GSM Static Simulations

You might also like

Download as pdf or txt
Download as pdf or txt
You are on page 1of 24

GSM STATIC SIMULATIONS

V 7.0

ALGORITHMS AND OUTPUTS


GSM Static Simulations – V 7.0

© Copyright 2009 AIRCOM International Ltd


All rights reserved

This document is supplementary to the User Reference Guides, and is protected by copyright and
contains proprietary and confidential information. No part of the contents of this documentation may be
disclosed, used or reproduced in any form, or by any means, without the prior written consent of
AIRCOM International.
Although AIRCOM International has collated this documentation to reflect the features and capabilities
supported in the software products, the company makes no warranty or representation, either expressed
or implied, about this documentation, its quality or fitness for particular customer purpose. Users are
solely responsible for the proper use of ENTERPRISE software and the application of the results
obtained.

AIRCOM International Ltd


Cassini Court
Randalls Research Park
Randalls Way
Leatherhead
Surrey KT22 7TW
ENGLAND

Telephone: +44 (0) 1932 442000


Support Hotline: +44 (0) 1932 442345
Fax: +44 (0) 1932 442005
Web: http://www.aircominternational.com

VERSION HISTORY
Document Version Date Author Comments
1.0 28/09/2007 A. Panman First version.
1.1 18/01/2007 A. Lodhi Corrected DL RSS equation.

2 © Copyright 2009 AIRCOM International Ltd.


GSM Static Simulations – V 7.0

CONTENTS
1 What Is A Snapshot?................................................................................................................... 5
1.1 Randomness in a Cellular Network .................................................................................. 5
1.2 Time-averaging in Coverage Evaluations......................................................................... 8
1.3 Time-averaging in Capacity Evaluations .......................................................................... 8
1.4 Why Produce Snapshots? .................................................................................................... 8
1.5 Activity Factors..................................................................................................................... 9
2 Formulae ..................................................................................................................................... 11
2.1 Notation ............................................................................................................................... 11
2.2 List of Principal Symbols .................................................................................................. 11
2.3 Downlink Power Formulae .............................................................................................. 13
3 Snapshot Overview................................................................................................................... 17
3.1 Random Terminal Distribution ........................................................................................ 17
3.2 Time-Slot Iterations ............................................................................................................ 18
3.3 Convergence Test ............................................................................................................... 18
3.4 Gathering Of Results ......................................................................................................... 18
4 Connection Evaluation in a Snapshot ................................................................................... 19
4.1 Connection Scenario Prioritisation .................................................................................. 19
4.2 GSM Downlink Evaluation ............................................................................................... 19
4.3 Failure Reasons ................................................................................................................... 20
5 Output Arrays in Simulations ................................................................................................ 21
5.1 Array dependencies ........................................................................................................... 21
5.2 Pathloss Arrays ................................................................................................................... 22
5.3 Coverage Arrays................................................................................................................. 22
6 Coverage Array Calculations .................................................................................................. 23
6.1 Notation ............................................................................................................................... 23
6.2 Fades in the Simulation Snapshots .................................................................................. 23
6.3 Fades in Arrays for Mean Values ..................................................................................... 24
6.4 Fades in Coverage Array Calculations ............................................................................ 24

© Copyright 2009 AIRCOM International Ltd. 3


GSM Static Simulations – V 7.0

4 © Copyright 2009 AIRCOM International Ltd.


GSM Static Simulations – V 7.0

1 WHAT IS A SNAPSHOT?
1.1 RANDOMNESS IN A CELLULAR NETWORK

In a simulation of a cellular network there are two main types of randomness that one needs to
consider.

Spatial randomness in the location of terminals.


Temporal randomness in the activity of terminals.

We shall consider the spatial domain to be discrete and consisting of a large number of pixels (bins)
some of which will contain terminals. Each possible pattern of terminal locations has an associated
probability of occurrence. We can label these spatial patterns X1, X2, etc and represent the
corresponding probabilities of occurrence by P(X1), P(X2), etc. An example of two spatial patterns X1
and X2 is shown below.

X1 X2

X
X
X X
X
X
X
X
X X
X X
X

Each spatial pattern has many possible configurations of transmitting and non-transmitting terminals.
Two such configurations for the spatial patterns X1 and X2 are shown below, with 1 representing a
transmitting terminal, and 0 a non-transmitting terminal.

(X1,T1) (X2,T1)

1
1
1 0
0
1
0
1
0 0
1 0
1

(X1,T2) (X2,T2)

0
0
1 1
0
0
1
0
0 0
0 1
1

© Copyright 2009 AIRCOM International Ltd. 5


GSM Static Simulations – V 7.0

We call each of these patterns a spatio-temporal pattern to highlight the fact that we have specified
spatial locations of terminals and also their temporal state (transmitting/non-transmitting). We can
label the spatio-temporal patterns for spatial pattern X1 as follows (X1,T1), (X1,T2), etc and their
probabilites of occurrence P(X1,T1), P(X1,T2), etc. Note that the probability of occurrence of a spatio-
temporal pattern (Xi,Tj) is proportional to the probability of occurrence of the spatial pattern Xi:

P(Xi,Tj)= P(Xi) P(Tj | Xi).

One can think of a spatio-temporal pattern as being a picture of a real network at a random instant in
time. This is what most people have in mind when one mentions a simulation “snapshot”, but a
snapshot in our simulator represents something slightly different, as explained below.

The ideal static simulation would calculate an average quantity (e.g. the average traffic load on a cell)
by performing a weighted sum over the set of all possible spatio-temporal patterns (Xi,Tj), with the
weight for a pattern being its probability of occurrence. So the average of some quantity F would be
given by

F F ( X i , T j ) P( X i , T j ) . (1a)
X i ,T j

We can split this into separate spatial and temporal sums:

F P( X i ) F ( X i , T j )P(T j | X i ) . (1b)
Xi Tj

The summations in (1a) and in (1b) are over every conceivable pattern of terminal locations and
activities, including the unlikely ones, so clearly some simplifications are necessary in any practical
static simulator.

Simplification 1: Model spatial randomness explicitly by sampling.

This simplification is the most common one made in static simulations, and it is used universally.
Instead of considering all spatial patterns, we consider a set of N sample spatial patterns drawn from
the distribution of all spatial patterns. The first weighted sum in (1b) can then be approximated by a
simple average over the set of N sample spatial patterns:

1
F F ( X i , T j )P(T j | X i ) .
N Xi Tj

Spatial randomness is therefore handled explicitly by considering a set of sample spatial patterns that
have been selected in a random and unbiased way. There is still the issue of how to handle the
different temporal states for each sample spatial pattern. There are two main approaches we can use:

Model temporal randomness explicitly by sampling. (Simplification 2).


Model temporal randomness implicitly with time-averages. (Simplification 3).

Simplification 2: Model temporal randomness explicitly by sampling.

This simplification is fairly common but has some drawbacks as explained below. Firstly, as in the
previous simplification, one selects a sample spatial pattern from the set of all possible spatial patterns,
making sure that the selection is made in a random and unbiased way. One then assigns a random
“activity flag” (1 or 0) to each terminal in the pattern, to indicate if the terminal is transmitting or not.
The probability of assigning a “1” to a terminal is just the service activity factor for that terminal. This
ensures that activity flags are assigned in a random and unbiased way. The weighted sum over the set
of all spatio-temporal patterns in (1a) can be approximated by a simple average over the set of N
sample spatio-temporal patterns:

6 © Copyright 2009 AIRCOM International Ltd.


GSM Static Simulations – V 7.0

1
F F ( X i ,T j ) .
N X i ,T j

If we called a spatio-temporal pattern a “snapshot” then the above formula simply says that we can
approximate F by performing a simple average over the snapshots. This simple average works
because the sample spatio-temporal patterns are selected in a random and unbiased way. Also note that
this averaging explicitly accounts for spatial randomness and explicitly accounts for temporal
randomness.

There are problems with assigning “activity flags” to terminals however.

For low activity services, the user can do 100s of snapshots and never set an activity flag, and
therefore certain outputs may not have any results. For example, a simulation report may say
that many users are served on a cell but that there is no throughput on the cell. Forcing the
user to run 1000s of snapshots is unacceptable in a commercial tool, so we either have to
remove the problem outputs or calculate them some other way.

Activity flags are set when the terminals are created. For multi-rate packet-switched (PS)
services, different bearers can have different activity factors. Since we do not know which
bearer a multi-rate terminal will ultimately use, we have to define a set of activity flags, one
flag for every bearer that the terminal may use. This is conceptually horrible, and can lead to
convergence issues during iterations.

For the above reasons, we do not use Simplification 2 and use the following simplification instead.

Simplification 3: Model temporal randomness implicitly with time-averages.

As before, one selects a sample spatial pattern from the set of all possible spatial patterns, but now we
completely remove the activity flags from the randomly scattered terminals. Each terminal is therefore
neither instantaneously active nor instantaneously inactive, but rather represents a sort of “time-
averaged” entity. Essentially, this means that when we examine the interference that the terminal
produces, or the resources it consumes, we use the time-averages for these quantities, and we calculate
these time-averages implicitly by using activity factors to scale things.

So in our simulator, a “snapshot” does not represent a random instant in time for a random distribution
of terminals, but rather “the average instant in time for a random distribution of terminals”. The
snapshot represents the average instant because all the measures of system load (i.e. DL interference,
time-slot usage and throughput) are time-averages.

It is still valid to perform simple averages of quantities over our snapshots. However, averaging over
the snapshots now explicitly accounts for spatial randomness only. The temporal randomness is now
handled implicitly within each snapshot through the use of time-averages in our calculations. Time-
averages feature in the evaluation of both coverage and capacity as described below.

© Copyright 2009 AIRCOM International Ltd. 7


GSM Static Simulations – V 7.0

1.2 TIME-AVERAGING IN COVERAGE EVALUATIONS


All our link budgets (in SI units, not dB) are essentially of the form

E = ( P / L ) / N,

where

E = signal to interference ratio for the link in a period of activity,


P = TX power in a period of activity,
L = linkloss,
N = time-average RX interference on the link.

To check for coverage, we set P to the maximum allowed link power and check that E meets
requirements. In other words we examine the link assuming it is active. The time-averaging affects the
coverage evaluation only because we use the time-average interference N in the link-budget.

1.3 TIME-AVERAGING IN CAPACITY EVALUATIONS


When evaluating capacity, we use time-average quantities only.

The downlink capacity constraint is that the time-average number of time-slots consumed on the sub-
cell must not exceed the number of time-slots available on the sub-cell.

Time-averages are calculated by scaling time-slots by activity factors. (Note that the activity factor for
a circuit switched (CS) resource is always 100%, regardless of the service activity factor.)

The snapshot contains no information about the instants of time at which links are active. Only two
things are known about each link:

The time-slots required to service the link in a period of activity.


The time-average interference and time-average time-slot consumption that the link produces
in the system.

1.4 WHY PRODUCE SNAPSHOTS?


The main purpose of a snapshot is to provide us with measures of system load. In particular, each
snapshot tells us:

The total number of time-slots consumed on each sub-cell.


The total DL interference power on each sub-cell.

By running many snapshots, we obtain values for these quantities for different spatial distributions of
terminals, and can then proceed to analyse DL coverage for the system.

8 © Copyright 2009 AIRCOM International Ltd.


GSM Static Simulations – V 7.0

1.5 ACTIVITY FACTORS


As explained in previous sections, activity factors are used to calculate implicit time-averages for
bearers in a simulation snapshot.

The time-slot activity factor is used to calculate the time-average time-slot consumption for a
packet-switched link.

Time-average Time-Slots = Bearer Activity x Time-Slots when Active.

Circuit-switched (CS) services consume time slots even during periods of inactivity. Therefore CS
connections are assumed to have an activity factor of 100%. A CS connection can use either a full-rate
or half-rate bearer corresponding to one time-slot or half a time-slot respectively. Which bearer is
selected depends on the achieved traffic C/I, whether the bearer supports half-rate connections and the
sub-cell traffic load.

PS Activity Factor Calculation

For a PS service, the tool automatically calculates the power-activity factor from the PS parameters in
the service definition:

Ruser User bitrate (bps).


N bytes Number of bytes per packet.
N packets Number of packets per packet call.
Ncalls Number of packet calls per session.
Tread Reading time (s).
Tinter Inter-arrival time between packets (s).
BLER
r Retransmission factor ( 0 r 1 ) in terms of BLER.
1 - BLER

Active time: Tactive 8 N bytes N packets N calls (1 r ) / Ruser

Inactive time: Tinactive ( N calls - 1) Tread N calls ( N packets 1) Tinter (1 r )

Session time: Tsession Tactive Tinactive

Tactive
Activity factor:
Tsession

© Copyright 2009 AIRCOM International Ltd. 9


GSM Static Simulations – V 7.0

10 © Copyright 2009 AIRCOM International Ltd.


GSM Static Simulations – V 7.0

2 FORMULAE

2.1 NOTATION

Symbols in subsequent sections use the following notation.

A lowercase Greek subscript always indexes a carrier.


indicates a sum over all carriers.

An uppercase Roman subscript always indexes a sub-cell.


indicates a sum over all sub-cells.
J
A lowercase Roman subscript always indexes a terminal.
indicates a sum over all terminals.
k

indicates a sum over all terminals in sub-cell J.


k J

Unless stated otherwise, all quantities and formulae are in standard SI units, not in dB.

2.2 LIST OF PRINCIPAL SYMBOLS


B Bandwidth (Hz).
hop
E Sk Bit-Error-Rate of the average hopping carrier.
E Sknon-hop Bit-Error-Rate of the average non-hopping carrier.
control
CINR Sk Averaged control CINR.
control
CINR Sk Control CINR for a single carrier.
traff
CINR Sk Averaged traffic CINR.
traff
CINR Sk Traffic CINR for a single carrier.
G diversity Diversity gain.
G Santenna Sub-cell antenna gain.
k Boltzmann’s constant.
pathloss
L Sk Pathloss between sub-cell and terminal.
antenna
L Sk Antenna masking loss.
feeder
L S Feeder loss.
LSequip Cell equipment loss
LSantenna correction Antenna correction factor
LScell correction Cell correction factor
Lindoor
k Indoor loss (= 1 for outdoor terminals).
hop
n S Number of hopping carriers.
nSnon-hop Number of non-hopping carriers.
thermal
N k Thermal noise power for terminal k.
EIRP
P S EIRP for sub-cell S.

© Copyright 2009 AIRCOM International Ltd. 11


GSM Static Simulations – V 7.0

PSoutput Output power for sub-cell S.


received
P Sk Received signal strength for sub-cell S and terminal k.
N ST RXhop Number of hopping transmitters.
non- hop
N ST RXnon-hop Number of non-hopping transmitters ( = n S ).
T Temperature in Kelvin.
slot
T S Number of timeslots in use on sub-cell S.
FR
T S Number of full rate time slots.
TSCS Number of circuit-switched time slots available on sub-cell S.
TSGPRS Number of GPRS time slots available on sub-cell S.
DT X
S Discontinuous transmission factor.
adj
Adjacent carrier interference factor (from the array settings dialog).
traff
S Traffic loading factor.
frac
S Fractional loading factor.
k Noise figure for terminal k.

12 © Copyright 2009 AIRCOM International Ltd.


GSM Static Simulations – V 7.0

2.3 DOWNLINK POWER FORMULAE


DL Received Signal Strength

The received signal strength for sub-cell S and terminal k is calculated as:

1 1
PSkreceived PSEIRP pathloss antenna indoor
(2)
L Sk Sk L L k
where
PSoutputGSantenna
PSEIRP equip antenna correction cell correction
Lfeeder
S LS LS LS

pathloss antenna
The product LSk L
Sk is read from the prediction file. The received signal strength must meet the
receiver sensitivity requirement on the terminal for a connection to be possible.

DL Thermal Noise

N kthermal kT B k . (3)

DL Traffic CINR

traff 1 N ST RX hop E Sk
hop
N ST RX non-hop E Sk
non-hop
CINR Sk BER . (4)
N ST RX hop N ST RX non-hop

Where BER-1 is a function which maps bit error rates to values in decibels via the C/I BER conversion
table. For the purposes of the GSM simulator this is a CINR BER conversion table.

Figure 1

Hence, the CINR BER table is used as a means of averaging values in decibels during the CINR
calculation. However, the BER table has a minimum CINR value of -10dB and a maxiumum of 27dB.
The default BER values are plotted in Figure 1.

© Copyright 2009 AIRCOM International Ltd. 13


GSM Static Simulations – V 7.0

The highest possible CINR value is achieved with a strong signal and no carrier interference. Assume
the maximum received signal strength is 1W and that there is minimal thermal noise. This gives a
maximum CINR value of:

1 1
CINR traff
Sk 23
150dB .
kTB 1.38 10 .293. 200 103

Therefore an equation is required to calculate new BER default values up to 150dB. An assumption is
made that the line between 25 and 26dB can be extrapolated with the same gradient. This gives a
gradient of -2 and an intercept of 42 which yields an equation for BER:

log10 (BER ) 20 log10 CINR 42 .

This results in a graph as shown in Figure 2.

0
-20 -10 0 10 20 30 40 50

-10

-20
log(BER)

-30

-40

-50

-60
C/I (dB)

Figure 2

Bit Error Rate for the Average Hopping Carrier

nshop
BER CINR Sk
hop diversity 1 1
E Sk BER G BER (5)
nshop

The summation is restricted to the hopping carriers on sub-cell S. The diversity gain is read from the
frequency hopping diversity gain table, shown in Figure 3.

14 © Copyright 2009 AIRCOM International Ltd.


GSM Static Simulations – V 7.0

Figure 3

The index into the diversity gain table is the number of carriers, n, and is calculated as:

hop ant gain


n S

Where

hop nShop frequency diversity is selected and sub - cell supports hopping
S
1 otherwise.

ant gain 2 antenna hopping is selectedand sub - cellsupports antenna hopping


1 otherwise.

Bit Error Rate for the Average Non-Hopping Carrier

nsnon hop

BER CINR Sk
non hop diversity 1 1
E Sk BER G BER (6)
nshop

The summation is restricted to the non-hopping carriers on sub-cell S.

CINR for a Single Carrier

PSkreceived
(CINR) Sk DTX frac
(7)
J . J . Jtraff .PJkreceived .u N kthermal
J S

with the adjacent and overlapping carrier factor, u , given by

© Copyright 2009 AIRCOM International Ltd. 15


GSM Static Simulations – V 7.0

1 if ,
adj
u if is adjacent to
0 otherwise.

Traffic Loading Factor

TSslot
traff
S . (8)
TSCS TSGPRS

Fractional Loading Factor

N ST RX hop
if nShop 0
frac nShop
S
1 if nShop 0

Averaged Control CINR

The averaged control CINR is calculated in a similar way to the traffic CINR. The difference is that
total hopping and non-hopping BER values are calculated by summing values over control layer
carriers only.

16 © Copyright 2009 AIRCOM International Ltd.


GSM Static Simulations – V 7.0

3 SNAPSHOT OVERVIEW

The key purpose of a snapshot is to provide us with measures of system load for a particular
distribution of terminals. To obtain these measures of system load, we must calculate time-slot
consumption for all the links in the system. A snapshot involves the following stages:

Creating a random terminal distribution.


Setting random terminal parameters (speeds, shadow fades).
Calculating traffic load using iterations.
Gathering results.

3.1 RANDOM TERMINAL DISTRIBUTION


The first stage of a snapshot involves creating a random distribution of terminals representing the
offered traffic in the network. The spatial distribution of terminals must be random, but more
importantly it must be unbiased. In other words, it must be reasonable compared to the terminal
density array provided by the user. To see how this is achieved, we need only consider a single pixel
(bin) in the simulation.

Consider a pixel that has a terminal density of D terminal/km2 and an area of A km2, so that the average
number of terminals in the pixel is DA. We note that:

Terminal occurrences within the pixel are independent of each other and are spatially uniform
within the pixel. In other words, a terminal is just as likely to be located at one point within
the pixel as any other point within the pixel.
The probability that two or more terminals are located at exactly the same point within a pixel
is zero. This is simply because there is an infinite number of locations within the pixel.

These imply that terminal occurrence is a spatial Poisson process within the pixel. Therefore the total
number of terminals in the pixel satisfies the Poisson distribution:

( DA) k e DA
P( k terminals ) .
k!

We choose the number of terminals to assign to the pixel by drawing a number from this Poisson
distribution. Doing this at each pixel ensures our terminal distribution is unbiased. Since the sum of
many Poisson distributions is also a Poisson distribution, the total number of terminals in the snapshot
will also be Poisson distributed.

One may note that if the average number of terminals at a pixel is small (DA << 1), then working to
first order in DA,

P( 0 terminal ) (1 DA) ,
P( 1 terminal ) DA.

So one is effectively making a binary decision about whether a terminal should be placed at the pixel.

After creating the random terminal distribution, the terminals are randomly sequenced. This
determines the order in which they will be considered during the iterations.

Terminals are randomly assigned as being indoor or outdoor, according to their terminal type and the
clutter type in which they reside. Indoor terminals are all given a speed of zero.

© Copyright 2009 AIRCOM International Ltd. 17


GSM Static Simulations – V 7.0

3.2 TIME-SLOT ITERATIONS

The main task of a snapshot is to calculate the traffic loading of the network. At the beginning of the
snapshot, the system is placed in a state of an unloaded network. This is achieved by making all time-
slots available on all sub-cells, i.e. with no terminals connected. Traffic loading is then calculated
iteratively by cycling repeatedly though the list of randomly spread terminals and attempting to make a
connection. The following logic is applied to each terminal:

- If the terminal is already connected then disconnect it by freeing the time-slots used at the
sub-cell by the terminal.
- Recalculate the control and traffic CINR values to account for the new traffic load.
- Try and connect the terminal to the network in the most favourable way possible. The
way in which the terminal connects may be different from the way the terminal connected
previously. This difference arises because the system load may have changed since the
previous iteration.
- If a connection is possible then connect the terminal. Update the time-slots used at the
sub-cell to reflect the terminal’s connection. Recalculate the control and traffic CINR
values to account for the altered traffic load.

Several cycles through the terminal list are needed to achieve a stable system load. On the first cycle,
the first few terminals will experience very little interference because the network is not fully loaded.
The lack of interference means that these terminals can use higher data-rate bearers which have high
CINR requirements. As a consequence, these terminals use fewer time-slots on the sub-cell than if they
connected using lower data-rate bearers. As the system becomes loaded, interference increases. On
subsequent iterations, the terminals may achieve lower traffic CINR values and hence connect using
lower data-rate bearers. Lower data-rate bearers require more time-slots than higher rate bearers and
hence consume more time-slots on the sub-cells. After several cycles, the traffic loading no longer
changes significantly. The iterations have converged to produce a plausible picture of served and failed
terminals in the network.

3.3 CONVERGENCE TEST

A good practical measure of convergence is to examine how the traffic load changes between cycles.
The user need only enter one parameter in the “convergence criterion for iterations” section of the
wizard for this convergence check. After each cycle through the terminal list, the percentage change in
traffic load is noted. If the change in traffic load falls within the specified limit for fifteen iterations
then the snapshot is considered to have converged.

3.4 GATHERING OF RESULTS


The final stage of a snapshot involves gathering results. The information gathered includes sub-cell
information (e.g. time-slot usage), information about the states of “connected” terminals, and the
failure reasons of terminals which failed to be served.

18 © Copyright 2009 AIRCOM International Ltd.


GSM Static Simulations – V 7.0

4 CONNECTION EVALUATION IN A SNAPSHOT


4.1 CONNECTION SCENARIO PRIORITISATION
The connection scenario describes how a terminal “connects” to the network. It consists of the
following parameters:

The cell-layer used for the connection


The sub-cell load status (overloaded / under-loaded). A sub-cell is considered over-loaded if
the percentage of time-slots used is above the overflow load threshold.
The sub-cell for the connection (this is where the time-slots are consumed).
The traffic CINR of the sub-cell.
The downlink bearer used for the connection.

Typically, several connection scenarios are available to each terminal. Our snapshot attempts to
connect the randomly spread terminals to the network in the most favourable way possible. Logic is
required for ranking the different scenarios that each terminal may use.

The rules for ranking scenarios during connection evaluation are (in order of decreasing importance):

Prefer under-loaded sub-cells to overloaded sub-cells.


Prefer higher priority cell-layers to lower priority cell-layers.
Prefer higher traffic CINR to lower traffic CINR.
Prefer higher priority DL bearers to lower priority DL bearers.

The connection scenarios for each terminal are evaluated in turn (from most to least favoured) until one
that permits a network connection is found. The scenario employed by a terminal may change each
time it is evaluated in the loading iterations, and this flexibility provides us with link adaptation.

A downlink evaluation is carried out to examine the connection scenario and determine whether a
connection is possible.
.
4.2 GSM DOWNLINK EVALUATION

Received Signal Strength Check

The received signal strength must meet the receiver sensitivity requirement on the terminal for a
connection to be possible.

Traffic CINR and Control CINR Check


For the terminal to connect to a sub-cell, the control CINR must meet the terminal’s BCCH CINR
requirement. The traffic CINR is used to determine whether the bearer can be used for the connection.
A further check is made to ensure that the bearer is supported on the sub-cell. If the bearer is supported
and there are time-slots available on the sub-cell then the traffic CINR is used to establish how many
time-slots are required for the connection.

© Copyright 2009 AIRCOM International Ltd. 19


GSM Static Simulations – V 7.0

4.3 FAILURE REASONS


A connection scenario can fail for one or more of the following reasons:

Low Signal.
The received signal does not meet the receiver sensitivity requirement specified on the
terminal type.

No Cell Time-Slots.
The sub-cell has too few time-slots to serve the bearer.

No Terminal Time-Slots
The terminal has too few time-slots available for the connection.

Low Control Channel CINR


The best server cannot meet the CINR requirement of the terminal.

Low Traffic Channel CINR


The best server cannot meet the CINR requirement of the bearer.

High Pathloss.
There is no sub-cell on the pixel with a pathloss value sufficient to be considered as a serving
sub-cells.

If all of the connection scenarios available to a terminal fail to produce a connection, then the terminal
is classed as a failure. Each scenario in the list can fail for multiple reasons. Also, different scenarios
in the list can fail for different sets of reasons. All of this makes failure reporting problematic. For
example, consider a terminal with the following scenario list containing only 2 scenarios:

Cell Name Cell Layer CINR Ctrl DL Bearer Problems


Cell_X CellLayer_A 4 dB 12kbps Low ctrl CINR & traffic CINR
Cell_Y CellLayer_B 20 dB 12kbps No Cell Time-Slots

In this example, CellLayer_A has a higher priority than CellLayer_B. This makes Cell_X the top
scenario even though it has a worse CINR than Cell_Y. What is the correct reason for failure for this
terminal? There is no correct way of assigning this. The tool records the failure reasons of the top
scenario only. In most cases the top scenario provides the most useful information as to why a terminal
fails. In the above example, the terminal is deemed to fail because of problems with Low Control
Channel CINR and Low Traffic CINR on Cell_X. The terminal contributes to the failure statistics for
Cell_X only, not Cell_Y. Hence the terminal does not affect the failure statistics for No Cell Time-
Slots.

20 © Copyright 2009 AIRCOM International Ltd.


GSM Static Simulations – V 7.0

5 OUTPUT ARRAYS

5.1 ARRAY DEPENDENCIES


All arrays are produced on a per cell-layer basis. Many arrays depend on whether the terminal is taken
to be indoor or outdoor. Indoor arrays use the in-building parameters for the clutter type at each pixel
(i.e. indoor loss and indoor shadow-fading standard deviation).

Coverage arrays can be drawn even if no snapshots have been run, but the user should note that the
arrays then refer to coverage in an unloaded system. To obtain coverage arrays for a loaded system the
user must run some snapshots; the key purpose of running snapshots is to provide measures of traffic
load. The arrays change little after a relatively small number of snapshots have been performed (10s of
snapshots in most cases). This is because only a small number of snapshots are needed to get an idea
of the average loading on each sub-cell.

The following table lists the types of array that are available in the Simulator, and shows some of their
dependencies. Most terms (e.g. Indoor) are self explanatory.

“Fading” means the array depends on the standard deviation of shadow fading for the clutter type.

CE=Cell Layer, T=Terminal, S=Service, I=Indoor, F=Fading

CE T S I F
Achievable Bitrate X X X X
All Servers X X X
Best Server by RSS X
CINR (Control) X X X
CINR (Traffic + Control) X X X
Coverage Probability X X X X
DL Loss X X X
Nth Best Server by RSS X
Nth CINR (Traffic + Control) X X X
Nth DL Loss X X X
Nth RSS X
RSS X X X

© Copyright 2009 AIRCOM International Ltd. 21


GSM Static Simulations – V 7.0

5.2 PATHLOSS ARRAYS


DL Loss & Nth DL Loss
Dependencies: Terminal, Cell layer, Indoor

These are the lowest (and Nth lowest) downlink losses. They represent average values and are
therefore calculated with fades of 0 dB.

5.3 COVERAGE ARRAYS


These arrays all provide information on coverage levels and coverage probabilities.

Best DL Cell by RSS


Dependencies: Cell Layer

This is the sub-cell that provides the highest RSS for the terminal.

Best RSS & Nth Best RSS


Dependencies: Terminal, Cell Layer, Indoor

These are the highest (and Nth highest) RSS levels. They represent average values and are therefore
calculated with fades of 0 dB.

RSS Coverage Probability


Dependencies: Terminal, Cell Layer, Indoor, Fading

This is the probability that the Best DL Cell (by RSS) satisfies the RSS requirement specified on the
terminal type. This probability depends on the standard deviation of shadow fading for the clutter type
at the pixel. If this standard deviation has been set to zero, then there are only three possible coverage
probabilities: 0% if the requirement is not satisfied, 50% if the requirement is satisfied exactly, and
100% if the requirement is exceeded.

CINR (Control)
Dependencies: Terminal, Cell Layer, Indoor

These are the CINR(Control) values corresponding to the best serving sub-cells, i.e. not necessarily the
highest CINR(Control) values.

CINR (Traffic + Control) & Nth CINR (Traffic + Control)


Dependencies: Terminal, Cell Layer, Indoor

These are the CINR(Traffic + Control) values corresponding to the best (and Nth best) serving sub-
cells, i.e. not necessarily the highest (and Nth highest) CINR(Traffic + Control) values.

Achievable Bitrate
Dependencies: Terminal, Cell Layer, Service, Indoor

This is the highest bitrate that can be achieved by the terminal based on CINR regardless of system
loading.

22 © Copyright 2009 AIRCOM International Ltd.


GSM Static Simulations – V 7.0

6 COVERAGE ARRAY CALCULATIONS

The term coverage is used in the classical sense. It looks at the problem of a received signal being of
sufficient strength/quality given that it has been transmitted through a lossy channel with shadow
fading. Coverage probabilities are calculated analytically. This means that coverage plots can be
obtained after running a very small number of snapshots (typically 10s) and plots converge very
quickly. If no snapshots have been run, then coverage plots are still available but they give the
coverage probabilities in an unloaded system.

We will examine the different ways in which shadow fading affects our calculations. There are
essentially three cases to consider.

How fading is handled in the simulation snapshots.


How fading is handled when calculating mean values of quantities.
How fading is handled when calculating coverage probabilities.

6.1 NOTATION
We introduce the following notation to represent the probability density function for a normally
distributed random variable with mean and standard deviation .

1 (x )2
N (x; , ) exp 2
2 2 2

6.2 FADES IN THE SIMULATION SNAPSHOTS

Shadow fading is modelled in a snapshot by randomising the pathlosses experienced by the randomly
scattered terminals. Shadow fades are log-normally distributed, and the user specifies the shadow
fading standard deviation for indoor and outdoor terminals in each clutter type. In reality, the fades
between a terminal and the cells that cover it will exhibit a degree of correlation. In particular, a
terminal is likely to have similar fades to cells that are located on the same site. To account for this, the
user specifies two parameters in the Monte Carlo Wizard:

The normalised inter-site correlation coefficient ( cinter ). This is the correlation between
fades to cells on different sites.

The normalised intra-site correlation coefficient ( cintra ). This is the correlation between
fades to cells on the same site.

These two parameters must satisfy the constraints 0 c inter c intra 1 . For each randomly scattered
terminal in a snapshot, a set of correlated fades to the covering cells is generated using the following
procedure. All the random numbers mentioned below are independent and normally distributed with
zero mean and unit variance, and is the standard deviation of the shadow fading at the pixel in dB.

Generate a random number X .


For each site I, generate a random number YI .

For each sub-cell J, generate a random number Z J .

The fade (in dB) to cell J on site I is then set to

© Copyright 2009 AIRCOM International Ltd. 23


GSM Static Simulations – V 7.0

c inter X c intra c inter YI 1 c intra Z J .

The above procedure is performed for each of the randomly scattered terminals at the beginning of a
snapshot. Fades for different terminals are uncorrelated even if they are located in the same pixel.

6.3 FADES IN ARRAYS FOR MEAN VALUES


Arrays showing the mean level of a quantity (e.g. DL linkloss, RSS, CINR, etc) are calculated with all
fades set to 0 dB.

6.4 FADES IN COVERAGE ARRAY CALCULATIONS


RSS Coverage Probability

In the absence of fading, let the RSS (in Watts) for sub-cell J be represented by

RJ .

If sub-cell J has a fade of FJ dB, then the RSS is given by

FJ / 10
RJ (10 ).

We can calculate a coverage probability for the RSS as follows:

Find the fade FJ that causes the RSS to satisfy exactly the RSCP requirement specified on the
terminal type. Call this fade F * . Note that F * may be positive or negative. Any fade bigger
than F * will give an inadequate RSS.
Since FJ is normally-distributed with a mean of 0 dB and standard deviation of dB, the
probability that FJ F * is given by

P ( FJ F*) N ( FJ ; 0, )dFJ .
F*

This is the probability that the RSS meets the requirement.

24 © Copyright 2009 AIRCOM International Ltd.

You might also like