Heterrogen Network
Heterrogen Network
Heterrogen Network
Coordinatore:
Tesi di:
Chiar.mo Prof. Ing. Paolo Bassi
Ing. Claudio Gambetti
Relatore:
Chiar.mo Prof. Ing. Oreste Andrisano
Settore scientifico-disciplicare:
ING-INF/03 TELECOMUNICAZIONI
Contents
Introduction 1
i
ii Contents
Conclusions 107
Bibliography 119
Acknowledgments 125
iv Contents
List of Tables
1.1 3GPP modes: FDD, TDD 3.84 Mcps, TDD 1.28 Mcps . . . . . . . . . . . 25
3.1 Definition of quantities exchanged between the interface module and the
network simulator . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 57
v
vi Contents
List of Figures
vii
viii Contents
In the last years, mobile communications have become pervasive to all activities of soci-
ety; the number of mobile phones and wireless Internet users has increased significantly.
Changing private and professional lifestyles has created a surging demand for communi-
cations on the move, reachability and wireless broadband.
In fact, latest industrial surveys1 reveal 2.255 billion subscriptions in the family of
all fully open standard cellular technologies GSM, GPRS, EDGE and WCDMA-HSDPA
(31.12.2006); 511 million of these subscriptions were just added in 2006, corresponding to
a growth of 29% in 2006. The third generation networks (WCDMA-HSDPA) now count
almost 100 million subscriptions (31.12.06), with an average monthly growth in 2006 of
over 4 millions and an annual growth of more than 100% in 2006; the forecast is that by
end-2009, WCDMA-HSxPA subscriptions will be half billion.
1
2 Introduction
data services, with the maximum data rate in these early networks being limited to 9.6
Kbps on one timeslot in each radio frame.
About 5 years ago, the most advanced cellular technology for mobile internet access
became the GSM implementing the High-Speed Circuit-Switched Data (HSCSD) evolution,
specified in ETSI Rel’96; it was the first GSM Phase 2+ work item that clearly increased
the achievable data rates in the GSM system. The maximum radio interface bit rate
of an HSCSD configuration with 14.4 Kbps channel coding (corresponding to the best
radio conditions) multiplying 4 timeslots is 57.6 Kbps: this was broadly equivalent to
providing the same transmission rate as that available over one ISDN B-Channel. It
seems prehistory, but just 5 years ago this was a great achievement!
Quickly, the GSM networks were upgraded to 2.5G by introducing the General Packet
Radio System (GPRS) technology. GPRS provides GSM with a packet data air interface
and an IP-based core network, with bit rates varying from 9 Kbps to more than 150 Kbps
per user when all eight timeslots of a GSM carrier are assigned to a single GPRS Mobile
Station for exclusive use.
The Enhanced Data Rates for Global Evolution (EDGE) was a further innovation step
of GSM packet data and now EDGE is widely deployed on global GSM networks. Thanks
to the 8 phase shift keying (8PSK) modulation scheme, EDGE can handle about three
times more data subscribers than GPRS, or triple the data rate for one end-user. EDGE
is specified in a way to enhance the throughput per timeslot for both HSCSD and GPRS.
The enhancement of HSCSD is called ECSD (Enhanced Circuit Switched Data), whereas
the enhancement of GPRS is called EGPRS (Enhanced General Packet Radio System).
In ECSD, the maximum data rate does not exceed 64 Kbps because of the restrictions
in the A-interface, but the data rate per timeslot triples. Similarly, in EGPRS, the data
rate per timeslot triples and the peak throughput, with all eight timeslots in the radio
interface, can reach 473 Kbps.
On the other hand, in the last couple of years, we have also seen a strong development
of third-generation (3G) wireless systems that incorporate the features provided by broad-
band. In addition to support mobility, broadband aims at supporting multimedia traffic,
with quality of service (QoS) assurance; four class of services are considered: conversa-
tional (both speech and video calls), streaming, interactive and background. In Europe,
the 3G standard has been initially developed by ETSI (European Telecommunication
Standard Institute), then the work has been continued by Third Generation Partnership
Project (3GPP) under the designation of UMTS (Universal Mobile Telecommunications
System).
The radio access interface of UMTS comprises two standards for operation adopting
Introduction 3
the Frequency Division Duplex (FDD) and Time Division Duplex (TDD) modes. The
present UMTS FDD networks, based on wideband CDMA (WCDMA), adopt new spec-
trum and new radio network configurations while using the same GSM core infrastructure.
The maximum data rate in the first WCDMA release (Rel’99) is 2 Mbps, but in practice
the widely used maximum downlink rate (i.e. direction from NodeB to User Equipment)
is equal to 384 Kbps.
With the really recent addition of the High Speed Downlink Packet Access (HSDPA)
specified in 3GPP Rel’5, that is a sort of 3.5G technology, WCDMA network operators
aim at providing extremely high data rate multimedia services and to improve spectral
efficiency by higher order modulation using 16-QAM: in March 2007, some of the deployed
WCDMA-HSDPA networks are starting to support calls at 7.2 Mbps gross data rate
(corresponding to a 6.7 Mbps net data rate) with category 8 mobiles: about 5 years are
passed since the HSCSD introduction, and the speed of data transfer over cellular networks
has increased of more than 100 times! Moreover, these WCDMA-HSDPA networks will
soon achieve data rates in downlink up to 14 Mbps with category 10 mobiles.
Similarly, in the next months in 2007, the High Speed Uplink Packet Access (HSUPA),
standardized in 3GPP Rel’6, will complement HSDPA by significantly reducing latency on
the uplink and offering data speeds up to 5.8 Mbps (peak) on the uplink channel. Together
with HSDPA, it means a huge stride in WCDMA-HSxPA2 network performance.
In this extremely fast changing and widened context of mobile networks, my work
was initially addressed to evaluate the performance of the innovative 3G networks and to
study the impact of physical layer parameters on the network performance. Based on one
of the main requirements for 3G systems, that is the ability to support asymmetric up-
link/downlink traffic, the choice of the 3G radio interface to be studied has been directed
to one of the two TDD modes, the Time-Division Synchronous Code Division Multiple
Access (TD-SCDMA): thanks to its TDD/TDMA characteristics, the TD-SCDMA net-
work can adapt the uplink/downlink ratio according to the data load within a single
unpaired frequency thus utilizing the spectrum more efficiently. This is especially helpful
in an environment with increasing data traffic (mobile data), which tends to be asymmet-
ric, often requiring little uplink throughput, but significant bandwidth for downloading
information (mobile Internet).
(a) WLAN AP in high traffic density area glob- (b) WLAN AP to improve indoor coverage
ally covered by 3G
(pre-)WiMAX 802.16d networks. For example Wireless Local Area Networks (WLAN)
are achieving a great penetration in the mass market as a really effective solution to
provide mobile access to the Internet; companies all over the world are already offering
WLAN connections in particular locations, such as airports, hotels or caffés (see figure
1). In these areas, the so-called ”hot spots”, anyone owning the appropriate technology
on his laptop can connect to the Internet at a reasonable price and with a satisfactory
connection speed.
Nonetheless, the request for higher bit rates is expected to further increase in the next
future and more capacity will be necessary; on these conditions, 3G/WLAN interworking
becomes a really significant issue to be investigated: provided that the WLAN hot spot is
within the 3G network coverage and that the final user is equipped with a dual mode ter-
minal, integrating the two technologies, thus increasing the ”pool” of available resources,
would considerably increase both users’ satisfaction and networks’ utilization efficiency.
In this phase, I therefore extended my analysis from the initial scenario of a 3G ”stand-
alone” network to a full 3G/WLAN heterogeneous network: firstly, the feasibility of the
integration of these two technologies in a single system has to be evaluated; afterwards,
the possible methods for a Common Radio Resource Management of the two radio access
networks have been studied in depth.
Introduction 5
Thesis Outline
This dissertation mainly deals with the study of third-generation and wireless heteroge-
neous networks.
Chapter 1 presents the design of the third-generation dynamic system simulator I
developed during this activity: the standard that has been chosen is the UTRA TDD
1.28 Mcps, also called TD-SCDMA. The main functional blocks composing this tool are
the Link Level simulator, the Network Level simulator, an Interface module between the
link and the network levels and finally the Upper Layer simulator, which receives the
input from a Mobility simulator and a User Activity simulator. An overview of the main
changes required to implement UTRA FDD are also shown.
Chapter 2 deals with the analysis of the performance of TD-SCDMA network through
system simulation. The influence of packet switched applications on the overall network
performance is investigated; in order to balance the combined quality of voice and data
services, the tuning of physical layer parameters for the power control algorithm is eval-
uated.
Chapter 3 describes the method we propose on how to interface link and network level
tools through an ”instant value” interface. Although this approach has been adopted in
the TD-SCDMA system simulator, it’s quite general and can be implemented in arbitrary
wireless networks with a time slotted physical frame structure. The proposed approach
allows a thorough analysis of performance in networks with mixed circuit and switched
services.
Chapter 4 introduces a possible architectural solution for a heterogeneous wireless
system exploiting the complementary characteristics of the radio interfaces of a third-
generation network and a wireless LAN. Both a logical scheme and a feasible realization
are provided; a link between each local UMTS and WLAN Radio Resource Management
(RRM) entity and a Common RRM (CRRM) entity is proposed.
Chapter 5 describes the possible advantages introduced by the CRRM for a heteroge-
neous integrated and interworking UMTS-WLAN network; the performance evaluation is
carried out through full simulations from the physical to the application layer. Firstly, the
required interactions and information exchanged among the CRRM entity and the local
RRM entities are presented; afterwards a fully configurable CRRM algorithm is proposed:
the project is composed of a Coverage Based, a Service Based and a Quality of Service
(QoS) Based CRRM algorithm. Finally, the trend in the system capacity provided with
the various CRRM options is discussed in a realistic scenario.
Introduction 7
This work includes parts from papers under IEEE copyrights. In particular, text and
figures are here reprinted with permission from:
c
°[2004] IEEE. C.Gambetti, A.Zanella, R.Verdone, O.Andrisano, “Performance of a
TD-SCDMA cellular system in the presence of circuit and packet switched services”, IEEE
VTC 2004 Spring, Milan (Italy), 17-19 May, 2004.
c
°[2004] IEEE. C.Gambetti, A.Zanella, “Trade-off between Data Throughput and
Voice User Satisfaction in TD-SCDMA Networks: the Impact of Power Control”, IEEE
WPMC 2004, Abano Terme (Italy), 12-15 Sept., 2004.
c
°[2005] IEEE. O. Andrisano, A. Bazzi, M. Diolaiti, C. Gambetti, G. Pasolini, “UMTS
and WLAN Integration: Architectural Solution and Performance”, IEEE PIMRC 2005,
Berlin (Germany), 11-14 Sept., 2005.
c
°[2006] IEEE. A.Bazzi, M.Diolaiti, G.Pasolini, C.Gambetti, “WLAN Call Admission
Control Strategies for Voice Traffic over Integrated 3G/WLAN Networks”, IEEE CCNC
2006, Las Vegas (USA), January, 2006.
c
°[2006] IEEE. L.Zuliani, C.Gambetti, A.Zanella, O.Andrisano, “Link Level Aspects
Modelling in the Simulation of Packet Switched Wireless Networks”, IEEE WCNC 2006,
Las Vegas (USA), 3-6 April, 2006.
c
°[2006] IEEE. A. Bazzi, C. Gambetti, G. Pasolini, “SHINE: Simulation platform for
Heterogeneous Interworking Networks”, IEEE ICC 2006, Istanbul (Turkey), 11-15 June
2006.
Chapter 1
Research activities on current and future communication systems are more and more
carried out by means of simulation tools, either developed ad hoc for specific purposes or
already existing, such as Opnet [1], ns-2 [2], Glomosim [3].
This trend is mainly due to the increasing complexity of current and forthcoming
technologies as well as to the frequent need of complete investigations, embracing the
whole protocol stack (from physical to application levels), for which simulation is the
only feasible way to get some insights of the performance provided to the final user.
However, as emphasized also in [4], the realization of a reliable simulator of a commu-
nication system is quite a tricky task, especially when wireless technologies are concerned
which require an accurate modelling of the physical level as well as an adequate charac-
terization of the radio channel behavior.
Off-the-shelf network simulation tools, such as the aforementioned Opnet, ns-2 and
Glomosim, generally adopt simplified approaches to model the physical level behavior of
the supported wireless technologies. Usually they only account for the path-loss effect or
at most a simplified channel model; in all cases, however, accurate bit-level simulations
9
10 TD-SCDMA System Simulator design
At first sight, this choice is acceptable since bit level simulations, which require an
accurate implementation of all physical level aspects of the investigated technology (prop-
agation, channel coding and decoding, interleaving, modulation and demodulation,etc.),
are very consuming in terms of simulation time. Nonetheless the possible lack of accuracy
of physical level characteristics of such tools is felt as problem to be overcome by many
researchers [6, 7, 8] and some effort has been made in this direction [9].
Let us emphasize that in this work Physical Level simulators are conceived as a part
of complete system simulators aimed at reproducing the entire protocol stack (from ap-
plication to propagation). Within this context, the task of a physical simulator is no
more to simply provide curves of bit error rate or packet error rate characterizing the
performance of the investigated technology at physical level, but, on the contrary, its task
is to interact with the simulation tool which reproduces the upper layers behaviors (from
MAC to Application), hereafter denoted as Network Level simulator. Let us observe that
this task has to be performed for each user within the investigated scenario, that is, for a
number of links which could be very relevant.
Moreover, without such an integrated approach from physical to application level, the
simulation of advanced wireless heterogeneous networks, which is the main objective of
this thesis, would be quite rough: actually, the final direction of our study is to investigate
whether a Common Radio Resource Management entity (see chapter 5) could better the
system capacity, by exploiting in real time the complementary characteristics offered by
the different radio access technologies. In this context, it’s therefore strongly required to
build for each radio access stratum a System Simulator reproducing with accuracy the
main characteristics of the physical layer, as well the main aspects of the related datalink
layer, the local Radio Resource Management entity and the upper layer properties.
In this first chapter, the design of the 3G (third generation) system simulator I devel-
oped during the thesis is presented.
In section 1.1, an overview of the technology is given, with reference to the selected UMTS
standard, the UTRA TDD 1.28 Mcps option, ordinary called TD-SCDMA. Afterwards,
in section 1.2 the design of the TD-SCDMA system simulator is described, whose main
functional block are the Link Level simulator, the Network Level simulator and the Upper
Layer simulator. Finally in section 1.3, the main changes required to implement UTRA
FDD will be shown.
TD-SCDMA System Simulator design 11
channel units and leased lines are required, resulting in higher operating costs. Thanks
to joint detection, smart antennas and an accurate terminal synchronization TD-SCDMA
does not need to rely on soft handover.
Here the basic technological principles on which the TD-SCDMA technology is based
are summarized:
• TDD (Time Division Duplex) allows uplink and downlink on the same fre-
quency band and does not require paired bands. In TDD, uplink and downlink are
transmitted in the same frequency channel but at different times. It is possible to
change the duplex switching point and move capacity from uplink to downlink or
vice versa, thus utilizing spectrum optimally. It allows for symmetric and asymmet-
ric data services.
For symmetric services used during telephone and video calls, where the same
amount of data is transmitted in both directions, the time slots are split equally
between the downlink and uplink.
For asymmetric services used with Internet access (download), where high data vol-
umes are transmitted from the base station to the terminal, more time slots are
used for the downlink than the uplink.
• CDMA (Code Division Multiple Access) increases the traffic density in each
cell by enabling simultaneous multiple-user access on the same radio channel. Yet
each user can interfere with another, which leads to multiple access interference
(MAI).
In TD-SCDMA, within each time slot a number of up to 16 CDMA codes may
be transmitted (maximum CDMA loading factor). Using a chip rate of 1.28 Mcps
allows a carrier bandwidth of 1.6 MHz. According to its operating license, the
network operator can deploy multiple TD-SCDMA 1.6 MHz carriers. Each radio
resource unit is thus identified by a particular time slot and a particular code on a
particular carrier frequency.
• Joint Detection (JD) allows the receiver to estimate the radio channel and works
for all signals simultaneously. Through parallel processing of individual traffic
streams, JD eliminates the multiple access interference (MAI) and minimizes intra-
cell interference, thus increasing the transmission capacity.
The efficiency of the Joint Detection receiver in TD-SCDMA technology is based on
the TDMA/TDD operation and on the limited number of codes employed per time
slot: the total number of users per radio carrier is distributed over the different time
slots of the basic TDMA frame, so that a maximal number of 16 codes per time slot
per radio carrier can be easily processed in parallel and detected.
14 TD-SCDMA System Simulator design
To compare the two systems, in UTRA FDD 256 CDMA codes might be transmit-
ted: due to the high number of codes, the implementation of an optimal multi-user
receiver in FDD is difficult, since the implementation complexity is an exponential
function of the numbers of codes. In order to combat MAI, UTRA FDD emploies
suboptimal detection schemes, such as the Rake receiver, which do not extract all
CDMA codes in parallel.
• Smart Antennas are beam steering antennas which track mobile usage through
the cell and distribute the power only to cell areas with mobile subscribers. Without
them, power would be distributed over the whole cell. Smart antennas reduce multi-
user interference; increase system capacity by minimizing intra-cell interference,
increase reception sensitivity and lower transmission power while increasing cell
range.
figure 1.3) which can be developed in different software programs, thanks to appropriate
communication interfaces.
This planning choice has many advantages: first of all, during the initial phase of
software implementation, the effort of the developer is focused on smaller procedures, thus
allowing a tidier work. Secondly, some parts can be easily re-used for system simulators
of other wireless technologies (for example, the mobility simulator doesn’t strictly depend
on the radio access technology). Finally, this choice permits to easily project each logical
block with a different time scale (for example, the link level simulator works with the
bit, whereas the user activity simulator setups voice calls with a much larger time step),
provided that there is a clear interface definition between the various blocks.
In the next subsections, a description of each logical block in figure 1.3 is given.
• The channel coding block performs the coding operation through convolutional codes
with variable code rate and constraint length [49], depending on the settings of the
configuration file (in the next future, turbo-codes will be implemented).
• The interleaving block [49] operates at different periods: 10, 20, 40 or 80 ms.
Let us recall that the TD-SCDMA radio frame duration is 10 ms, that is the same
duration of UTRA TDD 3.84 Mcps and UTRA FDD; nevertheless, the TD-SCDMA
peculiarity is that the radio frame is split in two sub-frames of duration 5 ms. In this
way the interleaving procedure allocates the bits by spanning the various timeslots
over at least two sub-frames.
• The spreading procedure performs the ”Direct Sequence Spread Spectrum” tech-
nique by multiplying the input signal with an Orthogonal Variable Spreading Factor
TD-SCDMA System Simulator design 17
• The propagation channel block generates the channel impulse response for AWGN
channels or non-AWGN channels with frequency-selective fading and intersymbol
interference (ISI). The latter uses Jake’s doppler channel model for pedestrian and
vehicular channels, or a FIR filter for indoor channels.
• Samples of AWGN noise are then summed to the signal previously generated with
the channel impulse response.
• Several receivers have been implemented: the Matched Filter (MF), the Zero Forcing
(ZF) and the Minimum Mean Square Error (MMSE) one. These receivers perform
the operation of despreading.
• The QPSK demodulator carries out the de-mapping of the QPSK symbols, that is
the association between each symbol of the constellation with the related couple of
encoded bits.
• The de-interleaving block executes the dual operation of the interleaver, returning
the ordered sequence of encoded bits that were previously mixed in various timeslots
and subframes.
• The channel decoding block performs the decoding through Viterbi algorithm. The
decoding can be ”hard” or ”soft” (that is, by addition of reliability information of
the decoding).
• The last block records the result of each transmission and produce the desired
output: as explained in chapter 3, different methods shall be used to generate the
appropriate information for the rest of the system simulator.
• First of all, the interface module receives from the link level simulator the BER/BLER
look-up tables for each allowed parameter combination and the vector of fading sam-
ples for each propagation channel.
Since a large part of the information needed for certain calculations is already included
in the network level simulator tool, the interface module could be directly implemented
in the same software program, although logically separated (see the dotted rectangular
TD-SCDMA System Simulator design 19
containing both the network level simulator and the interface module in figure 1.3): this
choice has been adopted in our project and allows to speed up the overall simulation time.
• The simulation step is equal to the time slot duration (675 µs): all the power
measurements refers to this time resolution. Other system operations occur with
larger time intervals: frame (10 ms), transport block duration (10, 20, 40 or 80 ms)
or longer periods for the averaging of the measurements (0.5-1.0 s).
[54].
• Power Control: both fast closed loop power control (rate 200 Hz) and slow outer
loop power control are implemented. Each service is characterized by a proper
value of the (Eb /I0 )target . Different TPC(Transmit Power Control) step sizes can be
selected.
• Links: both uplink and downlink BER/BLER are considered to estimate the quality
of radio links. This information is obtained through communication with the link-
to-network level interface module (see subsection 1.2.2).
• At datalink layer (level 2), Automatic Repeat reQuest (ARQ) is implemented for
packet switched services [19].
• Radio Resource Management (RRM) - Call Admission Control: a new user is ac-
cepted provided that codes are available, the estimated interference is less than a
given threshold and the power required in downlink is available. Other specifications
might be the maximum number of RUs occupied per timeslot by all CS users and
allocation strategies that subdivide various class of service users (i.e. speech and
data users) on different timeslots.
The TD-SCDMA dynamic network simulator provides an extensive set of radio perfor-
mance measures (on the contrary, the overall system performance in terms of call block,
call drop, system throughput, etc. is evaluated by the Upper Layer simulator):
The union of the TD-SCDMA network level simulator with the link-to-network level
interface module constitutes a Lower Layer Simulator (see figure 1.3), according to the
definitions and the terminology introduced in our home-made platform, SHINE, Simula-
tion platform for Heterogeneous Interworking Networks, see appendix A for more details.
In practice, all aspects related to the access technology adopted, hence related to the phys-
ical and data-link layers as well as the local Radio Resource Management, are managed
by the lower layer simulator.
connection control is terminated at the upper layer simulator side, whereas peculiar radio
access aspects are reproduced by each different lower layer simulator.
The tasks of the upper layer simulator are mainly concerned with user activity man-
agement and its corresponding mobility in the simulated scenario. For these purposes, the
upper layer simulator receives as input the results of a proper User Activity simulator
and a Mobility simulator (see figure 1.3); aiming at the reproducibility of the system
simulation results, the mobility and the user activity simulators provide their results to
the upper layer simulator in offline mode.
The user activity simulator, according to customized call arrival statistics and IP
traffic models, generates the profile of the service usage of each user: the instant of call
initiation and termination for both voice and data users are defined as well as the instant
of generation and the dimension of each IP packet based on FTP download and web
browsing application characteristics.
On the other hand, the mobility simulator reproduces, based on the specific character-
istics of each traffic class (for example, vehicular voice users as well as static email service
users), the movements of each mobile station within a realistic scenario. The movements
can be completely randomly generated or forced to follow certain rules (for example, users
moving along the streets).
The main tasks of the upper layer simulator are therefore defined:
• execution of all Common Radio Resource Management (CRRM) functions (see chap-
ter 5): the upper layer simulator selects through which technology should each user
be connected on the basis of customized rules and the available networks’ infor-
mation; it can also decide to move a connection from a lower layer simulator to
another (that is, from a given technology to another) at any time, thus simulating
the interworking;
24 TD-SCDMA System Simulator design
• UTRA F DD (W-CDMA)
• UTRA T DDLCR (1.28 Mcps, 1.6 MHz bandwidth, TD-SCDMA air interface)
where HCR stands for High Chip Rate and LCR stands for Low Chip Rate (in the first
release, called Release’99, TD-SCDMA wasn’t yet defined).
These systems share the same Core Network and a common set of features within
the UTRAN (UMTS Terrestrial Radio Access Network). On the other side, the Radio
Access Technology (RAT) (collecting with this term the radio frame format, channel
coding procedures, definition of transport channels and so on) is the distinguishing aspect
among them.
TD-SCDMA System Simulator design 25
FDD TDD
Air Interface W-CDMA TD-CDMA TD-SCDMA
Bandwidth 2 * 5 MHz paired 1 * 5 MHz unpaired 1 * 1.6 MHz unpaired
Frequency re-use 1 1 1 or 3
Handover soft, softer (interfreq:hard) hard hard
Receiver Rake Joint Detection/Rake Joint Detection/Rake
Chip rate 3.84 Mcps 3.84 Mcps 1.28 Mcps
Spreading factor 4-256 1,2,4,8,16 1,2,4,8,16
fast: every 667 µs slow: 100 cycles/s slow: 200 cycles/s
Power control
closed loop UL:open, DL:closed loop closed loop
Frame duration 10 ms 10 ms 5ms (2 subframes in 10ms)
Timeslot duration 0.667 µs 0.667 µs 0.675 µs
Time slot/frame 15 15 7
Table 1.1: 3GPP modes: FDD, TDD 3.84 Mcps, TDD 1.28 Mcps
In this thesis, the main studies have been focused on TD-SCDMA because of its
compelling characteristics, one above all the possibility to manage asymmetric traffic
thanks to its TDD nature. Nevertheless, here a comparison with W-CDMA is given and
the main changes are described.
In table 1.1, a summary of the main differences between TD-SCDMA and W-CDMA
(for the sake of completeness, also the characteristics of TD-CDMA, that is the TDD high
chip rate option, are included).
It’s evident that the main differences between TD-SCDMA and W-CDMA are in the
physical signal (i.e. bandwidth, frame structure, etc.) and in the physical procedures
(power control, receiver characteristics, handover type, etc), but also Radio Resource
Management procedures like Dynamic Channel Allocation have a different (reduced) im-
pact in the W-CDMA simulator.
The simulators (see figure 1.3) that are impacted by the implementation of W-CDMA
are the TD-SCDMA link level simulator and the TD-SCDMA network level simulator.
On the contrary, the link-to-network level interface module is not impacted, since the
”instant values” approach (see chapter 3) has a quite general validity. Also the current
upper layer simulator doesn’t need any change to communicate with a W-CDMA network
simulator.
The main modifications in the existing TD-SCDMA link and network simulators are
here described.
users can use the same spreading factor 16 code, but in different timeslots). This access
technique is not present in the W-CDMA mode, therefore a W-CDMA simulator can
simplify the structure of the so called Resource Units (RU), by eliminating one dimension:
W-CDMA is FDD
Since W-CDMA uses paired bands, the resources are doubled for downlink and uplink
usage. This mainly impacts the current TD-SCDMA network simulator, because the TD-
SCDMA link level simulator is already split in two part, one for downlink simulation, the
other one for uplink simulation.
Frame organization
Given the differences of timeslot and frame duration specified in table 1.1, the major
impacts in the W-CDMA simulators are that it is not anymore requires to cycle each
frame two times to reproduce the behavior of the two sub-frames of 5 ms, typical of
TD-SCDMA.
On the other hand, the FDD characteristic involves a doubled effort for the calculation
of the transmitted powers and the received signal-to-interference plus noise ratio (SINR)
of each connection, because these calculations shall be repeated each timeslot both in
downlink and in uplink (on the contrary, in the TD-SCDMA system, each timeslot is
exclusively used in downlink or in uplink).
Power Control
Both the TD-SCDMA and the W-CDMA modes define a closed loop power control.
However, the mechanism of W-CDMA is slightly simpler to be implemented, because
TD-SCDMA System Simulator design 27
in each timeslot, both in downlink and in uplink, the measured SINR is immediately
compared to the SIN Rtarget and a consequent Transmit Power Control (TPC) command
is sent to the transmitting entity (UE or NodeB) in order to control its transmitted power
level and therefore satisfy the quality criterion.
On the contrary, in TD-SCDMA, the receiving entity measures the SINR in each
active timeslot (i.e. the timeslots in which there are data for that user), and waits the
next switching point (i.e. the point in which the direction of transmission change from/to
downlink/uplink) to evaluate the average value of the accumulated SINR measurements
and finally send the related TPC command.
Receiver
Because of the higher number of active codes at the same time in W-CDMA compared
to TD-SCDMA, the joint detection is not feasible in W-CDMA. The reason of this large
difference in the number of codes is that W-CDMA user codes at higher spreading factor:
for example, for a speech AMR 12.2 Kbps connection, in W-CDMA a code with spreading
factor equal 128 in downlink is used; on the contrary, TD-SCDMA for the AMR call uses
2 parallel codes at spreading factor 16 in one timeslot every 5 ms sub-frame.
Handover
Many differences distinguish W-CDMA and TD-SCDMA regarding the intrafrequency
handover procedure (here in this work, the interfrequency handover is neglected): since
TD-SCDMA implements the hard handover only, whereas W-CDMA uses soft and softer
handover, different measurements shall be defined in the W-CDMA network simulator.
Currently, in the TD-SCDMA network simulator, the event 1G for Change of Best
Cell (TDD) has been implemented [51]; the condition is that a P-CCPCH RSCP becomes
better than the previous best P-CCPCH RSCP (see figure 1.7); this measurement shall
trigger the replacement of the previously best cell with the current evaluated cell.
On the contrary the W-CDMA simulator shall implement at least the following three
different events (see figure 1.8):
• event 1A: a Primary CPICH enters the reporting range; this measurement shall
trigger a cell addition to the current cell active set.
• event 1B: a primary CPICH leaves the reporting range; this measurement shall
trigger a cell deletion form the current cell active set.
28 TD-SCDMA System Simulator design
Figure 1.7: event 1G for TD-SCDMA: a P-CCPCH RSCP becomes better than the pre-
vious best P-CCPCH RSCP
• event 1C: a primary CPICH that is not included in the active set becomes better
than a primary CPICH that is in the active set; this measurement shall trigger a
cell replacement within the current active set.
Apart from the different measurement triggers, two new issues shall be solved by the
W-CDMA network simulator in order to correctly implement the FDD soft/softer han-
dover: first of all, the data structure of each radio connection in the W-CDMA simulator
shall implement the possibility to manage more than one radio link at the same time
(typically a maximum of 3 radio links in active set). Whereas the uplink transmit power
in the mobile is obviously the same for all radio links, in downlink each cell shall transmit
with a proper value defined by the closed loop power control. In order to avoid drift effects
among the different active NodeBs, the implementation of a Downlink Power Balancing
algorithm should be considered.
Secondly, in the TD-SCDMA network simulator, since the P-CCPCH is transmitted
only on the timeslot 0 of each subframe without other dedicated physical channels, the
only appropriate quantity used for handover measurement is the Received Signal Code
Power (RSCP) from the P-CCPCH. On the other hand, in the W-CDMA mode, the
reference for handover measurements is the Common Pilot Channel (CPICH), which is
transmitted in all timeslots, and multiplied with all the other common and dedicated
TD-SCDMA System Simulator design 29
physical channels, therefore for handover control it’s appropriate to measure also the
downlink Ec /N0 , that is the received energy per chip from CPICH divided by the power
density in the band.
Chapter 2
Performance of TD-SCDMA in
mixed CS/PS traffic scenarios
31
32 Performance of TD-SCDMA in mixed CS/PS traffic scenarios
The main characteristics of the used TD-SCDMA system simulator are described in
chapter 1.
In the next sections 2.1 and 2.2, we present in more detail two of the main algorithms
directly impacting the performance of TD-SCDMA in mixed CS/PS traffic scenarios, re-
spectively the packet scheduler and the power control. Afterwards in section 2.3, the
simulated scenario is described and in section 2.4 the merit figures for performance evalu-
ation are defined; finally, in section 2.5 the results obtained with the TD-SCDMA system
simulator are discussed.
BitRX
AST = ≥ 10% · Brnom (2.1)
Tsession − Tinact
In this work we decided that, for Non-Real Time (NRT) packet data services, uplink
and downlink shared channels (respectively, USCH and DSCH [48]) can be used to allow
efficient allocations for a short period of time: these transport channels exist only in
TDD mode. The MAC-c/sh packet scheduler, localized in the Radio Network Controller
Performance of TD-SCDMA in mixed CS/PS traffic scenarios 33
(RNC)1 , redistributes dynamically the RUs between all active users, that is the users with
data in the buffers, waiting to be transmitted.
We considered three Quality of Service packet bearers, with different requests of max-
imum rate, at 64 Kbps, 144 Kbps and 384 Kbps. In downlink, for every cell, three
buffers are used (one for every class of service): they hold the packets addressed to mobile
terminals connected to that cell.
The packet scheduler algorithm proposed here considers two level of priority to estab-
lish a data packet transmission. First of all, transmission requests are ordered based on
the service class to which they belong; level of priority, from highest to lowest, is following:
384 kbps, 144 kbps, 64 kbps. Second level of priority orders the requests of users who
belong to the same class of service: a fair round robin (RR) algorithm is used.
When a data packet transmission request is finally admitted to air interface by the
scheduler, the packet is fragmented into transport blocks: the number of TBs necessary
for the complete transmission of the considered packet is obtained by dividing the number
of bits at level of application contained in the packet by the number of information bits
carried by a TB (every bearer service has its own characteristics, in terms of number of
bits, timeslots and codes per TB [52, 53]). During a packet transmission, if the link-to-
system level interface (see chapter 3) evaluates that an error has been occurred in the
reception of a transport block, only that TB is retransmitted.
• Open-loop power control: owing to the correlation among the average path loss
of downlink and uplink, the user equipment (UE) can estimate the initial power
needed in uplink and downlink based on the path loss calculations in the downlink
direction. This mechanism is commonly used to set the initial value of received
value of signal-to-interference ratio.
• Closed-loop power control: this PCA uses the feedback information from the opposite
end of the radio link. This allows the considered terminal (UE in uplink and base
1
On the other hand, the MAC-hs scheduler using the latest Rel5 HSDPA transport channels is located
in the NodeB. This function is not yet implemented in our system simulator.
34 Performance of TD-SCDMA in mixed CS/PS traffic scenarios
station in downlink) to adjust the value of the transmitted power. Let us consider
for instance the uplink power control, user equipment transmits using a given value
of power, the base station measures the value of received power and compared it
with its target value of signal-to-interference ratio, if this value is smaller than the
threshold, the base feeds back, through the TPC control bits, this information and
the UE increases its value of transmitted power. As few bits are carried by TPC,
the step between the old and the new value of transmitted power is quantized (PC
step).
If the speed of the power update is sufficiently high, terminal (or base) can compen-
sate for the fast fading contributions. In W-CDMA network, as terminal transmits
in each timeslot, the value of transmitted power is changed with a frequency of 1500
Hz (15 slot/10 ms). In case of TD-SCDMA, owing to time division multiple access
nature, transmitted power is updated one time each sub-frame, so the frequency is
200 Hz.
• Outer loop power control: The aim of outer-loop power control is that of maintaining
the quality of the communication at the level defined by the quality requirements of
the bearer service. This is carried out by changing the target value of the received
Eb /I0 ; this is necessary when propagation conditions change, i.e. a change in the
mobile speed, and therefore the previous value of received Eb /I0 does not guarantee
an acceptable value of bit error rate.
where Pt represents the power transmitted by the mobile user (in uplink) or the base
station (downlink), pathloss is modelled by means of the coefficients K1 and K2 (expressed
in dB), and d is the distance between transmitter and receiver. Several other pathloss
models can be considered: Walfish Ikegami, taking both line-of-sight (LOS) and non-LOS
conditions into account; K1 + K2 · log10 (d) with arbitrary values of K1 and arbitrary
coverage maps.
S stands for log-normal Shadowing, modelled by means of Gaussian random variable
(expressed in dB) with zero mean and exponential correlation function. Finally fast
Performance of TD-SCDMA in mixed CS/PS traffic scenarios 35
fading is modelled using the time-correlated random variable F : different ITU channels
are simulated (pedestrian,vehicular,indoor, both A and B).
The simulated scenario considered in this chapter is depicted in figure 2.1. Here a
regular lay-out with 18 sites is designed. However, the simulation tool is quite general
and allows the evaluation of a larger number of sites located in arbitrary positions.
The total bandwidth assigned to each site is 5 MHz; we have assumed that every
sector uses a different 1.6 MHz carrier (1/3 frequency reuse).
Traffic characteristics
Both voice and data bearer services are considered in this chapter in order to achieve the
main target of this study that is to quantify the degradation of the voice users quality in
the presence of packet data services and viceversa.
Every class of traffic is characterized by the following parameters: the number of Resource
units, classified in number of time slots required, number of codes used in both downlink
and uplink, the number of information bits carried by the transport block [52][53].
The main characteristics of traffic generated in the simulations of this chapter are
listed as follows for every class of service:
• Voice services (CS): call arrival and departure processes are Poisson distributed;
average call duration is 120 s.
TCS denotes the voice offered traffic per site (in Erlang).
• Data users (PS): the data packet application we have simulated is Web browsing.
Three layered stochastic processes are considered: the session arrival process, the
packet call arrival process and the packet arrival process. Session arrival process is
Poisson distributed. Packet size is Pareto distributed; all the parameters have been
fixed according to [18].
Mean traffic parameters are specified in table 2.2, where Npc is the average number
of packet calls per session, RTpc is the average reading time between consecutive
packet calls, Np is the average number of packets per packet call, IAT is the av-
erage packet inter-arrival time. Number of packet calls, reading time, number of
Performance of TD-SCDMA in mixed CS/PS traffic scenarios 37
Table 2.2: Packet switched session parameters for web browsing services
packets per packet call and inter-arrival time are all modelled by means geometric
distributions.
Because of bursty and asymmetric nature of data packet sources, we do not charac-
terize the data traffic by means of the average number of data user in the system.
To measure the data packet traffic per site (using separate metrics for downlink and
uplink) we have defined TP S , which represents the ratio between the total number
of bit at application level received (if we consider the downlink) or transmitted (up-
link) by all users connected to the site and the total time of simulation (i.e. 100
minutes). Block retransmissions and overhead due to lower protocol layer are not
considered.
• Dropping rate (Td ): defined as the ratio between the number of voice connections
dropped owing to quality problems and the total number of terminated connections.
The simulator decides to drop a call using a ”leaky bucket” algorithm, which com-
pares the averaged measured BER with a given threshold BERdrop . If the BER is
larger than the threshold the call gains two points, otherwise it looses one point.
The call is dropped when the counter reaches a given value.
• Outage rate (Tout ): an event occurs when the averaged value of the BER exceed a
threshold - BERout .
38 Performance of TD-SCDMA in mixed CS/PS traffic scenarios
• Satisfaction rate (Tsat ): a user is said to be satisfied if his call is neither blocked
nor dropped, and during the call the outage events have a duration which is smaller
than 10% of the total duration of the call.
In case of packet switched applications, the simulation tool evaluates the following
performance metric:
• Transport block error rate (BLER): defined as the rate of transport blocks erro-
neously detected by the receiver owing to interference.
These results are in agreement with those obtained in literature for W-CDMA [20,
21]. The clear dependence of Tsat from the network load could be minimized with the
introduction in the simulation tool of smart antennas which would reduce the levels of
interference (for future implementation in the TD-SCDMA system simulator).
The geographical distribution of unsatisfied users for the three values of network load,
at R = 450m is shown in figure 2.3: the pixels in green represent the areas in which speech
users are satisfied, the pixels in yellow and red represent different ascending levels of users
unsatisfaction, whereas the black squares are located in the positions of the NodeBs. It’s
clear from the figure that, for higher network loads, the users at border cell suffer with
Figure 2.4: Voice satisfaction rate (Tsat ) vs. downlink data packet traffic (TP S ), for
different values of voice offered traffic (TCS )
Figure 2.5: Downlink active session throughput (AST ) vs. downlink data packet traffic
(TP S ), for different values of voice offered traffic (TCS )
Figure 2.5 shows the downlink active session throughput for data packet users with 64
Kbps QoS versus the downlink data packet traffic; AST2 , that is the average throughput
per session, decreases firstly with the increasing amount of downlink data traffic because
of higher latency time in buffers and secondly it decreases when a higher number of voice
users is served in the network.
following figures, the remaining parameters were fixed to the default values indicated in
table 2.3.
In this session, we’ve disabled the outer-loop power control feature, so the target value
of (Eb /I0 ) is not changed dynamically during the simulation of each connection.
of the UE transmitted power (which has not been shown here for the sake of conciseness)
shows that many terminals are transmitting the maximum allowed power in order to
achieve the target (Eb /I0 )U L−CS .
Note also that both Tout and Td increases for large values of (Eb /I0 )U L−CS .
Now, if we consider the quality of packet data users in this simulation, we observe
that AST in uplink is almost constant for small values of (Eb /I0 )U L−CS , with a value
around 48 kb/s, and decreases for large values of (Eb /I0 )U L−CS , as BLER in uplink of
data connections increases because of the high level of interference introduced by the voice
connections. As expected AST in downlink is not influenced by (Eb /I0 )U L−CS .
Figure 2.7 shows the same performance metrics of figure 2.6 as a function of (Eb /I0 )DL−CS .
Here we can observe that Tsat does not have the same trend: this depends on the fact that
in the downlink the intercell interference does not play the same role owing to the multi-
user detection, here considered through the parameter β. Large values of (Eb /I0 )DL−CS
do not increase significantly the level of interference in the network. However, it can be
expected that for a higher network load, a too high target for (Eb /I0 )DL−CS will impact
significantly the system capacity. As far as the performance of packet-switched services
is concerned, here the curves corresponding to AST in uplink and downlink are almost
constant.
Comparing the results of figures 2.6 and 2.7, we can observe that the impact of the
target value of (Eb /I0 ) is much more emphasized in the uplink owing to the strongest
contribution of the uplink intercell interference.
44 Performance of TD-SCDMA in mixed CS/PS traffic scenarios
can reduce the quality perceived by voice users and viceversa. Moreover, the target values
of (Eb /Io ) in the Power Control Alogorithm play a crucial role in the balancing of the
performance of voice and data services. Owing to the latter considerations, the different
values of target (Eb /Io ) should be carefully chosen: the optimum value can be found as a
trade-off between the obtainable quality of packet and circuit-switched applications.
Chapter 3
The investigation of both link and network level aspects is fundamental when a thorough
analysis of mobile radio systems is required. The conventional approach, based on a
complete separation between the two levels, adopted in the past for the performance
evaluation of second generation systems, is not enough accurate for third generation ones,
characterized by the presence of both voice and data services as well as circuit and packet
switched applications.
Here we describe the methodology we followed on how to interface link and network
level tools; this approach has been adopted in the TD-SCDMA system simulator developed
during this thesis and whose results are described in the numerical sections of chapters
2 and 5. Nevertheless, the proposed method is quite general and can be adopted for
arbitrary wireless networks with a time slotted physical frame structure and packed-
switched applications.
47
48 Link Level modelling in the simulation of packet switched wireless networks
from those related to the multiple access, radio resource management (RRM) and so
on. This division was possible because second generation systems (i.e. GSM [22]) were
originally designed to provide mainly voice services, i.e. at constant bit rate.
With the advent of third generation systems, the focus moves from voice to data
services and from circuit to packed switched networks. This latter aspect requires the use
of performance evaluation tools characterized by the ability to follow all the rapid changes
(power control, packet scheduling,..) of the network. The design of such a platform is
extremely challenging as link level aspects cannot be separated by those of network level
and viceversa [17, 23, 24]. As a matter of fact, since the Call Processing part of UMTS
takes decisions every 10 ms (duration of a radio frame) or 2 ms (duration of a sub-frame
when supporting HSDPA physical channels in FDD mode), and since fast power control
at rate of 1500 Hz shall be implemented and bit rate shall be adapted to actual radio
frequency condition, a different design of network level simulators is required.
In the next sections, we address the problem of how to combine link and network level
analysis in order to realize a thorough simulation tool able to investigate a modern mobile
radio network from a system (”system” is defined in this chapter as the union of link and
network level issues) point of view. Here, we show that the investigation of both link and
network level issues requires the design of a suitable interface integrating link and network
level parts and a careful definition of the parameters exchanged through the interface.
Since our work is focused on the analysis of this interface and that of the quantities to
be taken in account, a performance comparison of different simulation results is out of the
scope of this chapter. However, we demonstrate that, in a typical 2G scenario with speech
service, the proposed method provides the same results of the conventional approach. On
the other hand, our approach becomes the unique adoptable when simulating complex
scenarios with both circuit (CS) and packet switched (PS) bearers and mixed (voice and
data) applications (i.e. refer to to the simulated traffic scenarios in chapter 2).
A similar approach has been proposed in [57] however this proposal is simpler to
implement as it takes into account only the most relevant aspects of the link-level.
Referring to figure 3.1, at link level, all aspects related to the transmission chain
(modulation, coding, bit interleaving, etc) have to be taken into account in order to
evaluate the performance metrics, typically expressed in terms of bit error rate (BER),
frame error rate (FER) and block error rate (BLER) as a function of a suitable definition
of the carrier to interference ratio.
At network level, the macroscopic aspects of the scenario (user mobility, cellular layout,
shadowing, handover, power control and so on) have to be considered to evaluate the
system performance (i.e. the merit figure Rb of rate of blocked users as a function of
the offered traffic To ). In order to measure the system performance, the network level
simulator exploits the information provided by the link level (BER/FER/BLER) in many
RRM procedures.
Obviously, in such a integrated approach, the interface between the two simulation
tools has to be carefully designed since the time simulation step at link and at network
level are usually different. While the simulation step TL of link level tools is typically
equal to the bit or chip duration, at network level the time resolution TN has usually
a much longer duration, equal to the physical time slot (see section 3.2.2) or to a time
interval in the order of the second (see section 3.2.1).
by the mobile stations and the base stations, over the fast fluctuations due to fading to
provide stable information about the current electromagnetic status of the network.
Assume this averaging is performed over an interval of Ta seconds. For instance in
GSM, Ta could be the duration of a slow associated common channel multiframe (SACCH)
equal to about 0.48 s [22]. So, the network level evaluation could be performed by choosing
this interval as the time resolution (network level simulation step). Therefore, suitable
definition of the measurements performed by mobiles and bases stations at physical level
has to be given, according to the network level simulation step.
All changes in the scenario occurring with a rate larger than 1/Ta (the effect of fast
fading, fast power control and so on) cannot be explicitly modelled, they have to be taken
into account at link level and reported in averaged terms at network level. Then, by
means of this approach the network level simulation tool is a computer program which is
driven by an internal clock equivalent to Ta seconds. All the measurements at this level
have to be considered averaged over a period of time equal to Ta .
At each simulation step, the network level simulator evaluates the carrier to interfer-
ence ratio (i.e. C/I, Eb /I0 or similar) averaged over a Ta period, and takes information
about the quality of radio links by means of look-up tables containing the values of
BER/FER/BLER computed at link level. It should be noticed that owing to the size of
Ta , the fast fading has a mean value equal to zero within this period, and therefore the
BER as a function of Eb /I0 averaged over a period Ta can be considered equivalent to
that of the average over infinitive period of time.
The corresponding link level simulator generates the look-up tables of BER/FER/BLER
following these steps: a given reference value of Eb /Io is selected and the whole trans-
mission chain (modulation, coding, interleaving, etc.) is simulated by considering a huge
number of transmitted bit. At the end of simulation, it evaluates the number of wrong
detected bits and the corresponding BER. Look-up tables will contain on the y-axes the
values of BER and on the x-axes the corresponding reference Eb /Io value obtained by av-
eraging the Eb /Io over the whole simulation time. Note that, by means of this approach,
the presence of fast fading generates, in each (link level) simulation step, instantaneous
values of Eb /Io different from the reference one.
observation intervals corresponding to one time slot or frame, according to the system
considered [25, 24].
In this case fast fading effects and the sudden changes in the level of radio interference
have to be considered both at network and link level, whereas averaging radio measure-
ments over seconds like in section 3.2.1 would lead to a rough approach. This approach,
which implies a network level simulation step Ta equal to the time slot duration (typically
less than 1 msec), makes network level simulations much more complex, but allows us to
extend the investigation to PS services. With this time resolution, it is also possible to
evaluate the correct/wrong transmission of each transport block and analyze the impacts
of MAC-hs or RLC protocols on the TCP-IP level. Obviously, the whole system analysis
is not allowed with the approach depicted in section 3.2.1.
Since we have to consider the effects of fast fading both at link and network level, in
order to maintain the synchronization between the two simulators, it is necessary that the
link level tool, which generally considers several fast fading contributions according to the
selected channel (pedestrian, vehicular, etc.) generates also a suitable look-up table of
correlated fast fading samples at a rate equal to the network simulator time step. These
values will be used by the network level simulator.
Besides fading samples, the link simulator, that has typically a simulation step equal
to bit or chip durations has to simulate the whole transmission chain to obtain the
BER/BLER curves. Nevertheless, the number of erroneous bits have to be evaluated
at the end of channel decoding phase. This means that, if we consider a mobile radio
system with a time structure organized in frame and slots (i.e. GSM and UMTS), the
evaluations on the link quality have to be computed with a rate equal to 1/TB , where
TB is the duration of a transport block, the elementary data unit managed by the en-
coder/decoder blocks [21], which corresponds to an interleaving length of K frames of
duration Tf rame (TB = K ∗ Tf rame ).
Using this approach, at network level, for each simulation step Ta , the software obtains
the value of ”instantaneous” carrier to interference ratio (Eb /Io ) affected by fast fading
samples generated at link level and subsequently the network simulator calculates the
averaged value over the duration of a transport block (h(Eb /Io )iTB ). This value will be
provided as input to link level which will return the corresponding BER/BLER related
to that particular value of h(Eb /Io )iTB . Note that look-up tables generated following this
approach are completely different from those created using the conventional approach
(see subsection 3.2.1). Furthermore, coding gain effect is still present, even if (Eb /Io ) is
averaged over all the duration of the transport block: the prerequisite is that for every
single transport block, both link and network simulator use the same fading channel,
52 Link Level modelling in the simulation of packet switched wireless networks
The look-up table contains on the x-axes the values of (Eb /I0 )j (in the following j will
be omitted and the notation < (Eb /Io ) >TB will be used to emphasize that the average
is performed over the transport block) and in the y-axes (Ne )j , that is the expected BER
value when < (Eb /Io ) >TB is measured in the interval (Γj , Γj+1 ) . We behave in similar
way when obtaining the BLER look-up table: in this case the number of wrongly decoded
transport blocks is counted, where a TB is considered to be wrong when at least a wrong
decoded bit is present.
The example in figure 3.2 summarizes the main algorithm steps. In this case, two
different values of reference h(Eb /Io )i (that is averaged over an infinite period of time)
have been used to transmit a large amount of Transport Blocks; let us recall that TB =
K ∗ Tf rame and in each frame a certain number of timeslots will be required for the
transmission of each transport block.
The effect of fast fading becomes evident by observing that the values of Ne (Bi ) of
each transmitted block are associated to different intervals although related to the same
reference value h(Eb /Io )i. At the end of the transmission of all the different reference
h(Eb /Io )i, in each interval (Eb /I0 )j , the average value of the contained Ne (Bi ) is calculated
to derive the value of BERj . Similarly, to obtain BLERj , the average value of wrongly
decoded transport blocks in (Eb /I0 )j is calculated.
The interface module communicates real-time with the network level simulator; the
quantities exchanged by the two blocks can be classified in time slot (T S)-based (here
denoted as Mode A) for fast fading enforcement and transport block (T B)-based (Mode
B) for BER/BLER evaluation. We assume that the interleaving period is coincident with
the duration of a TB.
Mode A - Time Slot Based
The system model considers a time discrete version, with a resolution equal to the timeslot
duration, of the correlated fast fading. The link-to-network level interface computes the
received carrier, CP LSH , and the contribution of the interference coming from each single
source (terminal or base station), IK P LSH ; both terms are affected by pathloss (PL) and
log normal shadowing (SH): the scope of this phase is to determine the final signal-to-
interference ratio affected by fast fading.
CP LSH and the various terms IK P LSH represent an input for the interface block which
adds a sample of fast fading (ITU channels are considered) to both CP LSH and each
IK P LSH giving:
C = CP LSH · Af ad (3.1)
where Af ad is a factor that represents the additional attenuation of the user signal caused
by multipath propagation.
An expression similar to (3.1) can be written for each interfering signal IK P LSH :
IK = IK P LSH · AK f ad (3.2)
µ ¶ µ ¶
Ebc C Q C Q
= · = · (3.3)
Io f ading I log2 L Iinter + α · Iintra + N log2 L
where C is the received power, Iinter is the inter-cell interference, Iintra is the intra-cell
interference, N is the thermal noise power, Q is the Spreading Factor and L denotes
the levels of modulation (L=4 in QPSK), and α represents the orthogonality factor. In
uplink we substitute α with (1 − β), where β represents the Multi User Detection (MUD)
efficiency. All the terms of power and interference are affected by fast fading as explained
in equations 3.1 and 3.2.
Ebc denotes the encoded bit energy in the section before the decoder. Since the inter-
leaving duration is equal to 10, 20, 40 or 80ms, corresponding to 2, 4, 8 or 16 subframes,
the interface module through the link simulator results couldn’t evaluate the signal-to-
interference ratio after decoding with a resolution equal to the time-slot.
Mode B - Transport Block Based
At the end of the reception of a transport block, the network level simulator evaluates
(Eb /Io ) averaged over the duration of the transport block (where Eb is the information
bit energy after decoding):
PM ³ Ebc ´
¿µ ¶À
Eb i=1 Io
f ading 1
= · (3.4)
Io TB
M r
where r denotes the code rate and M is the number of timeslot required for the trans-
mission of a single transport block (in mode A, link level has previously provided these
M values of Ebc /Io to the system simulator).
Eb /Io represents an input for the link-to-network level interface module which returns,
through look up tables, the BER and the BLER referred to the considered block.
In our network simulator, during a CS connection (RLC protocol in transparent mode),
long term averaged BER values determine the quality of the connection. Viceversa, in case
of PS sessions, through the value of the measured BLER, the system evaluates whether
a transport block belonging to a data packet is correctly received. For PS services we
use a pair of RLC protocol istances in acknowledge mode, providing a reliable radio
bearer service, including error correction by automatic retransmission, thus when the
transmission fails, the transport block is re-transmitted.
Thanks to the proposed approach, described in section 3.2.2, it is actually possible
to calculate the Block Error Rate related to each transport block transmission; on the
contrary, the more conventional approach in section 3.2.1 doesn’t allow such a possibility:
a BLER averaged over a long period wouldn’t be useful when evaluating the data link
Link Level modelling in the simulation of packet switched wireless networks 57
performance of a PS call.
Direction Time Quantity Definition
interval
TS CP LSH Received user code power affected by path loss
and shadowing
From NETWORK Level TS Ik P LSH Received power coming from the generic k−nth
interference source (UE or BS), affected by path
To INTERFACE module loss and shadowing
D³ ´E
Eb
TB Io Signal-to-Interference ratio, averaged over the
TB
duration of the Transport Block, after de-
spreading, demodulation and decoding
³ ´
Ebc
TS Io Signal-to-Interference ratio affected by fast fad-
f ading
From INTERFACE module ing, before decoding
TB BER Information bit error probability in a Transport
To NETWORK Level Block (CS)
TB BLER Transport Block error probability (PS)
Table 3.1: Definition of quantities exchanged between the interface module and the net-
work simulator
In table 3.1, the definition of the relevant quantities exchanged between the interface
module and the network simulator is summarized; the time interval in which they are
calculated and the direction of the information are reported.
Secondly, by using the link-to-network level interface approach proposed in this work
and described in section 3.2.2, it has been generated the curve of BER as a function
of h(Eb /Io )iTB , that is as a function of the Signal-to-Interference ratio averaged over the
duration of the Transport Block - see the green curve in figure 3.6 - that is over a duration
much shorter compared to the first method.
As it can be observed in figure 3.6, the BER curves generated by the link level simulator
based on the two approaches are significantly different (see the red and the green curve).
In particular the curve based on the averaged values of (Eb /Io ) over a period TB shows
smaller values of BER for the same nominal value of (Eb /Io ). The behavior can be
explained if we consider for instance a value of (Eb /Io ) of 5 dB. In case of conventional
approach, the (Eb /Io ) on the x-axes is averaged over a large time-interval, this means that,
owing to fading, in some cases the ”instantaneous” value of (Eb /Io ) maybe significantly
smaller than 5 dB, with a consequent increase of the ”instantaneous” BER. As the BER
plotted in figure 3.6 is averaged over a large time interval, the values of BER corresponding
to small (Eb /Io ) have a weight within the average larger than those corresponding to large
values of ”instantaneous” (Eb /Io ).
Afterwards, for this specific validation activity, it has been added to the network
simulator a function for the calculation of the average of all h(Eb /Io )iTB samples received
during the system simulation and for the calculation of the related averaged BER. For
Link Level modelling in the simulation of packet switched wireless networks 59
Figure 3.6: BER as a function of h(Eb /Io )i and h(Eb /Io )iT B .
each (Eb /Io ) reference, a new system simulation has been performed, and the blue curve
in figure 3.6 of BER as a function of h(Eb /Io )i as been obtained by the network simulator.
In this case h(Eb /Io )i has been calculated as an average over a huge number of transport
blocks; in figure 3.6, it can be observed that this method provides therefore similar results
compared to the conventional approach when focusing the attention on merit figures
averaged over long term period (see the red and the blue curve).
Although in this validation experiment the agreements between the conventional ap-
proach performance and the ”instantaneous” one with post-averaging at network level is
very good, we have to highlight that the proposed interface is the only suitable approach
when a more accurate analysis is needed and PS traffic is simulated.
Third generation for cellular telephony is already a reality. A new way to communicate
and a growing number of different services will be the challenge for UMTS. High data
speed will allow video-communication and mobile Internet on cellular terminals. But the
request for bit rate will never stop, and greater bandwidth will be necessary.
At the same time WLAN technology is starting to be an ordinary way to realize mobile
connection to the Internet, while companies all over the World realize wireless connections
in particular locations (hot spots), like airports or hotels. Anyone, owning the appropriate
technology on his laptop, can connect to the Internet in these places, at a reasonable price
with satisfactory connection speed.
On these conditions, UMTS and WLAN interworking becomes a really significant
issue: combining the two technologies would double the available resources. How to gain
this interwork is a large field for researches.
The heterogeneous technologies employed in 3G cellular networks and WLANs bring
many challenges to the interworking. Based on different radio access techniques, cellular
networks and WLANs present distinct characteristics in terms of mobility management,
61
62 Architectures for Heterogeneous Wireless Networks
security support, and quality of service (QoS) provisioning. In order to achieve seamless
integration, these issues should be carefully addressed while developing the interworking
schemes [28]).
Different aspects have to be considered while discussing about UMTS and WLAN
interworking: in this chapter, the state of the art in services, the most important network
architecture solutions, comprising an original one, and some functional issues will be
discussed; in the next chapter 5, an advanced Common Radio Resource Management
algorithm will be presented and the related performance will be simulated through the
simulation platform SHINE, developed in our laboratories (see appendix A).
In [61] 3GPP defines six levels of interworking, focusing on the service provided:
Level 1: ”Common billing and customer care”. Users pay a common bill to connect
both to UMTS and to WLAN. This level needs only a commercial agreement among
the different operators, sharing their costumer information; no technologic advance is
required. Each system offers the same service, as there was no interworking.
Level 2: ”Common access control and charging”. WLAN reaches the same level of
security of UMTS. Users notice the same interface connecting to both the systems.
Level 3: ”Access of all UMTS Packet Switching based services”. No handover is
provided, but both technologies offer the same services: QoS is managed even by WLAN.
Level 4: ”Service continuity”. Handover is managed, but the user can experience
service interruption or noticeable degradation.
Level 5:” Seamless mobility”. Users do not notice any difference using any of the
two systems neither during the handover. Circuit Switching services of UMTS are not
provided by WLANs.
Level 6: ”Access to Circuit Switching services”. Even Circuit Switching services are
supported by WLANs.
The basic target of our investigations was the interworking level 5. Nevertheless,
although the road map of the development of the Core Network foresees in the next future
an all-IP Core Network, we propose an integrated UMTS-WLAN architecture which allows
the WLAN users to exploit also the same Circuit Switching services provided by the Core
Network to the UMTS users, thus achieving the interworking level 6.
Architectures for Heterogeneous Wireless Networks 63
ing RNS Relocation function already provided by 3GPP specifications, that manages the
mobility of the Iu connection from a RNS to another (e.g., from Iu-1 to Iu-2 in figure 4.4)
without loss of Packet Data Protocol -PDP- context or any other session management
information (see [28] for a possible message flow allowing the execution of the relocation
procedure): in this way, a seamless handover UMTS-WLAN without perceiving any
service interruption can be performed.
Concerning data flows, two cases have to be considered: interactive/background ser-
vices and conversational services (voice or video) [62]. In the first case, when the mobile
terminal is camped within the WLAN hot-spot the Iu-PS data packets coming from SGSN
and carried over Iu-2 (see figure 4.4) should be forwarded by the RNC Emulator to the
AP and vice versa; no procedure change is needed when, after a Serving RNS Relocation,
the new Iu-PS is Iu-1.
Regarding conversational services, our proposal is to exploit real-time transport char-
acteristics of Iu-CS also when the mobile terminal is connected to the WLAN AP and data
are packetized, as in the case of VoIP calls: the main issue is how to adapt RTP/UDP/IP
packets coming from the mobile terminal to a circuit switched based context.
To this aim, without any impact on the mobile terminal functionality, an H.323 [45]
gateway between the AP and the RNC Emulator could be inserted [46], providing protocol
Architectures for Heterogeneous Wireless Networks 67
translation and media transcoding between the endpoint of the PS domain (the WLAN
AP) and endpoint of the CS domain (RNC Emulator).
As far as the protocol translation is concerned, the easiest solution could be that Non-
Access Stratum messages from MSC (call setup messages, for instance) are transparently
forwarded by the RNC Emulator towards the H.323 Gateway; vice versa for messages
coming from the AP WLAN. Note that Non Access Stratum messages in UMTS only sce-
narios are already exchanged between mobile terminals and MSC without RNC knowledge
(Radio Access Network Application Part -RANAP- messages on Iu and Radio Resource
Control -RRC- Direct Transfer messages on Uu, for instance).
An H.323 Gatekeeper should also be introduced to translate E.164 addresses (i.e.,
phone numbers) into Transport Addresses (e.g., IP address and port address).
Figure 4.6: Evolved multi-standard (UMTS & WLAN) NodeB communicating to the
Common Radio Resource Management (CRRM)
Architectures for Heterogeneous Wireless Networks 69
Finally, another logical link could be added between the standard RNC and the RNC
emulator, (the path would be the same used for Iu by WLAN RNS - see figure 4.6): this
link could be dedicated for Operations and Maintenance (O&M) functions: we expect
that a Common Radio Resource Management functionality between different RNSs and
particularly between a standard RNS and a WLAN RNS could be carried out through
this O&M communication link, leading to an increase of network performance.
In the figure 4.6, we considered the CRRM element located in the RNC, since it could
communicate at the same time to several WLAN RNSs concentrated to the same RNC.
As will be discussed in detail in the next chapter, the CRRM communicates with both
the UMTS Radio Resource Management (RRM) block located in the standard RNC and
the WLAN RRM block.
In the next chapter we’ll show the benefit introduced with our architectural solution
by the proposed inplementation of this new network element, the CRRM entity.
Chapter 5
In this chapter, we will investigate the possible advantages introduced by the Common
Radio Resource Management (CRRM) for a heterogeneous integrated and interworking
UMTS-WLAN network; the performance evaluation will be carried out through simula-
tions, performed adopting our advanced SW platform called SHINE illustrated in Appen-
dix A.
The work has been organized in this way: in section 5.2, the required interactions
between the CRRM entity and the local RRM entities will be described; in section 5.3, the
main functions of the RRM UMTS and the RRM WLAN will be presented; afterwards, in
section 5.4, the CRRM algorithm we projected will be explained in detail. After a proper
definition of performance measurement in section 5.6 for such a heterogeneous network,
we will present the studied scenario in section 5.7 based on a hotspot of high density
traffic covered by both UMTS and WLAN radio access networks. In the numerical results
section 5.8, the benefit in the system capacity provided with the implementation of a
CRRM QoS based will be shown.
71
72 Common Radio Resource Management UMTS & WLAN
• All type of services (i.e. speech and data transmission) shall be offered by the two
networks.
In this chapter, we focus on the functionalities and benefits provided by the CRRM
block. The Common Radio Resource Management refers to the set of functions that
are devoted to ensure an efficient and coordinated use of the available radio resources in
Common Radio Resource Management UMTS & WLAN 73
• RRM report.
• CRRM decision.
1. the local RRMs send triggered measurements to the CRRM, that is reports from the
RRM to the CRRM aren’t periodic, but only when a threshold is exceeded (above
or below) a report is generated;
2. only the cells which are deployed in areas covered by different radio technologies
shall send their network load information through RRM (i.e. areas covered by
UMTS cells only don’t require the UMTS RRM sends any report to the CRRM).
Final remark about the network load information exchange is on the time scale: in
order to better the system capacity, the CRRM needs to exploit in real time the comple-
76 Common Radio Resource Management UMTS & WLAN
mentary characteristics offered by the different radio access technologies. Therefore each
local RRM has to provide to the CRRM up-to-date information, averaged over short time
intervals (i.e. 100ms, 1s): for example, in order to solve a radio congestion situation in
one system, it’s required the CRRM quickly receives this information and immediately
takes the decision to command an intersystem handover to an alternative radio technology
before any call is dropped.
In SHINE, as basic report, we decided the WLAN RRM entity reports the channel
occupation rate of the AP, whereas the UMTS RRM entity reports the downlink (NodeB
to UE) and uplink (UE to NodeB) OVSF code tree usage rate. However, the platform
may be extended to work with other merit figures.
In figure 5.2, a diagram resuming the main interactions between the CRRM and each
RRM. At the system setup, every RRM sends the NETWORK TOPOLOGY INFORMATION;
at each call establishment the local RRM ask through RRM DECISION whether the call
shall be established on the own RAT or an alternative RAT: this decision is communicated
by the CRRM through CRRM DECISION. Finally, each RRM may send the triggered
NETWORK LOAD REPORT to drive the CRRM DECISION of an Intersystem Han-
dover based on the network load. It is evident, moreover, that no direct communication
between the two RRMs is required; actually this approach allows to use this CRRM block
connected to many different RAT (UMTS, WLAN, WIMAX, etc.).
In the next two sections we present the functions normally implemented in the local
78 Common Radio Resource Management UMTS & WLAN
• Radio Bearer Control: This set of functions aims to optimize the usage of radio
resources by adapting the amount of resources assigned to an UE depending on its
traffic load. This is achieved by managing the bit rate adaptation of the radio bearers
to the source bit rate and quality of service (QoS) requirements. The mapping has
to take into account the actual system load as well as the actual bit rate and quality
of service requirements of the considered radio bearer.
• Power Control: Since in UMTS all subscribers share the same frequency band,
lowering the interference within the cell while maintaining transmission quality is
of paramount importance. For this purpose power control adjusts the transmission
power in uplink and downlink.
• Handover Control : For UEs moving from a cell to another, this function transfers
connected calls to the new cell. The functionality is different for different scenarios:
Intrafrequency Handover Control (hard or soft handover within the same frequency),
Interfrequency Handover Control (handover between different radio frequency lay-
ers), Intersystem Handover Control (3G-2G).
• Restriction Control: This functions permits to restrict the available bit rates within
a cell by restricting the allowed minimum spreading factor.
• Call Admission Control (CAC): in order to ensure the QoS, a CAC algorithm may
decide whether an incoming user canor cannot access the network.
The three CRRM options aren’t exclusive, in the section 5.8 we’ll show results with
different combination of CRRM algorithms. The final solution will be to use them all
together.
In SHINE, the CRRM Service Based policy can be easily changed, i.e. we could define
that for all calls in the hotspot the preferred RAT is the WLAN.
Moreover, the CRRM allows to retry the call setup on an alternative RAT, in case of
radio resource shortage, i.e. if a voice call is rejected in the UMTS network, the CRRM
may order a ”Directed Retry” in the WLAN network.
In figure 5.4, we show three possible scenarios for CRRM Service Based.
In case (A), the RRM UMTS informs the CRRM that a user requiring QoS 1 is
attempting to establish the call on cell k; if QoS corresponds to a speech call, the CRRM
confirms that the call shall be established in UMTS.
In case (B), the RRM WLAN communicates that a user is attempting to setup a call,
for example a speech call, when connected to the AP z of WLAN; the CRRM Service
Based, because of the choices in table 5.1, shall inform the RRM WLAN that a Directed
Retry procedure to the UMTS cell k has to be performed: automatically the RRM WLAN
entity shall start a relocation to UMTS.
Finally, in case (C), the RRM UMTS attempts to establish a speech call, the CRRM
confirms the call shall be established in UMTS; after that, the RRM UMTS realize there
aren’t enough radio resource on cell k, therefore it communicates this Admission Control
rejection to the CRRM, which eventually decides to attempts the voice call establishment
in WLAN by sending to the RRM UMTS a CRRM DECISION of Directed Retry to
WLAN AP z.
Common Radio Resource Management UMTS & WLAN 81
If UMTS rejects the relocation (for example, because of Admission Control), the call
is dropped and the relative counter is incremented: we decided in this case to avoid to
82 Common Radio Resource Management UMTS & WLAN
maintain the call in the WLAN, because of the well-known negative effect introduced by
WLAN stations far away from the AP.
• Unloaded state.
• Congested state.
The interaction with the basic CRRM Service Based is the following: the CRRM QoS
based decides that each conversational call (that is the most demanding service regarding
the packet delay and error rate) is setup on the less loaded RAT (in ascending order,
unloaded - highly loaded - congested); in case the UMTS cell and the WLAN AP are in
the same state, it is the CRRM Service Based that decides the preferred RAT as defined
in table 5.1, that is the speech call is setup in UMTS.
The CRRM QoS based we defined specifies also that the best effort calls in the hotspot
shall be always preferably served by the WLAN, that is for the best effort service, the
CRRM continues to follow the policy in table 5.1. Nevertheless, the CRRM QoS based
doesn’t setup any call when the WLAN state is ”congested”: in this case, the call is
established in UMTS.
Besides initial RAT reselection, the CRRM QoS based may command Intersystem
Handover procedures: when the CRRM QoS based detects that a UMTS cell or a WLAN
AP change the state from ”highly loaded” to ”congested”, the CRRM checks if there is
an alternative RAT in not congested state and in case this is true it starts to move users
through standard 3GPP RANAP Relocation procedure [59] from the congested RAT to
the alternative RAT (one handover every ∆T ) till the critical condition is solved.
Common Radio Resource Management UMTS & WLAN 83
In figure 5.6 the scenario of interest for the study of the behavior of the CRRM QoS
based: in a congested UMTS cell, the CRRM moves with Intersystem Handover some
users in the hotspot from UMTS to WLAN. In figure 5.7, it’s schematized the interaction
between the RRMs and the CRRM: after a NETWORK LOAD REPORT with ”con-
gestion” measurement in UMTS cell k, since the related WLAN AP z is unloaded, the
CRRM orders through CRRM DECISION to handover a user to AP z every ∆T . Once
the UMTS RRM informs in NETWORK LOAD REPORT that the cell k is not anymore
congested, the critical situation is solved and the QoS of all the calls in the system (both
UMTS and WLAN) has been maintained.
• it sets the starting instant of each new traffic session originated by users, according
to the statistics of the traffic class it belongs to, as well as the users’ positions within
the investigated scenario;
• it generates the bit-flows up(down)loaded by each user in each traffic session ac-
cording to the statistics of its class of traffic;
Common Radio Resource Management UMTS & WLAN 85
• it reproduces the transport protocol behavior: both UDP and New Reno TCP are
implemented;
• it executes all CRRM functions: it selects through which technology should each
user be connected on the basis of user-defined rules and the available networks’
information; it can also decide to reject a connection or to move it from a LLS to
another (that is, from a given technology to another) at any time, thus simulating
the network interworking;
• it finally collects all simulation outcomes and generates the outputs (throughput,
packet delivery delays,...) from an end-to-end point of view.
In our simulation platform each LLS manages its own time axis; the ULS, for its part,
communicates to the LLSs the next instant in which some event concerning the upper
protocol levels happens (sessions begin, start of bit transfers, TCP timeouts, etc.). In this
way, when the time counter of an LLS reaches that instant, the related LLS simulation
stops and a ”call” to the ULS is performed asking for the event-related information and
providing to the ULS, at the same time, information on the lower protocol levels events.
After the ULS replies, the simulation of the calling LLS resumes, the consequent actions
(new session start, MAC level frame queuing,etc.) are executed and the instant of the
next ULS event (TCP time-outs,etc.) is updated.
An LLS can perform a call to the ULS not only when the instant of the next ULS
event has come but also whenever an LLS event which is of interest for the ULS takes
place, such as, for instance, the correct transmission of a MAC level frame.
The above described stop-and-wait procedure is the basis for the coordination among
LLSs, which is obviously needed when simulating interworking networks: in case an ULS
event is of interest for more than one LLS, no ULS reply is granted to the calling LLSs
until all the interested LLSs have stopped waiting for it, then the reply is issued on the
basis of the LLSs reports provided to the ULS. It follows that although LLS executions
can take place at different speeds (LLSs complexity could be different and they could be
running on different PCs), the faster LLSs periodically stop and wait for the LLSs they
are interworking with, thus re-synchronizing simulations.
• power attenuation due to propagation was taken into account according to the
Walfish-Ikegami model, hence the pathloss (PL) dependence on the propagation
distance d is given by P L(d) = K1 + K2 log10(d). Here we assumed K1 = 15.3 and
K2 = 37.6;
• the shadowing is modelled by means of lognormal random variables with zero mean
and an exponential time correlation function; the spread here assumed for the log-
normal shadowing process is σ = 5dB;
• fast fading: different ITU channels are simulated (pedestrian, vehicular, indoor,
both A and B) [54]; here the pedestrian channel model has been assumed with an
user speed of 3.5Km/h;
• both fast closed loop power control (rate 200 Hz) and slow outer loop power control
are implemented; each bearer service is characterized by a proper value of initial
target signal-to interference ratio and different Transmitted Power Command step
sizes (∆) can be selected;
service is estimated by averaging bit error rate measurements over long periods (here we
assumed 1.0 s); in case of PS sessions the simulator evaluates for each transport block
belonging to a data packet whether it is correctly received or not through the value of the
related measured block error rate (see chapter 3).
For PS calls a pair of RLC instances in acknowledge mode is used, providing a reliable
radio bearer service which includes error correction by means of automatic retransmission
of the transport block in case of reception failure.
At top of Layer 2, Radio Resource Control (RRC) block implements Call Admission
Control: a new radio link is successfully setup provided that the necessary OVSF codes
are available, the estimated interference is less than a given threshold and the initial power
required in Node-B is available.
The simulator decides to drop a call using a ”leaky bucket” algorithm, which com-
pares the average measured bit error rate, BER, with the threshold BERdrop = 2 · 10−2 :
if BER > BERdrop → increase counter (+1), otherwise → decrease counter (-2) ; if
counter ≥ 4, the call is dropped
Different classes of traffic are supported:
• PS Best Effort: three Unconstrained Delay Data bearer services at 64/64 Kbps,
64/144 Kbps and 64/384 Kbps are considered, where x/y Kbps stands for x Kbps
for the uplink and y Kbps for the downlink.
In the following, when dealing with UMTS data services, we always considered the 64/384
Kbps bearer.
(the slowest one), for instance, adopts a BPSK-based OFDM scheme with R = 12 , while
Mode 8 (the fastest one) adopts a 64QAM-based OFDM scheme with R = 43 .
All IEEE 802.11a PHY level aspects (propagation, modulation, channel coding, ...)
have been carefully taken into account by the WLAN LLS, in particular:
• the Auto Rate Fallback (ARF) [32] link adaptation algorithm is assumed to select
the proper transmission mode (i.e., the combination of modulation scheme and
coding rate) following channel variations; MAC level frames are discarded after 7
consecutive failed transmissions; hard decision convolutional decoding is assumed;
Let us recall, now, that IEEE802.11e specifications [31] define only the MAC level
strategies, which can be combined with anyone of the IEEE802.11a, IEEE802.11b or
IEEE802.11g PHY layers; here, when dealing with IEEE 802.11e we mean the combination
of IEEE802.11e MAC level and IEEE802.11a PHY level.
When considering IEEE802.11e, the different traffic classes are assigned different pri-
orities: in table 5.2 we reported the values of IEEE802.11e MAC protocol parameters
adopted in our simulation to differentiate the access probability of each queue (see [31]
for details on their meaning). According to the values of table 5.2 the VoIP traffic is given
the highest priority (that is, the highest probability to gain the access to the channel)
while FTP traffic is given the lowest priority.
value 1 8 2 4 16 6 4 32 6
TB
CO = .
∆T
The evaluation of the channel occupation rate is particularly simple to be implemented
in existing Access Points, owing to their carrier sensing capability. The AP simply adds
the busy medium sensed time TSB to its transmission time TAP , as follows:
TB = TAP + TSB .
In order to improve the accuracy of the estimation of TB , also the mandatory idle
times DIFS, SIFS [13] and AIFS [31] are considered in the assessment of TAP and TSB :
in particular, a DIFS period is considered for each uncorrect transmission (i.e. each
packet not acknowledged) and both DIFS (or the appropriate AIFS, for IEEE802.11e)
and SIFS periods are considered for each correct transmission; please note that as long as
90 Common Radio Resource Management UMTS & WLAN
• Speech traffic. When served by UMTS, the speech traffic is a circuit switched bidi-
rectional flow. A speech user is assumed to be satisfied if its call is neither blocked
nor dropped, and the overall outage time is lower than 5% of the call duration in
each direction (an outage event for CS voice calls occurs when the average value of
the bit error rate exceeds the threshold BERout = 10−2 ).
When served by WLAN AP, the speech traffic is a VoIP flow; the user in this case
is satisfied if 97% of packets are received in less than 0.15 sec in each direction [46];
following [46], since the voice/VoIP conversion adopting a G.729 codec in the H.323
gateway takes around 120 ms (including coding, decoding, bufferization delay, etc.)
and assuming that the circuit switched Core Network introduces a negligible delay,
the maximum tolerable delay introduced by the WLAN is thus 30 msec.
Common Radio Resource Management UMTS & WLAN 91
It is clear the parameters used to measure the quality of speech calls are different
in UMTS and WLAN; in order to measure the outage of calls that were served by
UMTS and WLAN in different periods, we decided to count the number of time
intervals (for example, slot duration of 1 second) in which the user experienced
outage in UMTS or in WLAN, then to divide this number by the total duration of
the call and finally to compare this ratio with a 5% threshold.
Merit figures
The merit figures we will consider in the numerical results section 5.8 cover the different
phases of Quality of Service [26] aspects during service use from the customer’s point of
view. They are here defined:
• Call Setup success rate (CSSR): it regards the Service Access, that is if the cus-
tomer wants to use a service, the network operator of an integrated UMTS-WLAN
network should provide him as much as possible access to the service. CSSR de-
scribes the ratio between the calls successfully connected to the system (either
UMTS or WLAN) and the overall number of call attempts:
Nattempt − Nblock
CSSR = (5.1)
Nattempt
where Nattempt is the number of call attempts and Nblock is the number of blocked
calls (for example, for Admission Control). Note that if a call attempt in the
hotspot fails in both UMTS and WLAN, this is counted only once by the CRRM:
the perspective is to provide a performance indication from the user point of view;
each single system may internally count this failure for its own statistics, but at
the end the CRRM will count only one blocked call as only one user ”pushed the
button” to start a call.
• Drop Call rate (DCR): it regards the Service Retainability, that is it describes
the termination of services in accordance with or against the will of the user. DCR is
the ratio between the abnormal releases (i.e. dropped calls for poor radio conditions
92 Common Radio Resource Management UMTS & WLAN
or for congestion) and the overall number of call releases (that is both the normal
and the abnormal releases):
Ndrop
DCR = (5.2)
Nrelease
where Ndrop is the number of dropped calls and Nrelease in the number of call releases.
• Outage rate (OutR): only for speech calls, it regards the Service Integrity, that
is the Quality of Service during service use. OutR describes the ratio between
the number of calls which, although normally released, perceived an unacceptable
outage time lasting more than 5% of the duration of the call, and the overall number
of call releases (that is both the normal and the abnormal releases):
Noutage
OutR = (5.3)
Nrelease
• Satisfaction rate (SatR): only for speech calls, it summarize the degree of voice
user satisfaction, by considering altogether Service Access, Service Retainability
and Service Integrity. A call is considered satisfied if it isn’t blocked, nor dropped,
nor it didn’t feel outage:
where Nsat is the number of satisfied users, that is the calls which were successfully
connected to the network and were normally released without perceiving significant
outage during the call.
In case of a stationary system, in which Nattempt = Nblock + Nrelease , from equation
5.6 it is easy to obtain an easier formula for the satisfaction rate SatR:
Nsat
SatR = (5.7)
Nattempt
Common Radio Resource Management UMTS & WLAN 93
Figure 5.9: Investigated scenario: WLAN APs in hotspot of high density traffic
• Average perceived throughput: only for best effort calls, it is the average value of the
application level throughput perceived by users; the application level throughput is
defined as the ratio between the amount of bits of each application-level ’packet’
and the time elapsed from the instant in which the TCP packet containing the first
fragment of the application-level ’packet’ reached the head of the TCP transmission
queue and the instant in which the TCP packet containing the last fragment of the
same application-level ’packet’ was completely successfully received;
• Average delivery delay: it is the average time interval occurring from the generation
of an application-level ’packet’ in the transmitter to its successful reception, thus
including in the delay calculation the time spent in the TCP and MAC levels queues.
Figure 5.10: Simulated scenario. The grey square indicates the area considered for nu-
merical results
technologies.
We haven’t yet mentioned the location or the number of NodeBs and the number of
WLAN APs: in figure 5.9 an example, in which 2 WLAN APs cover high traffic areas (red
circles), inside a global UMTS coverage. In this section we define the network topology
and the traffic scenario we used for the simulation with our platform SHINE. Actually, in
order to carry out significant investigations on the benefits of networks integration and to
derive meaningful conclusions, particular attention has to be paid not only to the accuracy
of the simulation platform but also to the realistic modelling of all aspects characterizing
the operating conditions of real networks, such as the scenario, the variety of services
requested by users and the statistics and geographical distribution of traffic flows.
• Hot spot traffic: it is the further traffic contribution which is added to the ”back-
ground traffic” only in the hot spot region and it is constituted by a huge additional
amount of voice, web-browsing and file transfer (hereafter, FTP) traffics.
The straightforward consequence of the above reported assumptions is that the hot spot
region is characterized by a higher user density than the surrounding region: this is typical
of crowded areas such as, for instance, an airport gate or a shopping mall where, actually,
the realization of a hot spot is envisioned.
The above reported characteristics are summarized in the first two columns of table
5.3, in the third one the mobility type is reported (we assumed only the voice users
enters/exits from the Hot spot traffic), whereas in the fourth column the average call
arrival rate is reported.
Traffic Area Mobility Arrival rate
Voicebackgr. whole scenario Pedestrian/Vehicular [54] 2.7 calls/s
Web br.backgr. whole scenario Static 1.08 sessions/s
VoiceHS hot spot Static varying: k · fa (t)
Web br.HS hot spot Static 0.02 sessions/s
FTPHS hot spot Static 0.012 sessions/s
We assumed the additional average voice call arrival rate in the hot spot (VoiceHS )
is a variable quantity depending on the time, fa (t), in order to simulate the behavior of
a hot spot of traffic in which the density of users change dynamically: in figure 5.11, it
is shown that in 4800 seconds of simulation there are two peaks of traffic of the same
96 Common Radio Resource Management UMTS & WLAN
Figure 5.11: fa (t): voice call arrival rate VoiceHS in the hotspot
maximum value (0.64 calls/s, corresponding to 76.8 Erlang, based on traffic parameters
of table 5.4), but with different variation step. In the numerical results section, the merit
figures are evaluated as a function of k, that is the multiplier factor of fa (t) in table 5.3:
for each run of simulation, the parameter k will assume the values 0.125, 0.25, 0.5, 0.75
and 1.
For the sake of clarity we finally summarize in table 5.4 the traffic categories we
considered (first column), their characteristics (second column), the references where the
models of each traffic class were taken (third column) and the satisfaction thresholds
(fourth column).
Table 5.4: Adopted traffic classes: parameters and requirements for satisfaction
Common Radio Resource Management UMTS & WLAN 97
• No CRRM: the voice calls in the hotspot are served only by UMTS: during the
peaks of traffic, the calls that are not admitted to the system won’t be redirected
to WLAN. This is the basic situation when no interworking between UMTS and
WLAN is realized.
• CRRM Service Based (see subsection 5.4.1): the voice calls in the hotspot are
preferably served by UMTS, but in case of resource shortage, call setup is redirected
to WLAN. Moreover CRRM Coverage Based (see subsection 5.4.2) is executed: users
exiting from WLAN hotspot do Intersystem handover to UMTS.
• CRRM QoS Based - 50% (see subsection 5.4.3): same algorithm used for previous
point (CRRM Service Based); moreover, the CRRM QoS based algorithm is enabled
too. Once the UMTS system reports a load of 50% (see subsection 5.2.2 for Network
load report) the congestion of UMTS is declared. This is the most advanced proposed
CRRM option, allowing users to be served by the best system in terms of congestion
of the radio interface.
• CRRM QoS Based - 85%: same as previous point, but with higher threshold -
85% - for UMTS congestion detection.
In figure 5.12, it’s shown the Satisfaction Rate (SatR) of voice users in the grey
square of figure 5.10, including the area covered by the WLAN AP; it’s evaluated the per-
formance when varying the multiplier factor k of the traffic function fa (t) (see VoiceHS
traffic definition in table 5.3). The worst result for SatR is obtained when no UMTS-
WLAN integration is established (No CRRM). The first substantial improvement is
98 Common Radio Resource Management UMTS & WLAN
Figure 5.12: Voice QoS in the investigated 100x100 m2 area: users’ Satisfaction Rate
SatR
achieved with the CRRM Service Based : during the peaks of traffic, the voice calls re-
jected by UMTS maybe redirected to WLAN, ensuring an increase of the number of voice
calls that can be managed by the system, as could be expected since without UMTS-
WLAN integration the available bandwidth is clearly lower. For k = 0.5 (corresponding
to traffic peaks of 38.4 Erlang), SatR increases from 70% to around 85%, whereas for the
higher value k = 1 (corresponding to traffic peaks of 76.8 Erlang) the Satisfaction Rate
increases from 40% to 60%.
The next step in the performance improvement is obtained thanks to the full CRRM
algorithm implementation, both Service and QoS based (for convenience, here we denote
this option only with the label CRRM QoS Based ): many parameterizations have been
tried, in this analysis two of the most interesting ones from the results point of view
have been reported. By using two different thresholds at 50% and 85% for Network Load
report of congestion in UMTS, the performance of the CRRM QoS Based in terms of
SatR improves the results of the CRRM Service Based.
For different ranges of traffic in the hotspot (k), a different parameterization of CRRM
Service Based improves the Satisfaction Rate: with k < 0.5, the CRRM QoS Based - 85%
option provides the best performance, whereas for k > 0.5, the CRRM QoS Based - 50%
option outperforms both the CRRM QoS Based and the CRRM QoS Based - 85%. In
Common Radio Resource Management UMTS & WLAN 99
Figure 5.13: Speech Service Access QoS in the investigated 100x100 m2 area: users’ Call
Setup Success Rate CSSR
particular, when k = 1, the Satisfaction Rate is about 80% with the CRRM QoS Based
- 50% : this result is the double compared to the performance of the No CRRM option,
as could be expected in general terms, but it’s also remarkable this CRRM QoS Based
option satisfies about more 20% users than the simpler CRRM Service Based option.
A single CRRM QoS Based algorithm changing dynamically its congestion thresholds
based on the current traffic (k) will be evaluated in future studies, in order to deter-
mine if it is possible to achieve or even improve with a single algorithm parameterization
the results provided by the envelope of the curves obtained adopting the two proposed
parameterizations (CRRM QoS based 50% and 85%).
Let us recall that the merit figure SatR is a Performance Measurement providing the
result of the combination of several phase of the service: access, retainability and integrity.
Now we separately study each of these aspects to investigate the root causes of the trends
of the Satisfaction Rate.
In figure 5.13, the results of Call Setup Success Rate (CSSR) of voice users in the
hotspot are presented. It can be observed that the system without interworking UMTS-
WLAN (No CRRM), starts to block voice users for k = 0.25: from this point on, the
service access can be improved only with the CRRM. At k = 0.5, both the CRRM Service
Based and the CRRM QoS Based provide CSSR > 99%, that is this integrated network
100 Common Radio Resource Management UMTS & WLAN
would satisfy an ordinary Service Level Agreement (i.e. CSSR > 96%); this is due to the
fact that the calls blocked in UMTS can be served by WLAN.
In the highest simulated traffic scenario, k = 1, apart from giving service access to
almost 50% additional users compared to the No CRRM scenario (93% vs 45%), it is
notable that the CRRM QoS Based - 50% provides service to more 10% users compared
to the CRRM Service Based algorithm. At first, this improvement of the CRRM QoS
Based compared to the CRRM Service Based might surprise since both these two CRRM
options have at their disposal the same amount of radio resources of UMTS and WLAN,
therefore it could be generally expected that the CRRM QoS Based should impact only
on service retainability and integrity as will be explained later, and not on service access.
From these simulation results, on the contrary, we have realized that the strategy of CRRM
QoS Based to establish and move calls on the best system in terms of radio interface load
leads to a better radio resource management and at last to provide access in the system to
a larger number of users: instead of exhausting the UMTS resources and then forwarding
the next call setups to WLAN (CRRM Service Based algorithm), it’s preferable to serve
calls in the less congested system.
Moreover, in the CRRM QoS Based configuration, once the UMTS cell in the hotspot
reports a High Load state, the CRRM starts to move calls in the hotspot from UMTS
to WLAN: this procedure allows the UMTS RRM to free resources for next incoming
calls that cannot be served by WLAN, for example, calls established just outside the area
covered by the AP WLAN.
In figure 5.14, the performance in terms of Call Drop Rate (DCR) of voice users in
the hotspot is shown. The basic configuration with No CRRM presents the worst results:
due to the high traffic load concentrated in the hotspot area, the service retainability
is reduced; calls can be accepted by the UMTS RRM, but because of peaks of uplink
interference, calls maybe abnormally terminated. When k = 0.5, the performance of No
CRRM is similar to the result of CRRM Service Based (DCR about 4.5%), even if the
latter can use the radio resources of both UMTS and WLAN; nevertheless, even if the
level of service retainability is similar, figure 5.13 at k = 0.5 shows that with No CRRM
25% less users accessed the system, therefore the system load is reduced, thus affecting
the comparison in terms of service retainability.
At k = 0.5, the CRRM QoS Based (both 50% and 85% options) halves the Drop Call
Rate to 2.4%, a value that can be acceptable for a Service Level Agreement; in this case
the comparison with the DCR of the CRRM Service Based is relevant since both of them
offer the same voice traffic quantity (CSSR > 99%). This clear improvement is provided
by the combined management of the load levels of the two radio interfaces UMTS and
Common Radio Resource Management UMTS & WLAN 101
Figure 5.14: Speech Service Retainability QoS in the investigated 100x100 m2 area: users’
Drop Call Rate DCR
WLAN: when one system achieves the congestion level, before any call is abnormally
terminated, the CRRM QoS Based attempts to move voice calls to the alternative radio
access technology, if that one isn’t congested.
Moreover, in the CRRM QoS Based configuration, since its general strategy is to avoid
to use all UMTS resources until calls start to be blocked, the voice call users exiting from
the area covered by the WLAN AP will likely perform a successful Intersystem Handover
to UMTS; on the contrary, with the CRRM Service Based only, the possibility to exit
from the WLAN area and then to not find enough radio resources in UMTS and therefore
being dropped is higher.
In figure 5.15, the results of Outage Rate (OutR) of voice users in the hotspot
are presented. The service integrity provided with No CRRM shows the best results,
but as explained above, this basic option offers a lower voice traffic, therefore a straight
comparison is tricky. Only in the most unloaded scenario (k = 0.125) CSSR = 100% for
all four curves (see figure 5.13), therefore a reasonable analysis can be performed. In this
specific case we can observe that OutR obtained with CRRM QoS Based - 50% is much
higher than with No CRRM : the reason is that, since UMTS radio channels are optimized
to transport the voice flows, for lower traffic values the best choice is always to serve the
voice calls in UMTS (No CRRM ). On the contrary, when the CRRM QoS Based - 50%
102 Common Radio Resource Management UMTS & WLAN
Figure 5.15: Speech Service Integrity QoS in the investigated 100x100 m2 area: users’
Outage Rate OutR
is used, some short spikes in the UMTS cell load may trigger the CRRM to move voice
calls to WLAN, in which voice users will likely perceive a worst VoIP experience. This is
confirmed by the trends in figure 5.16 - Number of Intersystem Handover procedures per
voice call - in which it is reported that with the option CRRM QoS Based - 50%, the
users execute about 0.5 Intersystem Handovers per call when k = 0.125, much more than
with the other configurations.
The same phenomenon is less relevant with CRRM QoS Based - 85% : in this case,
the higher threshold for UMTS congestion detection is less sensitive to spikes of cell load,
therefore for low values of k (k < 0.5) less voice calls are moved to WLAN, that is only
during real high load situations the CRRM will react and order Intersystem Handover.
The drawback of the option of CRRM QoS Based at 85% is that by reacting more slowly
to radio congestion events or by recognizing a lower number of critical network load
situations, when the offered traffic increases (k > 0.5), this CRRM option may solve too
late some congestion situation, therefore in this case OutR is much higher compared to
the CRRM QoS Based at 50%.
This distinction finally explains the trends detected in the first figure 5.12 of numerical
results, in which the highest Satisfaction Rate SatR is obtained with the CRRM QoS
Based algorithm, by choosing the two different thresholds for congestion at 50% and at
Common Radio Resource Management UMTS & WLAN 103
Figure 5.17: Distribution of voice call users in the two networks covering the hotspot
(k = 0.5)
Figure 5.18: Distribution of voice call users in the two networks covering the hotspot
(k = 1)
Common Radio Resource Management UMTS & WLAN 105
Figure 5.19: Ftp sessions in the hot spot: average perceived throughput
Based option at 85%, on the contrary, triggers less handovers, thus reducing the balancing
of radio resources between UMTS and WLAN and finally leading to a higher call block
and a worst service integrity and retainability.
In the last figure of this work - figure 5.19 - it is reported the main drawback introduced
by adopting a common radio resource management approach to improve the quality of
service for speech users in the hotspot, which was the main purpose of this study. As
could be expected, the average perceived throughput during FTP sessions in the hotspot
is reduced from the case in which the WLAN is dedicated to serve only data traffic (No
CRRM ) to the case of any CRRM configuration in which the WLAN channel is much
more busy to ”help” the UMTS to serve a larger amount of voice users.
However, we consider acceptable in the worst case scenario (k = 1) a reduction of
less than 25% for the average FTP throughput, that is a best effort service. As a matter
of fact, for k = 1, the benefit obtained thanks to the CRRM QoS Based is that the
Satisfaction Rate of voice users (see figure 5.12) is doubled.
Just for information, when No CRRM is used, the performance of WLAN is inde-
pendent from the voice traffic k in the hotspot; the small oscillations of average FTP
throughput in this configuration are due to the fact that each simulation uses seeds gen-
erated by different random sequences.
106 Common Radio Resource Management UMTS & WLAN
In this chapter we’ve presented the interactions between the Common Radio Resource
Management (CRRM) entity and the local RRM entities in UMTS and WLAN; differ-
ent CRRM algorithms have been proposed, and simulated with our advanced platform
(SHINE) in a realistic scenario of a hotspot of high density traffic covered by both UMTS
and WLAN radio access networks. In this final section of the numerical results we have
shown that a CRRM QoS Based algorithm can largely improve the performance of such
an integrated UMTS-WLAN network in terms of served voice users.
Actually, the aim of this study wasn’t to find the exact optimum, but it was to prove
that it is suitable to realize an integrated heterogeneous wireless network and that with
an appropriate CRRM algorithm combining radio interface measurements of both UMTS
and WLAN, the quality of service provided by the system can be clearly increased.
Conclusions
107
108 Conclusions
research groups is focusing on this topic and international projects are active on it.
The main contribution of my work in this area has been the design of a Common Radio
Resource Management algorithm, which can be Coverage Based, Service Based and Qual-
ity of Service (QoS) Based. Thanks to an innovative simulation platform called SHINE,
the full dynamic simulation of a UMTS-WLAN wireless heterogeneous network has been
carried out: the proposed CRRM QoS Based algorithm appears to largely improve the
performance of such an integrated UMTS-WLAN network in terms of served users.
This important result shall not be considered only as the final arrival point of this
activity, but also as the demonstration that an intelligent tight interworking in hetero-
geneous networks allows to widely improve the system capacity and that further studies
focused on CRRM algorithms based on radio interface measurements can be a prolific
field of research.
Appendix A
109
110 SHINE: Simulation platform for Heterogeneous Interworking Networks
out having two important issues in mind: flexibility and time efficiency.
The former is mainly related to the reusability of most of the software independently
on the particular interworking technologies to be investigated, in such a way to make
possible to move, for instance, from an UMTS-WLAN simulator to a GPRS-WiMAX one
without rewriting almost the entire code. In few words, flexibility is related to a change of
perspective in the design of the simulation tool which should be conceived as a simulation
platform rather than a dedicated simulator.
As for the time efficiency, it is straightforward to understand that simulating the
behavior of two or more interworking access-networks, which obviously operate simulta-
neously, could be really prohibitive in terms of simulation time, unless parallel execution
is performed. The point is: can parallel execution be performed with commonly available
computers and without any experience on parallel programming?
In order to achieve both the above mentioned objectives, we developed the simula-
tion platform SHINE (Simulation platform for Heterogeneous Interworking NEtworks),
hereafter described.
A.1.1 Flexibility.
To achieve the objective of flexibility we adopted a client-server structure for the simula-
tion platform, which is constituted, in particular, by one server-core simulator (hereafter
called Upper Layers Simulator, ULS) and a client simulator for each access technology
considered (Lower Layers Simulators, LLSs) (see figure A.1 where, for the sake of clarity,
only one LLS is depicted).
The ULS simulator is, in its turn, constituted by an access network(s) side and a Core
Network side: at the access network(s) side the ULS takes care of all information related
SHINE: Simulation platform for Heterogeneous Interworking Networks 111
to those users operating within the region covered by the simulated access-networks, such
as their mobility, class of service, etc. and of the end-to-end aspects of each connection,
such as the generation of the application-level traffic and the users’ TCP or UDP dy-
namics; at the Core-Network side, instead, the ULS takes care of all aspects concerning
communications.
Focusing the attention on the access network(s) side, it is worth noting that the ULS
structure, being related to the end-to-end aspects of communications, is independent
on the particular access technology (UMTS, WLAN, ...) adopted to establish the user
connection.
All aspects related to the access technologies adopted, hence related to the data-link
and physical layers and the local Radio Resource Management, are managed by the LLSs,
which are the client simulators and are specific for each access technology, so that our
simulation platform provides the presence of a LLS for each radio technology adopted in
the investigated scenario (see figure A.2).
What is really remarkable is that ULS and LLSs are distinct executables; nonetheless
the ULS communicates run time with LLSs through the TCP sockets of the computer
operating-system, thus simulating both vertical communications among the protocol lay-
ers of the single access technology and, since ULS is on top of all LLSs and manages all
end-to-end communications aspects, the access-networks interworking.
112 SHINE: Simulation platform for Heterogeneous Interworking Networks
Given this structure, any change in the access technologies investigated requires only
to write the related LLS simulators (that is, the data-link and physical level simulators
of each new technology including the corresponding RRM entity), which obviously have
to be provided with the standardized communication interface to interact with the ULS.
its tasks are mainly concerned with communications management (connections setup and
closure, management of application level traffic flows, ...), the simulation of transport
level protocols (TCP, UDP, ...) and the processing of simulation outcomes to provide
application level performance. In particular, the main tasks of ULS are:
• to set the starting instant of each new traffic session originated by users according
to the arrival statistics of the traffic class it belongs to (http, e-mail, voice calls, ...),
as well as users positions within the investigated scenario;
• to select through which technology (that is, through which LLS) should each user
connect to the network on the basis of user-defined rules and available information
on the current status of each network; it can also decide to reject a connection or
to move it from an LLS to another (that is, from a given technology to another) at
any time, thus simulating vertical (i.e. inter-system) handovers;
• to collect, finally, all simulation outcomes and to generate the outputs (user sat-
isfaction rate, throughput, packet delivery delays,...) from an end-to-end point of
view.
As for the LLSs, since they are specific for the particular access technologies inves-
tigated, their tasks are mainly concerned with data-link and physical level aspects of
communications and, in particular, are:
• to perform, if required, the call admission control specific of the technology it sim-
ulates and all technology specific radio resource management;
• to reproduce all physical layer procedures related to each transmission and reception:
power control, handover, radio frequency measurements, channel coding, modula-
tion, information detection, decoding, etc.
• to simulate all main Radio Resource Management (RRM) functions (see section 5.3
for more details).
• to collect, finally, all simulation outcomes and to generate the outputs (user satis-
faction rate, throughput, packet delivery delays,...) from the wireless links point of
view (that is, at data-link and physical level).
It is important to underline that the above reported structure and tasks division
allows an easy management of vertical (inter-system) handovers, which have obviously
to be simulated when investigating interworking access-networks. Vertical handovers, in
fact, essentially determine a change of the access technology adopted by users; from the
simulation point of view they mainly implies to switch the management of users physical
and data-link levels from one LLS to another, and this can be easily managed by the ULS
which is on top of all LLSs.
the best connection), no ULS reply is granted to the calling LLSs until all the interested
LLSs have stopped waiting for it.
It follows that although LLS executions take place at different speeds (LLSs complexity
could be different and they could be running on different PCs), the faster LLSs periodically
stop and wait for the LLSs they are interworking with, thus re-synchronizing simulations.
Please note that the depicted architecture leaves the LLS’ implementer free to decide
whereas an event driven or a time slotted simulator is the best choice for the specific
task. For instance, while a WLAN simulator is generally implemented as an event driven
simulator, a cellular system, characterized by a fixed radio frame structure, may be more
easily reproduced adopting a slotted time axis.
cellular network formalism, as shown in figure A.4. On the left side of the figure the
generic LLS is represented, whereas the ULS is depicted on the right side. From top to
bottom of the central part of the figure, we find the logical planes of the overall system:
from the call control/session management down to the physical layer, that is, from all
the Non Access Stratum functions to the Access Stratum ones. Thus, the arrows and
their directions clearly show all possible communications occurring between the ULS and
LLSs. Obviously, the arrows from left to right are related to lower layers events to be
communicated to the ULS, while the others are due to the flag reaching, hence due to
ULS events to be communicated to the LLSs.
Bibliography
[6] J.Heidemann et al., “Effects of Detail in Wireless Network Simulation” SCS Multi-
conference on Distributed Simulation, Phoenix, Arizona, USA January, 2001.
[7] D.Cavin, Y.Sasson, A.Schiper, “On the accuracy of MANET Simulators”, POMC’02,
October 30-31, 2002, Toulouse, France.
[8] M.Takai, J.Martin, R.Bagrodia, “Effects of Wireless Physical Layer Modeling in Mo-
bile Ad Hoc Networks”, Proc. MobiHoc 2001.
[9] G.Yeung et al, “Detailed OFDM modeling in network simulation of mobile ad hoc
networks ”, 18th Workshop on Parallel and Distributed Simulation, 2004. PADS
2004. May 2004.
[10] IEEE Std. 802.11a, “High-Speed Physical Layer in the 5 GHz Band”, 2000.
[11] J. Medbo, H. Andersson, P. Schramm, H. Asplund, J-E. Berg, “Channel Models for
HIPERLAN/2 in different indoor scenarios,1998-04”.
[12] W.C. Jakes, “Microwave Mobile Communications”. Piscataway, NJ. IEEE Press,
1994.
[13] IEEE Std. 802.11, “Wireless LAN Medium Access Control (MAC) And Physical
Layer (PHY) Specifications”, 1999.
119
120 Bibliography
[15] J. Zhang, W. Wang, ”Dynamic system level simulation for radio resource manage-
ment of TD-SCDMA high speed downlink packet access,” International Conference
on Communications, Circuits and Systems and West Sino Expositions, pp. 187-191,
29 June-1 July 2002.
[18] ETSI TS 123 107 v 5.10.0, ”Universal Mobile Telecommunication System (UMTS);
Quality of Service (QoS) concept and architecture”, septembre 2003
[21] H. Holma, A. Toskala, ”WCDMA for UMTS Radio Access for Third Generation
Mobile Communications”, WILEY, September 2000.
[23] E. Malkamaki, F. de Ryck, C. Mourot, ”A Method for Combining Radio Link Sim-
ulations and System Simulations for a Slow Frequency Hopped Cellular System”,
IEEE Veh. Technol. Conf. 1994 (VTC’94), pp. 1145-9, Phoenix, AZ, May 1994.
[26] ITU-T Recommendation E.800, “Terms and definitions related to quality of service
and network performance including dependability”. Augusto 1994.
[27] Kaveh Pahlavan et al., “Handover in Hybrid Mobile Data Networks”, IEEE Personal
Communications, April 2000.
[28] Shiao-Li Tsao, Chia-Ching Lin, “Design and Evaluation of UMTS-WLAN Interwork-
ing Strategies”, 2002 Computer & Communications Research Laboratories, Industrial
Technology Research Institute, Hsinchu, Taiwan, R.O.C.
[31] IEEE 802.11 WG, IEEE 802.11e/D5.0, “Draft Supplement to Standard for Telecom-
munications and Information Exchange Between Systems LAN/MAN Specific Re-
quirements Part 11: Wireless Medium Access Control (MAC) and Physical Layer
(PHY) Specifications: Medium Access Control (MAC) Enhancements for Quality of
Service (QoS), Aug. 2003”.
[34] IEEE 802.20 Working group on Mobile Broadand Wireless Access, “Traf-
fic Model for IEEE 802.20 MBWA System Simulations (Baseline Draft)”,
N.K.Shankaranarayanan, July 2003.
[35] http://www.umatechnology.org
[36] Http://www.ist-mobydick.org
[37] Http://www.Monasidre.com
[38] N.Vulic, I.Niemegeers, S.H.de Groot, “Architectural options for the WLAN integra-
tion at the UMTS radio access level”, IEEE VTC 2004-Spring.
[40] M.Bernaschi, F.Cacace, A.Pescape, S.Za, “Analysis and experimentation over het-
erogeneous wireless networks”, Tridentcom 2005.
122 Bibliography
[42] http://www.ist-scout.org
[43] http://www.freeband.nl/kennisimpuls/projecten/4gplus
[44] G.F.Riley et al., “Distributed network simulations using the dynamic simulation
backplane” 21st International Conference on Distributed Computing Systems, 16-19
April 2001.
[46] Bur Goode, “Voice Over Internet Protocol (VoIP)”, Proceedings of the IEEE, vol.90,
No.9, sept. 2002.
[48] 3GPP TS 25.221 V5.2.0, ”Physical channels and mapping of transport channels onto
physical channels (TDD)”
[51] 3GPP TS 25.331 V5.8.0, ”Radio Resource Control (RRC); Protocol specification”
[52] 3GPP TS 25.102 V5.5.0, appendix A, ”UE Radio Transmission and Reception
(TDD)”, june 2003
[53] 3GPP TS 25.105 V5.4.0, appendix A, ”Base Station (BS) radio transmission and
reception (TDD)”, april 2003
[55] 3GPP TR 101 112 V3.2.0, “Technical Report Universal Mobile Telecommunications
System (UMTS); Selection procedures for the choice of radio transmission technolo-
gies of the UMTS”. 1998-04.
[56] CWTS 3G digital cellular telecommunications system TSM , ”Multiplexing and mul-
tiple access on the radio path”, 05-02, Dec. 2001., Dec. 2001.
[58] 3GPP TS 24.008 V5.16.0, ”Mobile radio interface Layer 3 specification”, June 2006
[59] 3GPP TS 25.413 V5.12.0, ”UTRAN Iu interface RANAP signalling”, June 2005
Bibliography 123
[61] 3GPP TR 22.934 V6.0.0, “Feasibility study on 3GPP system to Wireless Local Area
Network (WLAN) interworking (Release 6), 2002”
[62] 3GPP TS 23.107. Technical Specification Group Services and System Aspects; QoS
Concept and Architecture
Acknowledgments
It is impossible to acknowledge every one who had contributed in some way to the results
of my doctoral course. Nonetheless, to the best of my ability I shall attempt to do so.
I would thus thank Professor Oreste Andrisano, who always supported and trusted
my job, also in the periods out of Bologna. Besides these three years of studies, I’ve
undertaken a long journey with him, which started on the summer of 2002 when I joined
for the first time the IEIIT-CNR institute for my degree thesis. Working in his research
team has been a fantastic opportunity.
Special thanks are dedicated to Gianni Pasolini and Alessandro Bazzi. I’m grateful to
have worked with them, they have been really my guidance in this period, and I’m only
sorry not being able to spend much more time with them in Bologna; thanks for your
help and encouragements to finalize this thesis!
I’m happy to convey my appreciation to the other researchers and professors of the
University of Bologna, Alberto Zanella (thanks to let me go to Las Vegas!), Barbara
Masini, Davide Dardari, Andrea Conti and Roberto Verdone.
Great thanks to Lorenzo Faggioni from Siemens Mobile. We have enjoyed together
many epic battles in the UMTS test lines; he has given me a lot of freedom to deepen
my research interests, he has transmitted to me the passion for teamwork, but most of all
he’s a great friend.
I wish to thanks also my unforgettable colleagues (friends) in Siemens Milano, Giovanni
De Pascalis, Marco Guidone, Manuel Piras, Simone Buzzi, Alberto Fontana, Andrea Sala
and Arnó Valerio: how much fun we had in these years! And how many discussions about
football, potatoes and UTRAN faults.
A special thank to Andrea Brambilla from Siemens. We left Milan together and now
we share an amazing apartment in Dusseldorf and an exceptional period of our life; I’m
very happy of that!
I would like also to thanks Augusto Tomas and Doctor René Jahnkow from Siemens
Dusseldorf. We experienced how to setup a full UMTS network alone in the desert of
Saudi Arabia, unrepeatable adventure!
125
126 Acknowledgments
I wish to thanks Gianluigi Liva for his constant support, also when things weren’t
going in the best way; he’s another Italian Ph.D. who immigrated in Germany and I
share with him the idea to go back to Romagna, asymptotically.
Thanks to Mauro Gibertoni, for his friendship for a life.
I want finally to express unique thanks to my family. My parents and my two sisters,
Laura and Gabriella, supported and always encouraged me during the long period of my
studies. By dedicating them this thesis, I know that I’m just giving back a little bit of
what they did (and they are still doing) for me. Nevertheless, they know how much I love
them.