95
Institutionen för systemteknik Department of Electrical Engineering Examensarbete WCDMA Cell Load Control in a High-speed Train Scenario Development of Proactive Load Control Strategies Examensarbete utfört i Communication Systems vid Tekniska högskolan vid Linköpings universitet av Raoul Joshi and Per Sundström LiTH-ISY-EX--12/4614--SE Linköping 2012 Department of Electrical Engineering Linköpings tekniska högskola Linköpings universitet Linköpings universitet SE-581 83 Linköping, Sweden 581 83 Linköping

Institutionen för systemteknik - DiVA portalliu.diva-portal.org/smash/get/diva2:560891/FULLTEXT01.pdf · Institutionen för systemteknik ... RAN Radio Access Network RBS Radio Base

Embed Size (px)

Citation preview

Page 1: Institutionen för systemteknik - DiVA portalliu.diva-portal.org/smash/get/diva2:560891/FULLTEXT01.pdf · Institutionen för systemteknik ... RAN Radio Access Network RBS Radio Base

Institutionen för systemteknikDepartment of Electrical Engineering

Examensarbete

WCDMA Cell Load Control in a High-speed TrainScenario

Development of Proactive Load Control Strategies

Examensarbete utfört i Communication Systemsvid Tekniska högskolan vid Linköpings universitet

av

Raoul Joshi and Per Sundström

LiTH-ISY-EX--12/4614--SE

Linköping 2012

Department of Electrical Engineering Linköpings tekniska högskolaLinköpings universitet Linköpings universitetSE-581 83 Linköping, Sweden 581 83 Linköping

Page 2: Institutionen för systemteknik - DiVA portalliu.diva-portal.org/smash/get/diva2:560891/FULLTEXT01.pdf · Institutionen för systemteknik ... RAN Radio Access Network RBS Radio Base
Page 3: Institutionen för systemteknik - DiVA portalliu.diva-portal.org/smash/get/diva2:560891/FULLTEXT01.pdf · Institutionen för systemteknik ... RAN Radio Access Network RBS Radio Base

WCDMA Cell Load Control in a High-speed TrainScenario

Development of Proactive Load Control Strategies

Examensarbete utfört i Communication Systemsvid Tekniska högskolan vid Linköpings universitet

av

Raoul Joshi and Per Sundström

LiTH-ISY-EX--12/4614--SE

Handledare: Mirsad Čirkićisy, Linköping University

Raimundas GaigalasEricsson AB

Examinator: Danyo Danevisy, Linköping University

Linköping, 8 juni 2012

Page 4: Institutionen för systemteknik - DiVA portalliu.diva-portal.org/smash/get/diva2:560891/FULLTEXT01.pdf · Institutionen för systemteknik ... RAN Radio Access Network RBS Radio Base
Page 5: Institutionen för systemteknik - DiVA portalliu.diva-portal.org/smash/get/diva2:560891/FULLTEXT01.pdf · Institutionen för systemteknik ... RAN Radio Access Network RBS Radio Base

Avdelning, InstitutionDivision, Department

Division of Communication SystemsDepartment of Electrical EngineeringSE-581 83 Linköping

DatumDate

2012-06-08

SpråkLanguage

� Svenska/Swedish

� Engelska/English

RapporttypReport category

� Licentiatavhandling

� Examensarbete

� C-uppsats

� D-uppsats

� Övrig rapport

URL för elektronisk version

http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-84635

ISBN

ISRN

LiTH-ISY-EX--12/4614--SE

Serietitel och serienummerTitle of series, numbering

ISSN

TitelTitle

Belastningsreglering av WCDMA celler i ett tågscenario

WCDMA Cell Load Control in a High-speed Train Scenario

FörfattareAuthor

Raoul Joshi and Per Sundström

SammanfattningAbstract

Load control design is one of the major cornerstones of radio resource management in today’sUMTS networks. A WCDMA cell’s ability to utilize available spectrum efficiently, maintainsystem stability and deliver minimum quality of service (QoS) requirements to in-cell usersbuilds on the algorithms employed to manage the load. Admission control (AC) and conges-tion control (CC) are the two foremost techniques used for regulating the load, and differingenvironments will place varying requirements on the AC and CC schemes to optimize theQoS for the entire radio network. This thesis studies a real-life situation where cells are putunder strenuous conditions, investigates the degrading effects a high-speed train has on thecell’s ability to maintain acceptable levels of QoS, and proposes methods for mitigating theseeffects.

The scenario is studied with regard to voice traffic where the limiting radio resource is down-link power. CC schemes that take levels of fairness into account between on-board train usersand outdoor users are proposed and evaluated through simulation. Methods to anticipato-rily adapt radio resource management (RRM) in a cell to prepare for a train is proposed andevaluated through simulation. A method to detect a high-speed train in a cell, and the userson it, is outlined and motivated but not simulated.

Simulation results are promising but not conclusive. The suggested CC schemes show asurprising tendency towards an increase in congestion avoidance performance. ProactiveRRM shows a significant increase in QoS for on-board users. No negative effects to users inthe macro environment is noticed, with regard to the studied metrics.

NyckelordKeywords WCDMA, High-speed Train, Congestion Control, Admission Control, Load Control, Cell

Capacity, Cell Resource Allocation, Train Detection, Quality of Service, Dropping Fairness

Page 6: Institutionen för systemteknik - DiVA portalliu.diva-portal.org/smash/get/diva2:560891/FULLTEXT01.pdf · Institutionen för systemteknik ... RAN Radio Access Network RBS Radio Base
Page 7: Institutionen för systemteknik - DiVA portalliu.diva-portal.org/smash/get/diva2:560891/FULLTEXT01.pdf · Institutionen för systemteknik ... RAN Radio Access Network RBS Radio Base

Abstract

Load control design is one of the major cornerstones of radio resource manage-ment in today’s UMTS networks. A WCDMA cell’s ability to utilize availablespectrum efficiently, maintain system stability and deliver minimum quality ofservice (QoS) requirements to in-cell users builds on the algorithms employed tomanage the load. Admission control (AC) and congestion control (CC) are the twoforemost techniques used for regulating the load, and differing environments willplace varying requirements on the AC and CC schemes to optimize the QoS forthe entire radio network. This thesis studies a real-life situation where cells areput under strenuous conditions, investigates the degrading effects a high-speedtrain has on the cell’s ability to maintain acceptable levels of QoS, and proposesmethods for mitigating these effects.

The scenario is studied with regard to voice traffic where the limiting radio re-source is downlink power. CC schemes that take levels of fairness into accountbetween on-board train users and outdoor users are proposed and evaluatedthrough simulation. Methods to anticipatorily adapt radio resource management(RRM) in a cell to prepare for a train is proposed and evaluated through simu-lation. A method to detect a high-speed train in a cell, and the users on it, isoutlined and motivated but not simulated.

Simulation results are promising but not conclusive. The suggested CC schemesshow a surprising tendency towards an increase in congestion avoidance perfor-mance. Proactive RRM shows a significant increase in QoS for on-board users.No negative effects to users in the macro environment is noticed, with regard tothe studied metrics.

iii

Page 8: Institutionen för systemteknik - DiVA portalliu.diva-portal.org/smash/get/diva2:560891/FULLTEXT01.pdf · Institutionen för systemteknik ... RAN Radio Access Network RBS Radio Base
Page 9: Institutionen för systemteknik - DiVA portalliu.diva-portal.org/smash/get/diva2:560891/FULLTEXT01.pdf · Institutionen för systemteknik ... RAN Radio Access Network RBS Radio Base

Acknowledgments

The time spent at WCDMA Systems at Ericsson during the first half of 2012 has,for the both of us, been a fantastic end to our studies in electrical engineering.Although we would like to acknowledge everyone who in one way or another con-tributed to our stay, whether directly related to our work, playing floorball withus on Mondays or by simply being a friendly face on rainy days, the constraintsof this page restricts us from listing them all.

The simulator team, together with whom we have worked, consisting of MagnusPersson, Erik Geijer Lundin, Jennifer Chen, Karin Lagergren, Ed Kirwan, andDejan Miljkovic, deserves special recognition. We hope we have left behind ben-eficial contributions to your area of work.

We would also like to thank Benny Lennartson for the collaboration and insightsregarding intellectual property processes and law. Moreover, this particular taskas thesis work would not have been possible without Stephen Craig, Mikael Russ-berg, and Maria Gabriela Landazuri Saenz.

Special thanks are also warranted to our university examiner and supervisor,Danyo Danev and Mirsad Čirkić, for indulging the special circumstances thatthis thesis work has entailed.

In particular, we are sincerely indebted to our supervisor at Ericsson, RaimundasGaigalas, for the countless number of hours spent in discussions with us, guidingus, listening to us, and reflecting on topics together with us.

Above all, we would like to express our deepest gratitude to Rajender and RenuJoshi for the unconditional support provided to us outside of all thesis-relatedwork.

Thank you.

Linköping, June 2012Raoul Joshi och Per Sundström

v

Page 10: Institutionen för systemteknik - DiVA portalliu.diva-portal.org/smash/get/diva2:560891/FULLTEXT01.pdf · Institutionen för systemteknik ... RAN Radio Access Network RBS Radio Base
Page 11: Institutionen för systemteknik - DiVA portalliu.diva-portal.org/smash/get/diva2:560891/FULLTEXT01.pdf · Institutionen för systemteknik ... RAN Radio Access Network RBS Radio Base

Contents

Notation xi

1 Introduction 11.1 Background . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11.2 Purpose . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21.3 Problem Description . . . . . . . . . . . . . . . . . . . . . . . . . . 21.4 Thesis Outline . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 31.5 Contribution . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3

I Theoretical Background and Simulation Modelling

2 Background and Related Works 72.1 High-speed Trains in Radio Environments . . . . . . . . . . . . . . 7

2.1.1 Service Maintenance . . . . . . . . . . . . . . . . . . . . . . 72.1.2 Propagation Phenomena . . . . . . . . . . . . . . . . . . . . 82.1.3 Radio Access Networks . . . . . . . . . . . . . . . . . . . . . 10

2.2 Trains in UMTS Networks . . . . . . . . . . . . . . . . . . . . . . . 112.2.1 Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 122.2.2 Radio Resource Management . . . . . . . . . . . . . . . . . 12

2.3 QoS for Mobile Subscribers . . . . . . . . . . . . . . . . . . . . . . . 172.3.1 QoS Classes . . . . . . . . . . . . . . . . . . . . . . . . . . . 172.3.2 Radio Link Bearers . . . . . . . . . . . . . . . . . . . . . . . 17

3 Hypotheses and Limitations 193.1 Hypotheses . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 193.2 Limitations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20

4 Network Modelling 234.1 Table of Notations . . . . . . . . . . . . . . . . . . . . . . . . . . . . 234.2 Scenario Architecture . . . . . . . . . . . . . . . . . . . . . . . . . . 234.3 Network Environment . . . . . . . . . . . . . . . . . . . . . . . . . 254.4 Train Modelling . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 25

vii

Page 12: Institutionen för systemteknik - DiVA portalliu.diva-portal.org/smash/get/diva2:560891/FULLTEXT01.pdf · Institutionen för systemteknik ... RAN Radio Access Network RBS Radio Base

viii CONTENTS

5 Network Capacity Determination 275.1 Method . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 275.2 Simulation Setup . . . . . . . . . . . . . . . . . . . . . . . . . . . . 285.3 Evaluation Metrics . . . . . . . . . . . . . . . . . . . . . . . . . . . . 285.4 Simulation Results . . . . . . . . . . . . . . . . . . . . . . . . . . . . 29

6 Impacts of a Train on a Congested Cell 316.1 Method . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 316.2 Simulation Setup . . . . . . . . . . . . . . . . . . . . . . . . . . . . 326.3 Evaluation Metrics . . . . . . . . . . . . . . . . . . . . . . . . . . . . 326.4 Simulation Results . . . . . . . . . . . . . . . . . . . . . . . . . . . . 33

II Studies

7 Congestion Control in Train Scenarios 397.1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 397.2 Description . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 407.3 Simulation Setup . . . . . . . . . . . . . . . . . . . . . . . . . . . . 437.4 Simulation Results . . . . . . . . . . . . . . . . . . . . . . . . . . . . 437.5 Conclusions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 44

8 Proactive Admission Control for an Inbound Train 458.1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 458.2 Description . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 468.3 Simulation Setup . . . . . . . . . . . . . . . . . . . . . . . . . . . . 498.4 Simulation Results . . . . . . . . . . . . . . . . . . . . . . . . . . . . 508.5 Conclusions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 51

9 Detection of a High-speed Train 539.1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 539.2 Characteristic Velocity Profile . . . . . . . . . . . . . . . . . . . . . 53

III Final Remarks and Supplementary Material

10 Final Remarks 5710.1 Conclusion . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5710.2 Discussion and Future Work . . . . . . . . . . . . . . . . . . . . . . 58

A Appendix 59A.1 Signal Propagation and Networks . . . . . . . . . . . . . . . . . . . 59

A.1.1 Signal Propagation . . . . . . . . . . . . . . . . . . . . . . . 59A.1.2 Radio links . . . . . . . . . . . . . . . . . . . . . . . . . . . . 60A.1.3 Radio Networks . . . . . . . . . . . . . . . . . . . . . . . . . 60A.1.4 WCDMA . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 63A.1.5 UMTS Networks . . . . . . . . . . . . . . . . . . . . . . . . . 65

Page 13: Institutionen för systemteknik - DiVA portalliu.diva-portal.org/smash/get/diva2:560891/FULLTEXT01.pdf · Institutionen för systemteknik ... RAN Radio Access Network RBS Radio Base

CONTENTS ix

A.1.6 Quality of Service . . . . . . . . . . . . . . . . . . . . . . . . 66A.2 Capacity Determination Data . . . . . . . . . . . . . . . . . . . . . 67

Bibliography 73

Page 14: Institutionen för systemteknik - DiVA portalliu.diva-portal.org/smash/get/diva2:560891/FULLTEXT01.pdf · Institutionen för systemteknik ... RAN Radio Access Network RBS Radio Base
Page 15: Institutionen för systemteknik - DiVA portalliu.diva-portal.org/smash/get/diva2:560891/FULLTEXT01.pdf · Institutionen för systemteknik ... RAN Radio Access Network RBS Radio Base

xi

Page 16: Institutionen för systemteknik - DiVA portalliu.diva-portal.org/smash/get/diva2:560891/FULLTEXT01.pdf · Institutionen för systemteknik ... RAN Radio Access Network RBS Radio Base

xii Notation

Notation

Acronyms

Acronym Definition

3GPP 3rd Generation Partnership ProjectAC Admission Control

AMR Adaptive Multirate (speech codec)BLER Block Error Rate

DS-CDMA Direct-Spread Code Division Multiple AccessCC Congestion ControlCN Core NetworkCu USIM - ME interface

DCH Dedicated Channel (transport channel)DL Downlink

FDD Frequency Division DuplexFDMA Frequency Division Multiple Access

FER Frame Error RatioGGSN Gateway GPRS Support NodeGMSC Gateway MSCGPRS General Packet Radio SystemGSM Global System for Mobile CommunicationsHLR Home Location Register

HSDPA High-speed Downlink Packet AccessHSPA High Speed Packet Access

IP Internet ProtocolIS-95 cdmaOne (a 2nd system in Americas and Korea)ISDN Integrated Services Digital NetworkITU International Telecommunications UnionIu RNC - CN interface

Iub RBS - RNC interfaceIur RNC - RNC interfaceLC Load ControlME Mobile Equipment

MSC Mobile Switching CenterMT Mobile Terminal

Page 17: Institutionen för systemteknik - DiVA portalliu.diva-portal.org/smash/get/diva2:560891/FULLTEXT01.pdf · Institutionen för systemteknik ... RAN Radio Access Network RBS Radio Base

Notation xiii

Acronyms

Acronym Definition

NBAP Node B Application PartNode B see RBSOVSF Orthogonal Variable Spreading FactorPER Packed Encoding Rules

PLMN Public Land Mobile NetworkPSTN Public Switched Telephone NetworkQoS Quality of ServiceRAB Radio Access BearerRAN Radio Access NetworkRBS Radio Base StationRNC Radio Network ControllerRNS Radio Network Sub-systemRRC Radio Resource ControlRRM Radio Resource ManagementRSSI Received Signal Strength IndicatorSGSN Serving GPRS Support NodeSHO Soft HandoverSIR Signal-to-interference RatioSMS Short Message ServiceSNR Signal-to-noise RatioTDD Time Division Duplex

TDMA Time Division Multiple AccessTE Terminal Equipment

TLA Three-letter AcronymUE User EquipmentUL Uplink

UMTS Universal Mobile Telecommunication ServicesUSIM UMTS Subscriber Identity Module

UTRAN UMTS Terrestrial Radio Access NetworkUu ME - RBS interface

VoIP Voice over IPWCDMA Wideband Code Division Multiple Access

Page 18: Institutionen för systemteknik - DiVA portalliu.diva-portal.org/smash/get/diva2:560891/FULLTEXT01.pdf · Institutionen för systemteknik ... RAN Radio Access Network RBS Radio Base
Page 19: Institutionen för systemteknik - DiVA portalliu.diva-portal.org/smash/get/diva2:560891/FULLTEXT01.pdf · Institutionen för systemteknik ... RAN Radio Access Network RBS Radio Base

1Introduction

In this introductory section we present the purpose of this thesis, through a back-ground of the topic at hand, and the pertinent problem description.

1.1 Background

"Yes I’m on the train now. Somewhere between Norrköping and... hello? hello?"

Wideband code division multiple access (WCDMA) and high speed packet access(HSPA) are the mobile communication techniques behind today’s third genera-tion networks, and are deployed world-wide in a multitude of differing environ-ments. With the growing demand for mobile broadband services, the number ofusers steadily increases, resulting in higher performance demands on the RadioAccess Network (RAN), giving rise to a series of issues that need to be addressed.

A RAN can be characterized as dynamic on different levels. On the link level,multipath fading and shadowing properties vary instantaneously and substan-tially depending not only on the distance from the radio base station (RBS) andsurrounding landscape but also on user equipment (UE) orientation, velocity andcurrent weather conditions - resulting in dynamic radio linkage properties inboth uplink (UL) and downlink (DL). On the load level, users enter cells, exitcells, and switch between capacity-varying services seamlessly - resulting in dy-namic load levels for the RBS to manage using various strategies such as admis-sion control (AC) and congestion control (CC).

This thesis will delve into an extreme case of such a dynamic scenario. Considera bulk of mobile voice callers entering a cell at high speed, requiring access to themobile network simultaneously and soon thereafter exiting the cell. During this

1

Page 20: Institutionen för systemteknik - DiVA portalliu.diva-portal.org/smash/get/diva2:560891/FULLTEXT01.pdf · Institutionen för systemteknik ... RAN Radio Access Network RBS Radio Base

2 1 Introduction

time, the RAN must adequately admit users while not jeopardising overall net-work performance. The radio network controller (RNC) must co-ordinate hand-over requests from neighbouring cells, continue to serve existing in-cell users,and perform hand-over requests for active users exiting the cell.

Simultaneously, acceptable quality of service (QoS) must be maintained for asmany served users as possible through various prioritization and load controlschemes; however, this may not always be possible due to the inability of thesystem to prioritize amongst a bulk of approaching users and regulate load in-stantaneously.

These types of complex and dynamic environments put extensive demand on thenetwork’s radio resource management (RRM) where inadequate AC and CC canlead to dropped connections for all users and network collapse due to overload.

1.2 Purpose

The thesis work study is carried out at the WCDMA Systems Department atSwedish telecommunications company Ericsson AB in Stockholm. The goal isto develop and evaluate a feasible load control strategy for a multi-cell UMTSnetwork in a scenario where a large group of mobile users enters and exits a cellat high speed. The proposed strategy is to be developed, implemented, and eval-uated using a simulator made available by Ericsson AB.

1.3 Problem Description

The problem addressed in this thesis deals with a high-speed train carrying asizeable bulk of mobile users subscribed to an active speech service. The trainenters cells that are heavily loaded in terms of cell DL power to users in the cells;that is, there is no, or a shortage of, excess power to handle the incoming train.The sudden entrance of a train adds substantial interference to the network, andthe RNC may be unable to coordinate allocation of necessary resources in timefor satisfactory handover of all on-board users.

The above description breaks down into addressing the issue of admission controland congestion control in the network. They are used to regulate the load andwill, in this thesis, be referred to together as load control (LC).

Given the circumstances a train in a congested cell entails, LC schemes are nec-essary that take into account some level of fairness between on-board users andoutside users. From one vantage point, and with certain reservations, on-boardusers became part of a cell’s load the very instant they engaged in their phoneservice regardless of the distance from the actual cell since the fixed track of arailway guaranteed passage through the cell in question.

From the above reasoning, if the approach of a train into a certain cell is knownin advance, the knowledge of the imminent load on the cell’s resources should

Page 21: Institutionen för systemteknik - DiVA portalliu.diva-portal.org/smash/get/diva2:560891/FULLTEXT01.pdf · Institutionen för systemteknik ... RAN Radio Access Network RBS Radio Base

1.4 Thesis Outline 3

be taken into account by the RRM algorithms, in order to have the required re-sources available when the train enters the cell. A natural inference is how todetect an actual train moving through a cell and the users on-board. How canthis information be signalled in the network as to prepare a cell further away?

1.4 Thesis Outline

In chapter 2, the background to high-speed trains in cellular networks is intro-duced together with insight into previous works that have been carried out withinthe field.

In chapter 3, the hypotheses and limitations to the study are presented, buildingon the background and related works. The hypotheses will form the basis for thepurpose of the simulations run and conclusions drawn.

In chapters 5 and 6, the simulation environment is presented and described, andthe capacity of the environment is determined in order to ensure a congested statebefore a train’s effects on a cell are examined. A train is thereafter run throughthe congested environment, and the effects recorded and analysed to determinewhether QoS and fairness metrics can be improved, and if so, by how much.

In chapter 7, congestion control dropping schemes are analysed, introducing met-rics for fairness between outside and on-board users and the impacts fairness hason the network utility. Dropping schemes that are algorithmically biased to sys-tematically single out certain types of users is in this thesis considered unfair.

Thereafter, in chapter 8, attempts are made to avoid cell congestion by reservingresources for an approaching train through the use of proactive admission con-trol. Trains carrying a certain number of users will be reported to cells further upthe cell network and capacity reservations will be performed. Reservation of suchresources warrants disabling of complex HO and AC mechanisms and train userscan be readily accepted into the cell. In the case of some train users still causingcell congestion, suggested fair dropping schemes from chapter 7 will kick in.

The chapter 9 will deal with the assumption in previous chapters that an oncom-ing train and its users are known in advance. Investigations into whether Dopplervelocity measurements of in-cell users can be used to detect a train in motion andthe users on-board through a network will take place.

The final chapter 10 will provide a comprehensive conclusion for the study in itsentirety together with a final discussion of these conclusions.

1.5 Contribution

The contribution of this thesis is a pragmatic and systematic end-to-end approachfor high-speed mass transit vehicles such as trains. The pragmatic approach en-tails no additional hardware solutions but merely optimizing performance based

Page 22: Institutionen för systemteknik - DiVA portalliu.diva-portal.org/smash/get/diva2:560891/FULLTEXT01.pdf · Institutionen för systemteknik ... RAN Radio Access Network RBS Radio Base

4 1 Introduction

on current technology and signalling algorithms. The end-to-end approach en-tails that this thesis provides insights from initial train detection to the subse-quent actions, and restoration to default conditions following the train’s depar-ture.

An additional novel contribution in this thesis is the introduction of fairness be-tween user types in congestion schemes and the balancing of such fairness againstnetwork utility.

Page 23: Institutionen för systemteknik - DiVA portalliu.diva-portal.org/smash/get/diva2:560891/FULLTEXT01.pdf · Institutionen för systemteknik ... RAN Radio Access Network RBS Radio Base

Part I

Theoretical Background andSimulation Modelling

Page 24: Institutionen för systemteknik - DiVA portalliu.diva-portal.org/smash/get/diva2:560891/FULLTEXT01.pdf · Institutionen för systemteknik ... RAN Radio Access Network RBS Radio Base
Page 25: Institutionen för systemteknik - DiVA portalliu.diva-portal.org/smash/get/diva2:560891/FULLTEXT01.pdf · Institutionen för systemteknik ... RAN Radio Access Network RBS Radio Base

2Background and Related Works

The aim of the background chapter is to provide the theoretical aspects of a high-speed train in a WCDMA radio environment. Special focus is put on the UMTSnetwork’s radio resource management, and how mobile devices are handled byit.

2.1 High-speed Trains in Radio Environments

Trains are interconnected series of vehicles that move along a fixed railway, car-rying passengers in train cars. Although they are commonly perceived to passthrough picturesque landscapes and urban milieus, a less thought of aspect ofthe environments that trains pass through are the dynamic radio environmentsthat subject mobile users on-board to demanding conditions when attempting tomaintain steady and satisfactory service levels.

2.1.1 Service Maintenance

High-speed travel, as defined by the European Union, states that:

The high-speed advanced-technology trains shall be designedin such a way as to guarantee safe, uninterrupted travel:- at a speed of at least 250 km/h on the lines speciallybuilt for high speed, while enabling speeds of over 300 km/hto be reached in appropriate circumstances.

[Union, 1996]

Whereas high-speed train operators battle with providing this uninterrupted ser-vice in terms of train departure and arrival times, neither train operators nor tele-

7

Page 26: Institutionen för systemteknik - DiVA portalliu.diva-portal.org/smash/get/diva2:560891/FULLTEXT01.pdf · Institutionen för systemteknik ... RAN Radio Access Network RBS Radio Base

8 2 Background and Related Works

com operators have succeeded in guaranteeing uninterrupted service in termsof mobile services that users engage in while travelling at such speeds [Review,2008, Yglesias, 2008]. Instead, the trend of banning voice calls seems to takeprecedence in various places worldwide - perhaps being fueled by the inabilityto maintain a service as such in the first place [Go, 2011].

Dropped phone calls on trains are prevalent issues for professionals and com-moners alike with the general conception that dropping of phone calls can beattributed to so-called dead spots in the network coverage areas due to hilly ter-rain and temporary weather conditions. This would not, and does not, explainphenomena such as stationary users in the vicinity of a railway station havingtheir calls dropped due to an approaching train or dropped calls in urban areaswhere dead spots are next to nonexistent.

There are three characteristics that distinguish a train from other types of cellu-lar activity that can, and should, be exploited for finding suitable control mecha-nisms. For one, speeds are substantially greater than ordinary cell traffic, rangingfrom 100 up to 400 km/h. Secondly, moving patterns are strongly predictable asrailway track deployments are fixed. Finally, users on the train are clustered to-gether along a relatively straight line between over 200 to 400 m, depending onthe length of the train [Tang et al., 2011].

2.1.2 Propagation Phenomena

Figure 2.1: A high-speed train in a radio environment. Train movements arefixed to railway deployment.

Page 27: Institutionen för systemteknik - DiVA portalliu.diva-portal.org/smash/get/diva2:560891/FULLTEXT01.pdf · Institutionen för systemteknik ... RAN Radio Access Network RBS Radio Base

2.1 High-speed Trains in Radio Environments 9

One of the special propagation phenomena that arises from high-speed travel is avast increase in the Doppler spread, Ds, of the channel, driving down the channel’scoherence time, Tc, through the relation:

Tc ≈1Ds

(2.1)

Equation 2.1 provides an idea of the effects the Doppler spread channel has on theUE and RBS communication. The train creates a large relative velocity betweenthe transmitting and receiving terminals and the resultant increased spread ofmultipath propagations with independent and random Doppler frequency shiftsresults in a high Doppler spread [Liu et al., 2011]. This would most likely beaccentuated further in an urban scenario than a rural, where paths both to andfrom a train are greater than in flat rural landscapes [Ahlin et al., 2006].

High Ds proportionally lowers Tc, a measure for the time-variation of the chan-nel. The speed of the train thus essentially creates a profound fast-fading channelwhere destructive or constructive interference from the multipath result in chan-nels with very low coherence time. A key issue here for the train case is the in-tercarrier interference (ICI), where the duration of transmitted signals are longerthan the channel’s Tc. Signals outside Tc will thus interfere with subsequent sig-nals, aggravating the decoding process of these signals, and consequently causingincreased signal distortion.

Depending on the service a train user is engaged in, the distortion may take differ-ent forms, and to overcome distortion, higher SNR would be necessary. Deep fadesare thus not uncommon risking a total loss of communication between senderand receiver at times; however, these effects can be mitigated in various ways us-ing the time diversity of the Doppler spread. Essentially this entails manipulat-ing the randomness of Doppler shifts of the independent paths in order to obtainuncorrelated copies of the same signal to strengthen the robustness of the channelagainst deep fades. Liu et al. takes the idea one step further for railway networksby proposing specific antenna architecture along a railway network consistingof sectorized and directional antennas for Doppler mitigation and Doppler diver-sity gains. With such gains, required radio link SNRs for maintaining connectionscould lower the the transmission load on UE and RBS transmit power levels andthereby provide longer periods of soft handover (SHO) where the radio networkcontroller (RNC) can ensure successful handover.

It is also worth noting that high-speed trains come in different types and onekey issue is the ability to dampen propagation attenuation due to the train bodyitself [Gunnarsson, 2005]. The train body loss depends on the signals’ ability topropagate through windows. A way of avoiding further train body attenuation isthrough the use of repeaters installed on the train as in figure 2.2. Repeaters havethe advantages of lowering UE transmit powers (thus preserving battery power)and mitigating train body and Doppler losses to such an extent where sparserRBS deployment would be possible [Gunnarsson, 2005].

Page 28: Institutionen för systemteknik - DiVA portalliu.diva-portal.org/smash/get/diva2:560891/FULLTEXT01.pdf · Institutionen för systemteknik ... RAN Radio Access Network RBS Radio Base

10 2 Background and Related Works

Figure 2.2: Repeaters (in red) can be installed on trains to strengthen signalquality

2.1.3 Radio Access Networks

Figure 2.3 illustrates a wireless network design consisting of a series of RBSswith individual coverage areas, adding up to serve a larger area as a whole, calledservice area. A high-speed train that runs through this area with users on-boardwill consistently perform handover actions from one RBS to another, in order toavoid dropping of connections and thus loss of services.

Figure 2.3: Schematic coverage map of a wireless communication system

As illustrated, an RBS’s coverage area will be unique depending on the topologyof the terrain for the RBS in question, while at the same time being heavily de-pendent on propagation conditions and interference from users in neighbouringcells. Some techniques that have been used to battle this is the use of an um-brella cell. An umbrella cell is activated on top of microcells to serve high-speedusers and lowering the number of hand-offs required for high-speed terminalsmoving through the serving area as depicted in figure 2.4. It also fills in the gaps

Page 29: Institutionen för systemteknik - DiVA portalliu.diva-portal.org/smash/get/diva2:560891/FULLTEXT01.pdf · Institutionen för systemteknik ... RAN Radio Access Network RBS Radio Base

2.2 Trains in UMTS Networks 11

of possible dead spots between micro cells’ coverage areas [Ioannou et al., 2003].Although umbrella cell solutions are popular, they do not span the entire rail-way network and issues are readily brought about when it comes to HO from oneumbrella cell to the next. Also, for an umbrella cell to be deployed, hardwareinvestment is necessary where umbrella cell RBSs need to be deployed at a greatheight in order to cover a large region - possibly becoming a bit of an eyesore inan urban environment.

Figure 2.4: An umbrella cell on top of other cells that is activated in high-speed environments

Other possible solution have been presented by Gunnarsson who briefly discussesdifferences in the deployment of microcells along the railway track versus dis-tant RBS with directional antennas. Directed RBSs from a distance have largercoverage areas than microcells next to the track, and can thus be deployed moresparsely. Moreover, further weakening the strategy of close-to-track deploymentis accentuated Doppler losses in the DL.

In underground train environments, where radio signals do not propagate freely,leaky coaxial cables are laid along the track in order to guide radio signals frompoint of origin to the location of the train. The leaky property of the cables allowsignals to permeate along the otherwise difficult underground tunnel. However,this type of deployment substantially degrades network performance with highpassenger density and considerable losses are incurred at the terminals of thecables [Zhang, 2005].

2.2 Trains in UMTS Networks

In this section, the UMTS network used for third generation mobile telecommu-nication networks is presented on the level that is relevant for network manage-ment of high-speed trains.

Page 30: Institutionen för systemteknik - DiVA portalliu.diva-portal.org/smash/get/diva2:560891/FULLTEXT01.pdf · Institutionen för systemteknik ... RAN Radio Access Network RBS Radio Base

12 2 Background and Related Works

2.2.1 Overview

The universal mobile telecommunications services (UMTS) network can be re-garded from a number of different perspectives, such as logically, functionally,or by which sub-network they belong to. In Figure 2.5 the network is dividedfunctionally.

UMTS essentially covers the entire process, from the hand held user equipment(UE) via the RBSs to the core network (CN), and out to external networks suchas the internet; however, all the radio-related functionality occurs within theUMTS terrestrial radio access network (UTRAN), and in the interface betweenthe mobile equipment (ME) and UTRAN. This thesis thus deals with LC withinthe UTRAN and not elements beyond the RNC. For a complete description of theUMTS network, see the appendix.

Figure 2.5: UMTS high-level system architecture with network elements.Node B is the UMTS specific term for the more general RBS.

External NetworksCNUTRANUE

Cu

Uu

Iub

Iur

Iu

2.2.2 Radio Resource Management

Radio Resource Management (RRM) covers the ensemble of algorithms that dealwith regulating the load of a cell and administering the distribution of resourcesto subscribers as determined by QoS parameters. In a high-speed scenario, timeis of crucial value, as there is little time to regulate overload, and little time fordecision-making in admission and handover policies.

RRM is necessary for efficiently utilizing the air interface and the associated re-sources. Without it, QoS could not be guaranteed, and high capacity could notbe ensured for a maintained coverage area.

Handover

As a train passes through a cell, it will have the serving RBS in its active set,providing the resources necessary for maintaining the active service at QoS re-quirement levels. As coverage areas from neighbouring cells overlap, the trainwill, within a period of time, be located in the intersection of two coverage ar-

Page 31: Institutionen för systemteknik - DiVA portalliu.diva-portal.org/smash/get/diva2:560891/FULLTEXT01.pdf · Institutionen för systemteknik ... RAN Radio Access Network RBS Radio Base

2.2 Trains in UMTS Networks 13

eas, thus having two separate cells in its active set. This allows for soft handover(SHO) enabling smooth transmission of services from one cell to another.

It is important to note that trains, or in essence any fast-moving vehicle, will beeligible for SHO during very limited times. This is especially true for high-speedtrains where hard handover occurs to a greater degree and is responsible for amajority of dropped connections due to failure of admittance into the new cell[Tang et al., 2011]. This naturally places high demands on the handover and ACalgorithms.

Tang et al. presents a technique to overcome this in the high-speed scenariothrough the installation of dual antennas on the roofs of trains. It uses the char-acteristic of the length of the train to increase the probability of successful SHOby extending the time the train is in both cells by installing one antenna at thehead of the train, and another at the rear.

Admission Control

When a new radio link is to be set up, AC will estimate the requirements of theestablishing link and examine the impacts a possible establishment will have onthe network’s QoS and coverage area. In a low-loaded cell, where both the air-interface and RBS power consumption is low, a new radio bearer (RB) for theestablishing link will be set up, defining the QoS attributes for the specific link(see section 2.3). If an RB cannot be directly established the admission controllerwill attempt to release resources by, for example, switching down existing usersto lower rates (for more examples see 2.2.2).

In the case of downlink admission control, a new link can be established if it doesnot result in the network using more power than a certain threshold, defined inthe radio network planning.

If

Ptotal−old + ∆Ptotal > Pthreshold (2.2)

then admission is blocked by the admission controller.

∆Ptotal is estimated based on the initial power the user requires, which in turndepends on the distance from the RBS. In essence, the distance from an RBS doesnot need to be specifically determined in order to estimate the power required- rather the distance will be represented in the initial power estimate as deter-mined by the outer loop power control [Holma and Toskala, 2004]. The outerloop power control sets the target for the fast power control needed to providethe required quality of transmission - no worse, no better. This is especially hardin a high-speed train scenario where the outer loop power control will consis-tently update the signal-to-interference ratio (SIR) targets, and the fast powercontrol will be required to keep up. In a review of Doppler techniques with ap-plications to HOs, Tepedelenlioglu and Abdi points out the value of consideringDoppler values in AC policies and initial power estimations for HO. If Dopplerdiversity schemes were used to combat the fast fading channel effects of trains,

Page 32: Institutionen för systemteknik - DiVA portalliu.diva-portal.org/smash/get/diva2:560891/FULLTEXT01.pdf · Institutionen för systemteknik ... RAN Radio Access Network RBS Radio Base

14 2 Background and Related Works

the outer loop power control would be able to report lower SIRs, increasing thelikelihood of admittance and thus successful HO.

Power thresholds are in WCDMA service-based, i.e. different types of serviceswill be allowed admittance to a varying degree. Best-effort thresholds are usuallyreserved for services without special priority. In the case of the speech service,a prioritized service in third generation networks, higher thresholds are usuallyused. Admission of HOs are prioritized over admission requests from new callset ups since HOs entail already active on-going services in the RAN. A key met-ric from telecom operators is to keep as many active services alive as possible.Blocking of new callers is thus favourable to blocking of handover requests.

AC schemes based on power levels are quite common and several proposals existin maintaining efficient usage of power resources with dynamic user load levels.Xiao et al. propose a distributed admission control algorithm that maintains thesystem’s power levels at Pareto optimality and uses this for admitting incomingconnections. The algorithm strictly deals with the DL, and iterates for each estab-lishing connection one by one. Also Liu et al. discusses power-based admissionalgorithms for single-incoming connections In this case by establishing an adap-tive call admission control algorithm that accepts a new incoming connection ifthe network has reached a steady-state with all ongoing n connections meetingminimum SIR with (Eb/N0) > γσ (n). The issue with such algorithms, althoughefficient, is that they would have to be run as many times as users on board thetrain, which is not feasible when attempting to simultaneously admit a bulk ofusers at high speed.

A more promising strategy for high-speed trains is suggested by Liu et al., whosuggest a self-learning AC scheme that employs a single-module adaptive criticdesign (ACD) from neural network control architecture. ACDs are defined asschemes that approximate dynamic programming optimal control over time innon-linear environments. The idea is that the admission controller learns fromthe network environment and user behaviour over time to collect experience as abasis for admission policy. This is done by defining a utility function, U , whichuses a cost function, E. E rewards the system for correctly accepting or rejectinga call, and inversely penalizes the system for incorrectly accepting or rejectinga call. The self-learning approach builds on calculating the utility and storingthe state of each action that includes total inference, call type, and call class.Upon connection request, the admission controller will either accept or rejectthe call depending on the future state of the network. For a high-speed trainscenario, this could prove to be an interesting case where it would suffice that theadmission controller know how many callers and of what service types to make asingle decision on bulk admittance or rejection based on the experienced futurestate of the network.

Other, potentially feasible methods, build on predictive AC schemes [Kim et al.,2000, Chin et al., 2006]. One way of using predictability is by gaining knowledgeof when and where a handover request will occur based on user mobility patternsas proposed by Evans and Everitt. By using an aggregate of user mobility history,

Page 33: Institutionen för systemteknik - DiVA portalliu.diva-portal.org/smash/get/diva2:560891/FULLTEXT01.pdf · Institutionen för systemteknik ... RAN Radio Access Network RBS Radio Base

2.2 Trains in UMTS Networks 15

probabilistic schemes can be modelled that maps a certain mobility pattern toa specific time and location for a handover request, as illustrated in figure 2.6,and therefore each future user can be reserved a certain bandwidth in advance.These patterns reflect the routines of a users’ habitual lives and therefore suggesta stationary mth order Markov source of events.

Figure 2.6: Resource reservations using predictive AC schemes

HO 36% HO 64%

AC specifically for a train scenario has not been extensively covered in the lit-erature. In fact, the only found sources do not deal with the issue in a UMTSenvironment [Kim et al., 2000, Lee et al., 2011, Lattanzi et al., 2010] except for[Karimi et al., 2012]. Kim et al. provide solutions in a geostationary satellite en-vironment by using terrestrial base stations as gap-fillers for satellite handover toensure continuous transmission. Lee et al. provide a solution for a situation sim-ilar to this study; however, the solution entails the installation of extra on-boardmobile routers for WiMAX and WLAN technologies and solely for internet accessand no speech services.

Congestion Control

Congestion control kicks in when the total amount of resources demanded by ac-tive users exceed a predetermined network capacity limit, as illustrated in figure2.7. Admission control will continuously strive to avoid a state of congestion byblocking new users, but due to the dynamic properties of the network, networkcapacity may at any point drop below current users’ demand or users’ demandmay rise above the network capacity. Regardless of cause, the effect forces CCto resolve the overload by returning the total demand of users to an acceptablelevel.

There are a number of actions for CC to take. Primary measures entail deny-ing downlink power-up requests from the UE, switch down rates for high-speedpacket users, handover to other WCDMA carriers if possible, or, if available,

Page 34: Institutionen för systemteknik - DiVA portalliu.diva-portal.org/smash/get/diva2:560891/FULLTEXT01.pdf · Institutionen för systemteknik ... RAN Radio Access Network RBS Radio Base

16 2 Background and Related Works

handover to GSM. A last-resort situation is to drop active users in a controlledfashion. These controlled fashions can for example be based on dropping usersrequiring the highest amount of resources in order to resolve a congested situa-tion quickly and enter the congestion recovery mode. In the congestion recoverymode, previous load control actions such as handover to GSM or rate adaptationscan be reset [Rodrigues et al., 2009].

Figure 2.7: Conceptual illustration of the system’s load dynamics

Normal operation Congestion resolution Congestion recovery Normal operation

Network

capacityUsers'

demandCongestion

CC techniques specifically for high-speed train environments are virtually non-existent, mainly because proposed CC policies do not distinguish between usersof a certain service type and another user of the same service type, travelling athigh speed.

Measurement reporting

Other than bearing and transmitting actual service-related data such as speechframes for speech services, one of the primary functions performed by differentnetwork elements and transmitted across interfaces is that of metric measure-ment and measurement reporting.

These are important to be aware of in this thesis, since there is a lot of informationone would like to know about a train and its on-board users, but not everythingcan be assumed to be known.

Various measurement reporting serve different purposes. For example, the re-ceived signal code power by total received power, Ec

No, is used for the handover

decision-making process. Another example is the signal-to-interference ratio(SIR) for power control purposes.

The RBS signals the RNC with measurements on the total transmission power onits carriers, providing information on the amount of available power resourcesat the base station. These measurements are commonly transmitted as a powerratio in decibels (dBm).

The RNC also receives measurements of the block error rate (BLER) from theRBS. The measurement is supported by the UEs in order to provide feedbackinformation to the RBS for adjusting SIR targets for power control procedures.

Page 35: Institutionen för systemteknik - DiVA portalliu.diva-portal.org/smash/get/diva2:560891/FULLTEXT01.pdf · Institutionen för systemteknik ... RAN Radio Access Network RBS Radio Base

2.3 QoS for Mobile Subscribers 17

2.3 QoS for Mobile Subscribers

The type of service that a user subscribes to will entail certain requirements ofthe network, and in a cell with multiple users subscribed to multiple services theaggregated requirements may very well exceed the capability of the WCDMA net-work. It is preferable from a network utilization efficiency perspective to allocatesufficient resources in order to satisfy a user on an individual basis rather thanto let all users equally share resources regardless of service requirements. QoS isthe foremost metric on user satisfaction, and breaks down to a series of quantifi-able requirements in the network plane. From previous descriptions of issues ofhigh-speed train environments, it should be evident that QoS requirements aremore difficult to maintain for high-speed train users than slow-moving users.

2.3.1 QoS Classes

QoS architecture is provided by 3GPP, and is divided into four different trafficclasses. The four traffic classes are the conversational class, streaming class, inter-active class, and background class [3GPP, 2011].

QoS is differentiated into the respective traffic classes primarily based on howdelay-sensitive each class is.

Conversational and Streaming classes serve to carry real-time traffic flows, andtherefore encompass the most delay-sensitive services. Examples of such servicesare traditional telephony speech, and newer applications such as Voice over IP(VoIP) and video telephony for the Conversational class, and video streaming ser-vices such as YouTube®for the Streaming class. The Interactive class compriseservices such as web browsing, database retrieval and general server access, andis less delay-sensitive than the Conversational and Streaming classes. The Back-ground class is the least delay-sensitive class, covering services such as E-mail,MMS, and SMS.

In a high-speed train scenario, load control algorithms are activated to regulatethe cell load so that minimum QoS requirements are met. As presented in sec-tion 2.2.2, congestion control will attempt a series of different schemes priorto dropping an on-going service. Considering a train at high-speed, there willhardly be a sufficient amount of time to perform a series of congestion actionsprior to dropping actions. It is therefore elementary to consider the situation ofonly speech users (and no data users), and what control scheme to employ whendropping such users. Since a user being dropped results in failure of retainingQoS, the user will be labelled as an dissatisfied user. If train users are system-atically dropped from a network in higher proportions than macro users, thedifferences in QoS could be argued as unfair.

2.3.2 Radio Link Bearers

Figure 2.8 depicts the QoS layers involved in the UMTS network.

End-to-end service QoS requirements can be systematically broken down into

Page 36: Institutionen för systemteknik - DiVA portalliu.diva-portal.org/smash/get/diva2:560891/FULLTEXT01.pdf · Institutionen för systemteknik ... RAN Radio Access Network RBS Radio Base

18 2 Background and Related Works

mutually exclusive bearers with specific QoS requirements required to deliverend-to-end QoS requirements. Relevant for the thesis are QoS requirements forthe physical radio bearer (RB) service.

Figure 2.8: UMTS QoS Architecture. Physical radio bearer service is of rele-vance to the thesis.

UMTS

TE TEMT UTRAN CN

Edge Node

End-to-End Service

CN

Gateway

UMTS Bearer ServiceExternal Bearer

Service

TE/MT Local

Bearer Service

Radio Access Bearer ServiceCN Bearer

Service

Radio Bearer

Service

RAN Access

Bearer Service

Backbone Bearer

Service

Physical Radio

Bearer Service

Physical

Bearer Service

RAN RRM deals with QoS in the MT-UTRAN layer and is thus responsible forQoS for the parameters defined by RBs.

Page 37: Institutionen för systemteknik - DiVA portalliu.diva-portal.org/smash/get/diva2:560891/FULLTEXT01.pdf · Institutionen för systemteknik ... RAN Radio Access Network RBS Radio Base

3Hypotheses and Limitations

In this chapter, relevant hypotheses that will be investigated are formulated andexplained. Thereafter, limitations and the approach is outlined and finished offwith the methodology of each part-study in question.

3.1 Hypotheses

The background and review of related works, put into context of the purpose ofthis study, provides some interesting insights. A train’s sudden rush into a cellwill place substantial requirements on the admission controller since, by design,the algorithms are, regardless of scheme, generally designed on a per connectionbasis. In situations with a high user arrival rate, this puts a considerable strainon the hardware of the admission controller, especially in a congested cell whereavailable resources are scarce. Self-learning or predictive algorithms for the ad-mission controller that need not initiate a decision process upon connection re-quest may seem favourable in these cases.

The review also suggests that it is possible that the system is put in a situationsuch that users are admitted, even though inherit dynamics of the environmentultimately might cause the system to have to perform congestion action on al-ready admitted users. In this situation, it is reasonable to believe that a givencongestion control algorithms might introduce a situation where either users onthe train or in the macro environment could be argued as being systematicallydiscriminated against as a group. Therefore, investigation of how different CCschemes effect the fair treatment of these groups is of interest when evaluatinghow well a system handles a situation involving users on a train.

As previously mentioned, denying a user admission upon the setting up of a call

19

Page 38: Institutionen för systemteknik - DiVA portalliu.diva-portal.org/smash/get/diva2:560891/FULLTEXT01.pdf · Institutionen för systemteknik ... RAN Radio Access Network RBS Radio Base

20 3 Hypotheses and Limitations

is, from a satisfaction perspective, to be preferred before being forced to use con-gestion resolution actions on the connection in a later stage. It is thus reasonableto pursue a solution where admission control is utilized to avoid the situation ofa train of users entering a cell when it is in a congested state. Using the ideas ofpredictive AC schemes, a cell can prepare its load if it has knowledge of an incom-ing train. In such a case where the cell load has been prepared in advance for anincoming train admission control would not need to be performed upon handoverof train users, but admission could be granted without any ado. This would re-solve the issue of running a bulk of users through extensive control algorithmsand avoid blocking resulting in retention of QoS.

Actual detection of a train has not been covered in the literature earlier. A fac-tor that distinguish a group of train users from its external environment is theapparent fact of them being a bulk of tightly placed users travelling at the same,relatively high, speed in comparison to the outside environment. A feasible wayto thereby detect such an object would be through the study of their radial veloc-ity, which can be theoretically measured by a receiver. If the radial velocity ofthe train users produce a substantial deviation from the over all distribution ofradial velocities of UEs in the cell, then this characteristic could be used to tagthese users as train users, and thereby initiate a cell preparation scheme, grantedone knows the network of cells that a railway track passes through.

3.2 Limitations

The limitations to this thesis are mainly attributed to time constraints. This en-tails that the research exclusively deals with QoS in the downlink. Uplink isnaturally also of interest from a QoS point-of-view; however, due to some signif-icant differences between the DL and UL, such as transmission power capacitiesand scheduling schemes, it warrants a separate study. It should be observed thatthe method of study is similar in both cases.

Quality of service as a whole provides requirements for the entire end-to-endUMTS bearer service from originating UE to destination UE. Since this entirerange is not relevant for the study, solely the QoS pertaining to radio access bearerservice shall be addressed.

Another limitation that bears mentioning is that the study deals with speechusers exclusively. Two major consequences of this is that the strategy that will bedeveloped is solely applicable for single-service network and not a multi-servicenetwork which is preferable. The other consequence is that rate adaptation (RA)will not be applicable during load control. The reason for this, rather hefty lim-itation, is that services other than speech are only allocated available resourcesremaining after speech users’ demands have been fulfilled. This would bear com-plicated impacts on the scope of a study that primarily focuses on load controlin a train scenario and the straight-forward way to tackle a problem as such is tolimit one self to load control of a single service.

Page 39: Institutionen för systemteknik - DiVA portalliu.diva-portal.org/smash/get/diva2:560891/FULLTEXT01.pdf · Institutionen för systemteknik ... RAN Radio Access Network RBS Radio Base

3.2 Limitations 21

The most prominent limitation to the study is the use of a simulator. Althoughthe intention is to model a real-life scenario as close to reality as possible, a modelthat captures the major features of the scenario in both architecture and simula-tion results suffices. This will further be discussed in the methodology. Further-more, the simulator is currently unable to use real-world propagation gains aspart of the simulations and solely relies on theoretically calculated path losses.

Page 40: Institutionen för systemteknik - DiVA portalliu.diva-portal.org/smash/get/diva2:560891/FULLTEXT01.pdf · Institutionen för systemteknik ... RAN Radio Access Network RBS Radio Base
Page 41: Institutionen för systemteknik - DiVA portalliu.diva-portal.org/smash/get/diva2:560891/FULLTEXT01.pdf · Institutionen för systemteknik ... RAN Radio Access Network RBS Radio Base

4Network Modelling

This chapter describes the fundamental properties of the simulation environmentused for all studies in this thesis work. The description will cover the main pa-rameters present in all simulations performed throughout the thesis work, andspecifications for specific simulation runs will be described further in the corre-sponding study chapters.

4.1 Table of Notations

The following notation will be used for mathematical descriptions throughoutthe remainder of the report.

• u A cell service user.

• T The set of cell service users onboard a train.

• M The set of cell service users not onboard a train. In this thesis, these usersare also called macro users.

• C A cell.

• Su The active set of user u.

• λ The arrival rate of new callers into the system.

4.2 Scenario Architecture

A cellular network can be built using blocks of hexagonal cells as in figure A.2.Illustrated in Figure 4.1 is a hexagonal subsection of the serving area which will

23

Page 42: Institutionen för systemteknik - DiVA portalliu.diva-portal.org/smash/get/diva2:560891/FULLTEXT01.pdf · Institutionen för systemteknik ... RAN Radio Access Network RBS Radio Base

24 4 Network Modelling

be exclusively used for simulating ends in the thesis. The color scheme in thefigure is used to help identify the three separate coverage areas (or sites) used.The reader should note how the hexagonal subsection uniquely covers three exactsites without overlap.

Figure 4.1: three-site, three cells/site simulation serving area with a cell ra-dius R and site-to-site distance D=3R

2

The dotted serving area in figure 4.1 also outlines the wraparound perimeter of thenetwork. A user crossing the dotted perimeter in the beige-yellow (or cream) cellthree in the top-right hand corner will be wrapped around so to continue in cellthree in bottom-left. This rule is true for the entire simulation area and allowsfor continuous mobility of users and propagating signals.

As depicted, the radius of the cell determines the length of the site-to-site dis-tance and thus also the physical area the serving area spans. Since the cell radiusplays an important role in total power transmitted by an RBS to users in its cover-age area, a specific radius will have to be determined in order to correctly modelRBS transmit power congestion as is the purpose of the study. Cells can have radiiranging from a couple of hundred meters to several kilometers with varying RBSoutput power limits. The resulting differences in power densities for a given dis-tance from the RBS will be inherently associated for capacity calculations andit is thus necessary to fix both RBS output power levels and the cell radius forsimulation purposes. Therefore, a maximum output power of 20W (43dBm) will

Page 43: Institutionen för systemteknik - DiVA portalliu.diva-portal.org/smash/get/diva2:560891/FULLTEXT01.pdf · Institutionen för systemteknik ... RAN Radio Access Network RBS Radio Base

4.3 Network Environment 25

be assumed and a radius will be varied until for a suitable number of users untila substantial size of available power is consumed. A radius too small will leadto code congestion prior to power congestion and too large a radius will lead topower congestion for an unrealistic few number of users. A suitable level willlie somewhere in between. Having varied radii from 250 meters to 350 meters,simulations showed that a radius of 300 meters provided power congestion levelswith a substantial amount of users. Details can be found in the appendix.

4.3 Network Environment

The radio propagation environment used in the simulations is meant to model arelatively harsh, urban environment. This implies substantial signal attenuationin the area surrounding base stations.

Users outside of the train, denoted macro users, will all be engaged in typicalspeech services, with call durations that are Gaussian distributed with mean 60seconds. For improved reality measures, unreasonably short call lengths will beprohibited with a lower limit call duration of 15 seconds. Moreover, macro usersare distributed across outside and indoor environments where indoor environ-ments induce additional propagation losses.

The lower bound on the call length is introduced in order to limit the impactof very short term deviations on a channel that could cause a short call to bedissatisfied even though the total amount of data lost would be considered negli-gible. For a 15-second call, for example, a 2% BLER will correspond to 0,3 s of areceived message lost.

Macro users will be generated at random positions across the serving area at at ar-rival rate λ and will move in a straight line at low velocities in a random assigneddirection. It should be noted that users are throughout their lifetime engaged ina speech call. If a call is terminated so is the user.

4.4 Train Modelling

Users on the train, henceforth train users, are modelled in the same manner asmacro users with regard to call duration and service type. When train users’ callsexpire they are replaced with new users somewhere on the train so that the over-all number of active train users are kept at a constant 40 users during the entiresimulation. The substantial differences between macro and train users, from thesimulation perspective, are that train users are all put in an indoor environment,further degrading signal quality, and assigned a high-speed train velocity with aspecified straight direction that follows the deployment of a railway track.

The conceptualized railway track simply motivates and defines the direction ofmotion of train users and is deployed as a straight track at an angle of π

12 rad.This angle entails that throughout the simulation, users will pass through allcells in the serving area with varying distances to nearby RBSs. This is illustrated

Page 44: Institutionen för systemteknik - DiVA portalliu.diva-portal.org/smash/get/diva2:560891/FULLTEXT01.pdf · Institutionen för systemteknik ... RAN Radio Access Network RBS Radio Base

26 4 Network Modelling

in figure 4.2 where the faded track depicts the continuation of the bold trackfollowing wraparound. Following the illustrated process, the track will enter cellone in the bottom-left following the faded track’s exit from the serving area.

Figure 4.2: The railway track’s deployment in the serving area. The track’sangle at π

12 rad leads to varying pathways with wraparound

3

As the railway track serves to model the direction of users’ movement, the concep-tualized train similarly serves to model the physical distribution of users along astraight line and the users’ speed.

The train is modelled after the modern Japanese high-speed train, the N700 se-ries Shinkansen on the Kyushu Shinkansen railway network that has a maximumspeed capacity of 260 km/hour. Since the train in the simulation scenario movesthrough a dense urban environment such speeds are not reasonable and the trainis thus modelled to slightly under half its maximum speed. Since intermediatecars carrying passengers are of 25 m in length each, typically containing eightcars in a trainset, the train as a whole is modelled to a total length of 200 m.All in all, this means that train users are generated in a random position along astraight line of 200 m while moving at 35 m/s.

Page 45: Institutionen för systemteknik - DiVA portalliu.diva-portal.org/smash/get/diva2:560891/FULLTEXT01.pdf · Institutionen för systemteknik ... RAN Radio Access Network RBS Radio Base

5Network Capacity Determination

In this chapter, an attempt is made to approximate the capacity of a cell in thesimulated network. The purpose of this investigation is to find a suitable usercount for the serving area when the QoS constraints of the network reach theirborderline limit. The results of the investigation will serve as the basis for allfuture studies in this thesis.

5.1 Method

For determining the capacity, the scheme proposed by Evans and Everitt is pur-sued. Users are assumed to be uniformly spread across the serving area and thusentailing a roughly equal number of users in each cell. This number is graduallyincreased until the QoS constraints are reached. For the purpose of this study,that QoS constraint is based on user satisfaction and the capacity will be definedas the number of users N , when a certain percentage of the total amount of usersare satisfied. It is noted that this static capacity metric is only valid for the net-work architecture presented and described in section 4.2 on page 24 and is by nomeans a valid metric for every WCDMA cell in question.

Since different locations across the serving area will experience different radioenvironments, and that different cells will have a different user load over time,the metric for capacity per cell will be averaged over satisfaction levels for allindividual cells in the network. Simply using percentage of satisfied users on thenetwork level would have been a less appropriate metric for cell capacity.

27

Page 46: Institutionen för systemteknik - DiVA portalliu.diva-portal.org/smash/get/diva2:560891/FULLTEXT01.pdf · Institutionen för systemteknik ... RAN Radio Access Network RBS Radio Base

28 5 Network Capacity Determination

5.2 Simulation Setup

Macro users are generated at random positions in the serving area with a setarrival rate of λ users/s. As mentioned previously in section 4.3, users will havea Gaussian distributed call duration with mean m = 60s. The user load in thesystem will systematically increase until the departure rate, µ, of users is equalto the arrival rate. The load in the system thus stabilizes at:

N ≈ λm users when µ ≈ λ.

By increasing λ, a series of simulations can be run for which N systematicallyincreases proportionally until capacity saturation levels are reached.

These simulations are run without any LC activated since the purpose is to findthe maximum number of users supported by the system when all users are grantedrequired resources at a best-effort basis. It should be noted that the limiting fac-tor here has been designed to be RBS transmit power in the cell rather than codeshortage so N can be increased without worries of running out of available codes,as is the aim of the thesis study.

Since the system’s user load level stabilizes at N when µ ≈ λ, only terminatedcalls once this state has been reached will be used in the evaluation set for usersatisfaction levels. Since λ varies between successive simulations, so will µ. Inorder to acquire same number of samples for evaluation, simulation times of eachrespective simulation will have to be adjusted. The reader is referred to the ap-pendix for further details regarding simulation lengths.

5.3 Evaluation Metrics

The capacity of a network in terms of number of users can be discussed. It canbe thought that if ten users utilize 100% of RBS resources then ten users is thecapacity of the network; however, given that codes are available, 20 users canutilize 100% of RBS resources if each user uses half the resources relative thefirst case. Since lower allocated power to users will jeopardise required SNRto maintain guaranteed QoS requirements for the users, the term satisfaction isintroduced as a viable metric for the entirety of the thesis work.

A satisfied user is one whose speech service, for the entire duration of the ser-vice, has a (BLER < 2%) and is (not dropped as a result of LC)

It follows from the definition that if at least one of the two requirements arenot upheld, the user is labelled dissatisfied. The metric for satisfaction placeslower bounds on the SNR a user is entitled to and ergo an upper limit on thenumber of users in the system. As long as 100% of users are satisfied there will beroom to handle additional users. The capacity definition will reflect a statisticallyconfident metric of dissatisfied users.

A cell’s capacity is the number of users, N , where 95% of the N users are satis-fied users.

Page 47: Institutionen för systemteknik - DiVA portalliu.diva-portal.org/smash/get/diva2:560891/FULLTEXT01.pdf · Institutionen för systemteknik ... RAN Radio Access Network RBS Radio Base

5.4 Simulation Results 29

Simply accounting for the total sum of an RBS output power does not directlyreflect the actual load on it. What is of greater interest is the total sum of all activeusers’ demand on RBS DL power and how this relates to the RBS’s maximumoutput power limit of 20 W per cell. Users demanding 200% or 150% of thisvalue reflects different load levels. It is also necessary to distinguish between acongested cell and a saturated cell. Whereas a congested cell has little availablespace for additional users in terms of power, a saturated cell has no availablespace.

A power congested cell is one where the aggregate of users’ downlink power de-mand is greater than 75% of the serving base station’s maximum outputpower level.

A power saturated cell is one where the aggregate of users’ downlink power de-mand exceeds the serving base station’s maximum output power level.

It should be noted, following the definition, that if a cell is saturated it is alsocongested but cell congestion does not imply cell saturation.

5.4 Simulation Results

Figure 5.1 depicts the mean satisfaction level per cell versus the mean number ofusers per cell. It shows a clear trend of falling satisfaction levels with increasinguser load in the system - as expected. At values around 85 users/cell, the increasein arrival rate seems to overload the system and satisfaction drastically plummets.There is also a deviation from the trend at around 77 users (~λ = 12) wheresatisfaction takes a sudden upturn, not in-line with the rest of the trend. Thismay be due to pure statistical reasons.

Figure 5.1: Network satisfaction levels

92,00%

93,00%

94,00%

95,00%

96,00%

97,00%

98,00%

99,00%

100,00%

35 45 55 65 75 85

Mean number of users/cell

Me

an

% o

f s

ati

sfi

ed

us

ers

/ce

ll

Page 48: Institutionen för systemteknik - DiVA portalliu.diva-portal.org/smash/get/diva2:560891/FULLTEXT01.pdf · Institutionen för systemteknik ... RAN Radio Access Network RBS Radio Base

30 5 Network Capacity Determination

It is noteworthy that although the 95%-mark is targeted fairly well with 85 users/cell,there seems to be no substantial elbow room for the number of users to deviatefrom this number before the system collapses. Although 80 users/cell has a slightmargin to the 95%-limit it allows for some fluctuations to the right without jeop-ardising the capacity threshold.

As previously mentioned, low QoS itself does not imply power congestion. Fig-ure 5.2 provides the corresponding mean transmit power level per cell. As rea-soned, the aggregate demanded DL power increases over time - with 85 users/cellwell pressing on the saturation limits of the cell. The 80-user mark is well into thecongestion state of the cell and therefore strengthens the result of 80 users/cellbeing an appropriate measure for the cell’s capacity.

Figure 5.2: RBS transmit power levels

0,00

5,00

10,00

15,00

20,00

25,00

35 45 55 65 75 85

Mean number of users/cell

Mea

n D

L p

ow

er/

cell (

W)

Since an arrival rate of 13 seems to model the sought after environment ade-quately, both in terms of QoS and DL power levels, this will be used to simulatethe rest of the studies in the thesis.

Page 49: Institutionen för systemteknik - DiVA portalliu.diva-portal.org/smash/get/diva2:560891/FULLTEXT01.pdf · Institutionen för systemteknik ... RAN Radio Access Network RBS Radio Base

6Impacts of a Train on a Congested

Cell

Prior to studying possible improvements of the situation that arises due to a trainin a congested cell, the default effects must first be established and benchmarkedin order to provide a framework for analysis for future results. In this chapter,these effects are accounted for and main issues are addressed.

6.1 Method

Given the cell capacity in terms of number of users from chapter 5, a train willbe run through the simulation area as described in chapter 4 in section 4.4. Theresults from these simulations will be used as the point of reference for hereaftersuggested and modified LC schemes.

For now, basic LC schemes are now applied, consisting of basic AC and basic CCschemes. Two aspects that are of substantial interest are fairness and utility of thenetwork.

Utility

As explained earlier, AC serves to restrict admission of users in order to not jeopar-dise users’ QoS requirements and thus user utility. It will therefore be of interestto evaluate the effects a congested cell has on QoS levels on macro users and trainusers respectively. The framework for analysing the QoS levels for the two usergroups will be referred to as the network utility.

Fairness

The simulation serves to model the actual real life scenario of a train enteringa congested cell. If the CC algorithms are biased in any way when targeting

31

Page 50: Institutionen för systemteknik - DiVA portalliu.diva-portal.org/smash/get/diva2:560891/FULLTEXT01.pdf · Institutionen för systemteknik ... RAN Radio Access Network RBS Radio Base

32 6 Impacts of a Train on a Congested Cell

users for various CC schemes, it will be of interest to evaluate fairness betweenthe dropping probabilities of macro and train users in a congested scenario. Ifthe dropping rate of train users is significantly greater than macro users, or viceversa, the dropping is considered unfair.

6.2 Simulation Setup

The simulation is set up identically to the simulations in chapter 5 with the fol-lowing modifications:

• The arrival rate of macro users is set to λ = 13 in accordance with the resultsfrom section 5.4.

• The number of train users is set to 40, the length of the train to 200 m, andthe velocity of the train to 35 m/s at an angle of π

12 rad as described andexplained in section 4.4.

• Admission control is activated with the admission threshold set to 75% ofthe maximum transmit power of RBS for a cell (15 W) and restricts admis-sion of users in SHO and newly generated users according to equation 2.2in chapter 2.

• Congestion control is activated with a controlled dropping scheme that tar-gets users for dropping according to the amount of power resources theydemand of the RBS. The user, regardless of the type, with the highest poweron its radio link is dropped. This scheme is denoted as the highest link power(HL) scheme and applies the rule:

From the set U of n users in the cell with U = {u1, u2, ..., un}, with radiolink power set P = {Pu1

, Pu2, ..., Pun } choose user uc : max{P } = Puc

6.3 Evaluation Metrics

As can be understood from the simulation network, a given cell will only be underthe influence of a train during certain periods of time throughout the simulation.Since this study is only interested in the impact of a train on a cell under theinfluence of a train, such an influence must be defined. In this report, a cell issaid to be under the influence of a train if one or more users on the train has thecell in question in its active set.

Similarly, a macro user is said to be under the influence a train if one or morecells in the user’s active set is under the influence of a train.

A cell, c, under the influence of the train, T , is one where ∃u ∈ T : c ∈ Auand thus

A user, u′ , under the influence of the train, T , is one where (∃u ∈ T : c ∈ Au) ∧c ∈ Au′

Page 51: Institutionen för systemteknik - DiVA portalliu.diva-portal.org/smash/get/diva2:560891/FULLTEXT01.pdf · Institutionen för systemteknik ... RAN Radio Access Network RBS Radio Base

6.4 Simulation Results 33

With the above definitions in place, solely macro users under the influence of thetrain will comprise QoS metrics

The main QoS metric for macro users used in this study is the satisfaction averagetaken on a per cell basis over all users who has had the given cell in its activeset when the given cell was under the influence of the train. This measure willbe compared to an overall satisfaction of the train users taken over the entiresimulation, in order to see if satisfaction differs between the two groups.

As an additional metric on the different treatment of macro and train users withregard to LC, CC drop rate will be calculated for train and macro users respec-tively, and AC block numbers will be studied.

6.4 Simulation Results

Figure 6.1: Train’s impact on Cell DL Power in green site, cell 1

800 850 900 950 10000

5

10

15

20

25

Time (s)

Cell

DL P

ow

er

(W)

Figure 6.1 depicts the effects the train has on the DL power levels in a cell versustime when the train is both in the cell and when it is not. It is important to notethat this only depicts the effects on one cell and graphs for the other rail cellscan be found in the appendix. The presence of the train is illustrated with ared rectangle with stemmed red bars within the rectangle of blocked train users.Two whole periods of the train’s presence can be observed in the middle of thegraph, while sections of the end of the train’s first period can be observed in thefar left and the beginning of the fourth to the far right. The repetition of the

Page 52: Institutionen för systemteknik - DiVA portalliu.diva-portal.org/smash/get/diva2:560891/FULLTEXT01.pdf · Institutionen för systemteknik ... RAN Radio Access Network RBS Radio Base

34 6 Impacts of a Train on a Congested Cell

Figure 6.2: Number of users in green site, cell 1

800 850 900 950 10000

10

20

30

40

50

60

70

80

90

100

Time (s)

Num

ber

of

Users

in C

ell

train’s presence occurs due to the wraparound perimeter. Bearing in mind thatthe presence of the train is equivalent to the cell being under the influence ofthe train, it ought to be noted that it suffices with at least one train user to havethe cell in question in its active set to have the presence of the train declared.Also, there are several short time intervals of train presence surrounding longerrectangles of train presence in figure 6.1. These sparks of train presence signalsthe cell breathing dynamics of a cell’s coverage area where an approaching user ona train may just momentarily be in the destination cell and in the next instant not.It is reasonable to assume that the physical train crosses the physical hexagonalcell-model border in conjunction with the longer rectangular presence and notthe short bursts of train presence prior to it.

A straight-forward inference from figure 6.1 is the upsurge in DL power that oc-curs due to the presence of the train; however, it is noteworthy that this doesnot as a rule occur due to cell entry although it seems to be the case for a ma-jority of cases. Another observation, in-line with expectations, is that blockingoccurs for DL power levels above 18 W - the admission threshold for speech ser-vices. Although no blocking occurs in some train periods due to not reaching the18 W-limit, the presence of the train strongly correlates with DL power valuesexceeding the congestion limit of 15 W.

Figure 6.2 is situated directly below figure 6.1 for the purpose of seeing mutualtrends. The reader can verify impacts on the number of users in the cell whenthe train is in the cell by simply tracking downwards from figure 6.1 to 6.2.

What can be observed from figure 6.2 is that the number of users in the cellclimbs steadily with the constant arrival rate but does not reach a stable number

Page 53: Institutionen för systemteknik - DiVA portalliu.diva-portal.org/smash/get/diva2:560891/FULLTEXT01.pdf · Institutionen för systemteknik ... RAN Radio Access Network RBS Radio Base

6.4 Simulation Results 35

of users before the train enters and effectively, for some reason, reducing the totalnumber of users in the system. Upon train cell exit, the number of users start torise again.

Table 6.1: Results of QoS Metrics

User Type Satisfaction Drop Rate Number of BlocksMacro Users 97% 2% 222Train Users 60% 3% 1386

Table 6.1 shows the results from the impact a train has on the QoS. Althoughthere was only a marginal difference in drop rates, there was substantial greaterdifferences in satisfaction and number of blocks.

Page 54: Institutionen för systemteknik - DiVA portalliu.diva-portal.org/smash/get/diva2:560891/FULLTEXT01.pdf · Institutionen för systemteknik ... RAN Radio Access Network RBS Radio Base
Page 55: Institutionen för systemteknik - DiVA portalliu.diva-portal.org/smash/get/diva2:560891/FULLTEXT01.pdf · Institutionen för systemteknik ... RAN Radio Access Network RBS Radio Base

Part II

Studies

Page 56: Institutionen för systemteknik - DiVA portalliu.diva-portal.org/smash/get/diva2:560891/FULLTEXT01.pdf · Institutionen för systemteknik ... RAN Radio Access Network RBS Radio Base
Page 57: Institutionen för systemteknik - DiVA portalliu.diva-portal.org/smash/get/diva2:560891/FULLTEXT01.pdf · Institutionen för systemteknik ... RAN Radio Access Network RBS Radio Base

7Congestion Control in Train

Scenarios

In chapter 6 it was noted that congestion control schemes with downlink poweras their primary decision basis, are likely to result in a bias towards being morelikely to target on-board users as a group. In order to mitigate this bias, thischapter introduces a method to modify an existing CC scheme in order to increasefairness between the two groups in terms of being targeted by CC. The impact ofthe method is evaluated mainly with regard to how it affects the performance ofthe scheme upon which it is applied.

7.1 Introduction

There are two fundamental sides to any scheme that serves to target a certainuser which have to be put in relation to each other and mutually prioritized inthe design of CC. This thesis will refer to these two properties as fairness andutility, and define them as follows.

Fairness

To prioritize fairness in a congestion action target selection scheme in this con-text is to strive towards giving all users the same levels of service, and thus thesame risk of being targeted by CC, regardless of the effect on overall system per-formance.

Utility

A congestion action target selection scheme prioritizing utility will have the over-all system performance as the leading performance indicator, disregarding theeffects on single users on an individual level.

39

Page 58: Institutionen för systemteknik - DiVA portalliu.diva-portal.org/smash/get/diva2:560891/FULLTEXT01.pdf · Institutionen för systemteknik ... RAN Radio Access Network RBS Radio Base

40 7 Congestion Control in Train Scenarios

Since single rate AMR voice traffic sets the most stringent QoS demands, theonly resource release action against it is the dropping of the connection. Thismeans that in the context of this report, CC releases resources by terminating theconnections it targets.

The main viewpoint from which system performance is judged in this thesis isQoS which, from a voice traffic point of view, means satisfaction. CC affects thesatisfaction in the system in two ways; firstly by keeping the system from anoverloaded state, ensuring that each user receives satisfactory signal strength inthe downlink to maintain a BLER less than 2%. The second, and less pleasantway that CC affects satisfaction, can be seen from the definition of satisfaction in5.3 that a dropped user is also automatically a dissatisfied user.

In order to measure these two aspects of the utility of a given CC scheme, thefollowing metrics will be used.

• The proportion of time spent by a cell under the influence of a train that isspent in congested state, i.e.,

Time spent by the cell in congested stateTime spent by the cell under the influence of a train

• Drop rate of macro users in a cell under the influence of a train, i.e.

# of macro connections dropped by CCTotal # of macro connections present in the cell when under the influence of a train

• Drop rate of train users over the duration of the simulation time.

The main aspect of fairness of interest to this study is the difference in impact ofa given CC scheme on train users versus on macro users. For this purpose, therespective satisfaction and drop rate measures given for macro and train userswill be analysed in relation to each other.

7.2 Description

As is easily derived from the system utility metrics, the so called Highest Linkpowerscheme, where the connection estimated to require the highest amount of powerin the downlink, is the optimal method from a utility point of view, since it resultsin the largest amount of resources freed per iteration. However, due to their highpower demand as previously discussed, this is likely to result in a heavy target-ing of train users. In order to reduce this unfairness, connections in the cell canbe divided into two sets of connection, one containing all connections belongingto train users, and another containing all connections belonging to macro users.When a connection is to be selected as target for congestion action, the proba-bility pt is introduced as the probability that the connection to target is chosenfrom set of train user connections. If this probability is set to be the same as theproportion of total connections belonging to train users, i.e.

Page 59: Institutionen för systemteknik - DiVA portalliu.diva-portal.org/smash/get/diva2:560891/FULLTEXT01.pdf · Institutionen för systemteknik ... RAN Radio Access Network RBS Radio Base

7.2 Description 41

P { set T is chosen } = nTnM+nT

and analogously the alternative

P { set M is chosen } = nMnM+nT

where nT is the number of connections belonging to train users, and nM is thenumber of connections belonging to macro users, then the choice of whether todrop a macro or train user is made under the premise that all connections areequal, resulting in exact fairness on a group level. When this initial division intosubsets of connections is performed, any congestion scheme could potentially beapplied on the subset of connections chosen.

As is always the case when measures are being taken to increase fairness into acongestion action scheme, this will impact the utility of the system. How largethis impact is depends on the characteristics of the applied scheme as well asthe distribution within each subset of the property upon which the selection pro-cess is based. For any utility prioritizing scheme however, the addition of thismethod will result in a prioritizing fairness towards train user over the overallperformance of the system. This effect could be regulated by simply introducinga scaling factor on one or the other of the sets as

P { set T is chosen } = CnTnM+CnT

and

P { set T is chosen } = nMnM+CnT

, which would result in a C times as high probability per user of a train user to beselected than a macro user. However, the impact of such modifications will notbe studied in this thesis work where we will always have C = 1.

Since this thesis limits itself to CC with regard to downlink power, the suggestedmethod will only be evaluated with regard to power based CC schemes. The CCschemes used for evaluation are described below.

Random

This is perhaps the simplest of the three, and also the one providing maximumbetween users within the set on which it is applied. The Random scheme simplychooses a connection at random from the set, which means that all connectionsin the set has exactly the same risk of being the target of CC action. Probability-wise, Random renders the initial division into macro and train users meaningless,since

P { connection c ∈ T is chosen } =nT

nT + nM

1nT

=1

nt + nMwhere M is the set of macro user connections and T is the set of train user connec-tions, which is the same as the probability of connection c being chosen directlyfrom the set of all connections.

Page 60: Institutionen för systemteknik - DiVA portalliu.diva-portal.org/smash/get/diva2:560891/FULLTEXT01.pdf · Institutionen för systemteknik ... RAN Radio Access Network RBS Radio Base

42 7 Congestion Control in Train Scenarios

Highest Link Power

Opposed to Random, Highest Linkpower, as described earlier, is the ideal schemefrom a utility point of view.

If PT is the set of downlink power values belonging to macro user connections,PM is the set of downlink power values belonging to train user connections, andpc is the downlink power value of connection c, then

P { connection c ∈ T is chosen } ={ nT

nT +nM1 , if pc = max(PT )

0 , otherwise.

This gives us the expected value of the downlink power freed from a single dropas

E{p} =nT

nT + nME(max(PT )) +

nMnT + nM

E(max(PM ))

with the introduction of the suggested method, as opposed to

E{p} = max(PM + PT ),

which is the expected power value recieved if the method is not applied, and thehighest linkpower scheme is applied directly on the entire set of all connections.

As can be seen from the equation, how much the introduction of the fairnessscheme impacts the average power released per connection dropped under thehighest linkpower scheme depends mainly on two factors. Firstly, it dependson the difference between the maximum power in each set. If the maximumpower in the train set is of approximately equal size as the maximum power inthe macro set, then the introduction of fairness in this case would be marginal.However, if the difference is large, and more specifically if the set with the pro-portionately larger maximum power of the two has a smaller cardinality, then theimpact could be large.

Proportional Fairness

The Proportional Fairness scheme is considered in this study to be a bridge be-tween the maximum fairness of the random scheme, and the maximum utility ofthe highest linkpower scheme. In this scheme, connections are selected with aprobability relative to the proportion of the total downlink power of the set occu-pied by that connection. This entails that a connection occupying a large portionof the total downlink power will be more likely to be dropped, but the drop willnot be certain, as is the case in the highest link power scheme. The result is ascheme that is fair in the sense that a given connection, no matter the radio en-vironment, always will have a chance to remain for the entirety of the call, buton average, the power freed per drop will still be larger than the random scheme,given that the distribution of power values within the set is not constant. Theprobability of a certain connection being dropped in this scheme is as follows.

Page 61: Institutionen för systemteknik - DiVA portalliu.diva-portal.org/smash/get/diva2:560891/FULLTEXT01.pdf · Institutionen för systemteknik ... RAN Radio Access Network RBS Radio Base

7.3 Simulation Setup 43

P { connectionc ∈ T is chosen } =nT

nT + nM

pc∑PTp.

Without elaborating into the math of the expected value of power freed per con-nection under this scheme, it can be understood that it will serve as a cross be-tween the two previously mentioned schemes, which is the purpose for which itis included in this study.

For the situation at hand, based on local expertise at Ericsson, it is reasonable tobelieve that the proportion between the cardinalities of the macro and train setsis about equal for a given situation, which is also the situation in our simulations.Since train users travel at approximately the same speed relative the RBS, andin a relatively homogeneous radio environment compared to the macro users, itis reasonable to believe that the power value distribution for train connectionswill have a considerably higher mean but smaller variance. The macro users,on the other hand, are generally travelling at lower speeds and in a more diverseenvironment, resulting in a lower mean value but with a large difference betweenthe highest and lowest power value, where the highest might well be on par withthe train connections.

7.3 Simulation Setup

To test the suggested method, the default scenario from the last study will beused with AC disabled. The reason for this is that AC limits the amount of CCrequired to avoid congestion in a given situation. This reduces the number of CCaction samples available for evaluation, without having any important impact onthe comparison of the suggested metrics between different runs.

7.4 Simulation Results

The results of the simulations can be seen in 7.1. The fairness with regard todrop rate between macro and train users seem to be higher with than without thegroup fairness scheme. However, due to the very characteristics of the situationwhere train users are only in a cell for a very short amount of time, there wasnot enough time in this thesis to run long enough simulations to produce a highenough number of drops in order to produce a reliable comparison between thedrop-rates. However, it is reasonable to believe that the math presented aboverepresents the situation well on this behalf.

Looking at the differences in total drops and time spent in congested state forhighest linkpower, prop. fairness and random, results are in line with the ideathat increased fairness comes to the expense of utility. However, comparing theresults of each scheme with and without the group fairness scheme, the resultsare unexpected. The results show a tendency towards a higher utility with the

Page 62: Institutionen för systemteknik - DiVA portalliu.diva-portal.org/smash/get/diva2:560891/FULLTEXT01.pdf · Institutionen för systemteknik ... RAN Radio Access Network RBS Radio Base

44 7 Congestion Control in Train Scenarios

scheme than without, which is not in line with theory, since the group fairnessscheme should introduce a on average lower power release per drop.

A possible explanation for this result is that the linkpower used as basis for targetselection in all the studied algorithms are based on the momentary estimate ofthe downlink power requirements for the connections, and does not take intoaccount the probable development of said requirement. For a train user travellingthrough a cell, it is likely that the initial estimate of its required downlink power,based on a position at the cell edge travelling at a high speed, is much higher thanit’s actual power consumption over time, given that it passes relatively close to theRBS. For a slow moving macro user on the other hand, a high power requirementis likely to preserve for the duration of the call. This could entail that, in somecases, the dropping of a macro user with a high power consumption is betterfor the utility in the long run than the dropping of a train user with a highermomentary estimate.

Table 7.1: Results of Fairness Metrics

Scheme DR Outside DR On-board Drops % in Congestion

No class fairnessRandom 4% 1% 76 57%

Proportional Fairness 11% 5% 109 24%Highest Link Power 4% 8% 63 15%

With class fairnessProportional Fairness 8% 8% 109 20%Highest Link Power 4% 3% 144 17%

7.5 Conclusions

Because of the low number of drops per time performed in the run scenario to-gether with the stochastic properties of the simulation, more extensive simula-tions are required in order to produce more reliable results with regard to fair-ness between train and macro users. However, the design of the group fairnessscheme leaves little room for errors, and the available simulation results show noreason to doubt the the effectiveness on this matter.

The result of higher utility with than without the group fairness scheme is sur-prising but positive for the aim of this thesis.

Page 63: Institutionen för systemteknik - DiVA portalliu.diva-portal.org/smash/get/diva2:560891/FULLTEXT01.pdf · Institutionen för systemteknik ... RAN Radio Access Network RBS Radio Base

8Proactive Admission Control for an

Inbound Train

In order to motivate the study of means to detect an incoming train for load con-trol purposes, it is reasonable to first study the possibility of actually improvingthe situation given that the whereabouts of the train is known. The motivationof this study is to suggest such a scheme, and evaluate its impact on differentaspects of system performance. If the scheme is proven to be successful, meansof retrieving the necessary information will be investigated in the next chapterstudy.

8.1 Introduction

As previously mentioned, this study assumes that certain things are known aboutthe train moving through the system.

• The system is assumed to know what cells have railroad track in their areaof coverage, and in what way they are interconnected.

• The system is assumed to know which users in the system are onboard atrain.

• The admission control algorithms in the different cells in the system are as-sumed to be able to perform basic communication with each other withoutmajor delay.

The first assumption is reasonable since the stretch of a railroad track is to beregarded as relatively stationary, and easily intelligible information. It is thusreasonable to assume that a cell service provider can know whether railroad trackis running through the coverage area of a cell, and in what directions it crossesthe cell border.

45

Page 64: Institutionen för systemteknik - DiVA portalliu.diva-portal.org/smash/get/diva2:560891/FULLTEXT01.pdf · Institutionen för systemteknik ... RAN Radio Access Network RBS Radio Base

46 8 Proactive Admission Control for an Inbound Train

The second assumption is not as obvious. One might argue that all that would berequired in order to prepare a cell for an incoming train would be the number ofusers on the train, and the approximate time at which they are expected to arrivein order to free the resources required to accept it. However, as will be suggestedin the next chapter, a train detection scheme created without the introduction ofhardware or other special circumstances into the scenario is likely to be based onthe identification of a certain characteristic upon which train users deviate frommacro, which in turn is used to detect the train. If such a scheme is employed,it would not be a far stretch to, at the same time, flag the users in which thedeviation is detected as train users. As will also be shown in the next chapter,this flagging of train users could work as a means to improve the exactness ofthe train detection. It is also reasonable to believe that this identification of usersknown to be moving at a certain pattern could be utilized by the system for manymore purposes than those that are presented here.

Regarding the signalling assumption, inter-cell communication is possible in UMTSsystems via the RNC as was described in 2.2, and the signalling required for thesuggested methods are not, to an extent, delay sensitive. The method suggestedin this study will not elaborate on the exact format or routing of the informationflow between cells, but will only describe the signalling on a conceptual as com-munication between cells and an abstract entity called the network. The networkis in turn assumed to have knowledge of which cells are connected which in termsof railroad, and to be able to communicate with all cells in the entire system.

8.2 Description

As stated in the hypothesis, being blocked upon call setup is generally consideredto be the lesser of two evils in comparison to being dropped in the middle of anongoing call. Since the main objective of this thesis is to increase user satisfaction,methods suggested will thus strive towards blocking connections on setup ratherthan dropping in a later stage, which in effect means to apply a more efficient AC.Nevertheless, the use of LC by definition will limit the amount of traffic allowedin the system, it is never desirable to over-use any LC method.

The basic idea of the suggested scheme is to utilize the knowledge of an incomingtrain in order to lower the admission threshold for a certain cell in advance whenknowledge is received that a train is approaching. The hope is that this willreduce the need for CC actions, thus reducing the impact on satisfaction fromdropped calls, while at the same time avoiding the temporary overload caused bya train entering a congested cell.

An important note here is that in this context, lowering of the admission thresh-old does not mean a lowering of the threshold for when CC action is performed.When the admission threshold is adjusted down to prepare for a train, users whoare already inside the system will be allowed to continue their calls, meaning thatthe load reduction rate during this time will only be equal to the rate at which ex-isting calls are voluntarily terminated by the user. In a saturated scenario where

Page 65: Institutionen för systemteknik - DiVA portalliu.diva-portal.org/smash/get/diva2:560891/FULLTEXT01.pdf · Institutionen för systemteknik ... RAN Radio Access Network RBS Radio Base

8.2 Description 47

the arrival rate is approximately the same as the rate of departure, the reductionrate will thus correspond to P λ where P is the average load per user.

There are three main events to the admission threshold adjustment scheme, TrainReport, which is the initial report that a cell has detected a train, Remote TrainNotification, which is the notification to a cell that a train is approaching in adistance, and Local Train Notification, which notifies a cell that a train will enterits coverage area shortly.

• Train Report is the reporting performed by a cell to the network when atrain is detected. This can be triggered either by an arbitrary train detectionscheme detecting a train moving through its coverage area, or by the eventof users flagged as train users being received through handover. The reportcontains the number of users detected on the train, and the direction ofthe train. When the network receives a Train Report, it issues remote andlocal train notifications on cells further ahead in the path of the train in thedirection given by the report.

• Remote Train Notification is performed by the network on all cells less thanthe Notification Distance away from the reporting cell. When a cell receivesa Remote Train Notification, it lowers its admission threshold by an offset as

NewT hreshold = Def aultT hreshold − P n,

where n is the number of users on the train according to the notification,P is the power to allocate per arriving train user, and Default Thresholdis the value to which the admission threshold would have been set giventhat no incoming train had been reported. Worth noting is that the DefaultThreshold value does not necessarily have to be a constant value, but canbe a value decided by a dynamic AC scheme. In this case, the resultingthreshold would be a dynamic value lowered by the offset P n. When the ad-justment is made, the cell will start a timer counting down the time thresh-oldAdjustmentPeriod. If no new update has been received before this timeruns out, the offset will be removed from the admission threshold.

• Local Train Notification is performed on the cell directly in front of the re-porting cell with regard to track path and direction. When a cell receivesa Local Notification, it starts counting incoming handovers of connectionsflagged as train users from the reporting cell. When the first handover is re-ceived, a timer is started to count down from trainAdmissionPeriod. Whenthis time runs out, the counting cell performs a Train Report containing thenumber of counted users.

The counting and reporting on handover performed by a cell which has receiveda Local Train Notification, is mainly meant as a control mechanism to ensure thatthe number of users reported at the initial detection is not an overestimation. Ifa user flagged as a train user is not handed over to the next cell in the path of thetrain, it is reasonable to believe that the user was indeed mistakenly flagged, orhas just simply stopped using the serivice and should thus no longer be consid-

Page 66: Institutionen för systemteknik - DiVA portalliu.diva-portal.org/smash/get/diva2:560891/FULLTEXT01.pdf · Institutionen för systemteknik ... RAN Radio Access Network RBS Radio Base

48 8 Proactive Admission Control for an Inbound Train

ered for LC.

To better understand the chronology of signalling in the scheme, here is an exam-ple of an ideal scenario. Consider the case of cell A, B and C with track runningthrough them in alphabetical order. The notifying distance is set to two. A trainis detected by a detection scheme in cell A, and n users are flagged as train users.A then reports to the network that n train users have been detected and are mov-ing towards cell B. The network notifies cell B and C, who lower their respectiveadmission thresholds by P n, and B prepares for counting in train users. Han-dovers of users flagged as train users are being detected from A to B, and B startsthe trainAdmissionPeriod timer and starts counting. When the timer runs out, Bhas counted n-2 train users and reports to the network that n-2 train users aremoving towards C. C is notified, adjusts its admission threshold offset to C(n− 2)and prepares for counting in users. The thresholdAdjustmentPeriod has now runout in B, and B removes the offset from its admission threshold, returning LCin the cell to normal. The train starts handing over to C, where the lowered ad-mission threshold has resulted in enough free resources to receive the train userswithout the need for further LC measures.

Parameters of Interest

The amount of power allocated per incoming train user, P , could be cell-wisecustomized to fit the context and desired properties of the cell in which it isapplied. This customization could be done dynamically over time through theanalysis of statistics on the average power consumption of train users in the cellover time. Since the track direction and location with relation to the RBS is likelyto be constant for each occasion the train enters the cell, it is probable that theradio propagation environment for a train user in the cell will also be similarbetween different occurrences, allowing for a good prediction of the expectedvalue of the downlink power needed per connection. Another way to look atthe value of P is as a parameter determining to what extent train users are givenpriority over macro users in the cell. This means that an operator could set this P,or a multiplier on a dynamically updated P value, in order to received a desiredvalue of train user priority for a given cell.

The two timers, thresholdAdjustmentPeriod and trainAdmissionPeriod couldalso benefit from cell-wise customization. The first of the two, thresholdAd-justmentPeriod, decides for how long a given admission threshold adjustmentshould be kept after a notification has been received. This means that it shouldnot be too large, since that would cause the cell to have an unnecessarily low ad-mission threshold for a period of time, resulting in users being blocked in vain.A too small value of the thresholdAdjustmentPeriod would on the other handrisk that the admission threshold is reset, even though there is indeed an incom-ing train. It can be understood from the design of the scheme that in the idealsituation, the thresholdAdjustmentPeriod for a given notification from a givencell should be the maximum time that it would take for the train to travel fromone point of notification to the next. Just like with C, this is likely to be simi-lar over time for reports between the same cells, and could thus be customized

Page 67: Institutionen för systemteknik - DiVA portalliu.diva-portal.org/smash/get/diva2:560891/FULLTEXT01.pdf · Institutionen för systemteknik ... RAN Radio Access Network RBS Radio Base

8.3 Simulation Setup 49

dynamically.

In the case of trainAdmissionPeriod, the value of the timer should be approxi-mately equal to the maximum time that it takes from the first to the last handoverof train users for a given train, which depends on the length and speed of thetrain. Given that the minimum speed and maximum length that a train enteringthe cell could have, this could also be automatically customized to meet the needsof the cell where it is deployed.

The last parameter is the Notification Distance. This number indicates the max-imum number of cells ahead, by means of railroad track, of the reporting cellwhich are notified to start lowering their admission threshold when a report isissued. As previously mentioned, the time it takes for a cell to free a certainamount of resources by only the use of admission control is dependant on thedeparture rate of users in the cell, and the distribution of their consumed powerper user. If the average power consumption of a macro user in the cell is pM , theaverage power required per train user when it enters the cell is pT , and the depar-ture rate is µ, then the time in advance needed in order to prepare the cell for atrain carrying n users will be:

t =npTµpM

The ideal value of the Notification Distance for a given cell is thus dependent onthe speed of the incomming train and the length of track in the coverage area ofthe cells before it. If this is known, and t can be calculated as above with pT , pMand µ taken from statistical analysis as was described for P above, then the idealNotification Distance could be estimated.

8.3 Simulation Setup

For simulation of the suggested scheme, a somewhat simplified scenario will bedeployed. Since a method of detecting a train in the manner described in thischapter has not yet been implemented in the simulator, train users will be au-tomatically flagged as train users, and Train Reports will only be triggered onhandover. All parameters are set to approximate constant values, and are set tothe following values;

• P = 0.3 = mean downlink power per cell at capacity limitmean nr of users per cell at capacity limit + an offset

• Notify Distance= 3 With 40 users on the train, an average power per user of0.18 (from the capacity study), an average departure rate per cell of 1.5 anda P as above, this gives us the notification time t = 40 · 0.3

1.5 · 0.18 . With a speedof 35 m/s, the train travels approximately three times 450 meters, which isthe distance travelled in each cell cell in the simulation setup.

• thresholdAdjustmentPeriod = 15 s = distance travelled in each cellspeed of train + an offset

• trainAdmissionPeriod = 8 s = length of trainspeed of train + an offset

Page 68: Institutionen för systemteknik - DiVA portalliu.diva-portal.org/smash/get/diva2:560891/FULLTEXT01.pdf · Institutionen för systemteknik ... RAN Radio Access Network RBS Radio Base

50 8 Proactive Admission Control for an Inbound Train

The scheme will be applied together with the fairness scheme for congestion ac-tion presented in last chapter, applied on both the proportional fairness and high-est link power schemes. The result will be compared to the default scenario from6 based on the metrics from both of the previous two studies.

8.4 Simulation Results

Figure 8.1: Train’s impact on Cell DL Power in green site, cell 1 using proac-tive LC

800 850 900 950 10000

5

10

15

20

25

Time (s)

Cell

DL P

ow

er

(W)

Figure 8.1 depicts the DL cell power load using proactive AC. A quick scan veri-fies that the algorithm works correctly in terms of not blocking train users duringhandover. Although admitting all train users, the power load in the example celldoes not exceed any congestion levels - perhaps only barely touching the 15 W-mark. Power upsurges are still present in conjunction with train presence.

In figure 8.2 the number of users in a cell is exemplified. It shows similar resultsas the train effects analysis except for one noteworthy difference - the number ofusers in the cell sink prior to the train’s cell entry. In the fourth period of the trainfor example the number of users has sunk with about 20 users.

Table 8.1: Results of QoS Metrics

User Type Satisfaction Drop Rate Number of BlocksMacro Users 98% 1% 197Train Users 83% 2% 0

Table 8.1 covers the QoS metrics using proactive AC. Although the macro group

Page 69: Institutionen för systemteknik - DiVA portalliu.diva-portal.org/smash/get/diva2:560891/FULLTEXT01.pdf · Institutionen för systemteknik ... RAN Radio Access Network RBS Radio Base

8.5 Conclusions 51

Figure 8.2: Train’s impact on number of users in green site, cell 1 usingproactive LC

800 850 900 950 10000

10

20

30

40

50

60

70

80

90

100

Time (s)

Num

ber

of

Users

in C

ell

and train group still witness unfair satisfaction levels, it is a clear improvementfrom the default case. Drop rates have not had a significant change but reasoningsuggests that lower drop rates using proactive DA is more likely than the defaultscenario as the results may suggest. Nonetheless, in the case of drop rates, far toofew samples were obtained to allow for lengthy discussions on drop rates. Thenumber of blocks, however, show to be somewhat of an interesting case. Firstly,considering train users, zero blocks are as expected since proactive AC switchesnormal AC off for train users upon HO request. A puzzling result is that of 197blocks for macro users since intuitively, a lowering of admission threshold inadvance should increase number of blocked users.

8.5 Conclusions

Comparing the results of this experiment with the default case in 6, the situationfor train users’ QoS have distinctly improved while not having had any distincteffects on macro users that were quite satisfied to begin with.

Considering DL power levels, trains still cause upsurges in the proactive AC case;however, the upsurges occur in a more controlled fashion as the proactive lower-ing of AC threshold aids to keep the power from passing congestion levels. Aninteresting reflection is that the relative increase is somewhat the same in bothcases. Consider the case in the default train scenario in figure 6.1 in section 6where the high density of blockin occurs. Prior to the power rush, the cell power

Page 70: Institutionen för systemteknik - DiVA portalliu.diva-portal.org/smash/get/diva2:560891/FULLTEXT01.pdf · Institutionen för systemteknik ... RAN Radio Access Network RBS Radio Base

52 8 Proactive Admission Control for an Inbound Train

level lies somewhere around 12 W increasing to somewhere around 22.5 W in thepeak - an increase of 87.5%. In the proactive case it rises from around 8 W to 14.5W - corresponding to an increase of 81.25%. Although no concrete conclusionscan be drawn from this one example it is interesting to note that the size of powerrushes could be closely linked to the initial value.

Worth noting is the cost of admission threshold in terms of number of users in thesystem. Comparing the number of users in a cell provides some indication thatproactive AC marginally lowers the number of users the cell can handle which isprobably expected in conjunction with a lower threshold.

One factor aggravating the facility of drawing conclusions is that of the opposingforces. In section 6.4 it was shown that the number of users in a cell tended toclimb when the train was not present; however, in proactive load control the ad-mission threshold is reduced between train periods effectively limiting the num-ber of users accepted in to the network. Also, it was shown that the number ofusers in the cell sank when the train was present; however, once the train hasentered a cell that admission threshold is reset to its default and initial value ef-fectively being able to admit more users. That these factors are in direct conflictwith one another makes analyses difficult.

Page 71: Institutionen för systemteknik - DiVA portalliu.diva-portal.org/smash/get/diva2:560891/FULLTEXT01.pdf · Institutionen för systemteknik ... RAN Radio Access Network RBS Radio Base

9Detection of a High-speed Train

As was shown in the previous chapter, there are benefits to be made with regardto QoS in a system from knowing when a train will arrive into a cell, how manyusers it carries, and which connections belong to users on-board the train.

9.1 Introduction

As a part of this thesis, a method for performing this detection and and identifi-cation has been developed and some brief simulations have been carried out totest its validity. However, at the time of writing this method is involved in the ap-plication for a patent, and details can thus not be disclosed in this thesis. Whenthe document becomes available, the interested reader could refer to Ericssoninternal patent application ID P37758.

To motivate the feasibility of previous steps taken in this thesis depending onthis identification, a brief overview of the concept of the detection scheme willbe presented in this chapter.

9.2 Characteristic Velocity Profile

As has been previously noted, one of the central characteristics of a train fromthe point of view of a RAN is that it is a group of users travelling at a high speedthrough the service area of a cell. This speed can also be assumed to be approx-imately equal for all users on the train, and directed in approximately the samedirection at a given point in time. Since, as has previously been motivated, anaveragely sized train in a cell is likely take up a sizeable portion of the total num-ber of users in the cell, this would mean that a train moving through a cell would

53

Page 72: Institutionen för systemteknik - DiVA portalliu.diva-portal.org/smash/get/diva2:560891/FULLTEXT01.pdf · Institutionen för systemteknik ... RAN Radio Access Network RBS Radio Base

54 9 Detection of a High-speed Train

produce a shift in the profile over all user velocities in the cell.

Velocity measurements are already done in the RBS for usage in estimation ofhandover parameters. If these measurements were to be utilized in order to cre-ate and store a statistical profile over UE velocities in the cell over a longer periodof time, shorter term deviations from this profile could be used to detect a trainmoving through the cell. The users corresponding to the velocities causing thisdeviation could also be flagged as train users for the purpose of utilization inschemes described in previous chapters of this thesis.

Page 73: Institutionen för systemteknik - DiVA portalliu.diva-portal.org/smash/get/diva2:560891/FULLTEXT01.pdf · Institutionen för systemteknik ... RAN Radio Access Network RBS Radio Base

Part III

Final Remarks andSupplementary Material

Page 74: Institutionen för systemteknik - DiVA portalliu.diva-portal.org/smash/get/diva2:560891/FULLTEXT01.pdf · Institutionen för systemteknik ... RAN Radio Access Network RBS Radio Base
Page 75: Institutionen för systemteknik - DiVA portalliu.diva-portal.org/smash/get/diva2:560891/FULLTEXT01.pdf · Institutionen för systemteknik ... RAN Radio Access Network RBS Radio Base

10Final Remarks

In this chapter reflections and insights are provided and overall conclusions aredrawn. Moreover, future steps to be taken following this thesis work are sug-gested.

10.1 Conclusion

The central positive aspect of this study is that it shows that it is possible to utilizeproperties of a high-speed train to facilitate RRM without additional hardware.The study’s main drawback is that it does not quantify to what extent QoS metricscan be improved with statistical confidence.

Although not being simulated, velocity measurements seem promising as a methodto detect and classify users at high speed.

Proactive load control showed promising results and expected behaviour, espe-cially with regard to dropping numbers of cell users prior to the train’s cell entry.Higher QoS were obtained without performing actual congestion control in thetraditional sense, thereby retaining high quality for served users, but balancing itoff with lowering the number of users in the cell through blocking of new users.

Regarding the different CC schemes that were to take into account fairness be-tween groups of users, the study provided no conclusive results. The number ofsamples were far too few to make an informed judgement on the schemes’ impact.However, the design of the method is such that fairness should be guaranteedover time with a proper implementation.

57

Page 76: Institutionen för systemteknik - DiVA portalliu.diva-portal.org/smash/get/diva2:560891/FULLTEXT01.pdf · Institutionen för systemteknik ... RAN Radio Access Network RBS Radio Base

58 10 Final Remarks

10.2 Discussion and Future Work

Due to the promising preliminary results of this study, a more extensive study iswarranted to statistically determine potential QoS benefits. Both longer simula-tions and number of simulations are necessary to not only gather more samplesper simulation, but also to get these verified through independent simulationruns.

The schemes for reporting the arrival of, and predicting the load carried by a trainis simulated with rough estimations of the involved parameters. Suggestions ofhow these parameters could be better estimated, and updated dynamically by thesystem are formulated in the respective chapter. Actual methods for this shouldbe implemented and simulated to see the full capability of the train predictionscheme. It would also be of interest to study ways to further utilize the knowledgegained from the detection and reporting scheme suggested in this thesis, such asbetter estimations of HO parameters for train users, down-switching of usersbefore train entrance to free up resources on a short term etc.

It would naturally also to be of interest to implement and study the effective-ness of the outlined detection scheme, both stand-alone and in combination withthe other components of train associated RRM suggested in this thesis. Possibleimplementation issues which are probable to follow from this is the question ofhow often the train needs to be detected by the detection scheme. The problem ofparallelizing the detection and flagging of train users in a scenario where severaltracks are running through the same cell would also be of interest.

A lesson to learn from this thesis if continuous studies are to be carried out in thesame area is that the simulation scenario is a difficult scenario to simulate, andthe deployment chosen for this thesis may not be optimal for the goal pursued.In order to have a more isolated simulation environment, a wiser deploymentstrategy could be to simply lay out cells in a straight line and run a train throughthis to obtain more confined effects of blocking and congestion actions. Confinedeffects in this case implies that events such as HO blocking would lead to imme-diate dropping as opposed to the potential case in this thesis scenario where atrain user could be blocked but not dropped by clinging on to base stations fromneighbouring cells. Such a scenario would also be likely to be less complex andthus less time consuming to run lengthy simulations in.

Page 77: Institutionen för systemteknik - DiVA portalliu.diva-portal.org/smash/get/diva2:560891/FULLTEXT01.pdf · Institutionen för systemteknik ... RAN Radio Access Network RBS Radio Base

AAppendix

This is an appendix chapter containing supplementary data and background ma-terial to the thesis report.

A.1 Signal Propagation and Networks

This appendix section provides a theoretical approach to radio networks for theinterested lacking the pertinent background.

A.1.1 Signal Propagation

In today’s information age, wireless signalling forms an integrated part of manyparts of society ranging from small-scale and short distance communication suchas mobile data file transmission via Bluetooth® to large-scale over long distancessuch as satellite and terrestrial digital TV transmissions. Mobile phone commu-nication occur within licensed parts of the EM spectrum and signal interferenceis thus generally limited to devices using same spectral frequencies.

Signals used for communication means will encounter various forms of distur-bances in the transmission from point A (transmitter) to point B (receiver). Natu-ral signal strength loss due to dissipating energy from point of origin to destina-tion passing through open media colliding with other signals results in free-spacepropagation loss. Signals will further attenuate when passing through denser me-dia and diffract and reflect when hitting media at a certain critical angle.

Other forms of destructive behaviour can be the results of man-made structuressuch as buildings and other infrastructure that enable multiple paths, with vary-ing degrees of interdependence, of the same signal to propagate to an end-user.Multipath propagation can interfere with one another during transmission and

59

Page 78: Institutionen för systemteknik - DiVA portalliu.diva-portal.org/smash/get/diva2:560891/FULLTEXT01.pdf · Institutionen för systemteknik ... RAN Radio Access Network RBS Radio Base

60 A Appendix

slight shifts in relative distances travelled, causing relative signal-phase differ-ences, can cause either constructive or destructive interference - resulting in ei-ther signal amplification or attenuation.

A.1.2 Radio links

For mobile communication, a two-way communication system is common (as op-posed to one-way digital TV broadcasting) and a radio base station (RBS) and userequipment (UE) take on the rolls as both transmitters and receivers. Communica-tion from the RBS to the UE is referred to as downlink (DL) communication andfrom the UE to the RBS as uplink (UL) communication. Propagation effects com-mon to mobile communication are those related to the signal propagation effectsinduced when either transmitter and/or receivers are in motion. A transmitterthat is in motion will cause a shift in the frequency (known as the Doppler effect)and since reflecting obstructions in the transmission from transmitter to receivercan be in motion also, different paths of the signal can have varying Dopplershifts. The differences in Doppler shifts from the multiple paths of a signal com-prise the Doppler spread.

When extending how single communication links occur, as described in A.1.1,to how multiple users can use and share common wireless resources for com-municating means, radio access networks (RAN) come into play. RANs mainlycover the network architecture from UEs to RBSs and thus form a subsystem ofan entire telecommunication system that also includes integral aspects such as awired core network (CN). This rest of this section presents the key issues in suchwireless architecture and how cellular concepts achieves high degree of utility offundamental limiting factors.

A.1.3 Radio Networks

There are several limiting factors to take into consideration for a RAN. Factorswith substantial effects are (the somewhat evident) available spectrum and max-imum RBS transmit power. Since licensed frequencies are internationally regu-lated and therefore cannot be increased, efficient usage of the shared bandwidthis sought after. Also, since RBS power transmission levels cannot be of unreason-able high values due to health issues and/or hardware economics, efficient usageof available transmit power is also sought after. Two keys issues that need to beaddressed in designing wireless systems are to balance coverage with range, andcapacity with interference.

Coverage deals with battling with propagation effects to achieve acceptable levelsof signal strength in the geographical area surrounding the RBS. This usuallyplaces a lower limit on the number of RBSs a service area entails - RBSs placedtoo far apart will result in patches of areas where no RBS is able to cover the areawith acceptable signal strength. With such requirements, RBS ranges may varyin any direction giving rise to highly irregular cell coverage shapes. Coverageareas also tend to overlap considerably where UEs in overlapping regions may beserved by multiple RBSs, depending on the service in question.

Page 79: Institutionen för systemteknik - DiVA portalliu.diva-portal.org/smash/get/diva2:560891/FULLTEXT01.pdf · Institutionen för systemteknik ... RAN Radio Access Network RBS Radio Base

A.1 Signal Propagation and Networks 61

Capacity on the other hand deals with attempting to handle a certain number ofUEs within a coverage area. The more RBSs deployed, the less an issue coveragearea becomes within a service area but instead, interference becomes an issue.This is a general problem for systems where the number of transmitters relativeto available bandwidth is large. The more simultaneous users in a network, themore interference is induced and thereby increases distortion to wanted signals.

Although RBSs’ coverage areas vary as shown in Figure 2.3, service area modelsought to be composed of a series of coverage areas that have regions of identi-cal shape and size without overlap - a concept known as tesselation. Althoughcircles are intuitively suitable models for uniform propagation loss surroundingan RBS, they do not allow for tesselation. It can be shown that, if restricted toregular polygons, hexagons are suitable models as they allow for tesselation andapproximate a circle well in both area and size as is exemplified in Table A.1.

Table A.1: Comparison of Regular Hexagons and Circle Properties

Property Hexagon (H) Circle (C) H/C RatioPerimeter (P) 6R 2πR 0.9549

Area (A) 3√

32 R2 πR2 0.827

P/A Ratio 4√3R

2R 1.1547

Radio base stations conventionally consist of multiple directional antennas thattogether encompass the area surrounding the RBS. This sectoring is commonlythree-directional where three antennas cover a 120 deg region. Figure A.1 depictsthis scenario with an RBS’s coverage area consisting of three cells. The figure alsoillustrates, through dotted lines and faded RBSs, how RBSs can equally be viewedas being at the center of each hexagon in question. It is worth noting that an RBSis associated with multiple cells and that a cell is associated with multiple RBSs.

Primitive mobile telephony networks consisted of RANs served by a single RBSwith one coverage area. These generally covered a larger city (compare FigureA.1 to the size of such a city), and due to harsh environmental conditions, verylarge signal powers were required to be transmitted by the RBSs to reach distantUEs at acceptable levels. Moreover, bandwidth limitations capped the maximumnumber of users the RAN could serve simultaneously. [Ahlin et al., 2006]

Modern mobile communication networks overcome this issue by dividing a RANinto a series of neighbouring cells. This allows for a RAN to achieve high ca-pacity and increased coverage for an individual cell. Depending on the accesstechniques used (e.g. TDMA, FDMA, CDMA) the type and extension of interfer-ence will vary in the DL and UL both within a cell and between cells. TDMA andFDMA schemes overcome inter-cell interference by using a subset of frequencieswithin a cell and circumvented with cells using mutually exclusive subsets offrequencies. CDMA schemes transmit at all available frequencies but overcomeinter-cell interference by using subsets codes assigned to individual UEs for moredetail.

Page 80: Institutionen för systemteknik - DiVA portalliu.diva-portal.org/smash/get/diva2:560891/FULLTEXT01.pdf · Institutionen för systemteknik ... RAN Radio Access Network RBS Radio Base

62 A Appendix

Figure A.1: Basic cell deployment with three-directional cell sectoring

120°

120°

120°

Page 81: Institutionen för systemteknik - DiVA portalliu.diva-portal.org/smash/get/diva2:560891/FULLTEXT01.pdf · Institutionen för systemteknik ... RAN Radio Access Network RBS Radio Base

A.1 Signal Propagation and Networks 63

Figure A.2: Example of symmetric cellplanning with K = 3 channel subsetsand reuse distance D = 3R

1

Figure A.2 depicts how the reuse technique can be applied to cell planning. Nocell using a certain subset is surrounded by a cell using the same subset regard-less of multiple access technique. The base stations are placed in the center ofhexagons merely for ease of comprehension.

A.1.4 WCDMA

This section provides a background on the radio access technology for third gen-eration mobile communications. It covers WCDMA, the spread-spectrum tech-nique used in UMTS networks, and description of the architecture and interfacesrelevant to this thesis.

Direct-Sequence Code Division Multiple Access (DS-CDMA) is the multiple ac-cess technique behind WCDMA, where user signals are spread across a widebandwidth of about 5 Mhz as opposed to 1 Mhz wide DS-CDMA systems com-monly referred to as narrowband as in the IS-95 standard. The spreading isperformed by multiplying user data with higher bandwidth demanding quasi-random signals (so-called chips) and leading to benefits such as increased capac-ity and multipath diversity.

Although supporting both frequency division duplex (FDD) and time divisionduplex (TDD), WCDMA uses FDD for separating DL and UL - each assigned a5 Mhz band. WCDMA transmits frames of 10 ms duration to each user, duringwhich the data rate is kept at a constant.

Page 82: Institutionen för systemteknik - DiVA portalliu.diva-portal.org/smash/get/diva2:560891/FULLTEXT01.pdf · Institutionen för systemteknik ... RAN Radio Access Network RBS Radio Base

64 A Appendix

Since all users being served by a certain RBS will share the entire available spec-trum simultaneously the division of users is performed by spreading each user’sdate with a unique channelization code. In order to mitigate interference betweenneighbouring cells with users bearing the same channelization code, a higherlevel of scrambling is done to all signals from a certain RBS. This does not al-ter the chip rate resultant of the spreading and each RBS can independently ofother RBSs in the vicinity assign channelization codes to its users. These two arecovered in slight more detail below and their relationship is illustrated in FigureA.3.

Figure A.3: Relation between spreading and scrambling

DATA

channelization

code

scrambling

code

Bit Rate Chip Rate Chip Rate

Channelization codes are picked from a code tree consisting of codes generatedby the Orthogonal Variable Spreading Factor (OVSF) technique which allowsspreading factors and orthogonality to be maintained. Since these codes serveto distinguish signals originating from a single source, orthogonality is impera-tive in order to avoid interference in the DL. As the codes become longer, thespreading increases and thus the number of codes are fundamentally limited tonot spread data wider than the assigned bandwidth for transmission.

In the UL, channelization is used to separate a UE’s physical data from controldata and in the DL it is used to separate UEs from one another.

The beginning of the channelization code tree is depicted in Figure A.4 wherethe branches stemming from a certain code c, are the concatenations of (c, c) and(c,−c).

Figure A.4: Start of the channelization code tree(1)

(1,1) (1,-1)

(1,1,1,1) (1,1,-1,-1) (1,-1,1,-1) (1,-1,-1,1)

Page 83: Institutionen för systemteknik - DiVA portalliu.diva-portal.org/smash/get/diva2:560891/FULLTEXT01.pdf · Institutionen för systemteknik ... RAN Radio Access Network RBS Radio Base

A.1 Signal Propagation and Networks 65

As channelization is used in the DL to separate UEs from one another within acell, scrambling is used to separate RBSs from one another within a RAN. In theUL, UEs are separated using different scrambling codes within a cell.

Scrambling codes are broked into either short or long codes. Where as short codesderive from the extended S(2) code family, the long codes are Gold codes. In theUL both code types are used but in the DL solely long (Gold) codes are used andlimited to 512 codes due to an otherwise excessive cell search procedure. Scram-bling codes are allocated to RBSs during cell planning but is a trivial task due tothe high number of available codes. Secondary level scrambling is also possible inthe DL further increasing capacity by using more directive and adaptive antennaswithout worrying of code limitations. Nonetheless, orthogonality is degraded inthe DL if users are evenly allocated and shared by two different scrambling codes.If a secondary scrambling code needs to be used then only those exceeding theprimary scrambling code should adopt the second one.

A.1.5 UMTS Networks

This section covers parts of UTRAN in more detail for the interested reader.

Elements

The ME radio terminal is responsible for the radio communication over the Uuinterface to the UTRAN. It communicates both data and control information withone or several RBSs.

The RBSs are responsible for converting the data flow from the UE to the RNC.It also participates in some limited radio resource management, regulating loadfor its respective sectors. The RBSs performs signal processing, mainly channelcoding and interleaving, spreading, et cetera.

Further up the hierarchy, the RNC functions as the access point (AP) for all ser-vices that the UTRAN is to provide the CN. One RNC together with its associatedRBSs are commonly referred to as a radio network sub-system (RNS). Within anRNS, the RNC owns and controls the RBSs in its domain and manages the relatedRRM. It is the RNC that is ultimately responsible for the load in its coverage areaand thereby executes the load control mechanisms and code allocation for radiolinks being set up in those cells. Other RRM functionality performed by the RNCincludes mapping of the QoS-related radio access bearer parameters from the CNonto air interface transport channel parameters.

Interfaces

The Uu interface is the WCDMA radio interface over which the UE communicateswith the UTRAN and considered one of the most important open interfaces inthe UMTS network. The open standard entails that UEs and UTRANs can beindependently produced by different manufacturers, primarily having driven upmany more UE manufacturers than manufacturers of fixed network elements inthe UTRAN.

Page 84: Institutionen för systemteknik - DiVA portalliu.diva-portal.org/smash/get/diva2:560891/FULLTEXT01.pdf · Institutionen för systemteknik ... RAN Radio Access Network RBS Radio Base

66 A Appendix

The Iub interface connects an RNC with its children RBSs. As opposed to sec-ond generation mobile telephony (such as GSM), the UMTS network is the firstcommercial network to have a fully open interface between RBSs and RNCs. Thesignalling Iub interface, called the Node B Application Part (NBAP), are dividedinto a common and a dedicated NBAP. The overall difference between the twois that the common NBAP deals with signalling not related to one specific UEwhile the dedicated NBAP deals with the contrary aspect. Reporting of measure-ments is thus signalled across both components - the common NBAP coveringmeasurements related to the cell and RBS as a whole while the dedicated reportsmeasurements for specific radio links.

Finally the Iur interface covers the RNC to RNC signalling. It initially solelyserved to allow soft handover between RNCs but has been extended with threeadditional features since its first release. One pertinent feature is the support forglobal resource management. The Iur global resource module offers functions fortransfer of cell measurements and RBS timing information between two RNCs.

A.1.6 Quality of Service

QoS for a given user will be maintained by considering a set of QoS attributescustomized for the traffic class in question. A specific set of QoS attributes iscalled a QoS profile which can be requested by either the UE application or bythe UE itself if no specific profile is requested by the application. The attributesthemselves generally specify and describe the service requested through a set ofparameters. For a run-through on all available attributes we convey the reader toAppendix X - here we briefly present attributes pertinent to the study.

Maximum Bitrate (kbps) provides the upper bitrate limit on the amount theuser or application may provide or receive. The rate can facilitate reserva-tion of code resources in the downlink.

Guaranteed Bitrate (kbps) provides the bitrate that the bearer service guaran-tees the user or application. Admission Control may use this attribute to fa-cilitate admission of a user into a network relating it to available resources.

Allocation/Retention Priority (ARP) provides a priority scheme based on therelative importance for the different barriers within a class. The ARP at-tribute is not negotiated between the UE and the RAN but rather ascribedby the SGSN or the GGSN. An enhancement of the ARP is the Evolved Al-location/Retention Priority which increases the range of priority values fromthree to 15. Also, it bears information on the pre-emption capabilities ofthe bearer which describes whether a lower priority bearer can be droppedfrom the system to free up the required resources.

For the Conversational class, traffic is assumed to be relatively non-bursty butdespite this bitrate may vary all the same. The UMTS is required to achieve abitrate matching at the minimum the guaranteed bitrate and not exceeding themaximum bitrate. These values are used facilitating resource allocation in theUMTS.

Page 85: Institutionen för systemteknik - DiVA portalliu.diva-portal.org/smash/get/diva2:560891/FULLTEXT01.pdf · Institutionen för systemteknik ... RAN Radio Access Network RBS Radio Base

A.2 Capacity Determination Data 67

A.2 Capacity Determination Data

In this section we present the raw data to the Capacity Determination part of thethesis. This study served to provide a suitable arrival rate for which the QoS wasaround the capacity limit of 95%.

Arrival Rate [users/s] 6Number of Cells Tot, Users Users/Cell

9 360 40Mean Call Duration [s] LogStart LogEnd Samples

60,00 360 860 3000Satisfaction Active Users DL Power Samples

Cell 1 0,9868 48,77 5,8101 380Cell 2 0,9972 49,18 4,4378 353Cell 3 0,9797 50,44 5,7037 394Cell 4 0,9972 46,13 4,2144 354Cell 5 0,9788 51,06 5,0246 378Cell 6 1,0000 50,47 3,8224 376Cell 7 0,9785 51,27 5,0966 372Cell 8 0,9921 43,61 3,5787 381Cell 9 0,9886 52,36 5,1807 350

Average 98,88% 49,25 4,76 371

Arrival Rate [users/s] 8Number of Cells Tot, Users Users/Cell

9 480 53Mean Call Duration [s] LogStart LogEnd Samples

60,00 480 855 3000Satisfaction Active Users DL Power Samples

Cell 1 0,9588 54,59 7,4985 340Cell 2 0,9923 70,18 6,6871 391Cell 3 0,9832 70,89 6,6876 416Cell 4 0,9972 48,87 6,0581 358Cell 5 0,9746 60,85 6,1385 394Cell 6 0,9874 64,22 4,3467 397Cell 7 0,9845 62,92 8,8417 386Cell 8 0,9840 61,33 5,0405 374Cell 9 0,9682 56,19 7,5048 377

Average 98,11% 61,11 6,53 381

Page 86: Institutionen för systemteknik - DiVA portalliu.diva-portal.org/smash/get/diva2:560891/FULLTEXT01.pdf · Institutionen för systemteknik ... RAN Radio Access Network RBS Radio Base

68 A Appendix

Arrival Rate [users/s] 10Number of Cells Tot, Users Users/Cell

9 600 67Mean Call Duration [s] LogStart LogEnd Samples

60,00 600 900 3000Satisfaction Active Users DL Power Samples

Cell 1 0,9721 80,44 8,5646 358Cell 2 0,9884 71,65 8,8671 346Cell 3 0,9728 81,69 9,2371 404Cell 4 0,9882 66,87 9,0185 340Cell 5 0,9779 81,68 8,8982 362Cell 6 0,9786 76,87 6,1831 374Cell 7 0,9702 71,15 11,8919 336Cell 8 0,9699 71,66 5,7699 365Cell 9 0,9790 67,56 9,2576 334

Average 97,75% 74,40 8,63 358

Arrival Rate [users/s] 11Number of Cells Tot, Users Users/Cell

9 660 73Mean Call Duration [s] LogStart LogEnd Samples

60,00 660 933 3000Satisfaction Active Users DL Power Samples

Cell 1 0,9759 79,88 12,5930 374Cell 2 0,9655 83,65 7,9206 377Cell 3 0,9700 83,76 12,3929 400Cell 4 0,9830 77,33 8,8245 353Cell 5 0,9835 79,93 10,9047 363Cell 6 0,9787 89,70 6,2454 376Cell 7 0,9544 85,25 11,2748 373Cell 8 0,9771 83,91 7,4544 349Cell 9 0,9577 85,79 9,9099 378

Average 97,18% 83,25 9,72 371

Page 87: Institutionen för systemteknik - DiVA portalliu.diva-portal.org/smash/get/diva2:560891/FULLTEXT01.pdf · Institutionen för systemteknik ... RAN Radio Access Network RBS Radio Base

A.2 Capacity Determination Data 69

Arrival Rate [users/s] 12Number of Cells Tot, Users Users/Cell

9 720 80Mean Call Duration [s] LogStart LogEnd Samples

60,00 720 970 3000Satisfaction Active Users DL Power Samples

Cell 1 0,9644 80,35 10,6848 337Cell 2 0,9912 87,33 8,3747 340Cell 3 0,9663 94,98 14,4407 356Cell 4 0,9848 82,85 10,3072 330Cell 5 0,9702 90,27 12,3941 336Cell 6 0,9892 94,91 7,0518 371Cell 7 0,9646 86,43 12,9379 339Cell 8 0,9817 84,46 9,3972 327Cell 9 0,9652 90,38 10,0844 345

Average 97,53% 88,00 10,63 342

Arrival Rate [users/s] 13Number of Cells Tot, Users Users/Cell

9 780 87Mean Call Duration [s] LogStart LogEnd Samples

60,00 780 1011 3000Satisfaction Active Users DL Power Samples

Cell 1 0,9554 89,90 19,5753 314Cell 2 0,9689 89,50 13,6554 322Cell 3 0,9641 89,97 19,7400 362Cell 4 0,9813 85,80 14,1464 321Cell 5 0,9606 93,87 16,6065 330Cell 6 0,9760 92,52 12,4093 333Cell 7 0,9349 96,84 17,2457 338Cell 8 0,9430 89,74 14,0318 316Cell 9 0,9427 97,88 15,5204 349

Average 95,85% 91,78 15,88 332

Page 88: Institutionen för systemteknik - DiVA portalliu.diva-portal.org/smash/get/diva2:560891/FULLTEXT01.pdf · Institutionen för systemteknik ... RAN Radio Access Network RBS Radio Base

70 A Appendix

Arrival Rate [users/s] 14Number of Cells Tot, Users Users/Cell

9 840 93Mean Call Duration [s] LogStart LogEnd Samples

60,00 840 1054 3000Satisfaction Active Users DL Power Samples

Cell 1 0,9630 94,08 18,9150 297Cell 2 0,9528 90,03 16,8019 318Cell 3 0,9169 93,45 21,3727 313Cell 4 0,9464 93,45 19,8240 317Cell 5 0,9408 91,81 20,9684 304Cell 6 0,9567 95,57 17,3570 323Cell 7 0,9511 97,94 22,0354 307Cell 8 0,9570 87,27 16,3859 302Cell 9 0,9662 86,28 18,6649 296

Average 95,01% 92,21 19,15 309

Arrival Rate [users/s] 15Number of Cells Tot, Users Users/Cell

9 900 100Mean Call Duration [s] LogStart LogEnd Samples

60,00 900 1100 3000Satisfaction Active Users DL Power Samples

Cell 1 0,9043 92,17 22,0435 282Cell 2 0,9483 86,79 18,4942 290Cell 3 0,9199 94,45 22,0152 312Cell 4 0,9345 89,87 18,7127 275Cell 5 0,9138 88,67 21,8355 290Cell 6 0,9420 89,49 17,5720 293Cell 7 0,9296 91,04 21,4268 284Cell 8 0,9371 89,21 16,0107 302Cell 9 0,9030 92,95 21,5357 299

Average 92,58% 90,52 19,96 292

Page 89: Institutionen för systemteknik - DiVA portalliu.diva-portal.org/smash/get/diva2:560891/FULLTEXT01.pdf · Institutionen för systemteknik ... RAN Radio Access Network RBS Radio Base

A.2 Capacity Determination Data 71

Figure A.5: Users’ demand of Cell DL Power with varying arrival rates. Ar-rival rate 13 reaches power limit without exceeding.

0

20

40Arrival rate: 10

0

20

40Arrival rate: 11

0

20

40Arrival rate: 12

0

20

40Arrival rate: 13

0

20

40Arrival rate: 14

0

20

40Arrival rate: 15

Dow

nlin

k P

ow

er

(W)

Time (s)

Page 90: Institutionen för systemteknik - DiVA portalliu.diva-portal.org/smash/get/diva2:560891/FULLTEXT01.pdf · Institutionen för systemteknik ... RAN Radio Access Network RBS Radio Base

72 A Appendix

Page 91: Institutionen för systemteknik - DiVA portalliu.diva-portal.org/smash/get/diva2:560891/FULLTEXT01.pdf · Institutionen för systemteknik ... RAN Radio Access Network RBS Radio Base

Bibliography

3GPP. Quality of service (qos) concept and architecture. Technical report, 3GPP,2011. Cited on page 17.

Ericsson AB. Internal ericsson documents. Internal confidential papers and doc-umentation. Not cited.

Lars Ahlin, Jens Zander, and Ben Slimane. Principles of Wireless Communica-tions. Narayana Press, first edition, 2006. Cited on pages 9 and 61.

Carlo Bruni, Francesco Delli Priscoli, Giorgio Koch, and Ilaria Marchetti. Re-source management in network dynamics: An optimal approach to the admis-sion control problem. Computers and Mathematics with Applications, 50:305–318, 2010. Not cited.

Choong Ming Chin, Moh Lim Sim, and Sverrir Olafsson. Predictive call admis-sion control algorithm for power-controlled wireless systems. ADHOC-NOW,pages 414–427, 2006. Cited on page 14.

Erik Dahlman, Stefan Parkvall, Johan Sköld, and Per Beming. 3G Evolution:HSPA and LTE for Mobile Broadband. Academic Press, second edition, 2008.Not cited.

Jamie S. Evans and David Everitt. Effective bandwidth-based admission controlfor multiservice cdma cellular networks. IEEE Transactions on Vehicular Tech-nology, 48(1), 1999. Cited on pages 14 and 27.

Klein S. Gillhousen, Irwin M. Jacobs, Roberto Padovani, Andrew J. Viterbi, Lind-say A. Weaver, and Charles E. Wheatley III. On the capacity of a cellular cdmasystem. IEEE Transactions on Vehicular Technology, 40(2), 1991. Not cited.

CNN Go. Sydney goes tokyo: Move to ban mobile phonesfrom train carriages. http://www.cnngo.com/sydney/life/sydney-goes-tokyo-move-ban-mobile-phones-train-carriages-739517,June 2011. Cited on page 8.

Fredrik Gunnarsson. Wcdma with railway coverage. 11 2005. Cited on pages 9and 11.

73

Page 92: Institutionen för systemteknik - DiVA portalliu.diva-portal.org/smash/get/diva2:560891/FULLTEXT01.pdf · Institutionen för systemteknik ... RAN Radio Access Network RBS Radio Base

74 Bibliography

Harri Holma and Antti Toskala. WCDMA for UMTS. Wiley and Sons, Inc., thirdedition, 2004. Cited on page 13.

K Ioannou, S Kotsopoulos, and P Stavroulakis. Optimizing the qos of high speedmoving terminals in cellular networks. International Journal of Communica-tion Systems, 16:851–863, 2003. Cited on page 11.

Young-Ho Jung and Yong H. Lee. Scrambling code planning for 3gpp w-cdma sys-tems. Technical report, Korea Advanced Institute of Technology Departmentof EECS, NA. Not cited.

Ouldooz Baghban Karimi, Jiangchuan Liu, and Chonggang Wang. Seamless wire-less connectivity for multimedia services in high speed trains. IEEE Journal onSelected Areas in Communications, 30(4), 2012. Cited on page 15.

Byoung Wan Kim, Sang Lyul Min, Hyun Suk Yang, and Chong Sang Kim. Apredictive call admission control scheme for low earth orbit satellite networks.IEE Transactions on Vehicular Technology, 49(6):2320–2334, 2000. Cited onpages 14 and 15.

Fabio Lattanzi, Giovanni Giambene, Guray Acar, and Barry Evans. Admissioncontrol and handover management for high-speed trains in vehicular geosta-tionary satellite networks with terrestrial gap-filling. International Journal ofSatellite Communications, 28:1–27, 2010. Cited on page 15.

Cheng-Wei Lee, Tsung-Yin Lee, Meng Chang Chen, and Yeali S. Sun. An inte-grated network mobility management and call admission control scheme forinternet access on high-speed trains. Technical report, Institute of InformationScience, Academia Sinica, Taipei, Taiwan, 7 2011. Cited on page 15.

Derong Liu, Yi Zhang, and Sanqing Hu. Call admission policies based on calcu-lated power control setpoints in sir based power-controlled ds cdma cellularnetworks. Wireless Networks, 10:473–483, 2004. Cited on page 14.

Derong Liu, Yi Zhang, and Huaguang Zhang. A self-learning call admission con-trol scheme for cdma cellular networks. IEEE Transactions on Neural Net-works, 16(5), 2005. Cited on page 14.

Liu Liu, Cheng Tao, Jiahui Qiu, and Houjin Chen. An performance study forsectorised antenna based doppler diversity in high-speed railway communica-tions. Radioengineering, 4, dec 2011. Cited on page 9.

Mobile Industry Review. Vodafone cuts dropped calls for virgin trains.http://www.mobileindustryreview.com/2008/04/vodafone_cuts_dropped_calls_for_virgin_trains.html, April 2008. Cited onpage 8.

Emanuel B. Rodrigues, Francisco R. P. Cavalcanti, and Stefan Wändstedt. Con-gestion control for wireless cellular systems with application to umts. InOptimizing Wireless Communication Systems, chapter Four. Springer Sci-ence+Business Media, LLC, 2009. Cited on page 16.

Page 93: Institutionen för systemteknik - DiVA portalliu.diva-portal.org/smash/get/diva2:560891/FULLTEXT01.pdf · Institutionen för systemteknik ... RAN Radio Access Network RBS Radio Base

Bibliography 75

Xionghui Tang, Chengnian Long, Bo Yang, Cailian Chen, and Xinping Guan. Aseamless fast handover scheme based on dual-antenna in gsm-r systems. Tech-nical report, Department of Automation Shanghai Jiao Tong University, 2011.Cited on pages 8 and 13.

Cihan Tepedelenlioglu and Ali Abdi. Estimation of doppler spread and signalstrength in mobile communications with applications to handoff and adaptivetransmissions. Wireless Communications and Mobile Computing, 1:221–242,2001. Cited on page 13.

The European Union. Council directive 96/48/ec of 23 july 1996 on the interop-erability of the trans-european high-speed rail system. Official Journal of theEuropean Communities, 6(235), 1996. Cited on page 7.

Wikipedia. N700 series shinkansen. http://http://en.wikipedia.org/wiki/N700_Series_Shinkansen, May 2011. Not cited.

Mingbo Xiao, Ness B Shroff, and Edwin K P Chong. Distributed admission con-trol for power-controlled cellular wireless ystems. IEEE ACM Transactions onNetworking, 9(6):790–800, 2001. Cited on page 14.

Cui-Qing Yang and Alapati V. S. Reddy. A taxonomy for congestion control algo-rithms in packet switching networks. IEEE Network, 9(4), 1995. Not cited.

Matthew Yglesias. Michael bloomberg won’t solve tom friedman’s problem withdropped calls on the acela. http://www.slate.com/blogs/moneybox/2012/04/18/amtrak_dropped_calls.html, April 2008. Cited on page 8.

Y P Zhang. Practical performance of digital cellular system in mass rapid transitenvironments. International Journal of Communication Systems, 18:143–157,2005. Cited on page 11.

Page 94: Institutionen för systemteknik - DiVA portalliu.diva-portal.org/smash/get/diva2:560891/FULLTEXT01.pdf · Institutionen för systemteknik ... RAN Radio Access Network RBS Radio Base

76 Bibliography

Page 95: Institutionen för systemteknik - DiVA portalliu.diva-portal.org/smash/get/diva2:560891/FULLTEXT01.pdf · Institutionen för systemteknik ... RAN Radio Access Network RBS Radio Base

Upphovsrätt

Detta dokument hålls tillgängligt på Internet — eller dess framtida ersättare —under 25 år från publiceringsdatum under förutsättning att inga extraordinäraomständigheter uppstår.

Tillgång till dokumentet innebär tillstånd för var och en att läsa, ladda ner,skriva ut enstaka kopior för enskilt bruk och att använda det oförändrat för icke-kommersiell forskning och för undervisning. Överföring av upphovsrätten viden senare tidpunkt kan inte upphäva detta tillstånd. All annan användning avdokumentet kräver upphovsmannens medgivande. För att garantera äktheten,säkerheten och tillgängligheten finns det lösningar av teknisk och administrativart.

Upphovsmannens ideella rätt innefattar rätt att bli nämnd som upphovsmani den omfattning som god sed kräver vid användning av dokumentet på ovanbeskrivna sätt samt skydd mot att dokumentet ändras eller presenteras i sådanform eller i sådant sammanhang som är kränkande för upphovsmannens litteräraeller konstnärliga anseende eller egenart.

För ytterligare information om Linköping University Electronic Press se förla-gets hemsida http://www.ep.liu.se/

Copyright

The publishers will keep this document online on the Internet — or its possi-ble replacement — for a period of 25 years from the date of publication barringexceptional circumstances.

The online availability of the document implies a permanent permission foranyone to read, to download, to print out single copies for his/her own use andto use it unchanged for any non-commercial research and educational purpose.Subsequent transfers of copyright cannot revoke this permission. All other usesof the document are conditional on the consent of the copyright owner. Thepublisher has taken technical and administrative measures to assure authenticity,security and accessibility.

According to intellectual property law the author has the right to be men-tioned when his/her work is accessed as described above and to be protectedagainst infringement.

For additional information about the Linköping University Electronic Pressand its procedures for publication and for assurance of document integrity, pleaserefer to its www home page: http://www.ep.liu.se/

© Raoul Joshi and Per Sundström