143
Jorg Wyckmans Stations Emergency Ad Hoc Networks Through Mobile Base Academic year 2015-2016 Faculty of Engineering and Architecture Chair: Prof. dr. ir. Daniël De Zutter Department of Information Technology Master of Science in Computer Science Engineering Master's dissertation submitted in order to obtain the academic degree of Counsellor: Dr. ir. Margot Deruyck Supervisors: Prof. dr. ir. Wout Joseph, Prof. dr. ir. Luc Martens

Emergency Ad Hoc Networks Through Mobile Base …lib.ugent.be/fulltxt/RUG01/002/300/570/RUG01-002300570_2016_0001... · Emergency Ad Hoc Networks Through Mobile Base ... Mobile base

Embed Size (px)

Citation preview

Jorg Wyckmans

StationsEmergency Ad Hoc Networks Through Mobile Base

Academic year 2015-2016Faculty of Engineering and ArchitectureChair: Prof. dr. ir. Daniël De ZutterDepartment of Information Technology

Master of Science in Computer Science Engineering Master's dissertation submitted in order to obtain the academic degree of

Counsellor: Dr. ir. Margot DeruyckSupervisors: Prof. dr. ir. Wout Joseph, Prof. dr. ir. Luc Martens

Jorg Wyckmans

StationsEmergency Ad Hoc Networks Through Mobile Base

Academic year 2015-2016Faculty of Engineering and ArchitectureChair: Prof. dr. ir. Daniël De ZutterDepartment of Information Technology

Master of Science in Computer Science Engineering Master's dissertation submitted in order to obtain the academic degree of

Counsellor: Dr. ir. Margot DeruyckSupervisors: Prof. dr. ir. Wout Joseph, Prof. dr. ir. Luc Martens

Preface

With the uprising of smart phones, being continuously connected to the internet has become

common in our modern civilization. A disruption of this connection can even cause panic for

people who cannot longer connect to the network and the people who are usually connected to the

affected users of the network. These disruptions are caused by a variety of events like storms,

large traffic accidents, fires or explosions.

To prevent panic in these situations and to ensure rapid resolution of the occurred disaster,

communication is paramount. To ensure the ability to communicate, an alternative network is

introduced in this master’s dissertation. This network should be flexible to allow unrolling it in

areas of which no data is available. The necessary amount of flexibility is provided by introducing

mobile base stations. Mobile base stations should have the ability to get in place on there own

and to create a network without any configuration beforehand.

In this master’s dissertation, three types of mobile base stations are introduced and analysed.

The influence of several parameters that are characteristic to the specific type of mobile base

station is investigated. Based on this investigation the advantages and disadvantages of the

different types are derived.

I would like to thank my supervisors Prof. dr. ir. Wout Joseph, Prof. dr. ir. Luc Martens

for the offered opportunity to create this master’s dissertation. Next to them, I would like to

thank my counsellor dr. ir. Margot Deruyck for her patience, explanation, feedback and help in

order to complete this dissertation.

As my time at Ghent University is reaching its end, I would like to thank my parents. They

have always supported me in every possible way and provided me with counselling and guidance.

Thanks to them I received every possible chance to complete my studies and enjoy them at the

same time.

Jorg Wyckmans, June 2016

Permission for Use of Content

The author gives permission to make this master’s dissertation available for consultation and to

copy parts of this master’s dissertation for personal use.

In the case of any other use, the copyright terms have to be respected, in particular with

regard to the obligation to state expressly the source when quoting results from this master’s

dissertation.

Jorg Wyckmans, June 2016

Emergency Ad Hoc Networks

Through Mobile Base StationsJorg Wyckmans

Master’s dissertation submitted in order to obtain the academic degree of

Master of Science in Computer Science Engineering

Academic year 2015–2016

Supervisors: Prof. dr. ir. Wout Joseph, Prof. dr. ir. Luc Martens

Counsellor: Dr. ir. Margot Deruyck

Faculty of Engineering and Architecture

Ghent University

Department of Information Technology

Chair: Prof. dr. ir. Daniel De Zutter

Summary

The modern day society got used to living in a connected way. People share their mood and

whereabouts all the time, news is brought to you only seconds after it happened and you can

pick up the telephone to call almost anyone in the world if you wanted to. This connectivity

has become a normal thing, so normal that people do not know what to do when it disappears.

Nevertheless large incidents like storms, traffic accidents or terrorist attacks can result in dis-

rupted connectivity when using the normal infrastructure. A solution for this connectivity loss

is to create a temporary emergency network to reconnect the affected users to the network.

This dissertation introduces three scenarios to create such an emergency ad hoc network. Since

these networks will be used when an unexpected incident occurs, no information about the

location or timing is known beforehand. The creation of the ad hoc network thus needs to

happen in a flexible way and must be independent of the area. To do so, mobile base stations

are used. Each introduced scenario discusses a different way to enable the base stations to be

mobile and the possibilities per scenario are investigated.

In order to analyse the feasibility of each of these scenarios, a scheduling tool is designed. This

tool uses several input parameters that describe the used scenario and proposes a network based

on these parameters. Based on the output of this tool it can be verified how efficient the scenario

is in a certain area. The tool can also be used to determine what the locations of the base stations

should be when the network is unrolled in the specified area.

Keywords

Mobile base stations, ad hoc networks, disaster resolution, LTE femtocell

Emergency Ad Hoc NetworksThrough Mobile Base Stations

Jorg Wyckmans

Supervisors: Dr. ir. Margot Deruyck, Prof. dr. ir. Wout Joseph, Prof. dr. ir. Luc Martens

Abstract— Communication is important to resolve disasters. In this re-search three different scenarios to create an emergency ad hoc network arediscussed. Using mobile LTE femtocells, such an emergency ad hoc networkcan be created with minimal effort. In order to do so a scheduling tool isintroduced. This tool is used to determine the feasibility of the different sce-narios and to propose a network that reconnects as many users as possible.

Keywords— Mobile base stations, ad hoc networks, disaster resolution,LTE femtocell

I. INTRODUCTION

THE modern day society got used to living in a connectedway. People share their mood and whereabouts all the time,

news is brought to you only seconds after it happened and youcan pick up the telephone to call almost anyone in the world ifyou wanted to. This connectivity has become a normal thing, sonormal that people do not know what to do when it disappears.Nevertheless large incidents like storms, traffic accidents or ter-rorist attacks can result in disrupted connectivity when using thenormal infrastructure. A solution for this connectivity loss is tocreate a temporary emergency network to reconnect the affectedusers to the network.

This research introduces three scenarios to create such anemergency ad hoc network. Since these networks will be usedwhen an unexpected incident occurs, no information about thelocation or timing is known beforehand. The creation of the adhoc network thus needs to happen in a flexible way and must beindependent of the area. To do so, mobile base stations are used.Each introduced scenario discusses a different way to enable thebase stations to be mobile.

In order to analyse the feasibility of each of these scenarios,a scheduling tool is designed. This tool uses several input pa-rameters that describe the used scenario and proposes a networkbased on these parameters. Based on the output of this tool itcan be verified how efficient the scenario is in a certain area.The tool can also be used to determine what the locations ofthe base stations should be when the network is unrolled in thespecified area.

In section II, the technology used for the mobile base sta-tions is introduced. In section III, the proposed scenarios arediscussed. In order to analyse these scenarios, a scheduling toolis introduced in section IV. Based on these scenarios and thescheduling tool a sensitivity analysis was conducted on the in-put parameters of the tool defined by the different scenarios. Theresults of this analysis can be found in section V. A conclusionand some possible future work is discussed in section VI.

II. MOBILE BASE STATIONS

In this research LTE (Long Term Evolution) femtocell basestations are considered. LTE and LTE Advanced are the lateststandards in mobile networking technology [1]. The technol-ogy is developed by the Third Generation Partnership Project(3GPP) and it is known to the larger public as 4G (Fourth Gen-eration). LTE is designed as a solution to combine the high mo-bility in cellular networks and the high data rates that can befound in fixed Local Area Networks [2]. It is based on an allIP (Internet Protocol) architecture and uses packet switching forits traffic, including voice traffic. Greater deployment feasibilityand extendibility of previous cellular technologies is achievedby using this all IP based structure. LTE uses licensed frequencybands only, which have to be acquired by the mobile connectiv-ity provider deploying the LTE network. The technology offersup to 300 Mb/s downlink capacity and 75 Mb/s uplink capacity.LTE Advanced can offer up to 1 Gb/s downlink and 500 Mb/suplink capacity [3].

LTE femtocells typically provide coverage in a range ofaround 100 meters around the base station and can be found inlarge buildings to provide indoor coverage. The short transmit-receive distance greatly lowers the transmit power and achievesa higher Signal to Interference plus Noise Ratio (SINR). Thismeans that the signal is less attenuated by environmental influ-ences. Another property of femtocells is that cell-to-cell inter-ference is rather small due to the low transmit powers used [4].

The choice for this technology is based on the following con-siderations. The main target group of the newly created ad hocnetwork are users carrying a smart phone. The most popularways to connect to the network using a smart phone are 4G orWiFi. These technologies provide similar services with simi-lar properties. However, due to the uncontrolled nature of theunlicensed band in which WiFi operates, the throughput can bedramatically poor when a lot of users are competing for the sameresources. This is problematic for the presented use case sinceit is all about reconnecting a large number of users in the sameplace. Next to that, LTE is optimised to handle (slow) movingusers whereas WiFi is not [5].

III. SCENARIOS

In order to make the LTE femtocells mobile, three differentkinds of carriers are proposed resulting in four different sce-narios. The proposed carriers are Unmanned Aerial Vehicles(UAV), emergency service vehicles and public transport vehi-cles.

A. Unmanned Aerial Vehicles

In this scenario, the base stations are brought in place by us-ing unmanned aerial vehicles or drones. The base stations aremounted on drones which they use to fly to a certain location.Upon arrival, the drone has to hoover there for as long as pos-sible and afterwards return to its point of origin. The idea ofthis scenario is visualised in figure 1. In step 1 of this figurea facility housing multiple drones equipped with base stations isdepicted. This facility could be some kind of warehouse locatedin the centre of a city or it could be a truck driving to a disastersite to minimize the flight of the drones. From this facility thenecessary drones are dispatched to the place of the disaster instep 2 . Upon arrival, the drones reconnect the present users to

the network as visualised in step 3 . When a more permanentsolution is brought into place the drones return to their facility(step 4 ).

Fig. 1. Schematical overview of the scenario using drones.

B. Emergency Service Vehicles

This scenario uses emergency service vehicles to bring thebase stations in place. Emergency service vehicles are vehicleslike police cars, ambulances, the fire department fleet and so on.The emergency services are normally the ones to arrive first atthe site of an event. Next to providing the services they usuallydo, they could also provide extra network coverage without anyextra effort from the personnel.

The big advantage of this scenario is that there is little ex-tra infrastructure necessary. In the previous scenario there isa need for an extra carrier (namely, a drone) to transport thebase stations, some facility to store these drones and a way toguide and monitor them. In this scenario the base station is sim-ply mounted on an available vehicle and these vehicles are al-ready being dispatched to the disaster scene. The disadvantageof this scenario is that the covered area will be fairly limited.Emergency service vehicles have a tendency to flock together atthe core of the event, since there the need for help is often thelargest. This prevents the users at points that are further awayfrom the centre of the event from being reconnected and mightresult in an overcapacity at the centre.

C. Public Transport Vehicles

In an urban area it can be expected that at any time of theday there will be a lot of taxis, buses or other means of pub-lic transport around. Given this fact, they could also be usefulto reconnect users that got disconnected due to an unexpectedevent. The idea of this scenario is more or less the same as thescenario based on emergency service vehicles. Next to offer-ing their usual services, these vehicles could also provide extranetwork coverage without any extra effort.

An advantage of this scenario is that there is almost no ex-tra infrastructure necessary. Another advantage is that the lo-cation of the vehicles and thus the base stations is not limitedto the core of the disaster. Since these vehicles are not directlyinvolved in resolving the disaster they are more evenly spreadover the area than the vehicles used by the emergency services.A disadvantage of this scenario however is that it is very hardto anticipate the amount of available vehicles in an area. Whenusing drones for example, this can be tuned to the requirementsof the event given that enough drones are available.

D. Mixture of Scenarios

As a final scenario the three above scenarios are combinedand applied to a real life case. In this scenario it is assumedthat all buses and taxis available in the area are equipped withthe necessary equipment. Next to these carriers, the emergencyservice vehicles are also available to take part in the emergencyad hoc network. After the ad hoc network is build based uponthese two types of carriers the remaining users are covered withthe base stations mounted on drones.

IV. SCHEDULING TOOL

In order to simulate the aforementioned scenarios and to in-vestigate their feasibility, a scheduling tool is developed. Thistool takes a number of input parameters describing the scenarioat hand and creates a network based on these parameters.

The tool begins with generating the expected traffic in the in-vestigated area. Based on this traffic a heuristic is run and thelocations of the base stations are determined. For the scenarioof the drones, the locations that need to be covered in order toreconnect all users are generated in this step. As a next step,the tool determines which locations are the more important onesand which of these locations it is able to cover with the availableamount of drones and for the duration of the intervention. Forthe other two scenarios the amount of vehicles and the area inwhich they are located is fixed. The tool can not use the opti-mal locations for these types of carriers but creates a realistic setof locations for these vehicles. After this network proposal iscreated, the tool determines which users are connected to whichbase stations and which users cannot be reconnected to the net-work.

As output, the tool generates maps that depict the locationand coverage of all base stations. Next to these files, detailedinformation about the network, the covered and the uncoveredusers is written to disk.

Parameter Type 1 Type 2Carrier Speed 15.0 m/s 12.0 m/sCarrier Power 5.0 A 13.0 ACarrier Power Usage 20.0 Ah 17.33 AhCarrier Battery Voltage 14.3 V 22.2 V

TABLE IPARAMETER VALUES USED FOR THE DRONES

V. RESULTS

To investigate the feasibility of the different scenarios, a sen-sitivity analysis on the input parameters per scenario is con-ducted. These simulations are performed using an area ofaround 4 km2 in the city of Ghent. This area can be found infigure 2.

Fig. 2. The input area for the drone and public transport vehicle scenario.

A. Unmanned Aerial Vehicles

For the scenario based on drones, two types of drones areused. Type 1 is a cheaper model with less capabilities whereastype 2 is a rather expensive model that can stay in the air foraround 45 minutes. The specifications for both types can befound in table I.

This scenario needs 1100 type 1 drones or 400 type 2 dronesin order to cover all 224 users in the city of Ghent during 1 hour.The amount of present users is based on the data of a mobileconnectivity provider for the defined area on the busiest timeof the day [6]. The amount of necessary drones increases lin-early with the intervention duration so the longer the duration,the more drones are necessary. Another important factor thatthis analysis reveals is the minimal height of a drone. Whenthe minimal height is small (for example around 4 meters) thedrones are not able to cover a large area. Since an urban area isconsidered, the buildings surrounding the drone block the signal

due to a high path loss for the users in the area behind the build-ings. When the drone is situated higher (for example around 50meters) there are more users in line of sight of the drone whichenables these users to connect to the base station attached tothe drone. This means that the higher the drones are situated,the fewer base station locations are necessary. However whenthe average height becomes too big, the signal between a droneand a user is weakened due to the extra distance implied by thisheight which is an undesired effect. In this scenario, increasingthe minimal height from 2 to 30 metres leads to a decrease innecessary locations by 25% and when increasing the minimalheight from 30 to 90 meters another 25% of the total amount oflocations that is maximally necessary can be spared.

The results concerning this scenario bring to light that almostall users can be covered using drones provided that there areenough drones. The limiting factor in this scenario is thus thecost to acquire and maintain a fleet of drones.

B. Emergency Service Vehicles

The emergency services scenario is analysed based on asmaller area (around 1 km2, figure 3) in the city of Ghent anda lot more users than the other two scenarios. This is done be-cause of the fact that emergency service vehicles flock togetherinstead of being spread out over an area of 4 km2.

The amount of emergency service vehicles in the area provesto be the most important factor to reconnect all users. Sincethis scenario assumes that a lot of users are gathered in a smallarea, on average the total capacity of the base stations is used.No matter where the vehicle is placed in the area, a lot of userssurround it and connect to it if necessary.

Other important factors in this scenario are the range of thedisaster and the reliability of the vehicles. The range of the dis-aster determines the distance over which the vehicles are spreadout around the disaster. The further they are spread out, themore users they could reconnect given that enough capacity isavailable in the base stations. The reliability of the vehicles de-termines how long a vehicle and its base station stay at the sceneto provide coverage. If a vehicle is not reliable, the base stationis not useful for the users.

In the simulations for this scenario, 40 available vehicles witha reliability of 40% results in 15 vehicles that effectively staythroughout the entire simulation to reconnect users to the net-work. These 15 vehicles are situated in a range of 300 metersaround the disaster. They are only able to cover 2% of the 50000present users. Based on these results and the three aforemen-tioned factors it is concluded that an unrealistic amount of vehi-cles for the area is necessary to cover all users. The scenario canthus not be used on its own.

C. Public Transport Vehicles

In the scenario using public transport vehicles, the base sta-tions are spread out over different bus or taxi stops with differentsizes. The main conclusion from this scenario is that it is moreinteresting to have a lot of small stops containing a few basestations than only two or three stops containing a lot of basestations.

What is also important for this scenario is that there areenough of taxi and buses in the area to ensure continuous pres-

Fig. 3. The input area for the emergency service vehicle scenario.

ence of a base station at a stop. Otherwise the stop is not ableto provide continuous coverage to the present users making ituseless.

In the city of Ghent there are 5 big bus stops and 22 taxi stopsof different sizes. When assuming that the chance a bus is con-tinuously available at a platform of one of the stops is 50% andthat the same chance for a taxi is 30%, 27 bus base stations and44 taxi base stations are available to the users. Based on thisrealistic data it is seen that all the public transport base stationsin the area are not able to get more than 6% user coverage. Thisscenario is thus also not sufficient on its own.

D. Real Life Case

Since the emergency services and public transport scenariosare not feasible on their own and the drone scenario is ratherexpensive, the combination of these three scenarios is investi-gated using a real life case. The idea of this case is to use thedrone scenario to cover all user while covering as much users aspossible with cheaper infrastructure like buses, taxis and emer-gency service vehicles. This mixture of scenarios is applied toDe Gentse Feesten 2015 which is a festival in Ghent.

To simulate this scenario in an efficient way, two separategroups of users are generated. The first group, group 1, are theusers that are not attending the festival. This amount of usersis determined by real life data from a cellular network provideras proposed in [6]. The second group of users, group 2, are allattending the festival. For this group the algorithm generates50000 random users. This is based on the amount of daily usersprovided by [7]. The generated traffic is displayed in figure 4.

In the investigated scenario, all users in the city centre arereconnected but 98% of the users at the festival remain discon-nected. To achieve these results the algorithm determined thatthere are 294 base station locations available provided by 14emergency service vehicles, 17 buses, 110 taxis and 952 drones.Of the base stations at these available locations, 114 are not in

Fig. 4. The generated traffic for both groups (pink for group 1, purple for group2) to simulate the mixture scenario.

reach of any users, their locations is too remote. Since there areno users to reconnect at these locations, these locations are con-sidered useless. This means that there are 180 useful locationsin the scenario. These locations and their provided coverage canbe found in figure 5.

Fig. 5. The used base stations (pink) and their coverage (blue). Some basestations appear to have no coverage, this is because the covered area is sosmall that it is not bigger than the dot representing the base station.

In order to cover all users in this scenario, around 3204 type2 drones (table I) are necessary to provision 362 extra locationson top of the 153 base station locations provisioned by dronesand the 27 locations provisioned by other types of vehicles.

Based on these results it is seen that the emergency serviceand public transport vehicles cover around 5% of the locationsnecessary to reconnect all users. They are indeed able to relievesome of the pressure on the drone scenario. However, since thelocations of these types of vehicles is fixed, their placement isoften not optimal, rendering some of them useless. As a resultthere are still al lot of drones necessary to cover all users.

VI. CONCLUSION

Based on the analysis results of the proposed scenarios andthe results of the real life case it can be concluded that the sce-nario using drones is the most promising one. This scenario is

able to cover a user in almost every place due to the high mo-bility of these vehicles. A downside of this scenario however isthat they are based on extra infrastructure (the drones) insteadof reusing existing infrastructure like public transport and emer-gency services vehicles. The public transport and emergencyservice vehicles are able to cover only a small part of the presentusers. Although they are a lot cheaper since they do not requireextra infrastructure, they are not efficient enough to cover bigcrowds.

In order to create a fully working system the connection fromthe different base stations to the internet backbone should beinvestigated further. At the moment, there are several ways toestablish this connection. A first way is the use of terrestrialradio systems [8] [9]. Another way to achieve a connection tothe internet is by the use of satellite communication [10] or byusing directional antennas [11]. However, all these solutions arenot able to get speeds much higher than 10 Mbps in total whichis rather low when trying to connect for example a thousandusers.

Specifically for the drone scenario, it might be interesting toinvestigate the influence of different types of weather on the per-formance of the system. It might also be interesting to introducesome additional means of transporting the base stations to theirpredetermined locations. Other options could be the use of hotair balloons, robots or cars of private users.

REFERENCES

[1] Signals Research Group, “The LTE Standard,” 2014.[2] “Lte encyclopedia,” https://sites.google.com/site/

lteencyclopedia/home, Accessed: 10-04-2016.[3] Giuseppe Araniti, Claudia Campolo, Massimo Condoluci, Antonio Iera,

and Antonella Molinaro, “LTE for Vehicular Networking : A Survey,” pp.148–157, 2013.

[4] Vikram Chandrasekhar, Jeffrey G. Andrews, and Alan Gatherer, “Femto-cell networks: A survey,” IEEE Communications Magazine, vol. 46, no.9, pp. 59–67, 2008.

[5] Mehdi Bennis, Meryem Simsek, Andreas Czylwik, Walid Saad, StefanValentin, and Merouane Debbah, “When cellular meets WiFi in wirelesssmall cell networks,” IEEE Communications Magazine, vol. 51, no. 6, pp.44–50, 2013.

[6] Margot Deruyck, Wout Joseph, Emmeric Tanghe, and Luc Martens, “Re-ducing the power consumption in LTE-Advanced wireless access networksby a capacity based deployment tool,” Radio Science, vol. 49, no. 9, pp.777–787, 2014.

[7] “Eindcijfers gentse feesten 2015,” https://stad.gent/sites/default/files/article/documents/GF2015%20earlybird%20maandag%2027%20juli%20eindcijfers.pdf, Accessed: 08-03-2016.

[8] Bow Nan Cheng, Randy Charland, Paul Christensen, Leonid Veytser, andJames Wheeler, “Evaluation of a multihop airborne ip backbone with het-erogeneous radio technologies,” IEEE Transactions on Mobile Computing,vol. 13, no. 2, pp. 299–310, 2014.

[9] Bow Nan Cheng, Andrea Coyle, Stephen McGarry, Igor Pedan, LeonidVeytser, and James Wheeler, “Characterizing routing with radio-to-routerinformation in a heterogeneous airborne network,” IEEE Transactions onWireless Communications, vol. 12, no. 8, pp. 4183–4195, 2013.

[10] Alessio Botta and Antonio Pescape, “On the performance of new genera-tion satellite broadband internet services,” IEEE Communications Maga-zine, vol. 52, no. 6, pp. 202–209, 2014.

[11] Yixin Gu, Mi Zhou, Shengli Fu, and Yan Wan, “Airborne WiFi networksthrough directional antennae: An experimental study,” Wireless Communi-cations and Networking Conference (WCNC), 2015 IEEE, pp. 1314–1319,2015.

TABLE OF CONTENTS ix

Table of Contents

List of Figures xii

List of Tables xvi

List of Abbreviations xviii

1 Introduction 1

1.1 Problem . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1

1.2 Approach . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2

1.3 Structure . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2

2 State Of The Art 4

2.1 Mobile Ad Hoc Networks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4

2.2 Airborne Base Stations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5

2.3 Public Safety Networks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7

2.4 Connection to the Network Backbone . . . . . . . . . . . . . . . . . . . . . . . . 8

2.5 Network Deployment Tool . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9

2.6 Propagation Model . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11

3 Scenarios 14

3.1 Base Station Carriers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14

3.1.1 Unmanned Aerial Vehicles . . . . . . . . . . . . . . . . . . . . . . . . . . . 14

3.1.2 Emergency Service Vehicles . . . . . . . . . . . . . . . . . . . . . . . . . . 16

3.1.3 Public Transport Vehicles . . . . . . . . . . . . . . . . . . . . . . . . . . . 16

3.1.4 Mixture of Carriers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17

3.2 Base Station Technology . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17

3.2.1 LTE . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18

3.2.2 WiFi . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19

TABLE OF CONTENTS x

3.2.3 Comparison . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21

3.3 Important Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21

3.3.1 Unmanned Aerial Vehicles . . . . . . . . . . . . . . . . . . . . . . . . . . . 22

3.3.2 Emergency Services Vehicles . . . . . . . . . . . . . . . . . . . . . . . . . 23

3.3.3 Public Transport Vehicles . . . . . . . . . . . . . . . . . . . . . . . . . . . 24

4 Scheduling Tool 26

4.1 Algorithm . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 26

4.1.1 Unmanned Aerial Vehicles . . . . . . . . . . . . . . . . . . . . . . . . . . . 26

4.1.2 Emergency Service Vehicles . . . . . . . . . . . . . . . . . . . . . . . . . . 31

4.1.3 Public Transport Vehicles . . . . . . . . . . . . . . . . . . . . . . . . . . . 36

4.2 Number of Simulations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 40

4.2.1 Unmanned Aerial Vehicles . . . . . . . . . . . . . . . . . . . . . . . . . . . 41

4.2.2 Emergency Service Vehicles . . . . . . . . . . . . . . . . . . . . . . . . . . 44

4.2.3 Public Transport Vehicles . . . . . . . . . . . . . . . . . . . . . . . . . . . 47

5 Sensitivity Analysis 51

5.1 General Setup . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 51

5.2 Unmanned Aerial Vehicles . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 51

5.2.1 Facility Capacity . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 53

5.2.2 Intervention Duration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 60

5.2.3 Height Margin Between Drone and Surface . . . . . . . . . . . . . . . . . 66

5.2.4 Maximal Height of a Carrier . . . . . . . . . . . . . . . . . . . . . . . . . 72

5.2.5 Conclusion . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 75

5.3 Emergency Services Vehicles . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 77

5.3.1 Available Emergency Service Vehicles . . . . . . . . . . . . . . . . . . . . 77

5.3.2 Chance of Premature Departure . . . . . . . . . . . . . . . . . . . . . . . 80

5.3.3 Size of the Incident . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 81

5.3.4 Conclusion . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 82

5.4 Public Transportation Vehicles . . . . . . . . . . . . . . . . . . . . . . . . . . . . 84

5.4.1 Amount of Stops . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 84

5.4.2 Size of the Stops . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 88

5.4.3 Chance a Vehicle Is Present At a Platform of a Stop . . . . . . . . . . . . 93

5.4.4 Conclusion . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 97

TABLE OF CONTENTS xi

6 Mixture of Carriers 100

6.1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 100

6.2 Setup . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 101

6.2.1 Real Life Use Case . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 101

6.2.2 Algorithm Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 101

6.3 Results . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 106

6.3.1 Results for the Users in Group 1 . . . . . . . . . . . . . . . . . . . . . . . 106

6.3.2 Results for the Users in Group 2 . . . . . . . . . . . . . . . . . . . . . . . 108

6.4 Conclusion . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 109

7 Conclusion and Future Work 111

Bibliography 115

LIST OF FIGURES xii

List of Figures

2.1 Schematical concept of a FANET [1]. . . . . . . . . . . . . . . . . . . . . . . . . . 6

2.2 Schematical concept of the transmission of WiFi signals over large distances using

directional antennas and unmanned aerial vehicles [2]. . . . . . . . . . . . . . . . 9

3.1 Schematical overview of the scenario using drones. . . . . . . . . . . . . . . . . . 15

3.2 Schematical overview of a WiFi Extended Service Set (ESS) [3]. . . . . . . . . . . 20

3.3 Schematical overview of the height margin. (figure based on [4]) . . . . . . . . . 23

3.4 Schematical overview of the range of an event. . . . . . . . . . . . . . . . . . . . 24

3.5 Schematical overview of a public transport stop. . . . . . . . . . . . . . . . . . . 25

4.1 Part of the algorithm based on drones responsible for the generation of random

traffic. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 27

4.2 Part of the algorithm based on drones responsible for the generation of possible

base station locations. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 29

4.3 Part of the algorithm based on drones responsible for the generation of the optimal

network. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 30

4.4 Part of the algorithm based on drones responsible for the generation of the con-

strained network. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 32

4.5 Part of the algorithm based on emergency service vehicles responsible for the

generation of the possible base station locations. . . . . . . . . . . . . . . . . . . 34

4.6 Part of the algorithm based on emergency service vehicles responsible for applying

constraints to the proposed base station locations. . . . . . . . . . . . . . . . . . 35

4.7 Part of the algorithm based on public transport vehicles responsible for generating

the requested amount of stops. . . . . . . . . . . . . . . . . . . . . . . . . . . . . 38

4.8 Part of the algorithm based on public transport vehicles responsible for generating

the amount of continuously available base stations per stop. . . . . . . . . . . . . 39

LIST OF FIGURES xiii

4.9 Influence of the number of simulations on the convergence of the average of a

certain parameter for the scenario using drones. . . . . . . . . . . . . . . . . . . . 44

4.10 Influence of the number of simulations on the convergence of the average of a

certain parameter for the scenario using emergency service vehilces. . . . . . . . . 47

4.11 Influence of the number of simulations on the convergence of the average of a

certain parameter for the scenario using public transport vehilces. . . . . . . . . 50

5.1 The area (orange) used as input for the algorithm. . . . . . . . . . . . . . . . . . 55

5.2 Influence of capacity on coverage using type 1 drones based on the hotspot technique. 56

5.3 Influence of capacity on coverage using type 1 drones based on the ratio technique. 57

5.4 Comparison of the influence of capacity on location coverage between the two

techniques using type 1 drones. . . . . . . . . . . . . . . . . . . . . . . . . . . . . 58

5.5 Comparison of the influence of capacity on user coverage between the two tech-

niques using type 1 drones. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 58

5.6 Influence of capacity on coverage using type 2 drones based on the hotspot technique. 59

5.7 Influence of capacity on coverage using type 2 drones based on the ratio technique. 60

5.8 Comparison of the influence of capacity on location coverage between the two

techniques using type 2 drones. . . . . . . . . . . . . . . . . . . . . . . . . . . . . 61

5.9 Comparison of the influence of capacity on user coverage between the two tech-

niques using type 2 drones. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 61

5.10 Influence of the intervention duration on coverage using type 1 drones based on

the ratio technique. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 64

5.11 Influence of the intervention duration on coverage using type 2 drones based on

the ratio technique. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 65

5.12 Influence of the intervention duration on the amount of necessary drones of both

types based on the ratio technique. . . . . . . . . . . . . . . . . . . . . . . . . . . 65

5.13 Influence of the height margin on the amount of necessary locations to get 100%

coverage using type 1 drones and based on the ratio technique. . . . . . . . . . . 68

5.14 Influence of the height margin on the amount of covered users using type 1 drones

and based on the ratio technique. . . . . . . . . . . . . . . . . . . . . . . . . . . . 68

5.15 Influence of the height margin on the power usage per base station using type 1

drones and based on the ratio technique. . . . . . . . . . . . . . . . . . . . . . . . 69

5.16 Influence of the height margin on the amount of necessary locations to get 100%

coverage using type 2 drones and based on the ratio technique. . . . . . . . . . . 70

LIST OF FIGURES xiv

5.17 Influence of the height margin on the amount of covered users using type 2 drones

and based on the ratio technique. . . . . . . . . . . . . . . . . . . . . . . . . . . . 71

5.18 Influence of the height margin on the power usage per base station using type 2

drones and based on the ratio technique. . . . . . . . . . . . . . . . . . . . . . . . 71

5.19 Influence of the maximal height a drone can reach on the reachability of base

station locations and users using type 1 drones and based on the ratio technique. 73

5.20 Influence of the maximal height a drone can reach on the coverage of base station

locations and users using type 1 drones and based on the ratio technique. . . . . 74

5.21 Influence of the maximal height a drone can reach on the coverage of base station

locations and users using type 2 drones and based on the ratio technique. . . . . 75

5.22 The area used as input for the algorithm based on emergency service vehicles. . . 78

5.23 Influence of the amount of vehicles present at the scene on the amount of covered

users. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 79

5.24 Influence of the amount of vehicles present at the scene on the amount of Base

Stations. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 80

5.25 Influence of the departure chance of a vehicle on the amount of covered users. . . 81

5.26 Influence of the incident range on the amount of covered users. . . . . . . . . . . 83

5.27 Influence of the amount of bus stops on the maximal amount, the selected amount

and the used amount of base stations mounted on buses. . . . . . . . . . . . . . . 86

5.28 Influence of the amount of bus stops on the amount of users covered by buses. . . 87

5.29 Influence of the amount of taxi stops on the maximal amount, the selected amount

and the used amount of base stations mounted on taxis. . . . . . . . . . . . . . . 88

5.30 Influence of the amount of taxi stops on the amount of users covered by taxis. . . 89

5.31 Influence of the size of the bus stops on the maximal amount, the selected amount

and the used amount of base stations mounted on buses. . . . . . . . . . . . . . . 91

5.32 Illustration of the influence of different stop sizes. The coverage of a base station

at a platform is visualised by an orange circle. The entire stop is restricted to the

area within the blue circle. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 91

5.33 Influence of the size of the bus stops on the amount of users covered by buses. . . 92

5.34 Influence of the size of the taxi stops on the maximal amount, the selected amount

and the used amount of base stations mounted on taxis. . . . . . . . . . . . . . . 93

5.35 Influence of the size of the taxi stops on the amount of users covered by taxis. . . 94

5.36 Influence of the chance a bus stop is covered on the maximal amount, the selected

amount and the used amount of base stations mounted on buses. . . . . . . . . . 95

LIST OF FIGURES xv

5.37 Influence of the chance a bus stop is covered on the amount of users covered by

buses. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 96

5.38 Influence of the chance a taxi stop is covered on the maximal amount, the selected

amount and the used amount of base stations mounted on taxis. . . . . . . . . . 97

5.39 Influence of the chance a taxi stop is covered on the amount of users covered by

taxis. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 98

6.1 A map of De Gentse Feesten 2015 [5]. . . . . . . . . . . . . . . . . . . . . . . . . 102

6.2 The area used for the mixture scenario. . . . . . . . . . . . . . . . . . . . . . . . 103

6.3 The generated traffic for both groups (pink for group 1, purple for group 2) to

simulate the mixture scenario. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 103

6.4 The emergency services based base stations (purple) and their coverage (blue) for

the users in group 1. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 106

6.5 The public transport based base stations (purple) and their coverage (blue) for

the users in group 1. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 107

6.6 The drone based base stations (purple) and their coverage (blue) for the users in

group 1. The white dot denotes the location of the used storage facility. . . . . . 108

6.7 The locations of the base stations (purple) and their coverage (blue) used to cover

the users in group 2. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 109

LIST OF TABLES xvi

List of Tables

4.1 Parameter values used for the estimation of the necessary amount of simulations

for the scenario using drones. More information about these parameters can be

found in section 4.1.1. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 42

4.2 Parameter values used for the estimation of the necessary amount of simulations

for the scenario using emergency service vehicles. More information about these

parameters can be found in section 4.1.2 . . . . . . . . . . . . . . . . . . . . . . . 45

4.3 Parameter values used for the estimation of the necessary amount of simulations

for the scenario using public transport vehicles. More information about these

parameters can be found in section 4.1.3 . . . . . . . . . . . . . . . . . . . . . . . 48

5.1 Link Budget Table for a Femtocell Base Station. Based on [6] and [7] . . . . . . 52

5.2 Parameter values used for the first type of drone . . . . . . . . . . . . . . . . . . 53

5.3 Parameter values used for the second type of drone . . . . . . . . . . . . . . . . . 53

5.4 Parameter values used for the analysis of the influence of the facility capacity. . . 54

5.5 Parameter values used for the analysis of the influence of the intervention duration. 62

5.6 Parameter values used for the analysis of the influence of the height margin. . . . 66

5.7 Parameter values used for the analysis of the influence of the maximal allowed

height of a drone. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 72

5.8 Parameter values used for the analysis of the influence of the amount of available

emergency service vehicles. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 79

5.9 Parameter values used for the analysis of the influence of the chance a vehicles

leaves prematurely. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 81

5.10 Parameter values used for the analysis of the influence of the range of the incident. 82

5.11 Parameter values used for the analysis of the influence of the amount of bus and

taxi stops in the predefined area. . . . . . . . . . . . . . . . . . . . . . . . . . . . 85

5.12 Parameter values used for the analysis of the influence of the size of bus and taxi

stops in the predefined area. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 89

LIST OF TABLES xvii

5.13 Parameter values used for the analysis of the influence of the chance a bus or taxi

is present at a platform of a stop in the predefined area. . . . . . . . . . . . . . . 94

6.1 Parameter values used for the analysis of the mixture scenario. . . . . . . . . . . 105

LIST OF ABBREVIATIONS xviii

List of Abbreviations

3GPP Third Generation Partnership Project

4G Fourth Generation

AODV Ad-Hoc on-Demand Distance Vector

BSS Basic Service Set

BSSID Basic Service Set Identifier

CA Carrier Aggregation

DRS Directional Radio System

DS Distribution System

DSDV Destination Sequenced Distance Vector

DSR Dynamic Source Routing

ESB Electronic Switch Beam radio system

ESS Extended Service Set

ESSID, SSID Extended Service Set Identifier

GRAND Green Radio Access Network Design

IBSS Independent Basic Service Set

IEEE Institute of Electrical and Electronics Engineers

IP Internet Protocol

LAP Low Altitude Aerial Platform

LTE Long Term Evolution

LIST OF ABBREVIATIONS xix

MANET Mobile ad hoc networks

MIMO Multiple-Input Multiple-Output

OFDM Orthogonal Frequency Divison Multiplexing

ORS Omnidirectional Radio System

SINR Interference plus Noise Ratio

TETRA Terrestrial Trunked Radio

UAV unmanned aerial vehicles

UMTS Universal Mobile Telecommunications System

WiFi Wireless Fidelity

WLAN Wireless Local Area Network

INTRODUCTION 1

Chapter 1

Introduction

1.1 Problem

Imagine a day or even an hour without being connected to the modern day communication

systems. Nowadays that is almost impossible to do. People share their mood and whereabouts

all the time, news is brought to you only seconds after it happened and you can pick up the

telephone to call almost anyone in the world if you wanted to. This connectivity has become a

normal thing. So normal that people do not know what to do when it disappears. Nevertheless

it still happens that this connectivity is disrupted by all kinds of unexpected events like for

example natural disasters, large traffic accidents and explosions. Due to the fact that people are

always connected, a disruption by any kind of unexpected event might cause a panic with the

person in question but also with all the people who are connected to that person on a normal

day.

A good example of a situation like this took place a couple of years ago, namely in 2011.

In August 2011, 60000 people were gathered in Hasselt, Belgium for an annual festival called

Pukkelpop. During the first day of the festival a local but fairly severe storm broke out. This

storm caused a lot of damage including the uprooting of trees and the collapse of a couple of

tents in which the festival was hosted. In the end, the storm lasted only a couple of minutes

but 140 people got injured and five people died. Due to the fact that the modern day society

is always connected, the news spread quickly across the country resulting in a lot of concerned

parents and friends. They tried to reach out to the people at the scene and vice versa to check

if they were all right. The enormous surge in need for connectivity caused the network to go

down, leaving a lot of people in the dark about the safety and whereabouts of their loved ones.

This kind of disastrous events can happen at any moment. Even with smaller events the

need to be connected to the network can be just as big as in the aforementioned example. Since

1.2 Approach 2

these events are hard to foresee it is also hard to prepare the available infrastructure for the

inevitable increase in need for connectivity. It might even occur that the infrastructure that is

normally available is damaged or destroyed. The main question that arises is the following one.

How could a sudden shortage or loss of connectivity be solved?

1.2 Approach

A possible solution could be to create an emergency ad hoc network using mobile base stations.

For example, base stations could be installed in emergency vehicles to reinstate connectivity at

the location of a disaster. Drones with base stations attached to them could be deployed to the

location of the disaster. When you are in a more urban area, base stations could be installed in

taxis and buses since it can be expected that there will be a lot of those in an urban area. All

these options have one goal, to reconnect the users at the disastrous event in order to enable

them to communicate with the rest of the world when the normal infrastructure is not sufficient.

In this master’s dissertation the feasibility of such an emergency ad hoc network is investi-

gated. For multiple scenarios using different ways to make the considered base stations mobile, a

sensitivity analysis on the configurable parameters is executed. During this analysis it is investi-

gated where for example the used base station carriers are best stored to enable fast deployment

or how much base stations are necessary to reconnect the users for a certain time. Next to those

parameters, the specific features of a base station carrier like battery life or in case of a drone,

flight time, are taken under consideration.

In order to perform this analysis, a planning tool was created. This planning tool takes into

account the specifics of a base station carrier and a certain disaster area. Using this information

it estimates where the mobile base stations are best located in order to recreate an optimal

amount of coverage. Doing so it takes into account the availability of these carriers, where

they are stored and it tries to deploy them as efficiently as possible. Meaning, one mobile base

station will reconnect as many users as possible. In the end the planning tool proposes a network

that reconnects as many users as possible based on the given input parameters. The sensitivity

analysis is thus performed by analysing the evolution of these proposed networks when using

different sets of configurations.

1.3 Structure

In order to provide the necessary background information to the reader, a state of the art

investigation was performed. The information obtained through this research can be found in

1.3 Structure 3

chapter 2. In the part following this research, the different scenarios are introduced (chapter 3).

This chapter determines which base station carriers will be used and what kind of base station

technologies might be interesting. In the subsequent chapter, chapter 4, the designed scheduling

tool is presented. Several aspects about the tool such as the underlying algorithm and some

design decisions are discussed. By using this tool, a sensitivity analysis is performed. The

results of this analysis can be found in chapter 5. The analysis focusses on different configurable

parameters and different desirable scenarios that were introduced in chapters 3 and 4. Based

on these results the viability of the entire idea is checked against the reality in the best way

possible. In chapter 6, a real life scenario concerning a festival in Ghent, Belgium is elaborated.

This is done in order to draw conclusions about the feasibility of the presented idea when all

possible scenarios are combined. In the last chapter, chapter 7, a conclusion is formed based on

the entire dissertation and possible future work is discussed.

STATE OF THE ART 4

Chapter 2

State Of The Art

2.1 Mobile Ad Hoc Networks

The goal of this masters dissertation is the creation of a new network without any pre-installed

infrastructure. Mobile ad hoc networks (MANET) are excellent for this job as they allow to work

with continuously changing links and topologies of the network. All devices in a MANET are

called nodes and serve an equal purpose. A node could be a smartphone, a laptop or anything

else with networking capacities. There is no central control node which is why each device in

a MANET needs to be equipped with the capabilities to maintain the necessary information

about the network.

Within a MANET the nodes are connected through wireless links. When a node wants to

join a network, it looks for a neighbour where it can find the necessary information about the

MANET. When the new node receives this information it makes the other nodes aware of its

presence in a way depending on the used routing protocol [8]. The different routing protocols

are discussed in a subsequent paragraph.

A MANET is a self-forming and self-healing network making it very flexibile and elliminating

the need for extensive configuration which is essential for a mobile environment [9]. However,

due to the absent central infrastructure a MANET assumes that the network information of a

node (such as its IP address and its netmask) are configured statically before the node enters

the network [10]. This creates a big limitation for the flexibility of the MANET technology.

In [8] an approach where all nodes keep information about the used IP addresses and other

network information is proposed. Using this approach the need to statically configure a node

before adding it to the network is eliminated. Upon entering the network the present nodes will

assign a valid IP address to the new node in mutual agreement and provide it with the necessary

network information.

2.2 Airborne Base Stations 5

In a MANET, nodes move independently from one another with different speeds and be-

haviours. Due to this flexible and unreliable structure of a MANET, routing becomes a lot

harder. Every node has to store the necessary routing information in order to reach other nodes

and the internet backbone [11]. To complete this goal, many routing protocols were developed

like Destination Sequenced Distance Vector (DSDV) , Dynamic Source Routing (DSR) and Ad-

Hoc on-Demand Distance Vector (AODV) with several expansions. These protocols can be

divided into three categories: proactive routing protocols, reactive routing protocols and hybrid

routing protocols. Proactive routing protocols are protocols in which each node maintains a

routing table of known destinations. This technique reduces the amount of control traffic but

requires more memory of the node and extra bandwidth when sending periodical messages to

keep the table up to date. Reactive routing protocols behave a little different. This kind of

protocol does not keep a routing table but floods the network with route discovery messages

when a message needs to be delivered to a certain node. This results in a lower memory usage

and a lower control traffic overhead but it requires more bandwidth and processing time to get

a message from one node to another. Hybrid routing protocols try to combine the best of both

worlds. They enable the use of the reduced control traffic from reactive routing protocols and

the reduction of route discovery delays from proactive routing protocols by maintaining some

form of a routing table [12].

As can be seen in the previous paragraph there exist many possible ways to organise an

ad hoc network and route messages through it. This makes it very hard to distinguish the

best protocol. Which routing protocol to use in an ad hoc network will depend on several

environmental features, the mobility of the nodes and the resulting reliability of the links between

those nodes. Since there are so many influencing factors, it is hard to compare different protocols

and finding an optimal one for a certain use case [13].

2.2 Airborne Base Stations

An interesting way to create mobile base stations is to mount them on flying vehicles like

helicopters, hot air balloons or drones. This form of mobile base stations can be used for a

big variety of use cases like for example when a network connection needs to be provided to

unreachable places [14].

There are two basic ways to create a network out of these airborne base stations [1]. The first

way is an infrastructure based approach. In this approach the network is formed and controlled

by a single ground base or a satellite and all base stations communicate with this infrastructure.

This approach has several disadvantages. First of all, each base station needs to have access to

2.2 Airborne Base Stations 6

additional hardware to communicate with the ground base or the satellite which increases the

cost and the power usage of the base station. Second, the proper functioning of the network

depends on the link quality between the base station and the ground base or satellite. If the

quality of this link is insufficient the base station might loose connection with the ground base

or the satellite rendering it inoperable. Third, there exists a range restriction between the base

station and the ground base or satellite. When the base stations wanders off too far from the

ground base or satellite, a connection will no longer be possible. This creates a rather large

restriction in the necessary mobility of the nodes.

Figure 2.1: Schematical concept of a FANET [1].

A second and more preferable way of creating a network out of airborne base stations is to

create a flying, mobile ad hoc network or FANET. Figure 2.1 illustrates this approach. In this

approach, a subset of the base stations can be equipped with the necessary infrastructure to

communicate with the ground base or satellite while the other base stations can simply transfer

their data through this subset to the underlying network. This minimizes the necessary cost

and power. Also, since only a subset of the base stations can communicate with the ground

base or satellite, all other base stations can be further away from the from the ground base or

satellite making the range restriction from the previous approach more flexible. Based on this

approach the link quality becomes less important. If a link is insufficiently strong, the data is

routed through another one to the subset of base stations communicating with the ground base

or satellite.

In combination with these FANETs a Low Altitude Aerial Platform (LAP) could be created.

Low Altitude Aerial Platforms are quasi-stationary aerial platforms comprising drones or hot air

balloons with an altitude within the troposphere [15]. A LAP combined with a FANET results

in a sort of fly-in, fly-out infrastructure implementing the idea of offering on-demand servers in

2.3 Public Safety Networks 7

the air. The advantage of such an infrastructure in relation to their use with disastrous events

is that the created networks are very adaptable and potentially scalable [16]. This adaptability

allows the network to continuously improve link conditions by lowering the distance between a

sender and a receiver or avoiding obstacles. It also allows the network to operate in line-of-sight

conditions as much as possible, creating better signals and higher throughput [17].

2.3 Public Safety Networks

Public Safety Networks need to incorporate several characteristics since they are considered

mission critical. They need to be reliable, resilient and secure. Next to these characteristics

they need to offer some functionality like coverage, end-to-end performance and accessibility

to make them usable for the purpose of the public safety organisation. Other typical public

safety systems that need to be supported are fast vehicle localization, dispatching and group

communications [18].

Effective communications between and within these public safety organisations at crisis sites

is the key to success. Communicating efficiently or even sharing multimedia messages could help

them to assess the current situation better and thus intervene in a more efficient way.

Currently, public safety organisations use old legacy systems like the Terrestrial Trunked

Radio (TETRA) [19]. These TETRA terminals support a limited amount of communication

mechanisms like group calls, short data messaging and packet data. As can be seen, it would be

ideal to integrate these legacy systems with the newer broadband communication systems. Doing

so would enable a whole spectrum of new communication systems like broadband data services,

true concurrent voice and data services, simultaneous reception of many group calls, reduced

call setup and voice transmission delays and improved voice quality. In order to achieve this

integration several options need to be considered to upgrade the public safety communications

systems.

The first option is to evolve from the usage of TETRA to more currentday technologies like

4G and 5G. 4G and its successor 5G have the potential to revolutionize the communication

between the public safety services during disasters. The evolution from the current legacy

systems to 4G and 5G systems could transform the current platform to a much needed high-

speed communications tool. To enable this evolution, the Third Generation Partnership Project

(3GPP) incorporated the necessary functionality and capabilities into LTE advanced to meet

the requirements of a broadband public safety communications system [20].

The second option to upgrade the public safety communication system is the introduction of

airborne base stations as mentioned in section 2.2. Airborne base stations lend themselves well

2.4 Connection to the Network Backbone 8

for public safety communication due to their mobility and self organizing capabilities. These

features are highly necessary to deliver broadband connectivity at the time and the place where

it is most needed [21]. Using this kind of mobile base stations takes care of one of the biggest

disadvantages of current day public safety networks, namely their dependence on terrestrial

communications infrastructure [22].

A third and more advanced option is the use of coalitions between local devices [23]. The

idea of this option is that the devices of a group of public safety workers communicate directly

with each other without using the cellular network. This way a lot of energy could be saved,

some traffic can be offloaded from the network and communication between different parties can

become a lot smoother.

2.4 Connection to the Network Backbone

An emergency ad hoc network is only useful for a user when it can reconnect with the internet

through the created network. This implies that the ad hoc network that will be created needs

a certain connection to the network backbone. Such a connection can be achieved in multiple

ways. The three most common ways are discussed in the paragraphs below.

The first way that this can be achieved is with the use of terrestrial radio systems [24].

Examples of these systems are the Electronic Switch Beam (ESB) radio system, the Directional

Radio System (DRS) and the Omnidirectional Radio System (ORS) used by the Department

of Defence of the United States. These radios can provide a point-to-point connection from a

terrestrial base outside the disaster zone to one of the base stations from the ad hoc network

created inside the disaster zone. The maximal distance over which a connection can be estab-

lished using one of these technologies varies between 100 and 200 kilometres while providing an

average data rate of around 10 Mbps [25]. However, the closer the transmitting base station is

situated to the receiving ad hoc network the better link quality between the two can be reached

resulting in a better stability of the link and more throughput.

The second way to achieve a connection to the internet is by the use of satellite communica-

tion [26]. Such a connection has the same basic characteristics as with the terrestrial base station

connection. The connection is provided from outside the disaster area to one of the base stations

within the ad hoc network. Satellite communication is often not preferred by users because of

its poor performance. It is a technology mainly used in rural or remote areas where no other

options are available. However, around 2011 new satellites where launched with the primary

goal of providing high individual and aggregated performance when it comes to internet access.

Using these new satellites, downlink speeds of around 10 Mbps and uplink speeds of around 4

2.5 Network Deployment Tool 9

Mbps per user can be reached.

The third way to achieve such a connection is by using directional antennas [2]. This tech-

nique uses long distance antennas that can communicate with each other by directing them

to one another. In [2] it was found that it is possible to use directional antennas in order to

transmit WiFi signals over a distance of around one kilometre. The best setup would be when

the two antennas are in the air themselves, experiencing less interference from the ground. An

example of this setup can be found in figure 2.2. Using this setup, a bit rate of around 10 kbps

over a distance of one kilometre was reached. Since the goal is to reconnect a lot of users to the

internet this will not be sufficient. However, the authors believe that this could be improved

by bringing the transmitter and the receiver closer to each other and aiming the antennae in a

more precise way. A substantial improvement might still make this a viable way to create the

backhaul connection.

Figure 2.2: Schematical concept of the transmission of WiFi signals over large distances using

directional antennas and unmanned aerial vehicles [2].

2.5 Network Deployment Tool

An important part of this masters dissertation is the creation of a network deployment tool

for emergency situations. This tool calculates the favourable positions for mobile base stations

depending on the characteristics of the users and the vehicles used to move the base stations.

In [27] the Green Radio Access Network Design (GRAND) tool is introduced. GRAND is

a network deployment tool that can be used to optimize an existing or new network in terms

of power usage. This tool assumes that the antennas of the base stations transmit the same

amount of power in each direction. Doing so, the coverage of a base station can be represented

by a circle. Initially, all base stations are assumed to be inactive. During the runtime of the tool

2.5 Network Deployment Tool 10

all possible users and locations are inspected and four different actions can be performed to form

the network. The first action is activating a new base station. The second one is deactivating an

active base station. The third action is adding 1 dbm to the input power of an active base station

and the last one is subtracting 1 dbm from the input power of a base station. While the tool

performs these actions the network is updated until a stopping criteria is met. Depending on

this stopping criteria, an optimal network will be generated by the algorithm when it terminates.

In [28] the successor of the GRAND tool is introduced. This new version of the tool focusses

on some extra improvements. The tool is created to respond to the instantaneous bit rate that

the users in the considered area require. In [28] it is, among others things, used to investigate the

impact of three different features that are incorporated in LTE Advanced. The first feature is

Carrier Aggregation (CA) . When CA is used, the bit rate is increased by allowing the base sta-

tion to transmit at multiple carriers to the users. The second feature is the use of heterogeneous

networks where different base station types (macrocells, picocells, femtocells or others) can be

used in the same network. The third feature is the use of the Multiple-Input Multiple-Output

(MIMO) technology where the bit rate of a base station is increased by using more antennas.

In order to investigate the impact of these features, three dimensional geometrical data of the

considered area is necessary. In the case of this paper, the tool was applied to a suburban area

in Ghent, Belgium.

In [29] a tool similar to the one in [27] is introduced. The main difference between these two

network deployment tools is that the results in [29] focus on indoor femtocell networks. The tool

creates a network in two steps. First, the possible base station locations are generated. Every

building is a possible location for a base station. The tool will place this base station at the

center of a building in order to reduce the set of possible locations and to reduce the simulation

execution time. The second step makes use of the same four actions as the GRAND network

deployment tool does in order to create an optimal network in terms of power consumption.

Performing these actions, the tool creates different generations of the network until a certain

stopping criteria is met. The more generations are created, the better the created solutions will

get.

The network deployment tool for this master’s dissertation should also be able to determine

good locations for base stations while taking into account the bit rates required by the users.

Next to that it could be desirable that the newly designed tool takes the power consumptions

of the base stations into account and tries to minimize those. Parts of the network deployment

tools discussed in this section can thus be reused as a base for the network deployment tool

focussing on emergency ad hoc networks.

2.6 Propagation Model 11

2.6 Propagation Model

Propagation models provide a way to calculate the loss that a signal experiences over a certain

distance. Buildings tend to occur in almost every location. These buildings have different sizes,

shapes, heights and they are located at different, unpredictable distances from each other. When

deploying a femtocell network within a suburban area the possibility that the signal between a

user and a base station is blocked is quite big. This implies the need for a pathloss model that

takes into account the different aspects of a building and the difference between the path loss

when a user is in the line of sight of a base station and when it is not.

For a small cell network like a femtocell network, numerous propagation models exist. Exam-

ples are empirical models, the two-ray model, the Lee microcell model and the Walfish-Ikegami

model . All these models have their own advantages and disadvantages, however they are all

capable of precisely calculating the pathloss for a user in a femtocell network located in an

urban area [30]. For this master’s dissertation the decision was made to continue with the

Walfish-Ikegami model [31] since it is a model that performs accurately for femtocell networks

in suburban and urban areas [32].

Classical field strength models like the Okumura model [33] are generally used to calculate

the path loss in mobile radio applications. These models are not designed to be used in small

femtocell networks since they only take into account the direct line between the base station

and the user and will thus only be effective for base stations at great heights. To accommodate

this problem the European research committee COST 231 (Evolution of land mobile radio)

created a propagation model for estimating the urban transmission loss based on empirical and

deterministic models, the Walfish-Ikegami model.

When a very precise path loss prediction is required, the use of a site-specific propagation

model is the best way to go [32]. A site-specific model takes into account the specific charac-

teristics of the area in which the network will operate. This requires a lot of data gathering

beforehand which prevents it from being used for the use case presented in this master’s disserta-

tion. However, the use of a site-specific model in comparison to the use of the Walfisch-Ikegami

model only results in a moderate improvement. The Walfisch-Ikegami model will thus be a very

good model that requires little effort for a femtocell network.

The Walfish-Ikegami model is based on the following formulas to calculate the pathloss Lp

in decibels [34]. In the case that the user is in line of sight of the base station, the formula is

rather simple.

Lp = 42.6 + 26 · lg(d

km) + 20 · lg(

f

MHz) (2.1)

2.6 Propagation Model 12

With d being the distance between the transmitter and the receiver and f being the used

frequency. For the non line of sight case, the formula translates to the following.

Lp =

L0 + Lrts + Lmod if Lrts + Lmsd > 0

L0 if Lrts + Lmod ≤ 0(2.2)

With L0 the free-space loss in decibels, Lrts the roof-top-to-street diffraction and scatter loss

in decibels and Lmod the multiscreen loss in decibels. The free-space loss (L0) can be defined as

follows.

L0 = 32.4 + 20lgd

km+ 20lg

f

MHz(2.3)

The roof-top-to-street diffraction (Lrts) defines the loss due to the coupling of the wave into

the street where a receiver is located and can be defined as follows.

Lrts = −16.9− 10 · lg(w

m) + 10 · lg(

f

MHz) + 20 · lg(

hroof − hRX

m) + Lorientation (2.4)

With hroof −hRX the difference in height between the receiver and the roof and w the width

of the roads. The orientation loss (Lorientation) depends on the orientation of the roads ϕ and is

defined as follows.

Lorientation =

−10 + 0.354 ϕ

deg for 0◦ ≤ ϕ < 35◦

2.5 + 0.075( ϕdeg − 35) for 35◦ ≤ ϕ < 55◦

4.0 + 0.114( ϕdeg − 35) for 55◦ ≤ ϕ < 90◦

(2.5)

The multiscreen diffraction loss (Lmsd) can be defined as follows.

Lmsd = Lbsh + ka + kd · lg(d

km) + kf · lg(

f

MHz)− 9 · lg(

b

m) (2.6)

Lbsh =

−18 · (1 +hTX−hroof

m ) for hTX > hroof

0 for hTX < hroof

(2.7)

ka =

54 for hTX > hroof

54− 0.8 · hTX−hroof

m for d ≥ 0.5km and hTX ≤ hroof

54− 0.8 · hTX−hroof

m · d/km0.5 for d < 0.5km and hTX ≤ hroof

(2.8)

2.6 Propagation Model 13

kd =

18 for hTX > hroof

18− 15hTX−hroof

hroof−hRXfor hTX < hroof

(2.9)

kf = −4 +

0.7(f/MHz925 − 1) for medium sized cities and suburban centers

1.5(f/MHz925 − 1) for metropolitan centers

(2.10)

In these formulas the factors kd and kf control the dependence of Lmsd on the distance and

the radio frequency. The factor ka quantifies the increase in path loss when a base station is

situated below the rooftops.

SCENARIOS 14

Chapter 3

Scenarios

Different approaches are possible to create an emergency ad hoc network. The feasibility of

these approaches mainly depend on the kind of carrier used to make the base station mobile.

Next to the kind of carrier, the kind of base station itself can also vary. In this chapter the

different types of carriers are discussed in section 3.1. Possible technologies regarding the base

stations are discussed and compared in section 3.2. In section 3.3 it is concluded which scenarios

should be analysed and what parameters are interesting to investigate.

3.1 Base Station Carriers

When setting up an emergency ad hoc network it is important that the necessary infrastructure

to create a new network gets in place. In this dissertation three different scenarios with different

ways to mobilize base stations are discussed. The first scenario can be found in section 3.1.1.

In this scenario unmanned aerial vehicles (UAV) are used to mobilize the base stations and to

spread them over an area. In the second scenario, introduced in section 3.1.2, the possibility to

embed base stations into the vehicles used by the emergency services is taken under consider-

ation. As a third scenario, the use of taxis, cars of postal services and other types of vehicles

commonly present in urban areas is considered in section 3.1.3.

3.1.1 Unmanned Aerial Vehicles

Unmanned Aerial Vehicles or drones are getting more and more common. The last few years,

the simpler variants even got payable for the public. This trend led to an enormous increase

in applications for all kinds of use cases. In the case of emergency ad hoc networks, it has to

be possible to mount some kind of base station on a drone and let it fly to a certain location.

Upon arrival, it has to hoover there for as long as possible and afterwards return to its point of

3.1 Base Station Carriers 15

origin. The idea of this scenario is visualised in figure 3.1. In step 1 of this figure a facility

housing multiple drones equipped with base stations is depicted. This facility could be some

kind of warehouse located in the centre of a city or it could be a truck driving to a disaster site

to minimize the flight of the drones. Using this facility the necessary drones are dispatched to

the place of the disaster in step 2 . Upon arrival, the drones reconnect the present users to the

network as visualised in step 3 . When a more permanent solution is brought into place the

drones return to their original facility (step 4 ).

Figure 3.1: Schematical overview of the scenario using drones.

In section 2.2 airborne base stations are discussed, more specifically how to create a network

out of them. In this section, the base stations become airborne by the use of drones. There are

two different types of drones available for this scenario. The first type are helicopter drones.

These have a similar design as helicopters, meaning they fly by using propellers. The second

type are winged drones. These have a similar design as an aeroplane, meaning the stay in the

air using wings. In [35] and [36] it is shown that it is possible to mount the necessary equipment

on a fairly simple helicopter drone and have it located in one place for a certain amount of time.

In [37] it is shown that the same can be done using a winged drone. What is also illustrated in

this paper is that using a winged drone will result in high variability of the signal due to the

constant movement of the drone. This variability makes it a lot harder to predict the available

signal strength and thus the availability of the base station in question. A helicopter drone does

not have this disadvantage. It can hover in practically the same place. Due to this advantage

of the helicopter drone they are exclusively used for this scenario.

3.1 Base Station Carriers 16

3.1.2 Emergency Service Vehicles

When an unexpected event like the one at Pukkelpop or a large traffic accident takes place,

emergency services will be dispatched to the event’s location. Emergency service vehicles are

vehicles like police cars, ambulances, the fire department fleet and so on. The emergency services

are the ones to arrive first at the site of a disastrous event. Next to providing the services they

usually do, they could also provide extra network coverage without any extra effort from the

personnel.

For this scenario the emergency service vehicles should be equipped with a certain type of

base station. With this extra infrastructure an emergency service vehicle could try to re-establish

the connection between the network and the present users once it arrives at the site.

The big advantage of this scenario is that there is little extra infrastructure needed. In

section 3.1.1 there was a need for an extra carrier (namely, a drone) to transport the base

stations, some facility to store these drones and a way to guide and monitor them. In this

scenario, no extra carrier is needed, the base stations are installed in the existing vehicle. Next

to that, the emergency vehicles are already being deployed to the sites where extra coverage

could be necessary which prevents the need for extra guidance or monitoring. The necessary

infrastructure is thus limited to the installed base stations. The disadvantage of this scenario is

that the covered area will be fairly limited. Emergency service vehicles have a tendency to flock

together at the core of the event, since the need for help is often the biggest at that location.

This prevents the users at points that are further away from the centre of the event from being

reconnected. The scenario of 3.1.1 does not have this disadvantage since the drones can be

evenly spread out over the area to provide a maximal amount of coverage.

3.1.3 Public Transport Vehicles

In an urban area it can be expected that at any time of the day there will be a lot of taxis,

buses or other means of public transport around. Given this fact, they could also be useful to

reconnect users that got disconnected due to an unexpected event. The idea of this scenario is

more or less the same as the idea in section 3.1.2. Next to providing their usual services, these

vehicles could also provide extra network coverage without any extra effort.

In order to make this scenario work, the available taxis and public transport vehicles need

to be equipped with a certain type of base station. When an unexpected event takes place it

is assumed that some of these vehicles are present since this scenario focusses solely on urban

areas. As long as the vehicles are present they are able to reconnect the users in their vicinity.

The advantage of this scenario is that there is almost no extra infrastructure necessary. The

3.2 Base Station Technology 17

base stations can be attached to the vehicle preventing the need for a dedicated carrier as in

section 3.1.1. Another advantage in comparison with the scenario proposed in section 3.1.2 is

that the location of these vehicles is not limited to the core of the event. Since these vehicles

are not directly involved in the event they will be more evenly spread out than the vehicles used

by the emergency services. This scenario will thus combine the advantages of the previous two

sections. A disadvantage of this scenario however is that it is very hard to anticipate the amount

of available vehicles in an area whereas in section 3.1.1 this can be tuned to the requirements of

the event when enough drones are available.

3.1.4 Mixture of Carriers

As a final scenario the three above scenarios are combined. In this scenario it is assumed that all

buses and taxis available in the area are equipped with the necessary equipment as discussed in

section 3.1.3. Next to these carriers, the emergency service vehicles introduced in section 3.1.2

will also be available to take part in the emergency ad hoc network. After the ad hoc network

is build based upon these two types of carriers the remaining users are covered with the base

stations mounted on drones from section 3.1.1.

The main purpose of this scenario is to verify how many drones would be necessary in a

certain area. The necessary infrastructure investments for the emergency service and public

transport vehicles are much lower than it is the case with drones. Therefore it is interesting

to use these cheaper types of carriers before deploying the expensive implementation based on

drones.

3.2 Base Station Technology

All kinds of technologies exist to connect users to the internet. In this master’s dissertation,

the focus lies on people using their cellphones to connect to a network. Long Term Evolution

(LTE) and Wi-Fi are among the most popular techniques to do so. In this section a comparison

is made between these two technologies. Based on this comparison, one technology is chosen to

be used by the base stations throughout this dissertation.

In section 3.2.1 LTE is introduced and discussed. In section 3.2.2, the same is done for

WiFi. In section 3.2.3 a comparison between both technologies is given and the best one for the

emergency ad hoc networking use case is chosen.

3.2 Base Station Technology 18

3.2.1 LTE

Long Term Evolution (LTE) and Long Term Evolution Advanced [38] are the latest standards

in mobile networking technology. The technology was developed by the Third Generation Part-

nership Project (3GPP) and it is known to the larger public as 4G (Fourth Generation) . LTE

was designed as a solution to combine the high mobility in cellular networks and the high data

rates that can be found in fixed Local Area Networks [39]. LTE is based on an all IP (Internet

Protocol) architecture and uses packet switching for all traffic, including voice traffic. Greater

deployment feasibility and extendibility using previous cellular technologies is achieved by using

this all IP based structure.

LTE uses licensed frequency bands only, which have to be acquired by the mobile connectivity

provider that is deploying the LTE network and thus the bands differ from region to region.

LTE features a great increase in speed and efficient frequency usage, enabling a user of LTE

to transmit and receive more data than with previous technologies like the Universal Mobile

Telecommunications System (UMTS) using the same amount of resources. LTE offers up to 300

Mb/s downlink capacity and up to 75 Mb/s uplink capacity. In order to achieve even higher

speeds, LTE Advanced puts more bits into each hertz of frequency, it binds together separate

frequency bands, it makes better use of cells and base stations to broaden the coverage and it

can use multiple antennas in a more efficient way. By incorporating these improvements, LTE

Advanced can offer up to 1 Gb/s downlink and 500 Mb/s uplink capacity [40].

The range of connectivity of a LTE based base station is divided into different categories.

Since LTE is a technology based on cellular networks, this range is categorised using cells. There

are three types of cells [41].

The first type of LTE cells are the small cells. This type contains two kind of cells namely

femtocells and picocells. Small cells typically provide coverage in a range of around 100 meters

around the base station and can be found in large buildings to provide indoor coverage. The

short transmit-receive distance greatly lowers the transmit power and achieves a higher Signal

to Interference plus Noise Ratio (SINR) . This means that the signal will be less attenuated

by environmental influences. Another property of small cells is that cell-to-cell interference is

rather small due to the low transmit powers used [42]. The main difference between picocells

and femtocells is the backhaul connection and the size of the cell. The backhaul connection

for picocells is usually provided by an operator whereas femtocells are usually connected to the

network of the home user. Next to this, the coverage area of a femtocell is usually around a few

tens of meters whereas picocells can cover an area of approximately 200 meters.

A bit bigger are the LTE microcells. These are the cells that can typically be found in for

3.2 Base Station Technology 19

example historical city centres and metro stations. Microcells can cover an area in a range of

around a few hundreds of meters. They require a lot more power than small cells.

The biggest cell available is a macrocell. Macrocells can typically provide coverage in a range

of a few kilometers around the base station. They are often placed along highways and on top

of buildings. The base stations used by this type of cell consume a lot of power and form the

foundation of the cellular network.

Due to the many advantages of small cells like their low power usage and their portability,

these will be the most suitable candidate for the use case presented in this master’s dissertation.

Since LTE femtocells are a bit smaller, they are easier to mount on for example a drone and

their power usage will be fairly limited. Next to that they are a bit more flexible in installation

since no operator needs to be consulted. The capacity of a wireless link can be increased with

the most certainty by bringing the transmitter and the receiver closer together [43]. The aim

will thus be to bring the base stations as close as possible to the users. This means that the

smaller range implied by a femtocell will be sufficient. Femtocells are the right fit for this use

case.

3.2.2 WiFi

WiFi is a technology that enables devices to connect to a Wireless Local Area Network (WLAN).

It can be defined as any WLAN technology based on the 802.11 standards created by the

Institute of Electrical and Electronics Engineers (IEEE) [44]. The term WiFi is an abbreviation

of Wireless Fidelity. WiFi is one of the most spread wireless networking technology, it can be

found almost everywhere in the world.

WiFi networks make use of radio waves to transmit information across a network [45]. The

technology operates in the unlicensed spectrum using the 2.4 GHz and 5 GHz frequency bands

and can typically connect devices in a range of 100 meters around a base station. Depending

on the used 802.11 standard and frequency, different data rates can be obtained. For example

802.11a uses the 5 GHz band and Orthogonal Frequency Divison Multiplexing (OFDM) to reach

a maximum of 54 Mb/s. 802.11b on the other hand uses the 2.4 GHz band resulting in a lower

data rate of maximally 11 Mb/s. 802.11g also uses this frequency band but combines it with

OFDM resulting in a maximum data rate of 54 Mb/s. Another popular and somewhat newer

standard, 802.11n, uses the 5 GHz band but is able to reach maximum rates of 140 Mb/s. One

of the most advanced WiFi standards is 802.11ac which can provide data rates up to 1 Gb/s.

All these standards behave differently but nevertheless, the newer ones preserve connectivity

possibilities with the older versions of the technology.

The 802.11 standard defines two modes of operation [3]. The first mode is the infrastructure

3.2 Base Station Technology 20

mode. In this mode, each client connects to the WiFi access point through a wireless link. A

schematical overview of this mode can be found in figure 3.2. The collection of connected clients

and the access point is called a Basic Service Set (BSS) . Each BSS contains a BSSID. A BSSID

is a 48 bit identifier with which the BSS of a specific access point is identified. Several BSS can

be combined together through a Distribution System (DS) resulting in an Extended Service Set

(ESS) . A DS can be any connection enabling communication between the BSS access points in

the ESS. An ESS also uses an identifier, the ESSID, which is often shorted to SSID. A SSID

is the name that shows up in the list when looking for a network. The advantage of an ESS is

that the client can move between the different access points and thus the different BSS without

even noticing it.

Figure 3.2: Schematical overview of a WiFi Extended Service Set (ESS) [3].

The second mode is ad hoc mode. In this mode clients connect to each other in a peer-to-peer

fashion without any central control. A group of clients interconnected using this mode is called

an Independent Basic Service Set (IBSS) . This IBSS is also identified using an SSID like it was

the case in infrastructure mode.

An existing WiFi network broadcasts beacon frames at regular times [3]. These frames are

signals containing the SSID of the network and enables a new client to find and connect to the

network. If the client wishes to connect to a network with a certain SSID it will send a probe

request over every channel. Such a request contains the SSID of the network the client wants

to connect to and the traffic volume that its wireless adapter can support. Upon reception of

this request, the network will send synchronisation data and data about the traffic load in the

network to the client but only if the SSID in the request and that of the network match. When

3.3 Important Parameters 21

the client receives this information it can use it to start communicating with the WiFi network.

WiFi networks use a packet switching paradigm in order to transmit and receive data. With

the introduction of voice over IP, even voice data can be transmitted over WiFi networks based

on the same packet switching paradigm [46].

3.2.3 Comparison

From the sections above it becomes clear that the properties of both technologies that are

important for the use case in this dissertation, are basically the same. This makes both LTE

femtocell and WiFi technologies suitable candidates for this use case.

However, due to the uncontrolled nature of the unlicensed band in which WiFi operates the

throughput can be dramatically poor when a lot of users are competing for the same resources.

This could be problematic for the presented use case since it is all about reconnecting a large

number of users in the same place. Next to that, LTE is optimised to handle (slow) moving

users whereas WiFi is not. Since the use case handles primarily about mobile users this is a big

advantage when using LTE as a base station technology [43].

Next to the technological advantages of LTE femtocell base stations in comparison to WiFi

base stations there is another, more specific, advantage. When all normal cellular connectivity

goes down due to a certain event, it might happen that the wired network is still up and running.

This means that if there are WiFi base stations in the area that are connected to this network,

users can also use these to reconnect to the network. When WiFi base stations would be used

instead of LTE femtocell base stations for the use case, there would be a strong increase of

active WiFi base stations in the area resulting in a lot of extra interference. However, when

LTE femtocell base stations are used, different frequency bands are used for the emergency ad

hoc network and the possibly remaining WiFi hotspots. This creates less interference and thus

the possibility to provide more users with the necessary connection.

Based on these elements, LTE femtocells were chosen as the technology for the base stations

analysed in this master’s dissertation. This technology will cause less interference for the possibly

still available WiFi hotspots and its fully optimized for mobile users on which the focus of the

proposed emergency ad hoc networks lies.

3.3 Important Parameters

In order to investigate the feasibility of the aforementioned scenarios several simulations will

be run. Each of these simulations will run based on a variation of different input parameters.

Doing so, the effect on the proposed scenario is investigated. In this manner the sensitivity of

3.3 Important Parameters 22

the scenario to certain values of the input parameters is determined.

Throughout all scenarios there are two common parameters. The first parameter is the

amount of users in the considered area. This parameter can be defined in two different ways.

On the one hand, the amount of users is inspired on real data for the considered area, depicting

what the necessary bit rates are within the area, on a normal day. On the other hand the

amount of users could be a random number. This can be useful to simulate unexpected events

where the amount of users within the area is abnormally large. For example, when the disaster

at Pukkelpop 2011 took place, there were a lot more people in the area than there would usually

be.

The second parameter is the duration of an intervention. An intervention can be defined as

the time during which the emergency network is dispatched, users are reconnected and a more

permanent solution is deployed. This dissertation only discusses emergency ad hoc networks, it

will not be the case that the network has to stay in place for days at a time. Instead it should

be used to bridge the gap between the event and the installation of a more permanent solution.

Since it is not known upfront how long this might take it is interesting to consider this parameter

in order to check what is feasible and what is not for the considered scenario.

3.3.1 Unmanned Aerial Vehicles

Next to the aforementioned common parameters, drones imply some other interesting parame-

ters. First, all the parameters concerning the capabilities of the specific drone itself. These are

the average speed of the drone, the total power that the battery can supply for the drone with

the attached base station and the average power usage of the drone itself during flight.

Second, the amount of available drones can be interesting to vary. As mentioned in section

3.1.1 the idea of this scenario is to place a storage facility or truck at a certain location. The

amount of available drones will be equal to the capacity of this facility or truck.

The third parameter is the height between the drone and the surface above which it is

hoovering. This parameter is illustrated in figure 3.3. The surface could be the street (ha) or

the rooftop of a building in which a user is located (hb). It is important to have this margin

since it is undesirable to place a drone to close to the surface where people could damage it or

to close to hanging cables and other obstacles around the area. Implementing this margin might

result in a weaker signal since the base station will be further away from the user. However,

when the base station is located higher it might be that more users are in the line of sight of

this base station resulting in less path loss and thus a stronger signal. This contradiction makes

this margin an interesting parameter to investigate.

The fourth parameter is the maximal height a drone can reach. As long as there are no

3.3 Important Parameters 23

Figure 3.3: Schematical overview of the height margin. (figure based on [4])

obstacles above them drones do not really have a height limitation. However the higher a drone

goes, the further away it will be from the user resulting in the same contradiction as with the

margin. What might be more interesting is what happens when the height is actually limited

and a drone can not pass over certain buildings. In that case, some users located inside a high

building might not be able to reconnect to a drone making the proposed solution useless for

these users. Depending on the height of the average user and the maximal height a drone is

allowed to reach, the solution for this scenario can get infeasible.

3.3.2 Emergency Services Vehicles

For the scenario using emergency service vehicles described in section 3.1.2 there are three

important parameters next to the amount of users and the duration. The first parameter is the

range of the disastrous event. Since emergency service vehicles are usually situated where help

is needed they will not occur in the entire area. Instead they will be focussed within an area

around the centre of the disaster. The size of this area is the range of the event and it can be

depicted as the circle in which emergency vehicles occur. In figure 3.4 such an area with range

R is visualised. Depending on the size of this circle the spread of the emergency service vehicles

over the area will vary. A small circle will result in a lot of emergency service vehicles crammed

together providing a lot of capacity to a small number of users whereas a large circle will result

in a better spread of the emergency service vehicles and thus a better division of the available

bit rate over the present users.

A second parameter is the total amount of emergency service vehicles that are available.

Since these vehicles are used to mobilize the base stations, the amount of these vehicles will

determine the amount of base stations available to reconnect the present users. Although this

parameter will vary depending on the disaster and cannot be requested or known upfront, it

3.3 Important Parameters 24

Figure 3.4: Schematical overview of the range of an event.

is an interesting parameter to consider. This parameter makes it possible to investigate if this

scenario is feasible.

A third parameter worth looking at is the chance of departure. The chance of departure is the

chance that an emergency vehicle leaves before there is a solution for the current connectivity

shortage. Emergency service vehicles will be very busy during the aftermath of a disaster.

Vehicles like ambulances usually arrive and depart within a short time frame rendering them

useless as a possible solution. Vehicles of the fire department however have a tendency to stay

on site the entire time, until everything is resolved. Other emergency service vehicles like police

cars might have another kind of behaviour. This parameter is used to simulate the amount of

different vehicles and their different behaviours in the scenario by introducing the chance that

they depart prematurely. This parameter is also closely intertwined with the duration parameter.

The longer an intervention takes, the bigger the chance is that a vehicle leaves prematurely. Since

these parameters are directly correlated, it is useless to analyse them separately.

3.3.3 Public Transport Vehicles

In the scenario using taxis, buses and other public transport vehicles (section 3.1.3), the duration

of the intervention is less important. Public transport is almost always available albeit in smaller

amounts during the night, rendering the duration a less important factor. The amount of users

however is as important as it was in the previous two sections.

Next to the amount of users three other important parameters are identified. The first

parameter is the interval limiting the sizes of the stops used by the public transport vehicles. A

stop of a public transport vehicle can be seen as a collection of platforms where a single vehicle

can park for a certain amount of time when for example the driver is taking a break or awaiting

3.3 Important Parameters 25

customers. The amount of available platforms is the size of the stop. This concept is visualised

in figure 3.5. In this figure one stop containing six platforms is depicted. This makes the size of

this stop equal to six. Since the base stations are mounted on the public transport vehicles and

a platform can hold one public transport vehicle at a time, the size of the stops determines the

total amount of available base stations.

Figure 3.5: Schematical overview of a public transport stop.

The second important parameter is the amount of stops that are spread over the area. As

stated in the previous paragraph the amount of stops is directly proportional to the amount of

available base stations. Next to that, the amount of stops will determine the spread of the stops

over the area. A lot of small stops will generate a better spread than one very large stop.

The third and final interesting parameter is the chance there is a public transport vehicle

available at one of the platforms of a stop. Using this chance it is determined how many base

stations are simultaneously present at a stop and thus how well a certain stop can cover the

users in its vicinity.

SCHEDULING TOOL 26

Chapter 4

Scheduling Tool

In this chapter the creation and operation of a tool specifically designed for our use cases is

discussed. Making use of the properties and different technologies discussed in the previous

chapters, this tool creates an emergency ad hoc network for a geographically limited area. In

section 4.1 the algorithm for every scenario is discussed. In section 4.2, the amount of simulations

the tool needs to create in order to generate representative averages is investigated and the results

are discussed.

4.1 Algorithm

Every scenario introduced in chapter 3 has its own specific way of tackling the problem at hand.

In section 4.1.1 the algorithm to create an emergency ad hoc network using drones is discussed

in detail. The algorithm used to generate simulations based on emergency service vehicles is

discussed in section 4.1.2. As a final scenario, the algorithm for the generation of simulations

using public transport vehicles is discussed in section 4.1.3.

4.1.1 Unmanned Aerial Vehicles

The algorithm which uses unmanned aerial vehicles or drones is split into four parts. In section

4.1.1.1, the first part of the algorithm is described. In this part, the users, their related bit rate

and location are generated. In section 4.1.1.2 the suggested locations for the base stations which

could lead to a good solution are generated. The third part, which can be found in section

4.1.1.3, discusses the generation of a more optimal network in which the users are connected to

a certain base station and the useless base stations are filtered out. The final part, in section

4.1.1.4, takes into account the constraints implied by the base station carriers in order to create

a realistic solution based on the proposed network. In section 4.1.1.5 the output of the algorithm

4.1 Algorithm 27

is discussed.

4.1.1.1 Traffic Generation

The algorithm starts with generating random traffic for a certain area. The flowchart represent-

ing this process can be found in figure 4.1. In order to be able to work with a representative

amount of users for the area under consideration, real data from a mobile provider in the area

is used as in [47].

In figure 4.1, step 1 and 2, the algorithm generates a random location within the area and

a desirable bit rate for the current user. Generating this random location happens in a uniform

way. Every point in the area has the same chance to be chosen as a user location but no point can

be chosen twice. The distance between two points however can be arbitrary small. A desirable

bit rate can have only one out of two values, the desirable bit rate for voice communication

or the desirable bit rate for data communication. These values are 0.064 Mbps and 1.0 Mbps

respectively and are the mean desirable bit rates found in the aforementioned data from the

mobile provider. In step 3 (figure 4.1) the algorithm checks if the desired amount of users is

reached. If this is not the case, the process will start from the beginning and generate another

user.

Figure 4.1: Part of the algorithm based on drones responsible for the generation of random

traffic.

4.1 Algorithm 28

4.1.1.2 Generation of Possible Base Station Locations

When the users are generated, the algorithm will determine all possible locations for the base

stations. The actual network is then generated based on these proposed locations in the next

section. A step by step illustration of this part of the algorithm can be found in figure 4.2.

The eventual goal of this algorithm is to reconnect every user to the network. To do so,

every user has to be able to connect to one of the available base stations. This requires that

every user is in reach of at least one base station location that is proposed in this part of the

algorithm. To achieve this requirement the algorithm will try to place a drone above every user

and mark that location as a possible base station location. The advantages of this strategy are

that there are no potential base station locations situated in areas where no users are present

and that every user can potentially be reconnected to the network.

In figure 4.2, step 1 checks if the location of the current user intersects with a building in the

area. If the location intersects with a building, the algorithm goes to step 2 (figure 4.2) where

a potential base station location is placed above the building with a certain margin provided

that the drone is allowed to fly this high. If the location does not intersect with a building, the

algorithm goes to step 3 (figure 4.2) where a potential base station location is placed above this

user with a certain margin. In the final step (step 4, figure 4.2), the algorithm checks if all user

locations are considered and if this is not the case it restarts the process with a new location.

4.1.1.3 Generating the Network

In order to prevent the use of too many locations, an optimisation phase is introduced in the

algorithm. This optimisation phase connects the users to the base station that fits their needs

in the best way and removes the unused locations. A flowchart of this process is drawn in figure

4.3. At the start of this phase, it is assumed that there are base stations at all the locations

that were proposed in the previous phase. Initially, all these base stations are inactive.

The first step of this optimisation is to calculate the pathloss between a specific user and

all the potential base station locations (figure 4.3, step 1). Using this data the best potential

location (the location with the lowest pathloss) is chosen, provided that this location is already

active. In step 2 (figure 4.3), the algorithm checks if the base station is able to offer the required

bit rate and input power to the current user. If it is unable to do so, the algorithm takes the

second best base station that is active and so on until a feasible, active base station is found. If

there is no feasible location among the active locations, the algorithm moves on to step 3 (figure

4.3) where it activates the best inactive potential base station and connects the current user to

it. Since it is important to choose the best location for every user, the algorithm checks which

4.1 Algorithm 29

Figure 4.2: Part of the algorithm based on drones responsible for the generation of possible base

station locations.

users could better switch to this newly activated location in step 4 (figure 4.3). In step 5 (figure

4.3) the algorithm checks if there are any users left and if this is the case, it restarts the process

with the next user.

This phase results in an optimal list of potential base station locations. After this step it

is also known how many and which users are covered by a certain potential location. This

information is then used in order to distinguish the important from the less important potential

locations in the next phase.

4.1.1.4 Applying Constraints to the Generated Network

The final phase of the algorithm is the generation of the actual network. This phase builds

upon the proposed optimal network found in the previous phase. It creates a realistic network

based on the proposed network by implementing the constraints of the drones that carry the

base stations. In figure 4.4 the overview for this final phase can be found.

In step 1 of figure 4.4, the algorithm starts by generating a sorted list of base stations. There

are two ways in which this sorted list can be generated. First, the base stations can be sorted

according to the amount of users they cover. The more users they cover, the higher they end up

in the sorted list and the bigger the chance that they are provided with the necessary carriers.

4.1 Algorithm 30

Figure 4.3: Part of the algorithm based on drones responsible for the generation of the optimal

network.

The second way of sorting uses the amount of users in relation to the necessary amount of drones

carrying base stations as a measure. If a base station connects a lot of users without requiring a

lot of carriers, it ends up higher in the list and thus it increases its chance of being provisioned.

Using this list of sorted base stations, the algorithm starts looking for all base stations it

can provision with the available capacity of carriers. In order to do so, three things need to

be calculated. In step 2 (figure 4.4) the flight time from the facility to the required location

is calculated using the specified parameters of the carriers. After this, the power usage of the

carrier in combination with the mounted base station is calculated in step 3 (figure 4.4). Step

4 (figure 4.4) uses these two numbers to calculate the time the battery will last. Based on this

data, step 5 (figure 4.4) calculates the amount of carriers necessary to bridge the duration of the

entire intervention. Step 6 (figure 4.4) calculates the feasibility of the current location, using the

data of the previous steps. In case the round trip time of the carrier alone already drains the

battery, the location is marked as infeasible. If not, the algorithm checks whether or not there

4.1 Algorithm 31

are enough carriers left in the facility to provision this location during the entire intervention. If

there are enough carriers available, the location is marked as feasible and the necessary amount

of drones is subtracted from the total capacity. If the necessary amount of carriers exceeds the

remaining capacity of the facility, the location is marked as infeasible and the algorithm moves

on to the next location until no locations are left.

4.1.1.5 Output of the Algorithm

After doing all the necessary calculations the algorithm performs its last important step. It

gathers all the generated data and generates the necessary output. The output consists out of

two types of files. The first type are files that can be used as an overlay for a map. These files

contain the locations of all the users, the base stations and an estimate of the coverage of the

base stations. The second type of files are comma separated values files containing data of the

most important variables calculated throughout the algorithm as well as their averages and 95th

percentile.

The first important variable that is added to these files is the flight time to a location. This

is an interesting variable to observe since it affects the ability of the algorithm to cover a certain

location. The second important variable is the battery lifetime of a drone. This variable is an

important factor in determining if a drone can be used to cover a location or not and how long

it is able to cover it. Derived from these two variables a third important variable can be created,

the amount of carriers needed to cover a certain location throughout the entire intervention.

This variable will be used to investigate the exact influence of battery life and flight on the

ability to cover a certain location. The fourth variable is the amount of locations that were

present in the total network before the constraints were introduced. In combination with the

fifth parameter, the amount of infeasible locations, this parameter creates the ability to calculate

the percentage of covered locations. The last variable that is added to the files is the amount of

reconnected users. This way the influence of the variables mentioned above on the actual goal

of the algorithm, covering users, can be investigated.

4.1.2 Emergency Service Vehicles

The algorithm for the scenario that uses emergency service vehicles works basically in the same

way as the one using drones to mobilize the base stations.

In section 4.1.2.1 it is explained how the users are spread out over the defined area and

how their requested bit rate is calculated. In section 4.1.2.2 the possible locations where an

emergency service vehicle occurs are determined. Based on this list of possible locations, the

4.1 Algorithm 32

Figure 4.4: Part of the algorithm based on drones responsible for the generation of the con-

strained network.

4.1 Algorithm 33

algorithm determines the feasibility of each location in section 4.1.2.3. As a final phase in section

4.1.2.4, the algorithm connects as many users as possible to the base stations generated that

were marked feasible in the previous phases. In section 4.1.2.5 the output of the algorithm is

discussed.

4.1.2.1 Traffic Generation

Generating the necessary traffic in the geographically limited area happens the same as in section

4.1.1.1. The flowchart (figure 4.1) can be found in the same section. The only difference is that

the algorithm using emergency service vehicles does not use provider data to determine the

amount of users. As mentioned in section 3.1.2, this scenario focusses on a big crowd spread out

over a smaller area. In order to simulate this, the amount of users needs to be provided as a

parameter to the tool. This is in contrast with the previous scenario where the amount of users

was derived from realistic provider data.

In figure 4.1 step 1 and step 2 will perform the same tasks as in section 4.1.1.1. Step 3

however, does no longer make use of the data from the mobile provider but is based on user

input.

4.1.2.2 Generation of Possible Base Station Locations

The second phase of the algorithm generates a list of possible base station locations. A flowchart

for this part can be found in figure 4.5.

Step 1 (figure 4.5) of this phase checks if the necessary amount of generated locations is

reached. This amount is based on an input parameter and depicts how many emergency service

vehicles will arrive at the disaster site during the intervention. In step 2 (figure 4.5), a random

coordinate is chosen within a circle with a certain range around the disaster site. This circle

has a user specified radius and its centre is the disaster site. These coordinates are chosen in a

uniform way. Every point in the defined circle has an equal chance to be chosen but no point can

be chosen twice. The distance between two chosen coordinates can be arbitrary small however.

In step 3 (figure 4.5) the algorithm checks if the chosen coordinate falls within a building. If this

is the case, a new coordinates are chosen since an emergency service vehicle cannot occur inside

a building. Once a valid location is found, a new base station with the chosen coordinates is

added to a list of possible locations as can be seen in step 4 (figure 4.5). Every generated base

station will immediately be configured as an active one. This enables the algorithm to connect

a user to the best base station in terms of path loss. In this scenario this can be done since the

number of locations does not have to be limited. The emergency service vehicles will be present

4.1 Algorithm 34

if they are used or not. This is completely different as in the scenario using drones where it

was important to limit the number of locations and to group as many users as possible to one

location in order to limit the amount of necessary base stations.

Figure 4.5: Part of the algorithm based on emergency service vehicles responsible for the gener-

ation of the possible base station locations.

4.1.2.3 Applying Constraints to the Proposed List of Base Station Locations

After the algorithm generates the possible base station locations it checks whether or not these

locations are feasible. Since it is not certain how long an emergency service vehicle will be at its

location, it could be the case that it cannot provide coverage after all. A flowchart of this part

of the algorithm can be found in figure 4.6.

The algorithm goes over all proposed base station locations separately so the first step of

the algorithm is to check if there are any locations left to go over. If this is not the case the

algorithm moves on to step 2. In step 2 (figure 4.6) the time an emergency service vehicle is

available is calculated using the chance a vehicle leaves the scene during the intervention. This

4.1 Algorithm 35

chance of departure is provided by the user as an input parameter. In step 3 (figure 4.6), the

algorithm checks whether or not the duration of the stay of the current vehicle is larger than or

equal to the intervention duration. If it is larger or equal, the location is marked as feasible as

can be seen in step 4 (figure 4.6).

Figure 4.6: Part of the algorithm based on emergency service vehicles responsible for applying

constraints to the proposed base station locations.

4.1.2.4 Generating the Network

In the final part of the algorithm, the network is generated based on the constrained list of

base station locations proposed in section 4.1.2.3. This generation happens analogous to the

generation of the network in the algorithm using drones as a carrier for the base stations. A

more detailed explanation of this part can be found in section 4.1.1.3 and a flowchart describing

this part can be found in figure 4.3. The only difference with the description in section 4.1.1.3

is that all base stations in the list are already active making step 3 and step 4 in figure 4.3

obsolete.

4.1 Algorithm 36

4.1.2.5 Output of the Algorithm

The output of the algorithm using emergency service vehicles is formatted in the same way as

the output from the algorithm using drones. The first type of files are comma separated value

files with all the data that was created during the execution of the algorithm. The second type

of files are files that can be used as an overlay for a map. These files contain the locations of all

the users, the base stations and an estimate of the coverage of the base stations.

The comma separated value files contain information about all the important variables within

the algorithm. The first important variable is the amount of users that are not covered at the

end of the simulation. Based on this variable it is determined how good the proposed solution

is for the problem at hand. The second important variable is the total time all emergency

vehicles were present. Using this variable, an assessment can be made of the stability of the

solution. The solution is stable when a lot of vehicles stay in place longer than the duration

of the intervention. It is unstable when the amount of available vehicles plummets after the

duration of the intervention. This means that if the intervention had taken just a few minutes

longer the solution would have been invalid. The third and fourth important variables are the

amounts of vehicles that were used to reconnect to the network and the total amount of vehicles

that left before the intervention terminated. Using these parameters in combination with the

total amount of available vehicles it can be decided if the simulation failed because of insufficient

capacity, a departure chance that was too big or bad placing of the vehicles with respect to the

users.

4.1.3 Public Transport Vehicles

The algorithm for the scenario that uses public transport vehicles works basically in the same

way as the one for the other scenarios.

In section 4.1.3.1 the mechanism to generate the necessary amount of users for the current

scenario is discussed. Next to the amount of users, a certain amount of stops for the public trans-

port vehicles needs to be generated. This is explained in section 4.1.3.2. After the generation of

the stops, the algorithm determines how many base stations can be linked to a certain stop in

section 4.1.3.3. By using this data, the algorithm can decide which users can be connected to

the network using one of the generated base stations. The details behind these decisions can be

found in section 4.1.3.4. As a final step the algorithm creates some files containing the output

of the algorithm. The format and contents of these files is discussed in section 4.1.3.5.

4.1 Algorithm 37

4.1.3.1 Traffic Generation

Generating the necessary amount of users for this scenario happens in exactly the same way as

described in section 4.1.1.1. A flowchart illustrating this phase of the algorithm can be found in

figure 4.1.

4.1.3.2 Generation of Stop Locations

Next to the generation of the users, the stops need to be generated. A stop is a place that

consists out of a certain number of platforms where a bus or a taxi can reside for a certain

amount of time while the drivers are taking a break for example. To define a stop, two elements

have to be chosen. First, the location of the stop needs to be selected. Second, the size of a stop

needs to be chosen in a random but uniform way from an interval which is a user defined input

parameter. A flowchart for this phase can be found in figure 4.7.

In figure 4.7, step 1, the algorithm checks whether or not the requested amount of stops is

reached. If the requested amount is not reached the algorithm continues with creating a new

stop in the following steps. In step 2 (figure 4.7) a new point within the boundaries of the

predefined area is generated. These points are generated in a uniform way, meaning every point

has the same chance of being chosen as long as it is situated within the confines of the area. No

point can be chosen twice however and the distance between two possible points can be arbitrary

small. After this point is generated, the size of the stop is generated in step 3 (figure 4.7). This

size is chosen in a uniform way between the minimal and maximal allowed size of a stop. The

size interval is also defined by the user of the algorithm. As a final step, the algorithm generates

a new stop based on the chosen location and the chosen size as can be seen in step 4 (figure 4.7).

Using the described logic, the algorithm generates two different lists of stops. On the one

hand it generates a list of bus stops based on the parameters provided by the user and specific

for this kind of public transport vehicle. On the other hand the algorithm generates a list of

taxi stops based on the parameters provided by the user and specific for this kind of public

transport vehicle. The reason the algorithm generates two lists is that bus and taxi stops can be

very different in size and the number of stops across the area. Keeping these two kinds separate

allows the algorithm to take these differences into account.

4.1.3.3 Generation of Possible Base Station Locations

As stated in the previous section a stop is a collection of platforms where a public transport

vehicle might be residing. Using the lists of stops generated in section 4.1.3.2 the algorithm

determines how many vehicles and thus base stations are available to the user at any given time.

4.1 Algorithm 38

Figure 4.7: Part of the algorithm based on public transport vehicles responsible for generating

the requested amount of stops.

The flowchart for this phase of the algorithm can be found in figure 4.8.

The first step is to check if all stops in the list are initialised by adding a certain amount of

base stations. When there is an uninitialised stop present in the list, the algorithm calculates the

amount of simultaneously available base stations in step 2 (figure 4.8). This calculation is based

on two parameters, both defined by the user and provided to the algorithm as input parameters.

First, there is the amount of platforms of the current stop. The higher the amount of platforms

the current stop includes, the higher the amount of available base stations can be. How big it

is depends on the second parameter, the availability chance. This chance is a number between

0 and 1 which depicts the chance that there is a public transport vehicle available at the stop.

The amount of simultaneously available public transport vehicles and thus base stations at a

certain stop is calculated by multiplying the amount of platforms with the availability chance.

This way, the chance that the stop is covered the entire time will be lower for stops with less

platforms and higher for stops containing more platforms. How the size of a platform is chosen

is discussed in section 4.1.3.2.

After the amount of base stations is generated, the base stations themselves need to be

created. This happens in step 3 to 5 (figure 4.8). In Step 3 the algorithm checks whether or

4.1 Algorithm 39

not it has considered all base stations. If this is not the case, the algorithm continues to step 4

where it generates a new point within a circle with a realistic size of an entire stop (a few tens

of metres) and as its centre the location of the stop. These points are generated in a uniform

way and a point can never be chosen twice. However, the distance between two points can be

arbitrarily small. A circle around the location of the stop is used since a stop is not limited to

one point in the area. Its platforms are located around the central point over a certain distance.

In the final step, step 5, a new active base station is created using the chosen location and

added to the list of possible base stations. The algorithm only generates active base stations

since there is no need to limit the amount of locations as was the case in section 4.1.1. When

a public transport vehicle is present it is always available. In section 4.1.1 drones were only

dispatched to a location when it was activated since their place was not fixed in advance as with

the public transport vehicles.

The logic of this phase is also used twice by the algorithm. Once for the taxi list and once

for the bus list generated in section 4.1.3.2.

Figure 4.8: Part of the algorithm based on public transport vehicles responsible for generating

the amount of continuously available base stations per stop.

4.2 Number of Simulations 40

4.1.3.4 Generating the Network

The generation of the final network happens in the same way as in section 4.1.1.3. A flowchart of

this generation can be found in figure 4.3. The input of this generation is a single list of proposed

base stations. Since the algorithm generated two lists in the previous phase, the algorithm will

combine these lists into a single list before passing it on to the final network generation phase.

4.1.3.5 Output of the Algorithm

The output of the algorithm using public transport vehicles is formatted in the same way as the

output from the algorithm using drones and emergency service vehicles. The first type of files

are comma separated value files with all the data that was created during the execution of the

algorithm. The second type of files are files that can be used as an overlay for a map. These

files contain the locations of all the users, the base stations and an estimate of the coverage of

the base stations.

The comma separated value files contain information about all the important variables within

the algorithm. Since the algorithm focusses on two categories, buses and taxis, these important

output variables are generated separately for every category.

The first set of important parameters contains the amount of base stations mounted on a

public transport vehicle for every category of public transport vehicles. More specifically the

maximal possible amount, the selected amount and the amount of eventually used base stations.

The maximal amount of base stations is the total amount of platforms that are available in

the simulation. Every platform can hold exactly one public transport vehicle and thus one

base station. The selected amount of base stations is a subset of the maximal amount of base

stations. It is the amount of base stations that are available after taking into account the

availability chance from section 4.1.3.3. The used amount of base stations is the amount of base

stations that are actually used to reconnect one or more users to the network.

The second set of important parameters contains the amount of covered users for every

category of public transport vehicles. This parameter can be used to assess the effectiveness of

the algorithm for the used set of input parameters. If the amount of covered users is high, this

proves that the algorithm generates a good solution for the given parameters. Whereas if it is

low, it proves the contrary.

4.2 Number of Simulations

Every created simulation depends on the random input data generated by the algorithm. This

random input data determines where the users of the current simulation are located, the locations

4.2 Number of Simulations 41

of emergency vehicles, the locations of public transport stops, the size of these stops and the

chance that a certain base station is available long enough. These differences between single

simulations might influence their ultimate conclusions. There could be more infeasible locations

due to the amount of users that are in high buildings or there could be a lot more necessary

locations when all users are very far apart. All public transport stops could be at the center

of the simulated area, leaving all the users at the borders uncovered or the size of a stop could

always be minimal or maximal. To account for these differences in the results, the written

scheduling tool has to perform a certain amount of simulations in order to find representative

averages for the parameters at hand.

In order to find a good amount of simulations, an analysis is performed for every scenario.

In section 4.2.1 the analysis is performed for the scenario in which drones are used to mobilize

the base stations. In section 4.2.2 this analysis is performed for the scenario in which emergency

service vehicles are used and in section 4.2.3 it is done for the scenario using public transport

vehicles.

4.2.1 Unmanned Aerial Vehicles

The algorithm using unmanned aerial vehicles or drones as a way to mobilize the base stations is

only sensitive to where the users are placed. Since this is decided randomly by the algorithm, it

could cause some deviating results. In this section the necessary amount of simulations needed

for this variant of the algorithm is investigated. In section 4.2.1.1 the used parameters and the

setup of the algorithm is discussed. In section 4.2.1.2 the analysis of the necessary amount of

simulations is performed and in section 4.2.1.3 a conclusion is drawn based on this analysis.

4.2.1.1 Setup

In order to find a suitable amount of simulations, the cumulative averages of all parameters was

investigated over 200 simulations. Doing so, the convergence of the parameters is investigated

and thus the optimal amount of simulations is found. The optimal amount of simulations is a

trade off between the amount of convergence of a certain parameter and the runtime that the

tool requires for all simulations. The runtime of the tool is an important factor that depends on

the amount of simulations and increases with about five minutes for one extra simulation. The

tool creates the recommended amount of simulations using the same values for all parameters in

every simulation. Since the tool will be used in scenarios where it is interesting to vary certain

parameters, the proposed amount of simulations will have to be generated for every variation

in the values of the parameters. A few simulations more or less will in this manner result in a

4.2 Number of Simulations 42

difference of days for the execution time.

The analysis in this section is performed with a default set of parameters. This means that

a basic drone is used with a simple LTE femtocell attached to it as discussed in section 3.2.1.

The drones are deployed into a predefined area of around 4 km2 situated in the city of Ghent.

The other parameters used by the algorithm can be found in table 4.1.

Parameter Value

Margin between carrier and surface 4.0 meters

Carrier Battery Voltage 14.3 Volt

Intervention Duration 7000.0 seconds

Facility Capacity 300.0 carriers

Carrier Speed 15.0 meters per second

Maximal Height 35.0 meters

Carrier Power Usage 20.0 Ampere

Carrier Available Power 5.0 Amperehour

Table 4.1: Parameter values used for the estimation of the necessary amount of simulations for

the scenario using drones. More information about these parameters can be found in section

4.1.1.

4.2.1.2 Analysis

In figure 4.9 the results of this analysis are visualised using six figures. These figures depict

the influence of the amount of simulations on the six most important output parameters of the

algorithm as stated in section 4.1.1.5.

The first investigated parameter is the lifetime of the battery used in the drones. Figure

4.9a shows the influence of the number of performed simulations on the mean battery lifetime of

the carriers. After approximately 20 simulations the lifetime converges to around 874.5 seconds.

This means that for this parameter, around 20 simulations will be sufficient.

The second investigated parameter is the amount of drones needed to provide coverage for

all users. Figure 4.9b shows the influence of the number of performed simulations on the amount

of drones needed. From this figure it is clear that the amount of necessary carriers converges

to a value of approximately 1870. At the point of 40 simulations in this graph the amount is

around 1880 carriers. Since this is only a deviation of 0.5% from the point of convergence and

since there are around 40 extra simulations necessary to actually reach the value of 1870 carriers

(which will result in doubling the execution time) it is that 40 simulations is sufficient in this

4.2 Number of Simulations 43

case.

The third investigated parameter is the flight of the drones carrying base stations. Figure 4.9c

shows the influence of the number of performed simulations on the cumulative mean flight of the

carriers. From this figure it is derived that the flight converges to approximately 148 seconds

with an increasing amount of simulations. Starting from the 40th simulation, the difference

between the subsequent values gets less than one second. With the same trade off between

execution time and number of simulations in mind it is decided that 40 simulations is sufficient

for this parameter.

The fourth investigated parameter is the number of locations that could not be covered

using the parameters of table 4.1. Figure 4.9d shows the influence of the number of performed

simulations on the total number of uncovered locations. On this figure it can be seen that

the parameter converges to an average of 155 infeasible locations. At the point of the 40th

simulation the average value of the amount of infeasible locations is around 156. Since this is

only a difference of one out of 156 locations with the point of convergence and since actually

getting 155 locations requires an extra 20 simulations it is decided that 40 simulations should

do for this parameter as well.

The fifth investigated parameter is the total amount of locations necessary to cover all users.

Figure 4.9e shows the influence of the number of performed simulations on the total amount of

necessary locations. The convergence point in this figure lies around a value of 184 necessary base

stations. Keeping the relation between execution time and number of simulations in mind 40

simulations seems like a good amount for this parameter. At the point of the 40th simulation the

cumulative mean value of the parameter is around 184.5 which is close enough to the convergence

point since reaching this point requires at least an additional 20 simulations.

The final investigated parameter is the amount of reconnected users. Figure 4.9f shows

the influence of the number of performed simulations on the amount covered users. The mean

number of reconnected users converges to 66 according to the figure. After 40 simulations this

value is already 65. Since it would take an additional 40 simulations to actually reach a value

of 66 reconnected users it is decided that 40 simulations is sufficient for this final parameter.

4.2.1.3 Conclusion

For all parameters the required minimal amount of simulations that the algorithm has to generate

never exceeds 40. Because of this, 40 is a good choice and all results concerning this scenario

are obtained by averaging the generated values over 40 simulations.

4.2 Number of Simulations 44

(a) Battery Lifetime (b) Amount of Carriers Needed

(c) Flight Time (d) Amount of Infeasible Locations

(e) Total Amount of Locations (f) Amount of Reconnected Users

Figure 4.9: Influence of the number of simulations on the convergence of the average of a certain

parameter for the scenario using drones.

4.2.2 Emergency Service Vehicles

The algorithm for the scenario using emergency service vehicles has a few random generated

values. The placement of the emergency service vehicles in the predefined area or the time

an emergency service vehicle is available might vary leading to different results for different

4.2 Number of Simulations 45

simulations. In this section the necessary amount of simulations in order to get meaningful

average results using emergency vehicles is investigated. In section 4.2.2.1 the used parameters

and the setup of the algorithm is discussed. In section 4.2.2.2 the analysis of the necessary

amount of simulations is performed and in section 4.2.2.3 a conclusion is drawn based on this

analysis.

4.2.2.1 Setup

The setup of this analysis is basically the same as in section 4.2.1.1. This means that 200

simulations were used in order to find the optimal amount of simulations. This optimum is

based on the convergence of the output variables while keeping in mind the correlation between

the number of simulations and the runtime of the tool.

The analysis is performed with a default set of parameters, meaning that a number of LTE

femtocells (as discussed in section 3.2.1) are attached to emergency service vehicles. The vehicles

are then deployed into a predefined area. The area used for this analysis is around 1 km2 big

and is situated in the city of Ghent. The other input parameters used by the algorithm can be

found in table 4.2.

Parameter Value

Duration of the Intervention 14400 seconds

Chance of Premature Departure 60%

Range of the Disaster 300 meters

Available Amount of Emergency Service Vehicles 40

Amount of Users 50000

Table 4.2: Parameter values used for the estimation of the necessary amount of simulations for

the scenario using emergency service vehicles. More information about these parameters can be

found in section 4.1.2

4.2.2.2 Analysis

In figure 4.10 the results of this analysis are visualised using four figures. These figures depict

the influence of the amount of simulations on the four most important output parameters of the

algorithm as stated in section 4.1.2.5.

The first investigated parameter is the total time the emergency service vehicles stayed at

the scene. Since the time a vehicle stays at the scene is chosen in a uniform and random way a

certain amount of simulations will be necessary to get representative results. Figure 4.10a shows

4.2 Number of Simulations 46

the influence of the number of performed simulations on the mean time the vehicles resided in

the area. In this figure, it can be seen that the point of convergence for this parameter lies

around 12000 seconds. This point was reached after 20 simulations. 20 simulations will thus be

a good amount of simulations to get representative average results for this parameter.

The second investigated parameter is the amount of users that could not be reconnected

during the intervention. Figure 4.10b shows the influence of the number of performed simulations

on the mean amount of uncovered users. The point of convergence for this parameter lies between

49650 and 49660 uncovered users. This point is reached after approximately 30 simulations,

making 30 simulations a good amount of simulations in order to get representative results for

this parameter.

The third investigated parameter is the amount of vehicles that left the scene before the

intervention ended, rendering these vehicles useless for reconnecting users in the area. Figure

4.10c shows the influence of the number of performed simulations on the mean amount of leaving

vehicles. This figure shows that the amount of leaving vehicles converges to a value of around

24 vehicles. After 30 simulations this point is reached, making 30 simulations a good amount of

simulations to generate representative results for this parameter.

The fourth and final investigated parameter is the amount of vehicles that were eventually

used to reconnect users in the area to the network. This parameter can be seen as the total

amount of vehicles minus the amount of vehicles that left the scene prematurely and the amount

of vehicles that stayed at the scene but remained unused to reconnect to the network. Figure

4.10d shows the influence of the number of performed simulations on the amount of used vehicles.

According to the figure, this parameter converges to a value that is a bit higher than 16 and it

will do so after around 120 simulations. Keeping in mind the fact that a few extra simulations

results in a big increase in the run time of the algorithm, around 40 simulations is deemed

sufficient for this parameter. At the point of 40 simulations, the value of the parameter is a

bit higher than 15 and it does not longer change rapidly, making this a sufficient amount of

simulations.

4.2.2.3 Conclusion

For all parameters the required minimal amount of simulations that the algorithm has to generate

never exceeds 40. Because of this, 40 is a good choice and all results concerning this scenario

are obtained by averaging the generated values over 40 simulations.

4.2 Number of Simulations 47

(a) Time the Vehicles Stayed (b) Amount of Uncovered Users

(c) Amount of Vehicles that Left (d) Amount of Vehicles Used

Figure 4.10: Influence of the number of simulations on the convergence of the average of a certain

parameter for the scenario using emergency service vehilces.

4.2.3 Public Transport Vehicles

The algorithm for the scenario using public transport vehicles depends on random variables

based on several input parameters. Next to the location of the users and the stops, the stop size

and the amount of base stations at a stop can vary. These variations might results in different

conclusions for simulations using the same input parameters. In this section the necessary

amount of simulations is investigated to get representative average results. In section 4.2.3.1

the used parameters and the setup of the algorithm is discussed. In section 4.2.3.2 the analysis

of the necessary amount of simulations is performed for every parameter and in section 4.2.3.3

a conclusion is drawn based on this analysis.

4.2.3.1 Setup

The analysis of the number of simulations for the scenario using public transport vehicles is

based on the same basic setup of section 4.2.1.1. In order to check for the convergence of the

output variables, 200 simulations are used. In the end a conclusion is drawn keeping in mind

the correlation between the run time of the algorithm and the number of necessary simulations.

4.2 Number of Simulations 48

The analysis is performed with a default set of parameters. A simple LTE femtocell (as

discussed in section 3.2.1) is attached to either a taxi or a bus and then deployed into the

predefined area. This area is approximately 4 km2 big and is situated in the city of Ghent. The

other input parameters used by the algorithm can be found in table 4.3.

Parameter Value

Duration of the Intervention 14400 seconds

Maximal Size of a Bus Stop 20 platforms

Minimal Size of a Bus Stop 1 platform

Amount of Bus Stops 10

Maximal Size of a Taxi Stop 5 platforms

Minimal Size of a Taxi Stop 1 platform

Amount of Taxi Stops 40

Chance that Buses Are Continuously Available At a Stop 50%

Chance that Taxis Are Continuously Available At a Stop 30%

Table 4.3: Parameter values used for the estimation of the necessary amount of simulations for

the scenario using public transport vehicles. More information about these parameters can be

found in section 4.1.3

4.2.3.2 Analysis

In figure 4.11 the results of this analysis are visualised using four figures. These figures depict

the influence of the amount of simulations on the four most important output parameters of the

algorithm as stated in section 4.1.3.5.

The first investigated parameter is the amount of users that are reconnected to the network

by this scenario. Figure 4.11a shows the influence of the number of performed simulations on the

amount of covered users. As can be seen on the figure the amount of covered users converges to

around 24 covered users. This happens using approximately 35 simulations, making this amount

of simulations a good amount in order to reach representative average results.

The second investigated parameter is the maximal amount of base stations that can reside

in the area. This parameter can also be seen as the amount of base stations that is present when

every platform in the scenario is occupied by a vehicle and thus a base station. Figure 4.11b

shows the influence of the number of performed simulations on this amount. Around simulation

60 the maximal amount of base stations converges to 224. When we take a closer look at the

figure we see that at the point of the 40th simulation, the value of the parameter has already

4.2 Number of Simulations 49

reached 221 base stations and converges very slowly to the value of 224 base stations. Keeping

in mind the correlation between the runtime of the algorithm and the amount of simulations,

40 simulations is deemed sufficient to get good average results.

The third investigated parameter is the amount of base stations that are still in the proposed

network after applying the constraints represented by the availability chance. It is the amount

of base stations that is present in a realistic scenario. Figure 4.11c shows the influence of the

number of performed simulations on the amount of selected base stations. On this figure it can

be seen that the value of the selected amount of base stations converges to 94 around simulation

number 38. 38 simulations will thus be sufficient in order to get representative results for this

parameter.

The fourth and final investigated parameter is the amount of base stations that were actually

used to reconnect users in the predefined area. From the selected amount of base stations, not

necessarily all base stations are used. There could be no users in the vicinity of some base stations

or the pathloss for a certain base station could be too high for every user in the scenario. Figure

4.11d shows the influence of the number of performed simulations on the amount of used base

stations. The value of this parameter will converge to around 19 base stations. It will start

converging at the point of the 30th simulation. The use of 30 simulations will thus result in good

average results for the parameter at hand.

4.2.3.3 Conclusion

For all parameters the required minimal amount of simulations that the algorithm has to generate

never exceeds 40. Because of this, 40 is a good choice and all results concerning this scenario

are obtained by averaging the generated values over 40 simulations.

4.2 Number of Simulations 50

(a) Amount of Covered Users (b) Maximal Amount of Base Stations

(c) Selected Amount of Base Stations (d) Used Amount of Base Stations

Figure 4.11: Influence of the number of simulations on the convergence of the average of a certain

parameter for the scenario using public transport vehilces.

SENSITIVITY ANALYSIS 51

Chapter 5

Sensitivity Analysis

Using the tool described in chapter 4 a sensitivity analysis is performed for every scenario from

chapter 3. The goal of this analysis is to look at the influence of the input parameters on the

resulting network. Doing so, the feasibility of each scenario is investigated and recommendations

can be made on how to use the proposed system. The general setup for this analysis can be

found in section 5.1. In section 5.2, the results for the scenario using unmanned aerial vehicles

or drones are discussed. The results for the scenario using emergency service vehicles can be

found in section 5.3. The results for the scenario using public transport vehicles can be found

in section 5.4.

5.1 General Setup

The analysis presented in the following sections are all performed using the same general setup.

As discussed in section 3.2.1 the use of LTE femtocells as base stations is the best choice for

this type of application. These femtocells are mounted on different types of carriers depending

on the scenario. Using this carrier, the femtocell can be deployed to places where a temporary

connectivity shortage exists. The parameters of this LTE femtocell also have an influence on

the results presented in this section. The link budget for the LTE femtocell that was used can

be found in table 5.1.

5.2 Unmanned Aerial Vehicles

The scenario of the unmanned aerial vehicles is discussed in section 3.1.1. In this scenario the

carriers used are drones. More specifically, two types of drones are considered. The main reason

for only comparing two drones and not performing a sensitivity analysis on the parameters of the

5.2 Unmanned Aerial Vehicles 52

Parameter Value

Frequency (MHz) 2600

Maximum input power base station antenna (dBm) 33

Antenna gain base station (dBi) 4

Soft handover gain (dB) 0

Feeder loss BS (dB) 0

Fade margin (dB) 10

Interferencemargin (dB) 2

Receiver Signal-to-Noise Ratio (dB) [−1.5, 3, 10.5, 14, 19, 23, 29.4]a

Number of used subcarriers 301

Number of total subcarriers 512

Bandwidth (MHz) 5

Noise figure mobile station (dB) 8

Implementation loss mobile station (dB) 0

a[1/3 QPSK, 1/2 QPSK, 2/3 QPSK, 1/2 16-QAM, 2/3 16-QAM, 4/5 16-QAM, 1/2 64-QAM, 2/3 64-QAM]

Table 5.1: Link Budget Table for a Femtocell Base Station. Based on [6] and [7]

drone as well is that it would go beyond the scope of this master’s dissertation. The parameters

of a drone like battery voltage, power usage, available power in the battery and others, are all

correlated with each other. For example a higher available power would mean a bigger and thus

heavier battery resulting in an increase in power usage. Knowing that these parameters are

correlated it is very hard to create random meaningful and realistic sets of parameters. That is

why it was opted to go with two very different but existing sets of parameters.

On the one hand there is the off the shelf drone which is affordable for the big public. This

drone is denoted as the type 1 drone from now on. The drone taken for this analysis is one that

was build by the Wireless & Cable research group of INTEC, a department at Ghent University

[48]. The specific parameters used in the analysis using this type of drone can be found in table

5.2.

On the other hand there is the more advanced drone which is a lot more expensive. This

drone is denoted as the type 2 drone from now on. The type 2 drone can carry more weight

and can stay in the air up until six times longer than the type 1 drone. The drone used for

this analysis is the microdrones md4-1000 model. The full specification and description of this

model can be found in [49], the parameters used for this analysis can be found in table 5.3.

The values in table 5.2 and 5.3 cannot be taken too strictly. Depending on the weather,

5.2 Unmanned Aerial Vehicles 53

Parameter Value

Average Carrier Speed 15.0 meters per second

Carrier Power 5.0 Ampere

Average Carrier Power Usage 20.0 Amperehour

Carrier Battery Voltage 14.3 Volts

Table 5.2: Parameter values used for the first type of drone

Parameter Value

Average Carrier Speed 12.0 meters per second

Carrier Power 13.0 Ampere

Average Carrier Power Usage 17.33 Amperehour

Carrier Battery Voltage 22.2 Volts

Table 5.3: Parameter values used for the second type of drone

the speed of the drone might decrease or it will need to put in a larger effort to stabilize itself,

using more power than foreseen. In this dissertation it was decided not to take the weather

into account. This would create a scenario with too many variables. However, the effect of

the weather will mainly lead to a shorter battery life time than estimated. Which means that

the amount of necessary drones is underestimated in the results but that does not affect the

presented trends.

In the following sections the influence of the different input parameters on the output pa-

rameters of this scenario is investigated. The first input parameter is the facility capacity. This

parameter is discussed in section 5.2.1. The second input parameter is the duration of the

intervention. The results concerning this parameter can be found in section 5.2.2. The third

parameter is the height margin between a drone and the surface and the analysis is situated in

section 5.2.3. The fourth and final parameter is the maximal height a carrier can reach. The

analysis of this parameter can be found in section 5.2.4. Based on the analyses performed in

these sections, an overall conclusion is drawn in section 5.2.5.

5.2.1 Facility Capacity

A facility is the location where the drones are stored when they are not in use. When this

scenario is deployed, the drones will fly from the location of the facility to the location that was

calculated for them. The capacity of a facility is the amount of drones that reside inside such a

5.2 Unmanned Aerial Vehicles 54

Parameter Value

Intervention duration 3600 seconds

Maximal fly height 35 meters

Height margin 4 metres

Area 4 km2, Ghent, figure 5.1

Amount of Users Based on provider data, 224 users

Amount of Simulations 40

Table 5.4: Parameter values used for the analysis of the influence of the facility capacity.

facility. The capacity of the facility will thus represent the total amount of drones available in

the simulation. In this section of the analysis the influence of the capacity of a facility on the

coverage of base stations and thus users is discussed. In order to do so, a distinction is made

between the two types of drones and the two possible ways of prioritizing certain locations as

discussed in section 4.1.1.4. In section 5.2.1.1 the results for the type 1 drone (table 5.2) are

discussed. In section 5.2.1.2 the same is done for the type 2 drone (table 5.3).

For all results in this section the following parameter values were used. The duration of

the intervention was set to be one hour. The maximal height a drone could reach was set at

35 meters. The margin between a drone and the surface above which it resides was set to be

four meters. The predefined area is an area of around 4 km2 situated in the city of Ghent

and can be found in figure 5.1. Finally, the amount of users is based on the data of a mobile

connectivity provider for the defined area on the busiest time of the day resulting in 224 users for

one simulation (as in [47]). In order to get representative results, 40 simulations (as calculated

in section 4.2.1) were created for each different capacity. An overview of these parameters can

be found in table 5.4.

5.2.1.1 Coverage Using Drone Type 1

In this section, the influence of the amount of type 1 drones (table 5.2) available on the coverage

of the proposed locations and thus users is discussed. A proposed location is a location for a

base station in the predefined area where several users can connect to in order to reinstate their

access to the network.

In figure 5.2 the percentages of covered users and locations are displayed in function of the

amount of available type 1 drones. To generate these results, the algorithm used the hotspot

technique (section 4.1.1.4). Using this technique, locations that reconnect the biggest amount

of users will have the highest chance of being covered by the algorithm. As can be seen in this

5.2 Unmanned Aerial Vehicles 55

Figure 5.1: The area (orange) used as input for the algorithm.

figure, the algorithm is able to cover almost all users and locations using around 1100 drones

and with 100 drones only 20% of the users is covered. The algorithm will never be able to cover

exactly all users since a certain amount of users could be in unreachable places such as very tall

buildings.

Based on the figure it is concluded that for the proposed scenario, almost every user can

be reconnected to the network for a duration of one hour when there are 1100 or more type 1

drones available in the facility. In the case that there are less drones available there is a strong

linear correlation between the amount of available drones and the amount of covered locations

and users. An extra capacity of 100 drones leads to an increase of around 10% in user and

location coverage.

In figure 5.3 the percentages of covered users and locations are shown but this time the

results are generated using the ratio technique (section 4.1.1.4). The ratio technique considers

the amount of drones necessary to cover a location and how many users this location reconnects.

The less drones a location needs and the more users it reconnects, the bigger the chance will be

that the algorithm covers the location at hand. In figure 5.3 it can be seen that the algorithm will

still need 1100 or more type 1 drones to cover every location and thus reconnect approximately

5.2 Unmanned Aerial Vehicles 56

Figure 5.2: Influence of capacity on coverage using type 1 drones based on the hotspot technique.

every user for a duration of one hour. The same linear correlation between the amount of

available type 1 drones and the amount of covered users and locations is also observed. The

same as with the hotspot technique, an extra capacity of 100 drones leads to an increase of

around 10% in user and location coverage.

Another interesting fact that can be derived from figure 5.2 and figure 5.3 is that the amount

of uncovered users is at every point lower than or equal to the amount of uncovered locations.

Since a location can cover multiple users it is possible in theory that a few locations cover almost

all users resulting in a low amount of covered locations while having a high amount of covered

users. That is what happens in these figures, a small amount of covered locations will lead to a

bigger amount of covered users.

In figure 5.4 and figure 5.5 a comparison between the hotspot and ratio techniques for the

location and user coverage respectively is made. The ratio technique is implemented somewhat

smarter than the hotspot technique since it takes into account the amount of users and the

amount of necessary resources instead of only taking the amount of users at a certain location

into account. Given this fact it is expected that the ratio technique will perform better than the

hotspot technique. Considering both figures it can be seen that the ratio technique performs

a little bit better than the hotspot technique. On average the ratio technique covers 0.22%

extra users and 0.28% extra locations. When 600 drones are available the maximal difference is

reached. In this case the ratio technique covers 2.40% extra users and 3.16% extra locations. For

this scenario it can be concluded that despite the fact that the ratio technique is implemented

smarter than the hotspot technique, the difference will be rather minor. This can be explained

5.2 Unmanned Aerial Vehicles 57

Figure 5.3: Influence of capacity on coverage using type 1 drones based on the ratio technique.

by the fact that in this scenario, the facility is located in such a way that important locations are

closer to it than less important locations. The base station locations with the biggest amount of

users will thus not need that many drones resulting in an interesting user-drone ratio. The same

locations are thus interesting for both techniques resulting in similar results. When a facility is

not placed optimally, the difference between both techniques would be clearer due to the smarter

resource allocation method used for the ratio technique.

5.2.1.2 Coverage Using Drone Type 2

In this section, the influence of the amount of type 2 drones (table 5.3) that are available in a

facility is discussed based on the coverage of the proposed base station locations and resulting

user coverage.

In figure 5.6 the location and user coverage are depicted in function of the amount of available

type 2 drones. To generate these results the algorithm used the hotspot technique (section

4.1.1.4). In the figure it can be seen that the algorithm is able to cover all locations and users

when there are around 400 or more type 2 drones available in the facility. In comparison with

the 1100 type 1 drones necessary this means that there are 65% less type 2 drones necessary

to cover all locations and users. When there are less type 2 drones available, a strong linear

correlation between the amount of available type 2 drones and the amount of covered locations

and users is observed. An additional capacity of 100 type 2 drones leads to an increase in user

and location coverage of around 25%.

In figure 5.7 the location and user coverage are depicted in function of the amount of available

5.2 Unmanned Aerial Vehicles 58

Figure 5.4: Comparison of the influence of capacity on location coverage between the two tech-

niques using type 1 drones.

Figure 5.5: Comparison of the influence of capacity on user coverage between the two techniques

using type 1 drones.

5.2 Unmanned Aerial Vehicles 59

Figure 5.6: Influence of capacity on coverage using type 2 drones based on the hotspot technique.

type 2 drones. For these results the algorithm used the ratio technique (section 4.1.1.4). In this

figure, it can be seen that the algorithm also needs 400 or more type 2 drones to cover almost

all locations and thus users. In comparison with the 1100 type 1 drones necessary this means

that there are 65% less type 2 drones necessary to cover all locations and users. When there are

less than 400 type 2 drones available a linear correlation between the amount of available type

2 drones and the amount of covered locations and users is observed. As it was the case with the

hotspot technique, an additional capacity of 100 type 2 drones leads to an increase in user and

location coverage of around 25%.

In figure 5.8 and figure 5.9 a comparison between the hotspot and ratio techniques for the

location and user coverage respectively is made. As stated in the previous section where the

same investigation was performed using type 1 drones, the ratio technique is implemented in

a smarter way so it is expected that the ratio technique will perform better than the hotspot

technique. However, when figure 5.8 and figure 5.9 are considered, it can be seen that there

is nearly no difference between the two techniques. On average the ratio technique improves

the user coverage by 0.01%. The ratio technique uses the following formula to choose which

locations to cover first.

# Users covered by the base station in location i

# Drones necessary to cover location i(5.1)

The hotspot technique only takes into account the amount of users covered by the base station

in location i to decide which locations to cover first. Since type 2 drones can stay in the air for

a longer period in time, a location will need a lot less of these drones to be covered throughout

5.2 Unmanned Aerial Vehicles 60

Figure 5.7: Influence of capacity on coverage using type 2 drones based on the ratio technique.

the entire intervention. For the current scenario, the amount of necessary drones per proposed

base station location is equal (around 2 drones) for almost every location making this factor of

the ratio negligible. When removing this factor from formula 5.1 only the number of users per

location remains which is the same formula as for the hotspot technique. Both techniques are

thus basing there calculations on the same criterion which explains the coinciding results when

using type 2 drones.

The difference between the ratio and the hotspot technique when using type 2 drones is

quite small due to the aforementioned effect. Based on the comparison between the ratio and

the hotspot techniques for both type 1 and type 2 drones it can be concluded that the ratio

technique performs better or the same as the hotspot technique. This makes the ratio technique

more interesting. Only the ratio technique is used throughout the remaining part of this analysis.

5.2.2 Intervention Duration

A drone can only stay in the air for a certain amount of time. Keeping that in mind it stands to

reason to think that the longer the intervention takes, the more drones will be necessary. But

how will this affect the coverage and how many extra drones will be necessary? The duration of

an intervention can be defined as the interval between the time that connecting to the network

became impossible and the moment when a permanent solution was installed. During this

interval, the emergency ad hoc network described in this dissertation provides the temporary

solution.

In the following sections the influence of the intervention duration on the amount of covered

5.2 Unmanned Aerial Vehicles 61

Figure 5.8: Comparison of the influence of capacity on location coverage between the two tech-

niques using type 2 drones.

Figure 5.9: Comparison of the influence of capacity on user coverage between the two techniques

using type 2 drones.

5.2 Unmanned Aerial Vehicles 62

Parameter Value

Base Station Selection Technique Ratio Technique

Facility Capacity 300 drones

Maximal fly height 35 meters

Height margin 4 meters

Area 4 km2, Ghent, figure 5.1

Amount of Users Based on provider data, 224 users

Amount of Simulations 40

Table 5.5: Parameter values used for the analysis of the influence of the intervention duration.

locations and users is investigated. These results can be found in section 5.2.2.1 for drones of

type 1 (table 5.2) and in section 5.2.2.2 for drones of type 2 (table 5.3). In section 5.2.2.3 it is

investigated how many drones are necessary to cover all users for certain durations in order to

check how feasible it is to have an intervention of a certain duration.

For all results in this section the following parameter values were used. As a criterion to

select the best base station locations the ratio technique was used. The capacity of the used

facility was set to be 300 drones. The maximal height a drone could reach was set at 35 meters.

The margin between a drone and the surface above which it resides was set to be four meters.

The predefined area is an area of around 4 km2 situated in the city of Ghent and can be found

in figure 5.1. Finally, the amount of users is based on the data of a mobile connectivity provider

for the defined area on the busiest time of the day resulting in 224 users for one simulation (as

in [47]). In order to get representative results, 40 simulations (as calculated in section 4.2.1)

were created for each different duration. An overview of these parameters can be found in table

5.5.

5.2.2.1 Coverage Using Drone Type 1

Figure 5.10 visualises the results of multiple simulations using different intervention durations.

It depicts the relation between the duration of the intervention and the amount of covered

locations and users. As can be seen in this figure, this relation is an exponential one. At first

the curve goes down very quickly to stabilise and converge towards zero when a duration of

around 20000 seconds is reached. This exponential relation can be explained by the fact that

the algorithm first covers the locations that reconnect the most users while using the smallest

amount of drones. Furthermore, the facility is placed in such a way that the distance between

it and the aforementioned locations is optimal. Due to the longer distances between the less

5.2 Unmanned Aerial Vehicles 63

efficient locations and the facility, the amount of drones these locations need increases faster

with increasing intervention duration in comparison to the amount of drones needed by the more

efficient locations. The longer a drone flies to a location the less time it has to provide coverage

at that location, thus the more drones are necessary to provide continuous coverage. When the

intervention duration is small (around 1000 seconds), the less efficient locations are also covered

resulting in a coverage of 80%. When the duration is increased to 10000 seconds, these locations

require too many drones to be continuously covered due to the aforementioned reasons and a

coverage of only 20% is reached. Since the less efficient locations get too demanding faster than

the efficient locations due to greater distances between them and the facilities, a steep descent

is observed.

When the intervention duration is increased from 10000 to 100000 seconds the coverage loss

is limited to 15% of all locations compared to 60% when going form a duration of 1000 to 10000

seconds. A location will only be covered by the algorithm when there are enough drones to

cover it for the entire duration of the intervention. A lot of drones become available when these

inefficient locations can no longer be covered. This extra capacity will make sure that the more

important locations can keep on going for a long time. Hence the slow convergence towards zero

percent coverage.

As can be seen in figure 5.10, the point where the simulations reach zero percent coverage

is not depicted. Since this dissertation handles about emergency ad hoc networks it is assumed

that the solution does not have to last for days at a time. Given this assumption, figure 5.10

only visualises the results from an intervention duration ranging from a 1000 seconds to almost

28 hours.

5.2.2.2 Coverage Using Drone Type 2

Figure 5.11 depicts the influence of the intervention duration on the coverage of locations and

users when using drones of type 2. As can be seen in this figure there is again an exponential

correlation between the duration of the intervention and the amount of coverage provided to

the locations and thus the users. When increasing the duration from 1000 to 10000 seconds

a decrease in location coverage of 60% is observed. When increasing the duration of 10000 to

100000 seconds a decrease of only 35% is seen. This exponential correlation can be explained in

the same way as when drones of type 1 were used. The less important locations loose coverage

faster than the important ones since they need too many drones to cover them throughout the

entire simulation. This way, a lot of drones become available for the more important locations,

enabling them to continue being covered much longer than the big share of less important

locations.

5.2 Unmanned Aerial Vehicles 64

Figure 5.10: Influence of the intervention duration on coverage using type 1 drones based on the

ratio technique.

When figure 5.11 is compared to figure 5.10 it can be seen that the slope of the graph in

figure 5.11 is a lot less steep than the one in figure 5.10. Both graphs reach a location coverage

between 0% and 5% for a duration of 100000 seconds but around a duration of 10000 seconds a

location coverage of 40% is reached using the type 2 drones and only 10% using type 1 drones.

Since the drones of type 2 can stay in the air for around 30 minutes longer than the ones of type

1 it stands to reason that the simulation that uses drones of type 2 can cover the locations and

users over a longer period of time. Both amounts of drones are the same in each simulation and

there are typically less type 2 than type 1 drones necessary to cover a certain location.

5.2.2.3 Necessary Amount of Drones

In figure 5.12 the amount of drones necessary to cover all locations and users when increasing

the intervention duration is visualised. As can be seen in this figure, the relation between the

amount of drones and the intervention duration is completely linear. When the intervention

lasts for an extra hour, on average 5 extra type 1 drones and 1.4 type 2 drones per location are

required to cover all locations. The necessary increase of type 2 drones is almost 3 times lower

than the one for type 1 drones when increasing the intervention duration. This can again be

explained by the fact that type 2 drones can stay in the air around 30 minutes or 3 times longer

than type 1 drones resulting in a lower amount of necessary drones to reach the same goal.

5.2 Unmanned Aerial Vehicles 65

Figure 5.11: Influence of the intervention duration on coverage using type 2 drones based on the

ratio technique.

Figure 5.12: Influence of the intervention duration on the amount of necessary drones of both

types based on the ratio technique.

5.2 Unmanned Aerial Vehicles 66

Parameter Value

Base Station Selection Technique Ratio Technique

Facility Capacity 300 drones

Intervention Duration 3600 seconds

Area 4 km2, Ghent, figure 5.1

Amount of Users Based on provider data, 224 users

Amount of Simulations 40

Table 5.6: Parameter values used for the analysis of the influence of the height margin.

5.2.3 Height Margin Between Drone and Surface

The height margin parameter used in the algorithm can be explained as the distance between

the drone and the underlying surface like a building rooftop or a street (section 3.3.1, figure 3.3).

This distance also determines the minimal height of the drones throughout the simulation.

In what follows, the influence of this margin on three different output parameters is discussed.

The first discussed output parameter is the amount of base station locations necessary to cover

all users. The second discussed parameter is the power usage of the mobile base stations. The

third discussed parameter is the amount of covered users. The influence on these parameters

is analysed per type of drone. In section 5.2.3.1 this analysis is performed using type 1 drones

(table 5.2). In section 5.2.3.2 the same is done for the type 2 drones (table 5.3).

For all results in this section the following parameter values were used. As a criterion to

select the best base station locations the ratio technique was used. The capacity of the used

facility was set to be 300 drones. No maximal height was set in order to investigate the full

impact of the height margin and thus preventing the generation of infeasible locations when

using margins that are larger than the maximal height. The duration of the intervention was

set to be 1 hour. The predefined area is an area of around 4 km2 situated in the city of Ghent

and can be found in figure 5.1. Finally, the amount of users is based on the data of a mobile

connectivity provider for the defined area on the busiest time of the day resulting in 224 users for

one simulation (as in [47]). In order to get representative results, 40 simulations (as calculated

in section 4.2.1) were created for each different height margin. An overview of these values can

be found in table 5.6.

5.2 Unmanned Aerial Vehicles 67

5.2.3.1 Influence of the Height Margin Using Type 1 Drones

As a first part of this analysis, the influence of the height margin using a type 1 drone on the

amount of necessary locations to cover all users is investigated. In figure 5.13 this influence is

visualised. In this figure it can be seen that the amount of necessary base station locations to

cover all users decreases when the height margin increases. Increasing the margin from 2 to 30

meters, the amount of necessary locations decreases by 50 and when increasing the margin from

30 to 90 meters again 50 locations less are needed. The height margin of a drone determines

the minimal height of that drone. When a drone and the attached base station fly rather low,

the chance that its signal is blocked by a building is quite high. When it flies higher on the

other hand, there is a bigger chance that the base station is in the line of sight of several users,

meaning that no buildings or other structures block the signal. When no buildings or other

structures block the signal the path loss between a user and a drone is smaller (around 8dB)

then when the signal is blocked. Thus, when a drone flies higher more users are able to connect

to its base station. When more users are able to connect to a single base station it stands to

reason that less base stations are necessary to cover all users as can be seen in figure 5.13.

The second graph in figure 5.13 shows the amount of locations that was covered using the

defined input parameters (table 5.6). As can be seen in this figure, this is a quite steady line

around 56 base station locations. A base station location is defined as a place where a group of

users is covered by one base station mounted on a drone. Since the amount of available drones

is not altered, the amount of base station locations that can be provided with the necessary

drones remains the same. What is more interesting to derive from this graph is that the amount

of necessary base station locations evolves towards this graph. When the path loss between a

user and a base station is not too heavily influenced by the distance between them it should be

possible to adjust the margin in such a way that all locations can be covered with the defined

amount of drones. However, a large distance between a user and a base station has a negative

effect on the connection between them so a sufficient amount of drones is still necessary.

In figure 5.14 the influence of the height margin on the amount of covered users is visualised.

In this figure it can be seen that by increasing the height margin and thus the minimal height

of the drones by 100 meters, the user coverage is improved by 40%. This can be explained

using the findings based on figure 5.13. In this figure, it was clear that the bigger the height

margin, the fewer locations were necessary. This implies that more users connect to the same

location. Since the amount of available drones is not altered, the amount of covered locations is

not altered and since there are more users per location the user coverage increases.

In figure 5.15 the influence of the height margin on the power usage of a drone and its base

5.2 Unmanned Aerial Vehicles 68

Figure 5.13: Influence of the height margin on the amount of necessary locations to get 100%

coverage using type 1 drones and based on the ratio technique.

Figure 5.14: Influence of the height margin on the amount of covered users using type 1 drones

and based on the ratio technique.

5.2 Unmanned Aerial Vehicles 69

Figure 5.15: Influence of the height margin on the power usage per base station using type 1

drones and based on the ratio technique.

station is visualised. In this figure, it can be seen that increasing the height margin by 15 meters

results in an increase of the power usage of a drone and its base station by 0.5 Ampere. This

increase can be explained by considering the drone and its base station separately. The drone

needs additional power since it has to fly further when its destination becomes higher, it has to

bridge the height difference as well. Another additional source of power usage is that the input

power of the base station needs to be elevated when the drone is situated higher in order to

expand its reach to the users on the ground.

5.2.3.2 Influence of the Height Margin Using Type 2 Drones

The second part of this analysis is about the same output parameters as in the first part but

in this case, the results are based on the usage of type 2 drones. In figure 5.16 the amount of

locations where a base station needs to be present in order to cover all users is visualised. As

can be seen in the figure, this amount of locations decreases when the height margin increases.

Increasing the margin from 2 to 30 meters, the amount of necessary locations decreases by 50

and when increasing the margin from 30 to 90 meters again 50 locations less are necessary.

The main difference with the usage of type 1 drones can be found in the second graph of

figure 5.16. The second graph depicts the amount of locations that are actually provided with

a base station to cover it. This graph and the graph depicting the amount of necessary base

station locations collide when all locations are provided with a base station and thus all users

are reconnected to the network. At the point where the height margin reaches around 30 meters

5.2 Unmanned Aerial Vehicles 70

Figure 5.16: Influence of the height margin on the amount of necessary locations to get 100%

coverage using type 2 drones and based on the ratio technique.

for the defined parameters (table 5.6), this effect is seen. Since the type 2 drones can stay in

the air for around 30 minutes longer than the type 1 drones, they can cover more locations with

the same amount of drones. Hence the faster coinciding of both graphs in comparison with the

graphs based on the usage of type 1 drones.

Figure 5.17 depicts the influence of the height margin between the surface and the type 2

drones on the amount of covered users. The influence of the height margin on this parameter

is the same as when type 1 drones were used. The higher the base station is placed, the more

users can connect to it. The more users can connect to the same base station, the fewer base

station locations need to be covered by drones. The fewer locations need to be covered, the

higher the chance that all base station locations and thus all users are covered. The difference

with the usage of type 1 drones lies again in the potency of both types of drones. A certain

amount of type 2 drones is able to cover more locations than the same amount of type 1 drones

over a certain period of time. Because of this, a user coverage of 100% is easier reached when

using type 2 drones.

In figure 5.18 influence of the height margin on the power usage of a type 2 drone and its

base station is visualised. In this figure a linear correlation between the height margin and the

power usage of a drone and its base station can be seen. By increasing the height margin with

30 meters the power usage of the drone increases with 0.5 Ampere.

5.2 Unmanned Aerial Vehicles 71

Figure 5.17: Influence of the height margin on the amount of covered users using type 2 drones

and based on the ratio technique.

Figure 5.18: Influence of the height margin on the power usage per base station using type 2

drones and based on the ratio technique.

5.2 Unmanned Aerial Vehicles 72

Parameter Value

Base Station Selection Technique Ratio Technique

Facility Capacity 300 drones

Intervention Duration 3600 seconds

Height margin 4 meters

Area 4 km2, Ghent, figure 5.1

Amount of Users Based on provider data, 224 users

Amount of Simulations 40

Table 5.7: Parameter values used for the analysis of the influence of the maximal allowed height

of a drone.

5.2.4 Maximal Height of a Carrier

A drone is not always allowed or capable to fly as high as it is instructed to. Keeping this

restriction in mind an input parameter that depicts the maximal height a drone can reach

was created. Based on this input parameter, the algorithm decides if a location were it would

preferably place a base station is feasible for the drone or not.

In the following sections, the influence of this input parameter on two output parameters

is discussed. In section 5.2.4.1 the amount of base station locations and users that became

infeasible due to the height limitation is analysed. In section 5.2.4.2 the influence of a height

limitation is discussed when drones of type 1 (table 5.2) are used. In section 5.2.4.3 the same is

done for drones of type 2 (table 5.3).

For all results in this section the following parameter values were used. As a criterion to

select the best base station locations the ratio technique was used. The capacity of the used

facility was set to be 300 drones. The height margin was set to 4 meters. The duration of the

intervention was set to be 1 hour. The predefined area is an area of around 4 km2 situated

in the city of Ghent and can be found in figure 5.1. Finally, the amount of users is based on

the data of a mobile connectivity provider for the defined area on the busiest time of the day

resulting in 224 users for one simulation (as in [47]). In order to get representative results, 40

simulations (as calculated in section 4.2.1) were created for each different maximal height value.

An overview of these parameters can be found in table 5.7.

5.2 Unmanned Aerial Vehicles 73

Figure 5.19: Influence of the maximal height a drone can reach on the reachability of base station

locations and users using type 1 drones and based on the ratio technique.

5.2.4.1 Amount of Infeasible Locations and Users

The amount of base station locations and users that became infeasible by a certain height

limitation is not affected by the type of drone used. This output parameter merely represents

how many base station locations proposed by the algorithm are not taken into consideration for

the generation of the new network because they are too high. Figure 5.19 visualises the amount

of base station locations that became infeasible due to the use of a height limitation. The

figure also visualises the amount of users that can only connect to a base station in a restricted

location, no other base station locations are viable for these users leaving them uncovered purely

due to the enforced height restriction. As can be seen in this figure, around 50% of all locations

become infeasible when the maximal allowed height is less than 10 meters. When the maximal

height increases, the amount of infeasible locations and users drops rapidly and becomes almost

zero when a maximal height of around 30 meters is used. These results reveal that there are

not many buildings in the used area that are taller than 30 meters. The tallest building in the

area is around 120 meters high so the amount of infeasible locations will be completely zero if

a maximal height of more than 120 meters is used.

5.2.4.2 Influence Using Type 1 Drones

In figure 5.20 the influence of the maximal height on the amount of covered base station locations

and users is visualised. In this figure it can be seen that the amount of covered locations and

users only increases slightly (5% when increasing the maximal height from 4 to 40 metres after

5.2 Unmanned Aerial Vehicles 74

Figure 5.20: Influence of the maximal height a drone can reach on the coverage of base station

locations and users using type 1 drones and based on the ratio technique.

which it remains steady) in comparison with the rapid drop that can be seen in the amount of

infeasible locations and users from figure 5.19. This can be explained by looking at the used

amount of drones when the height limitation is a very small value. At that point, the algorithm

already requires a lot more capacity than there is available to cover all users and locations in

the simulation. Since there is no increase in capacity throughout the simulation, the algorithm

is unable to cover any of the locations and users that become available due to the easing of

the height limitation. The reason why the amount of covered base station locations and users

increases a bit however is that the algorithm can decide to cover locations that are closer to the

facility or that reconnect a higher amount of users. The algorithm can thus allocate its resources

in a smarter way resulting in a higher amount of coverage.

5.2.4.3 Influence Using Type 2 Drones

In figure 5.21 the amount of coverage for the base station locations and users is visualised with

respect to the used maximal height value. In this figure, it can be seen that the simulation in

which type 2 drones are used does follow the trend that was seen in figure 5.19. Based on the

results in section 5.2.1.2 it is known that type 2 drones need a capacity of around 400 drones

in order to cover all available locations. Since this specific simulation has a capacity of 300

drones, it is able to cover almost all locations. In contrast to the previous section where the

algorithm could only allocate its resources in a smarter way in order to get a higher amount of

coverage, the algorithm using type 2 drones can cover every base station location that becomes

5.2 Unmanned Aerial Vehicles 75

Figure 5.21: Influence of the maximal height a drone can reach on the coverage of base station

locations and users using type 2 drones and based on the ratio technique.

available with the easing of the height limitation. This effect lasts until the maximal capacity

of type 2 drones is used. Beyond that point the algorithm continues as in the previous section.

It reallocates its resources in a smarter way in order to maximize the coverage.

5.2.5 Conclusion

In this section, the influence on the results of the algorithm were analysed using input parameters

based on a realistic scenario.

In section 5.2.1 it was seen that using type 2 drones (table 5.3) results in a saving of resources

of around 65%. Where the algorithm requires a capacity of 1100 type 1 drones to cover all users,

it will only require 400 type 2 drones to achieve 100% coverage. The main reason to use as little

drones as possible is the cost of acquiring, storing and maintaining the drones. The choice for

one of the two types of drones thus depends on these costs. If using type 2 drones is less than

65% more expensive than using type 1 drones it will be more interesting to use type 2 drones.

The influence of the intervention duration on the coverage of the locations and users inves-

tigated in section 5.2.2 is quite high. When 300 type 1 or type 2 drones are available, location

and user coverage even starts approaching 0% when a duration of around 14 hours for type

1 and 25 hours for type 2 drones is reached. This influence results in an exponential relation

since the less important locations loose coverage rather quickly due to their high demands con-

cerning the amount of necessary drones. Doing so, more drones become available for the more

important locations. The more drones become available for the remaining base station locations,

5.2 Unmanned Aerial Vehicles 76

the slower the convergence. In order to use this scenario in practice it is thus very important

to let the amount of drones increase with the foreseen duration of the intervention. It can be

concluded that a linear increase of the amount of drones is sufficient to nullify the effect of an

increasing intervention duration. When comparing type 1 and type 2 drones it can be seen

that the influence of an increasing intervention duration has a slower impact on type 2 drones.

When deploying this scenario in practice, type 2 drones will thus be more interesting when the

intervention duration is harder to estimate.

Based on the results in section 5.2.3 it can be concluded that increasing the height margin and

thus the minimal height of a drone and its base station results in a more economical solution.

Elevating the average position of the drone increases the chance that no obstacles or other

structures block the signal between a base station and a user. Because of this, the same base

station is accessible for more users than it was before. Since more users can connect to one base

station, the need for base stations decreases and thus the same amount of connectivity can be

reached using a smaller amount of base stations.

The difference between the usage of type 1 or type 2 drones in section 5.2.3 is rather small.

Since type 2 drones are more potent they can serve more unique locations than type 1 drones

can for the same amount of time. The bigger the minimal height, the lower the amount of base

station locations necessary to cover all users. Given these facts, the same amount of type 2

drones can cover all present users and locations with a lower height margin than type 1 drones

can since a lower margin implies more necessary locations. Type 2 drones will thus be the better

choice if the potential height margin is rather small and the same capacity of both drones is

available. When high altitudes can be reached it may however be more interesting to use type 1

drones since with the same amount of these cheaper drones, the same level of connectivity can

be reached. This is of course only true when it is assumed that the path loss does not get too

big because of the added distance that the larger margin creates.

In section 5.2.4 it is seen that a height limitation might have big consequences for the output

of the used algorithm. When the limitation is very severe (around 10 meters), up to 50% of all

base station locations and 40% of the users stay uncovered. For the used area, the limitation

looses its effect when it exceeds 30 meters. It is best to prevent such a limitation in real life

scenarios. When such a limitation is inevitable it is useful to look at the heights of all possible

base station locations to estimate the success rate of the scenario. This is however very hard to

do since the location of the intervention is not known beforehand.

Based on the results in this section it can be concluded that using the proposed scenario

and parameters the described connectivity problem could be solved. However, there are some

important requirements. The amount of available drones needs to be high enough and the height

5.3 Emergency Services Vehicles 77

cannot be too severely limited. When enough height can be reached, fewer drones need to be

utilized. An important factor that is not discussed in this section is the capacity of the backhaul

connection. Depending on the amount of users that need to be reconnected, more capacity will

be necessary. The capacity of this connection depends on the chosen technology to provide it.

As discussed in section 2.4 several possibilities exist and the right one needs to be chosen in

order to prevent the backhaul of becoming the bottleneck of the system.

5.3 Emergency Services Vehicles

The next scenario described in chapter 3 is the one that uses emergency service vehicles to get

the base stations in place (section 3.1.2). In this scenario, the placement of the base stations

is no longer planned ahead as was done with the scenario based on drones. Emergency service

vehicles can not be sent off to some predefined place, they will go to the place where their help

is needed the most. Because of this, this scenario will only be able to reconnect users within a

certain distance of the disaster site.

Emergency service vehicles are not likely to be spread out over an area of around 4 km2

which is why a smaller area was used for the following simulations. The input parameters in

this section are based on an event called ”De Gentse Feesten”. This is an annual event that lasts

for 10 days and is situated in a part of the city of Ghent that is around 1 km2 big (figure 5.22).

This event was attended by around 100 000 people every day in the year 2015 [50]. During the

simulations in this section it was assumed that around 50 000 people were at the event at the

same time and some kind of incident occurred at the center of the event area. This incident

required a certain amount of unspecified emergency service vehicles in which base stations were

installed.

In the following sections the influence of the different variable input parameters is investi-

gated. In section 5.3.1 the influence of the amount of emergency service vehicles that are present

in the area is investigated. The influence of the chance that a vehicle is present in the area but

leaves before the intervention is over is analysed in section 5.3.2. In section 5.3.3, the influence

of the size of the incident is investigated. Based on these three sections a conclusion concerning

this scenario is drawn in section 5.3.4.

5.3.1 Available Emergency Service Vehicles

The first input parameter analysed is the amount of vehicles that are available in the area. This

is the total amount of emergency service vehicles that have been in the area for a certain amount

of time during the intervention. It is not the amount of base stations that is eventually used to

5.3 Emergency Services Vehicles 78

Figure 5.22: The area used as input for the algorithm based on emergency service vehicles.

reconnect the users. The amount of base stations is calculated by the algorithm based on the

amount of available vehicles and the chance that these vehicles depart prematurely.

For all results in this section the following parameter values were used. To simulate a realistic

scenario, an area of around 1 km2 in the city of Ghent was used combined with 50000 present

users as derived from [50]. The range of the occurred incident was defined as a circle with a

radius of 300 meters and a 60% chance a vehicle might leave prematurely was used. In order to

get representative results, 40 simulations (as calculated in section 4.2.2) were created for every

different amount of vehicles. An overview of these parameters can be found in table 5.8.

Every vehicle in this scenario is equipped with a base station, however a base station is only

available to the users if the vehicle to which it is attached stays in place for the entire duration

of the intervention. How long a vehicle stays at the scene is determined by the departure chance

which is set at 60% for this case (table 5.8). In figure 5.24 the amount of base stations that

could have been used to reconnect users in relation to the total amount of vehicles that were

present at some point during the intervention is visualised. In figure 5.23 the amount of covered

users in relation to the amount of available vehicles within the predefined range is visualised.

From these figures it becomes clear that using a departure chance of 60% (table 5.8), adding 16

extra vehicles results in 10 extra available vehicles and 0.25% extra user coverage.

5.3 Emergency Services Vehicles 79

Parameter Value

Area 1 km2, old city centre Ghent, figure 5.22

Number of Users 50000 users

Incident Range 300 meters

Chance a Vehicle Leaves Prematurely 60%

Number of Simulations 40

Table 5.8: Parameter values used for the analysis of the influence of the amount of available

emergency service vehicles.

Figure 5.23: Influence of the amount of vehicles present at the scene on the amount of covered

users.

Another element that can be derived from figure 5.23 is that the amount of covered users

is rather low, around 1.8% when 100 vehicles are used. This can be explained by the fact

that a LTE femtocell can only cover as many users as its properties allow him to. Since the

area is flooded with users that want to be reconnected, the base stations are saturated rather

quickly and no additional users can be reconnected. Based on figures 5.24 and 5.23 it can be

assumed that around 5000 well positioned, continuously available vehicles are necessary to cover

all users in the area. This is an enormous amount of emergency service vehicles to expect in a

realistic scenario. The scenario using emergency service vehicles with the current parameters is

practically infeasible.

5.3 Emergency Services Vehicles 80

Figure 5.24: Influence of the amount of vehicles present at the scene on the amount of Base

Stations.

5.3.2 Chance of Premature Departure

The second influential input parameter is the chance that a vehicle departs prematurely, making

it a bad candidate to reconnect users to the network. Based on this chance the algorithm

calculates how long certain vehicles are available to reconnect users to the network. Emergency

service vehicles can belong to all kinds of services and each service has his own behaviour.

A police car might stay around during the entire intervention since the police is for example

evacuating the event site. A fire truck might also stay around during the entire intervention

since they cannot leave before for example the entire fire is put out. An ambulance on the other

hand will often leave before the intervention is over to transport the wounded to the hospital as

fast as possible. Based on the chance of departure, the time each emergency service vehicle in

the simulation stays at the scene is calculated in order to mimic these different behaviours.

For all results in this section the following parameter values were used. To simulate a realistic

scenario, an area of around 1 km2 in the city of Ghent was used combined with 50000 present

users as derived from [50]. The range of the occurred incident was defined as a circle with a radius

of 300 meters. The amount of available vehicles was set to be 40. In order to get representative

results, 40 simulations (as calculated in section 4.2.2) were created for every different departure

chance. An overview of these parameters can be found in table 5.9.

In figure 5.25 the influence of different departure chances used for all vehicles is visualised

in relation to the amount of covered users. In this figure it can be seen that the user coverage

is linearly depending on the chance a vehicle departs. Since the amount of people in the used

5.3 Emergency Services Vehicles 81

Parameter Value

Area 1 km2, old city centre Ghent, figure 5.22

Number of Users 50000 users

Incident Range 300 meters

Amount of Available Vehicles 40 vehicles

Number of Simulations 40

Table 5.9: Parameter values used for the analysis of the influence of the chance a vehicles leaves

prematurely.

Figure 5.25: Influence of the departure chance of a vehicle on the amount of covered users.

realistic scenario is so big, every available base station is fully used. This makes the exact location

of a vehicle unimportant. At every location users can be reconnected and thus every decrease in

the amount of base station results in a loss of coverage. The departure chance determines how

many vehicles and thus base stations of the total amount of vehicles are available throughout

the entire intervention. The bigger the departure chance becomes, the fewer base stations from

the total amount of base stations are available and the smaller the user coverage gets.

5.3.3 Size of the Incident

The size of the incident determines the spread of the available vehicles over the area. In the

algorithm, the size of the incident is defined as a circle with a certain radius. The larger this

radius, the bigger the area where emergency service vehicles can occur and the more the vehicles

are spread out over the area.

5.3 Emergency Services Vehicles 82

Parameter Value

Area 1 km2, old city centre Ghent, figure 5.22

Number of Users 50000 users

Chance a Vehicle Leaves Prematurely 60%

Amount of Available Vehicles 40 vehicles

Number of Simulations 40

Table 5.10: Parameter values used for the analysis of the influence of the range of the incident.

For all results in this section the following parameter values were used. To simulate a realistic

scenario, an area of around 1 km2 in the city of Ghent was used combined with 50000 present

users as derived from [50]. The chance that a vehicle departs prematurely was set to be 60%

and the amount of available vehicles was set to be 40. In order to get representative results,

40 simulations (as calculated in section 4.2.2) were created for every different departure chance.

An overview of these parameters can be found in table 5.10.

Figure 5.26 visualises the relation between the amount of covered users and the used radius

or range of the incident. As can be seen in this figure the user coverage stays more or less stable

when the range of the incident changes. These results are based on a realistic scenario using

50000 users spread out over a relatively small area with a limited number of base stations to

reconnect them to the network. When a bigger range is used, more users come inside the area

covered by the base stations mounted on the emergency service vehicles. Normally this should

result in a bigger user coverage. However, due to the high amount of users, the available base

stations are already saturated even if a smaller radius is used and thus a smaller subset of the

users is in range of the base stations. Including more users in the area by increasing its size

will thus not increase the amount of covered users since all the base station capacity is already

exhausted.

5.3.4 Conclusion

In this section the scenario using emergency service vehicles as carriers for the base stations was

used on a realistic situation. The influence of different input parameters and their impact on

the results of the simulation was analysed.

The amount of available vehicles is a limiting factor for this scenario. The more vehicles

are available, the more users that can be reconnected. In the case based on the parameters

in table 5.8, 16 extra available vehicles led to an increase in user coverage of 0.25%. Next to

this parameter, the departure chance also plays an important role. The lower the departure

5.3 Emergency Services Vehicles 83

Figure 5.26: Influence of the incident range on the amount of covered users.

chance, the more users that can be reconnected. In the case based on the parameters in table

5.9, lowering the departure chance by 10% increased the user coverage by 0.20%. However, the

amount of available vehicles and the departure chance need to be considered together since they

have a mutual effect on the user coverage. The amount of vehicles and the departure chance

determine how big the amount of base stations that are actually available to the users is and

thus how many users can be reconnected to the network.

The range of the incident does not have that much influence. The range of the incident

determines indirectly how many of the total amount of users can be covered. Using the param-

eters from this section, even a small range results in a lot of users saturating all available base

stations.

Based on the results found in this section it can be concluded that the solution using emer-

gency service vehicles is infeasible. The amount of users of the realistic scenario is too high in

comparison with the amount of vehicles and thus base stations in any case. When assuming

that 40 vehicles stay in the area during the entire intervention, only 2% of all users is covered.

This means that around 2000 well placed vehicles are necessary to get 100% coverage which is

an absurd high number for the area used to simulate this scenario. However, this solution might

be used in combination with the solution based on drones in order to create some extra coverage

without having to deploy extra drones. The mixture of these scenarios is discussed in chapter 6.

5.4 Public Transportation Vehicles 84

5.4 Public Transportation Vehicles

In chapter 3, a third and final scenario is introduced (section 3.1.3). In this scenario the necessary

base stations are brought into place by public transport vehicles. The biggest difference with

the drone and the emergency services scenario is that public transport vehicles move around the

entire time, making them only useful when they stand still for a longer period of time or when

they replace each other at a certain location in order to provide continuous coverage at such a

location. These locations are called stops and they depict the gathering place for lots of public

transport vehicles.

In this section the type of public transport vehicles is limited to buses and taxis. These two

types of vehicles have a clear behaviour, they appear in almost every city and they form the

majority of public transport vehicles. To be able to base these simulations on realistic figures,

the situation for these two types of vehicles in the city of Ghent was investigated. From this

investigation it was concluded that the amount of bus stops is typically a lot lower than the

amount of taxi stops. However, a bus stop typically is bigger in size and thus contains more

platforms than a taxi stop [51, 52, 53]. These findings are also taken into consideration in the

following analyses.

Based on four input parameters, the feasibility and the requirements of an emergency ad hoc

network based on buses and taxis is analysed. In section 5.4.1, the influence of the amount of

stops in the area where buses or taxis can reside on the output of the algorithm is investigated.

In section 5.4.2, the same is done for the influence of the size of the different stops that are

spread out over the area. In section 5.4.3, the influence of the chance that a vehicle is covering

a certain stop on the results of the algorithm is analysed.

5.4.1 Amount of Stops

The amount of stops is the amount of gathering places for public transport vehicles spread out

across the used area. A stop in this dissertation is defined as one point in the area where multiple

platforms occur. A platform is a place where one public transport vehicle can be stationed for

a certain amount of time. Throughout the analysis in this section a split between stops of taxis

and stops of buses is made. They are used in the same simulation, covering the same area in

order to get the combined result but they are considered separately in order to investigate their

separate influence on the big picture.

For all results in this section the following parameter values were used. To simulate a realistic

scenario, the amount of bus stops was taken four times smaller than the amount of taxi stops

as derived from [51, 52]. The sizes of the bus stops however were taken bigger than the sizes

5.4 Public Transportation Vehicles 85

Parameter Value

Amount of Bus Stops x

Amount of Taxi Stops 4 · x

Bus Stop Size Uniformly Selected Element of [1, 20]

Taxi Stop Size Uniformly Selected Element of [1, 5]

Chance a Bus Is Available At a Platform 50%

Chance a Taxi Is Available At a Platform 30%

Area 4 km2, Ghent, figure 5.1

Amount of Users Based on provider data, 224 users

Amount of Simulations 40

Table 5.11: Parameter values used for the analysis of the influence of the amount of bus and

taxi stops in the predefined area.

of the taxi stops. The sizes of the bus stops were selected in a uniform way from the interval

[1, 20], the size of a bus stop can thus be any number between 1 and 20. The sizes of the taxi

stops were selected in a uniform way from the interval [1, 5], the size of a taxi stop can thus be

any number between 1 and 5. The chance a bus is continuously present at one of the platforms

of a certain stop was set to be 50% and the chance a taxi is continuously present at one of the

platforms of a certain stop was set to be 30%. The area that was used is approximately 4 km2

big and is situated in the city of Ghent (figure 5.1). Finally, the amount of users is based on

the data of a mobile connectivity provider for the defined area on the busiest time of the day

resulting in 224 users for one simulation (as in [47]). In order to get representative results, 40

simulations (as calculated in section 4.2.3) were created for every different amount of stops. An

overview of these parameters can be found in table 5.11.

5.4.1.1 Influence of the Amount of Bus Stops in the Area

Figure 5.27 visualises the effect of increasing the amount of bus stops on the amount of maximal,

selected and used base stations. Every base station is mounted on a bus. The maximal amount

of base stations is the amount of base stations if all platforms at every stop in the area are filled

for 100% with buses. The selected amount of base stations is the amount of base stations that

is actually spread over the platforms of all certain stop in the area when the availability chance

of a vehicle is taken into account. The used amount of stops is the amount of base stations that

were eventually used to reconnect users to the network.

As can be seen in figure 5.27, the maximal and selected amounts of base stations rise linearly

5.4 Public Transportation Vehicles 86

Figure 5.27: Influence of the amount of bus stops on the maximal amount, the selected amount

and the used amount of base stations mounted on buses.

with the amount of available stops. Based on the parameters in table 5.11 the maximal amount

of base stations rises with 100 base stations and the amount of selected base stations rises with

around 50 base stations for every 10 extra bus stops that are introduced. The more stops

there are, the more platforms are available and thus the bigger the maximal amount of base

stations is. The bigger this maximal amount the bigger the amount of selected base stations

since this is a realistic percentage of that maximal amount of available base stations. The most

interesting graph in this figure however, is the graph depicting the amount of base stations used

to reconnect users to the network. Upon analysing this graph it can be seen that it rises slowly

(on average, per 10 extra bus stops around 7.3 extra base stations are used) despite the fast rise

of the available and selected base stations. Since there are a lot of unused base stations, it is

concluded that the amount of users in reach of the base stations at a stop is fairly limited.

Figure 5.28 visualises the influence of the amount of stops on the amount of users covered

by the buses. In this figure it becomes clear that increasing the amount of bus stops increases

the amount of users covered by a bus in a linear fashion. For every 5 bus stops that are added

to the area an extra 2% of all users are being covered by buses using the parameters in table

5.11. The bigger the amount of stops the more locations are equipped with base stations and

thus, since the users are uniformly spread throughout the area, the more users can be covered.

Another point that can be concluded from this figure is that the amount of bus stops needs to

be rather large in order to get some user coverage. For example in the predefined area (the city

of Ghent) there are only 5 bus stops meaning that based on the parameters in table 5.11, only

5.4 Public Transportation Vehicles 87

Figure 5.28: Influence of the amount of bus stops on the amount of users covered by buses.

2% of all users could be covered by buses.

5.4.1.2 Influence of the Amount of Taxi Stops in the Area

Figure 5.29 visualises the influence of the amount of taxi stops on the maximal amount, the

selected amount and the used amount of base stations mounted on taxis. As can be seen in this

figure the maximal amount of base stations is virtually the same as the maximal amount of base

stations when using buses. This means that a bigger amount of smaller taxi stops results in a

equal amount of maximally available base stations. The amount of selected base is somewhat

smaller than it was the case for the amount of selected base stations using buses. This can

be explained by the smaller availability chance of a taxi (30%) in comparison to that of a bus

(50%).

The most interesting graph in figure 5.29 is again the amount of base stations used to

reconnect users to the network. It can be seen that there is a linear increase in base stations

used to reconnect users with the amount of available stops. Using the parameters in table 5.11,

10 extra taxi stops results in 2.6 extra used base station. When comparing this graph to the

one from the buses it can be seen that although the amount of selected base stations is around

19% lower for the same amount of maximally available base stations, the amount of used base

stations is around 12.45% higher in this case. Due to the fact that taxis use more but smaller

stops, the total amount of taxi and bus platforms is equal resulting in an equal maximal amount

of base stations for each vehicle type. However, the taxi base stations have a better spread over

the defined area. They are spread out over four times as many locations. Since the amount of

5.4 Public Transportation Vehicles 88

Figure 5.29: Influence of the amount of taxi stops on the maximal amount, the selected amount

and the used amount of base stations mounted on taxis.

users at a stop is fairly low, they can be covered with a limited amount of base stations. A big

amount of base stations at one location is thus less useful than a small amount of base stations

divided over a lot of locations.

Figure 5.30 visualises the influence of the amount of taxi stops on the amount of covered

users. The amount of users covered by taxi base stations is almost 10% higher than the amount

of users covered by bus based base stations. This strengthens the conclusion that a big amount

of small stops is considerably better than a small amount of big stops. Another observation

based on this figure is that there have to be a lot of taxi stops available to reach some user

coverage. In the predefined area (the city of Ghent) there are only 22 taxi stops present in

reality. This means that when using the parameter values in table 5.11, less than 5% of the

users are covered.

5.4.2 Size of the Stops

The size of a stop is uniformly chosen from an interval defined by the user. This size can be seen

as the maximal amount of vehicles that is associated with the stop. Together with the chance

a certain vehicle is present at a platform of a stop it determines how many base stations are

present at a certain stop.

For all results in this section the following parameter values were used. To simulate a realistic

scenario, five bus stops and 20 taxi stops per simulation where used as derived from [51, 52]. The

chance a bus is continuously present at one of the platforms of a certain stop was set to be 50%

5.4 Public Transportation Vehicles 89

Figure 5.30: Influence of the amount of taxi stops on the amount of users covered by taxis.

Parameter Value

Amount of Bus Stops 5

Amount of Taxi Stops 20

Chance a Bus Is Available At a Platform 50%

Chance a Taxi Is Available At a Platform 30%

Area 4 km2, Ghent, figure 5.1

Amount of Users Based on provider data, 224 users

Amount of Simulations 40

Table 5.12: Parameter values used for the analysis of the influence of the size of bus and taxi

stops in the predefined area.

and the chance a taxi is continuously present at one of the platforms of a certain stop was set to

be 30%. The area that was used is approximately 4 km2 big and situated in the city of Ghent

(figure 5.1). Finally, the amount of users is based on the data of a mobile connectivity provider

for the defined area on the busiest time of the day resulting in 224 users for one simulation (as

in [47]). In order to get representative results, 40 simulations (as calculated in section 4.2.3)

were created for every different stop size. An overview of these parameters can be found in table

5.12.

In this section, the interval from which a stop size is uniformly chosen is shifted by two

vehicles every simulation leading to a mean stop size that is two vehicles bigger than the mean

stop size in the previous simulation. The initial interval for a bus stop was set to be [1, 20] and

5.4 Public Transportation Vehicles 90

the initial interval for a taxi stop was set to be [1, 5]. Thus for simulation i the size of a bus

stop was uniformly chosen from the interval [1 + 2 · i, 20 + 2 · i] and the size of a taxi stop was

uniformly chosen from the interval [1 + 2 · i, 5 + 2 · i].

5.4.2.1 Influence of the Size of the Bus Stops

Figure 5.31 visualises the influence of a shift of the stop size interval on the maximal, the

selected and the used amount of base stations mounted on buses. As can be seen in this figure,

the maximal and the selected amount of used base stations share a strong linear relation. When

the bus stop size interval is increased by 2, 20 extra platforms and thus base stations become

available of which 10 are selected. This can be explained by the fact that the selected amount

of base stations is fully based on the maximal amount of base stations and the chance a bus is

present at a platform of a stop.

The interesting graph in figure 5.31 is the graph depicting the amount of base stations used to

reconnect the users to the network. Throughout all simulations this graph is quite steady. The

amount of base stations used to reconnect the users to the network is more or less independent

from the stop size. This can be explained by the fact that a stop is a place where the base

stations are spread out over a fairly limited area. Based on the graph it can be seen that the

amount of users in the vicinity of the stops are already covered by a small amount of base

stations. An increase of base stations in the limited area of a stop does thus not have much

effect. Adding these base stations does not necessarily cause them to be used since the amount

of users in the area remains constant.

In figure 5.33 the amount of covered users in relation to the stop size interval is visualised.

In this figure it can be seen that the amount of covered users grows with approximately 3%

when going from stops with 10 platforms on average to stops with 90 platforms on average. The

small increase is caused by users that are situated on the border of the range of a stop. Imagine

a stop being a circular area where all base stations are situated. When there is a small amount

of base stations present in this circle, only parts of the circle and the vicinity of the circle can

be covered as is illustrated in figure 5.32a. However, when a really big amount of available base

stations are crammed together inside that same circle almost every point within the circle and

all the points outside but close enough to the circle can be covered as is illustrated in figure

5.32b. This means that when a stop is completely filled with available base stations, the users

that lie just in reach of the stop have a bigger chance of being covered as well, causing a small

increase in coverage.

5.4 Public Transportation Vehicles 91

Figure 5.31: Influence of the size of the bus stops on the maximal amount, the selected amount

and the used amount of base stations mounted on buses.

(a) A stop with only a few platforms. (b) A stop with a lot of platforms.

Figure 5.32: Illustration of the influence of different stop sizes. The coverage of a base station

at a platform is visualised by an orange circle. The entire stop is restricted to the area within

the blue circle.

5.4.2.2 Influence of the Size of the Taxi Stops

Figure 5.34 visualises the effect of the stop size interval on the maximal, selected and eventually

used amount of base stations mounted on taxis. As can be seen in this figure, the maximal

5.4 Public Transportation Vehicles 92

Figure 5.33: Influence of the size of the bus stops on the amount of users covered by buses.

and selected amount of base stations share a linear relation. When the taxi stop size interval is

increased by 2, 20 extra platforms and thus base stations become available of which 10 remain

after applying the availability chance. The interesting part of this figure however is the graph

depicting the amount of base stations that was used to reconnect users to the network. This

graph shows a slight increase when the amount of available platforms grows. Shifting the stop

interval by 2 results in 1 extra used base station based on the parameters in table 5.12. This

can be explained using the same circle as in the previous section (figure 5.32). In the previous

section, only five of these circles where spread out over the defined area. This means that only

users in the vicinity of these five circles could be covered. In this section however, 20 of these

circles are spread out over the area. Since the circles are about the same size, the combined

surface that they can cover is bigger. Nevertheless, the amount of base stations necessary to

completely fill up all these circles is bigger. The more base stations that are crammed inside

these circles, the bigger the chance becomes that the users in the vicinity of a circle are also

covered. However, once all these users are covered, no other base stations are necessary even

though they are available. Adding extra capacity is then useless since the other users in the area

are too far away from the stops. This prevents them from connecting to the base stations at the

stop due to a path loss that becomes too high. Since adding this capacity does not connect any

extra users, the increase in used base stations stops.

In figure 5.35 the amount of users covered by base stations mounted on taxis is visualised

in relation to the taxi stop size interval. In this figure it can be seen that the algorithm stops

covering extra users after a certain amount of platforms per stop is reached. This is due to

5.4 Public Transportation Vehicles 93

Figure 5.34: Influence of the size of the taxi stops on the maximal amount, the selected amount

and the used amount of base stations mounted on taxis.

the effect discussed in the previous paragraph. When the stops are completely filled with base

stations and all users in the vicinity of the stops are covered, the addition of extra base stations

does no longer lead to an increase in coverage.

5.4.3 Chance a Vehicle Is Present At a Platform of a Stop

As was mentioned in the previous section, the size of a stop is uniformly picked from an interval

defined as an input parameter. Because of this, the sizes of different stops vary. To account

for these differences the chance a stop is continuously covered was introduced. This chance

determines how many base stations are continuously present at a stop with a certain size. The

lower the amount of platforms at a stop, the lower the amount of present base stations is and

thus the bigger the chance that the stop has no continuous presence of a base station. If there

is no continuous presence of a base station, the stop is useless for the users.

For all results in this section the following parameter values were used. To simulate a realistic

scenario, five bus stops and 20 taxi stops per simulation where used as derived from [51, 52].

The sizes of the bus stops however were taken bigger than the sizes of the taxi stops. The sizes of

the bus stops were selected in a uniform way from the interval [1, 20]. The sizes of the taxi stops

were selected in a uniform way from the interval [1, 5]. The area that was used is approximately

4 km2 big and is situated in the city of Ghent (figure 5.1). Finally, the amount of users is based

on the data of a mobile connectivity provider for the defined area on the busiest time of the day

resulting in 224 users for one simulation (as in [47]). In order to get representative results, 40

5.4 Public Transportation Vehicles 94

Figure 5.35: Influence of the size of the taxi stops on the amount of users covered by taxis.

Parameter Value

Amount of Bus Stops 5

Amount of Taxi Stops 20

Bus Stop Size Uniformly Selected Element of [1, 20]

Taxi Stop Size Uniformly Selected Element of [1, 5]

Area 4 km2, Ghent, figure 5.1

Amount of Users Based on provider data, 224 users

Amount of Simulations 40

Table 5.13: Parameter values used for the analysis of the influence of the chance a bus or taxi

is present at a platform of a stop in the predefined area.

simulations (as calculated in section 4.2.3) were created for every different chances of availability.

An overview of these parameters can be found in table 5.11.

5.4.3.1 Influence of the Chance That a Bus Is Present

Figure 5.36 visualises the effect of varying the chance of a bus being continuously at a platform

of a stop on the maximal, the selected and the used amount of base stations. The maximal

amount fluctuates around 130. This value depends on the amount of stops which is a fixed value

and the sizes of these stops which are values between 1 and 20 (table 5.13). The selected amount

of base stations rises linearly with the increasing chance a bus is available. Using the parameters

in table 5.13, the amount of selected bus base stations increases by 20 for every increase of 15%

5.4 Public Transportation Vehicles 95

Figure 5.36: Influence of the chance a bus stop is covered on the maximal amount, the selected

amount and the used amount of base stations mounted on buses.

in the chance that a bus is present at a platform of a stop. The chance a bus is present at

a platform together with the amount of maximally available platforms at a stop determines

the amount of base stations that are present at a stop. The bigger this chance, the more base

stations there are available at a stop. The amount of base stations used to reconnect users to the

network increases slowly. For every increase of 8% in the defined chance, 1 extra base station is

used. Eventually, the chance reaches 100% around a value of 20 used base stations. The slow

increase of the number of base stations used to reconnect users can be explained in the same

way as in the previous cases. Since all the base stations in a stop are fairly close to each other,

the only users they can cover need to be in the direct vicinity of the stop. Further away users

experience a path loss that is too high preventing them from connecting with one of the base

stations at a certain stop. When all of these users are covered, adding more base stations to a

stop makes no difference since they are no longer necessary.

Figure 5.37 visualises the influence of the chance that a bus is continuously present at a

platform of a stop on the amount of covered users. Based on this figure the same conclusion as

in the previous paragraph can be made. When the chance a bus is available at a stop increases

from 0% to 65% the user coverage steadily rises towards 5%. Which means that the extra

capacity resulting from the increasing chance is used to connect users. When 5% user coverage

is reached the increase of user coverage gets almost zero since there are only a few possible users

left to cover. The graph reaches its maximal point (5% user coverage) at a chance of around

84%. After that point, the coverage does no longer increase with the increasing chance. All

5.4 Public Transportation Vehicles 96

Figure 5.37: Influence of the chance a bus stop is covered on the amount of users covered by

buses.

possible users are reconnected to the network at this point and adding extra capacity has no

further use.

5.4.3.2 Influence of the Chance That a Taxi Is Present

Figure 5.38 shows the influence of varying the chance that a taxi is continuously present at a

platform of a stop on the maximal, the selected and the used amount of base stations mounted

on a taxi. The maximal amount fluctuates around 130 base stations since the total amount

of stops and thus platforms does not change. The amount of selected base stations increases

with the analysed chance since this chance determines how many of the maximal amount of

base stations are actually able to provide continuous coverage to the users. Using the values in

table 5.13 the selected amount of base stations rises with 20 base stations for every increase of

15% in the chance that a taxi is available at a platform of a stop. The used amount of base

stations increases more or less linearly from 0 used base stations for a chance of 0% to 30 used

base stations for a chance of 100%. Although the maximal and selected amount of base stations

do not differ significantly between the case using buses and the case using taxis (the maximal

amounts both fluctuate around 130 base stations and the increase of the selected amount is the

same), the amount of base stations used is 25% bigger in the case using taxis when 100% is

reached. The main difference between the case using buses and this case is that there are more

but smaller taxi stops than in bus stops. This graph shows that more users can be reached

when a large amount of small stops is used than when a small amount of big stops is used. The

5.4 Public Transportation Vehicles 97

Figure 5.38: Influence of the chance a taxi stop is covered on the maximal amount, the selected

amount and the used amount of base stations mounted on taxis.

amount of users in the vicinity of a stop is limited since there are only a few stops spread out

uniformly over the area. Only a small amount of base stations is necessary to cover all the users

in the vicinity of a stop. Adding extra capacity as is done in bigger stops thus has minimal effect

compared to adding extra small stops and thus spreading the base stations more uniformly over

the area.

Figure 5.39 visualises the influence on the amount of covered users when the chance a taxi

is continuously present at one of the platforms of a stop is increased. The figure shows that

increasing the chance allows more users to be reconnected to the network. Using the parameter

values in table 5.13 leads on average to an increase in user coverage of 1% for every increase in

the defined chance of 8%. Since the taxi stops contain less platforms but are surrounded by the

same amount of users on average, it is harder to create an excess in capacity than it was the

case with the larger bus stops. Increasing the chance adds only a small amount of base stations

to the stop enabling the stop to cover some extra users in its vicinity leading to a higher user

coverage.

5.4.4 Conclusion

In this section the influence of several input parameters on the output of the algorithm was

analysed for the scenario using public transport vehicles.

In section 5.4.1, the amount of users covered by the taxi stops is always between 0 and 10%

higher than the amount of users covered by the bus stops although the maximal amount of base

5.4 Public Transportation Vehicles 98

Figure 5.39: Influence of the chance a taxi stop is covered on the amount of users covered by

taxis.

stations that both can offer is the same. This means that it is better to have a big amount of

small taxi stops than to depend on a small amount of the big bus stops.

Based on the obtained user coverage for both types of vehicles in section 5.4.1 it can be seen

that in the case of the city of Ghent where there are 20 taxi stops and 5 bus stops, around 6%

of all users is covered by using buses and taxis based on this solution. This is only a fraction of

the coverage that should be obtained to get to an acceptable solution.

In section 5.4.2 it is shown that increasing the size of a stop only has a beneficial effect up

until the size interval of a taxi stop is around [37,41] and the size interval of a bus stop is around

[29,48]. When the stop gets saturated with base stations and all users in the vicinity of the stop

are covered, increasing the size of a stop no longer has any effect. The only uncovered users

experience a path loss that is too high when trying to connect to a base station at one of the

stops in question.

Based on the obtained user coverage in section 5.4.2, it can be concluded that an unrealistic

stop size needs to be used in order to get some user coverage. In order to cover for example

around 10% of all users, the bus stop size should be at least 30 and the taxi stop size should be

at least 20. These numbers are not realistic for the area used to simulate this scenario.

In section 5.4.3 it is again confirmed that adding base stations to a stop by increasing the

chance that a taxi or a bus is present at a platform of a stop does not have the desirable effect.

Once the users in the vicinity of the stop are covered, enabling extra base stations is rendered

useless for the same reason as mentioned before. The path loss for the remaining uncovered

5.4 Public Transportation Vehicles 99

users is too high to connect to a base station at this stop.

Furthermore it is concluded that to cover all users present at the stops, both the bus stops

and the taxi stops need an availability chance of around 84%. This means that at all times,

84% of the platforms of all stops need to be in use which is very unlikely to happen in a realistic

scenario. When more realistic figures like 50% for the bus stops and 30% for the taxi stops are

used the algorithm is not able to cover more than 10% of all users.

Using the results gathered throughout this section it becomes clear that by itself this scenario

is not able to offer a good solution for the stated connectivity problem. It could however be

a good way to decrease for example the amount of drones when used in combination with the

scenario based on drones.

MIXTURE OF CARRIERS 100

Chapter 6

Mixture of Carriers

6.1 Introduction

In the previous chapters three scenarios were introduced and their feasibility was investigated.

The first introduced scenario uses unmanned aerial vehicles to bring the base stations in place.

This scenario appeared to be feasible in the analysis (section 5.2) depending on the amount of

funding available to acquire the necessary drones. The second introduced scenario uses emer-

gency service vehicles to get the base stations in place. This scenario was applied to a smaller

area with a lot of users in order to analyse the feasibility of the scenario when a certain accident

or event occurs (section 5.3). Out of this analysis it was concluded that the amount of vehicles

present in the area was not high enough to cover more than 1000 users. The third introduced

scenario uses the public transport infrastructure of a city, specifically buses and taxis. The

analysis of this scenario is described in section 5.4. The outcome of this analysis was that the

realistic amount of taxi and bus stops in the determined area would be too low in order to cover

all users in the area.

In this chapter, all three scenarios are combined to analyse their cooperation in a realistic

use case. Based on chapter 5 it can be seen that the scenario using drones is the most promising.

However, the costs of acquiring and maintaining a lot of these drones can be quite high depending

on the used material. The two other scenarios can be used to lower the amount of necessary

drones and thus to reduce these costs. The infrastructure used by these other scenarios (buses,

taxis and emergency service vehicles) does not require a lot of extra effort to equip it with base

stations. Next to this, these carriers are definitely around when an event happens in an urban

area and the people present need an alternative connection to the network.

Section 6.2 introduces the setup considered to investigate the cooperation of all described

scenarios. In section 6.3 the results of the scheduling tool are visualised and explained. Finally,

6.2 Setup 101

in section 6.4, a conclusion is drawn about the feasibility and possible improved efficiency of this

mixture scenario.

6.2 Setup

6.2.1 Real Life Use Case

To investigate the feasibility of the mixture of all scenarios, a real life case is chosen. This

real life case is the city centre of Ghent during De Gentse Feesten 2015. De Gentse Feesten is

a festival organised in the historical city centre of Ghent and lasts for 10 days. In 2015, the

festival had around 100000 visitors each day [50]. Figure 6.1 shows the size of the festival and

the different locations that are spread out over the historical city centre.

For this simulation, it is assumed that something happened at the centre of the festival as can

be seen in figure 6.1. This event created a panic and an outage of all base stations present in the

city and at the festival, including the extra infrastructure provided by the festival organisers.

Emergency service vehicles are in place at the festival site. Public transport vehicles keep

performing their normal routes in order to prevent compromising the traffic in the entire city.

Before the permanent backup infrastructure is installed, four hours will have passed meaning

that the scenario has to be able to bridge this duration.

Figure 6.2 shows the observed area for this scenario. The area can be devided into two zones.

The big orange area will be called zone 1 from now on. It denotes the entire city centre of Ghent.

The other smaller and somewhat brighter orange zone will be called zone 2 from now on. This

area is the area where De Gentse Feesten are taking place during the simulation.

6.2.2 Algorithm Parameters

To simulate this scenario in an efficient way, two separate groups of users are generated. The

first group, group 1, are the users that are not attending the festival. This amount of users

is determined by real life data from a cellular network provider like in [47]. The second group

of users, group 2, are all attending the festival. For this group the algorithm generates 50000

random users. This is based on the amount of daily users provided by [50]. The generated traffic

is displayed in figure 6.3.

In order to use the three scenarios over these two groups of users, the algorithm starts with

covering all users in group 1. Since zone 1 includes zone 2, these users might also occur in the

area of zone 2. These users are not specifically at the festival site but rather in for example one

of the surrounding buildings.

6.2 Setup 102

Figure 6.1: A map of De Gentse Feesten 2015 [5].

6.2 Setup 103

Figure 6.2: The area used for the mixture scenario.

Figure 6.3: The generated traffic for both groups (pink for group 1, purple for group 2) to

simulate the mixture scenario.

6.2 Setup 104

First the algorithm covers the group 1 users using the emergency service vehicles that are

in place at the festival site. As a next step the algorithm covers the uncovered users that are in

range of any of the five bus stops or 22 taxi stops that are spread out over the entire city. After

doing so, the algorithm completes covering the group 1 users by deploying as much drones as

necessary from a centrally located facility.

When all users from group 1 that can be covered are covered, the algorithm starts covering

the users of group 2. This is done by first determining which taxis, buses, emergency service

vehicles and drones are in range of the festival (zone 2), which is where the group 2 users are

located. Doing so, the base stations that are out of reach of these users do not have to be

considered for every group 2 user creating an increase in efficiency of the algorithm. Using the

found mobile base stations the users from group 2 are reconnected until all the available base

stations have no capacity left.

For the emergency service vehicles the parameters are derived from the case in section 5.3. A

range of 300 meters around the disaster point is used to denote how far the vehicles may spread

out. Within this range, 40 vehicles occur and each vehicle has a 60% chance that it departs

prematurely in which case it is rendered useless to connect users to the network.

For the public transport vehicles the parameters are derived from the case in section 5.4 and

the data in [51, 52]. There are 5 bus stops (with sizes between 2 and 20 platforms) and 22 taxi

stops (with a size around 5 platforms) in the defined area [51, 52]. Each platform in each of

these bus stops has a 50% chance that a bus is present. Each platform in each of the taxi stops

has a 30% chance a taxi is present.

For the drones the parameters are derived from the case and the results in section 5.2. It

is assumed that a drone is not able to fly higher than 150 meters and uses a height margin of

20 meters between itself and the surface. In section 5.2 it became clear that the use of type 1

drones (defined in table 5.2) or type 2 drones (defined in table 5.3) both has its advantages and

disadvantages. Since the type 2 drones can stay in the air for about 30 minutes longer than the

type 1 drones and the scenario described in this section has to last for four hours, type 2 drones

were chosen. In order to be able to cover all users that are normally in the city as much drones

as necessary are presumed available.

An overview of all the parameters of the scenario described in this section can be found in

table 6.1.

6.2 Setup 105

Parameter Value

Total Area Zone 1, figure 6.2

Festival Area Zone 2, figure 6.2

Amount of Group 1 Users Based On Provider Data, 224 Users

Amount of Group 2 Users Based On [50], 50000 Users

Duration of the Intervention 4 hours

Chance a Bus Is Present At the Platform of a Stop 50%

Chance a Taxi Is Present At the Platform of a Stop 30%

Amount of Emergency Service Vehicles 40

Chance an Emergency Service Leaves Prematurely 60%

Range of the Disaster 300 meters

Capacity of the Facility As much as necessary

Height Margin 20 meters

Maximal Height a Drone Can Reach 150 meters

Speed of a Drone 12 m/s

Power of a Drone 13 A

Power Usage of a Drone 17.33 Ah

Battery Voltage of a Drone 22.2 V

Table 6.1: Parameter values used for the analysis of the mixture scenario.

6.3 Results 106

Figure 6.4: The emergency services based base stations (purple) and their coverage (blue) for

the users in group 1.

6.3 Results

6.3.1 Results for the Users in Group 1

As was mentioned in section 6.2, the algorithm starts by determining which users from group

1 can be connected to the network using emergency service vehicles. These emergency service

vehicles only occur in a radius of 300 meters around the disaster site. From the 40 vehicles

that could be available throughout the entire duration of the intervention 26 vehicles left due to

the 60% premature departure chance. From the 14 remaining vehicles, 2 were used to cover 3

group 1 users. The location and coverage of these base stations can be found in figure 6.4. As

mentioned in section 6.2.2, zone 1 includes zone 2 which is why these users seem to occur at the

festival in this figure.

The second phase of the algorithm tries to connect as many group 1 users as possible to the

network by using public transport vehicles (section 6.2.2). The result of this phase can be found

in figure 6.5. As mentioned in section 6.2.2, zone 1 includes zone 2 which is why these users

seem to occur at the festival in this figure.

Based on the data from [51, 52] the algorithm created 53 platforms spread out over 5 bus

stations and 110 platforms spread out over 22 taxi base stations. Taking into account the

parameters defined in table 6.1, this resulted in 27 bus based base stations and 44 taxi based

6.3 Results 107

Figure 6.5: The public transport based base stations (purple) and their coverage (blue) for the

users in group 1.

base stations spread out over all stops. From these base stations, 1 bus based base station and 9

taxi based base stations were used to reconnect respectively 1 and 11 users from group 1 to the

network. The other users from this group could not connect to these base stations due to the

path loss that is too high. The location and coverage of these used base stations can be found in

figure 6.5. As mentioned in section 6.2.2, zone 1 includes zone 2 which is why these users seem

to occur at the festival in this figure.

The third phase of the algorithm reconnected the rest of the users in group 1 using base

stations that are mounted on drones. Figure 6.6 shows the locations of these base stations and

their coverage. Some of the base stations appear to have no coverage in this figure. In these

cases, the extent of the coverage is rather small and it is hidden behind the drawn dot. As

mentioned in section 6.2.2, zone 1 includes zone 2 which is why these users seem to occur at the

festival in this figure. The generated storage facility is denoted using a white dot.

Based on the parameters defined in table 6.1 the algorithm needed 153 base station locations

and 952 drones to provision them in order to reconnect the remaining 209 users of group 1 to

the network.

To summarise, 2 emergency service vehicles were used to reconnect 3 or 1.34% of the group

1 users. Next to these, 1 bus and 9 taxis with base stations mounted on them were used to

reconnect 12 or 5.36% of the group 1 users. Finally, 952 drones provisioned another 153 locations

6.3 Results 108

Figure 6.6: The drone based base stations (purple) and their coverage (blue) for the users in

group 1. The white dot denotes the location of the used storage facility.

to cover the remaining 209 or 93.30% of the group 1 users. Since the amount of available drones

is high enough, 100% of the group 1 users is covered after this phase.

6.3.2 Results for the Users in Group 2

The final step of this mixture scenario is to cover as much of the users of group 2 as possible.

To do so, all base stations that are present at the festival site (zone 2), no matter on which type

of vehicle they are mounted, are used. The locations and the coverage of these remaining base

stations can be found in figure 6.7.

In this figure it can be seen that almost the entire zone is covered by the remaining base

stations. However, not all users of group 2 are covered which gives away that the capacity of

all base stations was completely used. Using the 39 base stations that are within reach of the

users in group 2, 837 additional users were reconnected to the network. Of the 50000 users in

this group, 49163 users stayed without a connection to the network which is 98% of the group

2 users.

6.4 Conclusion 109

Figure 6.7: The locations of the base stations (purple) and their coverage (blue) used to cover

the users in group 2.

6.4 Conclusion

In this chapter a real life scenario is elaborated. The chosen scenario is the city of Ghent

during De Gentse Feesten, a 10 day festival with 100000 daily visitors. For this scenario, a

fictive disaster takes place during this event resulting in city wide connectivity loss. In order

to reconnect the people in the city and the people at the festival to the network drones, public

transport vehicles and emergency service vehicles equipped with base stations were used in a

combined way.

From the results in section 6.3 it can be concluded that although all users in the city were

reconnected, 98% of the users at the festival remained disconnected. To achieve these results

the algorithm determined that there were 294 base station locations provided by 14 emergency

service vehicles, 17 buses, 110 taxis and 952 drones. Of these locations, 114 were not in reach

of any users rendering them useless and resulting in 180 useful locations.

To cover the remaining 98% of the users at the festival, extra base stations will need to be

deployed. Since the amount and the location of public transport and emergency service vehicles

is fixed, the only way to do so is by utilizing more drones.

According to the algorithm and based on the parameter values in table 6.1, a single base

station can support around 13.6 users on average. In order to cover the remaining 98% or

6.4 Conclusion 110

49163 users at the festival, around 362 extra, well placed base stations are necessary. The base

stations need to be placed in such a way that they can cover around 13.6 users and thus that

there maximal capacity is used.

The facility storing the drones is situated centrally in the area and fairly close to the festival

site. From the results of the algorithm it is known that on average 6.22 drones are necessary to

cover one location during the intervention time of 4 hours. This means that in order to cover

the remaining uncovered users and thus to provision 362 extra base station locations, 2252 extra

drones of type 2 need to be available.

The overall conclusion in this chapter is that the public transport and emergency service

vehicles can alleviate some of the pressure on the drone scenario by connecting a part of the users.

In this case 5% of the locations necessary to cover all users could be provisioned by emergency

services and public transport vehicles. However, their locations cannot be chosen beforehand as

can be done with drones which often results in them being out of reach of all users. Because of

this disadvantage, the base stations provided by public transport and emergency service vehicles

can not be used to there full extent.

In order to cover the users in the city and at the event based on the parameter values in

table 6.1, around 3204 drones are necessary to provision 515 locations on top of the locations

provided by the other types of vehicles. Knowing that a drone of type 2 is sold for around 2000

dollars [54] which is 1755 euros, this means that an investment is needed of around 5.6 million

euros in order to acquire the necessary drones. No maintenance, installation of the base stations

or creation of the underlying system is taken into account in this price.

CONCLUSION AND FUTURE WORK 111

Chapter 7

Conclusion and Future Work

This master’s dissertation investigates the creation of emergency ad hoc networks to provide a

solution when the normal means of connecting to the network are compromised by a certain

event. In the past few years, several examples of these events occurred. For example, the

Pukkelpop disaster of 2011 in Hasselt, Belgium or the terrorist attacks of 2016 in Brussels’

Airport, Belgium. When both these events occurred, all usually available infrastructure in the

neighbourhood of the event stopped working. An emergency ad hoc network could have provided

the necessary connectivity to communicate with the outside world again making resolving the

disaster a lot easier.

An important factor in this idea is that the place where the network needs to be deployed is

not known in advance. To deal with this, placing the necessary base stations needs to happen

in a flexible way. The most desirable scenario is that these base stations are mobile and can get

to their predetermined position by themselves, setting up an entire network with minimal effort

when needed.

Three scenarios to create these mobile base stations are introduced. The first scenario uses

unmanned aerial vehicles or drones to connect users to the network. In this scenario, the base

stations are mounted on a drone and these drones are then stored in a facility. This facility

could be a building in a city centre or a big truck that drives to the disaster site to limit the

flight of the drones. In order to provision a certain location in the area, a drone will alternate

with a new one from the facility when its battery dies.

The second scenario uses emergency service vehicles on which a base station is mounted.

When a disastrous event occurs, a lot of emergency service vehicles will be dispatched to the

specific area. This means that equipping these vehicles with base stations might reinstate the

connectivity for the users in the area. However, a downside of this scenario is that the amount

of vehicles in the area is hard to predict and that their location is fixed which might not be

CONCLUSION AND FUTURE WORK 112

optimal for users to connect with the base station.

The third scenario uses base stations mounted on public transport vehicles. Public transport

vehicles like taxis and buses are very common in urban areas. The chance that these vehicles

are present in the environment of an urban disaster is rather large which makes them suitable

to reconnect users in the region to the network. The same downsides as with the emergency

services are present, it is hard to predict how many and where these vehicles will be.

The aforementioned base stations are LTE femtocells. LTE femtocells provide the flexibility

and capabilities that are necessary in an emergency ad hoc network. They are optimised for

slow moving users and the frequency bands LTE uses can handle a lot of users at a time.

In order to simulate and investigate the scenarios a scheduling tool was created. Based on

input parameters depending on the specific scenario, the scheduling tool proposes a network to

cover as many users as possible in a predefined area. It does this by going over all the users and

determining preferable base station positions to cover these users. The tool then determines

which locations are feasible resulting in a network with the defined restrictions.

Using the output of the scheduling tool, a sensitivity analysis was performed. Each scenario

was evaluated and per scenario conclusions were drawn based on their feasibility and necessary

properties.

The results concerning the drone scenario brought to light that almost all users could be

covered using drones. A limiting factor in this scenario however is the cost to acquire and

maintain the fleet of drones. Based on the amount of funding available this might be a deal-

breaker. The scenario needed 1100 type 1 drones or 400 type 2 drones in order to cover all

224 users in the city of Ghent during 1 hour. This amount rose linearly with the intervention

duration so the longer the duration the more drones were necessary. Another important factor

that this analysis discovered is the minimal height of a drone. When the minimal height is small

(for example around 4 meters) the drones are not able to cover a large area. Since an urban

area is considered, the buildings surrounding the drone block the signal due to a high path loss

for the users in the area behind the buildings. When the drone is situated higher (for example

around 50 meters) there are more users in line of sight of the drone which enables these users

to connect to the base station attached to the drone. This means that the higher the drones

are situated on average, the fewer base station locations are necessary in the network. However

when the average height becomes too big, the signal is weakened by the extra distance implied

by this height which is an undesired effect. The most suitable height depends from location to

location. If the surrounding buildings are low, a lower height can result in the same amount

of users that are in line of sight of the base station and the signal is not weakened due to the

extra distance. However, when the buildings are high, larger heights should be used. It is thus

CONCLUSION AND FUTURE WORK 113

preferable to analyse the situation for each location and choose the appropriate height.

The emergency services scenario was analysed based on a smaller area and a lot more users

than the other two scenarios. This was done because of the fact that emergency service vehicles

flock together instead of being spread out over an area of 4 km2. The amount of emergency

service vehicles in the area proved to be the most important factor to reconnect the users.

Since this scenario assumes that a lot of users are assembled together in a small area, the total

capacity of the base stations is used on average. No matter where the vehicle is placed in the

area, a lot of users will surround it and connect to it if necessary. Other important factors in

this scenario are the range of the disaster and the reliability of the vehicles. The range of the

disasters determines how far the vehicles are spread around the disaster. The further they are

spread out the more users they could reconnect given that enough capacity is available in the

base stations. The reliability of the vehicles determines how long a vehicle and its base station

stay at the scene to provide coverage. If a vehicle is not reliable, the base station is not useful

for the users. In the simulations for this scenario, 40 vehicles with a reliability of 40% situated

in a range of 300 meters around the disaster were only able to cover 2% of the 50000 present

users. Based on these results and the three aforementioned factors it could be concluded that an

unrealistic amount of vehicles for the area would be necessary to cover all users. This scenario

can thus not be used on its own.

In the scenario using public transport vehicles the base stations are spread out over different

bus or taxi stops that have different sizes. The main conclusion from this scenario is that it is

more interesting to have a lot of small stops containing a few base stations than only two or

three stops containing a lot of base stations. What is also important for this scenario is that

there are enough of taxi and buses in the area to ensure continuous presence of a base station at

a stop. Otherwise the stop would not be able to provide coverage to the present users making

it useless. Based on the realistic amounts of stops and vehicles in the observed area in Ghent it

could be seen that all the stops in the area where not able to get more than 6% user coverage.

This scenario is thus also not sufficient on its own.

Since the emergency services and public transport scenarios are not feasible on their own and

the drone scenario is rather expensive, the combination of these three scenarios was investigated.

The idea of the combination of these scenarios is to use the drone scenario to cover all user while

covering as much users as possible with cheaper infrastructure like buses, taxis and emergency

service vehicles. This mixture of scenarios was applied to a real life use case namely, De Gentse

Feesten 2015 which is a festival in Ghent. Based on this use case and the parameters found in

the three separate scenarios it was concluded that the emergency service and public transport

vehicles are indeed able to relieve some of the pressure (around 5% of the locations) on the drone

CONCLUSION AND FUTURE WORK 114

scenario. However, since the locations of these types of vehicles is fixed, their placement is often

not optimal rendering them useless. As a result there were still al lot of drones necessary to

cover all users making the entire solution rather expensive.

Based on the analysis results of the proposed scenarios and the results of the real life case

it can be concluded that the scenario using drones is the most promising one. This scenario is

able to cover a user in almost every place due to the high mobility of these vehicles. A downside

of this scenario however is that they are based on extra infrastructure (the drones) instead of

reusing existing infrastructure like public transport and emergency services vehicles. The public

transport and emergency service vehicles are able to cover only a small part of the present users.

Although they are a lot cheaper since they do not require extra infrastructure, they are not

efficient enough to cover big crowds.

In order to create a fully working system the connection from the different base stations to

the internet backbone should be investigated further. This connection is still a bottleneck of

the idea. In the proposed solutions for this connection, speeds of around 10 Mbps in total are

reached which is rather low when trying to connect for example a thousand users.

Specifically for the drone scenario, it might be interesting to investigate the influence of

different types of weather on the performance of the system. Next, it might also be interesting

to introduce some additional means of transporting the base stations to their predetermined

locations. Other options could be the use of hot air balloons, robots or cars of private users.

BIBLIOGRAPHY 115

Bibliography

[1] lker Bekmezci, Ozgur Koray Sahingoz, and amil Temel. Flying Ad-Hoc Networks

(FANETs): A survey. Ad Hoc Networks, 11(3):1254–1270, 2013.

[2] Yixin Gu, Mi Zhou, Shengli Fu, and Yan Wan. Airborne WiFi networks through directional

antennae: An experimental study. Wireless Communications and Networking Conference

(WCNC), 2015 IEEE, pages 1314–1319, 2015.

[3] Wifi modes of operation (802.11 or wi-fi). http://ccm.net/contents/

804-wifi-modes-of-operation-802-11-or-wi-fi. Accessed: 05-05-2016.

[4] Introduction to perspective. http://www.woodenpalette.com/?page_id=918. Accessed:

18-05-2016.

[5] Map ghent festivities. https://gentsefeesten-2015.stad.gent/en/practical/

map-ghent-festivities. Accessed: 10-05-2016.

[6] Margot Deruyck, Dieter De Vulder, Wout Joseph, and Luc Martens. Modelling the power

consumption in femtocell networks. 2012 IEEE Wireless Communications and Networking

Conference Workshops (WCNCW), (2):30–35, 2012.

[7] Margot Deruyck, Emmeric Tanghe, Wout Joseph, and Luc Martens. Modelling and opti-

mization of power consumption in wireless access networks. Computer Communications,

34(17):2036–2046, 2011.

[8] Sanket Nesargi and Ravi Prakash. MANETconf: Configuration of hosts in a mobile ad hoc

network. Proceedings - IEEE INFOCOM, 2:1059–1068, 2002.

[9] Silvia Giordano. Mobile Ad-Hoc Networks. 2000.

[10] D.a. Maltz, J. Broch, and D.B. Johnson. Quantitative lessons from a full-scale multi-hop

wireless ad hoc\nnetwork testbed. 2000 IEEE Wireless Communications and Networking

Conference. Conference Record (Cat. No.00TH8540), 3, 2000.

BIBLIOGRAPHY 116

[11] Ricardo De Oliveira Schmidt and M. A S Trentin. MANETs routing protocols evaluation

in a scenario with high mobility: MANET routing protocols performance and behavior.

NOMS 2008 - IEEE/IFIP Network Operations and Management Symposium: Pervasive

Management for Ubiquitous Networks and Services, pages 883–886, 2008.

[12] Alex Hinds, Michael Ngulube, Shaoying Zhu, and Hussain Al-Aqrabi. A Review of Routing

Protocols for Mobile Ad-Hoc NETworks (MANET). International Journal of Information

and Education Technology, 3(1):1–5, 2013.

[13] David Lundberg and Henrik Lundgren. Ad hoc Protocol Evaluation and Experiences of

Real World Ad Hoc Networking. 2002.

[14] The google loon project. http://www.google.com/loon/. Accessed: 19-04-2016.

[15] Akrama Al-Hourani, Sithamparanathan Kandeepan, and Simon Lardner. Optimal LAP

altitude for maximum coverage. IEEE Wireless Communications Letters, 3(6):569–572,

2014.

[16] Seng W. Loke. The Internet of Flying-Things: Opportunities and Challenges with Airborne

Fog Computing and Mobile Cloud in the Clouds. X(X):1–5, 2015.

[17] Mahdi Asadpour, Bertold Van Den Bergh, Domenico Giustiniano, Karin Anna Hummel,

and Sofie Pollin. Micro Aerial Vehicle Networks : An Experimental Analysis of Challenges

and Opportunities. (July):141–149, 2014.

[18] Tewfik Doumi, Mike F. Dolan, Said Tatesh, Alessio Casati, George Tsirtsis, Kiran An-

chan, and Dino Flore. LTE for public safety networks. IEEE Communications Magazine,

51(2):106–112, 2013.

[19] Apostolis K. Salkintzis. Evolving public safety communication systems by integrating

WLAN and TETRA networks. IEEE Communications Magazine, 44(1):38–46, 2006.

[20] International Telecommunications Union. Radiocommunication objectives and require-

ments for public protection and disaster relief. ITU-R Report M.2033, 2003.

[21] Arvind Merwaday. UAV Assisted Heterogeneous Networks for Public Safety Communica-

tions. pages 329–334, 2015.

[22] M. Portmann and A. Pirzada. Wireless Mesh Networks for Public Safety and Crisis Man-

agement Applications. IEEE Internet Computing, 12(1):18–25, 2008.

BIBLIOGRAPHY 117

[23] Elias Yaacoub and Osama Kubbar. Energy-efficient Device-to-Device communications in

LTE public safety networks. 2012 IEEE Globecom Workshops, GC Wkshps 2012, pages

391–395, 2012.

[24] Bow Nan Cheng, Randy Charland, Paul Christensen, Leonid Veytser, and James Wheeler.

Evaluation of a multihop airborne ip backbone with heterogeneous radio technologies. IEEE

Transactions on Mobile Computing, 13(2):299–310, 2014.

[25] Bow Nan Cheng, Andrea Coyle, Stephen McGarry, Igor Pedan, Leonid Veytser, and James

Wheeler. Characterizing routing with radio-to-router information in a heterogeneous air-

borne network. IEEE Transactions on Wireless Communications, 12(8):4183–4195, 2013.

[26] Alessio Botta and Antonio Pescape. On the performance of new generation satellite broad-

band internet services. IEEE Communications Magazine, 52(6):202–209, 2014.

[27] Margot Deruyck, Emmeric Tanghe, Wout Joseph, and Luc Martens. Modelling and opti-

mization of power consumption in wireless access networks. Computer Communications,

34(17):2036–2046, 2011.

[28] Margot Deruyck, Wout Joseph, Emmeric Tanghe, and Luc Martens. Reducing the power

consumption in LTE-Advanced wireless access networks by a capacity based deployment

tool. Radio Science, 49(9):777–787, 2014.

[29] Margot Deruyck, Dieter De Vulder, Wout Joseph, and Luc Martens. Modelling the power

consumption in femtocell networks. 2012 IEEE Wireless Communications and Networking

Conference Workshops (WCNCW), (2):30–35, 2012.

[30] Aleksandar Neskovic, Natasa Neskovic, and George Paunovic. Modern Approaches in Mod-

eling of Mobile Radio Systems Propagation Environment. IEEE Communications Surveys,

pages 2–12, 2000.

[31] Hemant Kumar Sharma. Enhanced Cost231 W.I. Propagation Model in Wireless Network.

International Journal of Computer Applications, 19(6):36–42, 2011.

[32] Leonard Piazzi and Henry L. Bertoni. Achievable accuracy of site-specific path-loss predic-

tions in residential environments. IEEE Transactions on Vehicular Technology, 48(3):922–

930, 1999.

[33] Sagar Patel, Ved Vyas Dwivedi, and Y P Kosta. A Parametric Characterization and Com-

parative Study of Okumura and Hata Propagation-loss- prediction Models for Wireless

Environment. 2(4):453–462, 2010.

BIBLIOGRAPHY 118

[34] K. Low. Comparison of urban propagation models with CW-measurements. [1992 Pro-

ceedings] Vehicular Technology Society 42nd VTS Conference - Frontiers of Technology,

(2):936–942, 1992.

[35] Theodore Reed, Joseph Geis, and Sven Dietrich. SkyNET : a 3G-enabled mobile attack

drone and stealth botmaster Approach Attack Framework. Proceedings of the 5th USENIX

conference on Offensive technologies, (WOOT’11):4–4, 2011.

[36] Joao Valente, David Sanz, Antonio Barrientos, Jaime Del Cerro, Angela Ribeiro, and

Claudio Rossi. An Air-Ground Wireless Sensor Network for Crop Monitoring. Sensors,

11(12):6088–6108, 2011.

[37] H. T. Kung, Chit-Kwan Lin, Tsung-Han Lin, Stephen J. Tarsa, and Dario Vlah. Mea-

suring diversity on a low-altitude UAV in a ground-to-air wireless 802.11 mesh network.

GLOBECOM Workshops (GC Wkshps), 2010 IEEE, pages 1799–1804, 2010.

[38] Signals Research Group. The LTE Standard. 2014.

[39] Lte encyclopedia. https://sites.google.com/site/lteencyclopedia/home. Accessed:

10-04-2016.

[40] Giuseppe Araniti, Claudia Campolo, Massimo Condoluci, Antonio Iera, and Antonella Moli-

naro. LTE for Vehicular Networking : A Survey. pages 148–157, 2013.

[41] Margot Deruyck and Willem Vereecken. Reducing the power consumption in wireless ac-

cess networks: Overview and recommendations. Progress In Electromagnetics Research,

132(October):255–274, 2012.

[42] Vikram Chandrasekhar, Jeffrey G. Andrews, and Alan Gatherer. Femtocell networks: A

survey. IEEE Communications Magazine, 46(9):59–67, 2008.

[43] Mehdi Bennis, Meryem Simsek, Andreas Czylwik, Walid Saad, Stefan Valentin, and Mer-

ouane Debbah. When cellular meets WiFi in wireless small cell networks. IEEE Commu-

nications Magazine, 51(6):44–50, 2013.

[44] Ieee 802.11 wlan standards. http://standards.ieee.org/about/get/802/802.11.html.

Accessed: 04-05-2016.

[45] What is wifi and how does it work? http://ccm.net/faq/

298-what-is-wifi-and-how-does-it-work. Accessed: 05-05-2016.

[46] Discover wifi. https://www.wi-fi.org/discover-wi-fi. Accessed: 10-04-2016.

BIBLIOGRAPHY 119

[47] Margot Deruyck, Wout Joseph, Emmeric Tanghe, and Luc Martens. Reducing the power

consumption in LTE-Advanced wireless access networks by a capacity based deployment

tool. Radio Science, 49(9):777–787, 2014.

[48] W. Joseph, S. Aerts, M. Vandenbossche, A. Thielens, L. Martens. Drone based measurement

system for radiofrequency exposure assessment. Bioelectromagnetics, 2016.

[49] Microdrones md4-1000: Robust and powerful uav model. https://www.microdrones.com/

en/products/md4-1000/technical-data/. Accessed: 10-03-2016.

[50] Eindcijfers gentse feesten 2015. https://stad.gent/sites/default/files/article/

documents/GF2015%20earlybird%20maandag%2027%20juli%20eindcijfers.pdf. Ac-

cessed: 08-03-2016.

[51] Belangrijkste tram- en buslijnen in het centrum van gent. http://gent.delijn.be/files/

attachments/.3148/gent_abstract_bus_maart2016.pdf. Accessed: 24-03-2016.

[52] Taxistandplaatsen in gent. https://mobiliteit.stad.gent/met-de-taxi/

taxistandplaatsen-gent. Accessed: 24-03-2016.

[53] Overzicht taxi- en vvb-vergunningen in belgie in 2015. http://www.gtl-taxi.be/8_0_0_

0_NL_Nieuws_32290_1. Accessed: 24-03-2016.

[54] Microdrones md4-1000 specifications. http://drones.specout.com/l/109/

Microdrones-MD4-1000. Accessed: 11-05-2016.