Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 48

LTE Drive Test Parameters

Some important indicator LTE


drive test parameters:
1. RSRP : Reference Signal Received Power.
2. RSRQ : Reference Signal Received Quality.
3. RSSI : Received Signal Strength Indicator.
4. SINR : Signal to Interference Noise Ratio.
5. CQI : Channel Quality Index.
6. PCI : Physical Cell Identity.
7. BLER: Block Error Ratio.
8. DL Throughput : Down Link Throughput.
9. UL Throughput : Up Link Throughput

This is the common key performance parameters for LTE drive test parameter we have to work
out for LTE drive test task.
1. RSRP:
RSRP – The average power received from a single Reference signal, and Its typical range is
around -44dbm (good) to -140dbm(bad).
RSRP (dBm) = RSSI (dBm) – 10*log (12*N)

2. RSRQ:
RSRQ – Indicates quality of the received signal, and its range is typically -19.5dB(bad) to -3dB
(good).

Reference Signal Received Quality (RSRQ) is defined as the ratio N×RSRP/(E-UTRA carrier
RSSI),
where N is the number of RB’s of the E-UTRA carrier RSSI measurement bandwidth.
The measurements in the numerator and denominator shall be made over the same set of
resource blocks.
3. RSSI:
RSSI – Represents the entire received power including the wanted power from the serving cell as
well as all co-channel power and other sources of noise and it is related to the above parameters
through the following formula:
RSRQ=N*(RSRP/RSSI)
Where N is the number of Resource Blocks of the E-UTRA carrier RSSI measurement
bandwidth.
RSSI (Received Signal Strength Indicator) is a parameter which provides information about total
received wide-band power (measure in all symbols) including all interference and thermal noise.
RSSI is not reported to e-NodeB by UE. It can simply be computed from RSRQ and RSRP that
are, instead, reported by UE.
RSSI = wideband power = noise + serving cell power + interference power
So, without noise and interference, we have that 100% DL PRB activity: RSSI=12*N*RSRP
Where:

 RSRP is the received power of 1 RE (3GPP definition) average of power levels received
across all Reference Signal symbols within the considered measurement frequency
bandwidth
 RSSI is measured over the entire bandwidth
 N, number of RBs across the RSSI, is measured and depends on the BW

4. SINR:
SINR is the reference value used in the system simulation and can be defined:

 Wide band SINR


 SINR for a specific sub-carriers (or for a specific resource elements)

All measured over the same bandwidth!

RSSP vs RSRQ vs RSSI vs SINR


Below is a chart that shows what values are considered good and bad for the LTE signal strength
values:

Reference Signals recap: OFDMA Channel Estimation


In simple terms the Reference Signal (RS) is mapped to Resource Elements (RE). This mapping
follows a specific pattern (see to below).

 So at any point in time the UE will measure all the REs that carry the RS and average the
measurements to obtain an RSRP reading.
 Channel estimation in LTE is based on reference signals (like CPICH functionality in
WCDMA)
 Reference signals position in time domain is fixed (0 and 4 for Type 1 Frame) whereas in
frequency domain it depends on the Cell ID
 In case more than one antenna is used (e.g. MIMO) the Resource elements allocated to
reference signals on one antenna are DTX on the other antennas
 Reference signals are modulated to identify the cell to which they belong
Impact of serving cell power to RSRQ:
Example for noise limited case (no interference): If all resource elements are active and are
transmitted with equal power, then

 RSRQ = N / 12N = -10.8 dB for 1Tx


 RSRQ = N / 20N = -13 dB for 2Tx taking DTX into account

(because RSRP is measured over 1 resource element and RSSI per resource block is measured
over 12 resource elements).
Remember that RSSI is only measured at those symbol times during which RS REs are
transmitted – We do not have to take into the count DTx!!!
So, when there is no traffic, and assuming only the reference symbols are transmitted (there are 2
of them within the same symbol of a resource block) from a single Tx antenna then the RSSI is
generated by only the 2 reference symbols so the result becomes

 RSRQ = N / 2N = -3 dB for 1Tx


 RSRQ = -6dB for 2Tx

SNR vs. RSRP


RSRP is measured for a single subcarrier, noisepower for 15KHz= -125.2dBm
 Noise figure = 7 dB
 Temperature = 290 K

Assumption: RSRP doesn’t contain noise power

Power Calculation Example


Lets try to calculate RSRP, RSSI and RSRQ for one very simple case of one resource block with
12 sub carriers and 0.5 ms in time domain. Let’s assume the power of reference symbols (shown
by red square) and power of other symbols carrying other data channels (shown by blue square)
is same i.e. 0.021 watt Since RSRP is linear average of downlink reference signal for given
channel bandwidth therefore
RSRP = 10*log (0.021*1000) = 13.2 dBm
While RSSI is total received wide-band power. Therefore we have to add power of all 12 carriers
in the given resource block
RSSI = 10*log(0.021*1000)+10*log(12) = 24 dBm
RSRQ is now simple ratio of RSRP to RSSI with N=1
RSRQ = 10*log(0.021/(12*0.021)) = -10.79 dB
Understanding dBm vs dB
dB is ratio between two power values while dBm is used to express an absolute value of power.
So when we mention RSRP and RSSI we shall always use dBm since we are talking about
absolute power values but we need to use dB with RSRQ since it is the ratio of RSRP to RSSI
5. CQI:
The Channel Quality Indicator (CQI) contains information sent from a UE to the eNode-B to
indicate a suitable downlink transmission data rate, i.e., a Modulation and Coding Scheme
(MCS) value. CQI is a 4-bit integer and is based on the observed signal-to-interference-plus-
noise ratio (SINR) at the UE. The CQI estimation process takes into account the UE capability
such as the number of antennas and the type of receiver used for detection. This is important
since for the same SINR value the MCS level that can be supported by a UE depends on these
various UE capabilities, which needs to be taken into account in order for the eNode-B to select
an optimum MCS level for the transmission. The CQI reported values are used by the eNode-B
for downlink scheduling and link adaptation, which are important features of LTE.
In LTE, there are 15 different CQI values randing from 1 to 15 and mapping between CQI and
modulcation scheme, transport block size is defined as follows (36.213)
6. PCI:
Cell ID sets the physical (PHY) layer Cell ID. This PHY-layer Cell ID determines the Cell ID
Group and Cell ID Sector. There are 168 possible Cell ID groups and 3 possible Cell ID sectors;
therefore, there are 3 * 168 = 504 possible PHY-layer cell IDs. When Cell ID is set to Auto, the
demodulator will automatically detect the Cell ID. When Cell ID is set to Manual, the PHY-layer
Cell ID must be specified for successful demodulation.
The physical layer cell id can be calculated from the following formula:
PHY-layer Cell ID = 3*(Cell ID Group) + Cell ID Sector
When Sync Type is set to C-RS, the Cell ID Auto selection will be disabled, and Cell ID must be
specified manually. This is because the demodulator needs to know the values of the C-RS
sequence to use for synchronization and because Cell ID determines these values. See RS-PRS
for more information.
7. BLER:
3GPP TS 34.121, F.6.1.1 defines block error ratio (BLER) as follows: "A Block Error Ratio is
defined as the ratio of the number of erroneous blocks received to the total number of blocks
sent. An erroneous block is defined as a Transport Block, the cyclic redundancy check (CRC) of
which is wrong."

8/9. DL/UL Throughput:


assume a 2×5 MHz LTE system. We first calculate the number of resource elements (RE) in a
subframe (a subframe is 1 msec):
12 Subcarriers x 7 OFDMA Symbols x 25 Resource Blocks x 2 slots = 4,200 REs
Then we calculate the data rate assuming 64 QAM with no coding (64QAM is the highest
modulation for downlink LTE):
6 bits per 64QAM symbol x 4,200 Res / 1 msec = 25.2 Mbps
The MIMO data rate is then 2 x 25.2 = 50.4 Mbps. We now have to subtract the overhead related
to control signaling such as PDCCH and PBCH channels, reference & synchronization signals,
and coding. These are estimated as follows:
 PDCCH channel can take 1 to 3 symbols out of 14 in a subframe. Assuming that on
average it is 2.5 symbols, the amount of overhead due to PDCCH becomes 2.5/14 =
17.86 %.
 Downlink RS signal uses 4 symbols in every third subcarrier resulting in 16/336 = 4.76%
overhead for 2×2 MIMO configuration
 The other channels (PSS, SSS, PBCH, PCFICH, PHICH) added together amount to
~2.6% of overhead

The total approximate overhead for the 5 MHz channel is 17.86% + 4.76% + 2.6% = 25.22%.
The peak data rate is then 0.75 x 50.4 Mbps = 37.8 Mbps.
Note that the uplink would have lower throughput because the modulation scheme for most
device classes is 16QAM in SISO mode only.
There is another technique to calculate the peak capacity which I include here as well for a 2×20
MHz LTE system with 4×4 MIMO configuration and 64QAM code rate 1:

Downlink data rate:

 Pilot overhead (4 Tx antennas) = 14.29%


 Common channel overhead (adequate to serve 1 UE/subframe) = 10%
 CP overhead = 6.66%
 Guard band overhead = 10%

Downlink data rate = 4 x 6 bps/Hz x 20 MHz x (1-14.29%) x (1-10%) x (1-6.66%) x (1-10%) =


298 Mbps.
Uplink data rate:
1 Tx antenna (no MIMO), 64 QAM code rate 1 (Note that typical UEs can support only 16QAM)

 Pilot overhead = 14.3%


 Random access overhead = 0.625%
 CP overhead = 6.66%
 Guard band overhead = 10%

Uplink data rate = 1 * 6 bps/Hz x 20 MHz x (1-14.29%) x (1-0.625%) x (1-6.66%) x (1-10%) =


82 Mbps.
Alternative to these methods, one can refer to 3GPP document 36.213, Table 7.1.7.1-1, Table
7.1.7.2.1-1 and Table 7.1.7.2.2-1 for more accurate calculations of capacity.

To conclude, the LTE capacity depends on the following:

 Channel bandwidth
 Network loading: number of subscribers in a cell which impacts the overhead
 The configuration & capability of the system: whether it’s 2×2 MIMO, SISO, and the
MCS scheme.
Throughput Troubleshooting
DL
UL

LTE Parameters Planning

Content
Part:1 Basic Cell Parameter Planning Part:2 Tracing Area Planning Part:3 PCI Planning
Part:4 PRACH Planning Part:5 Neighboring Cell Planning Part:6 Frequency Planning
Part:1 Basic Cell Parameter Planning
Basic Cell Parameter: ECGI Planning
ECGI = PLMN + Cell Identity

 PLMN = MCC + MNC


 Cell Identity = eNodeB ID + Cell ID

Parameter Description

 ECGI : It indicates the E-UTRAN cell global identifier.


 MCC: It indicates the country code of the mobile subscriber.
 MNC: Its indicates the code of network used by the mobile subscriber.
 Cell Identity: It is of 28 bits. The former 20 bits indicate the eNodeB ID, and the latter 8
bits indicate the cell ID.

Basic Cell Parameter:ECGI Planning


1. MCC: It is of 3 bits. Its value ranges from 0 to 999.

2. MNC: It is of 2 bits or 3 bits. Its value ranges from 0 to 999.

3. eNodeB ID: Its value ranges from 0 to 1048575. The eNodeB ID is unique to every eNodeB in
the same PLMN. When you are planning the eNodeB ID, you need to take the network scale into
account. Generally speaking, there is small-sized network, standard-sized network, large-sized
network and shared network.
4. Cell ID: It is unique to every cell in the same eNodeB. Its value ranges from 0 to 255.
Basic Cell Parameter: eNodeB ID
1. Standard-Sized Network
The eNodeB ID appears to be ABCDEF in a standard-sized network.
The first two figures (namely AB) indicate the city where the eNodeB is located.
The last figure (namely F) indicates whether it is an indoor eNodeB or an outdoor eNodeB. If the
last figure appears to be “0”, it is an indoor eNodeB. Otherwise, it is an outdoor eNodeB.
2. Large-Sized Network
In most cases, the eNodeB ID appears to be ABCDEF.
The first two figures (namely AB) indicate the city where the eNodeB is located.
Different AB combination indicates different cities. The AB combination can indicate at most 90
cities, each of which can hold 9999 eNodeBs at most. Sometimes, the network may cover more
than 90 cities. In this case, use every AB combination to indicate two or more than two cities.
Each city can hole at most 5000 eNodeBs.
The last figure (namely F) indicates whether it is an indoor eNodeB or an outdoor eNodeB. If the
last figure appears to be “0”, it is an indoor eNodeB. Otherwise, it is an outdoor eNodeB.
In some special cases, if F appears to be “9”, it is a remote eNodeB.

3. Shared Network If it is a shared network, for example the TDD-FDD network in Hi3G
project, you will use 6-digit eNodeB ID (ABCDEF).
The first figure (namely A) indicates the network schema. “1” stands for the TDD network, and
“5” stands for the FDD network.
The second figure (namely B) indicates the city where the eNodeB is located.
The third figure (namely C) may indicate the administrative region where the eNodeB is located.
The last figure (namely F) indicates whether it is an indoor eNodeB or an outdoor eNodeB. If the
last figure appears to be “0”, it is an indoor eNodeB. Otherwise, it is an outdoor eNodeB

Basic Cell Parameter: CP


CP Selection for Physical Channel

 Parameter Description
 This parameter indications the cyclic prefix(CP) of the OFDM symbol,which is used to
determine the total number of OFDM symbols within one slot. When this parameter is set
to normal cyclic prefix, it implies that seven OFDM symbols are available within one
slot. When this parameter is set to extended cyclic prefix, it implies that six OFDM
symbol are available within one slot.

Value Range and Step Length

 Value Range: enum (normal cyclic prefix, extended cyclic prefix)


 Default Value: normal cyclic prefix
 Configuration Principles
 The cp is dependent on the multipath delay of a radio channel. In the presence of either a
large mutipath delay or a large cell radius, extended cyclic prefix is recommended.
 The extended cyclic prefix option can suppress radio interference caused by multipath
delay, but suffering from lower system capacity, and therefor it is recommended that you
set it to the default value.

Basic Cell Parameter: Bandwidth


 Downlink System Bandwidth
 Parameter Description
o This parameter indicates the system bandwidth in the downlink, which is used to
determine the frequency domain location of the downlink physical channel as
well as downlink frequency allocation.
o Value Range and Step Length
o Value Range: enum (6, 15, 25, 50, 75, 100) Unit RB
o Default Value: 100
 Configuration Principles
o This parameter is dependent on the frequency bandwidth acquired by a mobile
operator. The downlink system bandwidth can either be identical to or different
from the uplink system bandwidth.
o Modifying this parameter can have an impact on downlink resource allocation
 Uplink System Bandwidth
 Parameter Description
o This parameter indicates the system bandwidth in the uplink , which is used to
determine the frequency domain location of the uplink physical channel as well as
uplink frequency allocation.
o Value Range and Step Length
o Value Range: enum (6, 15, 25, 50, 75, 100) Unit RB
o Default Value: 100
 Configuration Principles
o This parameter is dependent on the frequency bandwidth acquired by a mobile
operator. The system uplink bandwidth can either be identical to or different from
the downlink system bandwidth.
o Modifying this parameter can have an impact on uplink resource allocation

Basic Cell Parameter: Transmit Power


 Cell Max Transmit Power
 lParameter Description
o This parameter specifies the maximum available transmit power.
 Value Range and Step Length
o Value Range: float (0, …, 50) step 0.1 Unit dBm
o Default Value: 43
 Configuration Principles
o The default value is intended to be used in the following environment:

Basic Cell Parameter: Transmit Power


 Cell Transmit Power
 lParameter Description
o This parameter specifies the used transmit power.
 Value Range and Step Length
o Value Range: float (0, …, 50) step 0.1 Unit dBm
o Default Value: 43
 Configuration Principles
o For the environment information about the use of the default value, see page
13(Cell Max Transmit Power).
o This parameter is dependent on the cell radius and the planned downlink
throughput at the cell edge. The greater the cell radius or the planned downlink
throughput at the cell edge, the greater the value of this parameter is required.
 Cell-specific Reference Signals Power
 Parameter Description
o This parameter specifies the absolute power value of the cell reference signal for
each resource element.
 Value Range and Step Length
o Value Range: int (-60, …, 50) Unit dBm
o Default Value: 6
 Configuration Principles
o This parameter is dependent on cell coverage. The greater the cell coverage, the
greater the value of this parameter is required. This parameter should be used for
ensuring cell coverage while achieving the maximum power.
o A reference signal power value should be properly tuned in accordance with the
required power of the downlink control channel at the cell edge based on the link
estimation calculated by using such radio parameters as cell type ,cell radius, and
antenna height.

Part:2 Tracing Area Planning


Tracing Area Planning : Paging Process
 The idle UE can monitor the paging message by means of discontinuous reception
(DRX). It detects whether the PDCCH carries the P-RNTI on the paging occasion of
specified paging frame. The detection results will tell the UE whether this PDSCH carries
paging message.
o a) If the PDCCH carries the P-RNTI, the UE receives the data from the PDSCH
based on the PDSCH parameters.
o b) If the PDCCH does not carry the P-RNTI, the UE changes into the dormant
status.
 Within a DRX period, the UE can receive the PDCCH data when the paging occasion
appears, and then receive the PDSCH data based on the actual requirements.
 As specified by the LTE physical layer protocol, the radio frame No. repetition period is
1024. Every radio frame is divided into ten sub-frames. In this regard, if the UE wants to
know the accurate location of the PDCCH to be monitored, it needs to work out the radio
frame No. for this PDCCH, and then work out the paging occasion (PO) for this radio
frame number.

Tracing Area Planning : Paging Parameters


 DRX Cycle for Paging
 Parameter description
o This parameter specifies the DRX cycle for paging purposes.
 Value Range and Step Length
o Value Range: enum (32, 64, 128, 256) Unit; subframe
o Default Value:128
 Configuration Principles
o When the UE is in idle state but the DRX is being used, the UE needs to monitor
a P-RNTI in a paging occasion every DRX cycle.
o Modifying this parameter can have an impact on other UEs being in idle state.
 nB used to derive the Paging Frame and Paging Occasion
 Parameter description
o nB is used to derive the paging frame and paging occasion, as defined in
TS36.304
 Value Range and Step Length
o Value Range: enum (4T, 2T, T, 1/2T, 1/4T, 1/8T, 1/16T, 1/32T)
o Default Value:T
 Configuration Principles
o T represents a paging cycle. For example 2T indicates two default paging cycles.
o It indicates the paging attempts made by a radio frame. Its value can be 4T
 The Parameter to Detemine BCCH Modification Period
 Parameter description
o This parameter is used to determine the BCCH modfication period(BCCH
modification period=N*DRX cycle length for paging).The purpose of this
constraint is to ensure that all the UEs being in idle state can monitor the system
broadcast change message.
 Value Range and Step Length
o Value Range: enum (2,4,8,16)
o Default Value:4
 Configuration Principles
o The greater this parameter, the longer the system message is updated.This can
have a adverse impact on real-time message update.
o The smaller this parameter, the shorter the system message is updated. This can
cause the UE to monitor the system Info Value Tag more frequently

Tracing Area Planning

 TAC: It indicates a tracing area in a PLMN. It is used to manage the UE location and find
the desired UE.
o 1. The TAC is unique in a PLMN.
o 2. A cell must belong to a tracing area (TA) exclusively. When you configure the
TAC, you need to consider the quantity of cells in this TA.
o 3. The bonding relation between the TAC and the cell is determined by the cell
size, cell type (high-speed cell or low-speed cell) and TA list configuration.
 Principles
o 1.Determine the size of tracing area based on the UE paging capability and the
network .
o 2.Avoid frequent IRAT cell re-selection and LAU/TAU.
o 3.Take the geographical features into account.
a) Do not place the tracing area boundary in the heavy-traffic area (e.g. downtown area, or
central business district). Place the boundary in the low-traffic area (e.g. suburban area, or
factories).
b) The tracing area boundary should be orthogonal or diagonal to the road. Moreover, keep the
overlapped part between tracing areas away from the area where UE moves in high speed.
c) Do not place different tracing area boundaries in the same small area. Otherwise, the UE may
frequently update the tracing area information or perform handovers between these tracing
areas.

o 4.Take the traffic increase tendency into account so as to provide tracing areas
with proper paging capacity, traffic capacity and expandability of the tracing area.

Part:3 PCI Planning

PCI Planning (1)

PCI Planning (2)


 Principles

1)If there are cell A, cell B and cell C, the cell A and the cell B make up a group of neighboring
cells while the cell B and cell C make up another group of neighboring cells, then the cell A and
the cell C must use different PCIs.
2)When you allocating PCIs to different cells controlled by the same eNodeB, all these PCIs
should comply with the mod3 principle. Additionally, consider the mod3 principle when you
allocating the PCI to the cell and its nearest neighboring cell.
3)Cells sharing the same PCI should be far from each other as much as possible.
Part:4 PRACH Planning

Random Access Parameter


1. Cell High-speed Attribute
2. Ncs Used to Generate PRACH Preamble
3. Logical Root Sequence Start Number Used to Generate PRACH Preamble
4. Number of Non-dedicated Random Access Preambles
5. Size of Random Access Preambles Group
6. Threshold of Selecting Preamble Group
7. Message Power Offset for Group B
8. the Initial RB Number for Random Access Preambles
9. PRACH Configuration Index
10. Initial Power for Preamble of PRACH
11. Power Ramping Step for PRACH
12. Max retransmit number for PRACH
13. TTI Window Size for PRACH Response
14. Max Number of Messages HARQ Transmissions
15. MAC Contention Resolution Timer
16. Dedicated Preamble Life Time

Physical Random Access Channel (PRACH) is mainly used during the random access process.
The functions of random access in LTE include the following:

-Obtaining UL synchronization during initial access and handovers.


-Assigning a unique C-RNTI for the UE during initial network access establishment.

An example
is when the status is changed from RRC_IDLE to RRC_CONNECTED.
Two scenarios are involved in the random access process:
Scenario I: Contention-Based Access
Scenario II: Contention-Free Access

There are two types of random access:

 Synchronized Random Access


 Non-synchronized Random Access

The random access is performed in two modes:


 Contention-based access (The UE selects a random preamble)
 Contention-free access (The eNodeB assigns a dedicated preamble to the UE.)

Triggers for Initial Access and Random Access

 RRC_IDLE (initial access)


 Break of radio link (initial access)
 Handover (random access)
 RRC_CONNECTED, the downlink data is arriving but the uplink is out-of-
synchronization. (random access)
 RRC_CONNECTED, the uplink data is arriving but the uplink is out-of-synchronization,
or the scheduling request is received from the PUCCH (random access)

Contention –based Access: applicable to all these five triggers


Contention-free Access: applicable to No.3 and No.4 triggers.
 PRACH Format Selection
 Considering the resources occupied by the PRACH, and the
 coverage area and features of macro cells, please select format 0
 when configuring the initial network.
 PRACH Root μ Sequence Selection Principles:

(1) The root μ sequences between neighboring cells should be different.


(2) The distance between cells whose root μ sequence should meet requirements.
(3) Select the root μ sequence with smaller cyclic shift for the high speed scenario.

 The Ncs in the high speed scenario should be proper so as to address the impact left to the
peak data rate check from the cyclic shifting caused by frequency offset.
 The recommended value is given in the protocol.
Part:5 Neighboring Cell Planning

Neighboring Cell Planning


 The neighboring cell planning aims to ensure voice quality and performance of the entire
network as the UEs on the cell edge can be handed over to their neighboring cells with
the best signals.
 The principles are as follows:

1.Normally, the geographically adjacent cells are configured as neighboring cells;


2.Oftentimes, the neighboring cell relation is bilateral; at times, the neighboring cell relation is
unilateral;
3.The number of neighboring cells should be proper. That is, either excessive or few neighboring
cells are improper. With excessive neighboring cells, the UE measurement might be overloaded;
with few neighboring cells, evitable call drops and handover failures might occur without
neighboring cells. At most 16 neighboring cells are recommended for initial configuration.
4.The neighboring cell planning should be based on the drive test and actual radio environment.
For suburban and rural areas, to ensure possible handovers, neighboring cells should be
configured even if the inter-site distance is long.
Part:6 Frequency Planning

 Usually, the entire LTE network adopts the same frequency band. For example, 20 MHz
bandwidth is used for the entire network. To avoid ICIC, you need to allocate different
bands for different cells. Ensure that two cells with great overlapped coverage should
better not use the same frequency resources.
 Currently, frequency allocation includes four modes:
 Based On Same-Frequency
 Based on SFR(Non Exclusive IC)
 Based on SFR(Exclusive IC)
 Based on Differ-Frequency
Static ICIC Realization
 Static SFR
 As shown in the left figure, the whole frequency band is divided into three equal part. f1,
f2 and f3 indicate the outer cell of three sectors.

 Static FFR

As shown in the right figure, the whole frequency band is divided into four parts. It is similar to
the case that the f1 in SFR mode is divided into three equal parts, each of which serves as the
outer cell area of three sectors. In this way, cell edge users (CEUs) are separated from cell center
users (CCUs), reducing the interference from the side lobe users in the neighboring cell to the
CCUs of the service cell.

End of Course
LTE KPI
KPI: Key Performance Indicator
The purpose is to check the performance of Network. We
have categories of KPI and numbers of KPI of each
category. In the Optimization process we have to check
the KPI value to monitor and optimize the radio network
performance in order to provide better subscriber quality
or to achieve better use of installed network resources .
Typically KPI can be categorized into following
subcategories:

Accessibility KPI

Retainability KPI

Mobility
KPI

Integrity
KPI

Availability
KPI

Utilization
KPI

Let's break down KPI per each category:

📈 Accessibility KPI
Are used to measure properly of whether services requested by users can be accessed in given
condition, also refers to the quality of being available when users needed. eg. user request to
access the network, access the voice call, data call, ......

📈 Retainability KPI
Are used to measure how the network keep user's possession or able to hold and provide the
services for the users

📈 Mobility KPI
Are used to measure the performance of network which can handle the movement of users and
still retain the service for the user, such as handover,...

📈 Integrity KPI
Are used to measure the character or honesty of network to its user, such as what is the
throughput, latency which users were served.

📈 Availability KPI
Are used to measure the availability of network, suitable or ready for users to use services.

📈 Utilization KPI
Are used to measure the utilization of network, whether the network capacity is reached its
resource.

KPIs for LTE RAN (Radio Access Network)


LTE KPI INDICATORS
 RRC setup success rate
 ERAB setup success rate
 Call Setup Success Rate
Accessibility
KPI Are used to measure properly of whether services requested by users can be
accessed in given condition, also refers to the quality of being available when
users needed. eg. user request to access the network, access the voice call, data
call, ......
 Call drop rate
 Service Call drop rate
Retainability
KPI
Are used to measure how the network keep user's possession or able to hold and
provide the services for the users
 Intra-Frequency Handover Out Success Rate
 Inter-Frequency Handover Out Success Rate
 Inter-RAT Handover Out Success Rate (LTE to WCDMA)
Mobility
KPI
Are used to measure the performance of network which can handle the
movement of users and still retain the service for the user, such as handover,...
 E-UTRAN IP Throughput
 IP Throughput in DL
 E-UTRAN IP Latency
Integrity
KPI
Are used to measure the character or honesty of network to its user, such as what
is the throughput, latency which users were served.
 E-UTRAN Cell Availability
Partial cell availability (node restarts excluded)
Availability
KPI
Are used to measure how the network keep user's possession or able to hold and
provide the services for the users
 Mean Active Dedicated EPS Bearer Utilization

Utilization
KPI
Are used to measure the utilization of network, whether the network capacity is
reached its resource.

ACCESSIBILITY KPI:

☰ RRC Setup Success Rate


RRC setup success rate is calculated based on the counter at the eNodeB when the eNodeB
received the RRC connection request from UE. Number of RRC connection attempt is collected
by the eNodeB to the measurement at point A, and the number of successful RRC connection
calculated at point C. Here's an illustration:

☰ ERAB setup success rate


ERAB setup success rate KPI shows the probability of success ERAB to access all services
including VoIP in a cell or radio network. KPI is calculated based counter ERAB connection
setup attempt (point A) and successful ERAB setup (point B). The explanation is as given in the
following illustration:
☰ Call Setup Success Rate
Call Setup Success Rate KPI call setup indicates the probability of success for all service on the
cell or radio network. KPI is calculated by multiplying the RRC setup success rate KPI, S1
signaling connection success rate KPI, and ERAB success rate KPI. The table below describes
the definition Call Setup Success Rate:
RETAIN-ABILITY KPI:

☰ Call Drop
VoIP call drop arise when VoIP ERAB release is not normal. Each ERAB associated with QoS
information. Here's an illustration of two procedures being done to release ERAB namely:
ERAB release indication and the UE context release request:

MOBILITY KPI:

☰ Intra-Frequency Handover Out Success Rate


Intra-Frequency Handover Success Rate Our KPI shows intra-frequency handover success rate
of locall cell or radio network to the intra-frequency neighboring cell or radio network. Intra-
frequency HO included in a single cell eNodeB or different eNodeB.
Intra-frequency HO scenario shown in the figure below:
No attempt HO calculations at point B. When ENodeB sending RRC connection reconfiguration
message to the EU, he will do the handover. ENodeB will count the number of times the HO
attempt at the source cell. HO calculation of success is at point C. The HO ENodeB count the
number of the source cell when ENodeB receive RRC connection reconfiguration message
complete of the EU.
Here's a scenario intra-frequency handovers inter ENodeB:

Handover attempt occurs at point B, when the source ENodeB (S-eNodeB) sends RRC
connection reconfiguration message to the UE. He decided to conduct inter ENodeB HO. in this
KPI, the source and the target cell work on the same frequency. The number of the attempt HO
calculated at the source cell. The number of successful HO occurs at point C. During HO, HO
amount which success is measured in the cell souce. This measurement appears typing S-
eNodeB received a UE context release message from the target eNode B (T-eNodeB), or the UE
context release command from the MME, which shows that the UE-eNodeB T has successfully
attach at the T-eNodeB.
The following scenarios illustrate intra frequency B HO - inter ENodeB:

Following the definition of Intra Frequency Out Handover Success Rate KPI:

☰ Inter-RAT Handover Out Success Rate (LTE to WCDMA)


Inter RAT Handover Out Success rate shows the success rate KPI HO from LTE cell or radio
network to a WCDMA cell.
Here's a scenario out inter RAT handover success rate:
Inter RAT handover success rate out

INTEGRITY KPI:

☰ E-UTRAN IP Throughput
A KPI that shows how E-UTRAN impacts the service quality provided to an end-user.
Payload data volume on IP level per elapsed time unit on the Uu interface. IP Throughput for a
single QCI:
To achieve a throughput measurement that is independent of bursty traffic pattern, it is important
to make sure that idle gaps between incoming data is not included in the measurements. That
shall be done as considering each burst of data as one sample. ThpVolDl is the volume on IP
level and the ThpTimeDl is the time elapsed on Uu for transmission of the volume included in
ThpVolDl.

☰ E-UTRAN IP Latency
A measurement that shows how E-UTRAN impacts on the delay experienced by an end-user.
Time from reception of IP packet to transmission of first packet over the Uu.
To achieve a delay measurement that is independent of IP data block size only the first packet
sent to Uu is measured.
To find the delay for a certain packet size the IP Throughput measure can be used together with
IP Latency (after the first block on the Uu, the remaining time of the packet can be calculated
with the IP Throughput measure).

T_Lat is defined as the time between receiption of IP packet and the time when the eNodeB
transmits the first block to Uu.
Since services can be mapped towards different kind of E-RABs, the Latency measure shall be
available per QoS group.
AVAILABILITY KPI:

☰ E-UTRAN Cell Availability


E-UTRAN Cell Availability.
A KPI that shows Availability of E-UTRAN Cell.
Percentage of time that the cell is considered available.

As for defining the cell as available, it shall be considered available when the eNodeB can
provide E-RAB service in the cell.
UTILIZATION KPI:

☰ Mean Active Dedicated EPS Bearer Utilization


This KPI describes the ratio of the mean number of active dedicated EPS bearer to the maximum
number of active dedicated EPS bearers provided by EPC network, and it is used to evaluate
utilization performance of EPC network.
This KPI is obtained by the mean number of dedicated EPS bearers in active mode divided by
the system capacity.
The mean number of simultaneous online and answered sessions together with maximum
number of sessions provided by network can reflect system resource utilization. If the value of
this KPI is very high, it indicates system capacity is not enough, and needs to be increased. This
KPI is focusing on network view.

G/LTE - WiFi Offload

WiFi OffLoad

WiFi OffLoad means a kind of handover (or selection/reselection) technology between


Non-WiFi network and WiFi Network. It is not a new concept, but it has become hot issue
recently especially after LTE network is wide spread. So when we say WiFi Offloading, it
usually mean that WiFi Offload (handover) between LTE network and WiFi network.

Followings are the list of topics that will be discussed in this page. I will describe these
topic at very high level as an introduction. I would write separate pages depending on the
subject.
 Who is triggering the Offload ?
 Overall Network Arichitecture for WiFi Offload
 'Trusted vs Untrusted' Access
 ANDSF, what is it ? why we need it ?
 Session Mobility
 Interplay between ANDSF and Mobility
 Interplay between UE and ANDSF
 What kind of Information are provided by ANDSF
 Typical Traffic Flow via 'Untrusted Non-3GPP Access'
o Handover from LTE to WiFi

WiFi Offload Protocol Related Notes

Followings are WiFi Offload Protocol Related pages on sharetechnote. Thease are mainly
for the initial procedure of the offloading happening right before data traffic starts.
Actually these initial procedure is the important topics you need to understand and the
procedure for real data traffic is not special for WiFi Offload. For example, if the WiFi
Offloading happens for Voice call, only the initial procedure (i.e, Handover process) is
specifically designed for WiF offloading. Once the handover protocol is completed, the data
protocol is same as regular IMS protocol.
 WiFi OffLoad : CheckList
 WiFi OffLoad : Overall Procedure of Untrusted Data Path Setup
 WiFi OffLoad : ePDG Discovery
 IKEv2

Who is triggering the offload ?

Just from the user's point of view, we can think of several user model as described below.
< Case 1 > UE-Initiated WiFi OffLoading
i) UE is in connected mode with LTE network while there is no WiFi Network
Available.
ii) UE start seeing WiFi signal.
iii) User switch the connection from LTE to WiFi Network.
Note : I should say this is over-simplified description. You may have a lot of questions
boggling in your mind. In what criteria, user decided to switch from LTE to WiFi ? You said
'Switch the connection to WiFi ?'. Exactly what do you mean by 'Switching' ? What is the
exact mechanism ? etc. I will get back to these question later.. for now, just get the big
picture.

< Case 2 > Network-Initiated WiFi OffLoading


i) UE is in connected mode with LTE network while there is no WiFi Network
Available.
ii) UE start seeing WiFi signal.
iii) Network tells UE to switch the connection from LTE to WiFi Network.
Note : I should this is over simplified description as well. You would have a lot of questions
for this as well. How network knows that UE is seeing WiFi Signal ? How network notify UE
to switch to WiFi ? etc.

Now let's think about business issues... about money. What is the motivation to go for
WiFi offloading?

What would be your motivation to Switch your communication channel from LTE to WiFi
while you are in connection?

For mobile phone user it may help him to get access to wider bandwith and probably in
lower cost or free
For mobile network operators it would help reduce the load on the LTE network by
offloading the subscriber to WiFi network

Then you may ask "What about the money for the network operator? " they may not be
able to charge for WiFi network usage as much as for LTE network but they may be able to
get some gain from load balancing and still keep some portions of the money from the
mobile user by directing to switch to the WiFi network serviced by the mobile network
operator (not free WiFi)

This is just tip of WiFi Offload and I will keep updating this page as I have further chance.
If you are eager to know the details before I update, I would recommend following
documents.
 3GPP TR 22.934 Feasibility study on 3GPP system to Wireless Local Area Network
(WLAN) interworking
 3GPP TS 23.261 IP flow mobility and seamless Wireless - Local Area Network
(WLAN) offload;Stage 2
 3GPP TS 23.402 Architecture enhancements for non-3GPP accesses
 3GPP TS 33.402 3GPP System Architecture Evolution (SAE);Security aspects of
non-3GPP accesses

Overall Network Arichitecture for WiFi Offload

Now let's get just a little bit deeper into WiFi Offload mechanism. The first thing you need
to understand is overall network architecture related to WiFi Offload. You would see
various network architecture depending various use model.

Following is the architecture showing the combination of following figures in 23.402.


 Figure 4.2.2-1: Non-Roaming Architecture within EPS using S5, S2a, S2b
 Figure 4.2.3-3: Roaming Architecture for EPS using S8 – S2c - Home Routed
 Figure 4.2.3-4: Roaming Architecture for EPS using S5, S2a, S2b – Local Breakout

Most of the components are the ones that you are already familiar with normal LTE/IMS
operation. The component and interfaces that you need to pay attention for WiFi Offload
would be as follows : (Don't try to memorize it.. just try to follow the path with pen
whenever you are studing any specific use case).
 Untrusted Non-3GPP IP
 Trusted Non-3GPP IP
 ePDG
 3GPP AAA Server
 SWu, SWn,Swa,SWm,STa,S2c,S2a,S2b

Now let's think of how WiFi network get anchored to 3GPP network (e.g, LTE network).
There are a couple of different ways to do it but if I am allowed for another
oversimplifcation, it can be only two categories. One is through 'Trusted Access Point' and
the other one is through 'Non-Trusted Access Point'. You can think of 'Trusted' as that the
WiFi Security is protected by the 3GPP network, so you would not need any separate
authentication process between 3GPP and Non-3GPP Network (WiFi). 'Non-Trusted' means
that the WiFi Security is not protected by the 3GPP network, so you need to go through
separate authentication process between 3GPP and Non-3GPP Network (WiFi)

'Trusted vs Untrusted' Access

If you see the network structure for Non-3GPP Access, you would see two different path.
One is through 'Trusted' path and the other one is through 'Untrusted' path.

What does it mean by 'Trusted' ? Who trust who ?


'Trust' in this case is that 'Operator TRUST the access(path)'. It doesn't necessarily mean
(may or may not mean) 'UE trust the path'.
The biggest difference between trusted access and untrusted access would be the
requirement of authentication requirement.

In trusted access, UE would not need any separate authentication/security process when it
switches from 3GPP access to non-3GPP access (WiFi) since UE already has gone through
this process when it was camping on the 3GPP access and network trust the process and
assume that the non-3GPP access can be protected by the same security procedure. In
this access, it is highly likely that Network Operator distribute their own WiFi Access points
and let UE get access through those Access Point.

On the other hand, in Untrusted access, network would require UE to go through


additional authentication/security process when UE switches to non-3GPP access and use
special IP tunneling mechanism (e.g, IPSec) for data transaction. In most of this case, UE
would get WiFi access via public WiFi access point and those access points would be
anchored to ePDG.

ANDSF, what is it ? why we need it ?

ANDSF stands for 'Access Network Discovery and Selection Function'. This is a set of
services that would answer to following questions.
 I am at such and such location now, which network (3GPP or Non-3GPP) are
available for me ?
 Now my mobile phone detected 3GPP network and WiFi network, which network I
have to get access to ?

Session Mobility

Mobility is a mechanism of switching between 3GPP (e.g LTE) and non-3GPP (e.g, WiFi)
networks. Largely there are two methods you can think of, NBM (Network Based Mobility -
Network Initiated) and HBM(Host Based Mobility - UE Initiated)

Interplay between ANDSF and Mobility

Interplay between UE and ANDSF


What kind of Information are provided by ANDSF

It provides huge set of information. so it is hard to describe everything in this section. You
can get the full sets of information about this in 3GPP as summarized below

The specification that I referred to is ETSI TS 124 312 V11.6.0 (2013-04). Since this is
relatively early stage, it is highly likely that new items or revision will be added as it goes
to new version. Try following up the latest specification as it roll out.

Figure 4.2.1~Figure 4.2.8 : Tree diagram of MO ANDSF information


Annex A (informative): an example of minimum set of ANDSF MO DDF

Typical Traffic Flow via 'Untrusted Non-3GPP Access'

One of the 'Untrusted' access that attracts the widest attention as of this writing (Feb
2014) is through ePDG as shown below. Overall procedure and data path are as follows.
i) UE is in 3GPP network (e.g, LTE)
ii) UE is triggered to switch to WiFi network
iii) UE switches to WiFi network and goes to authentication server first (follow the
red line)
iv) After completing the authentication process, start user data transaction through
the green path.
Most important step in this traffic flow is Authentication and Security Association step at
the initial step where UE start communicating with 3GPP network over Non-3GPP Access
(e.g, WiFi Access Point). This initial step is described in detail in IKE based 3GPP 33.402
section.
Following is one example of WiFi Offloading From LTE network to WiFi Network. In terms
of protocol implementation on UE and Test equipment side in early phase of testing (As of
Jun 2014), the colored part has become the major target of validation. According to my
experience on testing, step 4 and step 8 is the most tricky step to come over. Especially,
passing step 4 (IKEv2) is the most difficult part to step over.

< Handover from LTE to WiFi >

Following diagram shows overall procedure for the case where UE start communication
from LTE and switch to WiFi Network (Untrusted Non-3GPP). This case assumes that UE is
connected to LTE before the switch (Handover) and not connected in WiFi. If UE is already
connected both to LTE and WiFi before this handover, it will skip the step 2~9 and directly
jump to step 10.

< 3GPP 23.402 Figure 8.2.3-1: Handover from 3GPP Access to Untrusted Non-3GPP IP
Access with PMIPv6 on S2b >
Step 1 : UE is initially attached to LTE network. (In the most of testing situation with test
equipment, WiFi on UE turned off at this stage).

Step 2 : (In the most of testing situation with test equipment, we turn on WiFi on UE at
this time). UE start detecting WiFi network and initiate switching process to WiFi network.

Step 3 : (This may be an optional step) UE and EPC perform Access authentication
process. => This corresponds to 33.402 6 Authentication and key agreement procedures

Step 4 : UE and ePDG performs IKEv2 tunnel establishment procedure. (See the details
in IKE page or 3GPP 33.402). Following is the decription for this step in 23.402 and I add
some comments to relate 23.402 and 33.402.
 The IKEv2 tunnel establishment procedure is started by the UE. The ePDG IP
address to which the UE needs to form IPsec tunnel with is discovered as specified
in clause 4.5.4.
 After the UE is authenticated, UE is also authorized for access to the APN. The
procedure is as described in TS 33.234.
 As part of access authentication the PDN GW identity is sent to the ePDG by the
3GPP AAA server. => This corresponds to step 5 of 33.402 Figure 8.2.2-1
 If the UE supports IP address preservation during handover from 3GPP Access to
the untrusted non-3GPP IP access, the UE shall include its address (IPv4 address or
IPv6 prefix /address or both) allocated when it's attached to 3GPP Access into the
CFG_Request sent to the ePDG during IKEv2 message exchange. => This
corresponds to step 2 of 33.402 Figure 8.2.2-1

Step 5 : ePDG sends the Proxy Binding Update message to PDN GW. Followings are
conveyed in this message
o MN-NAI
o Lifetime
o Access Technology Type
o Handover Type Indicator
o GRE key for downlink traffic
o UE Address Info
Step 6B : PDN GW and AAA Server performs the following transaction.
 PDN GW sends following information to AAA Server
o PDN GW Identity
o APN corresponding to the UE's PDN Connection
 AAA Server sends Authorization information to PDN GW
Step 7 : PDN GW processes the Proxy Binding Update from ePDG and update the binding
cache entry for the UE. and then sends Proxy Binding Acknowledgement message. This
message carries following information.
o MN-NAI
o Lifetime
o GRE key for uplink traffic
o UE Address Info
o Charging ID

Step 8 : ePDG and UE continues the IKEv2 exchange and IP address configuration => This
corresponds to step 15 of 33.402 Figure 8.2.2-1

Step 9 : End of the Handover procedure. At this step, we would have two IP tunnels as
follows
 IP sec tunnel between UE and ePDG
 PMIPv6 tunnel between ePDG and PDN GW

Step 10 : This is for the case for connectivity to multiple PDNs. UE establishes connectivity
to each PDN that is being transferred from 3GPP access.

Step 11 : Disconnect LTE EPS Bearer.


PDN GW shall initiate the PDN GW Initiated PDN Disconnection procedure or PDN GW
Initiated PDN Deactivation procedure (3GPP 23.401)

Benefits or advantages of cellular and wifi


(WLAN) integration
This page compares cellular vs wifi (i.e. WLAN) data networks and mentions
benefits or advantages of cellular and wifi integration. It mentions advantages of
cellular wifi system with respect to cellular operator, wifi service provider and
user perspective.

Introduction:
The deployment of cellular networks and WLAN hotspots are increasing due to
increase in user demands. Both cellular and WLAN technologies are complement
to each other. Both wifi data service provider and mobile operator are interested
in roaming between wifi and cellular networks.
Complementary nature of cellular and wifi technologies can provide cost effective
business. It offers wireless multimedia and high data rate services to large
population. The integration of two technologies help operators to provide access
independent services, better utilization of spectrum resources, standardized
inter-working, low cost infrastructure, promotion of multimode terminals, flexible
integration of new access networks at IP level and so on.

Cellular network
There are different cellular networks such as 2G (GSM), 3G (WCDMA), 3.5G
(HSPA+), 4G (LTE, Mobile WiMAX), 4.5G (LTE Advanced), 5G NR (New Radio)
etc. in increasing order of their data transfer speed.

Figure-1 : Cellular data network architecture

There are three main elements in cellular data network architecture viz. Base
Station (i.e. network side), Mobile subscriber (i.e. user side) and internet
backbone. This is shown in figure-1, the cellular system connects with PSTN and
PSDN to provide support for circuit switched data traffic and packet switched
data traffic. Refer Cellular Tutorial for more information on cellular network
basics.
The silent features of cellular data network are as follows.
• Cellular network is available nation wide due to roaming functionality.
• Cellular data users will be charged as per different subscription rates and usage
in various countries.
• Coverage range is higher due to cellular tower height and transmit power as per
planned RF link budget.

Figure-2 : Integrated cellular wifi architecture

WiFi network
The WiFi network follow various IEEE WLAN wireless standards such as
802.11a, 11b, 11g, 11n, 11ac (wifi5), 11ax (wifi6) etc.
WiFi network is not available everywhere. Now-a-days wifi hotspots are available
in business offices, malls, airports, railway stations etc.
Figure-3 : Wifi data network architecture

There are two elements in wifi data network architecture viz. AP (Access point) or
router and STAs (Stations). WiFi operates on 2.4 GHz And 5 GHz frequency
bands. WiFi operates in two modes which are adhoc and infrastructure.
The silent features of wifi data network are as follows.
• WiFi data users are not charged and it is available free of cost at most of the
public places.
• It supports different data rates as per wifi standard used by APs (i.e. routers)
and STAs (stations) which is much larger than cellular data rates.
• Coverage range is lesser compare to cellular network.
Benefits or advantages of Cellular wifi
(WLAN) integration
Following are the benefits or advantages of Cellular wifi (WLAN) integration :
➨It helps to offload cellular data traffic to WLAN network in the areas having
higher user density.
➨It helps wifi service provider to increase its subscriber database by pulling
cellular data traffic users from partner cellular networks.
➨The integration helps end users with enhanced performance by offering
greater coverage, high data rates and low overall cost.
➨The cellular wifi integration provide customers with single billing and service
support. Moreover it offers secure communication environment and trusted
relationship.
➨It helps to promote multimode terminals at lower cost.
➨The integration take benefits of higher data speed from wifi network and large
area coverage/high mobility support from cellular network.

You might also like