Professional Documents
Culture Documents
GSM Static Simulations
GSM Static Simulations
GSM Static Simulations
V 7.0
This document is supplementary to the User Reference Guides, and is protected by copyright and
contains proprietary and confidential information. No part of the contents of this documentation may be
disclosed, used or reproduced in any form, or by any means, without the prior written consent of
AIRCOM International.
Although AIRCOM International has collated this documentation to reflect the features and capabilities
supported in the software products, the company makes no warranty or representation, either expressed
or implied, about this documentation, its quality or fitness for particular customer purpose. Users are
solely responsible for the proper use of ENTERPRISE software and the application of the results
obtained.
VERSION HISTORY
Document Version Date Author Comments
1.0 28/09/2007 A. Panman First version.
1.1 18/01/2007 A. Lodhi Corrected DL RSS equation.
CONTENTS
1 What Is A Snapshot?................................................................................................................... 5
1.1 Randomness in a Cellular Network .................................................................................. 5
1.2 Time-averaging in Coverage Evaluations......................................................................... 8
1.3 Time-averaging in Capacity Evaluations .......................................................................... 8
1.4 Why Produce Snapshots? .................................................................................................... 8
1.5 Activity Factors..................................................................................................................... 9
2 Formulae ..................................................................................................................................... 11
2.1 Notation ............................................................................................................................... 11
2.2 List of Principal Symbols .................................................................................................. 11
2.3 Downlink Power Formulae .............................................................................................. 13
3 Snapshot Overview................................................................................................................... 17
3.1 Random Terminal Distribution ........................................................................................ 17
3.2 Time-Slot Iterations ............................................................................................................ 18
3.3 Convergence Test ............................................................................................................... 18
3.4 Gathering Of Results ......................................................................................................... 18
4 Connection Evaluation in a Snapshot ................................................................................... 19
4.1 Connection Scenario Prioritisation .................................................................................. 19
4.2 GSM Downlink Evaluation ............................................................................................... 19
4.3 Failure Reasons ................................................................................................................... 20
5 Output Arrays in Simulations ................................................................................................ 21
5.1 Array dependencies ........................................................................................................... 21
5.2 Pathloss Arrays ................................................................................................................... 22
5.3 Coverage Arrays................................................................................................................. 22
6 Coverage Array Calculations .................................................................................................. 23
6.1 Notation ............................................................................................................................... 23
6.2 Fades in the Simulation Snapshots .................................................................................. 23
6.3 Fades in Arrays for Mean Values ..................................................................................... 24
6.4 Fades in Coverage Array Calculations ............................................................................ 24
1 WHAT IS A SNAPSHOT?
1.1 RANDOMNESS IN A CELLULAR NETWORK
In a simulation of a cellular network there are two main types of randomness that one needs to
consider.
We shall consider the spatial domain to be discrete and consisting of a large number of pixels (bins)
some of which will contain terminals. Each possible pattern of terminal locations has an associated
probability of occurrence. We can label these spatial patterns X1, X2, etc and represent the
corresponding probabilities of occurrence by P(X1), P(X2), etc. An example of two spatial patterns X1
and X2 is shown below.
X1 X2
X
X
X X
X
X
X
X
X X
X X
X
Each spatial pattern has many possible configurations of transmitting and non-transmitting terminals.
Two such configurations for the spatial patterns X1 and X2 are shown below, with 1 representing a
transmitting terminal, and 0 a non-transmitting terminal.
(X1,T1) (X2,T1)
1
1
1 0
0
1
0
1
0 0
1 0
1
(X1,T2) (X2,T2)
0
0
1 1
0
0
1
0
0 0
0 1
1
We call each of these patterns a spatio-temporal pattern to highlight the fact that we have specified
spatial locations of terminals and also their temporal state (transmitting/non-transmitting). We can
label the spatio-temporal patterns for spatial pattern X1 as follows (X1,T1), (X1,T2), etc and their
probabilites of occurrence P(X1,T1), P(X1,T2), etc. Note that the probability of occurrence of a spatio-
temporal pattern (Xi,Tj) is proportional to the probability of occurrence of the spatial pattern Xi:
One can think of a spatio-temporal pattern as being a picture of a real network at a random instant in
time. This is what most people have in mind when one mentions a simulation “snapshot”, but a
snapshot in our simulator represents something slightly different, as explained below.
The ideal static simulation would calculate an average quantity (e.g. the average traffic load on a cell)
by performing a weighted sum over the set of all possible spatio-temporal patterns (Xi,Tj), with the
weight for a pattern being its probability of occurrence. So the average of some quantity F would be
given by
F F ( X i , T j ) P( X i , T j ) . (1a)
X i ,T j
F P( X i ) F ( X i , T j )P(T j | X i ) . (1b)
Xi Tj
The summations in (1a) and in (1b) are over every conceivable pattern of terminal locations and
activities, including the unlikely ones, so clearly some simplifications are necessary in any practical
static simulator.
This simplification is the most common one made in static simulations, and it is used universally.
Instead of considering all spatial patterns, we consider a set of N sample spatial patterns drawn from
the distribution of all spatial patterns. The first weighted sum in (1b) can then be approximated by a
simple average over the set of N sample spatial patterns:
1
F F ( X i , T j )P(T j | X i ) .
N Xi Tj
Spatial randomness is therefore handled explicitly by considering a set of sample spatial patterns that
have been selected in a random and unbiased way. There is still the issue of how to handle the
different temporal states for each sample spatial pattern. There are two main approaches we can use:
This simplification is fairly common but has some drawbacks as explained below. Firstly, as in the
previous simplification, one selects a sample spatial pattern from the set of all possible spatial patterns,
making sure that the selection is made in a random and unbiased way. One then assigns a random
“activity flag” (1 or 0) to each terminal in the pattern, to indicate if the terminal is transmitting or not.
The probability of assigning a “1” to a terminal is just the service activity factor for that terminal. This
ensures that activity flags are assigned in a random and unbiased way. The weighted sum over the set
of all spatio-temporal patterns in (1a) can be approximated by a simple average over the set of N
sample spatio-temporal patterns:
1
F F ( X i ,T j ) .
N X i ,T j
If we called a spatio-temporal pattern a “snapshot” then the above formula simply says that we can
approximate F by performing a simple average over the snapshots. This simple average works
because the sample spatio-temporal patterns are selected in a random and unbiased way. Also note that
this averaging explicitly accounts for spatial randomness and explicitly accounts for temporal
randomness.
For low activity services, the user can do 100s of snapshots and never set an activity flag, and
therefore certain outputs may not have any results. For example, a simulation report may say
that many users are served on a cell but that there is no throughput on the cell. Forcing the
user to run 1000s of snapshots is unacceptable in a commercial tool, so we either have to
remove the problem outputs or calculate them some other way.
Activity flags are set when the terminals are created. For multi-rate packet-switched (PS)
services, different bearers can have different activity factors. Since we do not know which
bearer a multi-rate terminal will ultimately use, we have to define a set of activity flags, one
flag for every bearer that the terminal may use. This is conceptually horrible, and can lead to
convergence issues during iterations.
For the above reasons, we do not use Simplification 2 and use the following simplification instead.
As before, one selects a sample spatial pattern from the set of all possible spatial patterns, but now we
completely remove the activity flags from the randomly scattered terminals. Each terminal is therefore
neither instantaneously active nor instantaneously inactive, but rather represents a sort of “time-
averaged” entity. Essentially, this means that when we examine the interference that the terminal
produces, or the resources it consumes, we use the time-averages for these quantities, and we calculate
these time-averages implicitly by using activity factors to scale things.
So in our simulator, a “snapshot” does not represent a random instant in time for a random distribution
of terminals, but rather “the average instant in time for a random distribution of terminals”. The
snapshot represents the average instant because all the measures of system load (i.e. DL interference,
time-slot usage and throughput) are time-averages.
It is still valid to perform simple averages of quantities over our snapshots. However, averaging over
the snapshots now explicitly accounts for spatial randomness only. The temporal randomness is now
handled implicitly within each snapshot through the use of time-averages in our calculations. Time-
averages feature in the evaluation of both coverage and capacity as described below.
E = ( P / L ) / N,
where
To check for coverage, we set P to the maximum allowed link power and check that E meets
requirements. In other words we examine the link assuming it is active. The time-averaging affects the
coverage evaluation only because we use the time-average interference N in the link-budget.
The downlink capacity constraint is that the time-average number of time-slots consumed on the sub-
cell must not exceed the number of time-slots available on the sub-cell.
Time-averages are calculated by scaling time-slots by activity factors. (Note that the activity factor for
a circuit switched (CS) resource is always 100%, regardless of the service activity factor.)
The snapshot contains no information about the instants of time at which links are active. Only two
things are known about each link:
By running many snapshots, we obtain values for these quantities for different spatial distributions of
terminals, and can then proceed to analyse DL coverage for the system.
The time-slot activity factor is used to calculate the time-average time-slot consumption for a
packet-switched link.
Circuit-switched (CS) services consume time slots even during periods of inactivity. Therefore CS
connections are assumed to have an activity factor of 100%. A CS connection can use either a full-rate
or half-rate bearer corresponding to one time-slot or half a time-slot respectively. Which bearer is
selected depends on the achieved traffic C/I, whether the bearer supports half-rate connections and the
sub-cell traffic load.
For a PS service, the tool automatically calculates the power-activity factor from the PS parameters in
the service definition:
Tactive
Activity factor:
Tsession
2 FORMULAE
2.1 NOTATION
Unless stated otherwise, all quantities and formulae are in standard SI units, not in dB.
The received signal strength for sub-cell S and terminal k is calculated as:
1 1
PSkreceived PSEIRP pathloss antenna indoor
(2)
L Sk Sk L L k
where
PSoutputGSantenna
PSEIRP equip antenna correction cell correction
Lfeeder
S LS LS LS
pathloss antenna
The product LSk L
Sk is read from the prediction file. The received signal strength must meet the
receiver sensitivity requirement on the terminal for a connection to be possible.
DL Thermal Noise
N kthermal kT B k . (3)
DL Traffic CINR
traff 1 N ST RX hop E Sk
hop
N ST RX non-hop E Sk
non-hop
CINR Sk BER . (4)
N ST RX hop N ST RX non-hop
Where BER-1 is a function which maps bit error rates to values in decibels via the C/I BER conversion
table. For the purposes of the GSM simulator this is a CINR BER conversion table.
Figure 1
Hence, the CINR BER table is used as a means of averaging values in decibels during the CINR
calculation. However, the BER table has a minimum CINR value of -10dB and a maxiumum of 27dB.
The default BER values are plotted in Figure 1.
The highest possible CINR value is achieved with a strong signal and no carrier interference. Assume
the maximum received signal strength is 1W and that there is minimal thermal noise. This gives a
maximum CINR value of:
1 1
CINR traff
Sk 23
150dB .
kTB 1.38 10 .293. 200 103
Therefore an equation is required to calculate new BER default values up to 150dB. An assumption is
made that the line between 25 and 26dB can be extrapolated with the same gradient. This gives a
gradient of -2 and an intercept of 42 which yields an equation for BER:
0
-20 -10 0 10 20 30 40 50
-10
-20
log(BER)
-30
-40
-50
-60
C/I (dB)
Figure 2
nshop
BER CINR Sk
hop diversity 1 1
E Sk BER G BER (5)
nshop
The summation is restricted to the hopping carriers on sub-cell S. The diversity gain is read from the
frequency hopping diversity gain table, shown in Figure 3.
Figure 3
The index into the diversity gain table is the number of carriers, n, and is calculated as:
Where
hop nShop frequency diversity is selected and sub - cell supports hopping
S
1 otherwise.
nsnon hop
BER CINR Sk
non hop diversity 1 1
E Sk BER G BER (6)
nshop
PSkreceived
(CINR) Sk DTX frac
(7)
J . J . Jtraff .PJkreceived .u N kthermal
J S
1 if ,
adj
u if is adjacent to
0 otherwise.
TSslot
traff
S . (8)
TSCS TSGPRS
N ST RX hop
if nShop 0
frac nShop
S
1 if nShop 0
The averaged control CINR is calculated in a similar way to the traffic CINR. The difference is that
total hopping and non-hopping BER values are calculated by summing values over control layer
carriers only.
3 SNAPSHOT OVERVIEW
The key purpose of a snapshot is to provide us with measures of system load for a particular
distribution of terminals. To obtain these measures of system load, we must calculate time-slot
consumption for all the links in the system. A snapshot involves the following stages:
Consider a pixel that has a terminal density of D terminal/km2 and an area of A km2, so that the average
number of terminals in the pixel is DA. We note that:
Terminal occurrences within the pixel are independent of each other and are spatially uniform
within the pixel. In other words, a terminal is just as likely to be located at one point within
the pixel as any other point within the pixel.
The probability that two or more terminals are located at exactly the same point within a pixel
is zero. This is simply because there is an infinite number of locations within the pixel.
These imply that terminal occurrence is a spatial Poisson process within the pixel. Therefore the total
number of terminals in the pixel satisfies the Poisson distribution:
( DA) k e DA
P( k terminals ) .
k!
We choose the number of terminals to assign to the pixel by drawing a number from this Poisson
distribution. Doing this at each pixel ensures our terminal distribution is unbiased. Since the sum of
many Poisson distributions is also a Poisson distribution, the total number of terminals in the snapshot
will also be Poisson distributed.
One may note that if the average number of terminals at a pixel is small (DA << 1), then working to
first order in DA,
P( 0 terminal ) (1 DA) ,
P( 1 terminal ) DA.
So one is effectively making a binary decision about whether a terminal should be placed at the pixel.
After creating the random terminal distribution, the terminals are randomly sequenced. This
determines the order in which they will be considered during the iterations.
Terminals are randomly assigned as being indoor or outdoor, according to their terminal type and the
clutter type in which they reside. Indoor terminals are all given a speed of zero.
The main task of a snapshot is to calculate the traffic loading of the network. At the beginning of the
snapshot, the system is placed in a state of an unloaded network. This is achieved by making all time-
slots available on all sub-cells, i.e. with no terminals connected. Traffic loading is then calculated
iteratively by cycling repeatedly though the list of randomly spread terminals and attempting to make a
connection. The following logic is applied to each terminal:
- If the terminal is already connected then disconnect it by freeing the time-slots used at the
sub-cell by the terminal.
- Recalculate the control and traffic CINR values to account for the new traffic load.
- Try and connect the terminal to the network in the most favourable way possible. The
way in which the terminal connects may be different from the way the terminal connected
previously. This difference arises because the system load may have changed since the
previous iteration.
- If a connection is possible then connect the terminal. Update the time-slots used at the
sub-cell to reflect the terminal’s connection. Recalculate the control and traffic CINR
values to account for the altered traffic load.
Several cycles through the terminal list are needed to achieve a stable system load. On the first cycle,
the first few terminals will experience very little interference because the network is not fully loaded.
The lack of interference means that these terminals can use higher data-rate bearers which have high
CINR requirements. As a consequence, these terminals use fewer time-slots on the sub-cell than if they
connected using lower data-rate bearers. As the system becomes loaded, interference increases. On
subsequent iterations, the terminals may achieve lower traffic CINR values and hence connect using
lower data-rate bearers. Lower data-rate bearers require more time-slots than higher rate bearers and
hence consume more time-slots on the sub-cells. After several cycles, the traffic loading no longer
changes significantly. The iterations have converged to produce a plausible picture of served and failed
terminals in the network.
A good practical measure of convergence is to examine how the traffic load changes between cycles.
The user need only enter one parameter in the “convergence criterion for iterations” section of the
wizard for this convergence check. After each cycle through the terminal list, the percentage change in
traffic load is noted. If the change in traffic load falls within the specified limit for fifteen iterations
then the snapshot is considered to have converged.
Typically, several connection scenarios are available to each terminal. Our snapshot attempts to
connect the randomly spread terminals to the network in the most favourable way possible. Logic is
required for ranking the different scenarios that each terminal may use.
The rules for ranking scenarios during connection evaluation are (in order of decreasing importance):
The connection scenarios for each terminal are evaluated in turn (from most to least favoured) until one
that permits a network connection is found. The scenario employed by a terminal may change each
time it is evaluated in the loading iterations, and this flexibility provides us with link adaptation.
A downlink evaluation is carried out to examine the connection scenario and determine whether a
connection is possible.
.
4.2 GSM DOWNLINK EVALUATION
The received signal strength must meet the receiver sensitivity requirement on the terminal for a
connection to be possible.
Low Signal.
The received signal does not meet the receiver sensitivity requirement specified on the
terminal type.
No Cell Time-Slots.
The sub-cell has too few time-slots to serve the bearer.
No Terminal Time-Slots
The terminal has too few time-slots available for the connection.
High Pathloss.
There is no sub-cell on the pixel with a pathloss value sufficient to be considered as a serving
sub-cells.
If all of the connection scenarios available to a terminal fail to produce a connection, then the terminal
is classed as a failure. Each scenario in the list can fail for multiple reasons. Also, different scenarios
in the list can fail for different sets of reasons. All of this makes failure reporting problematic. For
example, consider a terminal with the following scenario list containing only 2 scenarios:
In this example, CellLayer_A has a higher priority than CellLayer_B. This makes Cell_X the top
scenario even though it has a worse CINR than Cell_Y. What is the correct reason for failure for this
terminal? There is no correct way of assigning this. The tool records the failure reasons of the top
scenario only. In most cases the top scenario provides the most useful information as to why a terminal
fails. In the above example, the terminal is deemed to fail because of problems with Low Control
Channel CINR and Low Traffic CINR on Cell_X. The terminal contributes to the failure statistics for
Cell_X only, not Cell_Y. Hence the terminal does not affect the failure statistics for No Cell Time-
Slots.
5 OUTPUT ARRAYS
Coverage arrays can be drawn even if no snapshots have been run, but the user should note that the
arrays then refer to coverage in an unloaded system. To obtain coverage arrays for a loaded system the
user must run some snapshots; the key purpose of running snapshots is to provide measures of traffic
load. The arrays change little after a relatively small number of snapshots have been performed (10s of
snapshots in most cases). This is because only a small number of snapshots are needed to get an idea
of the average loading on each sub-cell.
The following table lists the types of array that are available in the Simulator, and shows some of their
dependencies. Most terms (e.g. Indoor) are self explanatory.
“Fading” means the array depends on the standard deviation of shadow fading for the clutter type.
CE T S I F
Achievable Bitrate X X X X
All Servers X X X
Best Server by RSS X
CINR (Control) X X X
CINR (Traffic + Control) X X X
Coverage Probability X X X X
DL Loss X X X
Nth Best Server by RSS X
Nth CINR (Traffic + Control) X X X
Nth DL Loss X X X
Nth RSS X
RSS X X X
These are the lowest (and Nth lowest) downlink losses. They represent average values and are
therefore calculated with fades of 0 dB.
This is the sub-cell that provides the highest RSS for the terminal.
These are the highest (and Nth highest) RSS levels. They represent average values and are therefore
calculated with fades of 0 dB.
This is the probability that the Best DL Cell (by RSS) satisfies the RSS requirement specified on the
terminal type. This probability depends on the standard deviation of shadow fading for the clutter type
at the pixel. If this standard deviation has been set to zero, then there are only three possible coverage
probabilities: 0% if the requirement is not satisfied, 50% if the requirement is satisfied exactly, and
100% if the requirement is exceeded.
CINR (Control)
Dependencies: Terminal, Cell Layer, Indoor
These are the CINR(Control) values corresponding to the best serving sub-cells, i.e. not necessarily the
highest CINR(Control) values.
These are the CINR(Traffic + Control) values corresponding to the best (and Nth best) serving sub-
cells, i.e. not necessarily the highest (and Nth highest) CINR(Traffic + Control) values.
Achievable Bitrate
Dependencies: Terminal, Cell Layer, Service, Indoor
This is the highest bitrate that can be achieved by the terminal based on CINR regardless of system
loading.
The term coverage is used in the classical sense. It looks at the problem of a received signal being of
sufficient strength/quality given that it has been transmitted through a lossy channel with shadow
fading. Coverage probabilities are calculated analytically. This means that coverage plots can be
obtained after running a very small number of snapshots (typically 10s) and plots converge very
quickly. If no snapshots have been run, then coverage plots are still available but they give the
coverage probabilities in an unloaded system.
We will examine the different ways in which shadow fading affects our calculations. There are
essentially three cases to consider.
6.1 NOTATION
We introduce the following notation to represent the probability density function for a normally
distributed random variable with mean and standard deviation .
1 (x )2
N (x; , ) exp 2
2 2 2
Shadow fading is modelled in a snapshot by randomising the pathlosses experienced by the randomly
scattered terminals. Shadow fades are log-normally distributed, and the user specifies the shadow
fading standard deviation for indoor and outdoor terminals in each clutter type. In reality, the fades
between a terminal and the cells that cover it will exhibit a degree of correlation. In particular, a
terminal is likely to have similar fades to cells that are located on the same site. To account for this, the
user specifies two parameters in the Monte Carlo Wizard:
The normalised inter-site correlation coefficient ( cinter ). This is the correlation between
fades to cells on different sites.
The normalised intra-site correlation coefficient ( cintra ). This is the correlation between
fades to cells on the same site.
These two parameters must satisfy the constraints 0 c inter c intra 1 . For each randomly scattered
terminal in a snapshot, a set of correlated fades to the covering cells is generated using the following
procedure. All the random numbers mentioned below are independent and normally distributed with
zero mean and unit variance, and is the standard deviation of the shadow fading at the pixel in dB.
The above procedure is performed for each of the randomly scattered terminals at the beginning of a
snapshot. Fades for different terminals are uncorrelated even if they are located in the same pixel.
In the absence of fading, let the RSS (in Watts) for sub-cell J be represented by
RJ .
FJ / 10
RJ (10 ).
Find the fade FJ that causes the RSS to satisfy exactly the RSCP requirement specified on the
terminal type. Call this fade F * . Note that F * may be positive or negative. Any fade bigger
than F * will give an inadequate RSS.
Since FJ is normally-distributed with a mean of 0 dB and standard deviation of dB, the
probability that FJ F * is given by
P ( FJ F*) N ( FJ ; 0, )dFJ .
F*