all other handoff gains have been considered. Terminals are never
considered as having failed to make a connection if the resulting error makes them
transmit at too high or too low a power.
Page 110
requirement is used on cells with receive diversity and the other is used on cells
without receive diversity. Transmit diversity is not modelled in a HDR simulation,
since downlink traffic powers are not calculated.
)
)
where
is a random number taken from a normal distribution of zero mean and
unit variance.
Page 111
Gathering of Results
Page 112
HDR Iterations
An iteration involves sequentially evaluating the terminals (precisely once) to see if
they can make a connection to the network. After each terminal is evaluated, the noise
in the network is updated before moving on to evaluate the next terminal.
A terminal may connect to the network in a variety of different ways (connection
scenarios). For example, a terminal may have several different cells or carriers that it
may use. Each of the connection scenarios for a terminal is evaluated in turn until one
that allows a successful connection if found. If no scenario can produce a successful
connection to the network, the link powers for the terminal are set to zero and the
reasons for failure of the first scenario are recorded.
Terminals which fail to make a connection in an iteration are not removed from the
simulation, since success or failure in an iteration does not necessarily ensure the
same result in a subsequent iteration. In fact, the state (succeeded/failed) of a terminal
is determined purely by its state in the final iteration of a snapshot when convergence
has been achieved.
The following diagram illustrates how a snapshot converges with successive
t values for
iterations. Each histogram shows the distribution achieved uplink b
successfully served terminals. All terminals are running a service with an uplink
E b N t requirement of 6 dB.
Page 113
t
After the first iteration, the majority of served terminals fail to meet their b
requirement. This is because terminals evaluated at the beginning of the first iteration
see little or no interference and so have their TX powers set to low values. By the end
of the first iteration, the noise in the system will have increased due to interference
from the newly served terminals. Hence terminals evaluated at the beginning of the
Eb Nt .
Successive iterations produce increasingly accurate pictures of network noise and a
system noise no longer changes significantly between iterations. The iteration have
converged to produce a plausible picture of served and failed terminals in the
network. Any remaining distribution in the achieved F values of served terminals is
largely due to quantisation of link powers or from specifying a non-zero power
control error standard deviation.
E b N t values.
If the percentage change in total uplink and downlink interference changes by an
amount smaller than the specified threshold, for 15 consecutive iterations, then the
iterations are deemed to have converged. The default threshold is a 1% change.
Page 114
Carrier
Primary cell
Uplink bearer
Required
The rules for prioritising scenarios during connection evaluation are (in order of
decreasing importance):
Uplink evaluation
Downlink evaluation
Page 115
E b N t requirement:
N t for each
Eb N t values achieved
Check terminal power does not break noise rise limit on any
cells.
For each cell in the candidate active set, the terminal transmit power required to meet
power
E b N t values on cells in the candidate active set are calculated. The difference
between these two values (in dB), together with the terminal speed, allows the
terminal power reduction (
) to be determined from the supplied
information in the Services dialog box.
The terminal power reduction (
Eb Nt
After the terminal power reduction has been calculated, the terminal is checked to see
if it has sufficient power to make the uplink. The actual transmit power of the
terminal (
) is given by:
(14)
The uplink
where
The terminal is also checked to see if it will break the noise rise limit on any of the
covering cells. When calculating the interference, the terminal power is taken as
achieved
is finally given a random (log-normal) adjustment to model the effect
of imperfect power control.
Page 117
19200
38400
76800
53600
users per
.
(16)
(17)
(18)
Lost Call Cleared: In an LCC system, blocked users do not try again.
(19)
Page 119
Lost Call Held: In an LCH system, blocked users persistently retry until connected.
(20)
This is not a blocking probability and it should never be treated as one. The failure
rate can be an order of magnitude lower than both the LCC and LCH blocking
probabilities.
HDR Outline
The HDR forward link is a time division multiple access (TDMA) link with 16 slots
per frame. There are 600 time-slots per second so each time slot is approximately
1.66ms and the frame-length is 26.66ms. Each slot is divided into two with a pilot
burst in the first half and a physical layer packet in the second half.
The link layer forms physical-layer packets from the original data packet. To do this
the data is encoded (using turbo codes), block interleaved and repeated. The codingrate and repetition-rate depend on the data-rate. The output is a number of symbols.
Page 120
Physical layer packets are spread across a number of time slots, spaced out at four-slot
intervals. The number of slots reserved for transmission is dependent on the HDR
downlink parameter. For example, four slots would be reserved for a data-rate of
307.2kbps. If the first slot used was slot N, then the reserved slots would be N+4, N+8
and N+12.
There is a probability that an acknowledgement (ACK) will be received before all the
reserved slots are transmitted. If this occurs, the remaining reserved slots are released
and made available for other packet calls. The probability of an ACK being received
increases with each slot transmitted.
There is also a probability that the physical layer packet will not have been
successfully transmitted even when all the reserved slots are used. In this case the
physical layer packet is re-transmitted, reserving the same number of slots as
previously. The probability that the entire physical layer packet is not successfully
received is defined by the packet erasure rate (PER).
The number of slots used for each physical layer packet is determined. This
depends on the number of reserved slots and the probability of receiving an
acknowledgement, which is calculated for each reserved slot. The probability that
an ACK will be received for a particular slot, p(ack)n, is:
where
m gradient of the curve Eb/Nt vs (1-PER)
N maximum number of reserved slots.
Page 121
A uniformly distributed random number is drawn. If this is greater than p(ack) then
the physical layer packet is said to be successfully transmitted. If the random number
drawn is less that the probability of receiving an acknowledgement in the last
reserved slot then the entire physical layer packet is retransmitted.
The average IP packet transmission time,
where
Slots- sum of all the slots used for transmission.
Hence the queueing delay depends on the IP packet arrival rate, departure rate and
the number of servers.
Each frame of 16 time-slots is sub-divided into sub-frames of four slots to account for
the physical layer packets being spaced four slots apart. Therefore there is a
maximum limit of four servers available. If only one service is running on a carrier
then all four servers are available, if two services are running then two servers are
available and if four services are running then one server is available to each service.
This imposes a limit of four services per carrier.
A means of limiting queue length is needed to prevent the queue from tending to
infinity. You can set a limit on either the average queue length or the average waiting
time for a packet in the queue.
Page 122
and Po is
The number of servers available to a service on a carrier will vary depending on the
number of services on that carrier. By using the above equations and the relation:
m=2
m=4
Where W is the maximum permitted waiting time in the queue. These equations are
solved for the maximum arrival rate which can be handled,
maximum waiting time.
where
Page 123
where
is the number of available bits per physical layer packet
is the number of physical layer packets per user
is the average IP packet transmit time
, is the average maximum
The mean gross sector throughput,
throughput that could be achieved considering the available signal quality and is
calculated by:
where
is the average number of slots required for transmission
Mean net sector throughput,
the sector and is calculated by:
where
is the percentage of packets timed out
is the size of the IP packet in bits
Page 124
APPENDIX F
Graphs for each cell and carrier giving the cumulative queuing delay probability
distributions
In This Section
Simulation Inputs for QoS Analysis
Traffic Generator for QoS Analysis
Time Simulator for QoS Analysis
Results of QoS Analysis
References
ASSET3g Technical Reference Guide
Version 5.1
Page 125
You then need to run at least two snapshots of the simulation, although at least 100
snapshots are recommended to produce statistically valid inputs to the QoS analysis.
The simulation calculates the mean blocking probability for each packet service type,
on each carrier, on each cell in the simulation in the simulation and the mean number
of terminals connected to each cell, per carrier, per service, and per bitrate. The mean
blocking probability and mean number of terminals are then used as inputs to the
QoS analysis.
Preliminary Tests
Some conclusions can be deduced from the input data without running the simulation
at all. These are:
These results are immediately updated on the summary page of the QoS Analysis
dialog box.
Page 126
Packet Model
The red line represents the mean number of users input from the simulation. The
orange blocks represent the number of users varying over time. The blue blocks
represent the holding times of the packet sessions produced by the traffic generator.
Littles theorem gives us the relation between the arrival rate of packet sessions, the
mean number of users in the cell and their mean session holding time. Let
N = .T
Page 127
The traffic generator therefore generates sessions with mean arrival rate calculated
from the mean number of users in the cell, and the mean session holding time, which
is determined using the WWW traffic model.
Page 128
Session arrival process - The arrival of session set-ups to the network is modelled
as a Poisson process. For each service there is a separate process.
Inter arrival time between packets, Dd - A geometrically distributed, that is a ( that is, a
discrete representation of the exponential distribution) random variable is used.
The session holding time is modelled implicitly by the number of events during the
session.
Using the WWW traffic model, the mean holding time of a packet session T is given
by:
T = (N pc 1)D pc + N pc ( N d 1)Dd
Packet Model
The traffic generator uses the session arrival and WWW models to produce a list of
packets for each service type, for each cell, for each carrier, lasting the duration of the
simulation. Each packet is stamped with its arrival time at the cell, and also keeps a
record of when it gets transmitted (its departure time), and its randomly generated
size. The packet service type lists are then merged and sorted in arrival time order, to
produce a single list of packets offered to the cell carrier:
In the diagram, the data contained in the packet boxes is the arrival time, the
departure time and the packet size. Initially, the packets departure time is set to be
the same as its arrival time. The departure time is updated each time step the packet is
queued, until it is successfully transmitted.
A histogram of the generated traffic is displayed for each service on each cell and
carrier in the graphs tab of the QoS Analysis dialog box.
Page 129
Scheme
GPRS
CS - 1
EGPRS
Link Adaption
Family
Modulation
RLC Block
Size (bits)
GMSK
9.05
181
CS - 2
13.4
268
CS - 3
15.6
312
CS - 4
21.4
428
8.8
176
MCS - 1
GMSK
MCS - 2
11.2
224
MCS - 3
14.8
296
MCS - 4
17.6
352
MCS - 5
MCS - 6
29.6
MCS - 7
44.8
MCS - 8
54.5
1090
MCS - 9
59.2
1184
8 - PSK
22.4
448
592
896
In order to calculate the block size, the coding scheme allocated to each connection
needs to be input from the simulation (a mean number of MS connections per coding
scheme, per bearer, per service type, per sub-cell array will be required as input).
The block size can be inferred directly from the GPRS coding schemes, however, the
following mapping is used to calculate the block size for the first transmission attempt
for the link adaptation families:
A 592 bits
B 448 bits
C 352 bits
There are no default BLER versus C/I curves for MCS 7, 8 and 9. In the
retransmission model, the lower bitrates of the link adaptation families are used.
Page 130
Precedence class
Delay class
Reliability class
Throughput class
Precedence Class
Traffic is given a precedence of 1 (premium), 2 (standard) or 3 (best effort), with a
precedence of 1 being highest. This precedence is similar to the service type priorities
set in the QoS Analysis wizard in ASSET3g, however the number of priorities needs
to be restricted to three and different service types can have equal priorities. The
precedence class is used to prioritise the queues. For more information, see
Simulation Model on page 134.
Delay Class
GPRS has four different traffic classes. The following table shows that parameters that
specifies their QoS requirements:
Traffic Class
Medium
Application
One-way Delay
Conversational
Audio
Telephony
4-25
<150ms
Data
Telnet
<8
<250ms
Audio
Streaming (HQ)
32-128
<10s
Video
On-way
32-384
<10
Data
FTP
<10s
Audio
Voice messaging
4-13
<1s
Data
Web browsing
<4s/page
Streaming
Interactive
Page 131
Reliability Class
Applications can request different reliability classes, depending on their ability to
handle corrupt and duplicated blocks. The following table shows the reliability
classes that can be selected:
Reliability Class
10
10
10
where:
Throughput(C/I) = throughput in kb/s read off the throughput per timeslot graph for
the C/I achieved by the link
PeakDataRatePerSlot = peak rate per slot for the given coding scheme (the
asymptote of the throughput per timeslot graph
BLER(C/I) = block error rate for the C/I achieved by the link
The mean BLER over all the connections made per service type, per sub-cell is
required as an input from the simulation, and is reported in the QoS Analysis
spreadsheet. Block errors also have implications for the retransmission model. For
more information, see Mean Retransmission Delay on page 140.
Page 132
Throughput Class
Applications can request different mean and peak throughputs, in order to request
the desired throughput for bursty IP traffic. Peak throughput applies to short
intervals where the transfer rate is at a maximum. Mean throughput describes the
data transfer rate over an extended period of time, which could involve many idle
periods.
Peak throughput class
Mean throughput
(bytes per hour)
100
16
200
32
500
64
1 000
128
2 000
256
5 000
512*
1024*
17
20 000 000
2048*
18
50 000 000
Best Effort
In GPRS, the peak throughput is determined by the peak data rate per slot achievable
by the coding scheme, and the number of timeslots for which the MS is enabled. The
peak throughput is calculated as follows:
Page 133
System Model
Simulation Model
The call admission manager monitors the cell capacity in every radio frame, that is
every 10ms
The cell capacity for each service type is generated using the blocking probability
input from the simulation
The blocking decision is prioritised to accept new connections in the priority order
of their services
The cell capacity for each service is determined in each frame by generating a
uniformly distributed random number for each packet held in a queue. If the random
number is greater than the blocking probability, the packet starts transmission in that
frame. If the random number is less than of equal to the blocking probability, the
packet is delayed in the queue until the next frame.
If the packet call mode is selected instead of the packet mode, connection admission
decisions are taken on a packet call, instead of an individual packet basis.
Page 134
The service prioritisation is modelled in the simulator. All the packets awaiting
transmission through a cell are stored in a set of queues, one for each service type. A
diagram of the queuing model which would be used for three packet services being
transmitted through a cell is shown here:
The rule is then applied that if admissions for each service are considered in priority
order, and that if any higher priority packets remain queued, no lower priority
packets are admitted.
By the end of the simulation, the simulator will have produced a list of transmitted
packets, each stamped with its arrival and departure times from the cell.
A histogram of the queue length throughout the simulation is displayed for each
service on each cell and carrier in the graphs tab of the QoS Analysis dialog box.
Page 135
Simulation Duration
Set the basic run length to ensure at least 1000 2000 packet admission requests are
made to the cell for each service.
Repeat the run (replicate) 5 times and calculate the confidence interval half width
H5.
If the confidence interval is less than 10% of the mean delay, , the desired
accuracy has been obtained.
, and variance .
Yi
i =1 k
k
Y=
(Yi Y )2
2 =
i =1
Hi =
Page 136
(k 1)
2.
m
Simulation Duration
This is calculated for each cell and carrier. The value depends on the parameters that
you have set for the services supported by that cell, and carrier, and the mean number
of users of those services input from the simulation. Using the same notation as the
www traffic model section, plus the following definitions:
N req
S req
Treq
S req
N req
packets
session arrives
S req =
N pc .N d
packets, so
N req
N pc .N d
(1)
The session arrivals are modelled as a Poisson process, and so the expected time until
the
S req
Treq =
S req
(2)
Treq =
N req .T
N pc .N d .N
S req
N req
D=
+ 1.T
N . N .N
pc
d
Page 137
Delay
Count
0.F
C0
1.F
C1
2.F
C2
...
...
...
n.F
Cn
...
...
...
N.F
CN
TP = ci
i =0
P ( n) =
cn
TP
CP (n) =
Page 138
c
i =0
TP
Mean delay
D = F . n.P (n)
n =0
=
Standard deviation
(F .n D ) .P(n)
N
n =0
).
Transmission time:
Ttrans =
8.S d
1000.b
Page 139
The sender keeps a copy of each transmitted block until its acknowledgement has
been received
Finally, the blocks are put back into order and reassembled into packets by the
RLC at the receiver
In order to calculate the average retransmission delay, the block error rate (BLER) at
which the system will operate is required as an input. A typical value of 10% is set as
the default. You also need to set the re-transmission timeout in units of radio
frames. The BLER can then be used to calculate the increase in traffic through the link
caused by retransmission, and the mean or median retransmission delay:
BLER
+ 1seconds
Mean retransmis sion delay = 0.01. rt
(1 BLER )
References
The following are documents that have been referred to throughout this chapter:
Page 140
Introduction to Mathematical Statistics, R.V. Hogg and A.T. Craig, CollierMacmillan Ltd, p.193
Glossary of Terms
16QAM
Quadrature Amplitude Modulation. A modulation technique that modulates both the
amplitude and phase. There are several QAM levels. QAM with a level of 16 is
equivalent to 4 bits per Hertz.
8PSK
Eight Phase Shift Keying. A modulation technique encoding 3 bits to each symbol.
A
AICH
Acquisition Indicator Channel (UMTS). A fixed rate physical channel with a
spreading factor of 256 equating to 32Kbps. It is used to carry acquisition indicators
which correspond to signatures.
AMPS
Analogue Mobile Phone System. The US analogue cellular standard.
AMR
Adaptive Multi Rate. A codec (coder/decoder) offering a wide range of data rates. In
GSM, this can lower the bitrate per timeslot as interference increases, thus enabling
more error correction to be applied.
B
BCCH
Broadcast Control channel. This is a logical channel used for signalling purposes.
BER
Bit Error Rate. The ratio of number of errored bits to the total number of bits received.
Page 141
BSC
Base Station Controller. A piece of equipment that controls one or more BTS (Base
Station Transceivers).
BSIC
Base Station Identity Code. A combination of colour codes (NCC and BCC) used in
GSM that provide extra identity information to help a mobile to distinguish
individual transmitters. This allows handovers between cells, even if both cells are
using the same frequency channel.
BTS
Base Transceiver Station.
C
C/A
Carrier to Adjacent interference ratio.
C/I
Carrier to interference ratio.
CCCH
Common Control Channels (UMTS). These include P-CCPCH, S-CCPCH, P-SCH, SSCH, AICH, PICH.
CDMA
Code Division Multiple Access. The use of different codes to allow terminals to access
the same frequency spectrum simultaneously.
CDMA2000
CDMA2000 is a 3g mobile telecommunications standard. It offers backward
compatibility with IS-95, and the two systems may be run together in the same
bandwidth. A defining feature of the CDMA2000 standard is the support for different
services such as Voice, Internet and Video.
CI-RTT
Cell Identity - Round Trip Time. Related to location based services (UMTS).
CI+TA+RX
Cell Identity + Timing Advance + Received Power. Related to location based services
(GSM).
Page 142
D
DTX
Discontinuous transmission. Interference reduction technique, associated with a voice
activity factor (0-1).
E
ECSD
Enhanced Circuit-Switched Data. Technique similar to HSCSD, using EDGE to
achieve higher data rates.
EDGE
Enhanced Data rates for GSM Evolution. Method of achieving higher data rates in
GSM by using 8PSK modulation.
EGPRS
Enhanced General Packet Switched Services. Technique similar to GPRS, using EDGE
to achieve higher data rates.
EiRP
Effective (isotropic) Radiated Power, referenced to an isotropic antenna. The
relationship between EiRP and ERP is: EiRP = ERP + 2.14
ERP
Effective Radiated Power, referenced to a dipole antenna. The relationship between
ERP and EiRP is: ERP = EiRP - 2.14
F
FCC
Federal Communications Commission. Statutory regulatory body for mobile
communications in the U.S.A.
FDD
Frequency Division Duplex. A full-duplex technique that consumes more spectrum
than TDD, but does not require synchronisation between base stations.
FDMA
Frequency Division Multiple Access. A technique used in analogue AMPS cellular
systems, in which each user is designated a different frequency.
Page 143
G
GPRS
General Packet Radio Service. This is a non-voice service, which allows you to send
and receive data across a mobile telephone network via GSM telephones.The typical
data transmission rate is 20-30 Kbps, and there is continuous connection to the
network.
GSM
Global System for Mobile Communications. A global 2g wireless digital
communications standard covering cellular telephony, two-way radio and paging,
and short messaging. It is a TDM system, operating on 3 frequency bands - GSM 900
(900 MHz), DCS 1800 (1.8 GHz) and PCS 1900 (1.9 GHz).
H
HDR
High Data Rate (HDR) is a development of IS-95B. HDR is also known as 1xEV-DO,
depending on which country it is being used. HDR is now defined by a standard, IS856. The reverse link uses CDMA in much the same manner as IS-95/CDMA2000.
HSCSD
High-Speed Circuit-Switched Data. A high-speed technology that allows data to be
sent and retrieved over GSM networks at a rate of 14.4 (1 timeslot), 28.8 (2 timeslots),
or 57.6 Kbps (4 timeslots).
HSDPA
High Speed Downlink Packet Access. Represents an evolution of the WCDMA radio
interface for data services, using methods similar to the EDGE evolution of the GSM
radio interface. The higher data rates are achieved by Adaptive Modulation and
Coding.
M
MSC
Mobile Switching Centre. In a cellular network, this is a switch or exchange that
interworks with location databases.
Page 144
O
OTSR
Omni Transmit Sector Receive. A configuration technique for a NodeB that can be
used at the initial deployment of a UMTS network, when capacity is not a crucial
factor. The method uses a single transmitter on the downlink, shared between the
antennas of the cells by the use of a power splitter.
P
P-CCPCH
Primary Common Control Power Channel peak dedicated power (UMTS). It is turned
off for the first 256 chips and is used to carry the Broadcast Channel, which conveys
the basic network information required by the terminal for connection.
P-SCH
Primary Synchronisation Control Channel peak dedicated power (UMTS). It is only
transmitted for the first 256 chips of every slot.
PCH
The Paging Channel (PCH) is a downlink transport channel, and is always
transmitted over the entire cell. The transmission of the PCH is associated with the
transmission of physical-layer generated Paging Indicators, to support efficient sleepmode procedures.
PCS
Personal Communication Services. A digital standard that operates in the 1.8 GHz to
2 GHz band, giving smaller areas of coverage than cellular networks.
PICH
Paging Indicator Channel (UMTS). A fixed rate physical channel with a spreading
factor of 256, used to carry the paging indicators. The PICH is always associated with
an S-CCPCH to which a PCH transport channel is mapped.
PLMN
Public Land Mobile Network.
Page 145
Q
QoS
Quality of Service. A performance requirement that is defined prior to the
transmission of data. Depending on the network type, it can be measured in terms of
bit error rate, cell loss ratio, cell transfer delay and so on.
QPSK
Quadrature Phase Shift Keying. A modulation technique using orthogonal carriers to
gain the maximum information from the channel.
R
RNC
Radio Network Controller.
RSCP
Received Signal Code Power.
S
S-CCPCH
Secondary Common Control Power Channel peak dedicated power (UMTS). Because
it conveys paging and control information, at least one S-CCPCH is needed per cell
and has to be transmitted at full power to be received at the cell edges.
S-SCH
Secondary Synchronisation Control Channel dedicated peak power (UMTS). It is only
transmitted for the first 256 chips of every slot.
SGSN
Serving GPRS Support Node. A piece of equipment that monitors an MS and
performs security functions and access control. It can also be used in a UMTS network
to connect an RNC over the Iu-PS interface.
SIR
Signal to Interference Ratio. This measurement excludes intra-cell interference
(whereas the Ec/Io value includes intra-cell interference).
Page 146
T
TACS
Total Access Communications System. The analogue cellular standard in the UK and
(some) Europe.
TCH
Traffic channel. This is a logical channel used to transport data.
TD-SCDMA
Time Division-Synchronous Code Division Multiple Access. Combines an advanced
TDMA/TDD system with an adaptive CDMA component operating in synchronous
mode.
TDD
Time Division Duplex. A half-duplex technique that consumes less spectrum than
FDD, but requires very tight timing co-ordination between base stations.
TDMA
Time Division Multiple Access. In this technique, multiple users can be carried along
one channel, each one using a different timeslot.
TETRA
Trans European Trunked Radio Access, or Terrestrial Trunked Radio. A digital
cellular land mobile radio system used in Europe.
TRX
Transmitter/Receiver module. GSM term for a single carrier card within a BTS.
U
UMTS
Universal Mobile Telecommunications System. A 3g mobile telecommunications
standard, which can deliver broadband data at speeds of 2Mbps. A defining feature of
the UMTS standard is the support for different services such as Voice, Internet and
Video.
Page 147
Page 148
I
Interference
arrays 29, 35, 36, 37
Index
L
LMUs
arrays 31
M
Measured Cells (LMU) arrays 31
A
Algorithms
CDMA2000 77
FCC calculations 53
Frequency hopping 45
Frequency Re-use and Load 54
GPRS and HSCSD capacity 50
HDR 105
ILSA cost function 48
Interference arrays 40
Interference Tables 39
MAIO planning cost function 49
Non-Frequency hopping 47
Packet QoS 125
UMTS 57
Arrays
GPRS 30, 32
LMU 31
measured cells 31
types available 1
P
Packet Switched QoS algorithms 125
Pilot Coverage arrays 24, 26
Q
QoS
algorithms 125
S
Serving Cell arrays 15, 24, 27, 28, 29, 30
Snapshots
algorithm 65
T
TETRA
algorithms 39
B
Best Server arrays 15, 24, 27, 28, 29, 30
UMTS
algorithms 57
CDMA2000
algorithms 77
E
EGPRS
arrays 33, 34, 35
G
GPRS
algorithms 39
arrays 32, 34
GSM
algorithms 39
H
HDR
algorithms 105
HSCSD
algorithms 39
Page i
Page ii