Atoll RF Planning & Optimisation Software Technical Reference Guide v e r s i o n 2.8.1 AT281_TRG_E1 Technical Reference Guide Contact Information Forsk (Head Office) 7 rue des Briquetiers 31700 Blagnac France Forsk (USA Office) 200 South Wacker Drive Suite 3100 Chicago, IL 60606 USA Forsk (China Office) Suite 302, 3/F, West Tower, Jiadu Commercial Building, No.66 Jianzhong Road, Tianhe Hi-Tech Industrial Zone, Guangzhou, 510665, People’s Republic of China www.forsk.com sales@forsk.com helpdesk@forsk.com +33 (0) 562 74 72 10 +33 (0) 562 74 72 25 +33 (0) 562 74 72 11 Web Sales and pricing information Technical support General Technical support Fax sales_us@forsk.com support_us@forsk.com +1 312 674 4846 +1 888 GoAtoll (+1 888 462 8655) +1 312 674 4847 Sales and pricing information Technical support General Technical support Fax www.forsk.com.cn enquiries@forsk.com.cn +86 20 8553 8938 +86 20 8553 8285 +86 10 6513 4559 Web Information and enquiries Telephone Fax (Guangzhou) Fax (Beijing) Atoll 2.8.1 Technical Reference Guide Release AT281_TRG_E1 © Copyright 1997 - 2009 by Forsk The software described in this document is provided under a licence agreement. The software may only be used/copied under the terms and conditions of the licence agreement. No part of this document may be copied, reproduced or distributed in any form without prior authorisation from Forsk. The product or brand names mentioned in this document are trademarks or registered trademarks of their respective registering parties. About Technical Reference Guide This document is targeted at readers with a prior knowledge of Atoll, its operation and basic functioning. It is not the User Manual for Atoll, and does not teach how to operate and use Atoll. It is a supplementary document containing detailed descriptions of models, algorithms and concepts adopted in Atoll. Therefore, it concerns only the appropriate personnel. Atoll Technical Reference Guide is divided into three parts with each part comprising similar topics. The first part contains descriptions of general terms, entities, ideas and concepts in Atoll that are encountered throughout its use. It is followed by the second part that consists of descriptions of entities common to all types of networks and the algorithms that are technology independent and are available in any network type. Lastly, the guide provides detailed descriptions of each basic type of network that can be modelled and studied in Atoll. © Forsk 2009 AT281_TRG_E1 3 Technical Reference Guide 4 AT281_TRG_E1 © Forsk 2009 Table of Contents Table of Contents 1 1.1 1.1.1 1.1.1.1 1.1.1.2 1.1.1.3 1.1.1.4 1.1.1.5 1.1.1.6 1.1.2 1.1.2.1 1.1.2.2 1.1.2.3 1.1.3 1.1.3.1 1.1.3.2 1.1.3.3 1.1.3.4 1.1.3.5 1.1.4 1.2 1.2.1 1.2.2 1.3 2 2.1 2.1.1 2.1.1.1 2.1.1.2 2.1.1.2.1 2.1.1.2.2 2.1.1.3 2.1.1.3.1 2.1.1.3.2 2.1.1.3.3 2.1.1.3.4 2.1.1.4 2.1.1.5 2.1.1.6 2.1.1.7 2.1.2 2.2 2.2.1 2.2.2 2.2.3 2.2.4 2.2.5 2.2.6 2.2.7 2.2.8 2.2.8.1 2.2.8.2 2.2.8.3 2.2.9 2.2.9.1 3 3.1 © Forsk 2009 Coordinate Systems and Units ....................................................... 27 Coordinate Systems............................................................................................................................... 27 Description of Coordinate Systems .................................................................................................. 27 Geographic Coordinate System.................................................................................................. 27 Datum ......................................................................................................................................... 27 Meridian ...................................................................................................................................... 27 Ellipsoid ...................................................................................................................................... 27 Projection.................................................................................................................................... 28 Projection Coordinate System .................................................................................................... 28 Coordinate Systems in Atoll ............................................................................................................. 28 Projection Coordinate System .................................................................................................... 28 Display Coordinate System ........................................................................................................ 28 Internal Coordinate Systems ...................................................................................................... 28 File Formats ..................................................................................................................................... 29 Unit Codes .................................................................................................................................. 29 Datum Codes.............................................................................................................................. 30 Projection Method Codes ........................................................................................................... 31 Ellipsoid Codes ........................................................................................................................... 31 Projection Parameter Indices...................................................................................................... 32 Creating a Coordinate System ......................................................................................................... 32 Units ....................................................................................................................................................... 32 Power Units ...................................................................................................................................... 32 Length Units ..................................................................................................................................... 33 BSIC Format .......................................................................................................................................... 33 Geographic and Radio Data ........................................................... 37 Geographic Data .................................................................................................................................... 37 Data Type......................................................................................................................................... 37 Digital Terrain Model (DTM) ....................................................................................................... 37 Clutter (Land Use) ...................................................................................................................... 38 Clutter Classes...................................................................................................................... 38 Clutter Heights ...................................................................................................................... 38 Traffic Data ................................................................................................................................. 38 User Profile Environment Based Traffic Maps ...................................................................... 38 User Profile Traffic Maps....................................................................................................... 38 Sector Traffic Maps ............................................................................................................... 38 User Density Traffic Maps..................................................................................................... 39 Vector Data................................................................................................................................. 39 Scanned Images......................................................................................................................... 39 Population................................................................................................................................... 39 Other Geographic Data............................................................................................................... 39 Supported Geographic Data Formats .............................................................................................. 39 Radio Data ............................................................................................................................................. 40 Site ................................................................................................................................................... 40 Antenna ............................................................................................................................................ 40 Transmitter ....................................................................................................................................... 40 Repeater........................................................................................................................................... 40 Remote Antenna .............................................................................................................................. 41 Station .............................................................................................................................................. 41 Hexagonal Design ............................................................................................................................ 41 GSM GPRS EGPRS Documents ..................................................................................................... 41 TRX............................................................................................................................................. 41 Subcell ........................................................................................................................................ 41 Cell Type..................................................................................................................................... 41 All CDMA, WiMAX, and LTE Documents ......................................................................................... 41 Cell.............................................................................................................................................. 41 File Formats .................................................................................... 45 BIL Format ............................................................................................................................................. 45 AT281_TRG_E1 5 Technical Reference Guide 3.1.1 3.1.1.1 3.1.1.2 3.1.1.2.1 3.1.1.2.2 3.1.1.2.3 3.2 3.2.1 3.2.2 3.2.2.1 3.3 3.3.1 3.3.1.1 3.3.1.2 3.3.1.2.1 3.3.2 3.3.3 3.3.3.1 3.4 3.4.1 3.4.2 3.4.2.1 3.5 3.6 3.7 3.8 3.9 3.10 3.11 3.12 3.12.1 3.12.2 3.13 3.14 3.14.1 3.14.1.1 3.14.1.2 3.14.2 3.14.2.1 3.14.2.2 3.14.3 3.14.3.1 3.14.3.2 3.14.4 3.14.5 3.15 3.15.1 3.15.2 3.16 3.16.1 3.16.2 3.17 3.17.1 3.17.1.1 3.17.1.1.1 3.17.1.1.2 3.17.1.1.3 3.17.1.2 3.17.2 3.18 3.18.1 3.18.1.1 3.18.1.1.1 3.18.1.1.2 3.18.1.1.3 3.18.1.2 3.18.2 3.19 6 HDR Header File...............................................................................................................................45 Description ..................................................................................................................................45 Samples ......................................................................................................................................46 Digital Terrain Model..............................................................................................................46 Clutter Classes File................................................................................................................46 BIL File...................................................................................................................................46 TIF Format ..............................................................................................................................................47 TFW Header File...............................................................................................................................47 Sample ..............................................................................................................................................48 Clutter Classes File .....................................................................................................................48 BMP Format............................................................................................................................................48 BMP File Description.........................................................................................................................48 BMP File Structure ......................................................................................................................48 BMP Raster Data Encoding ........................................................................................................50 Raster Data Compression Descriptions.................................................................................50 BPW/BMW Header File Description..................................................................................................51 Sample ..............................................................................................................................................51 Clutter Classes File .....................................................................................................................51 Generic Raster Header File (.wld) ..........................................................................................................51 WLD File Description ........................................................................................................................51 Sample ..............................................................................................................................................51 Clutter Classes File .....................................................................................................................51 DXF Format ............................................................................................................................................52 SHP Format ............................................................................................................................................52 MIF Format .............................................................................................................................................52 TAB Format ............................................................................................................................................52 ECW Format ...........................................................................................................................................53 Erdas Imagine Format ............................................................................................................................53 Planet EV/Vertical Mapper Geographic Data Format .............................................................................54 ArcView Grid Format ..............................................................................................................................54 ArcView Grid File Description ...........................................................................................................54 Sample ..............................................................................................................................................55 Other Supported Geographic Data File Formats ....................................................................................55 Planet Format .........................................................................................................................................55 DTM File............................................................................................................................................55 Description ..................................................................................................................................55 Sample ........................................................................................................................................56 Clutter Class Files .............................................................................................................................56 Description ..................................................................................................................................56 Sample ........................................................................................................................................56 Vector Files .......................................................................................................................................57 Description ..................................................................................................................................57 Sample ........................................................................................................................................57 Image Files........................................................................................................................................57 Text Data Files ..................................................................................................................................57 MNU Format ...........................................................................................................................................58 Description ........................................................................................................................................58 Sample ..............................................................................................................................................58 XML Table Export/Import Format ...........................................................................................................58 Index.xml File ....................................................................................................................................59 XML File ............................................................................................................................................59 Externalised Propagation Results Format ..............................................................................................60 DBF File ............................................................................................................................................61 DBF File Format ..........................................................................................................................61 DBF Structure ........................................................................................................................61 DBF Header (Variable Size - Depends on Field Count) ........................................................61 Each DBF Record (Fixed Length)..........................................................................................63 DBF File Content.........................................................................................................................63 LOS File ............................................................................................................................................64 Externalised Tuning Files .......................................................................................................................64 DBF File ............................................................................................................................................64 DBF File Format ..........................................................................................................................64 DBF Structure ........................................................................................................................64 DBF Header (Variable Size - Depends on Field Count) ........................................................64 Each DBF Record (Fixed Length)..........................................................................................66 DBF File Content.........................................................................................................................66 PTS File ............................................................................................................................................66 Interference Histograms File Formats ....................................................................................................66 AT281_TRG_E1 © Forsk 2009 Table of Contents 3.19.1 3.19.1.1 3.19.2 3.19.2.1 3.19.2.1.1 3.19.2.1.2 3.19.2.2 3.19.2.2.1 3.19.2.2.2 3.19.3 3.19.3.1 3.19.4 3.19.4.1 4 4.1 4.2 4.2.1 4.2.1.1 4.2.1.2 4.2.2 4.2.2.1 4.2.2.2 4.2.3 4.3 4.3.1 4.3.2 4.3.2.1 4.3.2.2 4.3.3 4.3.3.1 4.3.3.1.1 4.3.3.1.2 4.3.3.2 4.4 4.4.1 4.4.1.1 4.4.1.2 4.4.1.3 4.4.2 4.4.2.1 4.4.2.2 4.4.2.2.1 4.4.2.2.2 4.4.2.2.3 4.4.2.3 4.4.3 4.4.3.1 4.4.3.2 4.4.3.2.1 4.4.3.2.2 4.4.3.2.3 4.4.3.2.4 4.4.3.2.5 4.4.3.2.6 4.4.3.2.7 4.4.3.3 4.4.3.3.1 4.4.3.3.2 4.4.3.4 4.4.4 4.4.4.1 4.4.4.2 4.4.4.2.1 4.4.4.2.2 4.4.5 4.4.5.1 4.4.5.2 © Forsk 2009 One Histogram per Line (.im0) Format............................................................................................. 67 Sample........................................................................................................................................ 67 One Value per Line with Dictionary File (.clc) Format ...................................................................... 68 CLC File...................................................................................................................................... 68 Description ............................................................................................................................ 68 Sample .................................................................................................................................. 69 DCT File...................................................................................................................................... 69 Description ............................................................................................................................ 69 Sample .................................................................................................................................. 70 One Value per Line (Transmitter Name Repeated) (.im1) Format ................................................... 70 Sample........................................................................................................................................ 71 Only Co-Channel and Adjacent Values (.im2) Format ..................................................................... 72 Sample........................................................................................................................................ 72 Calculations .................................................................................... 75 Overview ................................................................................................................................................ 75 Path Loss Matrices................................................................................................................................. 76 Calculation Area Determination........................................................................................................ 77 Computation Zone ...................................................................................................................... 77 Use of Polygonal Zones in Coverage Prediction Reports........................................................... 77 Calculate / Force Calculation Comparison ....................................................................................... 78 Calculate..................................................................................................................................... 78 Force Calculation........................................................................................................................ 78 Matrix Validity ................................................................................................................................... 78 Path Loss Calculations........................................................................................................................... 79 Ground Altitude Determination ......................................................................................................... 79 Clutter Determination ....................................................................................................................... 80 Clutter Class ............................................................................................................................... 80 Clutter Height.............................................................................................................................. 80 Geographic Profile Extraction........................................................................................................... 80 Extraction Methods ..................................................................................................................... 80 Radial Extraction ................................................................................................................... 80 Systematic Extraction ........................................................................................................... 81 Profile Resolution: Multi-Resolution Management...................................................................... 82 Propagation Models ............................................................................................................................... 84 Okumura-Hata and Cost-Hata Propagation Models......................................................................... 85 Hata Path Loss Formula ............................................................................................................. 85 Corrections to the Hata Path Loss Formula................................................................................ 85 Calculations in Atoll .................................................................................................................... 85 ITU 529-3 Propagation Model .......................................................................................................... 86 ITU 529-3 Path Loss Formula..................................................................................................... 86 Corrections to the ITU 529-3 Path Loss Formula ....................................................................... 86 Environment Correction ........................................................................................................ 86 Area Size Correction ............................................................................................................. 86 Distance Correction .............................................................................................................. 87 Calculations in Atoll .................................................................................................................... 87 Standard Propagation Model (SPM) ................................................................................................ 87 SPM Path Loss Formula............................................................................................................. 87 Calculations in Atoll .................................................................................................................... 88 Visibility and Distance Between Transmitter and Receiver................................................... 88 Effective Transmitter Antenna Height ................................................................................... 88 Effective Receiver Antenna Height ....................................................................................... 91 Correction for Hilly Regions in Case of LOS ......................................................................... 91 Diffraction .............................................................................................................................. 92 Losses due to Clutter ............................................................................................................ 92 Recommendations ................................................................................................................ 93 Automatic SPM Calibration......................................................................................................... 93 General Algorithm ................................................................................................................. 94 Sample Values for SPM Path Loss Formula Parameters ..................................................... 94 Unmasked Path Loss Calculation............................................................................................... 95 WLL Propagation Model ................................................................................................................... 96 WLL Path Loss Formula ............................................................................................................. 96 Calculations in Atoll .................................................................................................................... 96 Free Space Loss ................................................................................................................... 96 Diffraction .............................................................................................................................. 96 ITU-R P.526-5 Propagation Model ................................................................................................... 96 ITU 526-5 Path Loss Formula..................................................................................................... 96 Calculations in Atoll .................................................................................................................... 97 AT281_TRG_E1 7 Technical Reference Guide 4.4.5.2.1 4.4.5.2.2 4.4.6 4.4.6.1 4.4.6.2 4.4.6.2.1 4.4.6.2.2 4.4.7 4.4.7.1 4.4.7.2 4.4.7.3 4.4.8 4.4.8.1 4.4.8.1.1 4.4.8.1.2 4.4.8.1.3 4.4.8.1.4 4.4.8.1.5 4.4.8.1.6 4.4.9 4.4.10 4.4.10.1 4.4.10.2 4.4.10.2.1 4.4.10.2.2 4.4.10.2.3 4.4.10.2.4 4.4.10.2.5 4.5 4.5.1 4.5.2 4.6 4.6.1 4.6.2 4.6.3 4.6.4 4.6.4.1 4.7 4.7.1 4.7.1.1 4.7.1.2 4.7.2 4.7.2.1 4.7.2.1.1 4.7.2.1.2 4.7.2.2 4.7.2.2.1 4.7.2.2.2 4.8 4.8.1 4.8.1.1 4.8.1.2 4.8.1.3 4.8.1.4 4.8.2 5 5.1 5.1.1 5.1.2 5.1.2.1 5.1.2.2 5.1.3 5.1.3.1 5.1.3.1.1 5.1.3.1.2 5.1.3.1.3 5.1.3.1.4 8 Free Space Loss....................................................................................................................97 Diffraction...............................................................................................................................97 ITU-R P.370-7 Propagation Model....................................................................................................97 ITU 370-7 Path Loss Formula .....................................................................................................97 Calculations in Atoll .....................................................................................................................97 Free Space Loss....................................................................................................................97 Corrected Standard Loss.......................................................................................................97 Erceg-Greenstein (SUI) Propagation Model .....................................................................................98 SUI Terrain Types .......................................................................................................................99 Erceg-Greenstein (SUI) Path Loss Formula................................................................................99 Calculations in Atoll ...................................................................................................................100 ITU-R P.1546-2 Propagation Model................................................................................................100 Calculations in Atoll ...................................................................................................................101 Step 1: Determination of Graphs to be Used.......................................................................101 Step 2: Calculation of Maximum Field Strength...................................................................101 Step 3: Determination of Transmitter Antenna Height .........................................................101 Step 4: Interpolation/Extrapolation of Field Strength ...........................................................101 Step 5: Calculation of Correction Factors ............................................................................103 Step 6: Calculation of Path Loss..........................................................................................104 Sakagami Extended Propagation Model.........................................................................................104 Appendices .....................................................................................................................................106 Free Space Loss .......................................................................................................................106 Diffraction Loss..........................................................................................................................106 Knife-Edge Diffraction..........................................................................................................106 3 Knife-Edge Deygout Method.............................................................................................107 Epstein-Peterson Method ....................................................................................................108 Deygout Method with Correction .........................................................................................108 Millington Method.................................................................................................................109 Path Loss Tuning..................................................................................................................................109 Standard Tuning on Transmitters....................................................................................................109 Path Loss Tuning of Repeaters.......................................................................................................110 Antenna Attenuation Calculation ..........................................................................................................111 Calculation of Azimuth and Tilt Angles............................................................................................111 Antenna Pattern 3-D Interpolation...................................................................................................112 Additional Electrical Downtilt Modelling...........................................................................................113 Antenna Pattern Smoothing ............................................................................................................113 Smoothing Algorithm .................................................................................................................115 Shadowing Model .................................................................................................................................115 Shadowing Margin Calculation........................................................................................................119 Shadowing Margin Calculation in Predictions ...........................................................................120 Shadowing Margin Calculation in Monte-Carlo Simulations......................................................121 Macro-Diversity Gains Calculation ..................................................................................................122 Uplink Macro-Diversity Gain Evaluation ....................................................................................122 Shadowing Error PDF (n Signals)........................................................................................122 Uplink Macro-Diversity Gain ................................................................................................124 Downlink Macro-Diversity Gain Evaluation ...............................................................................124 Shadowing Error PDF (n Signals)........................................................................................125 Downlink Macro-Diversity Gain............................................................................................127 Appendices ...........................................................................................................................................127 Transmitter Radio Equipment .........................................................................................................127 UMTS HSPA, CDMA2000 1xRTT 1xEV-DO, and TD-SCDMA Documents..............................128 GSM GPRS EGPRS Documents ..............................................................................................129 WiMAX 802.16d and WiMAX 802.16e Documents ...................................................................130 LTE Documents.........................................................................................................................131 Secondary Antennas.......................................................................................................................132 GSM GPRS EDGE Networks ........................................................135 General Prediction Studies ...................................................................................................................135 Calculation Criteria..........................................................................................................................135 Point Analysis..................................................................................................................................135 Profile Tab .................................................................................................................................135 Reception Tab ...........................................................................................................................135 Coverage Studies............................................................................................................................136 Service Area Determination ......................................................................................................136 All Servers ...........................................................................................................................136 Best Signal Level and a Margin ...........................................................................................136 Second Best Signal Level and a Margin..............................................................................136 Best Signal Level per HCS Layer and a Margin ..................................................................137 AT281_TRG_E1 © Forsk 2009 Table of Contents 5.1.3.1.5 5.1.3.1.6 5.1.3.1.7 5.1.3.1.8 5.1.3.2 5.1.3.2.1 5.1.3.2.2 5.2 5.2.1 5.2.1.1 5.2.1.1.1 5.2.1.1.2 5.2.1.2 5.2.1.2.1 5.2.1.2.2 5.2.1.3 5.2.1.3.1 5.2.1.3.2 5.2.2 5.2.2.1 5.2.2.1.1 5.2.2.1.2 5.2.2.1.3 5.2.2.2 5.2.2.2.1 5.2.2.2.2 5.2.2.2.3 5.3 5.3.1 5.3.1.1 5.3.1.2 5.3.1.2.1 5.3.1.2.2 5.3.1.2.3 5.3.2 5.3.2.1 5.3.2.1.1 5.3.2.1.2 5.3.2.2 5.3.2.2.1 5.3.2.2.2 5.3.2.2.3 5.3.2.2.4 5.3.2.2.5 5.3.2.2.6 5.4 5.4.1 5.4.1.1 5.4.1.2 5.4.1.3 5.4.2 5.4.2.1 5.4.2.1.1 5.4.2.1.2 5.4.2.1.3 5.4.2.1.4 5.4.2.1.5 5.4.2.1.6 5.4.2.2 5.4.2.2.1 5.4.2.2.2 5.4.2.2.3 5.4.2.2.4 5.4.2.2.5 5.4.2.2.6 5.5 5.5.1 5.5.2 © Forsk 2009 HCS Servers and a Margin ................................................................................................. 137 Highest Priority HCS Server and a Margin.......................................................................... 137 Second Best Signal Level per HCS Layer and a Margin .................................................... 138 Best Idle Mode Reselection Criterion (C2).......................................................................... 138 Coverage Display ..................................................................................................................... 139 Plot Resolution .................................................................................................................... 139 Display Types ..................................................................................................................... 139 Traffic Analysis..................................................................................................................................... 140 Traffic Distribution .......................................................................................................................... 140 Normal Cells (Nonconcentric, No HCS Layer).......................................................................... 140 Circuit Switched Services.................................................................................................... 140 Packet Switched Services................................................................................................... 140 Concentric Cells........................................................................................................................ 140 Circuit Switched Services.................................................................................................... 140 Packet Switched Services................................................................................................... 140 HCS Layers .............................................................................................................................. 140 Circuit Switched Services.................................................................................................... 141 Packet Switched Services................................................................................................... 141 Calculation of the Traffic Demand per Subcell ............................................................................... 141 User Profile Traffic Maps .......................................................................................................... 141 Normal Cells (Nonconcentric, No HCS Layer) .................................................................... 141 Concentric Cells .................................................................................................................. 141 HCS Layers......................................................................................................................... 142 Sector Traffic Maps................................................................................................................... 146 Normal Cells (Nonconcentric, No HCS Layer) .................................................................... 146 Concentric Cells .................................................................................................................. 146 HCS Layers......................................................................................................................... 146 Network Dimensioning ......................................................................................................................... 150 Dimensioning Models and Quality Graphs ..................................................................................... 150 Circuit Switched Traffic ............................................................................................................. 150 Packet Switched Traffic ............................................................................................................ 150 Throughput.......................................................................................................................... 150 Delay ................................................................................................................................... 153 Blocking Probability............................................................................................................. 153 Network Dimensioning Process ..................................................................................................... 154 Network Dimensioning Engine.................................................................................................. 154 Inputs .................................................................................................................................. 154 Outputs ............................................................................................................................... 155 Network Dimensioning Steps.................................................................................................... 155 Step 1: Timeslots Required for CS Traffic........................................................................... 155 Step 2: TRXs Required for CS Traffic and Dedicated PS Timeslots................................... 155 Step 3: Effective CS Blocking, Effective CS Traffic Overflow and Served CS Traffic ......... 156 Step 4: TRXs to Add for PS Traffic ..................................................................................... 156 Step 5: Served PS Traffic ................................................................................................... 158 Step 6: Total Traffic Load.................................................................................................... 158 Key Performance Indicators Calculation .............................................................................................. 158 Circuit Switched Traffic................................................................................................................... 159 Erlang B .................................................................................................................................... 159 Erlang C.................................................................................................................................... 159 Served Circuit Switched Traffic................................................................................................. 159 Packet Switched Traffic .................................................................................................................. 159 Case 1: Total Traffic Demand > Dedicated + Shared Timeslots .............................................. 160 Traffic Load ......................................................................................................................... 160 Packet Switched Traffic Overflow ....................................................................................... 160 Throughput Reduction Factor ............................................................................................. 160 Delay ................................................................................................................................... 160 Blocking Probability............................................................................................................. 160 Served Packet Switched Traffic .......................................................................................... 160 Case 2: Total Traffic Demand < Dedicated + Shared Timeslots .............................................. 160 Traffic Load ......................................................................................................................... 160 Packet Switched Traffic Overflow ....................................................................................... 160 Throughput Reduction Factor ............................................................................................. 161 Delay ................................................................................................................................... 161 Blocking Probability............................................................................................................. 161 Served Packet Switched Traffic .......................................................................................... 161 Neighbour Allocation ............................................................................................................................ 161 Global Allocation for All Transmitters ............................................................................................. 161 Allocation for a Group of Transmitters or One Transmitter ............................................................ 164 AT281_TRG_E1 9 Technical Reference Guide 5.6 5.6.1 5.6.1.1 5.6.1.1.1 5.6.1.1.2 5.6.1.1.3 5.6.1.1.4 5.6.1.1.5 5.6.1.2 5.6.1.2.1 5.6.1.2.2 5.6.1.2.3 5.6.1.2.4 5.6.1.3 5.6.1.3.1 5.6.1.3.2 5.6.1.4 5.6.1.4.1 5.6.1.4.2 5.6.1.4.3 5.6.1.4.4 5.6.2 5.7 5.7.1 5.7.1.1 5.7.1.2 5.7.1.3 5.7.1.4 5.7.1.5 5.7.1.6 5.7.2 5.7.2.1 5.7.2.2 5.7.2.3 5.7.2.4 5.7.3 5.7.3.1 5.7.3.1.1 5.7.3.1.2 5.7.3.2 5.7.3.2.1 5.7.3.2.2 5.7.3.3 5.7.3.3.1 5.7.3.3.2 5.7.3.4 5.7.3.4.1 5.7.3.4.2 5.7.3.5 5.7.3.5.1 5.7.3.5.2 5.7.3.6 5.7.3.6.1 5.7.3.6.2 5.7.4 5.7.4.1 5.7.4.1.1 5.7.4.1.2 5.7.4.2 5.7.4.2.1 5.7.4.2.2 5.7.4.2.3 5.7.4.2.4 5.7.4.2.5 5.7.4.2.6 5.7.4.2.7 5.8 5.8.1 10 Interference Prediction Studies.............................................................................................................165 Coverage Studies............................................................................................................................165 Service Area Determination ......................................................................................................165 All Servers ...........................................................................................................................165 Best Signal Level per HCS Layer and a Margin ..................................................................165 Best Signal Level of the Highest Priority HCS Layer and a Margin .....................................165 Second Best Signal Level per HCS Layer and a Margin .....................................................166 Best Idle Mode Reselection Criterion (C2) ..........................................................................166 Carrier to Interference Ratio Calculation ...................................................................................166 Carrier Power Level .............................................................................................................167 Interference Calculation.......................................................................................................167 Collision Probability for Non Hopping Mode ........................................................................169 Collision Probability for BBH and SFH Modes.....................................................................169 Coverage Area Determination...................................................................................................170 Interference Condition Satisfied by At Least One TRX........................................................170 Interference Condition Satisfied by The Worst TRX ............................................................170 Coverage Area Display .............................................................................................................170 C/I Level...............................................................................................................................170 Max C/I Level.......................................................................................................................171 Min C/I Level........................................................................................................................171 Transmitter...........................................................................................................................171 Point Analysis..................................................................................................................................171 GPRS EDGE Coverage Studies...........................................................................................................171 Coverage Area Determination.........................................................................................................171 All Servers .................................................................................................................................172 Best Signal Level per HCS Layer and a Margin ........................................................................172 Second Best Signal Level per HCS Layer and a Margin...........................................................172 HCS Servers and a Margin .......................................................................................................172 Highest Priority HCS Server and a Margin ................................................................................172 Best C2......................................................................................................................................172 Calculation Options .........................................................................................................................172 Calculations Based on C ...........................................................................................................173 Calculations Based on C/I Without Considering Thermal Noise ...............................................173 Calculations Based on C/I Considering Thermal Noise ............................................................173 Ideal Link Adaptation (ILA) ........................................................................................................173 Coverage Study Scenarios .............................................................................................................173 GPRS/EDGE Studies Based on C Without ILA.........................................................................173 Coding Scheme Based on C Without ILA............................................................................173 Throughput Based on C Without ILA ...................................................................................174 GPRS/EDGE Studies Based on C With ILA..............................................................................174 Coding Scheme Based on C With ILA.................................................................................174 Throughput Based on C With ILA ........................................................................................174 GPRS/EDGE Studies Based on C/I Without ILA and Thermal Noise .......................................174 Coding Scheme Based on C/I Without ILA and Thermal Noise ..........................................174 Throughput Based on Worst Case Between C and C/I Without ILA....................................175 GPRS/EDGE Studies Based on C/I With ILA and Without Thermal Noise ...............................175 Coding Scheme Based on C/I With ILA and Without Thermal Noise ..................................175 Throughput Based on Worst Case Between C and C/I With ILA.........................................176 GPRS/EDGE Studies Based on C/I Without ILA and With Thermal Noise ...............................176 Coding Scheme Based on C/I Without ILA and With Thermal Noise ..................................176 Throughput Based on Interpolation Between C/N and C/(I+N) Without ILA ........................176 GPRS/EDGE Studies Based on C/I With ILA and Thermal Noise ............................................177 Coding Scheme Based on C/I With ILA and Thermal Noise ...............................................177 Throughput Based on Interpolation Between C/N and C/(I+N) With ILA .............................177 Coverage Display............................................................................................................................178 GPRS/EDGE Coding Schemes Study Display Types ...............................................................178 Coding Schemes .................................................................................................................178 Best Coding Schemes .........................................................................................................178 RLC/MAC and Application Throughput/Timeslot Studies Display Types ..................................178 Relation Between RLC/MAC and Application Throughputs.................................................178 Throughput/Timeslot............................................................................................................178 Best Throughput/Timeslot....................................................................................................178 Average Throughput/Timeslot .............................................................................................178 Block Error Rate Computation .............................................................................................178 BLER Percentage ................................................................................................................179 Maximum BLER Percentage ...............................................................................................179 Circuit Quality Indicators Studies..........................................................................................................179 Circuit Quality Indicators .................................................................................................................179 AT281_TRG_E1 © Forsk 2009 Table of Contents 5.8.2 5.8.2.1 5.8.2.2 5.8.2.3 5.8.2.4 5.8.2.5 5.8.3 5.8.3.1 5.8.3.2 5.8.3.3 5.8.4 5.8.4.1 5.8.4.2 5.8.4.3 5.8.4.4 5.8.5 5.8.5.1 5.8.5.1.1 5.8.5.1.2 6 6.1 6.1.1 6.1.2 6.1.2.1 6.1.2.2 6.1.3 6.1.3.1 6.1.3.1.1 6.1.3.1.2 6.1.3.1.3 6.1.3.2 6.1.3.2.1 6.1.3.2.2 6.2 6.2.1 6.2.2 6.2.3 6.2.4 6.3 6.4 6.4.1 6.4.1.1 6.4.1.1.1 6.4.1.1.2 6.4.1.2 6.4.1.2.1 6.4.1.2.2 6.4.1.2.3 6.4.2 6.4.2.1 6.4.2.2 6.4.2.3 6.4.2.3.1 6.4.2.3.2 6.4.2.3.3 6.4.2.3.4 6.4.2.3.5 6.4.2.3.6 6.4.2.4 6.4.2.4.1 6.4.2.4.2 6.4.2.4.3 6.4.2.4.4 6.4.2.5 6.4.3 6.4.3.1 6.4.3.2 © Forsk 2009 Coverage Area Determination........................................................................................................ 181 All Servers ................................................................................................................................ 181 Best Signal Level per HCS Layer and a Margin ....................................................................... 181 Second Best Signal Level per HCS Layer and a Margin .......................................................... 181 HCS Servers and a Margin....................................................................................................... 181 Highest Priority HCS Server and a Margin ............................................................................... 182 Calculation Options ........................................................................................................................ 182 Calculations Based on C/N....................................................................................................... 182 Calculations Based on C/(I+N) ................................................................................................. 183 Ideal Link Adaptation (ILA) ....................................................................................................... 183 Calculation Scenarios..................................................................................................................... 183 CQI Study Based on C/N Without ILA ...................................................................................... 183 CQI Study Based on C/N With ILA ........................................................................................... 183 CQI Study Based on C/(I+N) Without ILA................................................................................. 184 CQI Study Based on C/(I+N) With ILA...................................................................................... 184 Coverage Display ........................................................................................................................... 185 Circuit Quality Indicators Study Display Types ......................................................................... 185 FER/BER/MOS ................................................................................................................... 185 Max FER/Max BER/Max MOS ............................................................................................ 185 UMTS HSPA Networks ................................................................. 189 General Prediction Studies .................................................................................................................. 189 Calculation Criteria ......................................................................................................................... 189 Point Analysis ................................................................................................................................. 189 Profile Tab ................................................................................................................................ 189 Reception Tab .......................................................................................................................... 189 Coverage Studies ........................................................................................................................... 190 Service Area Determination...................................................................................................... 190 All Servers........................................................................................................................... 190 Best Signal Level and a Margin .......................................................................................... 190 Second Best Signal Level and a Margin ............................................................................. 190 Coverage Display ..................................................................................................................... 191 Plot Resolution .................................................................................................................... 191 Display Types ..................................................................................................................... 191 Definitions and Formulas ..................................................................................................................... 192 Inputs.............................................................................................................................................. 192 Ec/I0 Calculation ............................................................................................................................ 197 DL Eb/Nt Calculation ...................................................................................................................... 198 UL Eb/Nt Calculation ...................................................................................................................... 199 Active Set Management ....................................................................................................................... 200 Simulations........................................................................................................................................... 200 Generating a Realistic User Distribution ........................................................................................ 200 Simulations Based on User Profile Traffic Maps ...................................................................... 201 Circuit Switched Service (i) ................................................................................................. 201 Packet Switched Service (j) ................................................................................................ 201 Simulations Based on Sector Traffic Maps............................................................................... 204 Throughputs in Uplink and Downlink................................................................................... 204 Total Number of Users (All Activity Statuses) ..................................................................... 205 Number of Users per Activity Status ................................................................................... 205 Power Control Simulation............................................................................................................... 206 Algorithm Initialization............................................................................................................... 207 R99 Part of the Algorithm ......................................................................................................... 207 HSDPA Part of the Algorithm.................................................................................................... 211 HSDPA Power Allocation .................................................................................................... 211 Number of HS-SCCH Channels and Maximum Number of HSDPA Bearer Users............. 212 HSDPA Bearer Allocation Process ..................................................................................... 212 Fast Link Adaptation Modelling ........................................................................................... 214 MIMO Modelling .................................................................................................................. 224 Scheduling Algorithms ........................................................................................................ 224 HSUPA Part of the Algorithm.................................................................................................... 226 Admission Control ............................................................................................................... 226 HSUPA Bearer Allocation Process ..................................................................................... 228 Noise Rise Scheduling ........................................................................................................ 229 Radio Resource Control...................................................................................................... 233 Convergence Criteria................................................................................................................ 233 Results ........................................................................................................................................... 233 R99 Related Results................................................................................................................. 233 HSPA Related Results.............................................................................................................. 235 AT281_TRG_E1 11 Technical Reference Guide 6.4.3.2.1 6.4.3.2.2 6.4.3.2.3 6.4.3.2.4 6.4.4 6.4.4.1 6.4.4.2 6.4.4.2.1 6.4.4.2.2 6.4.4.2.3 6.4.4.3 6.4.4.3.1 6.4.4.3.2 6.4.4.4 6.4.4.5 6.4.4.6 6.5 6.5.1 6.5.1.1 6.5.1.1.1 6.5.1.1.2 6.5.1.1.3 6.5.2 6.5.2.1 6.5.2.1.1 6.5.2.1.2 6.5.2.2 6.5.2.2.1 6.5.2.2.2 6.5.2.3 6.5.2.3.1 6.5.2.3.2 6.5.2.4 6.5.2.4.1 6.5.2.4.2 6.5.2.4.3 6.5.2.5 6.5.2.5.1 6.5.2.5.2 6.5.2.6 6.5.2.6.1 6.5.2.6.2 6.5.2.6.3 6.6 6.6.1 6.6.2 6.6.3 6.6.3.1 6.6.3.2 6.7 6.7.1 6.7.1.1 6.7.1.2 6.7.1.2.1 6.7.1.2.2 6.7.1.3 6.7.1.3.1 6.7.1.3.2 6.7.1.3.3 6.7.2 6.7.2.1 6.7.2.1.1 6.7.2.1.2 6.7.2.1.3 6.7.2.1.4 6.7.2.2 6.8 6.8.1 12 Statistics Tab .......................................................................................................................235 Mobiles Tab .........................................................................................................................236 Cells Tab..............................................................................................................................238 Sites Tab..............................................................................................................................239 Appendices .....................................................................................................................................240 Admission Control in the R99 Part ............................................................................................240 Resources Management ...........................................................................................................240 OVSF Codes Management..................................................................................................240 Channel Elements Management .........................................................................................241 Iub Backhaul Throughput.....................................................................................................242 Downlink Load Factor Calculation .............................................................................................243 Downlink Load Factor per Cell.............................................................................................243 Downlink Load Factor per Mobile ........................................................................................244 Uplink Load Factor Due to One User ........................................................................................244 Inter-carrier Power Sharing Modelling .......................................................................................246 Best Server Determination in Monte Carlo Simulations - Old Method ......................................247 UMTS HSPA Prediction Studies...........................................................................................................249 Point Analysis..................................................................................................................................249 AS Analysis Tab ........................................................................................................................249 Bar Graph and Pilot Sub-Menu............................................................................................249 Downlink Sub-Menu.............................................................................................................251 Uplink Sub-Menu .................................................................................................................256 Coverage Studies............................................................................................................................259 Pilot Reception Analysis ............................................................................................................259 Prediction Study Inputs........................................................................................................260 Study Display Options .........................................................................................................260 Downlink Service Area Analysis ................................................................................................261 Prediction Study Inputs........................................................................................................261 Study Display Options .........................................................................................................261 Uplink Service Area Analysis ....................................................................................................262 Prediction Study Inputs........................................................................................................263 Study Display Options .........................................................................................................263 Downlink Total Noise Analysis ..................................................................................................264 Study Inputs.........................................................................................................................264 Analysis on All Carriers........................................................................................................264 Analysis on a Specific Carrier..............................................................................................265 HSDPA Prediction Study ...........................................................................................................265 Prediction Study Inputs........................................................................................................265 Study Display Options .........................................................................................................266 HSUPA Prediction Study ...........................................................................................................269 Prediction Study Inputs........................................................................................................270 Calculation Options..............................................................................................................270 Display Options....................................................................................................................270 Automatic Neighbour Allocation............................................................................................................272 Neighbour Allocation for All Transmitters........................................................................................272 Neighbour Allocation for a Group of Transmitters or One Transmitter............................................276 Importance Calculation ...................................................................................................................276 Importance of Intra-carrier Neighbours .....................................................................................276 Importance of Inter-carrier Neighbours .....................................................................................277 Primary Scrambling Code Allocation ....................................................................................................278 Automatic Allocation Description.....................................................................................................278 Options and Constraints ............................................................................................................278 Allocation Process.....................................................................................................................279 Single Carrier Network.........................................................................................................280 Multi-Carrier Network...........................................................................................................280 Priority Determination ................................................................................................................281 Cell Priority ..........................................................................................................................281 Transmitter Priority ..............................................................................................................283 Site Priority ..........................................................................................................................283 Allocation Examples........................................................................................................................283 Allocation Strategies and Use a Maximum of Codes ................................................................283 Strategy: Clustered ..............................................................................................................284 Strategy: Distributed ............................................................................................................285 Strategy: ‘One Cluster per Site ............................................................................................285 Strategy: ‘Distributed per Site ..............................................................................................286 Allocate Carriers Identically .......................................................................................................286 Automatic GSM-UMTS Neighbour Allocation .......................................................................................287 Overview .........................................................................................................................................287 AT281_TRG_E1 © Forsk 2009 Table of Contents 6.8.2 6.8.2.1 6.8.2.2 6.8.2.3 6.8.2.3.1 6.8.2.3.2 7 7.1 7.1.1 7.1.2 7.1.2.1 7.1.2.2 7.1.3 7.1.3.1 7.1.3.1.1 7.1.3.1.2 7.1.3.1.3 7.1.3.2 7.1.3.2.1 7.1.3.2.2 7.2 7.2.1 7.2.1.1 7.2.1.2 7.2.1.3 7.2.1.4 7.2.1.5 7.2.2 7.2.2.1 7.2.2.2 7.2.2.3 7.2.2.4 7.3 7.4 7.4.1 7.4.1.1 7.4.1.1.1 7.4.1.1.2 7.4.1.2 7.4.1.3 7.4.2 7.4.2.1 7.4.2.1.1 7.4.2.1.2 7.4.2.1.3 7.4.2.2 7.4.2.2.1 7.4.2.2.2 7.4.2.2.3 7.4.3 7.4.3.1 7.4.3.2 7.4.3.2.1 7.4.3.2.2 7.4.3.3 7.4.3.3.1 7.4.3.3.2 7.4.3.4 7.5 7.5.1 7.5.1.1 7.5.1.2 7.5.1.2.1 7.5.1.2.2 7.5.1.3 7.5.1.3.1 7.5.1.3.2 © Forsk 2009 Automatic Allocation Description .................................................................................................... 287 Algorithm Based on Distance ................................................................................................... 287 Algorithm Based on Coverage Overlapping ............................................................................. 288 Appendices ............................................................................................................................... 290 Delete Existing Neighbours Option ..................................................................................... 290 Calculation of Inter-Transmitter Distance............................................................................ 290 CDMA2000 Networks ................................................................... 293 General Prediction Studies .................................................................................................................. 293 Calculation Criteria ......................................................................................................................... 293 Point Analysis ................................................................................................................................. 293 Profile Tab ................................................................................................................................ 293 Reception Tab .......................................................................................................................... 294 Coverage Studies ........................................................................................................................... 294 Service Area Determination...................................................................................................... 294 All Servers........................................................................................................................... 294 Best Signal Level and a Margin .......................................................................................... 294 Second Best Signal Level and a Margin ............................................................................. 294 Coverage Display ..................................................................................................................... 295 Plot Resolution .................................................................................................................... 295 Display Types ..................................................................................................................... 295 Definitions and Formulas ..................................................................................................................... 296 Parameters Used for CDMA2000 1xRTT Modelling ...................................................................... 296 Inputs ........................................................................................................................................ 296 Ec/I0 Calculation....................................................................................................................... 300 DL Eb/Nt Calculation ................................................................................................................ 300 UL Eb/Nt Calculation ................................................................................................................ 301 Simulation Results .................................................................................................................... 303 Parameters Used for CDMA2000 1xEV-DO Modelling .................................................................. 304 Inputs ........................................................................................................................................ 304 Ec/I0 and Ec/Nt Calculations .................................................................................................... 307 UL Eb/Nt Calculation ................................................................................................................ 308 Simulation Results .................................................................................................................... 309 Active Set Management ....................................................................................................................... 310 Simulations........................................................................................................................................... 311 Generating a Realistic User Distribution ........................................................................................ 311 Number of Users, User Activity Status and User Data Rate..................................................... 311 Simulations Based on User Profile Traffic Maps................................................................. 311 Simulations Based on Sector Traffic Maps ......................................................................... 314 Transition Flags for 1xEV-DO Rev.0 User Data Rates............................................................. 319 User Geographical Position ...................................................................................................... 319 Network Regulation Mechanism..................................................................................................... 319 CDMA2000 1xRTT Power Control Simulation Algorithm.......................................................... 319 Algorithm Initialization ......................................................................................................... 320 Presentation of the Algorithm.............................................................................................. 320 Convergence Criterion ........................................................................................................ 326 CDMA2000 1xEV-DO Power/Data Rate Control Simulation Algorithm .................................... 327 Algorithm Initialization ......................................................................................................... 328 Presentation of the Algorithm.............................................................................................. 328 Convergence Criterion ........................................................................................................ 333 Appendices..................................................................................................................................... 334 Admission Control..................................................................................................................... 334 Resources Management........................................................................................................... 334 Walsh Code Management .................................................................................................. 334 Channel Element Management .......................................................................................... 335 Downlink Load Factor Calculation ............................................................................................ 335 Downlink Load Factor per Cell ............................................................................................ 335 Downlink Load Factor per Mobile........................................................................................ 337 Best Server Determination in Monte Carlo Simulations - Old Method...................................... 337 CDMA2000 Prediction Studies............................................................................................................. 339 Point Analysis: The AS Analysis Tab ............................................................................................. 339 Bar Graph and Pilot Sub-Menu................................................................................................. 339 Downlink Sub-Menu.................................................................................................................. 341 CDMA2000 1xRTT.............................................................................................................. 341 CDMA2000 1xEV-DO ......................................................................................................... 345 Uplink Sub-Menu ...................................................................................................................... 346 CDMA2000 1xRTT.............................................................................................................. 346 CDMA2000 1xEV-DO ......................................................................................................... 350 AT281_TRG_E1 13 Technical Reference Guide 7.5.2 7.5.2.1 7.5.2.2 7.5.2.2.1 7.5.2.2.2 7.5.2.3 7.5.2.3.1 7.5.2.3.2 7.5.2.4 7.5.2.4.1 7.5.2.4.2 7.6 7.6.1 7.6.2 7.6.3 7.6.3.1 7.6.3.2 7.7 7.7.1 7.7.1.1 7.7.1.2 7.7.1.2.1 7.7.1.2.2 7.7.1.2.3 7.7.1.3 7.7.1.3.1 7.7.1.3.2 7.7.1.3.3 7.7.2 7.7.2.1 7.7.2.2 7.7.2.3 7.8 7.8.1 7.8.2 7.8.2.1 7.8.2.2 7.8.2.3 8 8.1 8.1.1 8.1.2 8.1.3 8.1.4 8.1.5 8.1.6 8.1.7 8.1.8 8.1.8.1 8.1.8.2 8.1.8.3 8.2 8.2.1 8.2.1.1 8.2.1.2 8.2.2 8.2.2.1 8.2.2.2 8.2.2.2.1 8.2.2.2.2 8.2.2.3 8.2.2.4 8.2.2.5 8.2.2.5.1 8.2.2.5.2 8.2.2.6 8.2.2.6.1 14 Coverage Studies............................................................................................................................353 Pilot Reception Analysis ............................................................................................................353 Downlink Service Area Analysis ................................................................................................354 CDMA2000 1xRTT ..............................................................................................................354 CDMA2000 1xEV-DO ..........................................................................................................356 Uplink Service Area Analysis ....................................................................................................357 CDMA2000 1xRTT ..............................................................................................................357 CDMA2000 1xEV-DO ..........................................................................................................358 Downlink Total Noise Analysis ..................................................................................................361 Analysis on all Carriers ........................................................................................................361 Analysis on a Specific Carrier..............................................................................................362 Automatic Neighbour Allocation............................................................................................................362 Neighbour Allocation for all Transmitters ........................................................................................362 Neighbour Allocation for a Group of Transmitters or One Transmitter............................................365 Importance Calculation ...................................................................................................................365 Importance of Intra-carrier Neighbours .....................................................................................365 Importance of Inter-carrier Neighbours .....................................................................................366 PN Offset Allocation..............................................................................................................................367 Automatic Allocation Description.....................................................................................................367 Options and Constraints ............................................................................................................367 Allocation Process.....................................................................................................................368 Single Carrier Network.........................................................................................................368 Multi-Carrier Network...........................................................................................................369 Difference between Adjacent and Distributed PN-Clusters .................................................369 Priority Determination ................................................................................................................370 Cell Priority ..........................................................................................................................370 Transmitter Priority ..............................................................................................................371 Site Priority ..........................................................................................................................372 Allocation Examples........................................................................................................................372 Strategy: PN Offset per Cell ......................................................................................................373 Strategy: Adjacent PN-Clusters Per Site...................................................................................373 Strategy: ‘Distributed PN-Clusters Per Site ...............................................................................374 Automatic GSM-CDMA Neighbour Allocation.......................................................................................374 Overview .........................................................................................................................................374 Automatic Allocation Description.....................................................................................................374 Algorithm Based on Distance ....................................................................................................375 Algorithm Based on Coverage Overlapping ..............................................................................375 Delete Existing Neighbours Option ...........................................................................................377 TD-SCDMA Networks....................................................................381 Definitions and Formulas ......................................................................................................................381 Inputs ..............................................................................................................................................381 P-CCPCH Eb/Nt and C/I Calculation ..............................................................................................385 DwPCH C/I Calculation ...................................................................................................................386 DL TCH Eb/Nt and C/I Calculation..................................................................................................386 UL TCH Eb/Nt and C/I Calculation..................................................................................................386 Interference Calculation ..................................................................................................................387 HSDPA Dynamic Power Calculations .............................................................................................387 Smart Antenna Models....................................................................................................................387 Downlink Beamforming .............................................................................................................387 Uplink Beamforming ..................................................................................................................388 Uplink Beamforming and Interference Cancellation (MMSE) ....................................................388 Signal Level Based Calculations ..........................................................................................................389 Point Analysis..................................................................................................................................389 Profile Tab .................................................................................................................................389 Reception Tab ...........................................................................................................................389 RSCP Based Coverage Predictions................................................................................................390 Calculation Criteria ....................................................................................................................390 P-CCPCH RSCP Coverage Prediction .....................................................................................390 Coverage Condition .............................................................................................................390 Coverage Display ................................................................................................................391 Best Server P-CCPCH Coverage Prediction.............................................................................391 P-CCPCH Pollution Coverage Prediction..................................................................................391 DwPCH RSCP Coverage Prediction .........................................................................................392 Coverage Condition .............................................................................................................392 Coverage Display ................................................................................................................392 UpPCH RSCP Coverage Prediction..........................................................................................392 Coverage Condition .............................................................................................................392 AT281_TRG_E1 © Forsk 2009 Table of Contents 8.2.2.6.2 8.2.2.7 8.2.2.7.1 8.2.2.7.2 8.2.2.8 8.3 8.3.1 8.3.1.1 8.3.1.1.1 8.3.1.1.2 8.3.1.2 8.3.1.2.1 8.3.1.2.2 8.3.1.2.3 8.3.2 8.3.2.1 8.3.2.2 8.3.2.2.1 8.3.2.2.2 8.3.2.2.3 8.3.2.2.4 8.3.2.2.5 8.3.2.2.6 8.3.2.2.7 8.3.2.3 8.3.2.3.1 8.3.2.3.2 8.3.2.3.3 8.3.2.3.4 8.3.2.3.5 8.3.2.4 8.4 8.4.1 8.4.2 8.4.3 8.4.4 8.4.5 8.4.6 8.4.7 8.4.8 8.4.9 8.4.10 8.4.11 8.5 8.5.1 8.5.1.1 8.5.1.2 8.5.1.3 8.5.1.4 8.5.1.4.1 8.5.1.4.2 8.5.1.4.3 8.5.1.5 8.5.2 8.5.3 8.5.4 8.5.4.1 8.5.4.1.1 8.5.4.1.2 8.5.4.2 8.5.4.2.1 8.5.4.2.2 8.5.4.2.3 8.6 8.6.1 8.7 8.7.1 8.7.2 © Forsk 2009 Coverage Display................................................................................................................ 392 Baton Handover Coverage Prediction ...................................................................................... 393 Coverage Condition ............................................................................................................ 393 Coverage Display................................................................................................................ 393 Scrambling Code Interference Analysis.................................................................................... 393 Monte Carlo Simulations ...................................................................................................................... 394 Generating a Realistic User Distribution ........................................................................................ 394 Simulations Based on User Profile Traffic Maps ...................................................................... 394 Circuit Switched Service (i) ................................................................................................. 395 Packet Switched Service (j) ................................................................................................ 395 Simulations Based on Sector Traffic Maps............................................................................... 398 Throughputs in Uplink and Downlink................................................................................... 398 Total Number of Users (All Activity Statuses) ..................................................................... 398 Number of Users per Activity Status ................................................................................... 399 Power Control Simulation............................................................................................................... 399 Algorithm Initialisation............................................................................................................... 400 R99 Part of the Algorithm ......................................................................................................... 400 Determination of Mi’s Best Server (SBS(Mi))...................................................................... 400 Dynamic Channel Allocation ............................................................................................... 401 Uplink Power Control .......................................................................................................... 402 Downlink Power Control...................................................................................................... 404 Uplink Signals Update......................................................................................................... 406 Downlink Signals Update .................................................................................................... 406 Control of Radio Resource Limits (Downlink Traffic Power and Uplink Load) .................... 406 HSDPA Part of the Algorithm.................................................................................................... 407 HSDPA Power Allocation .................................................................................................... 407 Connection Status and Number of HSDPA Users .............................................................. 409 HSDPA Admission Control.................................................................................................. 409 HSDPA Dynamic Channel Allocation.................................................................................. 410 Ressource Unit Saturation .................................................................................................. 410 Convergence Criteria................................................................................................................ 410 TD-SCDMA Prediction Studies ............................................................................................................ 411 P-CCPCH Reception Analysis (Eb/Nt) or (C/I) ............................................................................... 411 DwPCH Reception Analysis (C/I) ................................................................................................... 412 Downlink TCH RSCP Coverage ..................................................................................................... 414 Uplink TCH RSCP Coverage ......................................................................................................... 414 Downlink Total Noise...................................................................................................................... 415 Downlink Service Area (Eb/Nt) or (C/I)........................................................................................... 416 Uplink Service Area (Eb/Nt) or (C/I) ............................................................................................... 418 Effective Service Area (Eb/Nt) or (C/I) ........................................................................................... 419 Cell to Cell Interference .................................................................................................................. 420 UpPCH Interference ....................................................................................................................... 421 HSDPA Coverage .......................................................................................................................... 421 Smart Antenna Modelling..................................................................................................................... 422 Modelling in Simulations................................................................................................................. 423 Grid of Beams Modelling .......................................................................................................... 423 Adaptive Beam Modelling ......................................................................................................... 424 Statistical Modelling .................................................................................................................. 425 Beamforming Smart Antenna Models....................................................................................... 425 Downlink Beamforming ....................................................................................................... 426 Uplink Beamforming............................................................................................................ 427 Uplink Beamforming and Interference Cancellation (MMSE).............................................. 428 3rd Party Smart Antenna Modelling.......................................................................................... 429 Construction of the Geographic Distributions ................................................................................. 429 Modelling in Coverage Predictions ................................................................................................. 431 HSDPA Coverage Prediction ......................................................................................................... 431 Fast Link Adaptation Modelling................................................................................................. 431 CQI Based on P-CCPCH Quality ........................................................................................ 432 CQI Based on HS-PDSCH Quality...................................................................................... 435 Coverage Prediction Display Options ....................................................................................... 437 Colour per CQI .................................................................................................................... 437 Colour per Peak Throughput............................................................................................... 437 Colour per HS-PDSCH Ec/Nt.............................................................................................. 437 N-Frequency Mode and Carrier Allocation........................................................................................... 437 Automatic Carrier Allocation........................................................................................................... 437 Neighbour Allocation ............................................................................................................................ 438 Neighbour Allocation for All Transmitters ....................................................................................... 439 Neighbour Allocation for a Group of Transmitters or One Transmitter ........................................... 441 AT281_TRG_E1 15 Technical Reference Guide 8.7.3 8.8 8.8.1 8.8.1.1 8.8.1.2 8.8.1.3 8.8.1.3.1 8.8.1.3.2 8.8.1.4 8.8.1.4.1 8.8.1.4.2 8.8.1.4.3 8.8.2 8.8.2.1 8.8.2.1.1 8.8.2.1.2 8.8.2.1.3 8.8.2.1.4 8.8.2.2 8.9 8.9.1 8.9.1.1 8.9.1.2 8.9.1.3 8.9.1.3.1 8.9.1.3.2 9 9.1 9.1.1 9.1.2 9.1.3 9.1.3.1 9.1.3.2 9.1.3.3 9.1.3.4 9.1.3.5 9.1.4 9.1.4.1 9.1.4.2 9.1.4.3 9.1.4.4 9.1.4.5 9.1.4.6 9.1.4.7 9.1.4.8 9.1.4.9 9.1.4.10 9.1.5 9.1.5.1 9.1.5.2 9.1.6 9.1.6.1 9.1.7 9.1.7.1 9.1.7.2 9.1.7.3 9.2 9.2.1 9.2.1.1 9.2.1.2 9.2.1.3 9.2.2 9.2.2.1 9.2.2.1.1 9.2.2.1.2 9.2.2.1.3 9.2.2.2 16 Importance Calculation ...................................................................................................................441 Scrambling Code Allocation..................................................................................................................442 Automatic Allocation Description.....................................................................................................443 Allocation Constraints and Options ...........................................................................................443 Allocation Strategies..................................................................................................................443 Allocation Process.....................................................................................................................444 Single Carrier Network.........................................................................................................444 Multi-Carrier Network...........................................................................................................445 Priority Determination ................................................................................................................445 Cell Priority ..........................................................................................................................445 Transmitter Priority ..............................................................................................................448 Site Priority ..........................................................................................................................448 IScrambling Code Allocation Example ............................................................................................448 Single Carrier Network ..............................................................................................................448 Strategy: Clustered ..............................................................................................................449 Strategy: Distributed per Cell...............................................................................................449 Strategy: One SYNC_DL Code per Site ..............................................................................450 Strategy: Distributed per Site...............................................................................................450 Multi Carrier Network.................................................................................................................450 Automatic GSM/TD-SCDMA Neighbour Allocation ..............................................................................451 Automatic Allocation Description.....................................................................................................451 Algorithm Based on Distance ....................................................................................................452 Algorithm Based on Coverage Overlapping ..............................................................................452 Appendices................................................................................................................................454 Delete Existing Neighbours Option......................................................................................454 Calculation of Inter-Transmitter Distance ............................................................................454 WiMAX BWA Networks..................................................................457 Definitions and Formulas ......................................................................................................................457 Input ................................................................................................................................................457 Co- and Adjacent Channel Overlaps Calculation............................................................................461 Preamble Signal Quality Calculations .............................................................................................461 Preamble Signal Level Calculation............................................................................................461 Preamble Noise Calculation ......................................................................................................462 Preamble Interference Calculation ............................................................................................462 Preamble C/N Calculation .........................................................................................................462 Preamble C/(I+N) Calculation....................................................................................................462 Traffic and Pilot Signal Quality Calculations ...................................................................................463 Traffic and Pilot Signal Level Calculation (DL) ..........................................................................463 Traffic and Pilot Noise Calculation (DL) ....................................................................................463 Traffic and Pilot Interference Calculation (DL) ..........................................................................463 Traffic and Pilot C/N Calculation (DL) .......................................................................................464 Traffic and Pilot C/(I+N) Calculation (DL) ..................................................................................465 Traffic Signal Level Calculation (UL) .........................................................................................465 Traffic Noise Calculation (UL) ...................................................................................................465 Traffic Interference Calculation (UL) .........................................................................................466 Traffic C/N Calculation (UL) ......................................................................................................466 Traffic C/(I+N) Calculation (UL) .................................................................................................466 Channel Throughput Calculation.....................................................................................................467 Calculation of Total Cell Resources ..........................................................................................467 Channel Throughput, Cell Capacity, and Allocated Bandwidth Throughput Calculation...........468 Scheduling and Radio Resource Management...............................................................................469 User Throughput Calculation.....................................................................................................470 Smart Antenna Models....................................................................................................................471 Downlink Beamforming .............................................................................................................471 Uplink Beamforming ..................................................................................................................471 Uplink Beamforming and Interference Cancellation (MMSE) ....................................................472 Calculation Processes ..........................................................................................................................472 Point Analysis..................................................................................................................................472 Profile Tab .................................................................................................................................473 Reception Tab ...........................................................................................................................473 Signal Analysis Tab ...................................................................................................................473 Preamble Signal Level Coverage Predictions.................................................................................473 Coverage Area Determination...................................................................................................474 All Servers ...........................................................................................................................474 Best Signal Level and a Margin ...........................................................................................474 Second Best Signal Level and a Margin..............................................................................474 Coverage Display ......................................................................................................................474 AT281_TRG_E1 © Forsk 2009 Table of Contents 9.2.2.2.1 9.2.2.2.2 9.2.3 9.2.3.1 9.2.3.2 9.2.3.3 9.2.3.3.1 9.2.3.3.2 9.2.3.3.3 9.2.4 9.2.5 9.2.5.1 9.2.5.1.1 9.2.5.1.2 9.2.5.2 9.2.6 9.2.6.1 9.2.6.2 9.2.6.3 9.2.6.3.1 9.2.6.3.2 9.2.6.3.3 9.2.6.3.4 9.2.6.3.5 9.2.6.3.6 9.2.6.3.7 9.2.6.3.8 9.2.6.3.9 9.3 9.3.1 9.3.1.1 9.3.1.2 9.3.1.3 9.3.1.4 9.3.1.5 9.3.2 9.3.2.1 9.3.2.2 9.3.2.3 9.3.2.4 9.3.2.5 9.3.3 9.3.4 9.3.5 9.3.6 9.3.6.1 9.3.6.2 9.3.6.3 9.3.6.3.1 9.3.6.3.2 9.3.6.4 9.3.6.5 9.3.6.6 9.3.6.7 9.3.6.8 9.3.6.8.1 9.3.6.8.2 9.3.6.9 9.3.6.10 9.3.7 9.3.7.1 9.3.7.1.1 9.3.7.1.2 9.3.7.1.3 9.3.7.1.4 9.3.7.2 9.3.8 9.3.8.1 © Forsk 2009 Coverage Resolution .......................................................................................................... 474 Display Types ..................................................................................................................... 474 Effective Signal Analysis Coverage Predictions ............................................................................. 475 Coverage Area Determination .................................................................................................. 476 Coverage Parameter Calculation.............................................................................................. 476 Coverage Display ..................................................................................................................... 476 Coverage Resolution .......................................................................................................... 476 Effective Signal Analysis (DL) Display Types ..................................................................... 476 Effective Signal Analysis (UL) Display Types ..................................................................... 477 Calculations on Subscriber Lists .................................................................................................... 477 Monte Carlo Simulations ................................................................................................................ 478 Generating a Realistic User Distribution................................................................................... 478 Simulations Based on User Profile Traffic Maps and Subscriber Lists ............................... 478 Simulations Based on Sector Traffic Maps ......................................................................... 480 Simulation Process ................................................................................................................... 482 C/(I+N)-Based Coverage Predictions ............................................................................................. 486 Coverage Area Determination .................................................................................................. 486 Coverage Parameter Calculation.............................................................................................. 486 Coverage Display ..................................................................................................................... 487 Coverage Resolution .......................................................................................................... 487 Coverage by C/(I+N) Level (DL) Display Types.................................................................. 487 Coverage by Best Bearer (DL) Display Types .................................................................... 488 Coverage by Throughput (DL) Display Types..................................................................... 488 Coverage by Quality Indicator (DL) Display Types ............................................................. 489 Coverage by C/(I+N) Level (UL) Display Types.................................................................. 489 Coverage by Best Bearer (UL) Display Types .................................................................... 490 Coverage by Throughput (UL) Display Types..................................................................... 490 Coverage by Quality Indicator (UL) Display Types ............................................................. 491 Calculation Algorithms ......................................................................................................................... 491 Co- and Adjacent Channel Overlaps Calculation ........................................................................... 491 Conversion From Channel Numbers to Start and End Frequencies ........................................ 492 Co-Channel Overlap Calculation .............................................................................................. 493 Adjacent Channel Overlap Calculation ..................................................................................... 493 FDD – TDD Overlap Ratio Calculation ..................................................................................... 494 Total Overlap Ratio Calculation ................................................................................................ 495 Preamble Signal Level and Quality Calculations............................................................................ 495 Preamble Signal Level Calculation ........................................................................................... 495 Preamble Noise Calculation ..................................................................................................... 496 Preamble Interference Calculation ........................................................................................... 498 Preamble C/N Calculation ........................................................................................................ 499 Preamble C/(I+N) Calculation ................................................................................................... 499 Best Server Determination ............................................................................................................. 500 Service Area Calculation ................................................................................................................ 501 Permutation Zone Selection (WiMAX 802.16e).............................................................................. 501 Traffic and Pilot Signal Level and Quality Calculations .................................................................. 502 Traffic and Pilot Signal Level Calculation (DL) ......................................................................... 502 Traffic and Pilot Noise Calculation (DL).................................................................................... 503 Traffic and Pilot Interference Calculation (DL).......................................................................... 505 Traffic and Pilot Interference Signal Levels Calculation (DL).............................................. 505 Effective Traffic and Pilot Interference Calculation (DL) ..................................................... 508 Traffic and Pilot C/N Calculation (DL)....................................................................................... 512 Traffic and Pilot C/(I+N) and Bearer Calculation (DL) .............................................................. 514 Traffic Signal Level Calculation (UL) ........................................................................................ 516 Traffic Noise Calculation (UL)................................................................................................... 517 Traffic Interference Calculation (UL)......................................................................................... 517 Traffic Interference Signal Levels Calculation (UL)............................................................. 518 Noise Rise Calculation (UL) ................................................................................................ 518 Traffic C/N Calculation (UL)...................................................................................................... 519 Traffic C/(I+N) and Bearer Calculation (UL) ............................................................................. 522 Channel Throughput Calculation.................................................................................................... 526 Calculation of Total Cell Resources.......................................................................................... 526 Calculation of Sampling Frequency .................................................................................... 526 Calculation of Symbol Duration........................................................................................... 526 Calculation of Total Cell Resources - TDD Networks ......................................................... 527 Calculation of Total Cell Resources - FDD Networks ......................................................... 528 Channel Throughput, Cell Capacity, and Allocated Bandwidth Throughput Calculation .......... 529 Scheduling and Radio Resource Management .............................................................................. 532 Scheduling and Radio Resource Allocation.............................................................................. 532 AT281_TRG_E1 17 Technical Reference Guide 9.3.8.2 9.3.9 9.3.9.1 9.3.9.2 9.3.9.3 9.4 9.4.1 9.4.2 9.4.3 9.4.3.1 9.4.3.2 9.4.3.3 9.4.4 9.4.4.1 9.4.4.2 9.4.4.3 10 10.1 10.1.1 10.1.2 10.1.3 10.1.4 10.1.4.1 10.1.4.2 10.1.4.3 10.1.4.4 10.1.4.5 10.1.4.6 10.1.4.7 10.1.4.8 10.1.4.9 10.1.4.10 10.1.4.11 10.1.5 10.1.5.1 10.1.5.2 10.1.5.3 10.1.6 10.1.6.1 10.2 10.2.1 10.2.1.1 10.2.1.2 10.2.1.3 10.2.2 10.2.2.1 10.2.2.1.1 10.2.2.1.2 10.2.2.1.3 10.2.2.2 10.2.2.2.1 10.2.2.2.2 10.2.3 10.2.3.1 10.2.3.2 10.2.3.3 10.2.3.3.1 10.2.3.3.2 10.2.3.3.3 10.2.4 10.2.5 10.2.5.1 10.2.5.1.1 10.2.5.1.2 10.2.5.2 10.2.6 10.2.6.1 18 User Throughput Calculation.....................................................................................................539 Smart Antenna Models....................................................................................................................540 Downlink Beamforming .............................................................................................................541 Uplink Beamforming ..................................................................................................................542 Uplink Beamforming and Interference Cancellation (MMSE) ....................................................543 Automatic Allocation Algorithms ...........................................................................................................545 Automatic Neighbour Allocation ......................................................................................................545 Automatic Inter-Technology Neighbour Allocation ..........................................................................547 Automatic Frequency Planning .......................................................................................................550 Separation Constraint and Relationship Weights ......................................................................550 Calculation of Cost Between TBA and Related Cells ................................................................550 AFP Algorithm ...........................................................................................................................553 Automatic Preamble Index Allocation .............................................................................................553 Constraint and Relationship Weights ........................................................................................554 Calculation of Cost Between TBA and Related Cells ................................................................554 Automatic Allocation Algorithm..................................................................................................557 LTE Networks ................................................................................561 Definitions and Formulas ......................................................................................................................561 Input ................................................................................................................................................561 Downlink Transmission Powers Calculation ...................................................................................564 Co- and Adjacent Channel Overlaps Calculation............................................................................565 Signal Level and Signal Quality Calculations..................................................................................566 Signal Level Calculation (DL) ....................................................................................................566 Noise Calculation (DL) ..............................................................................................................567 Interference Calculation (DL) ....................................................................................................567 C/N Calculation (DL) .................................................................................................................568 C/(I+N) Calculation (DL) ............................................................................................................568 Signal Level Calculation (UL) ....................................................................................................569 Noise Calculation (UL) ..............................................................................................................570 Interference Calculation (UL) ....................................................................................................570 Noise Rise Calculation (UL) ......................................................................................................570 C/N Calculation (UL) .................................................................................................................570 C/(I+N) Calculation (UL) ............................................................................................................571 Channel Throughput Calculation.....................................................................................................571 Calculation of Downlink Cell Resources....................................................................................571 Calculation of Uplink Cell Resources ........................................................................................572 Channel Throughput, Cell Capacity, and Allocated Bandwidth Throughput Calculation...........572 Scheduling and Radio Resource Management...............................................................................573 User Throughput Calculation.....................................................................................................574 Calculation Processes ..........................................................................................................................575 Point Analysis..................................................................................................................................575 Profile Tab .................................................................................................................................575 Reception Tab ...........................................................................................................................575 Signal Analysis Tab ...................................................................................................................575 Downlink Reference Signal Level Coverage Predictions ................................................................576 Coverage Area Determination ...................................................................................................576 All Servers ...........................................................................................................................576 Best Signal Level and a Margin ...........................................................................................576 Second Best Signal Level and a Margin..............................................................................576 Coverage Display ......................................................................................................................577 Coverage Resolution ...........................................................................................................577 Display Types ......................................................................................................................577 Effective Signal Analysis Coverage Predictions..............................................................................578 Coverage Area Determination ...................................................................................................578 Coverage Parameter Calculation ..............................................................................................578 Coverage Display ......................................................................................................................578 Coverage Resolution ...........................................................................................................578 Effective Signal Analysis (DL) Display Types ......................................................................578 Effective Signal Analysis (UL) Display Types ......................................................................579 Calculations on Subscriber Lists .....................................................................................................580 Monte Carlo Simulations .................................................................................................................580 Generating a Realistic User Distribution ...................................................................................580 Simulations Based on User Profile Traffic Maps and Subscriber Lists................................581 Simulations Based on Sector Traffic Maps..........................................................................582 Simulation Process....................................................................................................................584 C/(I+N)-Based Coverage Predictions..............................................................................................587 Coverage Area Determination ...................................................................................................587 AT281_TRG_E1 © Forsk 2009 Table of Contents 10.2.6.2 10.2.6.3 10.2.6.3.1 10.2.6.3.2 10.2.6.3.3 10.2.6.3.4 10.2.6.3.5 10.2.6.3.6 10.2.6.3.7 10.2.6.3.8 10.2.6.3.9 10.3 10.3.1 10.3.2 10.3.2.1 10.3.2.2 10.3.2.3 10.3.2.4 10.3.3 10.3.3.1 10.3.3.2 10.3.3.3 10.3.3.4 10.3.3.5 10.3.3.6 10.3.3.7 10.3.3.8 10.3.3.8.1 10.3.3.8.2 10.3.3.9 10.3.3.10 10.3.4 10.3.5 10.3.6 10.3.6.1 10.3.6.1.1 10.3.6.1.2 10.3.6.2 10.3.7 10.3.7.1 10.3.7.2 10.4 10.4.1 10.4.2 10.4.3 10.4.3.1 10.4.3.2 10.4.3.3 10.4.4 10.4.4.1 10.4.4.2 10.4.4.3 11 11.1 11.1.1 11.1.1.1 11.1.1.1.1 11.1.1.1.2 11.1.1.1.3 11.1.1.2 11.1.1.2.1 11.1.1.2.2 11.1.1.3 11.1.1.3.1 11.1.1.3.2 11.1.1.4 11.1.1.4.1 © Forsk 2009 Coverage Parameter Calculation.............................................................................................. 587 Coverage Display ..................................................................................................................... 588 Coverage Resolution .......................................................................................................... 588 Coverage by C/(I+N) Level (DL) Display Types.................................................................. 588 Coverage by Best Bearer (DL) Display Types .................................................................... 589 Coverage by Throughput (DL) Display Types..................................................................... 589 Coverage by Quality Indicator (DL) Display Types ............................................................. 590 Coverage by C/(I+N) Level (UL) Display Types.................................................................. 590 Coverage by Best Bearer (UL) Display Types .................................................................... 591 Coverage by Throughput (UL) Display Types..................................................................... 591 Coverage by Quality Indicator (UL) Display Types ............................................................. 592 Calculation Algorithms ......................................................................................................................... 593 Downlink Transmission Powers Calculation................................................................................... 593 Co- and Adjacent Channel Overlaps Calculation ........................................................................... 596 Conversion From Channel Numbers to Start and End Frequencies ........................................ 596 Co-Channel Overlap Calculation .............................................................................................. 597 Adjacent Channel Overlap Calculation ..................................................................................... 597 Total Overlap Ratio Calculation ................................................................................................ 598 Signal Level and Signal Quality Calculations ................................................................................. 599 Signal Level Calculation (DL) ................................................................................................... 599 Noise Calculation (DL).............................................................................................................. 601 Interference Calculation (DL).................................................................................................... 602 C/N Calculation (DL)................................................................................................................. 605 C/(I+N) and Bearer Calculation (DL) ........................................................................................ 607 Signal Level Calculation (UL) ................................................................................................... 610 Noise Calculation (UL).............................................................................................................. 612 Interference Calculation (UL).................................................................................................... 612 Interfering Signal Level Calculation (UL)............................................................................. 612 Noise Rise Calculation (UL) ................................................................................................ 613 C/N Calculation (UL)................................................................................................................. 614 C/(I+N) and Bearer Calculation (UL) ........................................................................................ 616 Best Server Determination ............................................................................................................. 619 Service Area Calculation ................................................................................................................ 620 Channel Throughput Calculation.................................................................................................... 620 Calculation of Total Cell Resources.......................................................................................... 620 Calculation of Downlink Cell Resources ............................................................................. 620 Calculation of Uplink Cell Resources .................................................................................. 622 Channel Throughput, Cell Capacity, and Allocated Bandwidth Throughput Calculation .......... 623 Scheduling and Radio Resource Management .............................................................................. 626 Scheduling and Radio Resource Allocation.............................................................................. 626 User Throughput Calculation .................................................................................................... 631 Automatic Allocation Algorithms........................................................................................................... 632 Automatic Neighbour Allocation ..................................................................................................... 632 Automatic Inter-Technology Neighbour Allocation ......................................................................... 635 Automatic Frequency Planning ...................................................................................................... 637 Separation Constraint and Relationship Weights ..................................................................... 637 Calculation of Cost Between TBA and Related Cells ............................................................... 638 AFP Algorithm........................................................................................................................... 640 Automatic Physical Cell ID Allocation............................................................................................. 640 Constraint and Relationship Weights........................................................................................ 641 Calculation of Cost Between TBA and Related Cells ............................................................... 641 Automatic Allocation Algorithm ................................................................................................. 644 Repeaters and Remote Antennas................................................. 647 Modelling Repeaters ............................................................................................................................ 647 CDMA Documents.......................................................................................................................... 647 Over the Air............................................................................................................................... 647 Signal Level Received From Repeaters.............................................................................. 647 Gain Automatic Calculation................................................................................................. 648 Donor Side Parameter Automatic Calculation..................................................................... 649 Microwave Link ......................................................................................................................... 650 Signal Level Received From Repeaters.............................................................................. 650 Gain Automatic Calculation................................................................................................. 651 Fibre Link .................................................................................................................................. 652 Signal Level Received From Repeaters.............................................................................. 652 Gain Automatic Calculation................................................................................................. 652 Appendices ............................................................................................................................... 653 Automatic Controls.............................................................................................................. 653 AT281_TRG_E1 19 Technical Reference Guide 11.1.1.4.2 11.1.1.4.3 11.1.2 11.1.2.1 11.1.2.1.1 11.1.2.1.2 11.1.2.1.3 11.1.2.2 11.1.2.2.1 11.1.2.2.2 11.1.2.3 11.1.2.3.1 11.1.2.3.2 11.1.2.4 11.1.2.4.1 11.2 11.2.1 11.2.1.1 11.2.1.2 11.2.2 11.2.2.1 11.2.2.2 20 Carrier Power and Interference Calculation.........................................................................654 Consideration of Repeater Noise Figure .............................................................................656 GSM Documents.............................................................................................................................656 Over the Air ...............................................................................................................................656 Signal Level Received From Repeaters ..............................................................................656 EIRP Automatic Calculation.................................................................................................657 Donor Side Parameter Automatic Calculation .....................................................................658 Microwave Link..........................................................................................................................659 Signal Level Received From Repeaters ..............................................................................659 EIRP Automatic Calculation.................................................................................................659 Fibre Link...................................................................................................................................660 Signal Level Received From Repeaters ..............................................................................660 EIRP Automatic Calculation.................................................................................................661 Appendices................................................................................................................................661 Automatic Controls ..............................................................................................................661 Modelling Remote Antennas.................................................................................................................662 CDMA Documents ..........................................................................................................................662 Signal Level Received From Repeaters ....................................................................................662 Gain Automatic Calculation .......................................................................................................662 GSM Documents.............................................................................................................................663 Signal Level Received From Repeaters ....................................................................................663 EIRP Automatic Calculation ......................................................................................................664 AT281_TRG_E1 © Forsk 2009 List of Figures List of Figures Figure 2.1: Figure 2.2: Figure 2.3: Figure 4.1: Figure 4.2: Figure 4.3: Figure 4.4: Figure 4.5: Figure 4.6: Figure 4.7: Figure 4.8: Figure 4.9: Figure 4.10: Figure 4.11: Figure 4.12: Figure 4.13: Figure 4.14: Figure 4.15: Figure 4.16: Figure 4.17: Figure 4.18: Figure 4.19: Figure 4.20: Figure 4.21: Figure 4.22: Figure 4.23: Figure 4.24: Figure 4.25: Figure 4.26: Figure 4.27: Figure 4.28: Figure 5.1: Figure 5.2: Figure 5.3: Figure 5.4: Figure 5.5: Figure 5.6: Figure 5.7: Figure 5.8: Figure 5.9: Figure 5.10: Figure 5.11: Figure 5.12: Figure 5.13: Figure 6.1: Figure 6.2: Figure 6.3: Figure 6.4: Figure 6.5: Figure 6.6: Figure 6.7: Figure 6.8: Figure 6.9: Figure 6.10: Figure 6.11: © Forsk 2009 Digital Terrain Model.................................................................................................................................. 37 Schematic view of a DTM file .................................................................................................................... 37 Clutter Classes .......................................................................................................................................... 38 Example 1: Single Calculation Area .......................................................................................................... 77 Example 2: Multiple Calculation Areas ...................................................................................................... 77 Ground Altitude Determination - 1 ............................................................................................................. 79 Ground Altitude Determination - 2 ............................................................................................................. 79 Ground Altitude Determination - 3 ............................................................................................................. 80 Ground Altitude Determination - 4 ............................................................................................................. 80 Clutter Height............................................................................................................................................. 80 Radial calculation method.......................................................................................................................... 81 Site-bin centre profile................................................................................................................................. 81 Radial calculation method.......................................................................................................................... 82 Enhanced Slope at Receiver ..................................................................................................................... 89 Losses due to Clutter................................................................................................................................. 92 Tx-Rx profile .............................................................................................................................................. 93 Knife-Edge Diffraction.............................................................................................................................. 106 Deygout Construction – 1 Obstacle ......................................................................................................... 107 Deygout Construction – 3 Obstacles ....................................................................................................... 108 Epstein-Peterson Construction ................................................................................................................ 108 Millington Construction ............................................................................................................................ 109 Azimuth and Tilt Computation.................................................................................................................. 111 Vertical Pattern Transformation due to Electrical Downtilt....................................................................... 113 Vertical Antenna Pattern.......................................................................................................................... 114 Peaks and Nulls in the Antenna Pattern .................................................................................................. 114 Log-normal Probability Density Function ................................................................................................. 115 Normalised Margin .................................................................................................................................. 121 Margin - Probability (Case of 2 Signals) .................................................................................................. 126 Margin - Probability (Case of 3 Signals with sigma = 8dB, delta1 = 1dB) ............................................... 127 Margin - Probability (Case of 3 Signals with sigma = 8dB, delta1 = 2dB) ............................................... 127 Reference Point - Location of the Transmission/Reception parameters ................................................. 128 Representation of a Concentric Cell TXi.................................................................................................. 142 Representation of Micro and Macro Layers............................................................................................. 143 Concentric Cells....................................................................................................................................... 144 Concentric Cells....................................................................................................................................... 148 Reduction of Throughput per Timeslot .................................................................................................... 151 Reduction Factor for Different Packet Switched Traffic Loads (Lp, X-axis)............................................. 152 Blocking Probability for Different Packet Switched Traffic Loads (Lp, X-axis)......................................... 154 Network Dimensioning Process............................................................................................................... 154 Minimum Throughput Reduction Factor .................................................................................................. 158 Overlapping Zones .................................................................................................................................. 163 FER vs. C/I Graphs.................................................................................................................................. 180 BER vs. C/I Graphs ................................................................................................................................. 180 MOS vs. C/I Graphs................................................................................................................................. 181 Description of a Packet Session .............................................................................................................. 202 UMTS HSPA Power Control Algorithm.................................................................................................... 206 Connection status of HSDPA bearer users ............................................................................................. 212 HSDPA Bearer Allocation Process for Packet (HSPA - Constant Bit Rate) Service Users..................... 213 HSDPA Bearer Allocation Process for Packet (HSDPA) and Packet (HSPA) Service Users ................. 214 HSDPA UE Categories Table .................................................................................................................. 219 HSDPA Radio Bearers Table .................................................................................................................. 220 HSUPA UE Categories Table .................................................................................................................. 227 HSUPA Radio Bearers Table .................................................................................................................. 227 HSUPA Bearer SelectionTable................................................................................................................ 228 HSUPA Bearer Allocation Process for Packet (HSPA - Constant Bit Rate) Service Users..................... 229 AT281_TRG_E1 21 Technical Reference Guide Figure 6.12: Figure 6.13: Figure 6.14: Figure 6.15: Figure 6.16: Figure 6.17: Figure 6.18: Figure 6.19: Figure 7.1: Figure 7.2: Figure 7.3: Figure 7.4: Figure 7.5: Figure 7.6: Figure 7.7: Figure 8.1: Figure 8.2: Figure 8.3: Figure 8.4: Figure 8.5: Figure 8.6: Figure 8.7: Figure 8.8: Figure 8.9: Figure 8.10: Figure 8.11: Figure 8.12: Figure 8.13: Figure 8.14: Figure 8.15: Figure 8.16: Figure 8.17: Figure 8.18: Figure 8.19: Figure 8.20: Figure 8.21: Figure 9.1: Figure 9.2: Figure 9.3: Figure 9.4: Figure 9.5: Figure 9.6: Figure 9.7: Figure 9.8: Figure 9.9: Figure 9.10: Figure 9.11: Figure 9.12: Figure 9.13: Figure 9.14: Figure 9.15: Figure 9.16: Figure 9.17: Figure 9.18: Figure 9.19: Figure 10.1: Figure 10.2: Figure 10.3: Figure 10.4: Figure 10.5: Figure 10.6: Figure 10.7: 22 HSUPA Bearer Allocation Process for Packet (HSPA) Service Users ..................................................... OVSF Code Tree Indices (Not OVSF Code Numbers) ............................................................................ Overlapping Zone for Intra-carrier Neighbours......................................................................................... Overlapping Zone for Inter-carrier Neighbours - 1st Case ....................................................................... Overlapping Zone for Inter-carrier Neighbours - 2nd Case ...................................................................... Neighbourhood Constraints...................................................................................................................... Primary Scrambling Codes Allocation ...................................................................................................... Inter-Transmitter Distance Computation .................................................................................................. CDMA2000 1xRTT Power Control Algorithm ........................................................................................... CDMA2000 1xEVDO Power Control Algorithm ........................................................................................ Walsh Code Tree Indices (Not Walsh Code Numbers) ............................................................................ Overlapping Zones - 1st Case.................................................................................................................. Overlapping Zones - 2nd Case ................................................................................................................ Neighbourhood Constraints...................................................................................................................... PN Offset Allocation ................................................................................................................................. Description of a Packet Session............................................................................................................... TD-SCDMA Power Control Algorithm ...................................................................................................... Grid Of Beams Modelling ......................................................................................................................... GOB Modelling - Determination of the Best Beam................................................................................... Adaptive Beam Modelling - Determination of the Best Beam .................................................................. Linear Adaptive Antenna Array ................................................................................................................ Downlink Beamforming ............................................................................................................................ Uplink Beamforming ................................................................................................................................. Uplink Adaptive Algorithm ........................................................................................................................ Construction of the Geographic Distribution of Downlink Traffic Power ................................................... Geographic Distribution of Downlink Traffic Power .................................................................................. Geographic Distribution of downlink traffic power and uplink load ........................................................... Radio Bearers Table ................................................................................................................................ UE Categories Table ................................................................................................................................ Weighted Distance Between Transmitters ............................................................................................... N-frequency Neighbour Allocation............................................................................................................ Overlapping Coverages............................................................................................................................ Neighbourhood Constraints...................................................................................................................... Scrambling Code Allocation Example ...................................................................................................... Scrambling Code Allocation to All Carriers .............................................................................................. Inter-Transmitter Distance Computation .................................................................................................. WiMAX Simulation Algorithm ................................................................................................................... Victim and Interfering Mobiles .................................................................................................................. Simulation Convergence Stability Factor ................................................................................................. Co-Channel and Adjacent Channel Overlaps .......................................................................................... Downlink C/(I+N) calculation in Simulations............................................................................................. Downlink C/(I+N) calculation in Coverage Predictions ............................................................................. Segmentation ........................................................................................................................................... Segmentation Interference Scenarios ...................................................................................................... Linear Adaptive Antenna Array ................................................................................................................ Downlink Beamforming ............................................................................................................................ Uplink Beamforming ................................................................................................................................. Uplink Adaptive Algorithm ........................................................................................................................ Determination of Adjacent Cells ............................................................................................................... Overlapping Zones ................................................................................................................................... Inter-Transmitter Distance Calculation ..................................................................................................... Weighted Distance Between Cells ........................................................................................................... Importance Based on Distance Relation .................................................................................................. Weighted Distance Between Cells ........................................................................................................... Importance Based on Distance Relation .................................................................................................. LTE Simulation Algorithm ......................................................................................................................... Co-Channel and Adjacent Channel Overlaps .......................................................................................... Determination of Adjacent Cells ............................................................................................................... Overlapping Zones ................................................................................................................................... Inter-Transmitter Distance Calculation ..................................................................................................... Weighted Distance Between Cells ........................................................................................................... Importance Based on Distance Relation .................................................................................................. AT281_TRG_E1 229 241 273 274 275 282 284 290 320 327 334 363 364 370 372 396 400 423 424 424 425 426 427 428 430 430 431 434 435 438 440 440 446 448 451 454 482 483 484 492 507 507 509 510 540 541 542 543 545 546 548 552 552 556 557 585 596 633 634 635 639 640 © Forsk 2009 List of Figures Figure 10.8: Figure 10.9: Figure 11.1: Figure 11.2: Figure 11.3: Figure 11.4: Figure 11.5: Figure 11.6: Figure 11.7: Figure 11.8: Figure 11.9: Figure 11.10: Figure 11.11: Figure 11.12: Figure 11.13: Figure 11.14: Figure 11.15: Figure 11.16: Figure 11.17: Figure 11.18: Figure 11.19: Figure 11.20: Figure 11.21: Figure 11.22: Figure 11.23: Figure 11.24: Figure 11.25: Figure 11.26: © Forsk 2009 Weighted Distance Between Cells........................................................................................................... Importance Based on Distance Relation ................................................................................................. CDMA Documents - Over the Air Repeater............................................................................................. Over the Air Repeater - Downlink Total Gain .......................................................................................... Over the Air Repeater - Uplink Total Gain ............................................................................................... Angle from North (Azimuth) ..................................................................................................................... Positive/Negative Mechanical Downtilt .................................................................................................... Tilt Angle Computation ............................................................................................................................ CDMA Documents - Microwave Link Repeater ....................................................................................... Microwave Link Repeater - Downlink Total Gain..................................................................................... Microwave Link Repeater - Uplink Total Gain ......................................................................................... CDMA Documents - Fibre Link Repeater ................................................................................................ Fibre Link Repeater - Downlink Total Gain.............................................................................................. Fibre Link Repeater - Uplink Total Gain .................................................................................................. GSM Documents - Over the Air Repeater ............................................................................................... Over the Air Repeater - EIRP .................................................................................................................. Angle from North (Azimuth) ..................................................................................................................... Positive/Negative Mechanical Downtilt .................................................................................................... Tilt Angle Computation ............................................................................................................................ GSM Documents - Microwave Link Repeater.......................................................................................... Microwave Link Repeater - EIRP............................................................................................................. GSM Documents - Fibre Link Repeater................................................................................................... Fibre Link Repeater - EIRP...................................................................................................................... CDMA Documents - Remote Antenna Signal Level ................................................................................ Remote Antennas - Downlink Total Gain................................................................................................. Remote Antennas - Uplink Total Gain ..................................................................................................... GSM Documents - Remote Antenna Signal Level................................................................................... Remote Antennas - EIRP ........................................................................................................................ AT281_TRG_E1 643 644 647 648 649 649 650 650 650 651 651 652 653 653 657 657 658 658 658 659 660 660 661 662 663 663 663 664 23 Technical Reference Guide 24 AT281_TRG_E1 © Forsk 2009 Chapter 1 Coordinate Systems and Units This chapter presents the different coordinate systems available in Atoll by default. It describes the projection, display, and internal coordinate systems, and describes the format of the coordinate systems files. This chapter also provides details of the different power and length units available in Atoll. AtollMicrowave Atoll Microwave Planning Software RF PlanningLink & Optimisation Software Technical Reference Guide 26 AT281_TRG_E1 © Forsk 2009 Chapter 1: Coordinate Systems and Units 1 Coordinate Systems and Units 1.1 Coordinate Systems A map or a geo-spatial database is a flat representation of data collected from a curved surface. A projection is a means for producing all or part of a spheroid on a flat sheet. This projection cannot be done without distortion. Therefore, the cartographer must choose the characteristic (distance, direction, scale, area, or shape) that he wants to be shown accurately at the expense of the other characteristics, or compromise on several characteristics [1-3]. The projected zones are referenced using cartographic coordinates (meter, yard, etc.). Two projection methods are widely used: • • The Lambert Conformal-Conic Method: A portion of the earth is mathematically projected on a cone conceptually secant at one or two standard parallels. This projection method is useful for representing countries or regions that have a predominant east-west expanse. The Universal Transverse Mercator (UTM) Method: A portion of the earth is mathematically projected on a cylinder tangent to a meridian (which is transverse or crosswise to the equator). This projection method is useful for mapping large areas that are oriented north-south. The geographic system is not a projection. It is only a representation of a location on the surface of the earth in geographic coordinates (degree-minute-second, grade) giving the latitude and longitude in relation to the meridian origin (e.g., Paris for NTF system and Greenwich for ED50 system). The locations in the geographic system can be converted into other projections. References: [1] Snyder, John. P., Map Projections Used by the US Geological Survey, 2nd Edition, United States Government Printing Office, Washington, D.C., 313 pages, 1982. [2] http://www.colorado.edu/geography/gcraft/notes/gps/gps_f.html [3] http://www.posc.org/Epicentre.2_2/DataModel/ExamplesofUsage/eu_cs34.html [4] http://www.ign.fr/telechargement/Pi/SERVICES/transfo.pdf (Document in French) 1.1.1 Description of Coordinate Systems A Geographic coordinate system is a latitude and longitude coordinate system. The latitude and longitude are related to an ellipsoid, a geodetic datum, and a prime meridian. The geodetic datum provides the position and orientation of the ellipsoid relative to the earth. Cartographic coordinate systems are obtained by transforming each (latitude, longitude) value into an (easting, northing) value. A projection coordinate system is obtained by transforming each (latitude, longitude) value into an (easting, northing) value. Projection coordinate systems are geographic coordinate systems that provide longitude and latitude, and the transformation method characterised by a set of parameters. Different methods may require different sets of parameters. For example, the parameters required for Transverse Mercator coordinate systems are: • • • • • The longitude of the natural origin (central meridian) The latitude of the natural origin The False Easting value The False Northing value A scaling factor at the natural origin (central meridian) Basic definitions are presented below. 1.1.1.1 Geographic Coordinate System The geographic coordinate system is a datum and a meridian. Atoll enables you to choose the most suitable geographic coordinate system for your geographic data. 1.1.1.2 Datum The datum consists of the ellipsoid and its position relative to the WGS84 ellipsoid. In addition to the ellipsoid, translation, rotation, and distortion parameters define the datum. 1.1.1.3 Meridian The standard meridian is Greenwich, but some geographic coordinate systems are based on other meridians. These meridians are defined by the longitude with respect to Greenwich. 1.1.1.4 Ellipsoid The ellipsoid is the pattern used to model the earth. It is defined by its geometric parameters. © Forsk 2009 AT281_TRG_E1 27 Technical Reference Guide 1.1.1.5 Projection The projection is the transformation applied to project the ellipsoid of the earth on to a plane. There are different projection methods that use specific sets of parameters. 1.1.1.6 Projection Coordinate System The projection coordinate system is the result of the application of a projection to a geographic coordinate system. It associates a geographic coordinate system and a projection. Atoll enables you to choose the projection coordinate system matching your geographic data. 1.1.2 Coordinate Systems in Atoll Depending on the working environment, there can be either two or four coordinate systems used in Atoll. If you are working with stand-alone documents, i.e., documents not connected to databases, there are two coordinate systems used in Atoll: • • Projection coordinate system Display coordinate system If you are working in a multi-user environment, Atoll uses four coordinate systems: • • • • 1.1.2.1 Projection coordinate system for the Atoll document Display coordinate system for the Atoll document Internal projection coordinate system for the database Internal display coordinate system for the database Projection Coordinate System The projection coordinate system is the coordinate system of the available raster geographic data files. You should set the projection coordinate system of your Atoll document so that it corresponds to the coordinate system of the available raster geographic data. You can set the projection coordinate system of your document in the Options dialog. All the raster geographic data files that you want to import and use in an Atoll document must have the same coordinate system. You cannot work with raster geographic data files with different coordinate systems in the same document. Note: • If you import vector geographic data (e.g., traffic, measurements, etc.) with different coordinate systems, it is possible to convert the coordinate systems of these data into the projection coordinate system of your Atoll document. The projection coordinate system is used to keep the coordinates of sites (radio network data) consistent with the geographic data. When you import a raster geographic data file, Atoll reads the geo-referencing information from the file (or from its header file, depending on the geographic data file format), i.e., its Northwest pixel, to determine the coordinates of each pixel. Atoll does not use any coordinate system during the import process. However, the geo-referencing information of geographic data files are considered to be provided in the projection coordinate system of the document. 1.1.2.2 Display Coordinate System The display coordinate system is the coordinate system used for the display, e.g., in dialogs, in the Map window rulers, in the status bar, etc. The coordinates of each pixel of geographic data are converted to the display coordinate system from the projection coordinate system for display. The display coordinate system is also used for sites (radio network data). You can set the display coordinate system of your document in the Options dialog. If you import sites data, the coordinate system of the sites must correspond to the display coordinate system of your Atoll document. If you change the display coordinate system in a document which is not connected to a database, the coordinates of all the sites are converted to the new display system. Note: • 1.1.2.3 If the coordinate systems of all your geographic data files and sites (radio network data) are the same, you do not have to define the projection and display coordinate systems separately. By default, the two coordinate systems are the same. Internal Coordinate Systems The internal coordinate systems are the projection and the display coordinate systems stored in a database. The projection and display coordinate systems set by the administrator in the central Atoll project are stored in the database when the database is created, and cannot be modified by users. Only the administrator can modify the internal coordinate systems manually by editing the entries in the CoordSys and the Units tables. All Atoll documents opened from a database will have the internal coordinate systems of the database as their default projection and display coordinate systems. When exporting an Atoll project to a database, the currently chosen display coordinate system becomes the internal display coordinate system for the database, and the currently chosen projection coordinate system becomes the internal projection coordinate system for the database. 28 AT281_TRG_E1 © Forsk 2009 Chapter 1: Coordinate Systems and Units Although Atoll stores both the coordinate systems in the database, i.e., the projection and the display coordinate systems, the only relevant coordinate system for the database is the internal display coordinate system because this coordinate system is the one used for the coordinates of sites (radio network data). Users working on documents connected to a database can modify the coordinate systems in their documents locally, and save these changes in their documents, but they cannot modify the coordinate systems stored in the database. If you change the display coordinate system in a document which is not connected to a database, the coordinates of all the sites are converted to the new display system. If you change the display coordinate system in a document which is connected to a database, the coordinates of all the sites are converted to the new coordinate system in the Atoll document locally but not in the database because the internal coordinate systems cannot be changed. Atoll uses the internal coordinates systems in order to keep the site coordinates consistent in the database which is usually accessed by a large number of users in a multi-user environment. 1.1.3 File Formats The Coordsystems folder located in the Atoll installation directory contains all the coordinate systems, both geographic and cartographic, offered in the tool. Coordinate systems are grouped by regions. A catalogue per region and a "Favourites" catalogue are available in Atoll. The Favourites catalogue is initially empty and can be filled by the user by adding coordinate systems to it. Each catalogue is described by an ASCII text file with .cs extension. In a .cs file, each coordinate system is described in one line. The line syntax for describing a coordinate system is: Code = "Name of the system"; Unit Code; Datum Code; Projection Method Code, Projection Parameters; "Comments" Examples: 4230 = "ED50"; 101; 230; 1; "Europe - west" 32045 = "NAD27 / Vermont"; 2; 267; 6, -72.5, 42.5, 500000, 0, 0.9999643; "United States - Vermont" You should keep the following points in mind when editing or creating .cs files: • The identification code enables Atoll to differentiate coordinates systems. In case you create a new coordinate system, its code must be an integer value higher than 32767. When describing a new datum, you must enter the ellipsoid code and parameters instead of the datum code in brackets. There can be 3 to 7 parameters defined in the following order: Dx, Dy, Dz, Rx, Ry, Rz, S. The syntax of the line in the .cs file will be: • Code = "Name of the system"; Unit Code; {Ellipsoid Code, Dx, Dy, Dz, Rx, Ry, Rz, S}; Projection Method Code, Projection Parameters; "Comments" • There can be up to seven projection parameters. These parameters must be ordered according to the parameter index (see "Projection Parameter Indices" on page 32). Parameter with index 0 is the first one. Projection parameters are delimited by commas. For UTM projections, you must provide positive UTM zone numbers for north UTM zones and negative numbers for south UTM zones. You can add all other information as comments (such as usage or region). • • Codes of units, data, projection methods, and ellipsoids, and projection parameter indices are listed in the tables below. 1.1.3.1 Unit Codes Code © Forsk 2009 Cartographic Units Code Geographic Units 0 Metre 100 Radian 1 Kilometre 101 Degree 2 Foot 102 Grad 3 Link 103 ArcMinute 4 Chain 104 ArcSecond 5 Yard 6 Nautical mile 7 Mile -1 Unspecified -1 Unspecified AT281_TRG_E1 29 Technical Reference Guide 1.1.3.2 30 Datum Codes Code Datum Code Datum 121 Greek Geodetic Reference System 1987 260 Manoca 125 Samboja 261 Merchich 126 Lithuania 1994 262 Massawa 130 Moznet (ITRF94) 263 Minna 131 Indian 1960 265 Monte Mario 201 Adindan 266 M'poraloko 202 Australian Geodetic Datum 1966 267 North American Datum 1927 203 Australian Geodetic Datum 1984 268 NAD Michigan 204 Ain el Abd 1970 269 North American Datum 1983 205 Afgooye 270 Nahrwan 1967 206 Agadez 271 Naparima 1972 207 Lisbon 272 New Zealand Geodetic Datum 1949 208 Aratu 273 NGO 1948 209 Arc 1950 274 Datum 73 210 Arc 1960 275 Nouvelle Triangulation Française 211 Batavia 276 NSWC 9Z-2 212 Barbados 277 OSGB 1936 213 Beduaram 278 OSGB 1970 (SN) 214 Beijing 1954 279 OS (SN) 1980 215 Reseau National Belge 1950 280 Padang 1884 216 Bermuda 1957 281 Palestine 1923 217 Bern 1898 282 Pointe Noire 218 Bogota 283 Geocentric Datum of Australia 1994 219 Bukit Rimpah 284 Pulkovo 1942 221 Campo Inchauspe 285 Qatar 222 Cape 286 Qatar 1948 223 Carthage 287 Qornoq 224 Chua 288 Loma Quintana 225 Corrego Alegre 289 Amersfoort 226 Cote d'Ivoire 290 RT38 227 Deir ez Zor 291 South American Datum 1969 228 Douala 292 Sapper Hill 1943 229 Egypt 1907 293 Schwarzeck 230 European Datum 1950 294 Segora 231 European Datum 1987 295 Serindung 232 Fahud 296 Sudan 233 Gandajika 1970 297 Tananarive 1925 234 Garoua 298 Timbalai 1948 235 Guyane Francaise 299 TM65 236 Hu Tzu Shan 300 TM75 237 Hungarian Datum 1972 301 Tokyo 238 Indonesian Datum 1974 302 Trinidad 1903 239 Indian 1954 303 Trucial Coast 1948 240 Indian 1975 304 Voirol 1875 241 Jamaica 1875 305 Voirol Unifie 1960 242 Jamaica 1969 306 Bern 1938 243 Kalianpur 307 Nord Sahara 1959 244 Kandawala 308 Stockholm 1938 245 Kertau 309 Yacare 247 La Canoa 310 Yoff 248 Provisional South American Datum 1956 311 Zanderij AT281_TRG_E1 © Forsk 2009 Chapter 1: Coordinate Systems and Units 249 1.1.3.3 1.1.3.4 © Forsk 2009 Lake 312 Militar-Geographische Institut 250 Leigon 313 Reseau National Belge 1972 251 Liberia 1964 314 Deutsche Hauptdreiecksnetz 252 Lome 315 Conakry 1905 253 Luzon 1911 322 WGS 72 254 Hito XVIII 1963 326 WGS 84 255 Herat North 901 Ancienne Triangulation Française 256 Mahe 1971 902 Nord de Guerre 903 NAD 1927 Guatemala/Honduras/Salvador (Panama Zone) 257 Makassar 258 European Reference System 1989 Projection Method Codes Code Projection Method Code Projection Method 0 Undefined 8 Oblique Stereographic 1 No projection > Longitude / Latitude 9 New Zealand Map Grid 2 Lambert Conformal Conical 1SP 10 Hotine Oblique Mercator 3 Lambert Conformal Conical 2SP 11 Laborde Oblique Mercator 4 Mercator 12 Swiss Oblique Cylindrical 5 Cassini-Soldner 13 Oblique Mercator 6 Transverse Mercator 14 UTM Projection 7 Transverse Mercator South Oriented Ellipsoid Codes Code Name Major Axis Minor Axis 1 Airy 1830 6377563.396 6356256.90890985 2 Airy Modified 1849 6377340.189 6356034.44761111 3 Australian National Spheroid 6378160 6356774.71919531 4 Bessel 1841 6377397.155 6356078.96261866 5 Bessel Modified 6377492.018 6356173.50851316 6 Bessel Namibia 6377483.865 6356165.38276679 7 Clarke 1858 6378293.63924683 6356617.98173817 8 Clarke 1866 6378206.4 6356583.8 9 Clarke 1866 Michigan 6378693.7040359 6357069.45104614 10 Clarke 1880 (Benoit) 6378300.79 6356566.43 11 Clarke 1880 (IGN) 6378249.2 6356515 12 Clarke 1880 (RGS) 6378249.145 6356514.86954978 13 Clarke 1880 (Arc) 6378249.145 6356514.96656909 14 Clarke 1880 (SGA 1922) 6378249.2 6356514.99694178 15 Everest 1830 (1937 Adjustment) 6377276.345 6356075.41314024 16 Everest 1830 (1967 Definition) 6377298.556 6356097.5503009 17 Everest 1830 (1975 Definition) 6377301.243 6356100.231 18 Everest 1830 Modified 6377304.063 6356103.03899315 19 GRS 1980 6378137 6356752.31398972 20 Helmert 1906 6378200 6356818.16962789 21 Indonesian National Spheroid 6378160 6356774.50408554 22 International 1924 6378388 6356911.94612795 23 International 1967 6378160 6356774.71919530 24 Krassowsky 1940 6378245 6356863.01877305 25 NWL 9D 6378145 6356759.76948868 26 NWL 10D 6378135 6356750.52001609 27 Plessis 1817 6376523 6355862.93325557 28 Struve 1860 6378297 6356655.84708038 AT281_TRG_E1 31 Technical Reference Guide 29 1.1.3.5 1.1.4 War Office 6378300.583 6356752.27021959 30 WGS 84 6378137 6356752.31398972 31 GEM 10C 6378137 6356752.31398972 32 OSU86F 6378136.2 6356751.51667196 33 OSU91A 6378136.3 6356751.61633668 34 Clarke 1880 6378249.13884613 6356514.96026256 35 Sphere 6371000 6371000 Projection Parameter Indices Index Projection Parameter Index Projection Parameter 0 UTM zone number 4 Scale factor at origin 0 Longitude of origin 4 Latitude of 1st parallel 1 Latitude of origin 5 Azimuth of central line 2 False Easting 5 Latitude of 2nd parallel 3 False Northing 6 Angle from rectified to skewed grid Creating a Coordinate System Atoll provides a large catalogue of default coordinate systems. Nevertheless, it is possible to add the description of geographic and cartographic coordinate systems. New coordinate systems can be created from scratch or initialised on the basis of an existing one. To create a new coordinate system from scratch: 1. Select Tools > Options. The Options dialog opens. 2. Select the Coordinates tab. 3. Click the browse button (...) on the right of the Projection field. 4. Click the New button. The Coordinate System dialog opens. 5. In the Coordinate System dialog, a. Select the coordinate systems catalogue to which you want to add the new coordinate system. b. In the General properties section: Enter a name for the new coordinate system, select a unit. You can also enter any comments about its usage. Atoll assigns the code automatically. c. In the Category section: Select the type of coordinate system. Enter the longitude and latitude for a geographic coordinate system, or the type of projection and its set of associated parameters for a cartographic coordinate system (false easting and northing, and the first and second parallels). d. In the Geo section: Specify the meridian and choose a datum for the coordinate system. The associated ellipsoid is automatically selected. You can also describe a geodetic datum by selecting "..." in the Datum list. In this case, you must provide parameters (Dx, Dy, Dz, Rx, Ry, Rz, and S) needed for the transformation of the datum into WGS84, and an ellipsoid. 6. Click OK. The new coordinate system is added to the selected coordinate system catalogue. To create a new coordinate system based on an existing system, select a coordinate system in the Coordinate Systems dialog before clicking New in step 4. The new coordinate system is initialised with the values of the selected coordinate system. 1.2 Units 1.2.1 Power Units Depending on the working environment, there can be either one or two types of units for transmission and reception powers. If you are working with stand-alone documents, i.e., documents not connected to databases, there is only one unit used in Atoll: • Display power units If you are working in a multi-user environment, Atoll uses two type of units: • • Display power units for the Atoll document Internal power units for the database The display units are used for the display in dialogs and tables, e.g., reception thresholds (coverage prediction properties, etc.), and received signal levels (measurements, point analysis, coverage predictions etc.). You can set the display units for your document in the Options dialog. 32 AT281_TRG_E1 © Forsk 2009 Chapter 1: Coordinate Systems and Units The internal units are the power units stored in a database. The power units set by the administrator in the central Atoll project are stored in the database when the database is created, and cannot be modified by users. Only the administrator can modify the internal units manually by editing the entries in the Units tables. All Atoll documents opened from a database will have the internal units of the database as their default power units. Users working on documents connected to a database can modify the units in their documents locally, and save these changes in their documents, but they cannot modify the units stored in the database. 1.2.2 Length Units There are two types of units for distances, heights, and offsets: • • Display length units Internal length units The display length units are used to display distances, heights, and offsets in dialogs, tables, and the status bar. You can set the display units for your document in the Options dialog. The internal unit for lengths is metre for all Atoll documents whether they are connected to databases or not. The internal unit is not stored in the databases. The internal unit cannot be changed. 1.3 BSIC Format Depending on the working environment, there can be either one or two types of BSIC formats. If you are working with stand-alone documents, i.e., documents not connected to databases, there is only one BSIC format: • Display BSIC format If you are working in a multi-user environment, Atoll uses two type of formats: • • Display BSIC format for the Atoll document Internal BSIC format for the database The display format is used for the display in dialogs and tables. You can set the display format for your document from the Transmitters folder’s context menu. The internal format is the BSIC format stored in a database. The BSIC format set by the administrator in the central Atoll project is stored in the database when the database is created, and cannot be modified by users. Only the administrator can modify the internal format manually by editing the corresponding entry in the Units tables. All Atoll documents opened from a database will have the internal format of the database as their default BSIC format. Users working on documents connected to a database can modify the format in their documents locally, and save this change in their documents, but they cannot modify the format stored in the database. © Forsk 2009 AT281_TRG_E1 33 Technical Reference Guide 34 AT281_TRG_E1 © Forsk 2009 Chapter 2 Geographic and Radio Data This chapter defines the different types of data with which you can work in Atoll. These data can be geographic data, such as maps, and radio network data, such as sites, antennas, other equipment and parameters. AtollMicrowave Atoll Microwave Planning Software RF PlanningLink & Optimisation Software Technical Reference Guide 36 AT281_TRG_E1 © Forsk 2009 Chapter 2: Geographic and Radio Data 2 Geographic and Radio Data 2.1 Geographic Data 2.1.1 Data Type Atoll manages several geographic data types; DTM (Digital Terrain Model), clutter (Land-Use), scanned images, vector data, traffic data, population, and any other generic data. 2.1.1.1 Digital Terrain Model (DTM) The DTM (Digital Terrain Model or height) files describe the ground elevation above the sea level. DTM files supported by Atoll are 16 bits/pixel relief maps in .tif, .bil, Planet© and Erdas Imagine formats and 8 bits/pixel relief maps in .tif, .bil, Erdas Imagine and .bmp formats. DTM maps are taken into account in path loss calculations by Atoll propagation models. DTM file provides altitude value (z stated in metre) on evenly spaced points. Abscissa and ordinate axes are respectively oriented in right and downwards directions. Space between points is defined by pixel size (P stated in metre). Pixel size must be the same in both directions. First point given in the file corresponds to the centre of the upper-left pixel of the map. This point refers to the northwest point geo-referenced by Atoll. Four points (hence, four altitude values) are necessary to describe a “bin”; these points are bin vertices. Figure 2.1: Digital Terrain Model Therefore, a n*n bin DTM file requires (n)2 points (altitude values). Figure 2.2: Schematic view of a DTM file Notes: © Forsk 2009 • Altitude values differ within a bin. Method used to calculate altitudes is described in the Path loss calculations: Altitude determination part. Concerning DTM map display, Atoll takes altitude of the southwest point of each bin to determine its colour. • In most documents, Digital Elevation Model (DEM) and Digital Terrain Model (DTM) are differentiated and do not have the same meaning. By definition, DEM refers to altitude above sea level including, both, ground and clutter while DTM just corresponds to the ground height above sea level. In Atoll, the DEM term may be used instead of DTM term. AT281_TRG_E1 37 Technical Reference Guide 2.1.1.2 Clutter (Land Use) You may import two types of clutter files in ATL documents. These files indicate either the clutter class or the clutter height on each bin of the map. 2.1.1.2.1 Clutter Classes Atoll supports 8 bits/pixel (255 classes) raster maps in .tif, .bil, .bmp, Erdas Imagine formats or 16 bits/pixel raster maps in Planet© format. This kind of clutter file describes the land cover (dense urban, buildings, residential, forest, open, villages, …). A grid map represents ground and each bin of the map is characterised by a code corresponding to a main type of cover (a clutter class). Atoll automatically lists all the clutter classes of the map. It is possible to specify an average clutter height for each clutter class manually during the map description step. Clutter maps are taken into account in path loss calculations by Atoll propagation models. Clutter file provides a clutter code per bin. Bin size is defined by pixel size (P stated in metre). Pixel size must be the same in both directions. Abscissa and ordinate axes are respectively oriented in right and downwards directions. First point given in the file corresponds to the centre of the upper-left pixel of the image. This point refers to the northwest point geo-referenced by Atoll. Figure 2.3: Clutter Classes Therefore, a n*n bin Clutter file requires (n)2 code values. Note: • 2.1.1.2.2 The clutter code is the same inside a bin. Clutter Heights Files supported by Atoll for clutter heights are 8 or 16 bits/pixel raster maps in .tif, .bil and Erdas Imagine formats. The file provides clutter height value on evenly spaced points. Abscissa and ordinate axes are respectively oriented in right and downwards directions. Space between points is defined by pixel size (P in metre). Pixel size must be the same in both directions. First point given in the file corresponds to the centre of the upper-left pixel of the map. This point refers to the northwest point geo-referenced by Atoll. These maps are taken into account in path loss calculations by Atoll propagation models. Note: • 2.1.1.3 Atoll considers the clutter height of the nearest point in calculations (see Path loss calculations: Clutter determination part). For map display, Atoll takes clutter height of the southwest point of each bin to determine its colour. Traffic Data Atoll offers different kinds of traffic data: 2.1.1.3.1 User Profile Environment Based Traffic Maps Atoll supports 8 bits/pixel (256 class) traffic raster maps in .tif, .bil, .bmp, Erdas Imagine formats. These maps provide macroscopic traffic estimation. Each pixel is assigned an environment class, which is a list of user profiles with a defined mobility type and a density. 2.1.1.3.2 User Profile Traffic Maps Atoll supports vector traffic maps with .dxf®, Planet©, .shp, .mif and .agd formats. These maps are detailed traffic estimations (lines, polygons or points carrying a specific traffic). Each polygon, line or point is assigned a specific user profile with associated mobility type and density. They can be built from population density vector maps. 2.1.1.3.3 Sector Traffic Maps Atoll supports maps with .agd format. This kind of map is based on the network feedback. It provides actual information on connections (and not just subscriber estimation) from the network. It is built from a coverage by transmitter prediction 38 AT281_TRG_E1 © Forsk 2009 Chapter 2: Geographic and Radio Data study that defines sector boundaries for the traffic distribution in each sector. In UMTS and CDMA, either data rates or the number of users per service are indicated for each transmitter service area. In GSM/TDMA, Atoll expects a number of Erlangs in case of voice service and data rate values for packet-switched services for each transmitter service area. 2.1.1.3.4 User Density Traffic Maps This kind of map is only available in GSM/TDMA documents. Atoll supports 16 and 32 bits/pixel traffic raster maps in .tif, .bil, .bmp, Planet© and Erdas Imagine formats. This map is also based on the network feedback as it deals with network users information as well. Each pixel is assigned a number of users with a given service, terminal and mobility type. In GSM documents, traffic maps are taken into account for traffic analysis and network dimensioning. In UMTS and CDMA documents, they are used by the Monte-Carlo simulator to model user distributions and evaluate related network parameters (cell power, mobile terminal power, …). 2.1.1.4 Vector Data These data represent either polygons (regions, etc.), lines (roads, coastlines, etc.) or points (towns, etc.). Atoll supports vector data files in .dxf®, Planet©, .shp, .mif and .agd formats. These maps are only used for display and provide information about the geographic environment. 2.1.1.5 Scanned Images These geographic data include the road maps and the satellite images. They are only used for display and provide information about the geographic environment. Atoll supports scanned image files in .tif (1, 4, 8, 24-bits/pixel), .bil (1, 4, 8, 24bits/pixel), Planet© (1, 4, 8, 24-bits/pixel), .bmp (1-24-bits/pixel), Erdas Imagine (1, 4, 8, 24-bits/pixel) and .ecw (24-bits/ pixel) formats. 2.1.1.6 Population Atoll deals with vector population files (polygons, lines or points) in .mif, .shp and .agd formats or 8, 16, 32 bits/pixel raster population files in .tif, .bil, .bmp and Erdas Imagine formats. Population map describes the population distribution. They are considered in clutter statistics and in coverage prediction reports. 2.1.1.7 Other Geographic Data It is possible to import generic geographic data types, other than those listed above, (Customer density, revenue density, …) in Atoll. These data can be either vector files in .mif, .shp and .agd formats or 8, 16, 32 bits/pixel raster files in .tif, .bil, .bmp and Erdas Imagine formats. These maps are taken into account in clutter statistics and in coverage prediction reports. The ArcView Grid format (.txt) is an ASCII format dedicated to define raster maps. It may be used to export any raster map such as DTM, images, Clutter Classes and/or Heights, Population, Generic data maps and even coverage predictions. The contents of an ArcView Grid file are in ASCII and consist of a header, describing the content, followed by the content in the form of cell values. Notes: 2.1.2 • The minimum resolution supported by Atoll is 1m for any raster maps, excepted for scanned images, for which it is unlimited. • DTM and clutter map resolution must be an integer. • All the raster maps you want to import in an ATL document must be represented in the same projection system. Supported Geographic Data Formats Atoll offers Import/Export filters for the most commonly used geographic data formats. The different filters are: © Forsk 2009 File format Import/ Export Can contain Georeferenced .bil Both DTM, Clutter classes and heights, Traffic, Image, Population, Other data Yes via .hdr files .tif Both DTM, Clutter classes and heights, Traffic, Image, Population, Other data Yes via associated .tfw files if they exist Planet© Both DTM, Clutter classes, Image, Vector data Yes via index files .bmp Both DTM, Clutter heights, Clutter classes, Traffic, Image, Population, Other data Yes via .bpw (or .bmw) files .dxf® Import Only Vector data, Vector traffic Yes .shp Both Vector data, Vector traffic, Population, Other data Yes .mif/.mid Both Vector data, Vector traffic, Population, Other data Yes AT281_TRG_E1 39 Technical Reference Guide Erdas Imagine Import Only DTM, Clutter classes and heights, Traffic, Image, Population, Other data Yes ArcView Grid Export Only DTM, Clutter classes and heights, Traffic, Image, Population, Other data Yes automatically embedded in the data file .agd Both Vector data, Vector traffic, Population, Other data Yes automatically embedded in the data file Vertical Mapper (.grd, .grc) Both DTM, Clutter classes and heights, Traffic, Image, Population, Other data Yes automatically embedded in the data file .ecw Import Only Images Yes via ers file (not mandatory) Note: • The .wld files may be used as georeferencement file for any type of binary raster file. • Tiled .tif format is not supported. Thus, to sum up, you can import: • • • • • • • • DTM files in .tif (16-bits, 8-bits), .bil (16-bits, 8-bits), Planet© (16-bits), Erdas Imagine (16-bits, 8-bits), Vertical Mapper (.grd, .grc) and .bmp (8-bits) formats. Clutter heights files in .tif (16-bits, 8-bits), .bil (16-bits, 8-bits), Planet© (16-bits), Erdas Imagine (16-bits, 8-bits), Vertical Mapper (.grd, .grc) and .bmp (8-bits) formats. Clutter classes and traffic raster files in .tif (8-bits), .bil (8-bits), .bmp (8-bit), Erdas Imagine (8-bits) and Vertical Mapper (.grd, .grc) and Planet© format (16-bits) are also supported. Vector data files in .dxf®, Planet©, .shp, .mif and .agd formats. Vector traffic files in .dxf®, Planet©, .shp, .mif and .agd formats. Scanned image files in .tif (1, 4, 8, 24-bits), .bil (1, 4, 8, 24-bits), Planet© (1, 4, 8, 24-bits), .bmp (1-24-bits), Erdas Imagine (1, 4, 8, 24-bits), Vertical Mapper (.grd, .grc) and .ecw (Enhanced Compressed Wavelet) (24 bits) formats. Population files in .mif, .shp, .agd, .tif (8, 16, 32-bits), .bil (8, 16, 32-bits), .bmp (8, 32-bits), Vertical Mapper (.grd, .grc) and Erdas Imagine (8, 16, 32-bits) formats. Other generic data types in .mif, .shp, .agd, .tif (8, 16, 32-bits), .bil (8, 16, 32-bits), .bmp (8, 32-bits), Vertical Mapper (.grd, .grc) and Erdas Imagine (8, 16, 32-bits) formats. Note: • 2.2 It is possible to import Packbit, FAX-CCITT3 and LZW compressed .tif files. However, in case of DTM and clutter, we recommend not to use compressed files in order to avoid poor performances. If uncompressed files are too big, it is better to split them. Radio Data Atoll manages several radio data types; sites, transmitters, antennas, stations and hexagonal designs. Data definition in Atoll is detailed hereafter. 2.2.1 Site A site is a geographical point where one or several transmitters (multi-sectored site or station) equipped with antennas are located. 2.2.2 Antenna An antenna is a device used for transmitting or receiving electromagnetic waves. 2.2.3 Transmitter A transmitter is a group of radio devices located at a site. Transmitters are equipped with antenna(s) and other equipment such as feeder, tower mounted amplifiers (TMA) and BTS. 2.2.4 Repeater A repeater is a device that receives, amplifies and transmits the radiated or conducted RF carrier both in downlink and uplink. It comprises a donor side and a server side. The donor side receives the signal from a donor transmitter. This signal may be carried by different types of links such as radio link, microwave link, or optic fibre. The server side transmits the repeated signal. 40 AT281_TRG_E1 © Forsk 2009 Chapter 2: Geographic and Radio Data 2.2.5 Remote Antenna The use of remote antennas allows antenna positioning at locations that would normally require prohibitively long runs of feeder cable. A remote antenna is connected to the base station via an optic fibre. The main difference from a repeater is that a remote antenna generates its own cell whereas a repeater extends the coverage of an existing cell. 2.2.6 Station A station can represent one transmitter on a site or a group of transmitters on a same site sharing the same properties. You can define station templates and build your network from stations instead of single transmitters. 2.2.7 Hexagonal Design A hexagonal design is a group of stations created from the same station template. 2.2.8 GSM GPRS EGPRS Documents 2.2.8.1 TRX A base station (transmitter) consists of several transceivers or TRXs. One TRX supports as many timeslots as the multiplexing factor defined in properties of your frequency band (8 timeslots in GSM networks). Three types of TRXs are modelled in Atoll: • • • 2.2.8.2 The BCCH TRX type: carries the BCCH, The TCH TRX type: which is the default traffic carrier, The TCH_INNER TRX type: this TRX type is an inner traffic carrier. Subcell A subcell corresponds to a group of TRXs having the same radio characteristics, the same quality (C/I) requirements, and common settings. A subcell is characterised by the ‘transmitter-TRX type’ pair. Each transmitter may have one or more subcells. The most common configurations are the {BCCH, TCH} configuration or the {BCCH, TCH, TCH_INNER} one. 2.2.8.3 Cell Type A cell type describes the subcells (types of TRXs) that a cell can use and their parameters, which can be different. In the current Atoll version, the cell type definition must include a TRX type as the BCCH carrier (BCCH TRX type) and another TRX type as the default traffic carrier (TCH TRX type). Only one TRX type carrying the broadcast and only one TRX type carrying the default TCH are supported. 2.2.9 All CDMA, WiMAX, and LTE Documents 2.2.9.1 Cell Cell comprises the carrier characteristics of a transmitter. Cell is characterised by the ‘transmitter-carrier’ pair. The transmitter-carrier pair must be unique. © Forsk 2009 AT281_TRG_E1 41 Technical Reference Guide 42 AT281_TRG_E1 © Forsk 2009 Chapter 3 File Formats Atoll supports a set of file formats for each type of data, may it be geographic data or calculation results. This chapter contains details of these file formats, their usage, availability, and limitations. AtollMicrowave Atoll Microwave Planning Software RF PlanningLink & Optimisation Software Technical Reference Guide 44 AT281_TRG_E1 © Forsk 2009 Chapter 3: File Formats 3 File Formats 3.1 BIL Format Band Interleaved by Line is a method of organizing image data for multi-band images. It is a schema for storing the actual pixel values of an image in a file. The pixel data is typically preceded by a file header that contains auxiliary data about the image, such as the number of rows and columns in the image, a colour map, etc. .bil data stores pixel information band by band for each line, or row, of the image. Although .bil is a data organization schema, it is treated as an image format. An image description (number of rows and columns, number of bands, number of bits per pixel, byte order, etc.) has to be provided to be able to display the .bil file. This information is included in the header .hdr file associated with the .bil file. A .hdr file has the same name as the .bil file it refers to, and should be located in the same directory as the source file. The .hdr structure is simple; it is an ASCII text file containing eleven lines. You can open a .hdr file using any ASCII text editor. Atoll supports the following objects in .bil format: • • • • • • • • Digital Terrain Model (8 or 16 bits) Clutter heights (8 or 16 bits) Clutter classes and User profile environment based traffic maps (8 bits) User density traffic maps (16 or 32 bits) Raster images (1, 4, 8, 24 bits) Population maps (8, 16, 32 bits) Other generic geographic data (8, 16, 32 bits) Path loss or received signal level value matrices (16 bits) 3.1.1 HDR Header File 3.1.1.1 Description The header file is a text file that describes how data are organised in the .bil file. The header file is made of rows, each row having the following format: keyword value where ‘keyword’ corresponds to an attribute type, and ‘value’ defines the attribute value. Keywords required by Atoll are described below. Other keywords are ignored. nrows Number of rows in the image. ncols Number of columns in the image. nbands Number of spectral bands in the image, (1 for DTM data and 8 bit pictures). nbits Number of bits per pixel per band; 8 or 16 for DTMs or Clutter heights (altitude in metres), 8 for clutter classes file (clutter code), 16 for path loss matrices (path loss in dB, field value in dBm, dBµV and DBµV/m). byteorder Byte order in which image pixel values are stored. Accepted values are M (Motorola byte order) or I (Intel byte order). layout Must be ‘bil’. skipbytes Byte to be skipped in the image file in order to reach the beginning of the image data. Default value is 0. ulxmap x coordinate of the centre of the upper-left pixel. ulymap y coordinate of the centre of the upper-left pixel. xdim x size in metre of a pixel. ydim y size in metre of a pixel. Four additional keywords may be optionally managed. pixeltype Type of data read (in addition to the length) which can be : © Forsk 2009 UNSIGNDINT Undefined 8, 16, 24 or 32 bits SIGNEDINT Integer 16 or 32 bits FLOAT Real 32 or 64 bits AT281_TRG_E1 45 Technical Reference Guide in some cases, this keyword can be replace by datatype defined as follows: datatype Type of data read (in addition to the length) It can be: Un Undefined n bits (8, 16, 24 or 32 bits) In Integer n bits (16 or 32 bits) Rn Real n bits (32 or 64 bits) RGB24 Integer 3 colour components on 24 bits The other optional keywords are :valueoffset, valuescale and nodatavalue. By default, integer data types are chosen with respect to the pixel length (nbits). valueoffset Real value to be added to the read value (Vread) valuescale Scaling factor to be applied to the read value So, we have V = V read valuescale + valueoffset nodatavalue 3.1.1.2 Value corresponding to “NO DATA” Samples Here, the data is 20m. 3.1.1.2.1 3.1.1.2.2 3.1.1.2.3 Digital Terrain Model nrows 1500 ncols 1500 nbands 1 nbits 8 or 16 byteorder M layout bil skipbytes 0 ulxmap 975000 ulymap 1891000 xdim 20.00 ydim 20.00 Clutter Classes File nrows 1500 ncols 1500 nbands 1 nbits 8 byteorder M layout bil skipbytes 0 ulxmap 975000 ulymap 1891000 xdim 20.00 ydim 20.00 BIL File .bil files are usually binary files without header. Data are stored starting from the Northwest corner of the area. The skipbytes value defined in the header file allows to skip records if the data do not start at the beginning of the file. 46 AT281_TRG_E1 © Forsk 2009 Chapter 3: File Formats 3.2 TIF Format Tagged Image File Format graphics filter supports all image types (monochrome, greyscale, palette colour, and RGB full colour images) and Packbit, LZW or fax group 3-4 compressions. .tif files are not systematically geo-referenced. You have to enter spatial references of the image manually during the import procedure (x and y-axis map coordinates of the centre of the upper-left pixel, pixel size); an associated file with .tfw extension will be simultaneously created with the same name and in the same directory as the .tif file it refers to. Atoll will then use the .tfw file during the import procedure for an automatic geo-referencing. Note: • Atoll also supports .tif files using the Packbit, FAX-CCITT3 and LZW compression modes. You can modify the colour palette convention used by Atoll when exporting .tif files. This can be helpful when working on .tif files exported by Atoll in other tools. In the default palette, the first colour indexes represent the useful information and the remaining colour indexes represent the background. It is possible to export .tif files with a palette which defines the background colour at the colour index 0, and then the colour indexes necessary to represent useful information. Add the following lines in the Atoll.ini file to set up the new palette convention: [TiffExport] PaletteConvention=Gis Please refer to the Administrator Manual for more details about the Atoll.ini file. Notes: • Using compressed geo data formats (compressed .tif, Erdas Imagine, or .ecw) can cause performance loss due to real-time decompression. However, you can recover this loss in performance by: - Either, hiding the status bar, which provides geographic data information in real time, by unchecking the Status Bar item in the View menu. - Or, not displaying some of the information, such as altitude, clutter class and clutter height, in the status bar. This can be done through the Atoll.ini file, by adding the following lines: [StatusBar] DisplayZ=0 DisplayClutterClass=0 DisplayClutterHeight=0 • You can also save the produced map in an uncompressed format. • Please refer to the Administrator Manual for more details about the Atoll.ini file. Atoll supports the following objects in .tif format: • • • • • • • Digital Terrain Model (8 or 16 bits) Clutter heights (8 or 16 bits) Clutter classes and User profile environment based traffic maps (8 bits) User density traffic maps (16 or 32 bits) Raster images (1, 4, 8, 24 bits) Population maps (8, 16, 32 bits) Other generic geographic data (8, 16, 32 bits) .tfw file contains the spatial reference data of an associated .tif file. The .tfw file structure is simple; it is an ASCII text file that contains six lines. You can open a .tfw file using any ASCII text editor. 3.2.1 TFW Header File The .tfw files contain spatial reference data for the associated .tif file. The header file is a text file that describes how data are organised in the .tif file. You can open a .tfw file using any ASCII text editor. The header file consists of six lines, with each line having the following description: Line © Forsk 2009 Description 1 x dimension of a pixel in map units 2 amount of translation 3 amount of rotation 4 negative of the y dimension of a pixel in map units 5 x-axis map coordinate of the centre of the upper-left pixel 6 y-axis map coordinate of the centre of the upper-left pixel AT281_TRG_E1 47 Technical Reference Guide Note: • Atoll does not use the lines 2 and 3 when importing a .tif format geographic file. 3.2.2 Sample 3.2.2.1 Clutter Classes File 100.00 0.00 0.00 -100.00 60000.00 2679900.00 3.3 BMP Format This is the MS-Windows standard format. It holds black & white, 16-, 256- and True-colour images. The palletized 16colour and 256-colour images may be compressed via run length encoding (though compressed .bmp files are quite rare). The image data itself can either contain pointers to entries in a colour table or literal RGB values. .bmp files are not systematically geo-referenced. You have to enter spatial references of the image manually during the import procedure (x and yaxis map coordinates of the centre of the upper-left pixel, pixel size). When exporting (saving) a .bmp file, an associated file with .bpw extension is created with the same name and in the same directory as the .bmp file it refers to. Atoll stores the georeferencing information in this file for future imports of the .bmp so that the .bpw file can be used during the import procedure for automatic geo-referencing. Atoll also supports .bmw extension for the .bmp related world files. Atoll supports the following objects in .tif format: • • • • • • 3.3.1 Digital Terrain Model (8 bits) Clutter Heights (8 bits) Clutter classes and User density traffic maps (8 bits) Raster images (1, 4, 8, 24 bits) Population maps (8, 32 bits) Other generic geographic data (8, 32 bits) BMP File Description A .bmp file contains of the following data structures: 3.3.1.1 • BITMAPFILEHEADER bmfh • • • BITMAPINFOHEADER RGBQUAD BYTE bmih aColors[] aBitmapBits[] Contains some information about the bitmap file (about the file, not about the bitmap itself). Contains information about the bitmap (such as size, colours, etc.). Contains a colour table. Image data (whose format is specified by the bmih structure). BMP File Structure The following tables give exact information about the data structures. The Start-value is the position of the byte in the file at which the explained data element of the structure starts, the Size-value contains the number of bytes used by this data element, the Name column contains both generic name and the name assigned to this data element by the Microsoft API documentation, and the Description column gives a short explanation of the purpose of this data element. • Start Size 1 3 Name Description Generic MS API 2 Signature bfType Must always be set to 'BM' to declare that this is a .bmp-file. 4 FileSize bfSize Specifies the size of the file in bytes. 7 2 Reserved1 bfReserved1 Unused. Must be set to zero. 9 2 Reserved2 bfReserved2 Unused. Must be set to zero. 11 4 DataOffset bfOffBits Specifies the offset from the beginning of the file to the bitmap (raster) data. • 48 BITMAPFILEHEADER (Header - 14 bytes): BITMAPINFOHEADER (InfoHeader - 40 bytes): AT281_TRG_E1 © Forsk 2009 Chapter 3: File Formats Start Size 15 Name Description Generic MS API 4 Size biSize Specifies the size of the BITMAPINFOHEADER structure, in bytes (= 40 bytes). 19 4 Width biWidth Specifies the width of the image, in pixels. 23 4 Height biHeight Specifies the height of the image, in pixels. biPlanes Specifies the number of planes of the target device, must be set to zero or 1. biBitCount Specifies the number of bits per pixel. 1 = monochrome pallete. # of colours = 1 4 = 4-bit palletized. # of colours = 16 8 = 8-bit palletized. # of colours = 256 16 = 16-bit palletized. # of colours = 65536 24 = 24-bit palletized. # of colours = 16M 27 29 2 Planes 2 BitCount 31 4 Compression biCompression Specifies the type of compression, usually set to zero. 0 = BI_RGB no compression 1 = BI_RLE8 8-bit RLE encoding 2 = BI_RLE4 4-bit RLE encoding 35 4 ImageSize biSizeImage Specifies the size of the image data, in bytes. If there is no compression, it is valid to set this element to zero. 39 4 XpixelsPerM biXPelsPerMeter Specifies the the horizontal pixels per meter. 43 4 YpixelsPerM biYPelsPerMeter Specifies the the vertical pixels per meter. 47 4 ColoursUsed biClrUsed Specifies the number of colours actually used in the bitmap. If set to zero the number of colours is calculated using the biBitCount element. 51 4 ColoursImportant biClrImportant Specifies the number of colour that are 'important' for the bitmap. If set to zero, all colours are considered important. Note: • • biBitCount actually specifies the colour resolution of the bitmap. It also decides if there is a colour table in the file and how it looks like. - In 1-bit mode the colour table has to contain 2 entries (usually white and black). If a bit in the image data is clear, it points to the first palette entry. If the bit is set, it points to the second. - In 4-bit mode the colour table must contain 16 colours. Every byte in the image data represents two pixels. The byte is split into the higher 4 bits and the lower 4 bits and each value of them points to a palette entry. - In 8-bit mode every byte represents a pixel. The value points to an entry in the colour table which contains 256 entries. - In 24-bit mode three bytes represent one pixel. The first byte represents the red part, the second the green and the third the blue part. There is no need for a palette because every pixel contains a literal RGB-value, so the palette is omitted. RGBQUAD array (ColorTable): Start Size 1 Name Description Generic MS API 1 Blue rgbBlue Specifies the blue part of the colour. 2 1 Green rgbGreen Specifies the green part of the colour. 3 1 Red rgbRed Specifies the red part of the colour. 4 1 Reserved rgbReserved Must always be set to zero. Note: • • In a colour table (RGBQUAD), the specification for a colour starts with the blue byte, while in a palette a colour always starts with the red byte. Pixel data: The interpretation of the pixel data depends on the BITMAPINFOHEADER structure. It is important to know that the rows of a .bmp are stored upside down meaning that the uppermost row which appears on the screen is actually the lowermost row stored in the bitmap. Another important thing is that the number of bytes in one row must always be adjusted by appending zero bytes to fit into the border of a multiple of four (16-bit or 32-bit rows). © Forsk 2009 AT281_TRG_E1 49 Technical Reference Guide 3.3.1.2 BMP Raster Data Encoding Depending on the image BitCount and on the Compression flag there are 6 different encoding schemes. In all of them, • • • • Pixels are stored bottom-up, left-to-right. Pixel lines are padded with zeros to end on a 32-bit boundary. For uncompressed formats every line will have the same number of bytes. Colour indices are zero based, meaning a pixel colour of 0 represents the first colour table entry, a pixel colour of 255 (if there are that many) represents the 256th entry. For images with more than 256 colours there is no colour table. Encoding type BitCoun Compressio t n 1-bit B&W images 1 4-bit 16 colour images 4 0 8-bit 256 colour images 8 0 Every byte holds 1 pixel. There are 256 colour table entries. Padding each line with zeros up to a 32-bit boundary will result in up to 3 bytes of zeros = 3 'wasted pixels'. 16-bit High colour images 16 0 Every 2 bytes hold 1 pixel. There are no colour table entries. Padding each line with zeros up to a 16-bit boundary will result in up to 2 zero bytes. 0 Every 4 bytes hold 1 pixel. The first holds its red, the second its green, and the third its blue intensity. The fourth byte is reserved and should be zero. There are no colour table entries. No zero padding necessary. 2 Pixel data is stored in 2-byte chunks. The first byte specifies the number of consecutive pixels with the same pair of colour. The second byte defines two colour indices. The resulting pixel pattern will have interleaved high-order 4-bits and low order 4 bits (ABABA...). If the first byte is zero, the second defines an escape code. The End-of-Bitmap is zero padded to end on a 32-bit boundary. Due to the 16bit-ness of this structure this will always be either two zero bytes or none. 1 The pixel data is stored in 2-byte chunks. The first byte specifies the number of consecutive pixels with the same colour. The second byte defines their colour indices. If the first byte is zero, the second defines an escape code. The End-of-Bitmap is zero padded to end on a 32-bit boundary. Due to the 16bit-ness of this structure this will always be either two zero bytes or none. 24 4-bit 16 colour images 4 8-bit 256 colour images 8 Raster Data Compression Descriptions • 4-bit / 16 colour images n (Byte 1) • 50 0 Every byte holds 8 pixels, its highest order bit representing the leftmost pixel of these 8. There are 2 colour table entries. Some readers assume that 0 is black and 1 is white. If you are storing black and white pictures you should stick to this, with any other 2 colours this is not an issue. Remember padding with zeros up to a 32-bit boundary. Every byte holds 2 pixels, its high order 4 bits representing the left of those. There are 16 colour table entries. These colours do not have to be the 16 MS-Windows standard colours. Padding each line with zeros up to a 32-bit boundary will result in up to 28 zeros = 7 'wasted pixels'. 24-bit True colour images 3.3.1.2.1 Remarks c (Byte 2) Description >0 any n pixels to be drawn. The 1st, 3rd, 5th, ... pixels' colour is in c's high-order 4 bits, the even pixels' colour is in c's low-order 4 bits. If both colour indices are the same, it results in just n pixels of colour c. 0 0 End-of-line 0 1 End-of-Bitmap 0 2 Delta. The following 2 bytes define an unsigned offset in x and y direction (y being up). The skipped pixels should get a colour zero. 0 >=3 The following c bytes will be read as single pixel colours just as in uncompressed files. Up to 12 bits of zeros follow, to put the file/memory pointer on a 16-bit boundary again. 8-bit / 256 colour images n (Byte 1) c (Byte 2) Description >0 any n pixels of colour number c AT281_TRG_E1 © Forsk 2009 Chapter 3: File Formats 3.3.2 0 0 End-of-line 0 1 End-of-Bitmap 0 2 Delta. The following 2 bytes define an unsigned offset in x and y direction (y being up). The skipped pixels should get a colour zero. 0 >=3 The following c bytes will be read as single pixel colours just as in uncompressed files. A zero follows, if c is odd, putting the file/memory pointer on a 16-bit boundary again. BPW/BMW Header File Description The header file is a text file that describes how data are organised in the .bmp file. The header file is made of rows, each row having the following description: Line Description 1 x dimension of a pixel in map units 2 amount of translation 3 amount of rotation 4 negative of the y dimension of a pixel in map units 5 x-axis map coordinate of the centre of the upper-left pixel 6 y-axis map coordinate of the centre of the upper-left pixel Atoll supports .bpw and .bmw header file extensions for Import, but exports headers with .bpw file extensions. 3.3.3 Sample 3.3.3.1 Clutter Classes File 100.00 0.00 0.00 -100.00 60000.00 2679900.00 3.4 Generic Raster Header File (.wld) .wld is a new Atoll specific header format that can be used for any raster data file for georeferencing. At the time of import of any raster data file, Atoll can use the corresponding .wld file to read the georeferencing information related to the raster data file. The .wld file contains the spatial reference data of any associated raster data file. The .wld file structure is simple; it is an ASCII text file containing six lines. You can open a .wld file using any ASCII text editor. 3.4.1 WLD File Description The .wld file is a text file that describes how data are organised in the associated raster data file. The header file is made of rows, each row having the following description: Line Description 1 x dimension of a pixel in map units 2 amount of translation 3 amount of rotation 4 negative of the y dimension of a pixel in map units 5 x-axis map coordinate of the centre of the upper-left pixel 6 y-axis map coordinate of the centre of the upper-left pixel 3.4.2 Sample 3.4.2.1 Clutter Classes File 100.00 © Forsk 2009 AT281_TRG_E1 51 Technical Reference Guide 0.00 0.00 -100.00 60000.00 2679900.00 3.5 DXF Format Atoll is capable of importing and working with AutoCAD® drawings in the Drawing Interchange Format (DXF). .dxf files can have ASCII or binary formats. But only the ASCII .dxf files can be used in Atoll. .dxf files are composed of pairs of codes and associated values. The codes, known as group codes, indicate the type of value that follows. .dxf files are organized into sections of records containing the group codes and their values. Each group code and value is a separate line. Each section starts with a group code 0 followed by the string, SECTION. This is followed by a group code 2 and a string indicating the name of the section (for example, HEADER). Each section ends with a 0 followed by the string ENDSEC. 3.6 SHP Format ESRI (Environmental Systems Research Institute, Inc.) ArcView® GIS Shapefiles have a simple, non-topological format for storing geometric locations and attribute information of geographic features. A shapefile is one of the spatial data formats that you can work with in ArcExplorer. .shp data files usually have associated .shx and .dbf files. Among these three files: • • • The .shp file stores the feature geometry The .shx file stores the index of the feature geometry. The .dbf (dBASE) file stores the attribute information of features. When a shapefile is added as a theme to a view, this file is displayed as a feature table. You can define mappings between the coordinate system used for the ESRI vector files, defined in the corresponding .prj files, and Atoll. In this way, when you import a vector file, Atoll can detect the correct coordinate system automatically. For more information about defining the mapping between coordinate systems, please refer to the Administrator Manual. 3.7 MIF Format MapInfo Interchange Format (.mif) allows various types of data to be attached to a variety of graphical items. These ASCII files are editable, easy to generate, and work on all platforms supported by MapInfo. Vector objects with a .mif extension may be imported in Atoll. Two files, a .mif and a .mid, contain MapInfo data. Graphics reside in the .mif file while the text contents are stored in the .mid file. The text data is delimited with one row per record, and Carriage Return, Carriage Return plus Line Feed, or Line Feed between lines. The .mif file has two sections, the file header and the data section. The .mid file is optional. When there is no .mid file, all fields are blank. You can find more information at http://www.mapinfo.com. You can define mappings between the coordinate system used for the MapInfo vector files, defined in the corresponding .mif files, and Atoll. In this way, when you import a vector file, Atoll can detect the correct coordinate system automatically. For more information about defining the mapping between coordinate systems, please refer to the Administrator Manual. 3.8 TAB Format TAB files (MapInfo Tables) are the native format of MapInfo. They actually consist of a number of files with extensions such as .TAB, .DAT and .MAP. All of these files need to be present and kept together for the table to work. These are defined as follows: • • • • • .TAB: table structure in ASCII format .DAT: table data storage in binary format .MAP: storage of map objects in binary format .ID: index to the MapInfo graphical objects (.MAP) file .IND: index to the MapInfo tabular (DAT) file You can find more information at http://www.mapinfo.com. You can define mappings between the coordinate system used for the MapInfo vector files, defined in the corresponding .mif files, and Atoll. In this way, when you import a vector file, Atoll can detect the correct coordinate system automatically. For more information about defining the mapping between coordinate systems, please refer to the Administrator Manual. TAB files are also supported as georeference information files for raster files (.bmp and .tif). The .TAB file must have the following format: 52 AT281_TRG_E1 © Forsk 2009 Chapter 3: File Formats !table !version 300 !charset WindowsLatin1 Definition Table File "raster.bmp" Type "RASTER" (ulxmap,ulymap) (0,0) Label "Pt 1", (llxmap,llymap) (0,nrows) Label "Pt 2", (lrxmap,lrymap) (ncols,nrows) Label "Pt 3", (urxmap,urymap) (ncols,0) Label "Pt 4" The fields in bold are described below: 3.9 Field Description File "raster.bmp" Name of the raster file (e.g., raster.bmp) ulxmap x coordinate of the centre of the upper-left pixel in metres ulymap y coordinate of the centre of the upper-left pixel in metres llxmap x coordinate of the centre of the lower-left pixel in metres llymap y coordinate of the centre of the lower-left pixel in metres lrxmap x coordinate of the centre of the lower-right pixel in metres lrymap y coordinate of the centre of the lower-right pixel in metres urxmap x coordinate of the centre of the upper-right pixel in metres urymap y coordinate of the centre of the upper-right pixel in metres nrows Number of rows in the image ncols Number of columns in the image ECW Format The Enhanced Compressed Wavelet file format is supported in Atoll. .ecw files are geo-referenced image files, which can be imported in Atoll. This is an Open Standard wavelet compression technology, developed by Earth Resource Mapping, which can compress images with up to a 100-to-1 compression ratio. Each compressed image file contains a header carrying the following information about the image: • • • • • • 3.10 The image size expressed as the number of cells across and down The number of bands (RGB images have three bands) The image compression rate The cell measurement units (meters, degrees or feet) The size of each cell in measurement units Coordinate space information (Projection, Datum etc.) Erdas Imagine Format Atoll supports Erdas Imagine data files in order to import DTM (8 or 16 bit/pixel), clutter (8 bit/pixel), traffic (8 bit/pixel), and image (1-24 bit/pixel) files with the .img format. These files use the Erdas Imagine Hierarchical File Format (HFA) structure. For any type of file, if there are pyramids (storage of different resolution layers), they are used to enhance performance when decreasing the resolution of the display. Some aspects of working with Erdas Imagine format in Atoll are: • • • • Atoll supports uncompressed as well as compressed (or partially compressed) DTM .img files. You can create a .mnu file to improve the clutter class map loading. The colour-to-code association (raster maps) may be automatically imported from the .img file. These files are automatically geo-referenced, i.e., they do not require any additional file for geo-reference. For image files, the number of supported bands is either 1 (colour palette is defined separately) or 3 (no colour palette but direct RGB information for each pixel). In case of 3 bands, only 8 bit per pixel format is supported. Therefore, 8-bit images, containing RGB information (three bands are provided: the first band is for Blue, the second one is for Green and the third for Red), can be considered as 24 bit per pixel files. 32 bit per pixel files are not supported. © Forsk 2009 AT281_TRG_E1 53 Technical Reference Guide Notes: • Using compressed geo data formats (compressed .tif, Erdas Imagine, or .ecw) can cause performance loss due to real-time decompression. However, you can recover this loss in performance by: - Either, hiding the status bar, which provides geographic data information in real time, by unchecking the Status Bar item in the View menu. - Or, not displaying some of the information, such as altitude, clutter class and clutter height, in the status bar. This can be done through the Atoll.ini file, by adding the following lines: [StatusBar] DisplayZ=0 DisplayClutterClass=0 DisplayClutterHeight=0 3.11 • You can also save the produced map in an uncompressed format. • Please refer to the Administrator Manual for more details about the Atoll.ini file. Planet EV/Vertical Mapper Geographic Data Format Vertical Mapper offers two types of grids: • • Numerical continuous grids, which contain numerical information (such as DTM), and are stored in files with the .grd extension. Classified grids, which contain alphanumeric (characters) information, and are stored in files with the .grc extension. Atoll is capable of supporting the Vertical Mapper Classified Grid (GRC) and Vertical Mapper Continuous Grid (GRD) file formats in order to import and export: • • GRD: DTM, image, population, traffic density, and other data types. GRC: DTM, clutter classes, clutter heights, environment traffic, image, population, and other data types. It is also possible to export coverage prediction studies in GRD and GRC formats. This is the geographic data format used by Planet EV. So, it is possible to directly import geographic data from Planet EV to Atoll using this format. 3.12 ArcView Grid Format The ArcView Grid format (.txt) is an ASCII format dedicated to defining raster maps. It may be used to export any raster map such as DTM, images, clutter classes and/or heights, population, other data maps, and even coverage predictions. The contents of an ArcView Grid file are in ASCII and consist of a header, describing the content, followed by the content in the form of cell values. 3.12.1 ArcView Grid File Description The format of this file is as follows: ncols XXX Number of columns of the grid (XXX columns). nrows XXX Number of rows of the grid (XXX rows). xllcenter XXX OR xllcorner XXX Significant value relative to the bin centre or corner. yllcenter OR yllcorner XXX Significant value relative to the bin centre or corner. cellsize XXX Grid resolution. nodata_value XXX Optional value corresponding to no data (no information). //Row 1 Top of the raster. Description of the first row. Syntax: ncols number of values separated by spaces. : : //Row N 54 Bottom of the raster. AT281_TRG_E1 © Forsk 2009 Chapter 3: File Formats 3.12.2 Sample ncols 303 nrows 321 xllcorner 585300.000000 yllcorner 5615700.000000 cellsize 100.000000 nodata_value 0 ... 3.13 Other Supported Geographic Data File Formats Other than the .bil, .tif, Planet, .dxf, .shp, .mif, .img, and .ecw formats, Atoll supports 3 other formats. The .ist and .dis formats are ASCII files used for Digital Terrain Model only. .ist images come from Istar, whereas .dis images come from IGN (Institut Géographique National). The .ist format works in exactly the same way as the .bil format, except for DTM images. For DTM images, the .ist format uses a decimetric coding for altitudes, whereas .bil images use only a metric coding. 3.14 Planet Format The Planet geographic data are described by a set of files grouped in a Planet directory. The directory structure depends on the geographic data type. Atoll supports the following objects in Planet format: • • • • • Digital Terrain Model (8 and 16 bits) Clutter class maps (16 bits) Raster images (1, 4, 8 and 24 bits) Vector data Text data 3.14.1 DTM File 3.14.1.1 Description The DTM directory consists of three files; the height file and two other files detailed below: • The index file structure is simple; it is an ASCII text file that holds position information about the file. It contains five columns. You can open an index file using any ASCII text editor. The format of the index file is as follows: Field Acceptable values Description File name Text Name of file referenced by the index file East min Float x-axis map coordinate of the centre of the upper-left pixel in meters East max Float x-axis map coordinate of the centre of the upper-right pixel in meters North min Float y-axis map coordinate of the centre of the lower-left pixel in meters North max Float y-axis map coordinate of the centre of the upper-left pixel in meters Square size Float Dimension of a pixel in meters • The projection file provides information about the projection system used. This file is optional. It is an ASCII text file with four lines maximum. Line Description Spheroid Zone Projection Central meridian Latitude and longitude of projection central meridian and equivalent x and y coordinates in meters (optional) Note: • © Forsk 2009 In the associated binary file, the value -9999 corresponds to ‘No data’ which is supported by Atoll. AT281_TRG_E1 55 Technical Reference Guide 3.14.1.2 Sample Index file associated with height file (DTM data): sydney1 303900 343900 6227900 6267900 50 Projection file associated with height file (DTM data): Australian-1965 56 UTM 0 153 500000 10000000 3.14.2 Clutter Class Files 3.14.2.1 Description The Clutter directory consists of three files; the clutter file and two other files detailed below: • The menu file, an ASCII text file, defines the feature codes for each type of clutter. It consists of as many lines (with the following format) as there are clutter codes in the clutter data files. This file is optional. Field Type Description Clutter-code Integer (>1) Identification code for clutter class Feature-name Text (up to 32 characters in length) Name associated with the clutter-code. (It may contain spaces) • The index file gives clutter spatial references. The structure of clutter index file is the same as the structure of DTM index file. Note: • 3.14.2.2 In the associated binary file, the value -9999 corresponds to ‘No data’ which is supported by Atoll. Sample Menu file associated with the clutter file: 56 1 open 2 sea 3 inlandwater 4 residential 5 meanurban 6 denseurban 7 buildings 8 village 9 industrial 10 openinurban 11 forest 12 parks 13 denseurbanhigh 14 blockbuildings 15 denseblockbuild 16 rural 17 mixedsuburban AT281_TRG_E1 © Forsk 2009 Chapter 3: File Formats 3.14.3 Vector Files 3.14.3.1 Description Vector data comprises terrain features such as coastlines, roads, etc. Each of these features is stored in a separate vector file. Four types of files are used, the vector file, where x and y coordinates of vector paths are stored, and three other files detailed below: • The menu file, an ASCII text file, lists the vector types stored in the database. The menu file is composed of one or more records with the following structure: Field Type Description Vector type code Integer > 0 Identification code for the vector type Vector type name Text (up to 32 characters in length) Name of the vector type The fields are separated by space character. • The index file, an ASCII text file, lists the vector files and associates each vector file with one vector type, and optionally with one attribute file. The index file consists of one or more records with the following structure: Field Type Description Vector file name Text (up to 32 characters in length) Name of the vector file Attribute file name Text (up to 32 characters in length) Name of attribute file associated with the vector file (optional) Dimensions Real vector file eastmin: minimum x-axis coordinate of all vector path points in the vector file vector file eastmax: maximum x-axis coordinate of all vector path points in the vector file vector file northmin: minimum y-axis coordinate of all vector path points in the vector file vector file northmax: maximum y-axis coordinate of all vector path points Vector type name Text (up to 32 characters in length) Name of the vector type with which the vector file is associated. This one must match exactly a vector type name field in the menu file. The fields are separated by spaces. • 3.14.3.2 The attribute file stores the height and description properties of vector paths. This file is optional. Sample Index file associated with the vector files 3.14.4 sydney1.airport 313440 333021 6239426 6244784 airport sydney1.riverlake 303900 342704 6227900 6267900 riverlake sydney1.coastline 322837 343900 6227900 6267900 coastline sydney1.railways 303900 336113 6227900 6267900 railways sydney1.highways 303900 325155 6240936 6267900 highways sydney1.majstreets 303900 342770 6227900 6267900 majstreets sydney1.majorroads 303900 342615 6227900 6267900 majorroads Image Files The image directory consists of two files, the image file with .tif extension and an index file with the same structure as the DTM index file structure. 3.14.5 Text Data Files The text data directory consists of: • The text data files are ASCII text files with the following format: Airport 637111.188 3094774.00 Airport © Forsk 2009 AT281_TRG_E1 57 Technical Reference Guide 628642.688 3081806.25 Each file contains a line of text followed by easting and northing of that text, etc. • The index file, an ASCII text file, stores the position of each text file. It consists of one or more records with the following structure: Field Type Description File name Text (up to 32 characters in length) File name of the text data file East Min Real Minimum x-axis coordinate of all points listed in the text data file East Max Real Maximum x-axis coordinate of all points listed in the text data file North Min Real Minimum y-axis coordinate of all points listed in the text data file North Max Real Maximum y-axis coordinate of all points listed in the text data file Text feature Text (up to 32 characters in length) This field is omitted in case no menu file is available. The fields are separated by spaces. railwayp.txt -260079 693937 2709348 3528665 Railway_Station airport.txt -307727 771663 2547275 3554675 Airport ferryport.txt 303922 493521 2667405 3241297 Ferryport • The menu file, an ASCII text file, contains the text features. This file is optional. 1 Airport 2 Ferryport 3 Railway_Station 3.15 MNU Format 3.15.1 Description A .mnu file is useful when importing clutter classes or raster traffic files in .tif, .bil and .img formats. It gives the correspondence between the clutter (or traffic) code and the class name. It is a text file with the same name as the clutter (or traffic) file with .mnu extension. It must be stored at the same location as the clutter (or traffic) file. It has the same structure as the menu file used in the Planet format. Field Type Description Class code Integer > 0 Identification code for the clutter (or traffic) class Class name Text (up to 50 characters in length) Name of the clutter (or traffic) class. It may contain spaces. Separator used can either be a space character or a tab. 3.15.2 Sample A .mnu file associated to a clutter classes file: 3.16 0 none 1 open 2 sea 3 inland_water 4 residential 5 meanurban XML Table Export/Import Format All the data tables in an Atoll document can be exported to XML files. 58 AT281_TRG_E1 © Forsk 2009 Chapter 3: File Formats Atoll creates the following files when exporting data tables to XML files: • One index.xml file which contains the mapping between the data tables in Atoll and the corresponding XML file created by the export. One XML file per data table which contains the data table format (schema) and the data. • The XML import does not modify the active document table and field definitions. Therefore, the Networks and CustomFields tables, although exported, are not imported. The following sections describe the structures of these two types of XML files created at export. 3.16.1 Index.xml File The index.xml file stores the system (GSM, UMTS, etc.) and the technology (TDMA, CDMA, etc.) of the document, and the version of Atoll used for exporting the data tables to XML files. It also contains the mapping between the data tables in the Atoll document and the XML file corresponding to each data table. The root tag <Atoll_XML_Config...> of the index.xml file contains the following attributes: Attribute Description Atoll_File_System Corresponds to the SYSTEM_ field of the Networks table of the exported document Atoll_File_Technology Corresponds to the TECHNOLOGY field of the Networks table of the exported document Atoll_File_Version Corresponds to the Atoll version The index file also contains a list of mapping between the tables exported from Atoll and the XML files corresponding to each table. This list is sorted in the order the Atoll tables are to be imported. The list is composed of <XML_Table.../> tags with the following attributes: Attribute Description XML_File Corresponds to the exported XML file name (e.g., "Sites.xml") Atoll_Table Corresponds to the exported Atoll table name (e.g., "Sites") A sample extract of the index.xml is given below: <Atoll_XML_Config Atoll_File_System="UMTS" Atoll_File_Technology="CDMA" Atoll_File_Version="2.x.x build xxxx"> <XML_Table XML_File="CustomFields.xml" Atoll_Table="CustomFields" /> <XML_Table XML_File="CoordSys.xml" Atoll_Table="CoordSys" /> ... </Atoll_XML_Config> Note that no closing tag </XML_Table> is required. 3.16.2 XML File Atoll creates an XML file per exported data table. This XML file has two sections, one for storing the description of the table structure, and the second for the data itself. The XML file uses the standard XML rowset schema (schema included in the XML file between <s:Schema id=’RowsetSchema’> and </s:Schema> tags). Rowset Schema The XML root tag for XML files using the rowset schema is the following: <xml xmlns:s='uuid:BDC6E3F0-6DA3-11d1-A2A3-00AA00C14882' xmlns:dt='uuid:C2F41010-65B3-11d1-A29F-00AA00C14882' xmlns:rs='urn:schemas-microsoft-com:rowset' xmlns:z='#RowsetSchema'> The schema definition follows the root tag and is enclosed between the following tags: <s:Schema id=’RowsetSchema’> <!-Schema is defined here, using <s:ElementType> and <s:AttributeType> tags -> </s:Schema> In the rowset schema, after the schema description, the data are enclosed between <rs:data> and </rs:data>. Between these tags, each record is handled by a <z:row … /> tag having its attributes set to the record field values since in the rowset schema, values are handled by attributes. Note that no closing tag </z:row> is required. © Forsk 2009 AT281_TRG_E1 59 Technical Reference Guide A sample extract of a Sites.xml file containing the Sites table with only one site is given below: <xml xmlns:s='uuid:BDC6E3F0-6DA3-11d1-A2A3-00AA00C14882' xmlns:dt='uuid:C2F41010-65B3-11d1-A29F-00AA00C14882' xmlns:rs='urn:schemas-microsoft-com:rowset' xmlns:z='#RowsetSchema'> <s:Schema id='RowsetSchema'> <s:ElementType name='row' content='eltOnly' rs:updatable='true'> <s:AttributeType name='NAME' rs:number='1' rs:maydefer='true' rs:writeunknown='true' rs:basetable='Sites' rs:basecolumn='NAME' rs:keycolumn='true'> <s:datatype dt:type='string' dt:maxLength='50'/> </s:AttributeType> <s:AttributeType name='LONGITUDE' rs:number='2' rs:maydefer='true' rs:writeunknown='true' rs:basetable='Sites' rs:basecolumn='LONGITUDE'> <s:datatype dt:type='float' dt:maxLength='8' rs:precision='15' rs:fixedlength='true'/> </s:AttributeType> <s:AttributeType name='LATITUDE' rs:number='3' rs:maydefer='true' rs:writeunknown='true' rs:basetable='Sites' rs:basecolumn='LATITUDE'> <s:datatype dt:type='float' dt:maxLength='8' rs:precision='15' rs:fixedlength='true'/> </s:AttributeType> <s:AttributeType name='ALTITUDE' rs:number='4' rs:nullable='true' rs:maydefer='true' rs:writeunknown='true' rs:basetable='Sites' rs:basecolumn='ALTITUDE'> <s:datatype edlength='true'/> dt:type='r4' dt:maxLength='4' rs:precision='7' rs:fix- </s:AttributeType> <s:AttributeType name='COMMENT_' rs:number='5' rs:nullable='true' rs:maydefer='true' rs:writeunknown='true' rs:basetable='Sites' rs:basecolumn='COMMENT_'> <s:datatype dt:type='string' dt:maxLength='255'/> </s:AttributeType> <s:extends type='rs:rowbase'/> </s:ElementType> </s:Schema> <rs:data> <rs:insert> <z:row NAME='Site0' LONGITUDE='8301' LATITUDE='-9756'/> </rs:insert> </rs:data> </xml> 3.17 Externalised Propagation Results Format Propagation results, i.e. the path loss matrices, may be stored in an external folder. This folder consists of a dBASE III based file named ‘pathloss.dbf’ that contains calculation parameters of all the transmitters considered and one file (or two when calculating main and extended path loss matrices) per transmitter taken into account. This is a binary file with .los extension and contains the path loss values for a transmitter. Note: • 60 Each transmitter path loss matrix is calculated on the area where calculation radius intersects the computation zone (see: Computation zone). AT281_TRG_E1 © Forsk 2009 Chapter 3: File Formats 3.17.1 DBF File dBASE III file (pathloss.dbf) has a standard .dbf format described below. Its content can be checked by opening it in MSAccess. The format is detailed hereafter. 3.17.1.1 DBF File Format For general information, the format of .dbf files in any Xbase language is described. Following notations are used in tables: FS = FlagShip D3 = dBaseIII+ Fb = FoxBase D4 = dBaseIV Fp = FoxPro D5 = dBaseV CL = Clipper 3.17.1.1.1 3.17.1.1.2 DBF Structure Byte Description 0...n .dbf header (see next part for size, byte 8) n+1 1st record of fixed length (see next parts) 2nd record (see next part for size, byte10) … last record last optional: 0x1a (eof byte) DBF Header (Variable Size - Depends on Field Count) Byte Size Contents Description Applies for (supported by) 00 1 0x03 plain .dbf FS, D3, D4, D5, Fb, Fp, CL 0x04 plain .dbf D4, D5 (FS) 0x05 plain .dbf D5, Fp (FS) 0x43 with .dbv memo var size FS 0xB3 with .dbv and .dbt memo FS 0x83 with .dbt memo FS, D3, D4, D5, Fb, Fp, CL 0x8B with .dbt memo in D4 format D4, D5 0x8E with SQL table D4, D5 0xF5 with .fmp memo Fp 01 3 YYMMDD Last update digits All 04 4 ulong Number of records in file All 08 2 ushort Header size in bytes All 10 2 ushort Record size in bytes All 12 2 0,0 Reserved All 14 1 0x01 Begin transaction D4, D5 0x00 End Transaction D4, D5 0x00 ignored FS, D3, Fb, Fp, CL 0x01 Encrypted D4, D5 0x00 normal visible All 15 © Forsk 2009 If .dbf is not empty 1 16 12 0 (1) multi-user environment use D4,D5 28 1 0x01 production index exists Fp, D4, D5 0x00 index upon demand All 29 1 n language driver ID D4, D5 0x01 codepage437 DOS USA Fp 0x02 codepage850 DOS Multi ling Fp 0x03 codepage1251 Windows ANSI Fp 0xC8 codepage1250 Windows EE Fp 0x00 ignored FS, D3, Fb, Fp, CL 0,0 reserved All Field Descriptor, (see next paragraph) all Header Record Terminator all 30 2 32 n*32 +1 1 0x0D AT281_TRG_E1 61 Technical Reference Guide • Byte Size Contents Description Applies for (supported by) 0 11 ASCI field name, 0x00 termin all 11 1 ASCI field type (see next paragraph) all 12 4 n,n,n,n Fld address in memory D3 n,n,0,0 offset from record begin Fp 0,0,0,0 ignored FS, D4, D5, Fb, CL 16 1 byte Field length, bin (see next paragraph) all \ FS,CL: for C field type 17 1 byte decimal count, bin all / both used for fld lng 18 2 0,0 reserved all 20 1 byte Work area ID D4, D5 0x00 unused FS, D3, Fb, Fp, CL 21 2 n,n multi-user dBase D3, D4, D5 0,0 ignored FS, Fb, Fp, CL 23 1 0x01 Set Fields D3, D4, D5 0x00 ignored FS, Fb, Fp, CL 24 7 0...0 reserved all 31 1 0x01 Field is in .mdx index D4, D5 0x00 ignored FS, D3, Fb, Fp, CL • Size Field type and size in the .dbf header, field descriptor (1 byte) Type Description/Storage Applies for (supported by) Char ASCII (OEM code page chars) rest= space, not \0 term. all n = 1...64kb (using deci count) FS n = 1...32kb (using deci count) Fp, CL n = 1...254 all Date 8 ASCII digits (0...9) in the YYYYMMDD format all Numeric ASCII digits (-.0123456789) variable pos. of float.point n = 1...20 FS, D4, D5, Fp N 1...n Numeric ASCII digits (-.0123456789) fix posit/no float.point all C 1...n D8 F 1...n n = 1...20 FS, Fp, CL n = 1...18 D3, D4, D5, Fb ASCII chars (YyNnTtFf space) FS, D3, Fb, Fp, CL ASCII chars (YyNnTtFf?) D4, D5 (FS) Memo 10 digits repres. the start block posit. in .dbt file, or 10 spaces if no entry in memo all V 10 Variable Variable, bin/asc data in .dbv 4bytes bin= start pos in memo 4bytes bin= block size 1byte = subtype 1byte = reserved (0x1a) 10 spaces if no entry in .dbv FS P 10 Picture binary data in .ftp structure like M Fp B 10 Binary binary data in .dbt structure like M D5 G 10 General OLE objects structure like M D5, Fp 22 short int binary int max +/- 32767 FS 44 long int binary int max +/- 2147483647 FS 88 double binary signed double IEEE FS L1 M 10 62 Field descriptor array in the .dbf header (32 bytes for each field) Logical AT281_TRG_E1 © Forsk 2009 Chapter 3: File Formats 3.17.1.1.3 Each DBF Record (Fixed Length) Byte Size 0 1…n 3.17.1.2 Description Applies for (supported by) 1 deleted flag "*" or not deleted " " all 1… x-times contents of fields, fixed length, unterminated. For n, see (2) byte 10…11 All DBF File Content The .dbf file provides information that is needed to check validity of each path loss matrix. Field Type Description TX_NAME Text Name of the transmitter FILE_NAME Text Name (and optionally, path) of .los file MODEL_NAME Text MODEL_SIG Text Name of propagation model used to calculate path loss Signature (identity number) of model used in calculations. You may check it in the propagation model properties (General tab). The Model_SIG is used for the purpose of validity. A unique Model_SIG is assigned to each propagation model. When model parameters are modified, the associated model ID changes. This enables Atoll to detect path loss matrix invalidity. In the same way, two identical propagation models in different projects do not have the same model IDa. ULXMAP Float X-coordinate of the top-left corner of the path loss matrix upper-left pixel ULYMAP Float Y-coordinate of the top-left corner of the path loss matrix upper-left pixel RESOLUTION Float Resolution of path loss matrix in metre NROWS Float Number of rows in path loss matrix NCOLS Float Number of columns in path loss matrix FREQUENCY Float Frequency band TILT Float Transmitter antenna mechanical tilt AZIMUTH Float Transmitter antenna azimuth TX_HEIGHT Float Transmitter height in metre TX_POSX Float X-coordinate of the transmitter TX_POSY Float Y-coordinate of the transmitter ALTITUDE Float Ground height above sea level at the transmitter in metre RX_HEIGHT Float Receiver height in metre ANTENNA_SI Float Logical number referring to antenna pattern. Antennas with the same pattern will have the same number. MAX_LOS Float Maximum path loss stated in 1/16 dB. This information is used, when no calculation radius is set, to check the matrix validity. CAREA_XMIN Float Lowest x-coordinate of centre pixel located on the calculation radiusb CAREA_XMAX Float Highest x-coordinate of centre pixel located on the calculation radius CAREA_YMIN Float Lowest y-coordinate of centre pixel located on the calculation radius CAREA_YMAX Float Highest y-coordinate of centre pixel located on the calculation radius WAREA_XMIN Float Lowest x-coordinate of centre pixel located in the computation zonec WAREA_XMAX Float Highest x-coordinate of centre pixel located in the computation zone WAREA_YMIN Float Lowest y-coordinate of centre pixel located in the computation zone WAREA_YMAX Float Highest y-coordinate of centre pixel located in the computation zone LOCKED Boolean Locking status 0: path loss matrix is not locked 1: path loss matrix is locked. Boolean Atoll indicates if losses due to the antenna pattern are taken into account in the path loss matrix. 0: antenna losses not taken into account 1: antenna losses included INC_ANT a. b. c. © Forsk 2009 In order to benefit from the calculation sharing feature, users must retrieve the propagation models from the same central database. This can be done using the Open from database command for a new document or the Refresh command for an existing one. Otherwise, Atoll generates different model_ID (even if same parameters are applied on the same kind of model) and calculation sharing become unavailable due to inconsistency. These coordinates enable Atoll to determine the area of calculation for each transmitter. These coordinates enable Atoll to determine the rectangle including the computation zone. AT281_TRG_E1 63 Technical Reference Guide 3.17.2 LOS File The data file is a 16 bits binary row file organized in a standard row-column structure. It contains an integer path loss value, with a 1/16 dB unit. Data are stored starting from the southwest to the northeast corner of the area. 3.18 Externalised Tuning Files Atoll can tune path loss matrices obtained from propagation results by the use of real measurements (CW Measurements or Test Mobile Data). For each measured transmitter, Atoll tries to merge measurements and predictions on the same points and to smooth the surrounding points of the path loss matrices for homogeneity reasons. A transmitter path loss matrix can be tuned several times by the use of several measurement paths. All these tuning paths are stored in a catalogue. This catalogue is stored under a .tuning folder containing a .dbf file and one .pts file per corrected transmitter. Since a tuning file can contain several measurement paths, all these measurements are added to the tuning file. For more information on the path loss tuning algorithm, See "Path Loss Tuning" on page 109. 3.18.1 DBF File dBASE III file (pathloss.dbf) has a standard .dbf format described below. Its content can be checked by opening it in MSAccess. The format is detailed hereafter. 3.18.1.1 DBF File Format For general information, the format of .dbf files in any Xbase language is described. Following notations are used in tables: FS = FlagShip D3 = dBaseIII+ Fb = FoxBase D4 = dBaseIV Fp = FoxPro D5 = dBaseV CL = Clipper 3.18.1.1.1 3.18.1.1.2 DBF Structure Byte Description 0...n .dbf header (see next part for size, byte 8) n+1 1st record of fixed length (see next parts) 2nd record (see next part for size, byte10) … last record last optional: 0x1a (eof byte) DBF Header (Variable Size - Depends on Field Count) Byte Size Contents Description Applies for (supported by) 00 1 0x03 plain .dbf FS, D3, D4, D5, Fb, Fp, CL 0x04 plain .dbf D4, D5 (FS) 0x05 plain .dbf D5, Fp (FS) 0x43 with .dbv memo var size FS 0xB3 with .dbv and .dbt memo FS 0x83 with .dbt memo FS, D3, D4, D5, Fb, Fp, CL 0x8B with .dbt memo in D4 format D4, D5 0x8E with SQL table D4, D5 0xF5 with .fmp memo Fp 01 3 YYMMDD Last update digits All 04 4 ulong Number of records in file All 08 2 ushort Header size in bytes All 10 2 ushort Record size in bytes All 12 2 0,0 Reserved All 14 1 0x01 Begin transaction D4, D5 0x00 End Transaction D4, D5 0x00 ignored FS, D3, Fb, Fp, CL 0x01 Encrypted D4, D5 15 64 If .dbf is not empty 1 AT281_TRG_E1 © Forsk 2009 Chapter 3: File Formats normal visible All 16 12 0 (1) multi-user environment use D4,D5 28 1 0x01 production index exists Fp, D4, D5 0x00 index upon demand All 29 1 n language driver ID D4, D5 0x01 codepage437 DOS USA Fp 0x02 codepage850 DOS Multi ling Fp 0x03 codepage1251 Windows ANSI Fp 0xC8 codepage1250 Windows EE Fp 0x00 ignored FS, D3, Fb, Fp, CL 0,0 reserved All Field Descriptor, (see next paragraph) all Header Record Terminator all 30 2 32 n*32 +1 1 • 0x0D Field descriptor array in the .dbf header (32 bytes for each field) Byte Size Contents Description Applies for (supported by) 0 11 ASCI field name, 0x00 termin all 11 1 ASCI field type (see next paragraph) all 12 4 n,n,n,n Fld address in memory D3 n,n,0,0 offset from record begin Fp 0,0,0,0 ignored FS, D4, D5, Fb, CL 16 1 byte Field length, bin (see next paragraph) all \ FS,CL: for C field type 17 1 byte decimal count, bin all / both used for fld lng 18 2 0,0 reserved all 20 1 byte Work area ID D4, D5 0x00 unused FS, D3, Fb, Fp, CL 21 2 n,n multi-user dBase D3, D4, D5 0,0 ignored FS, Fb, Fp, CL 23 1 0x01 Set Fields D3, D4, D5 0x00 ignored FS, Fb, Fp, CL 24 7 0...0 reserved all 31 1 0x01 Field is in .mdx index D4, D5 0x00 ignored FS, D3, Fb, Fp, CL • Size Field type and size in the .dbf header, field descriptor (1 byte) Type Description/Storage Applies for (supported by) Char ASCII (OEM code page chars) rest= space, not \0 term. all n = 1...64kb (using deci count) FS n = 1...32kb (using deci count) Fp, CL n = 1...254 all Date 8 ASCII digits (0...9) in the YYYYMMDD format all Numeric ASCII digits (-.0123456789) variable pos. of float.point n = 1...20 FS, D4, D5, Fp N 1...n Numeric ASCII digits (-.0123456789) fix posit/no float.point all C 1...n D8 F 1...n L1 M 10 © Forsk 2009 0x00 Logical Memo n = 1...20 FS, Fp, CL n = 1...18 D3, D4, D5, Fb ASCII chars (YyNnTtFf space) FS, D3, Fb, Fp, CL ASCII chars (YyNnTtFf?) D4, D5 (FS) 10 digits repres. the start block posit. in .dbt file, or 10 spaces if no entry in memo all AT281_TRG_E1 65 Technical Reference Guide 3.18.1.1.3 V 10 Variable Variable, bin/asc data in .dbv 4bytes bin= start pos in memo 4bytes bin= block size 1byte = subtype 1byte = reserved (0x1a) 10 spaces if no entry in .dbv P 10 Picture binary data in .ftp structure like M Fp B 10 Binary binary data in .dbt structure like M D5 G 10 General OLE objects structure like M D5, Fp 22 short int binary int max +/- 32767 FS 44 long int binary int max +/- 2147483647 FS 88 double binary signed double IEEE FS Each DBF Record (Fixed Length) Byte Size 0 1…n 3.18.1.2 FS Description Applies for (supported by) 1 deleted flag "*" or not deleted " " all 1… x-times contents of fields, fixed length, unterminated. For n, see (2) byte 10…11 All DBF File Content The .dbf file provides information about the measured transmitters participating in the tuning. 3.18.2 Field Type Description TX_NAME Text Name of the transmitter FILE_NAME Text Name (and optionally, path) of .pts file AREA_XMIN Float Not used AREA_XMAX Float Not used AREA_YMIN Float Not used AREA_YMAX Float Not used PTS File The tuning file contains a header and the list of points. The contents of the header is: • • • • • • • • • • • • • 4 bytes : version 4 bytes : flag (can be used to manage flags like active flag) 50 bytes : GUID 4 bytes : Number of points 255 bytes : original measurements name (with prefix Num : for test mobile data and CW: for CW measurements) 256 bytes : comment 4 bytes : X_RADIUS 4 bytes : Y_RADIUS 4 bytes : Gain : measurement gain - losses 4 bytes : Global error 4 bytes : Rx height 4 bytes : Frequency 8 bytes : Tx Position The list of points contains following 4-uplet for all points • • • • 3.19 4 bytes : X 4 bytes : Y 4 bytes : Measurement value 4 bytes : Incidence angle. Interference Histograms File Formats Interference histograms required by automatic frequency planning tools can be imported and exported. Notes: • 66 No validity check is carried out when importing an interference histogram file. AT281_TRG_E1 © Forsk 2009 Chapter 3: File Formats 3.19.1 • Atoll only imports interference histograms related to loaded transmitters. • The lines starting with the symbol "#" are considered as comments. • The interferer TRX type is not specified. In fact, the subcells of the interferer transmitter differ by their power offsets. If the power offset of a subcell is X with respect to the BCCH, then its interference C/I histogram will be shifted by X with respect to the BCCH interference histogram. It contains no further information; therefore, the interferer TRX type is always BCCH. • For each interfered subcell-interferer subcell pair, Atoll saves probabilities for several C/I values (between 6 to 24 values). Five of these values are fixed; probabilities are calculated for C/I values equal to –9, 1, 8, 14, and 22 dB. Then, between each fixed C/I value, there can be up to three additional values (this number depends on the probability variation between the fixed values). The C/I values have 0.5 dB accuracy and probability values are calculated and stored with an accuracy of 0.002 for probabilities between 1 and 0.05, and with an accuracy of 0.0001 for probabilities lower than 0.05. • If no power offset is defined on the Interfered TRX type, it is possible to use the "All" value. • The values of probability should be absolute (between 0 and 1), and not in precentage (between 0 and 100%). One Histogram per Line (.im0) Format This file contains one histogram per line for each interfered/interfering subcell pair. The histogram is a list of C/I values with associated probabilities. The .im0 file consists of two parts: • The first part is a header used for format identification. It must start with and contain the following lines: # Calculation Results Data File. # Version 1.1, Tab separated format. Commented lines start with #. • The second part details interference histogram of each interfered subcell-interferer subcell pair. The lines after the header are considered as comments if they start with the symbol "#". If not, they must have the following format: <Column1><tab><Column2><tab><Column3><tab><Column4><newline> The 4 tab-separated columns are defined in the table below: 3.19.1.1 Column name Description Column1 Interfered transmitter Name of the interfered transmitter. Column2 Interfering transmitter Name of the interferer transmitter. Column3 Interfered TRX type Interfered subcell. In order to save storage, all subcells with no power offset are not duplicated (e.g. BCCH, TCH). Column4 C/I Probability C/I value and the probability associated to this value separated by a space character. This entry cannot be null. Sample # Calculation Results Data File. # Version 1.1, Tab separated format. Commented lines start with #. # Remark: C/I results do not incorporate power offset values. # Fields are: #-----------------------------------------------------------------------#Transmitter Interferer TRX type {C/I Probability} values #-----------------------------------------------------------------------# # Warning, The parameter settings of this header can be wrong if # the "export" is performed following an "import". They # are correct when the "export" follows a "calculate". # # Service Zone Type is "Best signal level of the highest priority HCS layer". # Margin is 5. © Forsk 2009 AT281_TRG_E1 67 Technical Reference Guide # Cell edge coverage probability 75%. # Traffic spreading was Uniform ##---------------------------------------------------------------------# # Site0_2 Site0_1 BCCH,TCH -10 1 -9 0.996 -6 0.976 -4 0.964 -1 0.936 0 0.932 1 0.924 4 0.896 7 0.864 8 0.848 9 0.832 10 0.824 11 0.804 14 0.712 17 0.66 Site0_2 Site0_3 BCCH,TCH -10 1 -9 0.996 -6 0.976 -4 0.972 -1 0.948 0 0.94 1 0.928 4 0.896 7 0.856 8 0.84 11 0.772 13 0.688 14 0.636 15 0.608 18 0.556 Site0_3 Site0_1 BCCH,TCH -10 1 -9 0.996 -6 0.98 -3 0.948 0 0.932 1 0.924 4 0.892 7 0.852 8 0.832 9 0.816 10 0.784 11 0.764 14 0.644 15 0.616 18 0.564 Site0_3 Site0_2 BCCH,TCH -9 1 -6 0.972 -3 0.964 -2 0.96 0 0.94 1 0.932 4 0.904 7 0.876 8 0.86 9 0.844 11 0.804 13 0.744 14 0.716 15 0.692 18 0.644 3.19.2 One Value per Line with Dictionary File (.clc) Format Atoll creates two ASCII text files in a specified directory: xxx.dct and xxx.clc (xxx is the user-specified name). Note: • 3.19.2.1 CLC File 3.19.2.1.1 Description When importing interference histograms with standard format, you must specify the .clc file to be imported. Atoll looks for the associated .dct file in the same directory and uses it to decode transmitter identifiers. If this file is unavailable, Atoll assumes that the transmitter identifiers are the transmitter names. In this case, the columns 1 and 2 of the .clc file must contain the names of the interfered and interferer transmitters instead of their identification numbers. The .clc file consists of two parts: • The first part is a header used for format identification. It must start with and contain the following lines: # Calculation Results Data File. # Version 1.1, Tab separated format. Commented lines start with #. • The second part details interference histogram of each interfered subcell-interferer subcell pair. The lines after the header are considered as comments if they start with the symbol "#". If not, they must have the following format: <Column1><tab><Column2><tab><Column3><tab><Column4><tab><Column5><newline> The 5 tab-separated columns are defined in the table below: Column name Description Column1 Interfered transmitter Identification number of the interfered transmitter. If the column is empty, its value is identical to the one of the line above. Column2 Interfering transmitter Identification number of the interferer transmitter. If the column is null, its value is identical to the one of the line above. Column3 Interfered TRX type Interfered subcell. If the column is null, its value is identical to the one of the line above. In order to save storage, all subcells with no power offset are not duplicated (e.g. BCCH, TCH). Column4 C/I threshold C/I value. This column cannot be null. Probability C/I > Threshold Probability to have C/I the value specified in column 4 (C/I threshold). This field must not be empty. Column5 68 AT281_TRG_E1 © Forsk 2009 Chapter 3: File Formats Note: • 3.19.2.1.2 The columns 1, 2, and 3 must be defined only in the first line of each histogram. Sample # Calculation Results Data File. # Version 1.1, # Remark: Tab separated format. Commented lines start with #. C/I results do not incorporate power offset values. # Fields are: ##------------#------------#------------#-----------#------------------# #| Interfered | Interfering| Interfered | C/I #| Transmitter| Transmitter| Trx type | Probability | | Threshold | C/I >= Threshold | ##------------#------------#------------#-----------#------------------# # # Warning, The parameter settings of this header can be wrong if # the "export" is performed following an "import". They # are correct when the "export" follows a "calculate". # # Service Zone Type is "Best signal level of the highest priority HCS layer". # Margin is 5. # Cell edge coverage probability 75%. # Traffic spreading was Uniform ##---------------------------------------------------------------------# 1 2 TCH_INNER 8 1 9 1 2 BCCH,TCH 0.944 10 0.904 11 0.892 14 0.844 15 0.832 16 0.812 17 0.752 22 0.316 25 0.292 8 1 9 0.944 10 .904 13 0.872 14 0.84 17 0.772 Note: • If the TCH and BCCH histograms are the same, they are not duplicated. A single record indicates that the histograms belong to TCH and BCCH both. For example, instead of: 1 2 TCH 1 2 BCCH -9.5 1 -9.5 - 9 1 - 6 1 - 9 1 - 6 -9.5 1 - 9 1 1 1 We have: 1 2 TCH,BCCH 3.19.2.2 DCT File 3.19.2.2.1 Description - 6 1 The .dct file is divided into two parts: • © Forsk 2009 The first part is a header used for format identification. It must start with and contain the following lines: AT281_TRG_E1 69 Technical Reference Guide # Calculation Results Dictionary File. # Version 1.1, Tab separated format. Commented lines start with #. • The second part provides information about transmitters taken into account in AFP. The lines after the header are considered as comments if they start with the symbol "#". If not, they must have the following format: <Column1><tab><Column2><newline> Column name Type Description Column1 Transmitter name Text Name of the transmitter Column2 Transmitter Identifier Integer Identification number of the transmitter Column3 BCCH during calculation Integer BCCH used in calculations Column4 BSIC during calculation Integer BSIC used in calculations Column5 % of vic’ coverage Float Percentage of overlap of the victim service area Column6 % of int’ coverage Float Percentage of overlap of the interferer service area The last four columns describe the interference matrix scope. One transmitter per line is described separated with a tab character. 3.19.2.2.2 Sample # Calculation Results Dictionary File. # Version 2.1, Tab separated format. Commented lines start with #. # Fields are: ##-----------#-----------#-----------#-----------#---------#---------# #|Transmitter|Transmitter|BCCH during|BSIC during|% of vic'|% of int'| #|Name |Identifier |calculation|calculation|coverage |coverage | ##-----------#-----------#-----------#-----------#---------#---------# # # Warning, The parameter settings of this header can be wrong if # the "export" is performed following an "import". They # are correct when the "export" follows a "calculate". # # Service Zone Type is "Best signal level per HCS layer". # Margin is 5. # Cell edge coverage probability is 75%. # Traffic spreading was Uniform (percentage of interfered area) ##---------------------------# 3.19.3 Site0_0 1 -1 -1 100 100 Site0_1 2 -1 -1 100 100 Site0_2 3 -1 -1 100 100 Site1_0 4 -1 -1 100 100 Site1_1 5 -1 -1 100 100 Site1_2 6 -1 -1 100 100 Site2_0 7 -1 -1 100 100 Site2_1 8 -1 -1 100 100 One Value per Line (Transmitter Name Repeated) (.im1) Format This file contains one C/I threshold and probability pair value per line for each interfered/interfering subcell pair. The histogram is a list of C/I values with associated probabilities. The .im1 file consists of two parts: 70 AT281_TRG_E1 © Forsk 2009 Chapter 3: File Formats • The first part is a header used for format identification. It must start with and contain the following lines: # Calculation Results Data File. # Version 1.1, Tab separated format. Commented lines start with #. • The second part details interference histogram of each interfered subcell-interferer subcell pair. The lines after the header are considered as comments if they start with the symbol "#". If not, they must have the following format: <Column1><tab><Column2><tab><Column3><tab><Column4><tab><Column5><newline> The 5 tab-separated columns are defined in the table below: Column name Description Column1 Interfered transmitter Name of the interfered transmitter. Column2 Interfering transmitter Name of the interferer transmitter. Column3 Interfered TRX type Interfered subcell. In order to save storage, all subcells with no power offset are not duplicated (e.g. BCCH, TCH). Column4 C/I threshold C/I value. This column cannot be null. Probability C/I > Threshold Probability to have C/I the value specified in column 4 (C/I threshold). This field must not be empty. Column5 3.19.3.1 Sample # Calculation Results Data File. # Version 1.1, Tab separated format. Commented lines start with #. # Remark: C/I results do not incorporate power offset values. # Fields are: #-----------------------------------------------------------------------#Transmitter Interferer TRX type C/I Probability #-----------------------------------------------------------------------# # Warning, The parameter settings of this header can be wrong if # the "export" is performed following an "import". They # are correct when the "export" follows a "calculate". # # Service Zone Type is "Best signal level of the highest priority HCS layer". # Margin is 5. # Cell edge coverage probability 75%. # Traffic spreading was Uniform ##---------------------------------------------------------------------# Site0_2 Site0_1 BCCH,TCH -10 1 Site0_2 Site0_1 BCCH,TCH -9 0.996 Site0_2 Site0_1 BCCH,TCH -6 0.976 Site0_2 Site0_1 BCCH,TCH -4 0.964 Site0_2 Site0_1 BCCH,TCH -1 0.936 Site0_2 Site0_1 BCCH,TCH 0 0.932 Site0_2 Site0_1 BCCH,TCH 1 0.924 Site0_2 Site0_1 BCCH,TCH 4 0.896 Site0_2 Site0_1 BCCH,TCH 7 0.864 Site0_2 Site0_1 BCCH,TCH 8 0.848 Site0_2 Site0_1 BCCH,TCH 9 0.832 Site0_2 Site0_1 BCCH,TCH 10 0.824 ... © Forsk 2009 AT281_TRG_E1 71 Technical Reference Guide 3.19.4 Only Co-Channel and Adjacent Values (.im2) Format In this case, there is only one .im2 file containing co-channel and adjacent channel interference probabilities specified for each interfered transmitter – interferer transmitter pair. There is only one set of values for all the subcells of the interfered transmitter. Each line must have the following format: <Column1><SEP><Column2><SEP><Column3><SEP><Column4><newline> Where the separator (<SEP>) can either be a tab or a semicolon. The four columns are defined in the table below: Column name Description Column1 Interfered transmitter Name of the interfered transmitter. Column2 Interfering transmitter Name of the interferer transmitter. Column3 Co-channel interference probability Column4 Adjacent channel interference probability Probability of having C I Probability of having C I Max BCCH ,TCH Max BCCH ,TCH C I req C I req – F C I req corresponds to the required C/I threshold. This parameter is defined for each subcell. F is the adjacent channel protection level. 3.19.4.1 Sample # Calculation Results Data File. # Version 1.1, Tab separated format. Commented lines start with #. # Remark: C/I results do not incorporate power offset values. # Fields are: #-----------------------------------------------------------------------#Transmitter Interferer Co-channel Adjacent channel #-----------------------------------------------------------------------# # Warning, The parameter settings of this header can be wrong if # the "export" is performed following an "import". They # are correct when the "export" follows a "calculate". # # Service Zone Type is "Best signal level of the highest priority HCS layer". # Margin is 5. # Cell edge coverage probability 75%. # Traffic spreading was Uniform ##---------------------------------------------------------------------# Site0_2 Site0_1 0.226667 0.024 Site0_2 Site0_3 0.27 0.024 Site0_3 Site0_1 0.276 0.02 Site0_3 Site0_2 0.226 0.028 The columns in the sample above are separated with a tab. These columns can also be separated with a semilcolon: Site0_2;Site0_1;0.226667;0.024 Site0_2;Site0_3;0.27;0.024 Site0_3;Site0_1;0.276;0.02 Site0_3;Site0_2;0.226;0.028 72 AT281_TRG_E1 © Forsk 2009 Chapter 4 Calculations This chapter describes in detail the calculation of path losses, the propagation models implemented in Atoll by default, the calculation of antenna attenuation according to antenna patterns, and other calculation algorithms in Atoll. AtollMicrowave Atoll Microwave Planning Software RF PlanningLink & Optimisation Software Technical Reference Guide 74 AT281_TRG_E1 © Forsk 2009 Chapter 4: Calculations 4 Calculations 4.1 Overview Three kinds of predictions are available in Atoll: • Point analysis enables you to visualise transmitter-receiver profile and to get predictions for a user-defined receiver in real time anywhere on a geographic map (Point analysis window: Profile tab). Coverage studies consider each bin of calculation areas as a potential receiver you can define. Therefore, covered bins correspond to areas where a criterion on the predicted received signal is fulfilled. Point analysis based on path loss matrices enables you to get parameters derived from predicted values in coverage studies (field received, path loss, C/I, UMTS parameters) for a receiver anywhere inside a calculation area (Point analysis window: Reception, Interference, AS analysis tabs). • • An overview of different analysis methods is presented in the table below: Coverage studies Point analysis Point analysis based on path loss matrices Any study Profile Reception, Results, Interference, AS analysis Receiver position At the centre of each calculation bin within calculation areas Anywhere. Even beyond computation zone Anywhere inside the calculation areas Calculation Path loss matrix calculation Real time No calculation: result coming from path loss matrices Profile extractiona Radial except when using SPM Systematic Method used for coverage studies: radial except when using SPM Result One value inside a calculation bin Different values inside a calculation bin One value inside a calculation bin a. When using SPM, you can choose either radial or systematic calculation option. Notes: • In coverage studies, Atoll calculates path loss for every bin within calculation areas. However, only results on calculation bins inside the computation zone are displayed. • Profile point analysis is calculated in real time. Therefore, prediction is always consistent with the network. On the other hand, if you modify any parameter (radio or geo), which may make matrices invalid, consider updating the matrices before using point analysis based on path loss matrices. • Due to different calculation methods, you can get different results at a same point when performing a point analysis in profile or reception mode. In any case, prediction is performed in three steps: 1st step: First of all, Atoll calculates the path loss ( L path ), using the selected propagation model. L path = L model + L ant Tx + L ant Rx L model is the loss on the transmitter-receiver path calculated through the propagation model. L model value depends on the selected propagation model. L ant Tx L ant Rx is the transmitter antenna attenuation (from antenna patterns). is the receiver antenna attenuation ( L ant Rx = 0 ) (from antenna patterns). Notes: • In any project, Atoll considers that the receiver antenna is in the transmitter antenna axis. Therefore, the receiver antenna attenuation is supposed to be zero. • Transmitter antenna attenuation may not be considered in this step. It depends on propagation model provider, who may choose to include this parameter in L path calculation. However, all the propagation models available in Atoll calculate L path by considering transmitter antenna attenuation. 2nd step: When the option “Shadowing taken into account” is selected, Atoll evaluates a shadowing margin, M Shadowing – model , from the user-defined model standard deviation at the receiver and the cell edge coverage probability. © Forsk 2009 AT281_TRG_E1 75 Technical Reference Guide Note: • For a cell edge coverage probability of 50%, the shadowing margin is always zero. In this case, Atoll still works as above. 3rd step: Then, Atoll determines the prediction criterion and displays coverage. For a signal level study, The signal level at the receiver ( P Rec ) is calculated. We have (in dBm): P Rec = EIRP – L path – M Shadowing – model – L Indoor + G ant Where EIRP = P Tx + G ant Tx Rx – L Rx – L Tx EIRP is the effective isotropic radiated power of the transmitter. P Tx is the transmitter power. G ant Tx is the transmitter antenna gain. L Tx are transmitter losses. M Shadowing – model is the shadowing margin. L Indoor are the indoor losses, taken into account when the option “Indoor coverage” is selected, L Rx are receiver losses. G ant Rx is the receiver antenna gain. Notes: • In UMTS and CDMA documents, P Tx = P Pilot and L Tx = L total – DL . • In UMTS and CDMA documents, Atoll considers that G ant Rx and L Rx equal zero when calculating the received signal level (in point analysis, Profile and Reception tabs, and in common coverage studies such as Coverage per transmitter, Coverage by field level, Overlapping). • In GSM_EGPRS documents, L Tx = L total – DL . • In GSM_EGPRS documents, receiver is equipped with an antenna with zero gain. The prediction is performed for a user-defined cell edge coverage probability (x%). This means that the measured criterion exceeds the predicted criterion for x% of time. The prediction is reliable during x% of time. Note: • 4.2 In case of interference studies, only signal from interfered transmitter (C) is downgraded by the shadowing margin. We consider that interference value (I) is not altered by the shadowing margin. Path Loss Matrices Atoll is able to calculate two path loss matrices per transmitter, a first matrix over a smaller radius computed with a high resolution and a propagation model (main matrix), and a second matrix over a larger radius computed with a low resolution and another propagation model (extended matrix). To be considered for calculations, a transmitter must fulfil the following conditions: • • • It must be active, It must satisfy filter criteria defined in the Transmitters folder, and It must have a calculation area. In the rest of the document, a transmitter fulfilling the conditions detailed above will be called TBC transmitter. The path loss matrix size of a TBC transmitter depends on its calculation area. Atoll determines a path loss value ( L path ) on each calculation bin (calculation bin is defined by the resolution) of the calculation area of the TBC transmitter. You may have one or two path loss matrices per TBC transmitter. 76 AT281_TRG_E1 © Forsk 2009 Chapter 4: Calculations 4.2.1 Calculation Area Determination 4.2.1.1 Computation Zone Transmitter calculation area is made of a rectangle or a square depending on transmitter calculation radius and the computation zone. Calculation radius enables Atoll to define a square around the transmitter. One side of the square equals twice the entered calculation radius. Since the computation zone can be made of one or several polygons, transmitter calculation area corresponds to the intersection area between its calculation square and the rectangle containing the computation zone area(s). Figure 4.1: Example 1: Single Calculation Area Figure 4.2: Example 2: Multiple Calculation Areas Computation zone(s) Rectangle containing the computation zone(s) Calculation area defined (square) Transmitter Calculation area: real area for which Atoll calculates path losses 4.2.1.2 Use of Polygonal Zones in Coverage Prediction Reports Prediction statistics are evaluated over the focus zone, if existing, then over the computation zone, if existing, or over the whole covered area. The area of the focus and computation zones are calculated by decomposition in triangles. The area of each prediction is calculated by counting its pixels inside the focus (resp. computation) zone. This number of pixels multiplied by the area of one of its pixels gives the total area. This area depends on the study resolution. At the border of the focus (resp. computation) zone, pixels are considered either IN or OUT of the zone. A pixel is IN if its centre is inside the focus zone. If a prediction covers the entire focus (resp. computation) zone, its area should be equal to the focus (resp. computation) zone area, but as these 2 different methods differ, the results may be slightly different. If it happens that the value of the prediction area is higher than the focus zone area, then the calculated percentage value is higher than 100%. In that case, Atoll automatically replaces it by 100%. © Forsk 2009 AT281_TRG_E1 77 Technical Reference Guide 4.2.2 Calculate / Force Calculation Comparison 4.2.2.1 Calculate The Calculate feature (F7) enables you: 1. To calculate prediction studies The first time you click Calculate (no path loss matrices exist), Atoll computes path loss matrices for each TBC transmitter. Then, it calculates created and unlocked coverage prediction studies inside the computation zone. 2. To check result validity and update calculations If calculations have been performed once and you have changed some parameters such as radio data or calculation area, Atoll automatically detects path loss matrices to be recalculated. These are either one or several path loss matrices that become invalid due to certain modifications. Then Atoll calculates the prediction study, or just the prediction study if matrices were all still valid. 4.2.2.2 Force Calculation With the Force calculation feature (Ctrl+F7), Atoll deletes all the path loss matrices even if they are valid, recalculates them and then updates the results of prediction studies. Note: • 4.2.3 Geographic data (DTM, clutter) modification makes path loss matrices invalid. However, Atoll does not detect this invalidity just by using Calculate. Therefore, to update calculations, you must click the Force calculation command. Matrix Validity Atoll manages path loss matrix validity transmitter by transmitter, even in case of transmitters with two path loss matrices (main and extended matrices). Therefore, even if only one path loss matrix of the transmitter is invalid, Atoll will recalculate both of them. All the geographic data modifications and some radio data changes can make matrices invalid. This table lists these modifications and also changes that have an impact only on prediction studies. Modification Matrix validity Impact on Calculate Force calculation Frequency Invalid Path loss matrices Sufficient Not necessary Antenna* coordinates (site coordinate: X and Y, Dx and Dy) Invalid Path loss matrices Sufficient Not necessary Antennaa height Invalid Path loss matrices Sufficient Not necessary a Invalid Path loss matrices Sufficient Not necessary a Invalid Path loss matrices Sufficient Not necessary a Antenna pattern Downtilt Invalid Path loss matrices Sufficient Not necessary % Power (when there is other antennas) Invalid Path loss matrices Sufficient Not necessary Site position/altitude Invalid Path loss matrices Sufficient Not necessary Grid resolution (main or/and extended) Invalid Path loss matrices Sufficient Not necessary Propagation model (main or/and extended) Invalid Path loss matrices Sufficient Not necessary Propagation model parameters Invalid Path loss matrices Sufficient Not necessary Calculation areas 1. Calculation areas gets smaller Valid Prediction study Sufficient Not necessary Calculation areas 2. Calculation areas gets larger Invalid Path loss matrices Sufficient Not necessary Receiver height Invalid Path loss matrices Sufficient Not necessary Receiver losses Valid Prediction study Sufficient Not necessary Receiver gain Valid Prediction study Sufficient Not necessary Prediction study Sufficient Not necessary Azimuth Receiver antenna Rx = 0 Geographic layer order Invalid Path loss matrices Insufficientb Necessary Geographic file resolution Invalid Path loss matrices Insufficientb Necessary Invalid Insufficientb Necessary New DTM map 78 Valid because L ant AT281_TRG_E1 Path loss matrices © Forsk 2009 Chapter 4: Calculations Path loss matrices Insufficientb New clutter class edition Invalid Coverage study resolution Valid Prediction study Sufficient Not necessary Cell edge coverage probability Valid Prediction study Sufficient Not necessary Coverage study conditions Valid Prediction study Sufficient Not necessary Coverage study display options Valid Prediction study Sufficient Not necessary Necessary a.Modification of any parameter related to main or other antennas makes matrix invalid. b.Except if this action has an impact on the site positions/altitudes. Tip 1 Calculate or Force Calculation? If you modify radio data or calculation areas, use the Calculate button. On the other hand, if you change geographic data, it is necessary to use Force calculation. Tip 2 Calculation area management When performing prediction studies, it is recommended to follow this methodology to minimise recalculations: 1st step: Calculate without computation zone. 2nd step: Draw a computation zone and calculate. 3rd step: Decrease the calculation radius and calculate. 4.3 Path Loss Calculations 4.3.1 Ground Altitude Determination Atoll determines reception and transmission site altitude from Digital Terrain Model map. The method used to evaluate site altitude is based on a bilinear interpolation. It is described below. Let us suppose a site S located inside a bin. Atoll knows the altitudes of four bin vertices, S’1, S’’1, S’2 and S’’2, from the DTM file (Centre of each DTM pixel). Figure 4.3: Ground Altitude Determination - 1 1st step: Atoll draws a vertical line through S. This line respectively intersects (S’1,S’’1) and (S’2, S’’2) lines at S1 and S2. Figure 4.4: Ground Altitude Determination - 2 2nd step: Atoll determines the S1 and S2 altitudes using a linear interpolation method. © Forsk 2009 AT281_TRG_E1 79 Technical Reference Guide Figure 4.5: Ground Altitude Determination - 3 3rd step: Atoll performs a second linear interpolation to evaluate the S altitude. Figure 4.6: Ground Altitude Determination - 4 4.3.2 Clutter Determination Some propagation models need clutter class and clutter height as information at receiver or along a transmitter-receiver profile. 4.3.2.1 Clutter Class Atoll uses clutter classes file to determine the clutter class. 4.3.2.2 Clutter Height To evaluate the clutter height, Atoll uses clutter heights file if available in the .atl document; clutter height of a site is the height of the nearest point in the file. Example: Let us suppose a site S. In the clutter heights file, Atoll reads clutter heights of four points around the site, S’1, S’’1, S’2 and S’’2. Here, the nearest point to S is S”2; therefore Atoll takes the S”2 clutter height as clutter height of S. Figure 4.7: Clutter Height If you do not have any clutter height file, Atoll takes clutter height information in clutter classes file. In this case, clutter height is an average height related to a clutter class. 4.3.3 Geographic Profile Extraction Geographic profile extraction is needed in order to calculate diffraction losses. Profiles can be based on DTM only or on DTM and clutter both. In fact, it depends on the selected propagation model. 4.3.3.1 Extraction Methods 4.3.3.1.1 Radial Extraction Atoll draws radials from the site (where transmitter is located) to each calculation bin located along the transmitter calculation area border. In other words, Atoll determines a geographic profile between site and each bin centre. 80 AT281_TRG_E1 © Forsk 2009 Chapter 4: Calculations Figure 4.8: Radial calculation method Transmitter Radial: Atoll will extract a geographic profile for each radial Centre of a bin located on the calculation border Receiver: it may be anywhere in point analysis or at the centre of each calculation bin in coverage studies Figure 4.9: Site-bin centre profile The receiver may be located either anywhere within a calculation bin (Point prediction) or at the centre of a calculation bin (Coverage study). Therefore, according to the receiver position, Atoll chooses the nearest profile and uses it (receiver is considered as located on the profile) to perform prediction study at the receiver. 4.3.3.1.2 Systematic Extraction In this case, Atoll systematically extracts a geographic profile between the site (where transmitter resides) and the receiver. © Forsk 2009 AT281_TRG_E1 81 Technical Reference Guide Figure 4.10: Radial calculation method Transmitter Geographic profiles Receiver: it may be anywhere in point analysis or at the centre of each calculation bin in coverage studies 4.3.3.2 Profile Resolution: Multi-Resolution Management Geographic profile resolution depends on resolution of geographic data used by the propagation model (DTM and/or clutter). 1. 1st case: If the chosen propagation model considers both DTM and clutter heights along the profile, the profile resolution will be the highest of the two. Example 1: Standard Propagation Model is used to perform predictions. A DTM map with a 40 m resolution and a clutter heights map with a 20 m resolution are available. Both DTM and clutter maps are considered when using the Standard propagation model. Therefore, here, the profile resolution will be 20 m. It means that Atoll will extract geographic information, ground altitude and clutter height, every 20 m. To get ground altitude every 20m, Atoll uses the bilinear interpolation method described in "Ground Altitude Determination" on page 79. Clutter heights are read from the clutter heights map. Atoll takes the clutter height of the nearest point every 20m (see Path loss calculations: Clutter determination). Example 2: Standard Propagation Model is used to perform predictions. A DTM map with a 40 m resolution and a clutter classes map with a 20 m resolution are available. No clutter height file has been imported in .atl document. Both DTM and clutter maps are considered when using the Standard propagation model. Therefore, here, the profile resolution will be 20 m. It means that Atoll will extract geographic information, ground altitude and clutter height, every 20 m. To get ground altitude every 20 m, Atoll uses the bilinear interpolation method described in "Ground Altitude Determination" on page 79. Atoll uses the clutter classes map to determine clutter height. Every 20 m, it determines clutter class and takes associated average height. 2. 2nd case: If the chosen propagation model takes into account only DTM map along the profile, profile resolution will be the highest resolution among the DTM files. Example: Cost-Hata is used to perform predictions. Both DTM maps with 40 m and 25 m resolutions and a clutter map with a 20 m resolution are available. 82 AT281_TRG_E1 © Forsk 2009 Chapter 4: Calculations Explorer window DTM • • DTM 1 (25m) DTM 2 (40m) Clutter • Clutter (20m) Work space Only DTM maps are considered along the whole profile when using Cost-Hata model. Therefore, here, the profile resolution will be 25 m. It means that Atoll will extract geographic information, only the ground altitude, every 25 m. DTM 1 is on the top of DTM 2. Thus, Atoll will consider ground elevation read from DTM 1 in the definition area of DTM 1 and DTM 2 elsewhere. To get ground altitude every 25 m, Atoll uses the bilinear interpolation method described in "Ground Altitude Determination" on page 79. Notes: © Forsk 2009 • The selected profile resolution does not depend on the geographic layer order. In the last example, whatever the DTM file order you choose, profile resolution will always be 25m. On the other hand, the geographic layer order will influence the usage of data to establish the profile. • The calculation bin of path loss matrices defined by the grid resolution is independent of geographic file resolution. AT281_TRG_E1 83 84 AT281_TRG_E1 Macro cell Rooftop Fixed Cell size Receiver location Receiver Use - Profile extraction mode Mobile Rooftop Macro cell - - d > 10 km 1 < d < 1000 km Low frequencies Land and maritime Broadcast mobile, broadcast - - Diffraction calculation method Profile based on Free space loss + Corrections Free space loss Corrected standard loss Physical phenomena - 30-3000 MHz 100-400 MHz Frequency band ITU 1546 ITU 370-7 (Vienna 93) Fixed receivers WLL Fixed Street Macro cell Radial DTM Deygout (3 obstacles) Deygout corrected (3 obstacles) Free space loss Diffraction loss 30-10000 MHz ITU 526-5 150-3500 MHz Standard Propagation Model Mobile and Fixed 1 < d < 20 km GSM, UMTS, CDMA2000, WiMAX, LTE Fixed receivers WLL, Microwave links, WiMAX 1 < d < 100 km GSM, CDMA2000, LTE Mobile Street Mobile Street Macro cell Mini cell Radial DTM Deygout (1 obstacle) L(d, f, HRx) (per environment) Diffraction loss 150-2000 MHz COST-Hata Okumura-Hata Urban and suburban GSM 900, GSM 1800, areas UMTS, CDMA2000, 100 m < d < 8 km LTE Fixed WiMAX Fixed Street Macro cell Mini cell Macro cell Mini cell Macro cell Mini cell Street Rooftop Radial DTM Deygout (1 obstacle) L(d, f, HTx, HRx) (per environment) Diffraction loss 1900-6000 MHz Erceg-Greenstein (SUI) Radial DTM Deygout (1 obstacle) L(d, f, HRx) (per environment) Diffraction loss 300-1500 MHz ITU 529-3 Radial Systematic DTM Clutter Deygout (3 obstacles) Epstein-Peterson (3 obstacles) Deygout corrected (3 obstacles) Millington (1 obstacle) Fixed Street Rooftop - Radial DTM Clutter Deygout (3 obstacles) Free space loss L(d, HTxeff, HRxeff, Diff loss, clutter) Diffraction loss 30-10000 MHz WLL 4.4 Propagation model Technical Reference Guide Propagation Models Propagation models available in Atoll are listed in the table below along with their main characteristics. © Forsk 2009 Chapter 4: Calculations Notes: • In formulas described above, L model is stated in dB. • Under Physical phenomena, L(...) expressions refer to formulas customisable in Atoll. • SUI stands for Stanford University Interim models. 4.4.1 Okumura-Hata and Cost-Hata Propagation Models 4.4.1.1 Hata Path Loss Formula Hata formula empirically describes the path loss as a function of frequency, receiver-transmitter distance and antenna heights for an urban environment. This formula is valid for flat, urban environments and 1.5 metre mobile antenna height. Path loss (Lu) is calculated (in dB) as follows: Lu = A 1 + A 2 log f + A 3 log h Tx + B 1 + B 2 log h Tx + B 3 h Tx log d f is the frequency (MHz). hTx is the transmitter antenna height above ground (m) (Hb notation is also used in Atoll). d is the distance between the transmitter and the receiver (km). The parameters A1, A2, A3, B1, B2, and B3 can be user-defined. Default values are proposed in the table below: 4.4.1.2 Parameters Okumura-Hata f 1500 MHz Cost-Hata f > 1500 MHz A1 69.55 49.30 A2 26.16 33.90 A3 -13.82 -13.82 B1 44.90 44.90 B2 -6.55 -6.55 B3 0 0 Corrections to the Hata Path Loss Formula As described above, the Hata formula is valid for urban environment and a receiver antenna height of 1.5m. For other environments and mobile antenna heights, corrective formulas must be applied. • For urban areas: L model1 = Lu – a h Rx • f 2 For suburban areas: L model1 = Lu – a h Rx – 2 log ------ – 5.4 28 • For quasi-open rural areas: L model1 = Lu – a h Rx – 4.78 log f + 18.33 log f – 35.94 • For open rural areas: L model1 = Lu – a h Rx – 4.78 log f + 18.33 log f – 40.94 2 2 a(hRx) is a correction for a receiver antenna height different from 1.5m. Environment a(hRx) Rural/Small city 1.1 log f – 0.7 h Rx – 1.56 log f – 0.8 Large city 3.2 log 11.75h Rx – 4.97 2 Note: • 4.4.1.3 When receiver antenna height equals 1.5m, a(hRx) is close to 0 dB regardless of frequency. Calculations in Atoll Hata models take into account topo map (DTM) between transmitter and receiver and morpho map (clutter) at the receiver. 1st step: For each calculation bin, Atoll determines the clutter bin on which the receiver is located. This clutter bin corresponds to a clutter class. Then, it uses the Hata formula assigned to this clutter class to evaluate L model1 . 2nd step: This step depends on whether the ‘Add diffraction loss’ option is checked. • If the ‘Add diffraction loss’ option is unchecked, Atoll stops calculations. L model = L model1 © Forsk 2009 AT281_TRG_E1 85 Technical Reference Guide • If the ‘Add diffraction loss’ option is selected, Atoll proceeds as follows: a. It extracts a geographic profile between the transmitter and the receiver based on the radial calculation mode. b. It determines the largest obstacle along the profile in accordance with the Deygout method and evaluates losses due to diffraction L model2 . L model = L model1 + L model2 Note: • Like for any Hata-based model, L model is, by default, limited to the computed free space loss value. It is also possible to avoid this option (option in the related scrolling menu of Configuration tab). 4.4.2 ITU 529-3 Propagation Model 4.4.2.1 ITU 529-3 Path Loss Formula The ITU 529.3 model is a Hata-based model. For this reason, its formula empirically describes the path loss as a function of frequency, receiver-transmitter distance and antenna heights for a urban environment. This formula is valid for flat, urban environments and 1.5 metre mobile antenna height. The standard ITU 529-3 formula, for a receiver located on a urban environment, is given by: E = 69.82 – 6.16 log f + 13.82 log h Tx – 44.9 – 6.55 log h Tx log d b where: E is the field strength for 1 kW ERP f is the frequency (MHz). h Tx is the transmitter antenna height above ground (m) (Hb notation is also used in Atoll) h Rx is the receiver antenna height above ground (m) d is the distance between the transmitter and the receiver (km) b is the distance correction The domain of validity of such is formula is: • • • • Frequency range: 300-1500 MHz Base Station height: 30-200 m Mobile height: 1-10 m Distance range: 1-100 km Since Atoll needs the path loss (Lu) formula, a conversion has to be made. One can find the following conversion formula: Lu = 139.37 + 20 log f – E which gives the following path loss formula for the ITU 529-3 model: Lu = 69.55 + 26.16 log f – 13.82 log h Tx + 44.9 – 6.55 log h Tx log d b 4.4.2.2 Corrections to the ITU 529-3 Path Loss Formula 4.4.2.2.1 Environment Correction As described above, the Hata formula is valid for urban environment. For other environments and mobile antenna heights, corrective formulas must be applied. L model1 = Lu – a h Rx for large city and urban environments f 2 L model1 = Lu – a h Rx – 2 log ------ – 5.4 for suburban area 28 2 L model1 = Lu – a h Rx – 4.78 log f + 18.33 log f – 40.94 for rural area 4.4.2.2.2 Area Size Correction In the formulas above, a h Rx is the environment correction and is defined according to the area size 86 Environment a(Hr) Rural/Small city 1.1 log f – 0.7 h Rx – 1.56 log f – 0.8 Large city 3.2 log 11.75h Rx – 4.97 2 AT281_TRG_E1 © Forsk 2009 Chapter 4: Calculations 4.4.2.2.3 Distance Correction The distance correction refers to the term b above. Distance b d<20 km 1 –4 –3 d b = 1 + 0.14 + 1.87 10 f + 1.07 10 h' Tx log ------ 20 d>20 km 4.4.2.3 0.8 h Tx where h' Tx = -------------------------------------------–6 2 1 + 7 10 h Tx Calculations in Atoll Hata-based models take into account topo map (DTM) between transmitter and receiver and morpho map (clutter) at the receiver. 1st step: For each calculation bin, Atoll determines the clutter bin on which the receiver is located. This clutter bin corresponds to a clutter class. Then, it uses the ITU 529-3 formula assigned to this clutter class to evaluate L model1 . 2nd step: This step depends on whether the ‘Add diffraction loss’ option is checked. • If the ‘Add diffraction loss’ option is unchecked, Atoll stops calculations. L model = L model1 • If the ‘Add diffraction loss’ option is selected, Atoll proceeds as follows: a. It extracts a geographic profile between the transmitter and the receiver based on the radial calculation mode. b. It determines the largest obstacle along the profile in accordance with the Deygout method and evaluates losses due to diffraction L model2 . L model = L model1 + L model2 Note: • Like for any Hata-based model, L model is, by default, limited to the computed free space loss value. It is also possible to avoid this option (option in the related scrolling menu of Configuration tab) 4.4.3 Standard Propagation Model (SPM) 4.4.3.1 SPM Path Loss Formula SPM is based on the following formula: L model = K 1 + K 2 log d + K 3 log H Txeff + K 4 DiffractionLoss + K 5 log d log H Txeff + K 6 H Rxeff + K 7 log H Rxeff + K clutter f clutter with, K1: constant offset (dB). K2: multiplying factor for log(d). d: distance between the receiver and the transmitter (m). K3: multiplying factor for log(HTxeff). HTxeff: effective height of the transmitter antenna (m). K4: multiplying factor for diffraction calculation. K4 has to be a positive number. Diffraction loss: loss due to diffraction over an obstructed path (dB). K5: multiplying factor for log d log H Txeff K6: multiplying factor for H Rxeff . K7: multiplying factor for log H Rxeff . H Rxeff : effective mobile antenna height (m). Kclutter: multiplying factor for f(clutter). f(clutter): average of weighted losses due to clutter. © Forsk 2009 AT281_TRG_E1 87 Technical Reference Guide 4.4.3.2 Calculations in Atoll 4.4.3.2.1 Visibility and Distance Between Transmitter and Receiver For each calculation bin, Atoll determines: • The distance between the transmitter and the receiver. If the distance Tx-Rx is less than the maximum user-defined distance (break distance), the receiver is considered to be near the transmitter. Atoll will use the set of values marked “Near transmitter”. If the distance Tx-Rx is greater than the maximum distance, receiver is considered far from transmitter. Atoll will use the set of values “Far from transmitter”. • Whether the receiver is in the transmitter line of sight or not. If the receiver is in the transmitter line of sight, Atoll will take into account the set of values (K1,K2)LOS. The LOS is defined by no obstruction along the direct ray between the transmitter and the receiver. If the receiver is not in the transmitter line of sight, Atoll will use the set of values (K1,K2)NLOS. 4.4.3.2.2 Effective Transmitter Antenna Height Effective transmitter antenna height (HTxeff) may be calculated with six different methods. Height Above Ground The transmitter antenna height is above the ground (HTx in m). HTxeff = HTx Height Above Average Profile The transmitter antenna height is determined relative to an average ground height calculated along the profile between a transmitter and a receiver. The profile length depends on distance min and distance max values and is limited by the transmitter and receiver locations. Distance min and Distance max are minimum and maximum distances from the transmitter respectively. H Txeff = H Tx + H 0Tx – H 0 where, H 0Tx is the ground height (ground elevation) above sea level at transmitter (m). H 0 is the average ground height above sea level along the profile (m). Note: • If the profile is not located between the transmitter and the receiver, HTxeff equals HTx only. Slope at Receiver Between 0 and Minimum Distance The transmitter antenna height is calculated using the ground slope at receiver. H Txeff = H Tx + H 0Tx – H 0Rx + K d where, H 0Rx is the ground height (ground elevation) above sea level at receiver (m). K is the ground slope calculated over a user-defined distance (Distance min). In this case, Distance min is a distance from receiver. Notes: • If H Txeff 20m then, Atoll uses 20m in calculations. • If H Txeff 200m then, Atoll takes 200m. Spot Ht If H 0Tx H 0Rx then, H Txeff = H Tx + H 0Tx – H 0Rx If H 0Tx H 0Rx then, H Txeff = H Tx 88 AT281_TRG_E1 © Forsk 2009 Chapter 4: Calculations Absolute Spot Ht H Txeff = H Tx + H 0Tx – H 0Rx Note: • Distance min and distance max are set to 3000 and 15000 m according to ITU recommendations (low frequency broadcast f < 500 Mhz) and to 0 and 15000 m according Okumura recommendations (high frequency mobile telephony). These values are only used in the two last methods and have different meanings according to the method. Enhanced Slope at Receiver Atoll offers a new method called “Enhanced slope at receiver” to evaluate the effective transmitter antenna height. Figure 4.11: Enhanced Slope at Receiver Let x-axis and y-axis respectively represent positions and heights. We assume that x-axis is oriented from the transmitter (origin) towards the receiver. This calculation is achieved in several steps: 1st step: Atoll determines line of sight between transmitter and receiver. The LOS line equation is: H 0Tx + H Tx – H 0Rx + H Rx Los i = H 0Tx + H Tx – -------------------------------------------------------------------------------- Res i d where, H Rx is the receiver antenna height above the ground (m). i is the point index. Res is the profile resolution (distance between two points). 2nd step: Atoll extracts the transmitter-receiver terrain profile. 3rd step: Hills and mountains are already taken into account in diffraction calculations. Therefore, in order for them not to unfavourably influence the regression line calculation, Atoll filters the terrain profile. Atoll calculates two filtered terrain profiles; one established from the transmitter and another from the receiver. It determines filtered height of every profile point. Profile points are evenly spaced on the basis of profile resolution. To determine filtered terrain height at a point, Atoll evaluates ground slope between two points and compares it with a threshold set to 0.05; where three cases are possible. Some notations defined hereafter are used in next part. H filt is the filtered height. H orig is the original height. Original terrain height is determined from extracted ground profile. - Filter starting from transmitter Let us assume that H filt – Tx Tx = H orig Tx For each point, we have three different cases: H orig i – H orig i – 1 1st case: If H orig i H orig i – 1 and ------------------------------------------------------- 0.05 , Res Then, H filt – Tx i = H filt – Tx i – 1 + H orig i – H orig i – 1 © Forsk 2009 AT281_TRG_E1 89 Technical Reference Guide H orig i – H orig i – 1 2nd case: If H orig i H orig i – 1 and ------------------------------------------------------- 0.05 Res Then, H filt – Tx i = H filt – Tx i – 1 3rd case: If H orig i H orig i – 1 Then, H filt – Tx i = H filt – Tx i – 1 If H filt i H orig i additionally Then, H filt – Tx i = H orig i - Filter starting from receiver Let us assume that H filt Rx = H orig Rx For each point, we have three different cases: H orig i – H orig i + 1 1st case: If H orig i H orig i + 1 and ------------------------------------------------------- 0.05 , Res Then, H filt – Rx i = H filt – Rx i + 1 + H orig i – H orig i + 1 H orig i – H orig i + 1 2nd case: If H orig i H orig i + 1 and ------------------------------------------------------- 0.05 Res Then, H filt – Rx i = H filt – Rx i + 1 3rd case: If H orig i H orig i + 1 Then, H filt – Rx i = H filt – Rx i + 1 If H filt i H orig i additionally Then, H filt – Rx i = H orig i Then, for every point of profile, Atoll compares the two filtered heights and chooses the higher one. H filt i = max H filt – Tx i H filt – Rx i 4th step: Atoll determines the influence area, R. It corresponds to the distance from receiver at which the original terrain profile plus 30 metres intersects the LOS line for the first time (when beginning from transmitter). The influence area must satisfy additional conditions: • R 3000m , • • R 0.01 d , R must contain at least three bins. Notes: • When several influence areas are possible, Atoll chooses the highest one. • If d < 3000m, R = d. 5th step: Atoll performs a linear regression on the filtered profile within R in order to determine a regression line. The regression line equation is: y = ax + b d i – dm Hfilt i – Hm i - and b = H m – ad m a = -----------------------------------------------------------------------2 d i – dm i where, 1 H m = --n Hfilt i i i is the point index. Only points within R are taken into account. R d m = d – ---2 d(i) is the distance between i and the transmitter (m). Then, Atoll extends the regression line to the transmitter location. Therefore, its equation is: 90 AT281_TRG_E1 © Forsk 2009 Chapter 4: Calculations regr i = a i Res + b 6th step: Then, Atoll calculates effective transmitter antenna height, H Txeff (m). H 0Tx + H Tx – b H Txeff = -------------------------------------2 1+a If HTxeff is less than 20m, Atoll recalculates it with a new influence area, which begins at transmitter. Notes: • In case H Txeff 1000m , 1000m will be used in calculations. • If H Txeff is still less than 20m, an additional correction is taken into account (7th step). 7th step: If H Txeff is still less than 20m (even negative), Atoll evaluates path loss using H Txeff = 20m and applies a correction factor. Therefore, if H Txeff 20m , L model = L model H Txeff = 20m d f + K lowant 20 1 – H Txeff – 20 d where, K lowant = --------- – 0.3 H Txeff – 20 – -----------------------------------------------------------------------------5 d d 9.63 + -----------10 - 6.93 + ------------- 1000 1000 4.4.3.2.3 Effective Receiver Antenna Height H Rxeff = H Rx + H 0Rx – H 0Tx where, H Rx is the receiver antenna height above the ground (m). H 0Rx is the ground height (ground elevation) above sea level at the receiver (m). H 0Tx is the ground height (ground elevation) above sea level at the transmitter (m). Note: • The calculation of effective antenna heights ( H Rxeff and H Txeff ) is based on extracted DTM profiles. They are not properly performed if you have not imported heights (DTM file) beforehand. 4.4.3.2.4 Correction for Hilly Regions in Case of LOS An optional corrective term enables Atoll to correct path loss for hilly regions when the transmitter and the receiver are in Line-of-sight. Therefore, if the receiver is in the transmitter line of sight and the Hilly terrain correction option is active, we have: L model = K 1 LOS + K 2 LOS log d + K 3 log H Txeff + K 5 log H Txeff log d + K 6 H Rx + K clutter f clutter + K hill LOS When the transmitter and the receiver are not in line of sight, the path loss formula is: L model =K 1 NLOS + K 2 NLOS log d + K 3 log H Txeff + K 4 Diffraction + K 5 log H Txeff log d + K 6 H Rx + K clutter f clutter K hill LOS is determined in three steps. Influence area, R, and regression line are supposed available. 1st step: For every profile point within influence area, Atoll calculates height deviation between the original terrain profile and regression line. Then, it sorts points according to the deviation and draws two lines (parallel to the regression line), one which is exceeded by 10% of the profile points and the other one by 90%. 2nd step: Atoll evaluates the terrain roughness, h; it is the distance between the two lines. 3rd step: Atoll calculates K hill LOS . We have K hill LOS = K h + K hf If 0 h 20m , K h = 0 2 Else K h = 7.73 log h – 15.29 log h + 6.746 If 0 h 10m , K hf = – 2 0.1924 H 0Rx + H Rx – regr i Rx H 0Rx + H Rx – regr i Rx 2 Else K hf = – 2 – 1.616 log h + 14.75 log h – 11.21 ------------------------------------------------------------h © Forsk 2009 AT281_TRG_E1 91 Technical Reference Guide iRx is the point index at receiver. 4.4.3.2.5 Diffraction Four methods are available to calculate diffraction loss over the transmitter-receiver profile. They are detailed in the Appendices. Along the transmitter-receiver profile, you may consider: • • 4.4.3.2.6 Either ground altitude and clutter height (Consider heights in diffraction option), In this case, Atoll uses clutter height information from clutter heights file if available in the .atl document. Otherwise, it considers average clutter height specified for each clutter class in the clutter classes file description. Or only ground altitude. Losses due to Clutter n Atoll calculates f(clutter) over a maximum distance from receiver: f clutter = Li wi i=1 where, L: loss due to clutter defined in the Clutter tab by the user (in dB). w: weight determined through the weighting function. n: number of points taken into account over the profile. Points are evenly spaced depending on the profile resolution. Four weighting functions are available: • 1 Uniform weighting function: w i = --n • di Triangular weighting function: w i = ------------n dj j=1 • d i = D – d' i , where d’i is the distance between the receiver and the ith point and D is the maximum distance defined. • d log ----i + 1 D Logarithmic weighting function: w i = ------------------------------------n d log ----j + 1 D j=1 d ----i D • e –1 Exponential weighting function: w i = -------------------------n e dj ---D –1 j=1 The chart below shows the weight variation with the distance for each weighting function. Figure 4.12: Losses due to Clutter 92 AT281_TRG_E1 © Forsk 2009 Chapter 4: Calculations 4.4.3.2.7 Recommendations Beware that the clutter influence may be taken into account in two terms, Diffraction loss and f(clutter) at the same time. To avoid this, we advise: 1. Not to consider clutter heights to evaluate diffraction loss over the transmitter-receiver profile if you specify losses per clutter class. This approach is recommended if the clutter height information is statistical (clutter roughly defined, no altitude). Or 2. Not to define any loss per clutter class if you take clutter heights into account in the diffraction loss. In this case, f(clutter)=0. Losses due to clutter are only taken into account in the computed Diffraction loss term. This approach is recommended if the clutter height information is either semi-deterministic (clutter roughly defined, altitude defined with an average height per clutter class) or deterministic (clutter sharply defined, altitude defined with an average height per clutter class or - even better - via a clutter height file). In case of semi-deterministic clutter information, specify receiver clearance (m) per clutter class. Both ground altitude and clutter height are considered along the whole transmitter-receiver profile except over a specific distance around the receiver (clearance), where Atoll proceeds as if there was only the DTM map. The clearance information is used to model streets. Figure 4.13: Tx-Rx profile In the above figure, the ground altitude and clutter height (in this case, average height specified for each clutter class in the clutter classes map description) are taken into account along the profile. Clearance definition is not necessary in case of deterministic clutter height information. Clutter height information is accurate enough to be used directly without additional information such as clearance. Two cases can be considered: 1. If the receiver is in the street (clutter height lower than receiver height), Atoll calculates the path loss by considering potentially some diffraction loss at reception. 2. If the receiver is supposed to be inside a building (clutter height higher than receiver height), Atoll does not consider any difraction (and clearance) from the building but takes into account the indoor loss as an additional penetration loss. Notes: • To consider indoor losses in building only when using a deterministic clutter map (clutter height map), the 'Indoor Coverage' box must not be checked in predictions unless this loss will be counted twice inside buildings (on the entire reception clutter class and not only inside the building). • Like for any Hata-based model, L model is, by default, limited to the computed free space loss value. It is also possible to avoid this option (option in the related scrolling menu of Configuration tab) • 4.4.3.3 Even with no clearance, the clutter height (extracted either from clutter class or clutter height folders) is never considered at the last profile point. Automatic SPM Calibration The goal of this tool is to calibrate parameters and methods of the SPM formula in a simple and reproducible way. Calibration is based on imported CW measurement data. It is the process of limiting the difference between predicted and measured values. For a complete description of the calibration procedure (including the very important prerequisite filtering work on the CW measurement points), please refer to the User Manual and the SPM Calibration Guide. The following SPM formula parameters can be estimated: • © Forsk 2009 K1, K2, K3, K4, K5, K6 and K7 AT281_TRG_E1 93 Technical Reference Guide • • • Losses per clutter class (Kclutter must be user-defined) Effective antenna height method Diffraction method Automatic model calibration provides a mathematical solution. The relevance of this mathematical solution with a physical and realistic solution must be determined before committing these results. You must keep in mind that the model calibration and its result (standard deviation and root mean square) strongly depend on the CW measurement samples you use. A calibrated model must restore the behaviour of CW measurements depending on their configuration on a large scale, and not just totally coincide with a few number of CW measurements. The calibrated model has to give correct results for every new CW measurement point in the same geographical zone, without having been calibrated on these new CW measurements. 4.4.3.3.1 General Algorithm Propagation model calibration is a special case of the more general Least-Square problems, i.e. given a real m x n matrix A, and a real m-vector b, find a real n-vector x0 that minimises the Euclidean length of Ax - b. Here, m is the number of measurement points, n is the number of parameters to calibrate, A is the values of parameter associated variables (log(d), log(heff), etc.) at each measurement point, and b is the vector of measurement values. The vector x0 is the set of parameters found at the end of the calibration. The theoretical mathematical solution of this problem was found by Gauss (around 1830). Further enhancements to the original method were proposed in the 60's in order to solve the numerical instability problem. In 1974, Lawson & Hanson [2] proposed a theoretical solution of the least-square problem with general linear inequality constraints on the vector x0. Atoll implementation is based on this method, which is explained in detail in [1]. References: [1] Björck A. “Numerical Methods for Least Square Problems”, SIAM, 1996. [2] Lawson C.L., Hanson R.J. “Solving Least Squares Problems”, SIAM, 1974. 4.4.3.3.2 Sample Values for SPM Path Loss Formula Parameters The following tables list some sample orders of magnitudes for the different parameters composing the Standard Propagation Model formula. Minimum Typical Maximum K1 Variable Variable Variable K2 20 44.9 70 K3 -20 5.83 20 K4 0 0.5 0.8 K5 -10 -6.55 0 K6 -1 0 0 K7 -10 0 0 K1 depends on the frequency and the technology. Here are some sample values: Project type Frequency (MHz) K1 GSM 900 935 12.5 GSM 1800 1805 22 GSM 1900 1930 23 UMTS 2110 23.8 1xRTT 1900 23 2300 24.7 2500 25.4 2700 26.1 3300 27.8 3500 28.3 WiMAX The above K1 values for WiMAX are extrapolated estimates for different frequency ranges. It is highly recommended to calibrate the SPM using measurement data collected on the field for WiMAX networks before using the SPM for predic- 94 AT281_TRG_E1 © Forsk 2009 Chapter 4: Calculations tions. All K paramaters can be defined by the automatic calibration wizard. Since Kclutter is a constant, its value is strongly dependant on the values given to the losses per clutter classes. From experienced users, the typical losses (in dB) per clutter class are: Dense urban From 4 to 5 Woodland From 2 to 3 Urban 0 Suburban From -5 to -3 Industrial From -5 to -3 Open in urban From -6 to -4 Open From -12 to -10 Water From -14 to -12 These values have to be entered only when considering statistical clutter class maps only. Note: • 4.4.3.4 The Standard Propagation Model is deduced from the Hata formulae, valid in the case of an urban environment. The above values are consistent since they are normalized with respect to the urban clutter class (0 dB for urban clutter class). Positive values correspond to denser clutter classes and negative values to less dense clutter classes. Unmasked Path Loss Calculation You can use the SPM to calculate unmasked path losses. Unmasked path losses are calculated by not taking into account the transmitter antenna patterns, i.e., the attenuation due to the transmitter antenna pattern is not included. Such path losses are useful when using path loss matrices calculated by Atoll with automatic optimisation tools. The instance of the SPM available by default, under the Propagation Models folder in the Modules tab, has the following characteristics: • • Signature: Type: {D5701837-B081-11D4-931D-00C04FA05664} Atoll.StdPropagModel.1 You can access these parameters in the Propagation Models table by double-clicking the Propagation Models folder in the Modules tab. To make the SPM calculate path losses excluding the antenna pattern attenuation, you have to change the type of the SPM to: • Type: Atoll.StdPropagModelUnmasked.1 However, changing the type only does not invalidate the already calculated path loss matrices, because the signature of the propagation model is still the same. If you want Atoll to recognize that the SPM has changed, and to invalidate the path loss matrices calculated with this model, you have to change the signature of the model as well. The default signature for the SPM that calculates unmasked path loss matrices is: • Signature: {EEE060E5-255C-4C1F-B36C-A80D3D972583} The above signature is a default signature. Atoll automatically creates different signatures for different instances of the same propagation model. Therefore, it is possible to create different instances of the SPM, with different parameter settings, and create unmasked versions of these instances. You can change the signature and type of the original instance of the SPM, but it is recommended to make a copy of the SPM in order not to lose the original SPM parameters. So, you will be able to keep different versions of the SPM, those that calculate path losses with antenna pattern attenuation, and others that calculate path losses without it. The usual process flow of an ACP working on an Atoll document through the API would be to: 1. Backup the storage directory of path loss matrices. 2. Set a different storage directory for calculating and storing unmasked path loss matrices. 3. Select the SPM used, backup it’s signature, and change its signature and type as shown above. 4. Perform optimisation using the path loss matrices calculated by the unmasked version of the SPM. 5. Restore the type and the signature of the SPM. 6. Reset the path loss storage directory to the original one. Notes: © Forsk 2009 • It is not possible to calibrate the unmasked version of the SPM using measurement data. • You can also use Atoll.ini options, AngleCalculation = 2000 and AngleCalculation = 3000, for calculating unmasked path losses and angles of incidence, respectively. These options are only available for the propagation models available with Atoll by default. Please refer to the Administrator Manual for details. AT281_TRG_E1 95 Technical Reference Guide • Using the SPM, you can also calculate the angles of incidence by creating a new instance of the SPM with the following characteristics: Type: Atoll.StdPropagModelIncidence.1 Signature: {659F0B9E-2810-4e59-9F0D-DA9E78E1E64B} Important: • The "masked" version of the algorithm has not been changed. It still takes into account Atoll.ini options. However, the "unmasked" version does not take Atoll.ini options into account. • It’s highly recommended to use one method (Atoll.ini options) or the other one (new identifier & signature) but not to combine both. 4.4.4 WLL Propagation Model 4.4.4.1 WLL Path Loss Formula L model = L FS + F Diff L Diff Where L FS is the free space loss calculated using the formula entered in the model properties, L Diff is the diffraction loss calculated using the 3-obstacle Deygout method, and F Diff is the diffraction multiplying factor defined in the model properties. 4.4.4.2 Calculations in Atoll 4.4.4.2.1 Free Space Loss Please refer to the Appendices for further details about free space loss calculation. 4.4.4.2.2 Diffraction Atoll calculates diffraction loss along the transmitter-receiver profile built from DTM and clutter maps. Therefore, losses due to clutter are taken into account in diffraction losses. Atoll takes clutter height information from the clutter heights file if available in the .atl document. Otherwise, it considers average clutter height specified for each clutter class in the clutter classes file description. The Deygout construction (considering 3 obstacles) is used. This method is detailed in the Appendices. The final diffraction losses are determined by multiplying the diffraction losses calculated using the Deygout method by the Diffraction multiplying factor defined in the model properties. Receiver Clearance Define receiver clearance (m) per clutter class when clutter height information is either statistical or semi-deterministic. Both ground altitude and clutter height are considered along the whole profile except over a specific distance around the receiver (clearance), where Atoll proceeds as if there was only the DTM map (see SPM part). Atoll uses the clearance information to model streets. If the clutter is deterministic, do not define any receiver clearance (m) per clutter class. In this case, clutter height information is accurate enough to be used directly without additional information such as clearance (Atoll can locate streets). Receiver Height Entering receiver height per clutter class enables Atoll to consider the fact that receivers are fixed and located on the roofs. Visibility If the option ‘Line of sight only’ is not selected, Atoll computes Lmodel on each calculation bin using the formula defined above. When selecting the option ‘Line of sight only’, Atoll checks for each calculation bin if the Diffraction loss (as defined in the Diffraction loss: Deygout part) calculated along profile equals 0. • • In this case, receiver is considered in ‘line of sight’ and Atoll computes Lmodel on each calculation bin using the formula defined above. Otherwise, Atoll considers that Lmodel tends to infinity. 4.4.5 ITU-R P.526-5 Propagation Model 4.4.5.1 ITU 526-5 Path Loss Formula L model = L FS + L Diff 96 AT281_TRG_E1 © Forsk 2009 Chapter 4: Calculations Where L FS is the free space loss calculated using the formula entered in the model properties and L Diff is the diffraction loss calculated using the 3-obstacle Deygout method. 4.4.5.2 Calculations in Atoll 4.4.5.2.1 Free Space Loss Please refer to the Appendices for further details about free space loss calculation. 4.4.5.2.2 Diffraction Atoll calculates diffraction loss along the transmitter-receiver profile is built from the DTM map. The Deygout construction (considering 3 obstacles), with or without correction, is used. These methods are detailed in the Appendices. 4.4.6 ITU-R P.370-7 Propagation Model 4.4.6.1 ITU 370-7 Path Loss Formula If d<1 km, L model = L FS If d>1000 km, L model = 1000 If 1<d<1000 km, L model = max L FS CorrectedS tan dardLoss d is the distance between the transmitter and the receiver (km). 4.4.6.2 Calculations in Atoll 4.4.6.2.1 Free Space Loss Please refer to the Appendices for further details about free space loss calculation. 4.4.6.2.2 Corrected Standard Loss This formula is given for a 60 dBm (1kW) transmitter power. CorrectedS tan dardLoss = 60 – C n – A H Rxeff – A cl – 108.75 + 31.54 – 20 log f where, Cn is the field strength received in dBV/m, AH Rxeff is a correction factor for effective receiver antenna height (dB), Acl is the correction for terrain clearance angle (dB), f is the frequency in MHz. Cn Calculation The Cn value is determined from charts Cn=f(d, HTxeff). In the following part, let us assume that Cn=En(d,HTxeff) (where En(d,HTxeff) is the field received in dBV/m) is read from charts for a distance, d (in km), and an effective transmitter antenna height, HTxeff (in m). First of all, Atoll evaluates the effective transmitter antenna height, H Txeff , as follows: If 0 d 3km , H Txeff = H 0Tx + H Tx – H 0Rx If 3 d 15km , H Txeff = H 0Tx + H Tx – H 0 3 ;d If 15 d , H Txeff = H 0Tx + H Tx – H 0 3 ;15 where, H Tx is the transmitter antenna height above the ground (m). H 0Tx is the ground height (ground elevation) above sea level at the transmitter (m). H 0 3 ;d is the average ground height (m) above sea level for the profile between a point 3 km from transmitter and the receiver (located at d km from transmitter). H 0 3 ;15 is the average ground height (m) above sea level for the profile between a point 3 km and another 15 km from transmitter. Then, depending on d and HTxeff, Atoll determines Cn using bilinear interpolation as follows. © Forsk 2009 AT281_TRG_E1 97 Technical Reference Guide If 37.5 HTxeff 1200, Cn= En(d,HTxeff) Otherwise, Atoll considers d horizon = 4.1 H Txeff (d is stated in km) Therefore, If HTxeff < 37.5 If d d horizon , we have C n = E n d + 25 – d horizon 37.5 Else Cn=En(d, 37.5) – En(dhorizon, 37.5) + En(25, 37.5) If HTxeff > 1200 If d d horizon , we have C n = E n d + 142 – d horizon 1200 Else Cn=En(d, 1200) – En(dhorizon, 1200) + En(142, 1200) AHRxeff Calculation AH Rxeff H Rx c = --- 20 log ---------- 10 6 where, HRx is the user-defined receiver height, c is the height gain factor. Note: • c values are provided in the recommendation 370-7; for example, c=4 in a rural case. Acl Calculation 2 If f 300 MHz, A cl = 8.1 – 6.9 + 20 log – 0.1 + 1 + – 0.1 2 Otherwise, A cl = 14.9 – 6.9 + 20 log – 0.1 + 1 + – 0.1 f With = – 4000 ---------300 where, is the clearance angle (in radians) determined according to the recommendation 370-7 (figure 19), f is the frequency stated in MHz. 4.4.7 Erceg-Greenstein (SUI) Propagation Model Erceg-Greenstein propagation model is a statistical path loss model derived from experimental data collected at 1.9 GHz in 95 macrocells. The model is for suburban areas, and it distinguishes between different terrain categories called the Stanford University Interim Terrain Models. This propagation model is well suited for distances and base station antenna heights that are not well-covered by other models. The path loss model applies to base antenna heights from 10 to 80 m, base-to-terminal distances from 0.1 to 8 km, and three distinct terrain categories. The basic path loss equation of the Erceg-Greenstein propagation model is: d PL = A + 10 a H BS Log 10 ------ d 0 4d 0 Where A = 20 Log 10 ------------- . This is a fixed quantity which depends upon the frequency of operation. d is the distance between the base station antenna and the receiver terminal and d0 is a fixed reference distance (100 m). a(HBS) is the correction factor for base station antenna heights, HBS: c a H BS = a – b H BS + ---------H BS Where 10 m H BS 80 m , and a, b, and c are correction coefficients which depend on the SUI terrain type. The Erceg-Greenstein propagation model is further developed through the correction factors introduced by the Stanford University Interim model. The standards proposed by the IEEE working group 802.16 include channel models developed by Stanford University. The basic path loss equation with correction factors is presented below: d PL = A + 10 a H BS Log 10 ------ + a f – a H R d 0 98 AT281_TRG_E1 © Forsk 2009 Chapter 4: Calculations f Where a(f) is the correction factor for the operating frequency, a f = 6 Log 10 ------------- , with f being the operating 2000 HR frequency in MHz. a(HR) is the correction factor for the receiver antenna height, a H R = X Log 10 ------- , where d 2 depends on the terrain type. Note: a(HR) = 0 for HR = 2 m. • References: [1] V. Erceg et. al, “An empirically based path loss model for wireless channels in suburban environments,” IEEE J. Select Areas Commun., vol. 17, no. 7, July 1999, pp. 1205-1211. [2] Abhayawardhana, V.S.; Wassell, I.J.; Crosby, D.; Sellars, M.P.; Brown, M.G.; "Comparison of empirical propagation path loss models for fixed wireless access systems," Vehicular Technology Conference, 2005. IEEE 61st Volume 1, 30 May-1 June 2005 Page(s):73 - 77 Vol. 1 4.4.7.1 SUI Terrain Types The SUI models are divided into three types of terrains1, namely A, B and C. • • • Type A is associated with maximum path loss and is appropriate for hilly terrain with moderate to heavy tree densities. Type B is characterised with either mostly flat terrains with moderate to heavy tree densities or hilly terrains with light tree densities. Type C is associated with minimum path loss and applies to flat terrain with light tree densities. The constants used for a, b, and c are given in the table below. Model Parameter Terrain A Terrain B Terrain C a 4.6 4.0 3.6 0.0075 0.0065 0.005 c (m) 12.6 17.1 20 X 10.8 10.8 20 b 4.4.7.2 (m-1) Erceg-Greenstein (SUI) Path Loss Formula The Erceg-Greenstein (SUI) propagation model formula can be simplified from the following equation: 4d 0 d PL = 20 Log 10 ------------- + 10 a H BS Log 10 ------ + a f – a H R d 0 (1) to the equation below: PL = – 7.366 + 26 Log 10 f + 10 a H BS 1 + Log 10 d – a H R (2) Where, • • • • f is the operating frequency in MHz d is the distance from the transmitter to the received in m in equation (1) and in km in equation (2) HBS is the transmitter height in m HR is the receiver height in m The above equation is divided into two parts in Atoll: PL = Lu – a H R Where, Lu = – 7.366 + 26 Log 10 f + 10 a H BS 1 + Log 10 d The above path loss formulas are valid for d > d0, i.e. d > 100 m. For d < 100 m, the path loss has been restricted to the free space path loss with correction factors for operating frequency and receiver height: 4d 4d PL = 20 Log 10 ------------------ + a f – a H R instead of PL = 20 Log 10 ------------------ Where a(f) and a(Hr) have the same definition as given above. Simplifying the above equation, we get, PL = 12.634 + 26 Log 10 f + 20 Log 10 d – a H R , or Lu = 12.634 + 26 Log 10 f + 20 Log 10 d 1. The word ‘terrain’ is used in the original definition of the model rather than ‘environment’. Hence it is used interchangeably with ‘environment’ in this description. © Forsk 2009 AT281_TRG_E1 99 Technical Reference Guide The above equation is not user-modifiable in Atoll except for the coefficient of Log 10 f , i.e. 26. Atoll uses the same coefficient as the one you enter for Log 10 f in Atoll for the case d > d0. Note: • 4.4.7.3 You can get the same resulting equation by setting a(hBS) = 2. Calculations in Atoll The Erceg-Greenstein (SUI) propagation model takes DTM into account between the transmitter and the receiver, and it can also take clutter into account at the receiver location. 1st step: For each pixel in the calculation radius, Atoll determines the clutter bin on which the receiver is located. This clutter bin corresponds to a clutter class. Atoll uses the Erceg-Greenstein (SUI) path loss formula assigned to this clutter class to evaluate path loss. 2nd step: This step depends on whether the ‘Add diffraction loss’ option is selected or not. • • If the ‘Add diffraction loss’ option is not selected, 1st step gives the final path loss result. If the ‘Add diffraction loss’ option is selected, Atoll proceeds as follows: a. It extracts a geographic profile between the transmitter and the receiver using the radial calculation method. b. It determines the largest obstacle along the profile in accordance with the Deygout method and evaluates losses due to diffraction L Diffraction . For more information on the Deygout method, see "3 Knife-Edge Deygout Method" on page 107. The final path loss is the sum of the path loss determined in 1st step and L Diffraction . Shadow fading is computed in Atoll independent of the propagation model. For more information on the shadow fading calculation, see "Shadowing Model" on page 115. 4.4.8 ITU-R P.1546-2 Propagation Model This propagation model is based on the P.1546-2 recommendations of the ITU-R. These recommendations extend the P.370-7 recommendations, and are suited for operating frequencies from 30 to 3000 MHz. The path loss is calculated by this propagation model with the help of graphs available in the recommendations. The graphs provided in the recommendations represent field (or signal) strength, given in db V m , as a function of distance for: • Nominal frequencies, f n : 100, 600, and 1000 MHz The graphs provided for 100 MHz are applicable to frequencies from 30 to 300 MHz, those for 600 MHz are applicable to frequencies from 300 to 1000 MHz, and the graphs for 1000 MHz are applicable to frequencies from 1000 to 3000 MHz. The method for interpolation is described in the recommendations (Annex 5, § 6). • Transmitter antenna heights, h 1 : 10, 20, 37.5, 75, 150, 300, 600, and 1200 m For any values of h 1 from 10 to 3000 m, an interpolation or extrapolation from the appropriate two curves is used, as described in the recommendations (Annex 5, § 4.1). For h 1 below 10 m, the extrapolation to be applied is given in Annex 5, § 4.2. It is possible for the value of h 1 to be negative, in which case the method is given in Annex 5, § 4.3. • Time variability, t : 1, 10, and 50 % The propagation curves represent the field strength values exceeded for 1, 10 and 50 % of time. • Receiver antenna height, h 2 : 10 m For land paths, the graphs represent field strength values for a receiver antenna height above ground, equal to the representative height of the clutter around the receiver. The minimum value of the representative height of clutter is 10 m. For sea paths, the graphs represent field strength values for a receiver antenna height of 10 m. For other values of receiver antenna height, a correction is applied according to the environment of the receiver. The method for calculating this correction is given in Annex 5, § 9. These recommendations are not valid for transmitter-receiver distances less than 1 km or greater than 1000 km. Therefore in Atoll, the path loss between a transmitter and a receiver over less than 1 km is the same as the path loss over 1 km. Similarly, the path loss between a transmitter and a receiver over more than 1000 km is the same as the path loss over 1000 km. Moreover, these recommendations are not valid for transmitter antenna heights less than the average clutter height surrounding the transmitter. Notes: 100 • The cold sea graphs are used for calculations over warm and cold sea both. • The mixture of land and sea paths is not supported by Atoll. AT281_TRG_E1 © Forsk 2009 Chapter 4: Calculations 4.4.8.1 Calculations in Atoll The input to the propagation model are the transmission frequency, transmitter and receiver heights, the distance between the transmitter and the receiver, the precentage of time the field strength values are exceeded, the type of environment (i.e., land or sea), and the clutter at the receiver location. In the following calculations, f is the transmission frequency, d is the transmitter-receiver distance, and t is the percentage of time for which the path loss has to be calculated. The following calculations are performed in Atoll to calculate the path loss using this propagation model. 4.4.8.1.1 Step 1: Determination of Graphs to be Used First of all, the upper and lower nominal frequencies are determined for any given transmission frequency. The upper and lower nominal frequencies are the nominal frequencies (100, 600, and 2000 MHz) between which the transmission frequency is located, i.e., f n1 f f n2 . Once f n1 and f n1 are known, along with the information about the percentage of time t and the type of path (land or sea), the sets of graphs which will be used for the calculation are also known. 4.4.8.1.2 Step 2: Calculation of Maximum Field Strength A field strength must not exceed a maximum value, E Max , which is given by: E Max = E FS = 106.9 – 20 Log d for land paths, and E Max = E FS + E SE = 106.9 – 20 Log d + 2.38 1 – exp – d 8.94 Log 50 t for sea paths. Where E FS is the free space field strength for 1 kW ERP, E SE is an enhancement for sea graphs. 4.4.8.1.3 Step 3: Determination of Transmitter Antenna Height The transmitter antenna height to be used in the calculation depends on the type and length of the path. • Land paths h 1 = h eff • Sea paths h 1 = Max 1 h a Here, all antenna heights (i.e., h 1 , h eff , and h a ) are in expressed in m. h a is the antenna height above ground and h eff is the effective height of the transmitter antenna, which is its height over the average level of the ground between distances of 0.2 d and d km from the transmitter in the direction of the receiver. 4.4.8.1.4 Step 4: Interpolation/Extrapolation of Field Strength The interpolations are performed in series in the same order as described below. The first interpolation/extrapolation is performed over the field strength values, E , from the graphs for transmitter antenna height to determine E h1 . The second interpolation/extrapolation is performed over the interpolated/extrapolated values of E h1 to determine E d . And, the thrid and final interpolation/extrapolation is performed over the interpolated/extrapolated values of E d to determine E f . Step 4.1: Interpolation/Extrapolation of Field Strength for Transmitter Antenna Height If the value of h 1 coincides with one of the eight heights for which the field strength graphs are provided, namely 10, 20, 37.5, 75, 150, 300, 600, and 1200 m, the required field strength is obtained directly from the corresponding graph. Otherwise: • If 10 m h 1 3000 m The field strength is interpolated or extrapolated from field strengths obtained from two curves using the following equation: Log h 1 h Low E h1 = E Low + E Up – E Low -----------------------------------------Log h Up h Low Where h Low = 600 m if h 1 1200 m , otherwise h Low is the nearest nominal effective height below h 1 , h Up = 1200 m if h 1 1200 m , otherwise h Up is the nearest nominal effective height above h 1 , E Low is the field strength value for h Low at the required distance, and E Up is the field strength value for h Up at the required distance. • © Forsk 2009 If 0 m h 1 10 m AT281_TRG_E1 101 Technical Reference Guide - For land path if the transmitter-receiver distance is less than the smooth-Earth horizon distance d H h 1 = 4.1 h 1 , i.e., if d 4.1 h 1 , E h1 = E 10 d H 10 + E 10 d – E 10 d H h 1 , or E h1 = E 10 12.9 km + E 10 d – E 10 d H h 1 because d H 10 = 12.9 km - For land path if the transmitter-receiver distance is greater than or equal to the smooth-Earth horizon distance d H h 1 = 4.1 h 1 , i.e., if d 4.1 h 1 , E h1 = E 10 d H 10 + d – d H h 1 , or E h1 = E 10 12.9 km + d – d H h 1 because d H 10 = 12.9 km Where E x y is the field strength value read for the transmitter-receiver distance of y from the graph available for the transmitter antenna height of x. If in the above equation, d H 10 + d – d H h 1 1000 km even though d 1000 km , the field strength is determined from linear extrapolation for Log (distance) of the graph given by: Log d D Low E h1 = E Low + E Up – E Low -------------------------------------------Log D Up D Low Where D Low is penultimate tabulation distance (km), D Up is the final tabulation distance (km), E Low is the field strength value for D Low , and E Up is the field strength value for D Up . - For sea path, h 1 should not be less than 1 m. This calculation requires the distance at which the path has 0.6 of the first Fresnel zone just unobstructed by the sea surface. This distance is given by: D h1 = D 0.6 f h 1 h 2 = 10 m (km) Df Dh Where D 0.6 = Max 0.001 ------------------- (km) with D f = 0.0000389 f h 1 h 2 (frequency-dependent term), D f + D h and D h = 4.1 h 1 + h 2 (asymptotic term defined by the horizon distance). If d D h1 the 0.6 Fresnel clearance distance for the sea path where the transmitter antenna height is 20 m is also calculated as: D 20 = D 0.6 f h 1 = 20 m h 2 = 10 m (km) Once D h1 and D 20 are known, the field strength for the required distance is given by: E h1 E Max Log d D h1 = E D + E D – E D -------------------------------------h1 20 h1 Log D 20 D h1 E' 1 – F S + E'' F S for d D h1 for D h1 d D 20 for d D 20 Where E Max is the maximum field strength at the required distance as calculated in "Step 2: Calculation of Maximum Field Strength" on page 101, E D ED 20 h1 is E Max for d = D h1 , Log h1 10 Log h1 10 = E 10 D 20 + E 20 D 20 – E 10 D 20 ---------------------------------- , E' = E 10 d + E 20 d – E 10 d ---------------------------------- , Log 20 10 Log 20 10 and E'' is the field strength calculated as described for land paths. E 10 y and E 20 y are field strengths interpolated for distance y and h 1 = 10 m and 20 m , respectively, and F S = d – D 20 d . • If h 1 0 m A correction is applied to the field strength, E h1 , calculated in the above description in order to take into account the diffraction and tropospheric scattering. This correction is the maximum of the diffraction correction,, and tropospheric scattering correction, . C h1 = Max C h1d C h1t Where C h1d = 6.03 – J with 2 J = 6.9 + 20 Log – 0.1 + 1 + – 0.1 and = K eff2 , –h1 eff2 = arc tan ------------- , and K is 1.35 for 100 MHz, 3.31 for 600 MHz, 6.00 for 2000 MHz. 9000 e 180 d C h1t = 30 Log ------------------------ with e = ---------------------- , a = 6370 km (radius of the Earth), and k = 4 3 is the effec e + eff2 ak tive Earth radius factor for mean refractivity conditions. 102 AT281_TRG_E1 © Forsk 2009 Chapter 4: Calculations Step 4.2: Interpolation/Extrapolation of Field Strength for Transmitter-Receiver Distance In the field strength graphs in the recommendations, the field strength is plotted against distance from 1 km to 1000 km. The distance values for which field strengths are tabulated are 1, 2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 25, 30, 35, 40, 45, 50, 55, 60, 65, 70, 75, 80, 85, 90, 95, 100, 110, 120, 130, 140, 150, 160, 170, 180, 190, 200, 225, 250, 275, 300, 325, 350, 375, 400, 425, 450, 475, 500, 525, 550, 575, 600, 625, 650, 675, 700, 725, 750, 775, 800, 825, 850, 875, 900, 925, 950, 975, 1000. If the transmitter-receiver distance is a value from this list, then interpolation of field strength is not required and the field strength can be directly read from the graphs. If the transmitter-receiver distance does not coincide with the list of distances for which the field strengths are accurately available from the graphs, the field strength are linearly interpolated or extrapolated for the logarithm of the distance using the following equation: Log d d Low E d = E Low + E Up – E Low -----------------------------------------Log d Up d Low Where d Low is the lower value of the nearest tabulated distance to d , d Up is the higher value of the nearest tabulated distance to d , E Low is the field strength value for d Low , and E Up is the field strength value for d Up . Step 4.3: Interpolation/Extrapolation of Field Strength for Transmission Frequency The field strength at the transmission frequency is interpolated from the graphs available for the upper and lower nominal frequencies as follows: Log f f Low E f = E Low + E Up – E Low --------------------------------------Log f Up f Low Where f Low is the lower nominal frequency (100 MHz if f < 600 MHz, 600 MHz otherwise), f Up is the higher nominal frequency (600 MHz if f < 600 MHz, 2000 MHz otherwise), E Low is the field strength value for f Low , and E Up is the field strength value for f Up . In the case of transmission frequencies below 100 MHz or above 2000 MHz, the field strength values are extrapolated from the two nearer nominal frequency values. The above equation is used for all land paths and sea paths. 4.4.8.1.5 Step 5: Calculation of Correction Factors Step 5.1: Correction for Receiver Antenna Height The receiver antenna height correction depends on the type of path and clutter in which the receiver is located. The field strength values given by the graphs for land paths are for a reference receiver antenna at a height, R (m), representative of the height of the clutter surrounding the receiver, subject to a minimum height value of 10 m. Examples of reference heights are 20 m for an urban area, 30 m for a dense urban area, and 10 m for a suburban area. For sea paths the notional value of R is 10 m. For land paths, the elevation angle of the arriving ray is taken into account by calculating a modified representative clutter 1000 d R – 15 h 1 height R' , given by R' = Max 1 --------------------------------------------------------------- . 1000 d – 15 Note that for h 1 6.5 d + R , R' R . The different correction factors are calculated as follows: • For land path in urban and suburban zones 6.03 – J for h 2 R' C Receiver = h 3.2 + 6.2 Log f Log -----2- for h 2 R' R' R' – h 2 2 With J = 6.9 + 20 Log – 0.1 + 1 + – 0.1 and = 0.0108 f R' – h 2 arc tan ----------------- . 27 10 If R' 10 m , C Receiver is reduced by 3.2 + 6.2 Log f Log ------ . R' • For land path other zones h2 C Receiver = 3.2 + 6.2 Log f Log ------ 10 • For sea path d 10 and d h2 are determined as distances at which at which the path has 0.6 of the first Fresnel zone just unobstructed by the sea surface with h 2 = 10 m and variable h 2 , respectively. These distances are given by © Forsk 2009 AT281_TRG_E1 103 Technical Reference Guide Df Dh d 10 = D 0.6 f h 1 h 2 = 10 m and d h2 = D 0.6 f h 1 h 2 (km), respectively. Here D 0.6 = Max 0.001 ------------------- D f + D h as explained earlier. - h2 If h 2 10 m , C Receiver = 3.2 + 6.2 Log f Log ------ 10 - h2 If h 2 10 m and d d 10 , C Receiver = 3.2 + 6.2 Log f Log ------ 10 - If h 2 10 m and d d 10 and d d h2 , C Receiver = 0 - Log d d h2 h2 If h 2 10 m and d d 10 and d d h2 , C Receiver = 3.2 + 6.2 Log f Log ------ ------------------------------------- 10 Log d 10 d h2 Step 5.2: Correction for Short Urban/Suburban Paths This correction is only applied when the path loss is to be calculated over land paths, over a transmitter-receiver distance less than 15 km, in urban and suburban zones. This correction takes into account the presence of buildings in these zones. The buildings are assumed to be of uniform height. The correction represents a reduction in the field strength due to building clutter. It is added to the field strength and is given by: C Building = – 3.3 Log f 1 – 0.85 Log d 1 – 0.46 Log 1 + h a – R Where h a is the antenna height above the ground, and R is the clutter height of the clutter class where the receiver is located. This correction is only applied when d 15 km and h 1 – R 150 m . Step 5.3: Correction for Receiver Clearance Angle This correction is only applied when the path loss is to be calculated over land paths, and over a transmitter-receiver distance less than 16 km. This correction gives more precise field strength prediction over small reception areas. The correction is added to the field strength and is given by: C Clearance = J ' – J 2 Where J = 6.9 + 20 Log – 0.1 + 1 + – 0.1 , ' = 0.036 f , and = 0.065 Clearance f Clearance is the clearance angle in degrees determined from: • • : The elevation angle of the line from the receiver which just clears all terrain obstructions in the direction of the transmitter over a distance of up to 16 km but not going beyond the transmitter. h 1S – h 2S Ref : The reference angle, Ref = arc tan ------------------------- . 1000 d Where h 1S and h 2S are the heights of the transmitter and the receiver above sea level, respectively. 4.4.8.1.6 Step 6: Calculation of Path Loss First, the final field strength is calculated from the interpolated/extrapolated field strength, E f , by applying the corrections calculated earlier. The calculated field strength is given by: E Calc = E f + C Receiver + C Building + C Clearance The resulting field strength is given by E = Min E Calc E Max , from which the path loss (basic transmission loss, L B ) is calculated as follows: L B = 139 – E + 20 Log f 4.4.9 Sakagami Extended Propagation Model The Sakagami extended propagation model is based on the simplification of the extended Sakagami-Kuboi propagation model. The Sakagami extended propagation model is valid for frequencies above 3 GHz. Therefore, it is only available in WiMAX 802.16d and WiMAX 802.16e documents by default. The Sakagami-Kuboi propagation model requires detailed information about the environment, such as widths of the streets where the receiver is located, the angles formed by the street axes and the directions of the incident waves, heights of the buildings close to the receiver, etc. The path loss formula for the Sakagami-Kuboi propagation model is [1]: H 2 L Model = 100 – 7.1 Log W + 0.023 + 1.4 Log h s + 6.1 Log H 1 – 24.37 – 3.7 -------- Log h b + h b0 43.2 – 3.1 Log h b Log d + 20 Log f + e 104 AT281_TRG_E1 13 Log f – 3.23 © Forsk 2009 Chapter 4: Calculations Where, • • • • • • • • • W is the width (in meters) of the streets where the receiver is located is the angle (in degrees) formed by the street axes and the direction of the incident wave hs is the height (in meters) of the buildings close to the receiver H1 is the average height (in meters) of the buildings close to the receiver hb is the height (in meters) of the transmitter antenna with respect to the observer hb0 is the height (in meters) of the transmitter antenna with respect to the ground level H is the average height (in meters) of the buildings close to the base station d is the separation (in kilometres) between the transmitter and the receiver f is the frequency (in MHz) The Sakagami-Kuboi propagation model is valid for: 5m <W< 50 m 0° < < 90° 5m < hs < 80 m 5m < H1 < 50 m 20 m < hb < 100 m 0.5 km <d< 10 km 450 MHz <f< 2200 MHz h b0 H Studies [2] have shown that the Sakagami-Kuboi propagation model can be extended to frequencies higher than 3 GHz, which also allows a simplification in terms of the input required by the model. The path loss formula for the extended Sakagami-Kuboi propagation model is: L Model = 54 + 40 Log d – 30 Log h b + 21 Log f + a Where a is a corrective factor with three components: H0 hm W a = a H 0 + a W + a h m = 11 Log ------- – 7.1 Log ------ – 5 Log -------- 20 1.5 20 • • • • • • • W is the width (in meters) of the streets where the receiver is located H0 (= hs = H1) is the height (in meters) of the buildings close to the receiver hb (= hb0) is the height (in meters) of the transmitter antenna with respect to the ground hm is the height (in meters) of the receiver antenna H is the average height (in meters) of the buildings close to the base station d is the separation (in metres) between the transmitter and the receiver f is the frequency (in GHz) The extended Sakagami-Kuboi propagation model is valid for: 5m <W< 50 m 10 m < H0 < 30 m 10 m < hb < 100 m 0.1 km <d< 3 km 0.8 GHz <f< 8 GHz 1.5 m < hm < 5m Studies also show that above 3 GHz, the path loss predicted by the extended model is almost independant of the input parameters such as street widths and angles. Therefore, the extended Sakagami-Kuboi propagation model can be simplified to the extended Sakagami propagation model: L Model = 54 + 40 Log d – 30 Log h b + 21 Log f – 5 Log h m The extended Sakagami propagation model is valid for: 10 m < hb < 100 m 0.1 km <d< 3 km 3 GHz <f< 8 GHz 1.5 m < hm < 5m The path loss calculation formula of the Sakagami extended propagation model resembles the formula of the Standard Propagation Model. In Atoll, this model is in fact a copy of the Standard Propagation Model with the following values assigned to the K coefficients: K1 © Forsk 2009 65.4 (calculated for 3.5 GHz) AT281_TRG_E1 105 Technical Reference Guide K2 40 K3 -30 K4 0 K5 0 K6 0 K7 -5 For more information on the Standard Propagation Model, see "Standard Propagation Model (SPM)" on page 87. References: [1] Manuel F. Catedra, Jesus Perez-Arriaga, "Cell Planning for Wireless Communications," Artech House Publishers, 1999. [2] Koshiro Kitao, Shinichi Ichitsubo, "Path Loss Prediction Formula for Urban and Suburban Areas for 4G Systems," IEEE, 2006. 4.4.10 Appendices 4.4.10.1 Free Space Loss The calculation of free space loss is based on ITU 525 recommendations. L FS = 32.4 + 20 log f + 20 log d where, f is the frequency in MHz, d is the Tx-Rx distance in km, Free space loss is stated in dB. 4.4.10.2 Diffraction Loss The calculation of diffraction is based on ITU 526-5 recommendations. General method for one or more obstacles (knifeedge diffraction) is used to evaluate diffraction losses (Diffraction loss in dB). Four construction modes are implemented in Atoll. All of them are based on this same physical principle presented hereafter, but differ in the way they consider one or several obstacles. Calculations take the earth curvature into account through the effective Earth radius concept (K factor=1.333). 4.4.10.2.1 Knife-Edge Diffraction The procedure checks whether a knife-edge obstructs the first Fresnel zone constructed between the transmitter and the receiver. The diffraction loss, J(), depends on the obstruction parameter (), which corresponds to the ratio of the obstruction height (h) and the radius of the Fresnel zone (R). Figure 4.14: Knife-Edge Diffraction R = c0 n d1 d2 --------------------------------f d1 + d2 where, n is the Fresnel zone index, 106 AT281_TRG_E1 © Forsk 2009 Chapter 4: Calculations c0 is the speed of light (2.99792 x108 ms-1), f is the frequency in Hz d1 is the distance from the transmitter to obstacle in m, d2 is the distance from obstacle to receiver in m. h We have: = --r where, R r = ------2 h is the obstruction height (height from the obstacle top to the Tx-Rx axis). Hence, 2 For 1 knife-edge method, if – 0.7 , J = 6.9 + 20 log – 0.1 + 1 + – 0.1 Else, J = 0 Note: • 4.4.10.2.2 In case of multiple-knife edge method, the minimum required to estimate diffraction loss is -0.78. 3 Knife-Edge Deygout Method The Deygout construction, limited to a maximum of three edges, is applied to the entire profile from transmitter to receiver. This method is used to evaluate path loss incurred by multiple knife-edges. Deygout method is based on a hierarchical knife-edge sorting used to distinguish the main edges, which induce the largest losses, and secondary edges, which have a lesser effect. The edge hierarchy depends on the obstruction parameter () value. 1 Obstacle Figure 4.15: Deygout Construction – 1 Obstacle A straight line between transmitter and receiver is drawn and the height of the obstacle above the Tx-Rx axis, hi, is calculated. The obstruction position, di, is also recorded. i are evaluated from these data. The point with the highest value is termed the principal edge, p, and the corresponding loss is J(p). Therefore, we have DiffractionLoss = J P 3 Obstacles Then, the main edge (point p) is considered as a secondary transmitter or receiver. Therefore, the profile is divided in two parts: one half profile, between the transmitter and the knife-edge section, another half, constituted by the knife-edgereceiver section. © Forsk 2009 AT281_TRG_E1 107 Technical Reference Guide Figure 4.16: Deygout Construction – 3 Obstacles The same procedure is repeated on each half profile to determine the edge with the higher . The two obstacles found, (points t and r), are called ‘secondary edges’. Losses induced by the secondary edges, J(t) and J(r), are then calculated. Once the edge hierarchy is determined, the total loss is evaluated by adding all the intermediary losses obtained. Therefore, if P 0 we have DiffractionLoss = J P + J t + J r Otherwise, If P – 0.7 , DiffractionLoss = J P Note: • In case of ITU 526-5 and WLL propagation models, Diffraction loss term is determined as follows: - If P – 0.78 , we have DiffractionLoss = J P + J t + J r t J P Where, t = min -------------- 1 6 - Otherwise DiffractionLoss = 0 4.4.10.2.3 Epstein-Peterson Method The Epstein-Peterson construction is limited to a maximum of three edges. First, Deygout construction is applied to determine the three main edges over the whole profile as described above. Then, the main edge height, hp, is recalculated according to the Epstein-Peterson construction. hp is the height above a straight line connecting t and r points. The main edge position dp is recorded and p and J(p) are evaluated from these data. Figure 4.17: Epstein-Peterson Construction Therefore, we have DiffractionLoss = J P + J t + J r 4.4.10.2.4 Deygout Method with Correction The Deygout method with correction (ITU 526-5) is based on the Deygout construction (3 obstacles) plus an empirical correction, C. 108 AT281_TRG_E1 © Forsk 2009 Chapter 4: Calculations Therefore, If P 0 , we have DiffractionLoss = J P + J t + J r + C Otherwise DiffractionLoss = J P + C Note: • In case of ITU 526-5 propagation model, Diffraction loss term is determined as follows: - If P – 0.78 , we have DiffractionLoss = J P + t J t + J r + C J P Where, t = min -------------- 1 6 C = 8.0 + 0.04d (d: distance stated in km between the transmitter and the receiver). - Otherwise DiffractionLoss = 0 4.4.10.2.5 Millington Method The Millington construction, limited to a single edge, is applied over the entire profile. Two horizon lines are drawn at the transmitter and at the receiver. A straight line between the transmitter and the receiver is defined and the height of the intersection point between the two horizon lines above the Tx-Rx axis, hh, is calculated. The position dh is recorded and then, from these values, h and J(h) are evaluated using the same previous formulas. Therefore, we have DiffractionLoss = J h Figure 4.18: Millington Construction 4.5 Path Loss Tuning Atoll can tune path loss matrices obtained from propagation results by the use of real measurements (CW Measurements or Test Mobile Data). For each measured transmitter, Atoll tries to merge measurements and predictions on the same points and to smooth the surrounding points of the path loss matrices for homogeneity reasons. A transmitter path loss matrix can be tuned several times by the use of several measurement paths. All these tuning paths are stored in a catalogue. This catalogue is stored under a .tuning folder containing a .dbf file and one .pts file per tuned transmitter. Since a tuning file can contain several measurement paths, all these measurements are added to the tuning file. For more information on the tuning files, See "Externalised Tuning Files" on page 64. 4.5.1 Standard Tuning on Transmitters The same algorithm is used for CW Measurement and Test Mobile Data. It is also the same for main and extended matrices. Path Losses tuning will be done using two steps. 1. Total matrix correction A mean error is calculated between each measured value and the corresponding bin in the pathloss matrix. Mean error is calculated for each pathloss matrix (main and extended) of each transmitter. This mean error is then applied to all the matrix bins. This tuning is done to smooth the local corrections (step 2) of measured values and not the tuned bins. 2. Local correction for each measured value For each measured value, an ellipse is used to define the pathloss area which has to be tuned. The main axis of the ellipse is oriented to the transmitter.The ellipse is user-defined by two parameters : © Forsk 2009 AT281_TRG_E1 109 Technical Reference Guide • • The radius of the axis parallel to the Profile (A) The radius of the axis perpendicular to the Profile (B) Let’s take M a measurement value and P i the path loss value at point i, before any tuning. Note: • M is limited by the minimum measurement threshold defined in the interface. The squared elliptic distance between i and M is given by: 2 2 Xi – XM Yi – YM - + -------------------------D i = -------------------------2 2 A B Where: X i and X M are the X-coordinates of i and M respectively Y i and Y M are the Y-coordinates of i and M respectively The mean error for the first tuning is given by: 1 E = --- n ei i Where e i is the error between measurement and prediction at point i Note: • E is limited by the maximum total correction defined in the interface. Then, the path loss value is tuned using E: Pi new = Pi old +E Finally, a second tuning ( R i ) is applied where: R i = 1 – Di M – g – Pi new so R i = 1 – D i M – g – P i old + E Where g is (measurement gain - losses). Note: • R i is limited by the maximum local correction defined in the interface. So, the final tuned path loss is: Pi tuned = Pi new + R i so P i tuned = Pi old + E + Ri When several ellipses overlap a pathloss bin, the final tuned path loss is given by: 1 – d j P j tuned j = ----------------------------------------------------Pi tuned d j n – j Where n is the number of overlapping ellipses 4.5.2 Path Loss Tuning of Repeaters In the case of repeaters, Atoll provides only a composite measured value per pixel which is a combination of the contribution of both a transmitter and one or several repeaters. In order to tune the path loss matrices of donor transmitters and repaters, its is mandatory to split the contribution of each element in the measured value as starting point. Let’s take M the measured value. M = Md + Mr where : M d represents the contribution of the donor transmitter in the measured value. M r represents the contribution of the repeater in the measured value. Note: • 110 All the values are used in Watts AT281_TRG_E1 © Forsk 2009 Chapter 4: Calculations If C d and C r represent respectively the filtered signal level from the donor transmitter and the repeater on a pixel, one can define the contribution of each element as follows: Cd Cr M d = M ------------------- and M r = M ------------------- . Cd + Cr Cd + Cr Following the path loss tuning process described in "Standard Tuning on Transmitters" on page 109, the donor transmitter (resp. the repeater) is then tuned using M d (resp. M r ) values. 4.6 Antenna Attenuation Calculation The modelling method used to evaluate transmitter antenna attenuation, L antTx , is described below. Atoll calculates the accurate azimuth and tilt angles and then, performs a 3-D interpolation of horizontal and vertical patterns to determine the attenuation of antenna. Furthermore, you will find explanations about the remote electrical downtilt modelling. 4.6.1 Calculation of Azimuth and Tilt Angles From the direction of the transmitter antenna and the receiver position relative to the transmitter, Atoll determines the receiver position relative to the direction of the transmitter antenna (i.e. the direction of the transmitter-receiver path in the transmitter antenna coordinate system). aTx and eTx are respectively the transmitter (Tx) antenna azimuth and tilt in the coordinate system S 0 x y z . aRx and eRx are respectively the azimuth and tilt of the receiver (Rx) in the coordinate system S 0 x y z . d is the distance between the transmitter (Tx) and the receiver (Rx). Figure 4.19: Azimuth and Tilt Computation In the coordinate system S 0 x y z , the receiver coordinates are: x Rx cos e Rx sin a Rx d y Rx = cos e Rx cos a Rx d z Rx (1) – sin e Rx d Let az and el respectively be the azimuth and tilt of the receiver in the transmitter antenna coordinate system S Tx x'' y'' z'' . These angles describe the direction of the transmitter-receiver path in the transmitter antenna coordinate system. Therefore, the receiver coordinates in S Tx x'' y'' z'' are: x'' Rx y'' Rx = z'' Rx © Forsk 2009 cos el sin az d cos el cos az d – sin el d (2) AT281_TRG_E1 111 Technical Reference Guide According to the figure above, we have the following relations: x' y' = z' cos a Tx – sin a Tx 0 x sin a Tx cos a Tx 0 y z 0 0 1 (3) and 1 0 0 x'' x' y'' = 0 cos e Tx – sin e Tx y' z'' z' 0 sin e Tx cos e Tx (4) Therefore, the relation between the system S 0 x y z and the transmitter antenna system S Tx x'' y'' z'' is: 1 0 0 cos a Tx – sin a Tx 0 x'' x 0 e cos – sin e = y'' sin a Tx cos a Tx 0 y Tx Tx z'' 0 sin e Tx cos e Tx z 0 0 1 (5) We get, x'' y'' = z'' cos a Tx – sin a Tx 0 x cos e Tx sin a Tx cos e Tx cos a Tx – sin e Tx y z sin e Tx sin a Tx sin e Tx cos a Tx cos e Tx (6) Then, substituting the receiver coordinates in the system S0 from Eq. (1) and the receiver coordinates in the system STx from Eq. (2) in Eq. (6) leads to a system where two solutions are possible: 1st solution: If a Rx = a Tx , then az = 0 and el = e Rx – e Tx 2nd solution: If a Rx a Tx , then 1 az = atan -----------------------------------------------------------------------------------------------cos e Tx sin e Tx tan e Rx -------------------------------------- + -------------------------------------------------tan a Rx – a Tx sin a Rx – a Tx and cos e Tx tan e Rx – sin e Tx - el = atan sin az -------------------------------------+ --------------------------------------------------sin a Rx – a Tx tan a Rx – a Tx If sin az sin a Rx – a Tx 0 , then az = az + 180 4.6.2 Antenna Pattern 3-D Interpolation The direction of the transmitter-receiver path in the transmitter antenna coordinate system is given by angle values, az and el. Atoll considers these values in order to determine transmitter antenna attenuations in the horizontal and vertical patterns. It reads the attenuation H(az) in the horizontal pattern for the calculated azimuth angle az and the attenuation V(el) in the vertical pattern for the calculated tilt angle el. Then, it calculates the antenna total attenuation, L antTx az el . 180 – az az L antTx az el = H az – -------------------------- H 0 – V el + ---------- H 180 – V 180 – el 180 180 Notes: • Atoll assumes that the horizontal and vertical patterns are two cross-sections of the 3-D pattern. In other words, the description of the antenna pattern must satisfy the following: H(0)=V(0) and H()=V() In case of an electrical tilt, , the horizontal pattern is a conical section with a degrees elevation off the horizontal plane. Here, horizontal and vertical patterns must satisfy the following: H(0)=V() and H()=V(-) If the constraints listed above are satisfied, this implies that: 1. Interpolated horizontal and vertical patterns respectively fit in with the entered horizontal and vertical patterns, even in case of electrical tilt, 2. The contribution of both the vertical pattern back and front parts are taken into account. Otherwise, only the second point is guaranteed. • 112 The above interpolation is performed in dBs. AT281_TRG_E1 © Forsk 2009 Chapter 4: Calculations 4.6.3 • Angle values in formulas are stated in degrees. • The above interpolation is not used in case the transmitter antenna is described by a 3-D antenna pattern. Additional Electrical Downtilt Modelling The additional electrical downtilt, AEDT, also referred to as remote electrical downtilt or REDT, introduces a conical transformation of the 3-D antenna pattern in the vertical axis. In order to take it into account, the vertical pattern is transformed as follows: V x = V x – AEDT when x [– 90,90] V x = V x + AEDT when x [90,270] Where, the angle values are in degrees. The vertical pattern transformation is represented below. The left picture shows the initial vertical pattern when there is no electrical downtilt and the right one shows the vertical pattern transformation due to an electrical downtilt of 10°. Then, Atoll proceeds as explained in the previous section. It determines the antenna attenuation in the transformed vertical pattern for the calculated tilt angle (V(el)) and applies the 3-D interpolation formula in order to calculate the antenna total attenuation, L antTx az el . Figure 4.20: Vertical Pattern Transformation due to Electrical Downtilt 4.6.4 Antenna Pattern Smoothing Empirical propagation models, like the Standard Propagation Model (SPM), require antenna pattern smoothing in the vertical plane to simulate the effects of reflections and diffractions. Signal level predictions can be improved by smoothing the high-attenuation points of the vertical pattern. You can smooth vertical as well as horizontal antenna patterns in Atoll. The antenna pattern smoothing algorithm in Atoll first determines the peaks and nulls in the pattern within the smoothing angle (ASmoothing) defined by the user. Peaks (P) are the lowest attenuation angles and nulls (N) are the highest attenuation angles in the pattern. Then, it determines the nulls to be smoothed (NSmoothing) and their corresponding angles according to the defined Peak-to-Null Deviation (DPeak-to-Null). DPeak-to-Null is the minimum difference of attenuation in dBs between two peaks and a null between them. Finally, Atoll smooths the pattern between 0 and the smoothing angle (ASmoothing) by applying the smoothing to a certain smoothing factor (FSmoothing) defined by the user. Let’s take an example of an antenna pattern to be smoothed, as shown in Figure 4.21: on page 114. Let DPeak-to-Null be 10 dB, ASmoothing = 90 degrees, and FSmoothing = 0.5. © Forsk 2009 AT281_TRG_E1 113 Technical Reference Guide Figure 4.21: Vertical Antenna Pattern Atoll first determines the peaks and nulls in the part of the pattern to be smoothed by verifying the slopes of the pattern curve at each angle. Figure 4.22: Peaks and Nulls in the Antenna Pattern Peaks (P) and Nulls (N): Angle (°) Attenuation (dB) 1 0.1 15 33.5 21 13.2 30 37.6 38 16.9 49 32.2 67 15.6 Then, Atoll verifies whether the difference of attenuation at a given angle is DPeak-to-Null less than the before and after it. This comparison determines the nulls to be smoothed (NSmoothing). Nulls to be smoothed (NSmoothing): Angle (°) Attenuation (dB) 15 33.5 30 37.6 49 32.2 Once the nulls are known, Atoll applies the smoothing algorithm to all the attenuation values at all the angles between the first peak, the null, and the last peak. 114 AT281_TRG_E1 © Forsk 2009 Chapter 4: Calculations 4.6.4.1 Smoothing Algorithm For all nulls n N Smoothing surrounded by two peaks P1 and P2 at angles 1 and 2 , A 2 – A 1 - i – 1 A i Smoothed = A i – F Smoothing A i – A + -----------------------1 – 2 1 Where, i is the angle in degrees from 1 to 2 incremented by 1 degree, AAngle is the attenuation at any given angle which can be i, 1 or 2 , and FSmoothing is the smoothing factor defined by the user. 4.7 Shadowing Model Propagation models predict the mean path loss as a function of transmission and reception parameters such as frequency, antenna heights, and distance, etc. Therefore, the predicted path loss between a transmitter and a receiver is constant, in a given environment and for a given distance. However, in reality different types of clutter may exist in the transmitterreceiver path. Therefore, the path losses for the same distance could be different along paths that pass throught different types of environments. The location of the receiver in different types of clutter causes variations with respect to the mean path loss values given by the path loss models. Some paths undergo more loss while others are less obstructed and may have higher received signal strength. The variation of path loss with respect to the mean path loss values predicted by the propagation models, depending on the type of environment is called shadow fading (shadowing) or slow fading. "Slow" fading implies that the variations in the path loss due to shadow fading occur comparatively slower than the fast fading effect (Rayleigh fading), which is due to the mobile receiving multipath copies of a signal. Different types of clutter (buildings, hills, etc.) make large shadows that cause variations in the path loss over long distances. As a mobile passes under a shadow, the path loss to the mobile keeps varying from point to point. Shadow fading varies as the mobile moves, while fast fading can vary even if the mobile remains at the same location or moves over very small distances. It is crucial to account for the shadow fading in order to predict the reliability of coverage provided by any mobile cellular system. The shadowing effect is modelled by a log-normal (Gaussian) distribution, as shown in Figure 4.23: on page 115, whose standard deviation depends on the type of clutter. Figure 4.23: Log-normal Probability Density Function Different clutter types have different shadowing effects. Therefore, each clutter type in Atoll can have a different standard deviation representing its shadowing characteristics. For different standard deviations, the shape of the Gaussian distribution curve remains similar, as shown in Figure 4.23: on page 115. The accuracy of this model depends upon: • • • • • The suitability of the range of standard deviation used for each clutter class, The definition (bin size) of the digital map, How up-to-date the digital map is, The number of clutter classes, The accuracy of assignment of clutter classes. Shadowing is applied to the predicted path loss differently depending on the technology, and whether it is applied to predictions or simulations. The following sections explain how shadowing margins are calculated and applied to different technology documents. © Forsk 2009 AT281_TRG_E1 115 Technical Reference Guide Shadowing margins are calculated for a given cell edge coverage probability. The cell edge coverage probability is the probability of coverage at a pixel located at the cell edge, and corresponds to the reliability of coverage that you are planning to achieve at the cell edge. For example, a cell edge coverage probability of 75 % means that the users located at the cell edge will receive adequate signal level during 75 % of the time. Therefore, a coverage prediction with a cell edge coverage probability of x % means that the signal level predicted on each pixel is reliable x % of the time, and the overall predicted coverage area is reliable at least x % of the time. References: [1] Saunders S. “Antennas and propagation for Wireless Communication Systems” pp. 180-198 [2] Holma H., Toskala A. “WCDMA for UMTS” [3] Jhong S., Leonard M. “CDMA systems engineering handbook” pp. 309-315, 1051-1053” [4] Remy J.G., Cueugnet J., Siben C. “Systèmes de radiocommunications avec les mobiles” pp. 309-310 [5] Laiho J., Wacker A., Novosad T. “Radio network planning and optimisation for UMTS” pp. 80-81 GSM GPRS EGPRS Documents The shadowing margins are calculated as explained in "Shadowing Margin Calculation in Predictions" on page 120, and applied to signal level or C/I as explained below. • Signal Level-Based Predictions Signal level-based predictions include coverage predictions (Coverage by Transmitter, Coverage by Signal Level, and Overlapping Zones) and calculations in point analysis tabs (Profile and Reception) that require calculation of the received signal level only, and do not depend on interference. In these calculations (signal level calculations), a shadowing margin ( M Shadowing – model ) is added to the path loss ( L path ) calculated for each pixel. The shadowing margin is calculated for a given cell edge coverage probability, and depends on the model standard deviation ( model in dB) associated to the clutter class where the receiver is located. • Interference-Based Predictions Interference-based predictions include coverage predictions (Coverage by C/I Level, Interfered Zones, GPRS/ EGPRS Coding Schemes, RLC/MAC Throughout/Timeslot, Application Throughput/Timeslot, Circuit Quality Indicators) and calculations in point analysis window’s Interference tab that require calculation of the received signal level and interference received from other base stations. In these calculations, ( C I calculations), the shadowing margin ( M Shadowing – C I ) is added to the ratio of the carrier power (C) and the interfering signal levels (I) received from the interfering base stations. This shadowing margin is calculated for a given cell edge coverage probability and depends on the C/I standard deviation ( C I in dB) associated to the clutter class where the receiver is located. UMTS HSPA and CDMA2000 1xRTT 1xEV-DO Documents The shadowing margins are calculated as explained in "Shadowing Margin Calculation in Predictions" on page 120 and "Shadowing Margin Calculation in Monte-Carlo Simulations" on page 121, and applied to signal level, Ec/I0, or Eb/Nt as explained below. • Signal Level-Based Predictions Signal level-based predictions include coverage predictions (Coverage by Transmitter, Coverage by Signal Level, and Overlapping Zones) and calculations in point analysis tabs (Profile and Reception) that require calculation of the received signal level only, and do not depend on interference. In these calculations (signal level calculations), a shadowing margin ( M Shadowing – model ) is added to the path loss ( L path ) calculated for each pixel. The shadowing margin is calculated for a given cell edge coverage probability, and depends on the model standard deviation ( model in dB) associated to the clutter class where the receiver is located. • Interference+noise-Based Predictions Interference+noise-based predictions include coverage predictions (Pilot Reception Analysis, Downlink Total Noise, Service Area Analyses, Handoff Status, etc.) and point analysis (AS Analysis tab) that require calculation of the received signal level and intra-cellular interference and noise received from other base stations. In these calculations, the shadowing margins ( M Shadowing – Ec Io M Shadowing – Eb Nt UL and M Shadowing – Eb Nt DL ) , or ) are added to Ec/I0 or Eb/Nt. This shadowing margin is calculated for a given cell edge coverage probability and depends on the Ec/I0 or Eb/Nt standard deviations ( Ec Io , Eb Nt DL , or Eb Nt UL , in dB) associated to the clutter class where the receiver is located. • 116 Macro-Diversity Gains AT281_TRG_E1 © Forsk 2009 Chapter 4: Calculations UL DL Atoll calculates the uplink and downlink macro-diversity gains ( G macro – diversity and G macro – diversity ) depending on the receiver handover status. These gains are respectively taken into account to evaluate the uplink Eb/Nt in case of soft handover and the downlink Ec/Io from best server. For detailed description of the calculation of macrodiversity gains, please refer to "Macro-Diversity Gains Calculation" on page 122. • Monte-Carlo Simulations Random values for shadowing margins are calculated for each transmitter-receiver link and added to the predicted path loss. A shadowing margin for each transmitter-receiver link in each simulation is obtained by taking a random value from the probability density distribution for the appropriate clutter class. The probability distribution is a lognormal distribution as explained above. TD-SCDMA Documents The shadowing margins are calculated as explained in "Shadowing Margin Calculation in Predictions" on page 120 and "Shadowing Margin Calculation in Monte-Carlo Simulations" on page 121, and applied to signal level or interference+noise predictions as explained below. • Signal Level-Based Predictions Signal level-based predictions include coverage predictions (Best Server and RSCP P-CCPCH Coverages, PCCPCG Pollution, Baton Handover Coverage, DwPCH and UpPCH Coverages, Cell to Cell Interference, and Scrambling Code Interference) and calculations in point analysis tabs (Profile and Reception) that require calculation of the received signal level only, and do not depend on interference. In these calculations (signal level calculations), a shadowing margin ( M Shadowing – model ) is added to the path loss ( L path ) calculated for each pixel. The shadowing margin is calculated for a given cell edge coverage probability, and depends on the model standard deviation ( model in dB) associated to the clutter class where the receiver is located. • Interference+noise-Based Predictions Interference+noise-based predictions include coverage predictions (P-CCPCH Eb/Nt and C/I Coverages, Service Area Analsyses for downlink and uplink Eb/Nt and C/I, etc.) that require calculation of the received signal level and interference received from other base stations. In these calculations, the shadowing margins ( M Shadowing – Eb Nt M Shadowing – Eb Nt UL P – CCPCH , M Shadowing – Eb Nt DL , or ) are added to Eb/Nt. This shadowing margin is calculated for a given cell edge coverage probability and depends on the Eb/Nt standard deviations ( Eb Nt P – CCPCH , Eb Nt DL , or Eb Nt UL , in dB) associated to the clutter class where the receiver is located. • Monte-Carlo Simulations Random values for shadowing margins are calculated for each transmitter-receiver link and added to the predicted path loss. A shadowing margin for each transmitter-receiver link in each simulation is obtained by taking a random value from the probability density distribution for the appropriate clutter class. The probability distribution is a lognormal distribution as explained above. WiMAX 802.16d and WiMAX 802.16e Documents The shadowing margins are calculated as explained in "Shadowing Margin Calculation in Predictions" on page 120 and "Shadowing Margin Calculation in Monte-Carlo Simulations" on page 121 , and applied to signal level or C/(I+N) as explained below. • Signal Level-Based Predictions Signal level-based predictions include coverage predictions (Coverage by Transmitter, Coverage by Signal Level, and Overlapping Zones) and calculations in point analysis tabs (Profile and Reception) that require calculation of the received signal level only, and do not depend on interference. In these calculations (signal level calculations), a shadowing margin ( M Shadowing – model ) is added to the path loss ( L path ) calculated for each pixel. The shadowing margin is calculated for a given cell edge coverage probability, and depends on the model standard deviation ( model in dB) associated to the clutter class where the receiver is located. • Interference+noise-Based Predictions Interference-based predictions include coverage predictions (Coverage by C/(I+N) Level, Coverage by Best Bearer, Coverage by Throughput, etc.) that require calculation of the received signal level and received interference. In these calculations, (C/(I+N) calculations), in addition to the shadowing margin ( M Shadowing – model ) added to the path loss ( L path ) calculated for each pixel, the ratio M Shadowing – model – M Shadowing – C I is added to the inter- © Forsk 2009 AT281_TRG_E1 117 Technical Reference Guide fering signal levels (I). M Shadowing – C I is calculated for a given cell edge coverage probability and depends on the C/I standard deviation ( C I in dB) associated to the clutter class where the receiver is located. • Monte-Carlo Simulations Two random values of shadowing margins, for M Shadowing – model based on the model standard deviation ( model in dB) and M Shadowing – C I based on the C/I standard deviation ( C I in dB), are calculated for each mobile. For signal level calculation, M Shadowing – model is added to the path loss ( L path ) calculated for each mobile. For C/(I+N) calculations, in addition to the M Shadowing – model added to the path loss ( L path ), the ratio M Shadowing – model – M Shadowing – C I is also added to the interfering signal levels (I). Random values are drawn from the probability density distribution for the appropriate clutter class. The probability distribution is a log-normal distribution as explained above. The reason why the ratio M Shadowing – model – M Shadowing – C I is used can be understood from the following derivation (linear, not it dB): Inputs - C P : The predicted received carrier power without any shadowing margin. - I P : The predicted received interference power without any shadowing margin. - m C : Shadowing margin based on the model standard deviation ( 10 - m C I : Shadowing margin based on the C/I standard deviation ( 10 - N : Thermal noise M Shadowing – model ----------------------------------------------------10 M Shadowing – C I ---------------------------------------------10 ) ) Calculations The effective received carrier power is given by: C = mC CP The effective C/I is given by: C C ---- = m C I ------PIP I The above equations lead to: mC mC CP C I = -------------------------- = -------------------------= ------------ I P m CP CP CI m C I ------m C I ------IP IP mC Where ------------ corresponds to M Shadowing – model – M Shadowing – C I in dB. mC I Therefore, the effective C/(I+N) is given by: mC CP C ----------------- = --------------------------------------I + N m C ----------- I P + N mC I LTE Documents The shadowing margins are calculated as explained in "Shadowing Margin Calculation in Predictions" on page 120 and "Shadowing Margin Calculation in Monte-Carlo Simulations" on page 121 , and applied to signal level or C/(I+N) as explained below. • Signal Level-Based Predictions Signal level-based predictions include coverage predictions (Coverage by Transmitter, Coverage by Signal Level, and Overlapping Zones) and calculations in point analysis tabs (Profile and Reception) that require calculation of the received signal level only, and do not depend on interference. In these calculations (signal level calculations), a shadowing margin ( M Shadowing – model ) is subtracted from the signal level calculated for each pixel. The shadowing margin is calculated for a given cell edge coverage probability, and depends on the model standard deviation ( model in dB) associated to the clutter class where the receiver is located. • 118 Interference+noise-Based Predictions AT281_TRG_E1 © Forsk 2009 Chapter 4: Calculations Interference-based predictions include coverage predictions (Coverage by C/(I+N) Level, Coverage by Best Bearer, Coverage by Throughput, etc.) that require calculation of the received signal level and received interference. In these calculations, (C/(I+N) calculations), in addition to the shadowing margin ( M Shadowing – model ) subtracted from the signal level calculated for each pixel, the ratio M Shadowing – model – M Shadowing – C I is added to the interfering signal levels (I). M Shadowing – C I is calculated for a given cell edge coverage probability and depends on the C/I standard deviation ( C I in dB) associated to the clutter class where the receiver is located. • Monte-Carlo Simulations Two random values of shadowing margins, for M Shadowing – model based on the model standard deviation ( model in dB) and M Shadowing – C I based on the C/I standard deviation ( C I in dB), are calculated for each mobile. For signal level calculation, M Shadowing – model is subtracted from the signal level calculated for each mobile. For C/(I+N) calculations, in addition to the M Shadowing – model subtracted from the signal level, the ratio M Shadowing – model – M Shadowing – C I is also added to the interfering signal levels (I). Random values are drawn from the probability density distribution for the appropriate clutter class. The probability distribution is a log-normal distribution as explained above. The reason why the ratio M Shadowing – model – M Shadowing – C I is used can be understood from the following derivation (linear, not it dB): Inputs - C P : The predicted received carrier power without any shadowing margin. - I P : The predicted received interference power without any shadowing margin. - m C : Shadowing margin based on the model standard deviation ( 10 - m C I : Shadowing margin based on the C/I standard deviation ( 10 - N : Thermal noise M Shadowing – model ----------------------------------------------------10 M Shadowing – C I ---------------------------------------------10 ) ) Calculations The effective received carrier power is given by: C = mC CP The effective C/I is given by: C C ---- = m C I ------PIP I The above equations lead to: mC mC CP C I = -------------------------- = -------------------------= ------------ I P mC I CP CP m C I ------m C I ------IP IP mC Where ------------ corresponds to M Shadowing – model – M Shadowing – C I in dB. mC I Therefore, the effective C/(I+N) is given by: mC CP C ----------------- = --------------------------------------m I + N C ----------- I P + N mC I 4.7.1 Shadowing Margin Calculation The following sections describe the calculation method used for determining different shadowin margins. The following shadowing margins are calculated using the method described below: © Forsk 2009 AT281_TRG_E1 119 Technical Reference Guide Network Type Standard Deviation MShadowing Applied to model M Shadowing – model C C I M Shadowing – C I C/I model M Shadowing – model C Ec Io M Shadowing – Ec Io Ec/I0 Eb Nt DL M Shadowing – Eb Nt DL Eb/Nt (DL) Eb Nt UL M Shadowing – Eb Nt UL Eb/Nt (UL) GSM GPRS EGPRS UMTS HSPA CDMA2000 1xRTT 1xEV-DO model M Shadowing – model C Ec Io M Shadowing – Ec Io Ec/I0 Eb Nt DL M Shadowing – Eb Nt DL Eb/Nt (DL) Eb Nt UL M Shadowing – Eb Nt UL Eb/Nt (UL) model Eb Nt TD-SCDMA WiMAX 802.16d WiMAX 802.16e LTE 4.7.1.1 P – CCPCH M Shadowing – model M Shadowing – Eb Nt P – CCPCH C Eb/Nt P-CCPCH Eb Nt DL M Shadowing – Eb Nt DL Eb/Nt (DL) Eb Nt UL M Shadowing – Eb Nt UL Eb/Nt (UL) model M Shadowing – model C C I M Shadowing – C I C/(I+N) model M Shadowing – model C C I M Shadowing – C I C/(I+N) Shadowing Margin Calculation in Predictions Shadowing margins, MShadowing, are calculated from standard deviation values defined for the clutter class where the pixel (probe mobile) is located, and required cell edge coverage probability, and added to the path loss, Lpath. Shadowing Error PDF (1 Signal) The measured path loss in dB can be expressed as a Gaussian random variable: L = L path + dB G 0 1 where, • • • Lpath is the predicted path loss, dB is the user-defined standard deviation of the error, G(0,1) is a zero-mean unit-variance Gaussian random variable. Therefore, the probability density function (pdf) for the random (shadowing) part of path loss is: 2 1 p L x = --------------------- e dB 2 x – -------------2 2 dB The probability that the shadowing error exceeds z dB is 2 x – ------------2 2 dB PL x z = z 1 p L x dx = --------------------- e dB 2 dx z Normalising x by dividing it bydB: 1 P L x z = ----------- 2 e z-------- dB 2 x – -----2 z dx = Q --------- dB where Q is the complementary cumulative function. 120 AT281_TRG_E1 © Forsk 2009 Chapter 4: Calculations To ensure a given cell edge coverage probability, R L , for the predicted value, a shadowing margin, M Shadowing , is added to the link budget. Confidence in the prediction can be expressed as: C d = P' Tx – L P rec L P' Tx – P rec G 0 1 dB M Shadowing where, • P rec is the signal level predicted at the receiver. P rec = P' Tx – L path – M Shadowing • P' Tx = EIRP + G antRx – L Rx • • EIRP is the effective isotropic radiated power of the transmitter. L Rx are receiver losses. • G antRx is the receiver antenna gain. The shadowing margin is calculated such that: M Shadowing P C d P rec = R L M Shadowing = 1 – P L x – M Shadowing 0 = 1 – Q ------------------------------ dB A lookup table is used for mapping the values of Q vs. a set of cell edge coverage probabilities. M Shadowing Figure 4.24: Normalised Margin M arg in = ---------------------------- dB In interference-based predictions, where signal to noise ratio is calculated, the shadowing margin is only applied to the signal from the interfered transmitter (C). We consider that the interference value is not altered by the shadowing margin. Random variations also exist in the interfering signals, but taking only the average interference gives accurate results. [3] explains how a certain level of interference is maintained by congestion control in CDMA-based networks. 4.7.1.2 Shadowing Margin Calculation in Monte-Carlo Simulations Shadowing margins, MShadowing, are calculated from standard deviation values defined for the clutter class where the pixel (probe mobile) is located, and required cell edge coverage probability, and added to the path loss, Lpath. Random values are generated during Monte-Carlo simulation. Each user is assigned a service, a mobility type, an activity status, a geographic position and a random shadowing value. For each link, path loss (L) can be broken down to L = L path + . Here, is a zero mean gaussian random variable G 0 dB representing variation due to shadowing. It can be expressed as the sum of two uncorrelated zero mean gaussian random variables, L and P . L models the error related to the receiver’s location (surrounding environment), and remains the same for all links between the receiver and the base stations from which it is receiving signals. P models the error related to the path between the transmitter and the receiver. Therefore, in case of two links, we have: 1 1 = L + P for link 1 2 2 = L + P for link 2 i Standard deviations of L L and P P can be calculated from i , the model standard deviation model , and the correlation coefficient between 1 and 2 . Assuming all P have the same standard deviations, we have: 2 2 2 model = L + P © Forsk 2009 AT281_TRG_E1 121 Technical Reference Guide 2 L = ---------------2 model Therefore, 2 2 2 2 P = model 1 – L = model is set to 0.5 in Atoll, which gives: model model - and P = --------------- L = ---------------2 2 Receiver Therefore, to model shadowing error common to all the signals received at a receiver ( E Shadowing – model ), values are randomly generated for each receiver. These values have a zero-mean gaussian distribution with a standard deviation of model ---------------- , where model is the model standard deviation associated with the receiver’s clutter class. 2 Next, Atoll generates another random value for each transmitter-receiver pair. This values represents the shadowing error Path not related to the location of the receiver ( E Shadowing – model ). These values also have a zero-mean gaussian distribution model with a standard deviation ----------------- . 2 So, we have: Receiver Path E Shadowing – model = E Shadowing – model + E Shadowing – model Random shadowing error has its mean value at zero. Hence, this shadowing modelling method has no impact on the simulated network load. On the other hand, as shadowing errors on the transmitter-receiver links are uncorrelated, the method influences the calculated macro-diversity gain in case the mobile is in soft handover. 4.7.2 Macro-Diversity Gains Calculation The following sections explain how uplink and downlink macro-diversity gains are calculated in UMTS HSPA and CDMA2000 1xRTT 1xEV-DO documents for predictions and AS Analysis tab of the point analysis tool. 4.7.2.1 Uplink Macro-Diversity Gain Evaluation In UMTS HSPA and CDMA2000 1xRTT 1xEV-DO, mobiles may be in soft handoff (mobile connected to cells located on different sites). In this case, we can consider the shadowing error pdf described below. 4.7.2.1.1 Shadowing Error PDF (n Signals) For each link, path loss (L) can be broken down as: L = L path + is a zero mean gaussian random variable G 0 dB representing variation due to shadowing. It can be expressed as the sum of two uncorrelated zero mean gaussian random variables, L and P . L models error related to the receiver local environment; it is the same whichever the link. P models error related to the path between transmitter and receiver. Therefore, in case of two links, we have: 1 1 = L + P for the link 1 2 2 = L + P for the link 2 Knowing i , the uplink Eb/Nt standard deviation Eb Nt and the correlation coefficient between 1 and 2 , we UL can calculate standard deviations of L L and P P (assuming all P have the same standard deviations). We have: 2 Eb Nt 2 2 = L + P UL 2 L = ------------------------2 Eb Nt UL Therefore, 122 AT281_TRG_E1 © Forsk 2009 Chapter 4: Calculations 2 2 P = Eb Nt 2 UL 2 L = Eb Nt UL 1 – 2 Signals Without Recombination In technologies supporting soft handoff (UMTS and CDMA2000), cell is interference limited. As for one link, to ensure a required cell edge coverage probability R L for the prediction, we add to each link budget a shadowing margin, 2signals M Shadowing – Eb Nt UL . Prediction reliability in order to have Eb/Nt higher or equal to Eb/Nt from the best server can be expressed as: Cd 1 1 --------1- = P' Tx1 – L 1 – N 1 CI pred 1 P' Tx1 – L path – N 1 – CI pred 1 N1 or Cd 1 1 --------2- = P' Tx2 – L 2 – N 2 CI pred 2 P' Tx2 – L path – N 2 – CI pred 2 N2 where i CI pred is the quality level (signal to noise ratio) predicted at the receiver for link i. Ni is the noise level for link i. We note: 2signals M Shadowing – Eb Nt i UL = P' Txi – L path – N i – CI pred i and 2 1 2 1 = CI pred – CI pred 2 1 is the minimum needed margin on each link. Therefore, the probability of having a quality at least equal to the best predicted one is: noMRC RL noMRC RL Cd Cd 2signals 1 1 M Shadowing – Eb Nt = 1 – P L1 L2 --------1- CI pred --------2- CI pred UL N2 N1 2signals M Shadowing – Eb Nt = 1 – P UL 1 1 2 2signals 2signals 1 M Shadowing – Eb Nt 2 M Shadowing – Eb Nt UL 2 UL – 1 2 We can express it using L , P and P P 1 2 2signals UL = P L P L P 1 2 2signals 1 M Shadowing – Eb Nt 2 M Shadowing – Eb Nt 1 1 2 P P 2signals P M Shadowing – Eb Nt 2signals 2 UL 2signals 2signals UL 1 2signals = P L P P M Shadowing – Eb Nt P noMRC RL 2 UL – 1 L = L – L P M Shadowing – Eb Nt 1 M Shadowing – Eb Nt 2 M Shadowing – Eb Nt L 2 UL 2 UL – 1 – L 2 UL – 1 L = L 2signals – L P P M Shadowing – Eb Nt P 2 UL – 1 – L 2signals M Shadowing – Eb Nt UL 1 2signals 2 2signals 2 = 1 – P L P P M Shadowing – Eb Nt – L P P M Shadowing – Eb Nt – 1 – L d L L P UL P UL – i 2signals P P M Shadowing – Eb Nt P 1 = ----------------- 2 P M 2signals Shadowing – Eb Nt UL – L 2 e UL – L –x ---------2 2 P 2signals M Shadowing – Eb Nt UL – L dx = Q ---------------------------------------------------------------------- P Then, we have: © Forsk 2009 AT281_TRG_E1 123 Technical Reference Guide noMRC RL 2signals M Shadowing – Eb Nt UL 2signals 2signals 2 M Shadowing – Eb Nt UL – L M Shadowing – Eb Nt UL – 1 – L = 1 – P L Q ---------------------------------------------------------------------- Q ----------------------------------------------------------------------------------- d L L P P – If we introduce user defined standard deviation Eb Nt and correlation coefficient , and consider that P is a UL L Gaussian pdf: noMRC RL 2signals M Shadowing – Eb Nt UL 1 = 1 – ----------- e 2 – 2 – xL --------2 M 2signals Shadowing – Eb Nt UL 2 M 2signals – x L Eb Nt Shadowing – Eb Nt UL – x L Eb Nt UL – 1 UL - Q -------------------------------------------------------------------------------------------------------------------- dx L Q ------------------------------------------------------------------------------------------------------ 1– 1– Eb Nt Eb Nt UL UL n Signals Without Recombination We can generalize the previous expression to n signals (n is the number of available signals - Atoll may consider up to 3 signals): noMRC RL nsignals M Shadowing – Eb Nt UL 1 = 1 – ----------- e 2 – 2 – xL --------2 M nsignals Shadowing – Eb Nt UL 2 M nsignals – x L Eb Nt Shadowing – Eb Nt UL – x L Eb Nt UL – 1 UL - Q -------------------------------------------------------------------------------------------------------------------- dx L Q ------------------------------------------------------------------------------------------------------ 1– 1– Eb Nt Eb Nt UL UL The case where softer handoff occurs (two signals from co-site cells) is equivalent to the one signal case. The Softer/soft case is equivalent to the two signals case. For the path associated with the softer recombination, we will use combined SNR to calculate the availability of the link. Correlation Coefficient Determination There is currently no agreed model for predicting correlation coefficient between 1 and 2 . Two key variables influence correlation: • • The angle between the two signals. If this angle is small, correlation is high. The relative values of the two signal lengths. If angle is 0 and lengths are the same, correlation is zero. Correlation is different from zero when path lengths differ. A simple model has been found [1]: T = ------ D1 -------- when T D2 T is a function of the mean size of obstacles near the receiver and is also linked to the receiver environment. In a normal handover status, assuming a hexagonal design for sites, is close to (+/- /3) and D1/D2 is close to 1. In [1,5], = 0.5 when = 0.3 and T = ------ . 10 In Atoll, is set to 0.5. 4.7.2.1.2 Uplink Macro-Diversity Gain UL Atoll determines the uplink macro-diversity gain ( G macro – diversity ) from the shadowing margins calculated in case of one signal and n signals. Therefore, we have: UL nsignals G macro – diversity = M Shadowing – Eb Nt UL – M Shadowing – Eb Nt UL Where n is the number of cell-mobile signals. 4.7.2.2 Downlink Macro-Diversity Gain Evaluation In UMTS HSPA and CDMA2000 1xRTT 1xEV-DO, in case of soft handoff, mobiles are able to switch from one cell to another if the best pilot drastically fades. To model this function, we have to consider the probability of fading over the shadowing margin, both for the best signal and for all the other available signals, in the shadowing margin calculation. Let us consider the shadowing error pdf described below. 124 AT281_TRG_E1 © Forsk 2009 Chapter 4: Calculations 4.7.2.2.1 Shadowing Error PDF (n Signals) For each link, path loss (L) can be broken down as: L = L path + is a zero mean gaussian random variable G 0 dB representing variation due to shadowing. It can be expressed as the sum of two uncorrelated zero mean gaussian random variables, L and P . L models the error related to the receiver local environment, which is the same for all links. P models the error related to the path between the transmitter and the receiver. Therefore, in case of two links, we have: 1 1 = L + P for the link 1 2 2 = L + P for the link 2 Knowing i , the Ec/Io standard deviation Ec I o and the correlation coefficient between 1 and 2 , we can calculate standard deviations of L L and P P (assuming all P have the same standard deviations). We have: 2 2 2 Ec I o = L + P 2 L = --------------2 Ec I o Therefore, 2 2 2 2 P = Ec I o 1 – L = Ec I o 2 Available Signals In technologies supporting soft handoff (UMTS and CDMA2000) cells are interference limited. As for one link, to ensure a 2signals required cell edge coverage probability R L for the prediction, we add a shadowing margin, M Shadowing – Ec Io , to each link budget. Ec Ec Prediction reliability to have ------- ------- for the best server can be expressed as: Io Io pred Ec Ec 1 Ec 1 ---------1- = P pilot – L 1 – Io ------- 1 P pilot – L m – Io – ------- Io pred Io pred 1 1 1 Io Or Ec Ec 1 Ec 1 ---------2- = P pilot – L 2 – Io ------- 2 P pilot – L m – Io – ------- Io pred Io pred 2 2 2 Io We note: 1 Ec 2signals M Shadowing – Ec Io = P pilot – L m – Io – ------- Io pred i i Ec 1 Ec 2 2 1 = ------- – ------- Io pred Io pred 2 1 is the minimum needed margin on each link. Therefore, probability of having a quality at least equal to the best predicted one is: noMRC RL noMRC RL Ec 1 Ec 2 Ec 1 Ec 1 2signals M Shadowing – Ec Io = 1 – P L1 L2 ---------- ------- ---------- ------- Io Io pred Io Io pred 2signals 2signals 2signals 2 M Shadowing – Ec Io = 1 – P 1 2 1 M Shadowing – Ec Io 2 M Shadowing – Ec Io – 1 1 2 We can express it by using L , P and P 2signals 2signals 2 P 1 2 1 M Shadowing – Ec Io 2 M Shadowing – Ec Io – 1 L = L = P L P L © Forsk 2009 1 1 2 P P 2signals 2 2signals 2 P M Shadowing – Ec Io – L P M Shadowing – Ec Io – 1– L AT281_TRG_E1 125 Technical Reference Guide 2signals 2signals 2 P 1 2 1 M Shadowing – Ec Io 2 M Shadowing – Ec Io – 1 L = L 1 2signals 2 2signals 2 = P L P P M Shadowing – Ec Io – L P P M Shadowing – Ec Io – 1 – L L P noMRC RL P 2signals M Shadowing – Ec Io = 1– P L P P MShadowing – Ec Io – L P P MShadowing – Ec Io – 1 – L dL 1 L 2signals 2 P 2signals 2 P – 2 1 i 2signals P P M Shadowing – Ec Io – L = -----------------P P 2 e SHO – L –x ---------2 2 P 2signals M Shadowing – Ec Io – L dx = Q ------------------------------------------------------------ P Then, we have: noMRC 2signals RL M Shadowing – Ec Io = 1– – 2signals 2signals 2 M Shadowing – Ec Io – L M Shadowing – Ec Io – 1 – L P L Q ------------------------------------------------------------ Q ------------------------------------------------------------------------- d L L P P If we introduce a user defined Ec/Io standard deviation and a correlation coefficient and consider that P is a L Gaussian pdf: noMRC RL 2signals M Shadowing – Ec Io 2 1 = 1 – ----------2 e –xL --------2 – 2signals 2signals 2 M Shadowing – Ec Io – x L Ec I o M Shadowing – Ec Io – 1 – x L Ec I o Q ------------------------------------------------------------------------------------ Q ------------------------------------------------------------------------------------------------- dx L Ec I o 1 – Ec I o 1 – n Available Signals We can generalize the previous expression for n signals (n is the number of available signals - Atoll may consider up to 3 signals): noMRC RL nsignals M Shadowing – Ec Io 2 1 = 1 – ----------2 – e –xL --------2 nsignals M Shadowing – Ec Io – x L Ec I o Q ------------------------------------------------------------------------------------ x Ec I o 1 – n i=2 nsignals i M Shadowing – Ec Io – 1 – x L Ec I o Q ------------------------------------------------------------------------------------------------- dx L Ec I o 1 – 2 1 =1 dB 2 1 =5 dB 2 1 =10 dB Figure 4.25: Margin - Probability (Case of 2 Signals) 126 AT281_TRG_E1 © Forsk 2009 Chapter 4: Calculations 2 signals 3 1 =5 dB 3 1 =10 dB Figure 4.26: Margin - Probability (Case of 3 Signals with sigma = 8dB, delta1 = 1dB) 2 signals 3 1 =5 dB 3 1 =10 dB Figure 4.27: Margin - Probability (Case of 3 Signals with sigma = 8dB, delta1 = 2dB) Correlation Coefficient Determination For further information about determination of the correlation coefficient, please see "Correlation Coefficient Determination" on page 127. 4.7.2.2.2 Downlink Macro-Diversity Gain DL Atoll determines the downlink macro-diversity gain ( G macro – diversity ) from the shadowing margins calculated in case of one signal and n signals. Therefore, we have: DL nsignals G macro – diversity = M Shadowing – Ec Io – M Shadowing – Ec Io Where n is the number of available signals. Note: • Atoll uses the DL macro-diversity gain to calculate Ec/Io. You can force Atoll not to take it into account through the Atoll.ini file (see Atoll administration files). You must create this file and place it in the Atoll installation directory. 4.8 Appendices 4.8.1 Transmitter Radio Equipment Radio equipment such as TMA, feeder and BTS, are taken into account to evaluate: • Total UL and DL losses of transmitter ( L total – UL L total – DL ) and transmitter noise figure NF Tx in UMTS HSPA, • CDMA2000 1xRTT 1xEV-DO, TD-SCDMA, WiMAX 802.16d, WiMAX 802.16e, and LTE documents, Transmitter total losses L Total in GSM GPRS EGPRS documents. In Atoll, the transmitter-equipment pair is modelled a single entity. The entry to the BTS is considered the reference point which is the location of the transmission/reception parameters. © Forsk 2009 AT281_TRG_E1 127 Technical Reference Guide Figure 4.28: Reference Point - Location of the Transmission/Reception parameters Notes: • According to the book “Radio network planning and optimisation for UMTS” by Laiho J., Wacker A., Novosad T., the noise figure corresponds to the loss in case of passive components. Therefore, feeder noise figure is equal to the cable uplink losses. UL NF Feeder = L Feeder • 4.8.1.1 Loss and gain inputs specified in .atl documents must be positive values. UMTS HSPA, CDMA2000 1xRTT 1xEV-DO, and TD-SCDMA Documents As the reference point is the BTS entry, the transmitter noise figure corresponds to the BTS noise figure. Therefore, we have: NF TX = NF BTS where NF BTS is the BTS noise figure. Atoll calculates total UL losses as follows: UL UL UL UL L Total – UL = L Misc + L Feeder + L BTS – Conf + NR Repeaters – G Ant – div – G TMA where, UL L Misc are the miscellaneous reception losses (Transmitter property), UL UL UL UL UL L Feeder are the feeder reception losses ( L Feeder = L Feeder I Feeder + L Connector , where L Feeder , I Feeder and UL L Connector are respectively the feeder loss per metre (Feeder property), the reception feeder length in metre (Transmitter property) and the connector reception losses, UL L BTS – Conf are the losses due to BTS configuration (BTS property), UL G Ant – div is the antenna diversity gain (Transmitter property), NR Repeaters is the noise rise at transmitter due to repeaters. This parameter is taken into account only if the transmitter has active repeater(s), G TMA is the gain due to TMA. The noise rise at transmitter due to repeaters is calculated as follows: For each active repeater ( k ), Atoll calculates a noise injection margin ( NIM Rp ). This is the difference between the donor k transmitter noise figure ( NF TX ) and the repeater noise figure received at the donor. Rp k NIM Rp = NF TX – NF Rp + G amp – L r k TX – Rp k where, NF Rp is the repeater noise figure, k Rp k G amp is the repeater amplification gain (repeater property), L TX – R p k are the losses between the donor transmitter and the repeater (repeater property). For each active repeater ( k ), Atoll converts the noise injection margin ( NIM Rp ) to Watt. Then, it uses the values to calcuk late the noise rise at the donor transmitter due to active repeaters ( NR Repeaters ). 128 AT281_TRG_E1 © Forsk 2009 Chapter 4: Calculations NR Repeaters = 10 Log 1 + 1 - -----------------NIM Rp r r The gain due to TMA is calculated as follows: WithoutTMA WithTMA G TMA = NF Composite – NF Composite where, WithTMA WithoutTMA NF Composite and NF Composite are the composite noise figures with and without TMA respectively. Friis' equation is used to calculate the composite noise figure when there is a TMA. WithTMA NF Composite NF Feeder NF BTS NF -------------------------------------------TMA ------------------ 10 10 10 10 10 –1 –1 -----------------------------------------------+ ----------------------------------+ = 10 Log 10 UL UL UL G TMA G TMA G Feeder ---------------------------------------------------- 10 10 10 10 10 10 WithoutTMA And, NF Composite = NF BTS + NF Feeder where, NF Feeder is the feeder noise figure, NF TMA is the TMA noise figure, NF BTS is the BTS noise figure, UL G TMA is the TMA reception gain, UL UL UL G Feeder is the feeder UL gain; G Feeder = – L Feeder . UL UL UL UL UL UL L Feeder is the feeder reception loss ( L Feeder = L Feeder I Feeder + L Connector , where L Feeder , I Feeder and L Connector are respectively the feeder loss per metre, the reception feeder length in metre and the connector reception loss), Atoll calculates total DL losses as follows. DL DL DL DL L Total – DL = L TMA + L Feeder + L Misc + L BTS – Conf where, DL L TMA is the TMA transmission loss, DL DL DL DL DL L Feeder is the feeder transmission loss ( L Feeder = L Feeder I Feeder + L Connector , where L Feeder , I Feeder and DL L Connector are respectively the feeder loss per metre, the transmission feeder length in metre and the connector transmission losses), DL L Misc are the miscellaneous transmission losses, DL L BTS – Conf are the losses due to BTS configuration (BTS property). 4.8.1.2 GSM GPRS EGPRS Documents Atoll calculates DL total losses as follows: DL DL DL DL L Total – DL = L TMA + L Feeder + L Misc + L BTS – Conf where, DL L TMA is the TMA transmission loss, DL DL DL DL DL L Feeder is the feeder transmission loss ( L Feeder = L Feeder I Feeder + L Connector , where L Feeder , I Feeder and DL L Connector are respectively the feeder loss per metre, the transmission feeder length in metre and the connector transmission loss), DL L Misc are the miscellaneous transmission losses, DL L BTS – Conf are the losses due to BTS configuration (BTS property). © Forsk 2009 AT281_TRG_E1 129 Technical Reference Guide 4.8.1.3 WiMAX 802.16d and WiMAX 802.16e Documents As the reference point is the BTS entry, the transmitter noise figure corresponds to the BTS noise figure. Therefore, we have: NF TX = NF BTS where NF BTS is the BTS noise figure. Atoll calculates total UL losses as follows: UL UL UL L Total – UL = L Misc + L Feeder + L BTS – Conf – G TMA where, UL L Misc are the miscellaneous reception losses (Transmitter property), UL UL UL UL UL L Feeder are the feeder reception losses ( L Feeder = L Feeder I Feeder + L Connector , where L Feeder , I Feeder and UL L Connector are respectively the feeder loss per metre (Feeder property), the reception feeder length in metre (Transmitter property) and the connector reception losses, UL L BTS – Conf are the losses due to BTS configuration (BTS property), G TMA is the gain due to TMA, which is calculated as follows: WithoutTMA WithTMA G TMA = NF Composite – NF Composite where, WithTMA WithoutTMA NF Composite and NF Composite are the composite noise figures with and without TMA respectively. Friis' equation is used to calculate the composite noise figure when there is a TMA. WithTMA NF Composite NF Feeder NF BTS NF ------------------------------------------TMA ------------------ 10 10 10 10 10 –1 –1 -----------------------------------------------+ ----------------------------------+ = 10 Log 10 UL UL UL G TMA G TMA G Feeder ---------------------------------------------------- 10 10 10 10 10 10 WithoutTMA And, NF Composite = NF BTS + NF Feeder where, NF Feeder is the feeder noise figure, NF TMA is the TMA noise figure, NF BTS is the BTS noise figure, UL G TMA is the TMA reception gain, UL UL UL G Feeder is the feeder UL gain; G Feeder = – L Feeder . UL UL UL UL UL UL L Feeder is the feeder reception loss ( L Feeder = L Feeder I Feeder + L Connector , where L Feeder , I Feeder and L Connector are respectively the feeder loss per metre, the reception feeder length in metre and the connector reception loss), Atoll calculates total DL losses as follows. DL DL DL DL L total – DL = L TMA + L Feeder + L Misc + L BTS – Conf where, DL L TMA is the TMA transmission loss, DL DL DL DL DL L Feeder is the feeder transmission loss ( L Feeder = L Feeder I Feeder + L Connector , where L Feeder , I Feeder and DL L Connector are respectively the feeder loss per metre, the transmission feeder length in metre and the connector transmission losses), DL L Misc are the miscellaneous transmission losses, DL L BTS – Conf are the losses due to BTS configuration (BTS property). 130 AT281_TRG_E1 © Forsk 2009 Chapter 4: Calculations 4.8.1.4 LTE Documents As the reference point is the BTS entry, the transmitter noise figure corresponds to the BTS noise figure. Therefore, we have: NF TX = NF BTS where NF BTS is the BTS noise figure. Atoll calculates total UL losses as follows: UL UL UL L Total – UL = L Misc + L Feeder + L BTS – Conf – G TMA where, UL L Misc are the miscellaneous reception losses (Transmitter property), UL UL UL UL UL L Feeder are the feeder reception losses ( L Feeder = L Feeder I Feeder + L Connector , where L Feeder , I Feeder and UL L Connector are respectively the feeder loss per metre (Feeder property), the reception feeder length in metre (Transmitter property) and the connector reception losses, UL L BTS – Conf are the losses due to BTS configuration (BTS property), G TMA is the gain due to TMA, which is calculated as follows: WithoutTMA WithTMA G TMA = NF Composite – NF Composite where, WithTMA WithoutTMA NF Composite and NF Composite are the composite noise figures with and without TMA respectively. Friis' equation is used to calculate the composite noise figure when there is a TMA. WithTMA NF Composite NF Feeder NF BTS NF -------------------------------------------TMA ------------------ 10 10 10 10 10 –1 –1 -----------------------------------------------+ ----------------------------------+ = 10 Log 10 UL UL UL G TMA G TMA G Feeder ---------------------------------------------------- 10 10 10 10 10 10 WithoutTMA And, NF Composite = NF BTS + NF Feeder where, NF Feeder is the feeder noise figure, NF TMA is the TMA noise figure, NF BTS is the BTS noise figure, UL G TMA is the TMA reception gain, UL UL UL G Feeder is the feeder UL gain; G Feeder = – L Feeder . UL UL UL UL UL UL L Feeder is the feeder reception loss ( L Feeder = L Feeder I Feeder + L Connector , where L Feeder , I Feeder and L Connector are respectively the feeder loss per metre, the reception feeder length in metre and the connector reception loss), Atoll calculates total DL losses as follows. DL DL DL DL L total – DL = L TMA + L Feeder + L Misc + L BTS – Conf where, DL L TMA is the TMA transmission loss, DL DL DL DL DL L Feeder is the feeder transmission loss ( L Feeder = L Feeder I Feeder + L Connector , where L Feeder , I Feeder and DL L Connector are respectively the feeder loss per metre, the transmission feeder length in metre and the connector transmission losses), DL L Misc are the miscellaneous transmission losses, DL L BTS – Conf are the losses due to BTS configuration (BTS property). © Forsk 2009 AT281_TRG_E1 131 Technical Reference Guide 4.8.2 Secondary Antennas When secondary antennas are installed on a transmitter, the signal level received from it is calculated as follows: G ant – m Tx G ant – i X i -----------------------Tx P Tx 1 – P Tx X i ---------------------- L Tx L Tx i -----------------------------------------------------------------------+ --------------------------------------------- L ant – m az m el m L ant – i az i el i Tx Tx i = ------------------------------------------------------------------------------------------------------------------------------------------- (not in dB2) L model P rec Where, PTx is the transmitter power (Ppilot in UMTS HSPA and CDMA2000 1xRTT 1xEV-DO, PP-CCPCH in TD-SCDMA, PPreamble in WiMAX 802.16d and WiMAX 802.16e, and PDLRS in LTE), i is the secondary antenna index, xi is the percentage of power dedicated to the secondary antenna, i, G ant – m Tx is the gain of the main antenna installed on the transmitter, LTx are transmitter losses (LTx=Ltotal-DL), G ant – i Tx is the gain of the secondary antenna, i, installed on the transmitter, Lmodel is the path loss calculated by the propagation model, L ant – m az m el m is the attenuation due to main antenna pattern, Tx L ant – i az i el i is the attenuation due to pattern of the secondary antenna, i. Tx The definition of angles, az and el, depends on the used calculation method. • • 2. 132 Method 1 (must be indicated in an Atoll.ini file): - azm: the difference between the receiver antenna azimuth and azimuth of the transmitter main antenna, - elm: the difference between the receiver antenna tilt and tilt of the transmitter main antenna, - azi : the difference between the receiver antenna azimuth and azimuth of the transmitter secondary antenna, i, - eli : the difference between the receiver antenna tilt and tilt of the transmitter secondary antenna, i, Method 2 (default): - azm : the receiver azimuth in the coordinate system of the transmitter main antenna, - elm : the receiver tilt in the coordinate system of the transmitter main antenna, - azi : the receiver azimuth in the coordinate system of the transmitter secondary antenna, i, - eli : the receiver tilt in the coordinate system of the transmitter secondary antenna, i. Formula cannot be directly calculated from components stated in dB and must be converted in linear values. AT281_TRG_E1 © Forsk 2009 Chapter 5 GSM/GPRS/EDGE Networks This chapter provides descriptions of all the algorithms for calculations, analyses, automatic allocations and prediction studies available in GSM GPRS EDGE projects. Atoll RF Planning & Optimisation Software Technical Reference Guide 134 AT281_TRG_E1 © Forsk 2009 Chapter 5: GSM GPRS EDGE Networks 5 GSM GPRS EDGE Networks 5.1 General Prediction Studies 5.1.1 Calculation Criteria Three criteria can be studied in point analysis (Profile tab) and in general coverage studies. Study criteria are detailed in the table below. Study criteria Formulas Signal level received from a transmitter on a TRX type Txi Signal level ( P rec ) Txi Txi P rec tt = EIRP tt – P tt – L path – M Shadowing – model – L Indoor + G ant Rx – L Rx Txi Txi L path = L model + L ant Path loss ( L path ) Txi Txi Tx Txi L total = L path + M Shadowing – model + L Indoor + L Tx + L Rx – G ant Total losses ( L total ) Tx + G ant Rx where, EIRP is the effective isotropic radiated power of the transmitter, L model is the loss on the transmitter-receiver path (path loss) calculated by the propagation model, L ant Tx is the transmitter antenna attenuation (from antenna patterns), M Shadowing – model is the shadowing margin. This parameter is taken into account when the option “Shadowing taken into account” is selected, L Indoor are the indoor losses, taken into account when the option “Indoor coverage” is selected, L Rx are the receiver losses, G ant Rx is the receiver antenna gain, P is the power offset defined for the selected TRX type in the transmitter property dialog, tt is the TRX type (in the GSM GPRS EGPRS.mdb document template, there are three possible TRX types, BCCH, TCH and inner TCH). 5.1.2 Point Analysis 5.1.2.1 Profile Tab Txi Atoll displays the signal level received from the selected transmitter on a TRX type ( P rec tt ). Notes: • If power offsets of subcells are identical, field level received from a selected transmitter will be the same for all the studied TRX types. • For a selected transmitter, it is also possible to study the path loss, L path , or the total Txi Txi losses, L total . Path loss and total losses are the same on any TRX type. 5.1.2.2 Reception Tab Analysis provided in the Reception tab is based on path loss matrices. So, you can study reception from TBC transmitters for which path loss matrices have been computed on their calculation areas. Txi For each transmitter, Atoll displays the signal level received on a TRX type, ( P rec tt ). Reception bars are displayed in a decreasing signal level order. The maximum number of reception bars depends on the signal level received from the best server. Only reception bars of transmitters whose signal level is within a 30 dB margin from the best server can be displayed. © Forsk 2009 AT281_TRG_E1 135 Technical Reference Guide Notes: • If power offsets of subcells are identical, field level received from a given transmitter will be the same whichever the studied TRX type. • It is also possible to study the path loss, L path , or the total losses, L total of each • You can use a value other than 30 dB for the margin from the best server signal level, for example a smaller value for improving the calculation speed. For more information on defining a different value for this margin, see the Administrator Manual. Txi Txi transmitter. Path loss and total losses are the same on any TRX type. 5.1.3 Coverage Studies For each TBC transmitter, Txi, Atoll determines the selected criterion on each bin inside the Txi calculation area. In fact, each bin within the Txi calculation area is considered as a potential (fixed or mobile) receiver. Coverage study parameters to be set are: • • 5.1.3.1 The study conditions in order to determine the service area of each TBC transmitter, The display settings to select how to colour service areas. Service Area Determination Atoll uses parameters entered in the Condition tab of the coverage study property dialog to predetermine areas where it will display coverage. We can distinguish seven cases as below. Let us assume that: • • 5.1.3.1.1 Each transmitter, Txi, belongs to a Hierarchical Cell Structure (HCS) layer, k, with a defined priority and a defined reception threshold. The maximum range option (available in the System tab of the Predictions property dialog) is inactive. All Servers For each HCS layer, k, the service area of Txi corresponds to the bins where: Txi Txi MinimumThreshold P rec tt or L tot orTotal – Losses Txi MaximumThreshold Note: • 5.1.3.1.2 The minimum threshold is either globally defined or specifically for each subcell (subcell reception threshold) Best Signal Level and a Margin The service area of Txi corresponds to the bins where: Txi Txi Txi MinimumThreshold P rec ic or L total or L path MaximumThreshold And Txi Txj P rec ic Best P rec ic – M ji M is the specified margin (dB). Best function: considers the highest value. Notes: • If the margin equals 0 dB, Atoll will consider bins where the signal level received from Txi is the highest. • If the margin is set to 2 dB, Atoll will consider bins where the signal level received from Txi is either the highest or 2dB lower than the highest. • If the margin is set to -2 dB, Atoll will consider bins where the signal level received from Txi is 2dB higher than the signal levels from transmitters, which are 2nd best servers. 5.1.3.1.3 Second Best Signal Level and a Margin The service area of Txi corresponds to the bins where: Txi Txi Txi MinimumThreshold P rec ic or L total or L path MaximumThreshold And Txi P rec ic 2 136 nd Best P Txj ic – M rec ji AT281_TRG_E1 © Forsk 2009 Chapter 5: GSM GPRS EDGE Networks M is the specified margin (dB). 2nd Best function: considers the second highest value. Notes: • If the margin equals 0 dB, Atoll will consider bins where the signal level received from Txi is the second highest. • If the margin is set to 2 dB, Atoll will consider bins where the signal level received from Txi is either the second highest or 2dB lower than the second highest. • If the margin is set to -2 dB, Atoll will consider bins where the signal level received from Txi is 2dB higher than the signal levels from transmitters, which are 3rd best servers. 5.1.3.1.4 Best Signal Level per HCS Layer and a Margin For each HCS layer, k, the service area of Txi corresponds to the bins where: Txi Txi MinimumThreshold P rec tt or L tot orTotal – Losses Txi MaximumThreshold And Txi Txj P rec BCCH Best P rec BCCH – M ji M is the specified margin (dB). Best function: considers the highest value. Notes: • If the margin equals 0 dB, Atoll will consider bins where the signal level received from Txi is the highest. • If the margin is set to 2 dB, Atoll will consider bins where the signal level received from Txi is either the highest or 2dB lower than the highest. • If the margin is set to -2 dB, Atoll will consider bins where the signal level received from Txi is 2dB higher than the signal levels from transmitters that are the 2nd best servers. 5.1.3.1.5 HCS Servers and a Margin For each HCS layer, k, the service area of Txi corresponds to the bins where: Txi Txi MinimumThreshold P rec tt or L tot orTotal – Losses Txi MaximumThreshold And Txi Txj P rec BCCH Best P rec BCCH – M ji Txi The received P rec tt exceeds the reception threshold defined per HCS layer M is the specified margin (dB). Best function: considers the highest value. Notes: • If the margin equals 0 dB, Atoll will consider bins where the signal level received from Txi is the highest. • If the margin is set to 2 dB, Atoll will consider bins where the signal level received from Txi is either the highest or 2dB lower than the highest. • If the margin is set to -2 dB, Atoll will consider bins where the signal level received from Txi is 2dB higher than the signal levels from transmitters that are the 2nd best servers. 5.1.3.1.6 Highest Priority HCS Server and a Margin In this case, the service area of Txi corresponds to the bins where: Txi Txi MinimumThreshold P rec tt or L tot orTotal – Losses Txi MaximumThreshold And Txi Txj P rec BCCH Best P rec BCCH – M ji And © Forsk 2009 AT281_TRG_E1 137 Technical Reference Guide Txi belongs to the HCS layer with the highest priority. The highest priority is defined by the priority field (0: lowest) assumTxi ing the received P rec tt exceeds the reception threshold defined per HCS layer. M is the specified margin (dB). Best function: considers the highest value. Notes: • If the margin equals 0 dB, Atoll will consider bins where the signal level received from Txi is the highest. • If the margin is set to 2 dB, Atoll will consider bins where the signal level received from Txi is either the highest or 2dB lower than the highest. • If the margin is set to -2 dB, Atoll will consider bins where the signal level received from Txi is 2dB higher than the signal levels from transmitters that are the 2nd best servers. • 5.1.3.1.7 In the case two layers have the same priority, the traffic is served by the transmitter for which the difference between the received signal strength and the HCS threshold is the highest. The way the competition is managed between layers with the same priority can be modified. For more information, see the Administrator Manual. Second Best Signal Level per HCS Layer and a Margin For each HCS layer, k, the service area of Txi corresponds to the bins where: Txi Txi MinimumThreshold P rec tt or L tot orTotal – Losses Txi MaximumThreshold And Txi P rec BCCH 2 nd Best P Txj BCCH – M rec ji M is the specified margin (dB). 2nd Best function: considers the second highest value. Notes: • If the margin equals 0 dB, Atoll will consider bins where the signal level received from Txi is the second highest. • If the margin is set to 2 dB, Atoll will consider bins where the signal level received from Txi is either the second highest or 2dB lower than the second highest. • If the margin is set to -2 dB, Atoll will consider bins where the signal level received from Txi is 2dB higher than the signal levels from transmitters that are the 3rd best servers. 5.1.3.1.8 Best Idle Mode Reselection Criterion (C2) Such type of coverage would is useful : • • To compare Idle and Dedicated mode best servers for Voice traffic Display the GPRS/EDGE best server map (based on GSM idle mode) The path loss criterion parameter C1 used for cell selection and reselection is defined by : Txi C1 = P rec BCCH – MinimumThreshold BCCH The path loss criterion (GSM03.22) is satisfied if C1 0 . The reselection criterion C2 is used for cell reselection only and is defined by : C2 = C1 + CELL_RESELECT_OFFSET where CELL_RESELECT_OFFSET is the Cell Reselect Offset (in dB) defined for at the transmitter level. The service area of Txi corresponds to the bins where: Txi Txi Txi MinimumThreshold P rec BCCH or L total or L path MaximumThreshold And C2 Txi Txj BCCH = Best C2 BCCH j Best function: considers the highest value. On each bin, the best C2 value is kept. It corresponds to the best server in Idle Mode. Since the C2 value is an integer value, so must be rounded. 138 AT281_TRG_E1 © Forsk 2009 Chapter 5: GSM GPRS EDGE Networks 5.1.3.2 Coverage Display 5.1.3.2.1 Plot Resolution Prediction plot resolution is independent of the matrix resolutions and can be defined on a per study basis. Prediction plots are generated from multi-resolution path loss matrices using bilinear interpolation method (similar to the one used to evaluate site altitude). 5.1.3.2.2 Display Types It is possible to display the transmitter service area with colours depending on any transmitter attribute or other criteria such as: Signal Level (in dBm, dBµV, dBµV/m) Atoll calculates signal level received from the transmitter on each bin of each transmitter service area. A bin of a service area is coloured if the signal level exceeds ( ) the defined minimum thresholds (bin colour depends on signal level). Coverage consists of several independent layers whose visibility in the workspace can be managed. There are as many layers as transmitter service areas. Each layer shows the different signal levels available in the transmitter service area. Best Signal Level (in dBm, dBµV, dBµV/m) Atoll calculates signal levels received from transmitters on each bin of each transmitter service area. When other serviceWhen other service areas overlap the studied one, Atoll chooses the highest value. A bin of a service area is coloured if the signal level exceeds ( ) the defined thresholds (the bin colour depends on the signal level). Coverage consists of several independent layers whose visibility in the workspace can be managed. There are as many layers as defined thresholds. Each layer corresponds to an area where the signal level from the best server exceeds a defined minimum threshold. Path Loss (dB) Atoll calculates path loss from the transmitter on each bin of each transmitter service area. A bin of a service area is coloured if path loss exceeds ( ) the defined minimum thresholds (bin colour depends on path loss). Coverage consists of several independent layers whose visibility in the workspace can be managed. There are as many layers as service areas. Each layer shows the different path loss levels in the transmitter service area. Total Losses (dB) Atoll calculates total losses from the transmitter on each bin of each transmitter service area. A bin of a service area is coloured if total losses exceed ( ) the defined minimum thresholds (bin colour depends on total losses). Coverage consists of several independent layers whose visibility in the workspace can be managed. There are as many layers as service areas. Each layer shows the different total losses levels in the transmitter service area. Best Server Path Loss (dB) Atoll calculates signal levels received from transmitters on each bin of each transmitter service area. When other service areas overlap the studied one, Atoll determines the best transmitter and evaluates path loss from the best transmitter. A bin of a service area is coloured if the path loss exceeds ( ) the defined thresholds (bin colour depends on path loss). Coverage consists of several independent layers whose visibility in the workspace can be managed. There are as many layers as defined thresholds. Each layer corresponds to an area where the path loss from the best server exceeds a defined minimum threshold. Best Server Total Losses (dB) Atoll calculates signal levels received from transmitters on each bin of each transmitter service area. Where service areas overlap the studied one, Atoll determines the best transmitter and evaluates total losses from the best transmitter. A bin of a service area is coloured if the total losses exceed ( ) the defined thresholds (bin colour depends on total losses). Coverage consists of several independent layers whose visibility in the workspace can be managed. There are as many layers as defined thresholds. Each layer corresponds to an area where the total losses from the best server exceed a defined minimum threshold. Number of Servers Atoll evaluates how many service areas cover a bin in order to determine the number of servers. The bin colour depends on the number of servers. Coverage consists of several independent layers whose visibility in the workspace can be managed. There are as many layers as defined thresholds. Each layer corresponds to an area where the number of servers exceeds ( ) a defined minimum threshold. Cell Edge Coverage Probability (%) On each bin of each transmitter service area, the coverage corresponds to the pixels where the signal level from this transmitter fulfils signal conditions defined in Conditions tab with different cell edge coverage probabilities. There is one coverage area per transmitter in the explorer. © Forsk 2009 AT281_TRG_E1 139 Technical Reference Guide Best Cell Edge Coverage Probability (%) On each bin of each transmitter service area, the coverage corresponds to the pixels where the best signal level received fulfils signal conditions defined in Conditions tab. There is one coverage area per cell edge coverage probability in the explorer. Best C2 (dBm) Atoll calculates C2 values received from transmitters on each bin of each transmitter service area. When other service areas overlap the studied one, Atoll chooses the highest value. A bin of a service area is coloured if the C2 value exceeds ( ) the defined thresholds (the bin colour depends on the C2 value). Coverage consists of several independent layers whose visibility in the workspace can be managed. There are as many layers as defined thresholds. Each layer corresponds to an area where the best C2 value exceeds a defined minimum threshold. 5.2 Traffic Analysis When starting a traffic analysis, Atoll distributes the traffic from maps to transmitters of each layer according to the compatibility criteria defined in the transmitter, services, mobility type, terminal type properties. Transmitters considered in traffic analysis are the active and filtered transmitters that belong to the focus zone. Notes: • If no focus zone exists in the .atl document, Atoll takes into account the computation zone. • For details of the average timeslot capacity calculation, see the Network Dimensioning section (calculation of minimum reduction factor). 5.2.1 Traffic Distribution 5.2.1.1 Normal Cells (Nonconcentric, No HCS Layer) 5.2.1.1.1 Circuit Switched Services A user with a given circuit switched service, c, a terminal, t, and a mobility type, m, will be distributed to the BCCH and TCH subcells of a transmitter if: • • 5.2.1.1.2 The terminal, t, works on the frequency band used by the BCCH subcell, The terminal, t, works on the frequency band used by the TCH subcell. Packet Switched Services A user with a given packet switched service, p, a terminal, t, and a mobility type, m, will be distributed to the BCCH and TCH subcells of a transmitter if: • • • • 5.2.1.2 The transmitter is an GPRS/EDGE station (option specified in the transmitter property dialog), The terminal, t, is technologically compatible with the transmitter, The terminal, t, works on the frequency band used by the BCCH subcell, The terminal, t, works on the frequency band used by the TCH subcell. Concentric Cells In case of concentric cells, TCH_INNER TRX type has the highest priority to carry traffic. 5.2.1.2.1 Circuit Switched Services A user with a given circuit switched service, c, a terminal, t, and a mobility type, m, will be distributed to the TCH_INNER, BCCH and TCH subcells of a transmitter if: • • 5.2.1.2.2 The terminal, t, works on the frequency band used by the BCCH subcell, The terminal, t, works on the frequency band(s) used by the TCH_INNER and TCH subcells. Packet Switched Services A user with a given packet switched service, p, a terminal, t, and a mobility type, m, will be distributed to the TCH_INNER, BCCH and TCH subcells of a transmitter if: • • • • 5.2.1.3 The transmitter is an GPRS/EDGE station (option specified in the transmitter property dialog), The terminal, t, is technologically compatible with the transmitter, The terminal, t, works on the frequency band used by the BCCH subcell, The terminal, t, works on the frequency band(s) used by the TCH_INNER and TCH subcells. HCS Layers For each HCS layer, k, you may specify the maximum mobile speed supported by the transmitters of the layer. 140 AT281_TRG_E1 © Forsk 2009 Chapter 5: GSM GPRS EDGE Networks 5.2.1.3.1 Circuit Switched Services A user with a given circuit switched service, c, a terminal, t, and a mobility type, m, will be distributed to the BCCH and TCH subcells (and TCH_INNER in case of concentric cells) of a transmitter if: • • • 5.2.1.3.2 The terminal, t, works on the frequency band used by the BCCH subcell, The terminal, t, works on the frequency band(s) used by the TCH_INNER and TCH subcells, The user’s mobility, m, is less than the maximum speed supported by the layer, k. Packet Switched Services A user with a given packet switched service, p, a terminal, t, and a mobility type, m, will be distributed to the BCCH and TCH subcells (and TCH_INNER in case of concentric cells) of a transmitter if: • • • • • 5.2.2 The transmitter is an GPRS/EDGE station (option specified in the transmitter property dialog), The terminal, t, is technologically compatible with the transmitter, The terminal, t, works on the frequency band used by the BCCH subcell, The terminal, t, works on the frequency band(s) used by the TCH_INNER and TCH subcells, The user mobility, m, is less than the maximum speed supported by the layer, k. Calculation of the Traffic Demand per Subcell Here we assume that: • • • Users considered for evaluating the traffic demand fulfil the compatibility criteria defined in the transmitter, services, mobility, terminal properties as explained above. Atoll distributes traffic on subcell service areas, which are determined using the option “Best signal level per HCS layer” with a 0dB margin and the subcell reception threshold as lower threshold. Same traffic is distributed to the BCCH and TCH subcells. 5.2.2.1 User Profile Traffic Maps 5.2.2.1.1 Normal Cells (Nonconcentric, No HCS Layer) Number of subscribers ( X up m ) for each TCH subcell (Txi, TCH), per user profile up with a given mobility m, is inferred as: X up m Txi TCH = S up m Txi TCH D Where Sup,m is the TCH service area containing the user profile up with the mobility m and D is the user profile density. For each behaviour described in the user profile up, Atoll calculates the probability for the user to be connected with a given service using a terminal t. Circuit Switched Services For a circuit switched service c, we have: N call d p up c t = --------------------3600 Where Ncall is the number of calls per hour and d is the average call duration (in seconds). Then, Atoll evaluates the traffic demand, D up c t m , in Erlangs for the subcell (Txi, TCH) service area. D up c t m Txi TCH = X up m Txi TCH p up c t Packet Switched Services For a packet switched service p, we have: N call V 8 p up p t = ------------------------------3600 Where Ncall is the number of calls per hour and V is the transmitted data volume per call (in Kbytes). Then, Atoll evaluates the traffic demand, D up p t m , in kbits/s for the subcell (Txi, TCH) service area. D up p t m Txi TCH = X up m Txi TCH p up p t 5.2.2.1.2 Concentric Cells In case of concentric cells, Atoll distributes a part of traffic on the TCH_INNER service area (TCH_INNER is the highest priority traffic carrier) and the remaining traffic on the outer ring served by the TCH subcell. The traffic spread over the TCH_INNER subcell may overflow to the TCH subcell. In this case, the traffic demand is the same on the TCH_INNER subcell but increases on the TCH subcell. © Forsk 2009 AT281_TRG_E1 141 Technical Reference Guide Note: • Traffic overflowing from the TCH_INNER to the TCH is not uniformly spread over the TCH service area. It is still located on the TCH_INNER service area. Number of subscribers ( X up m ) for each TCH_INNER (Txi, TCH_INNER) and TCH (Txi, TCH) subcell, per user profile up with a given mobility m, is inferred as: X up m Txi,TCH_INNER = S up m Txi,TCH_INNER D X up m Txi,TCH = S up m Txi,TCH – S up m Txi,TCH_INNER D S up m Txi,TCH_INNER and S up m Txi,TCH respectively refer to the TCH_INNER and TCH subcell service areas containing the user profile up with the mobility m. D is the user profile density. Figure 5.1: Representation of a Concentric Cell TXi Circuit Switched Services For each user of the user profile up using a circuit switched service c with a terminal t, Atoll calculates the probability ( p up c t ) of the user being connected. Calculations are detailed in "Circuit Switched Services" on page 140. Then, Atoll evaluates the traffic demand, D up c t m , in Erlangs in the (Txi, TCH_INNER) and (Txi, TCH) subcell service areas. D up c t m Txi,TCH_INNER = X up m Txi,TCH_INNER p up c t D up c t m Txi,TCH = X up m Txi,TCH p up c t + D up c t m Txi,TCH_INNER O max Txi,TCH_INNER Where O max Txi,TCH_INNER is the maximum rate of traffic overflow (in %) specified for the TCH_INNER subcell. Packet Switched Services For each user of the user profile up using a packet switched service p with a terminal t, probability of the user being connected ( p up p t ) is calculated as explained in "Packet Switched Services" on page 140. Atoll evaluates the traffic demand, D up p t m , in kbits/s in the (Txi, TCH_INNER) and (Txi, TCH) subcell service areas. D up p t m Txi,TCH_INNER = X up m Txi,TCH_INNER p up p t D up p t m Txi,TCH = X up m Txi,TCH p up p t + D up p t m Txi,TCH_INNER O max Txi,TCH_INNER Where O max Txi,TCH_INNER is the maximum rate of traffic overflow (in %) specified for the TCH_INNER subcell. 5.2.2.1.3 HCS Layers We assume two HCS layers: the micro layer has a higher priority than the macro layer. Txi belongs to the micro layer and Txj to the macro. The traffic contained in the input traffic map can be assigned to all the HCS layers. Normal Cells Atoll distributes traffic on the TCH service areas. The traffic capture is calculated with the option “Best signal level per HCS macro layer” meaning that there is an overlap between HCS layers service areas. Let S overlapping Txj TCH denote this area (TCH service area of the macro layer overlapped by the TCH service area of the micro layer). Traffic on the overlapping area is distributed to the TCH subcell of the micro layer because it has a higher priority. On this area, traffic of the micro layer may overflow to the macro layer. In this case, the traffic demand is the same on the TCH subcell of the micro layer but increases on the TCH subcell of the macro layer. Note: • 142 Traffic overflowing to the macro layer is not uniformly spread over the TCH service area of Txj. It is only located on the overlapping area. AT281_TRG_E1 © Forsk 2009 Chapter 5: GSM GPRS EDGE Networks Figure 5.2: Representation of Micro and Macro Layers Atoll evaluates the traffic demand on the micro layer (higher priority) as explained above. For further details, please refer to formulas for normal cells. Then, it proceeds with the macro layer (lower priority). macro Number of subscribers ( X up m ) for each TCH subcell (Txj, TCH) of the macro layer, per user profile up with the mobility m, is inferred as: macro macro macro X up m Txj TCH = S up m Txj TCH – S up m – overlapping Txj TCH D macro Where S up m Txj TCH is the TCH service area of Txj containing the user profile up with the mobility m and D is the profile density. For each user described in the user profile up with the circuit switched service c and the terminal t, the probability for the user being connected ( p up c t ) is calculated as explained in "Circuit Switched Services" on page 140. macro Then, Atoll evaluates the traffic demand, D up c t m , in Erlangs in the subcell (Txj, TCH) service area. macro S upm – overlapping Txj TCH macro macro micro - Omax Txi TCH D up c t m Txj TCH = X up m Txj TCH p up c t + D up c t m Txi TCH --------------------------------------------------------------------------micro S up m Txi TCH For each user described in the user profile up with the packet switched service p and the terminal t, probability for the user to be connected ( p up p t ) is calculated as explained in "Packet Switched Services" on page 140. macro Then, Atoll evaluates the traffic demand, D up p t m , in kbits/s in the subcell (Txj, TCH) service area. macro S upm – overlapping Txj TCH macro macro micro - Omax Txi TCH D up p t m Txj TCH = X up m Txj TCH p up p t + D up p t m Txi TCH --------------------------------------------------------------------------micro S up m Txi TCH Where O max Txi TCH is the maximum rate of traffic overflow (stated in %) specified for the TCH subcell of Txi (micro micro layer) and S up m Txi TCH is the TCH service area of Txi containing the user profile up with the mobility m. Concentric Cells Atoll evaluates the traffic demand on the micro layer (higher priority HCS layer) as explained above. For further details, please refer to formulas given in case of concentric cells. Then, it proceeds with the macro layer (lower priority HCS layer). The traffic capture is calculated with the option “Best signal level per HCS layer”. It means that there are overlapping areas between HCS layers where traffic is spread according to the layer priority. On these areas, traffic of the higher priority layer may overflow. The TCH_INNER service area of the macro layer is overlapped by the micro layer. This area consists of two parts: an area macro overlapped by the TCH service area of the micro layer S overlapping – Txi TCH Txj,TCH_INNER and another overlapped macro by the TCH_INNER service area of the micro layer S overlapping – Txi,TCH_INNER Txj,TCH_INNER . Let us consider three areas, S1, S2 and S3. macro macro S 1 = S up m Txj,TCH_INNER – S up m – overlapping – Txi TCH Txj,TCH_INNER macro S 2 = S up m – overlapping – Txi,TCH_INNER Txj,TCH_INNER macro S 3 = S up m – overlapping – Txi TCH Txj,TCH_INNER – S 2 © Forsk 2009 AT281_TRG_E1 143 Technical Reference Guide Figure 5.3: Concentric Cells macro Where S up m Txj,TCH_INNER is the TCH_INNER subcell service area of Txj containing the user profile up with the mobility m. We only consider the overlapping areas containing the user profile up with the mobility m. macro On S1, the number of subscribers per user profile up with a given mobility m ( X up m ) is inferred: macro X up m Txj,TCH_INNER = S 1 D Where D is the user profile density. The traffic spread over the TCH_INNER service area of the micro layer may overflow on the TCH subcell. The traffic overflowing to the TCH subcell is located on the TCH_INNER service area. On S2, the TCH subcell traffic coming from the TCH_INNER subcell traffic overflow may overflow proportional to R2. S2 R 2 = ----------------------------------------------------------------micro S up m Txi,TCH_INNER The traffic spread over the ring served by the TCH subcell of the micro layer only may overflow on S3 proportional to R3. S3 R 3 = ------------------------------------------------------------------------------------------------------------------micro micro S up m Txi,TCH – S up m Txi,TCH_INNER micro micro Where S up m Txi,TCH and S up m Txi,TCH_INNER are the TCH and TCH_INNER service areas of Txi respectively containing the user profile up with the mobility m. For each user described in the user profile up with a circuit switched service c and a terminal t, the probability for the user being connected ( p up c t ) is calculated as explained in "Circuit Switched Services" on page 140. Then, Atoll evaluates macro the traffic demand, D up c t m , in Erlangs in the subcell (Txj, TCH_INNER) service area. macro macro D up c t m Txj,TCH_INNER X up m Txj,TCH_INNER p up c t + = R D micro 2 up c t m Txi,TCH_INNER O max Txi,TCH_INNER O max Txi,TCH + micro R 3 X up m Txi TCH p up c t O max Txi TCH For each user described in the user profile up with a packet switched service p and a terminal t, probability for the user to be connected ( p up p t ) is calculated as explained in "Packet Switched Services" on page 140. macro Then, Atoll evaluates the traffic demand, D up p t m , stated in kbits/s in the subcell (Txj, TCH_INNER) service area. macro macro X up m Txj,TCH_INNER p up p t + D up p t m Txj,TCH_INNER = R D micro 2 up p t m Txi,TCH_INNER O max Txi,TCH_INNER O max Txi,TCH + micro R 3 X up m Txi TCH p up p t O max Txi TCH Where O max Txi TCH and O max Txi,TCH_INNER are the maximum rates of traffic overflow (stated in %) specified for the TCH and TCH_INNER subcells of Txi respectively. 144 AT281_TRG_E1 © Forsk 2009 Chapter 5: GSM GPRS EDGE Networks The area of the TCH ring of the macro layer is overlapped by the micro layer. There are two parts: an area overlapped by macro the TCH service area of the micro layer S overlapping – Txi TCH Txj,TCH -- TCH_INNER and another one by the macro TCH_INNER service area of the micro layer S overlapping – Txi,TCH_INNER Txj,TCH -- TCH_INNER . Let us consider three areas, S’1, S’2 and S’3. macro macro macro S' 1 = S up m Txj,TCH – S up m Txj,TCH_INNER – S up m – overlapping – Txi TCH Txj,TCH -- TCH_INNER macro S' 2 = S up m – overlapping – Txi,TCH_INNER Txj,TCH -- TCH_INNER macro S' 3 = S up m – overlapping – Txi TCH Txj,TCH -- TCH_INNER – S' 2 macro macro Where S up m Txj,TCH and S up m Txj,TCH_INNER are the TCH and TCH_INNER subcell service areas of Txj respectively. We only consider the overlapping areas containing the user profile up with the mobility m. macro On S’1, the number of subscribers per user profile up with a given mobility m ( X up m ) is inferred: macro X up m Txj,TCH = S' 1 D Where D is the user profile density. The traffic spread over the TCH_INNER service area of the micro layer may overflow on the TCH subcell. The traffic overflowing on the TCH subcell is located on the TCH_INNER service area. On S’2, the TCH subcell traffic coming from the TCH_INNER subcell traffic overflow may overflow proportionally to R’2. S' 2 R' 2 = ----------------------------------------------------------------micro S up m Txi,TCH_INNER The traffic spread over the ring served by the TCH subcell of the micro layer only may overflow on S’3 proportional to R’3. S' 3 R' 3 = ------------------------------------------------------------------------------------------------------------------micro micro S up m Txi,TCH – S up m Txi,TCH_INNER micro micro Where S up m Txi,TCH and S up m Txi,TCH_INNER are the TCH and TCH_INNER service areas of Txi respectively containing the user profile up with the mobility m. For each user described in the user profile up with a circuit switched service c and a terminal t, the probability for the user being connected ( p up c t ) is calculated as explained in "Circuit Switched Services" on page 140. macro Then, Atoll evaluates the traffic demand, D up c t m , in Erlangs in the subcell (Txj, TCH) service area. macro X up m Txj TCH p up c t + macro D up c t m Txj TCH = macro D up c t m Txj,TCH_INNER O max Txj,TCH_INNER + micro R' 2 D up c t m Txi,TCH_INNER O max Txi,TCH_INNER O max Txi,TCH + micro R' 3 X up m Txi TCH p up c t m O max Txi TCH For each user described in the user profile up with a packet switched service p and a terminal t, the probability for the user being connected ( p up p t ) is calculated as explained in "Packet Switched Services" on page 140. macro Then, Atoll evaluates the traffic demand, D up p t m , in kbits/s in the subcell (Txj, TCH) service area. macro X up m Txj TCH p up p t + macro D up p t m Txj TCH = macro D up p t m Txj,TCH_INNER O max Txj,TCH_INNER + micro R' 2 D up p t m Txi,TCH_INNER O max Txi,TCH_INNER O max Txi,TCH + micro R' 3 X up m Txi TCH p up p t m O max Txi TCH Where O max Txi,TCH is the maximum rate of traffic overflow (stated in %) specified for the TCH subcell of Txi (micro layer), O max Txi,TCH_INNER the maximum rate of traffic overflow indicated for the TCH_INNER subcell of Txi (macro layer), O max Txj,TCH_INNER the maximum rate of traffic overflow indicated for the TCH_INNER subcell of Txj (macro micro layer) and X up m Txi TCH the number of subscribers with the user profile up and mobility m on the TCH service area of Txi (as explained in "Concentric Cells" on page 140). © Forsk 2009 AT281_TRG_E1 145 Technical Reference Guide 5.2.2.2 Sector Traffic Maps We assume that the traffic map is built from a coverage by transmitter prediction study calculated for the TCH subcells with options: • • “HCS Servers” and no margin if the network only consists of normal cells and concentric cells, “Highest Priority HCS Server” and no margin in case of HCS layers. When creating the traffic map, you have to specify the traffic demand per transmitter and per service (throughput for a packet switched service and Erlangs for a circuit switched service) and the global distribution of terminals and mobility types. Let E c Txi TCH denote the Erlangs for the circuit switched service, c, on the TCH subcell of Txi. Let T p Txi TCH denote the throughput of the packet switched service, p, on the TCH subcell of Txi. We assume that 100% of users have the terminal, t, and the mobility type, m. 5.2.2.2.1 Normal Cells (Nonconcentric, No HCS Layer) For each circuit switched service, c, Atoll evaluates the traffic demand, Dc,t,m, in Erlangs in the subcell (Txi, TCH) service area. D c t m Txi TCH = E c Txi TCH For each packet switched service, p, Atoll evaluates the traffic demand, Dp,t,m, in kbits/s in the subcell (Txi, TCH) service area. D p t m Txi TCH = T p Txi TCH 5.2.2.2.2 Concentric Cells In case of concentric cells, Atoll distributes a part of traffic on the TCH_INNER service area (TCH_INNER is the highest priority traffic carrier) and the remaining traffic, on the ring served by the TCH subcell only. The traffic spread over the TCH_INNER subcell may overflow to the TCH subcell. In this case, the traffic demand is the same on the TCH_INNER subcell and rises on the TCH subcell. Note: • Traffic overflowing from the TCH_INNER to the TCH is not uniformly spread over the TCH service area. It is only located on the TCH_INNER service area. For each circuit switched service, c, Atoll evaluates the traffic demand, Dc,t,m, in Erlangs in the subcell, (Txi, TCH_INNER) and (Txi, TCH), service areas. S Txi,TCH_INNER D c t m Txi,TCH_INNER = ----------------------------------------------------- E c Txi TCH S Txi TCH and D c t m Txi,TCH = S Txi,TCH – S Txi,TCH_INNER ----------------------------------------------------------------------------------------------- E c Txi TCH + S Txi TCH D c t m Txi,TCH_INNER O max Txi,TCH_INNER For each packet switched service, p, Atoll evaluates the traffic demand, Dp,t,m, in kbits/s in the subcell, (Txi, TCH_INNER) and (Txi, TCH), service areas. S Txi,TCH_INNER D p t m Txi,TCH_INNER = ----------------------------------------------------- T p Txi TCH S Txi TCH and D p t m Txi,TCH = S Txi,TCH – S Txi,TCH_INNER ----------------------------------------------------------------------------------------------- T p Txi TCH + S Txi TCH D p t m Txi,TCH_INNER O max Txi,TCH_INNER Where O max Txi,TCH_INNER is the maximum rate of traffic overflow (stated in %) specified for the TCH_INNER subcell, S Txi,TCH and S Txi,TCH_INNER are the TCH and TCH_INNER service areas of Txi respectively. 5.2.2.2.3 HCS Layers We assume we have two HCS layers: the micro layer has a higher priority and the macro layer has a lower one. Txi belongs to the micro layer and Txj to the macro one. The traffic contained in the input traffic map can be assigned to all the HCS layers. 146 AT281_TRG_E1 © Forsk 2009 Chapter 5: GSM GPRS EDGE Networks Normal Cells Atoll distributes traffic on the TCH service areas. The traffic capture is calculated with the option “HCS Servers”. It means macro that there is an overlapping area between HCS layers. Let S overlapping Txj TCH denote the TCH service area of the macro layer overlapped by the TCH service area of the micro layer. Traffic on the overlapping area is distributed to the TCH subcell of the micro layer (higher priority layer). On this area, traffic of the micro layer may overflow to the macro layer. In this case, the traffic demand is the same on the TCH subcell of the micro layer but rises on the TCH subcell of the macro layer. Note: • Traffic overflowing on the macro layer is not uniformly spread over the TCH service area of Txj. It is only located on the overlapping area. Atoll starts evaluating the traffic demand on the micro layer (highest priority HCS layer). micro For each circuit switched service, c, Atoll calculates the traffic demand, D c t m , in Erlangs in the subcell (Txi, TCH) service area. micro D c t m Txi TCH = E c Txi TCH micro For each packet switched service, p, Atoll calculates the traffic demand, D p t m , in kbits/s in the subcell (Txi, TCH) service area. micro D p t m Txi TCH = T p Txi TCH Then, Atoll proceeds with the macro layer (lower priority HCS layer). For each circuit switched service, c, Atoll calculates macro the traffic demand, D c t m , in Erlangs in the subcell (Txj, TCH) service area. macro S overlapping Txj TCH macro micro - O max Txi TCH D c t m Txj TCH = E c Txj TCH + D c t m Txi TCH -----------------------------------------------------------micro S Txi TCH macro For each packet switched service, p, Atoll calculates the traffic demand, D p t m , in kbits/s in the subcell (Txj, TCH) service area. macro S overlapping Txj TCH macro micro - O max Txi TCH D p t m Txj TCH = T p Txj TCH + D p t m Txi TCH -----------------------------------------------------------micro S Txi TCH Where O max Txi TCH is the maximum rate of traffic overflow (in %) specified for the TCH subcell of Txi (micro cell) and S micro Txi TCH the TCH service area of Txi. Note: • You can restrict the traffic assignement of each traffic map to a specific HCS layer in the running options of the traffic capture. If you do so, no overflow occurs between HCS layers and the only overflow which is considered occurs within concentric cells (See "Concentric Cells" on page 140). Concentric Cells Atoll evaluates the traffic demand on the micro layer as explained above in case of concentric cells and then proceeds with the macro layer (lower priority layer). The traffic capture is calculated with the option “HCS Servers”. It means that there is overlapping areas between HCS layers where traffic is spread over according to the layer priority. On these areas, traffic of the higher priority layer may overflow. © Forsk 2009 AT281_TRG_E1 147 Technical Reference Guide Figure 5.4: Concentric Cells The TCH_INNER service area of the macro layer is overlapped by the micro layer. This area consists of two parts: an area macro overlapped by the TCH service area of the micro layer S overlapping – Txi TCH Txj,TCH_INNER and another overlapped macro by the TCH_INNER service area of the micro layer S overlapping – Txi,TCH_INNER Txj,TCH_INNER . Let us consider three areas, S1, S2 and S3. S1 = S macro macro Txj,TCH_INNER – S overlapping – Txi TCH Txj,TCH_INNER macro S 2 = S overlapping – Txi,TCH_INNER Txj,TCH_INNER macro S 3 = S overlapping – Txi TCH Txj,TCH_INNER – S 2 Where S macro Txj,TCH_INNER is the TCH_INNER subcell service area of Txj. The traffic specified for Txj in the map description ( E c Txj TCH ) is spread over S1 proportionally to R1. S1 R 1 = ------------------------------------------map S Txj TCH map S Txj TCH is the TCH service area of Txj in the traffic map with the option “Best signal level of the highest priority layer”. The traffic spread over the TCH_INNER service area of the micro layer may overflow to the TCH subcell. The traffic overflowing to the TCH subcell is located on the TCH_INNER service area. On S2, the TCH subcell traffic coming from the TCH_INNER subcell traffic overflow may overflow proportional to R2. S2 R 2 = ----------------------------------------------------------------micro S Txi,TCH_INNER The traffic spread over the ring only served by the TCH subcell of the micro layer may overflow on S3 proportional to R3. S3 R 3 = ------------------------------------------------------------------------------------------------------------------micro micro S Txi,TCH – S Txi,TCH_INNER macro For each circuit switched service, c, Atoll calculates the traffic demand, D c t m , in Erlangs in the subcell (Txj, TCH_INNER) service area. R 1 E c Txj TCH + macro D c t m Txj,TCH_INNER = micro R 2 D c t m Txi,TCH_INNER O max Txi,TCH_INNER O max Txi TCH + micro micro S Txi TCH – S Txi,TCH_INNER - E c Txi TCH O max Txi TCH R 3 --------------------------------------------------------------------------------------------------------------------------micro S Txi TCH macro For each packet switched service, p, Atoll calculates the traffic demand, D p t m , in kbits/s in the subcell (Txj, TCH_INNER) service area. 148 AT281_TRG_E1 © Forsk 2009 Chapter 5: GSM GPRS EDGE Networks R 1 T p Txj TCH + macro D p t m Txj,TCH_INNER = micro R 2 D p t m Txi,TCH_INNER O max Txi,TCH_INNER O max Txi TCH + micro micro S Txi TCH – S Txi,TCH_INNER - T p Txi TCH O max Txi TCH R 3 --------------------------------------------------------------------------------------------------------------------------micro S Txi TCH Where O max Txi TCH is the maximum rate of traffic overflow (stated in %) specified for the TCH subcell of Txi, O max Txi,TCH_INNER is the maximum rate of traffic overflow (stated in %) specified for the TCH_INNER subcell of Txi and S micro Txi TCH is the TCH subcell service area of Txi. The area of the TCH ring of the macro layer is overlapped by the micro layer. There are two parts: an area overlapped by macro the TCH service area of the micro layer S overlapping – Txi TCH Txj,TCH -- TCH_INNER and another overlapped by the macro TCH_INNER service area of the micro layer S overlapping – Txi,TCH_INNER Txj,TCH -- TCH_INNER . Let us consider three areas, S’1, S’2 and S’3. S' 1 = S macro Txj TCH – S macro macro Txj,TCH_INNER – S overlapping – Txi TCH Txj,TCH -- TCH_INNER macro S' 2 = S overlapping – Txi,TCH_INNER Txj,TCH -- TCH_INNER macro S' 3 = S overlapping – Txi TCH Txj,TCH -- TCH_INNER – S' 2 macro Where S respectively. Txj TCH and S macro Txj,TCH_INNER are the TCH and TCH_INNER subcell service areas of Txj The traffic specified for Txj in the map description ( E c Txj TCH ) is spread over S’1 proportional to R’1. S' 1 R' 1 = ------------------------------------------map S Txj TCH map S Txj TCH is the TCH service area of Txj in the traffic map with the option “Best signal level of the highest priority layer”. The traffic spread over the TCH_INNER service area of the micro layer may overflow to the TCH subcell. The traffic overflowing to the TCH subcell is located on the TCH_INNER service area. On S’2, the TCH subcell traffic coming from the TCH_INNER subcell traffic overflow may overflow proportional to R’2. S' 2 R' 2 = ----------------------------------------------------------------micro S Txi,TCH_INNER The traffic spread over the ring only served by the TCH subcell of the micro layer may overflow on S’3 proportional to R’3. S' 3 R' 3 = ------------------------------------------------------------------------------------------------------------------micro micro S Txi,TCH – S Txi,TCH_INNER macro For each circuit switched service, c, Atoll calculates the traffic demand, D c t m , in Erlangs in the subcell (Txj, TCH) service area. R' 1 E c Txj TCH + macro macro D c t m Txj TCH = D c t m Txj,TCH_INNER O max Txj,TCH_INNER + micro R' 2 D c t m Txi,TCH_INNER O max Txi,TCH_INNER O max Txi TCH + micro micro S Txi,TCH – S Txi,TCH_INNER - E c Txi TCH O max Txi TCH R' 3 -----------------------------------------------------------------------------------------------------------------------micro S Txi,TCH macro For each packet switched service, p, Atoll calculates the traffic demand, D p t m , in kbits/s in the subcell (Txj, TCH) service area. R' 1 T p Txj TCH + macro macro D p t m Txj TCH = D c t m Txj,TCH_INNER O max Txj,TCH_INNER + micro R' 2 D p t m Txi,TCH_INNER O max Txi,TCH_INNER O max Txi TCH + micro micro S Txi,TCH – S Txi,TCH_INNER - T p Txi TCH O max Txi TCH R' 3 -----------------------------------------------------------------------------------------------------------------------micro S Txi,TCH © Forsk 2009 AT281_TRG_E1 149 Technical Reference Guide Where O max Txj,TCH_INNER is the maximum rate of traffic overflow (stated in %) specified for the TCH_INNER subcell of Txj, O max Txi TCH is the maximum rate of traffic overflow (stated in %) specified for the TCH subcell of Txi, O max Txi,TCH_INNER is the maximum rate of traffic overflow (stated in %) specified for the TCH_INNER subcell of Txi, micro S Txi,TCH is the TCH subcell service area of Txi and S area of Txi. 5.3 micro Txi,TCH_INNER is the TCH_INNER subcell service Network Dimensioning Atoll is capable of dimensioning a GSM GPRS EDGE network with a mixture of circuit and package switched services. This section describes the technical details of Atoll’s dimensioning engine. 5.3.1 Dimensioning Models and Quality Graphs In Atoll, a dimensioning model is an entity utilized by the dimensioning engine along with other inputs (traffic, limitations, criteria, etc.) in the process of dimensioning. A dimensioning model defines the QoS KPIs to be taken into account when dimensioning a network for both circuit and packet switched traffic. The user can define either to use Erlang B or Erlang C queuing model for circuit switched traffic and can define which KPIs to consider when dimensioning the network for packet switched traffic. The dimensioning engine will only utilize the quality curves of the KPI selected. The KPIs not selected are supposed to be either already satisfactory or not relatively important. 5.3.1.1 Circuit Switched Traffic The network dimensioning for circuit switched traffic is performed using the universally accepted and adopted Erlang B and Erlang C formulas. The dimensioning criterion in these formulas is the Grade of Service or the allowed blocking probability of the circuit switched traffic. In the Erlang B approach, this Grade of Service is defined as the percentage of incoming circuit switched calls that are blocked due to lack of resources or timeslots. This formula implies a loss system. The blocked calls are supposed to be lost and the caller has to reinitiate it. In the Erlang C approach, the Grade of Service is the percentage of incoming calls that are placed in a waiting queue when there are no resources available, until some resources or timeslots are liberated. This queuing system has no lost calls. As the load on the system increases, the average waiting time in the queue also increases. These formulas and their details are available in many books. For example, Wireless Communications Principles and Practice by Theodore S. Rappaport, Prentice Hall. Following the common practice, network dimensioning in Atoll is based on the principle that a voice or GSM call has priority over data transmission. Therefore, as explained later in the network dimensioning steps, Atoll first performs network dimensioning according to the circuit switched traffic present in the subcell in order to ensure the higher priority service availability before performing the same for the packet switched traffic. 5.3.1.2 Packet Switched Traffic Since packet switched traffic does not occupy an entire timeslot the whole time, it is much more complicated to study than circuit switched traffic. Packet traffic is intermittent and bursty. Whenever there is packet data to be transferred, a Temporary Block Flow (TBF) is initiated for transferring these packets. Multiple TBFs can be multiplexed on the same timeslot. This implies that there can be many packet switched service users that have the same timeslots assigned for packet data transfer but at different intervals of time. This multiplexing of a number of packet switched service users over the same timeslots incurs a certain reduction in the throughput (data transfer rate) for each multiplexed user. This reduction in the throughput is more perceivable when the system traffic load is high. The following parts describe the three most important Key Performance Indicators in GPRS/ EDGE networks and how they are modelled in Atoll. 5.3.1.2.1 Throughput Throughput is defined as the amount of data delivered to the Logical Link Control Layer in a given unit of time. Each temporary block flow (TBF), and hence each user, has an associated measured throughput sample in a given network. Each network will have a different throughput probability distribution depending on the load and network configuration. Instead of using the precise probability distributions, it is more practical to compute the average and percentile throughput values. In GPRS, the resources are shared between the users being served, and consequently, the throughput is reduced as the number of active users increases. This reduction in user perceived throughput is modelled through a reduction factor. The throughput experienced by a user accessing a particular service can be calculated as: User throughput = Number of allocated timeslots x Timeslot capacity x Reduction Factor Or User throughput per allocated timeslot = Timeslot capacity x Reduction Factor 150 AT281_TRG_E1 © Forsk 2009 Chapter 5: GSM GPRS EDGE Networks Timeslot Capacity The timeslot capacity is the average throughput per fully utilized timeslot. It represents the average throughput from the network point of view. It mainly depends on the network’s propagation conditions and criteria in the coverage area of a transmitter (carrier power, carrier-to-interference distribution, etc.). It is a measure of how much data the network is able to transfer with 1 data Erlang, or in other words, how efficiently the hardware resources are being utilized by the network. It may also depend on the RLC protocol efficiency. Atoll computes the average timeslot capacity during the traffic analysis and is used to determine the minimum throughput reduction factor. But since this information is displayed in the network dimensioning results (only due to relevance), this information has been considered as a part of the network dimensioning process in this document. Timeslot Utilisation Timeslot utilization takes into account the average number of timeslots that are available for packet switched traffic. It is a measure of how much the network is loaded with data services. Networks with timeslot utilisation close to 100% are close to saturation and the end-user performance is likely to be very poor. In Atoll this parameter is termed as the Load (Traffic load for circuit switched traffic and packet switched traffic load for packet switched traffic). It is described in more detail in the Network dimensioning steps section. Reduction Factor Reduction factor takes into account the user throughput reduction due to timeslot sharing among many users. The figure below shows how the peak throughput available per timeslot is reduced by interference and sharing.Reduction factor is a function of the number of timeslots assigned to a user (Nu), number of timeslots available in the system (Ns) and the average system packet switched traffic load (Lp) (utilization of resources in the system). Data Erlangs or data traffic is given by: Data Erlangs = L P N S Figure 5.5: Reduction of Throughput per Timeslot More precisely, the reduction factor is a function of the ratio Ns/Nu (Np). Np models the equivalent timeslots that are available for the packet switched traffic in the system. For example, a 24-timeslot system with each user assigned 3 timeslots per connection can be modelled by a single timeslot connection system with 8 timeslots in total. The formula for reduction factor can be derived following the same hypotheses followed by Erlang in the derivation of the blocking probability formulas (Erlang B and Erlang C). Let X be a random variable that measures the reduction factor in a certain system state: 0 1 X if n = 0 if 0 < n N P N ------P- if n > N P n Where n is the instantaneous number of connections in the system. The throughput reduction factor is defined as: PX= n X ---------------------PX= 0 RF n=0 Or, RF = PX= n X -----------------------------n=0 PX= i i=0 Here, P(X=n) is the probability function of having n connections in the system. Under the same assumptions as those of the Erlang formulas, the probability function can be written as: © Forsk 2009 AT281_TRG_E1 151 Technical Reference Guide n PX= n = LP NP -------------------------n! ---------------------------------------------------------------------------------------------NP i LP NP -----------------------+ i! i=0 i = NP if 0 n NP i LP NP ------------------------------- i – NP N ! NP +1 P n LP NP ------------------------------- i – NP N P! N P P X = n = ---------------------------------------------------------------------------------------------N P i LP NP -----------------------+ i! i=0 i = NP if n > N P i LP NP ------------------------------- i – NP N ! NP +1 P Hence the reduction factor can finally be written as: NP i i NP LP NP -------------------------------- ------- i – NP i N ! NP i=1 i = NP + 1 P RF = ---------------------------------------------------------------------------------------------------------------N LP NP ------------------------ + i! P i LP NP -----------------------+ i! i=1 i LP NP ------------------------------- i – NP N ! N P +1 P i = NP This formula is not directly applicable in any software application due to the summations up to infinity. Atoll uses the following version of this formula that is exactly the same formula without the summation overflow problem. NP NP NP + 1 NP LP NP L -------------------------- – --------------------- ln 1 – L P + -----P- N ! n! n P n=1 n=1 RF = ----------------------------------------------------------------------------------------------------------------------------------N n P n=1 n NP n LP LP NP LP NP -------------------------- + ----------------------------- ---------------N P! 1 – LP n! The default quality curves for the Reduction Factor have been derived using the above formula. Each curve is for a fixed number of timeslots available for packet switched traffic (Np) describing the reduction factor at different values of packet switched traffic load (Lp). The figure below contains all the reduction factor quality curves in Atoll. The Maximum reduction factor can be 1, implying a maximum throughput, and the minimum can be 0, implying a saturated system with no data throughput. Figure 5.6: Reduction Factor for Different Packet Switched Traffic Loads (Lp, X-axis) Each curve in the above figure represents an equivalent number of packet switched timeslots, NP. 152 AT281_TRG_E1 © Forsk 2009 Chapter 5: GSM GPRS EDGE Networks 5.3.1.2.2 Delay Delay is the time required for an LLC PDU to be completely transferred from the SGSN to the MS, or vice versa. As the delay is a function of the delays and the losses incurred at the packet level, the network parameters, such as the packet queue length, and different protocol properties, such as the size of the LLC PDU, become important. It is also quite dependent upon the radio access round trip time (RA RTT) and has a considerable impact on the application level performance viewed by the user. The delay parameter is a user level parameter rather than being a network level quantity, like throughput per cell, timeslot capacity, TBF blocking and reduction factor, hence it is difficult to model and is currently under study. Hence, no default curve is presently available for delay in Atoll. 5.3.1.2.3 Blocking Probability In GPRS, there is no blocking as in circuit switched connections. If a new temporary block flow (TBF) establishment is requested and there are already M users per timeslot, M being the maximum limit of multiplexing per timeslot (Multiplexing factor), the request is queued in the system to be established later when resources become available. Supposing that M number of users can be multiplexed over a single timeslot (PDCH), we can have a maximum of M * Np users in the system. This implies that if a new TBF is requested when there are already M * Np users active, it will be blocked and placed in a queue. So the blocking probability is the probability of having M * Np + 1 users in the system or more, meaning, PX= n for n = M N P + 1 as in this case n is always greater than Np, we have, n LP NP ------------------------------- i – NP N P! N P P X = n = ---------------------------------------------------------------------------------------------N P i LP NP ------------------------ + i! i=0 i LP NP ------------------------------- i – NP N ! N P P +1 i = NP So, the Blocking Probability can be given as: BP = n LP NP --------------------------------- 1 – NP N ! NP n = M NP + 1 P P X = n = -----------------------------------------------------------------------------------------------N P n = MN+1 i LP NP ------------------------ + i! i=0 i = NP i LP NP --------------------------------- 1 – NP N ! N P +1 P Eliminating the summations to infinity, the blocking probability can be stated in a simpler form: M NP LP NP LP -------------------------------------------- -------------- M NP – N P 1 – L P N P! N P BP = ------------------------------------------------------------------------------------------N P i=0 NP i LP LP NP LP NP ------------------------ + ----------------------------- ---------------N P! 1 – LP i! The above formula has been used to generate the default quality curves for blocking probability in Atoll. These graphs are generated for a user multiplexing factor of 8 users per timeslot. Each curve represents an equivalent number of packet switched timeslots, NP. The curves depict the blocking probabilities for different number of available connections (Np) at different packet switched traffic loads (Lp) for a fixed user multiplexing factor of 8. The figure below contains all the blocking probability curves for packet switched traffic dimensioning in Atoll. The blocking probability increases with the packet switched traffic load, which implies that as the packet switched traffic increases for a given number of timeslots, the system starts to get more and more loaded, hence there is higher probability of having a temporary block flow placed in a waiting queue. © Forsk 2009 AT281_TRG_E1 153 Technical Reference Guide Figure 5.7: Blocking Probability for Different Packet Switched Traffic Loads (Lp, X-axis) Reference: T. Halonen, J. Romero, J. Melero; GSM, GPRS and EDGE performance – Evolution towards 3G/UMTS, John Wiley and Sons Ltd. 5.3.2 Network Dimensioning Process The network dimensioning process is described below in detail. As the whole dimensioning process is in fact a chain of small processes that have there respective inputs and outputs, with outputs of a preceding one being the inputs to the next, the best method is to detail each process individually in form of steps of the global dimensioning process. 5.3.2.1 Network Dimensioning Engine During the dimensioning process, Atoll first computes the number of timeslots required to accommodate the circuit switched traffic. Then it calculates the number of timeslots to add in order to satisfy the demand of packet switched traffic. This is performed using the quality curves entered in the dimensioning model used. If the dimensioning model has been indicated to take all three KPIs in to account (throughput reduction factor, delay and blocking probability), the number of timeslots to be added is calculated such that: 1. 2. 3. The throughput reduction factor is greater than the minimum throughput reduction factor, Delay is less than the maximum permissible delay defined in the service properties, and The blocking probability is less than the maximum allowable blocking probability defined in the service properties. The figure below depicts a simplified flowchart of the dimensioning engine in Atoll. Figure 5.8: Network Dimensioning Process On the whole, following are the inputs and outputs of the network dimensioning process: 5.3.2.1.1 Inputs • • 154 Circuit switched traffic demand Packet switched traffic demand AT281_TRG_E1 © Forsk 2009 Chapter 5: GSM GPRS EDGE Networks • • • • 5.3.2.1.2 Outputs • • • • • • • 5.3.2.2 Timeslot configurations defined for each subcell Target traffic overflow rate and Half-rate traffic ratio for each subcell Service availability criteria: minimum required throughput per user, maximum permissible delay, maximum allowable blocking probability etc. Dimensioning model parameters: Maximum number of TRXs per transmitter, dimensioning model for circuit switched traffic, number of minimum dedicated packet switched timeslots per transmitter, maximum number of TRXs added for packet switched services, KPIs to consider, and their quality curves. Number of required TRXs per transmitter Number of required shared, circuit switched and packet switched timeslots Traffic load Served circuit switched traffic Served packet switched traffic Effective rate of traffic overflow Actual KPI values: throughput reduction factor, delay and blocking probability Network Dimensioning Steps This section describes the entire process step by step as it is actually performed in Atoll. Details of the calculations of the parameters that are calculated during each step are described as well. 5.3.2.2.1 Step 1: Timeslots Required for CS Traffic Atoll computes the number of timeslots required to accommodate the circuit switched traffic assigned to each subcell. Atoll takes the circuit switched traffic demand (Erlangs), calculated in the traffic analysis and assigned to the current subcell, and the maximum blocking probability defined for the circuit switched service, and computes the required number of timeslots to satisfy this demand using the Erlang B or Erlang C formula (as defined by the user). If the user-defined target rate of traffic overflow per subcell, OTarget, is greater than the maximum blocking rate defined in the services properties, it is going to be taken as the Grade of Service required for that subcell instead of the maximum blocking rate of the service. For the blocking probability GoS and circuit switched traffic demand TDC, Atoll determines the required number of timeslots TSreq. C for each subcell using formulas described below. In fact, Atoll searches for TSreq. C value until the defined grade of service is reached. For Erlang B, we have: TS reqC TD C ------------------------------ TS reqC ! GoS = ---------------------------------TS reqC k TD C ------------------k! k=0 For Erlang C, we have: TS reqC TD C GoS = ----------------------------------------------------------------------------------------------------------------------------------------------------TS –1 TD C TS reqC TD C - + TS reqC ! 1 – ----------------- TS reqC reqC k TD C ------------------k! k=0 Atoll considers the effect of half-rate circuit switched traffic by taking into account a user-defined percentage of half-rate traffic. Atoll computes the effective equivalent number of full-rate timeslots that will be required to carry the total traffic with the defined percentage of half-rate traffic. If the number of timeslots required to accommodate the full-rate circuit switched traffic is TSreq. FR, and the percentage of half-rate traffic within the subcell is defined by HR, then the effective number of equivalent full-rate circuit switched timeslots TSeff. that can carry this traffic mix is calculated by: HR TS eff = TS reqFR 1 – --------- 2 Atoll employs this simplified approach to integrating half-rate circuit switched traffic, which provides approximately the same results as obtained by using the half-rate traffic charts. 5.3.2.2.2 Step 2: TRXs Required for CS Traffic and Dedicated PS Timeslots This stage of the network dimensioning process computes the number of TRXs required to carry the circuit switched traffic demand through the number of required timeslots calculated above and the timeslot configuration defined by the user in the network settings. Atoll distributes the number of required circuit switched timeslots calculated in Step 1 taking into account the presence of dedicated packet switched timeslots in each TRX according to the timeslot configurations. If a timeslot configuration defines a certain number of dedicated packet switched timeslots pre-allocated in certain TRXs, those timeslots will not be considered capable of carrying circuit switched traffic and hence will not be allocated. For example, if 4 timeslots have been marked as packet switched timeslots in the first TRX and Atoll computes 8 timeslots for carry- © Forsk 2009 AT281_TRG_E1 155 Technical Reference Guide ing a certain circuit switched traffic demand, then the number of TRXs to be allocated cannot be 1 even if there is no packet switched traffic considered yet. The total numbers of timeslots that carry circuit switched and packet switched traffic respectively are the sums of respective dedicated and shared timeslots: TS P = TS S + TS P dedicated and TS C = TS S + TS C dedicated 5.3.2.2.3 Step 3: Effective CS Blocking, Effective CS Traffic Overflow and Served CS Traffic In this step, the previously calculated number of required TRXs is used to compute the effective blocking rate for the circuit switched traffic. This is performed by using the Erlang B or Erlang C formula with the circuit switched traffic demand and the number of required TRXs as inputs and computing the Grade of Service (or blocking probability). It then calculates the effective traffic overflow rate, Oeff.. In case of Erlang B formula, the effective rate of traffic overflow for the circuit switched traffic is the same as the circuit switched blocking rate. While in case of the Erlang C model, the circuit switched traffic is supposed to be placed in an infinite-length waiting queue. This implies that there is no overflow in this case. From this data, it also computes the served circuit switched traffic. This is the difference of the circuit switched traffic demand and the percentage of traffic that overflows from the subcell to other subcells calculated above. Hence, for an effective traffic overflow rate of Oeff. and the circuit switched traffic demand of TDC, the served circuit switched traffic STC is computed as: STC = TD C 1 – O eff 5.3.2.2.4 Step 4: TRXs to Add for PS Traffic This step is the core of the dimensioning process for packet switched services. First of all, Atoll computes the number of TRXs to be added to carry the packet switched traffic demand. This is the number of TRXs that contain dedicated packet switched and shared timeslots. To determine this number of TRXs, Atoll calculates the equivalent average packet switched traffic demand in timeslots by studying each pixel covered by the transmitter. This calculation is in fact performed in the traffic analysis process. Knowing the traffic demand per pixel of the covered area in terms of kbps and the maximum attainable throughput per pixel (according to the C and/or C/I conditions and the coding scheme curves in the GPRS/EDGE configuration), Atoll calculates the average traffic demand in packet switched timeslots by: TD P Timeslots = pixel Traffic demand per pixel (kbps) ---------------------------------------------------------------------------------Throughput per pixel (kbps) The average timeslot capacity of a transmitter is calculated by dividing the packet switched traffic demand over the entire coverage area (in kbps) by the packet switched traffic demand in timeslots calculated above. With the number of timeslots required to serve the circuit switched traffic, the timeslots required for packet switched traffic and their respective distributions according to the timeslot configurations being known, Atoll calculates the number of timeslots available for carrying the packet switched traffic demand. These timeslots can be dedicated packet switched timeslots and the shared ones. So, following the principle that shared timeslots are potential carriers of both traffic types, TS P = TS S + TS P dedicated TS C = TS S + TS C dedicated The packet switched traffic load is calculated by the formula: ST C – TS C dedicated + TD P Timeslots L P = ---------------------------------------------------------------------------------------------TS P The second important parameter for the calculation of Reduction Factor, Delay and Blocking Probability is the equivalent number of available timeslots for packet switched traffic, i.e. NP. This is computed by dividing the total number of timeslots available for carrying packet switched traffic by the number of downlink timeslots defined in the mobile terminal properties. So, NP is calculated at this stage as: TS P N P = --------------------------TS Terminal Where, TSTerminal is the number of timeslots that a terminal will use in packet switched calls. The number timeslots that a terminal can use in packet switched calls is the product of the number of available DL timeslots for packet-switched services (on a frame) and the number of simultaneous carriers (in case of EDGE evolution). The number of timeslots that a terminal will use in packet switched calls is determined by taking the lower of the maximum number of timeslots for packet switched service defined in the service properties and the maximum number of timeslots that a mobile terminal can use for packet switched services (see above). TS Terminal = min TS Max Service TS Max TerminalType and TS Max TerminalType = TS DL TerminalType Carriers DL TerminalType Here, the min(X,Y) function yields the lower value among X and Y as result. 156 AT281_TRG_E1 © Forsk 2009 Chapter 5: GSM GPRS EDGE Networks Now, knowing the packet switched traffic load, LP, and the equivalent number of available timeslots, NP, Atoll finds out the KPIs that have been selected before launching the dimensioning process using the quality curves stored in the dimensioning model. This particular part of this step can be iterative if the KPIs to consider in dimensioning are not satisfied in the first try. If the KPIs calculated above are within acceptable limits as defined by the user, it means that the dimensioning process has acceptable results. If these KPIs are not satisfied, then Atoll increases the number of TRXs calculated for carrying packet switched traffic by 1 (each increment adding 8 more timeslots for carrying packet switched traffic as the least unit that can be physically added or removed is a TRX) and resumes the computations from Step 3. It then recalculates the packet switched traffic load, LP, and the equivalent number of available timeslots, NP. Then it recomputes the KPIs with these new values of LP and NP. If the KPIs are within satisfactory limits the results are considered to be acceptable. Otherwise, Atoll performs another iteration to find the best possible results. The calculated values of all the KPIs are compared with the ones defined in the service properties. The values for maximum Delay and Blocking probability are defined directly in the properties but the minimum throughput reduction factor is calculated by Atoll using the user’s inputs: minimum throughput per user and required availability. This calculation is in fact performed during the traffic analysis process, but since it is relevant to the dimensioning procedure, it is displayed in a column in the dimensioning results so that the user can easily compare the minimum requirement on the reduction factor KPI with the resulting one. Minimum Throughput Reduction Factor Calculation The minimum throughput reduction factor is computed using the input data: minimum required throughput per user defined in the service properties, the average throughput per timeslot deduced from the throughput curves stored in the GPRS/ EDGE configuration properties for each coding scheme, the total number of downlink timeslots defined in the properties of the mobile terminal (See TS Max TerminalType defintion above) and the required availability defined in the service properties. It is at the stage of calculating the average timeslot capacity per transmitter that Atoll studies each covered pixel for carrier power or carrier-to-interference ratio. According to the measured carrier power or carrier-to-interference ratio, Atoll deduces the maximum throughput available on that pixel through the throughput vs. C or throughput vs. C/I curves of the GPRS/EDGE configuration. The throughput per timeslot per pixel TPTS, Pixel can be either a function of carrier power C, or carrier power C and the carrier-to-interference ratio C/I, depending on the user-defined traffic analysis RF conditions criteria. Therefore, TP TS Pixel = f C Or C TP TS Pixel = f C and TP TS Pixel = f ---- i The required availability parameter defines the percentage of pixels within the coverage area of the transmitter that must satisfy the minimum throughput condition. This parameter renders user-manageable flexibility to the throughput requirement constraint. To calculate the minimum throughput reduction factor for the transmitter, Atoll computes the minimum throughput reduction factor for each pixel using the formula: TP user min RF min Pixel = ------------------------------------------------------------TP TS Pixel TS Terminal Once the minimum reduction factor for each pixel is known, Atoll calculates the global minimum reduction factor that is satisfied by the percentage of covered pixels defined in the required availability. The following example may help in understanding the concept and calculation method. Example: Let the total number of pixels, covered by a subcell S, be 1050. The reliability level set to 90%. This implies that the required minimum throughput for the given service will be available at 90% of the pixels covered. This, in turn, implies that there will be a certain limit on the reduction factor, i.e. if the actual reduction factor in that subcell becomes less than a minimum required, the service will not be satisfactory. Atoll computes the minimum reduction factor at each pixel using the formula mentioned above, and outputs the following results: RFmin Number of pixels 0.3 189 0.36 57 0.5 20 0.6 200 0.72 473 0.9 23 0.98 87 So for a reliability level of 90%, the corresponding RFmin will be the one provided at least 90% of the pixels covered, i.e. 945 pixels. The corresponding value of the resulting RFmin in this example hence turns out to be 0.9, since this value © Forsk 2009 AT281_TRG_E1 157 Technical Reference Guide covers 962 pixels in total. Only 87 of the covered pixels imply an RFmin of 0.98. These will be the pixels that do not provide satisfactory service. This calculation is performed for each service type available in the subcell coverage area. The final minimum throughput reduction factor is the highest one amongst all calculated for each service separately. The minimum throughput reduction factor RFmin value is a minimum requirement that must be fulfilled by the network dimensioning process when the Reduction Factor KPI is selected in the dimensioning model. Figure 5.9: Minimum Throughput Reduction Factor 5.3.2.2.5 Step 5: Served PS Traffic Atoll calculates the served packet switched traffic using the number of timeslots available to carry the packet switched traffic demand. As the result of the above iterative step, Atoll always finds the best possible answer in terms of number of timeslots required to carry the packet switched traffic demand unless the requirement exceeds the maximum limit on the number of the packet switched traffic timeslots defined in the dimensioning model properties. Hence, there is no packet traffic overflow unless the packet switched traffic demand requires more TRXs than the maximum allowed 5.3.2.2.6 Step 6: Total Traffic Load This step calculates the final result of the dimensioning process, i.e. the total traffic load. The total traffic load L is calculated as: ST C + ST P L = ----------------------------------------------------------------------------------------------TS C dedicated + TS P dedicated + TS S Where, • • • • • 5.4 STC is the served circuit switched traffic STP is the served packet switched traffic TSC, dedicated is the number of dedicated circuit switched timeslots TSP, dedicated is the number of dedicated packet switched timeslots TSS is the number of shared timeslots Key Performance Indicators Calculation This feature calculates the current values for all circuit switched and packet switched Key Performance Indicators as a measure of the current performance of the network. It can be used to evaluate an already dimensioned network in which recent traffic changes have been made in limited regions to infer the possible problematic areas and then to improve the network dimensioning with respect to these changes. The concept of this computation is the inverse of that of the dimensioning process. In this case, Atoll has the results of the dimensioning process already committed and known. Atoll then computes the current values for all the KPIs knowing the number of required TRXs, the respective numbers of shared and dedicated timeslots and the circuit switched and packet switched traffic demands. The computation algorithm utilizes the parameters set in the dimensioning model properties and the quality curves for the throughput reduction factor, delay and the blocking probability. The following conventional relations apply: If, • • • 158 TSC, dedicated is the number of timeslots dedicated to the circuit switched traffic, TSP, dedicated is the number of timeslots dedicated to the packet switched traffic, TSS is the number of shared timeslots for a transmitter, AT281_TRG_E1 © Forsk 2009 Chapter 5: GSM GPRS EDGE Networks Then, the number of timeslots available for the circuit switched traffic, TSC, is defined as: TS C = TS S + TS C dedicated And the number of timeslots available for the packet switched traffic, TSP, is given by: TS P = TS S + TS P dedicated 5.4.1 Circuit Switched Traffic For each subcell, Atoll has already calculated the effective traffic overflow rate and the blocking rate during the dimensioning process. Also knowing the circuit switched traffic demand, TDC, and the number of timeslots available for circuit switched traffic, TSC, the blocking probability can be easily computed using the Erlang formulas or tables. 5.4.1.1 Erlang B Under the current conditions of circuit switched traffic demand, TDC, and the number of timeslots available for the circuit switched traffic, TSC, the percentage of blocked circuit switched traffic can be computed through: TS C TD C ------------------------- TS C ! % of blocked traffic = ----------------------------TS C k TD C ------------------k! k=0 In a network dimensioning based on Erlang B model, the circuit switched traffic overflow rate, OC, is the same as the percentage of traffic blocked by the subcell calculated above. 5.4.1.2 Erlang C Similarly, under the current conditions of circuit switched traffic demand, TDC, and the number of timeslots available for the circuit switched traffic, TSC, the percentage of delayed circuit switched traffic can be computed through: TS C TD C % of traffic delayed = -------------------------------------------------------------------------------------------------------------------------TS – 1 TD C TS C TD C + TS C ! 1 – ---------- TS C C k TD C -----------------k! k=0 If the circuit switched traffic demand, TDC, is higher than the number of timeslots available to accommodate circuit switched traffic, the column for this result will be empty signifying that there is a percentage of circuit switched traffic actually being rejected rather than just being delayed under the principle of Erlang C model. The circuit switched traffic overflow rate, OC, will be 0 if the circuit switched traffic demand, TDC, is less than the number of timeslots available for the circuit switched traffic, TSC. If, on the other hand, the circuit switched traffic demand, TDC, is higher than the number of timeslots available to carry the circuit switched traffic, TSC, then there will be a certain percentage of circuit switched traffic that will overflow from the subcell. This circuit switched traffic overflow rate, OC, is calculated as: TD C – TS C O C = ----------------------------TD C 5.4.1.3 Served Circuit Switched Traffic The result of the above two processes will be a traffic overflow rate for the circuit switched traffic for each subcell, OC. The served circuit switched traffic, STC, is calculated as: ST C = TD C 1 – O C 5.4.2 Packet Switched Traffic Identifying the total traffic demand, TDT, (circuit switched traffic demand + packet switched traffic demand) as: TD T = TD C + TD P The following two cases can be considered. © Forsk 2009 AT281_TRG_E1 159 Technical Reference Guide 5.4.2.1 Case 1: Total Traffic Demand > Dedicated + Shared Timeslots In the case where the total number of timeslots available is less than the total traffic demand, there will be packet switched data traffic that will be rejected by the subcell as it will not be able to accommodate it. The following results are expected in this case: 5.4.2.1.1 Traffic Load The traffic load will be 100%, as the subcell will have more traffic to carry than it can. This implies that the system will be loaded to the maximum and even saturated. Hence the user level quality of service is bound to be very unsatisfactory. 5.4.2.1.2 Packet Switched Traffic Overflow In a 100% loaded, or even saturated subcell, the packet switched data calls will start being rejected because of shortage of available resources. Hence there will be a perceptible packet switched traffic overflow in this subcell, OP. This overflow rate is calculated as show below: TS C dedicated + TS P dedicated + TS S – ST C 100 O P = 1 – ----------------------------------------------------------------------------------------------------------------------------TD P 5.4.2.1.3 Throughput Reduction Factor The resulting throughput reduction factor for a 100% loaded or saturated subcell will be 0. Hence, the throughput perceived by the packet switched service user will be 0, implying a very bad quality of service. 5.4.2.1.4 Delay Again for a 100% loaded or saturated subcell, the delay at the packet switched service user end will be infinite as there is no data transfer (throughput = 0). 5.4.2.1.5 Blocking Probability All the data packets will be rejected by the system since it is saturated and has no free resources to allocate to incoming data packets. Hence, the blocking probability will be 100%. 5.4.2.1.6 Served Packet Switched Traffic With the packet switched data traffic overflowing from the subcell, there will be a part of that traffic that is not served. The served packet switched data traffic, STP, is calculated on the same principle as the served circuit switched traffic: STP = TD P 1 – O P 5.4.2.2 Case 2: Total Traffic Demand < Dedicated + Shared Timeslots In the case where the total traffic demand is less than the number of timeslots available to carry the traffic, the subcell will not be saturated and there will be some deducible values for all the data KPIs. In a normally loaded subcell, the packet switched data traffic will have no overflow percentage. This is due to the fact that the packet switched data traffic is rather placed in a waiting queue than be rejected. Therefore, there will be a within limits packet switched traffic load, LP, calculated as under: ST C – TS C dedicated + TD P Timeslots L P = ---------------------------------------------------------------------------------------------TS P The second parameter for computing the KPIs from the quality curves of the dimensioning model is the number of equivalent timeslots available for the packet switched data traffic, NP, which is calculated in the same manner as in the dimensioning process as well: TS P N P = --------------------------TS Terminal These parameters calculated, now Atoll can compute the required KPIs through their respective quality curves. 5.4.2.2.1 Traffic Load The traffic load is computed knowing the total traffic demand and the total number of timeslots available to carry the entire traffic demand: TD T Traffic Load = ----------------------------------------------------------------------------------------------TS C dedicated + TS P dedicated + TS S 5.4.2.2.2 Packet Switched Traffic Overflow In a normally loaded subcell, no packet switched data calls will be rejected. The packet switched traffic overflow will, therefore, be 0. 160 AT281_TRG_E1 © Forsk 2009 Chapter 5: GSM GPRS EDGE Networks 5.4.2.2.3 Throughput Reduction Factor The resulting throughput reduction factor for a normally loaded subcell is calculated through the throughput reduction factor quality curve for given packet switched traffic load, LP, and number of equivalent timeslots, NP. 5.4.2.2.4 Delay The resulting delay the subcell is calculated through the delay quality curve for given packet switched traffic load, LP, and number of equivalent timeslots, NP. 5.4.2.2.5 Blocking Probability The resulting blocking probability for a normally loaded subcell is calculated through the blocking probability quality curve for given packet switched traffic load, LP, and number of equivalent timeslots, NP. 5.4.2.2.6 Served Packet Switched Traffic As there is no overflow of the packet switched traffic demand from the subcell under consideration, the served packet switched traffic will be the same as the packet switched traffic demand: ST P = TD P 5.5 Neighbour Allocation The intra-technology neighbour allocation algorithm takes into account all the TBC transmitters. It means that all the TBC transmitters of the .atl document are potential neighbours. The transmitters to be allocated will be called TBA transmitters. They must fulfil the following conditions: • • • • They are active, They satisfy the filter criteria applied to the Transmitters folder, They are located inside the focus zone, They belong to the folder on which allocation has been executed. This folder can be either the Transmitters folder or a group of transmitters or a single transmitter. Only TBA transmitters may be assigned neighbours. Note: • 5.5.1 If no focus zone exists in the .atl document, Atoll takes into account the computation zone. Global Allocation for All Transmitters We assume a reference transmitter A and a candidate neighbour, transmitter B. When automatic allocation starts, Atoll checks following conditions: 1. 2. The distance between both transmitters must be less than the user-definable maximum inter-site distance. If the distance between the reference transmitter and the candidate neighbour is greater than this value, then the candidate neighbour is discarded. The calculation options, Force co-site transmitters as neighbours: This option enables you to force transmitters located on the reference transmitter site in the candidate neighbour list. This constraints can be weighted among the others and ranks the neighbours through the importance field (see after). Force adjacent transmitters as neighbours: This option enables you to force transmitters geographically adjacent to the reference transmitter in the candidate neighbour list. This constraints can be weighted among the others and ranks the neighbours through the importance field (see after). Notes: • © Forsk 2009 Adjacence criterion: Geographically adjacent transmitters are determined on the basis of their Best Server coverages in 2G (GSM GPRS EDGE) projects. More precisely, a transmitter TXi is considered adjacent to another transmitter TXj if there exists at least one pixel of TXi Best Server coverage area where TXj is the 2nd Best Server. The ranking of the adjacent neighbour transmitter increases with the number of these pixels. The figure below shows the above concept. AT281_TRG_E1 161 Technical Reference Guide • When this option is checked, adjacent cells are sorted and listed from the most adjacent to the least, depending on the above criterion. Adjacence is relative to the number of pixels satisfying the criterion. • This criteria is only applicable to transmitters belonging to the same HCS layer. The geographic adjacency criteria is not the same in 3G (UMTS HSPA, CDMA2000) projects. Force neighbour symmetry: This option enables user to force the reciprocity of a neighbourhood link. Therefore, if the reference transmitter is a candidate neighbour of another transmitter, the later will be considered as candidate neighbour of the reference transmitter. Force exceptional pairs: This option enables you to force/forbid some neighbourhood relationships. Therefore, you may force/forbid a transmitter to be candidate neighbour of the reference transmitter. Delete existing neighbours: When selecting the Delete existing neighbours option, Atoll deletes all the current neighbours and carries out a new neighbour allocation. If not selected, the existing neighbours are kept. There must be an overlapping zone ( S A S B ) with a given cell edge coverage probability where: 3. • • SA is the area where the received signal level from the transmitter A is greater than a minimum signal level. SA is the coverage area of reference transmitter A restricted between two boundaries; the first boundary represents the start of the handover area (best server area of A plus the handover margin named “handover start”) and the second boundary shows the end of the handover area (best server area of A plus the margin called “handover end”) SB is the coverage area where the candidate transmitter B is the best server. SA SB Atoll calculates either the percentage of covered area ( ---------------------- 100 ) if the option “Take into account Covered Area” is SA selected, or the percentage of traffic covered on the overlapping area S A S B for the option “Take into account Covered Traffic”. Then, it compares this value to the % minimum covered area (minimum percentage of covered area for the option “Take into account Covered Area” or minimum percentage of covered traffic for the option “Take into account Covered Traffic”). If this percentage is not exceeded, the candidate neighbour B is discarded. The coverage condition can be weighted among the others and ranks the neighbours through the importance field (see number 4 below). 162 AT281_TRG_E1 © Forsk 2009 Chapter 5: GSM GPRS EDGE Networks Figure 5.10: Overlapping Zones 4. The importance values are used by the allocation algorithm to rank the neighbours according to the allocation reason, and to quantify the neighbour importance. Atoll lists all neighbours and sorts them by importance value so as to eliminate some of them from the neighbour list if the maximum number of neighbours to be allocated to each transmitter is exceeded. If we consider the case for which there are 15 candidate neighbours and the maximum number of neighbours to be allocated to the reference transmitter is 8. Among these 15 candidate neighbours, only 8 (having the highest importances) will be allocated to the reference transmitter. As indicated in the table below, the neighbour importance depends on the neighbourhood cause; this value goes from 0 to 100%. Neighbourhood cause When Importance value Existing neighbour Only if the Delete existing neighbours option is not selected and in case of a new allocation Existing importance Exceptional pair Only if the Force exceptional pairs option is selected 100 % Co-site transmitter Only if the Force co-site transmitters as neighbours option is selected (IF) function Adjacent transmitter Only if the Force adjacent transmitters as neighbours option is selected (IF) function Neighbourhood relationship that fulfils coverage conditions Only if the % minimum covered area is exceeded (IF) function Symmetric neighbourhood relationship Only if the Force neighbour symmetry option is selected (IF) function Except forced neighbour case (importance = 100%), priority assigned to each neighbourhood cause is now linked to the (IF) Importance Function evaluation. The importance is evaluated through a function (IF), taking into account the following 3 factors: • • • Co-site factor (C) which is a Boolean factor, Adjacency factor (A) which deals with the percentage of adjacency, Overlapping factor (O) meaning the percentage of overlapping The (IF) function is user-definable using the Min importance and Max importance fields. Factor Min importance Default value Max importance Default value Overlapping factor (O) Min(O) 1% Max(O) 30% Adjacency factor (A) Min(A) 30% Max(A) 60% Co-site factor (C) Min(C) 60% Max(C) 100% The (IF) function is evaluated as follows: © Forsk 2009 AT281_TRG_E1 163 Technical Reference Guide Neighbourhood cause (IF) function (IF) function with default Min and Max default values Co-site Adjacent no no Min(O) + Delta(O)(O) 1% + 29%(O) no yes Min(A)+Delta(A){Max(O)(O)+(100%Max(O))(A)} 30% + 30%{30%(O) + 70%(A)} yes yes Min(C)+Delta(C){Max(O)(O)+(100%Max(O))(A)} 60% + 40%{30%(O )+ 70%(A)} Where Delta(x) = Max(x) - Min(x) Notes: • If there is no overlapping between the range of each factor, the neighbours will be ranked by neighbourhood cause. Using the default values for minimum and maximum importance fields, neighbours will be ranked in this order: first co-site neighbours, then adjacent neighbours, and finally neighbours found on overlapping criterion. • If ranges of (IF) factors overlap each other, the neighbours may not be ranked by neighbourhood cause. • The ranking between neighbours from the same category will depend on (A) and (O) factors. • The default value of Min(O)= 1%, ensures that neighbours selected for symmetry will have an importance greater than 0%. With a value of Min(O)= 0%, neighbours selected for symmetry, will have an importance field greater than 0% only if there is some overlapping. In the Results part, Atoll provides the list of neighbours, the number of neighbours and the maximum number of neighbours allowed for each cell. In addition, it indicates the importance (in %) of each neighbour and the allocation reason. Therefore, a neighbour may be marked as exceptional pair, co-site, adjacent, coverage or symmetric. For neighbours accepted for co-site, adjacency and coverage reasons, Atoll displays the percentage of area meeting the coverage conditions (or the percentage of covered traffic on this area) and the corresponding surface area (km2) (or the traffic covered on the area in Erlangs), the percentage of area meeting the adjacency conditions and the corresponding surface area (km2). Finally, if cells have previous allocations in the list, neighbours are marked as existing. Notes: • No prediction study is needed to perform an automatic neighbour allocation. When starting an automatic neighbour allocation, Atoll automatically calculates the path loss matrices if not found. • Atoll uses traffic map(s) selected in the default traffic analysis in order to determine the percentage of traffic covered in the overlapping area. • When the option “Force adjacent transmitters as neighbours” is used, the margin “handover start” is not taken into account. Atoll considers a fixed value of 0 dB. • A forbidden neighbour must not be listed as neighbour except if the neighbourhood relationship already exists and the Delete existing neighbours option is unchecked when you start the new allocation. In this case, Atoll displays a warning in the Event viewer indicating that the constraint on the forbidden neighbour will be ignored by algorithm because the neighbour already exists. • The force neighbour symmetry option enables the users to consider the reciprocity of a neighbourhood link. This reciprocity is allowed only if the neighbour list is not already full. Thus, if transmitter B is a neighbour of the transmitter A while transmitter A is not a neighbour of the transmitter B, two cases are possible: 1st case: There is space in the transmitter B neighbour list: the transmitter A will be added to the list. It will be the last one. 2nd case: The transmitter B neighbour list is full: Atoll will not include transmitter A in the list and will cancel the link by deleting transmitter B from the transmitter A neighbour list. 5.5.2 • When the options “Force exceptional pairs” and “Force symmetry” are selected, Atoll considers the constraints between exceptional pairs in both directions so as to respect symmetry condition. On the other hand, if neighbourhood relationship is forced in one direction and forbidden in the other one, symmetry cannot be respected. In this case, Atoll displays a warning in the Event viewer. • In the Results, Atoll displays only the transmitters for which it finds new neighbours. Therefore, if a transmitter has already reached its maximum number of neighbours before starting the new allocation, it will not appear in the Results table. Allocation for a Group of Transmitters or One Transmitter In this case, Atoll allocates neighbours to: • 164 TBA transmitters, AT281_TRG_E1 © Forsk 2009 Chapter 5: GSM GPRS EDGE Networks • • Neighbours of TBA transmitters marked as exceptional pair, adjacent and symmetric, Neighbours of TBA transmitters that satisfy coverage conditions. Automatic neighbour allocation parameters are described in "Global Allocation for All Transmitters" on page 161. 5.6 Interference Prediction Studies 5.6.1 Coverage Studies Two interference studies with predefined settings are available: • • The coverage by C/I level study: This study provides you a global analysis of the network quality. The interfered areas study: This study shows the areas where a transmitter is interfered by other ones. In both cases, Atoll calculates C/I ratio on each calculation bin where conditions on signal level reception are satisfied. Then, it either considers the bins where the calculated C/I exceeds a lower threshold in the coverage and colours these bins depending on C/I value (coverage by C/I level study), or it considers the bins where the calculated C/I is lower than a upper threshold in the coverage and colours them depending on colour of the interfered transmitter (interfered areas study). The user-defined thermal noise (N) value is used in the calculations if the corresponding calculation conditions are selected in the conditions tab of an interference study. The thermal noise is considered to be a white guassian background noise fixed at the user-defined value for the entire network or part of the network under consideration. This value is defined in the document database at -121 dBm by default. All the TBC transmitters are taken into account in these studies. Let us assume that each bin within each TBC transmitter calculation area corresponds to a probe mobile receiver. Coverage study parameters to be set are: • • The study conditions in order to determine the coverage area of each TBC transmitter The display settings to select how to colour coverage areas. Note: • 5.6.1.1 For information on the common prediction studies (like coverage by transmitter, profile study, …), please, refer to Common prediction studies part. Service Area Determination The areas, where Atoll will calculate C/I, depend on signal level reception conditions. Atoll uses the parameters entered in the Conditions tab in order to determine service area of each TBC transmitter. We can distinguish four cases: Here we presume that: • • 5.6.1.1.1 Each transmitter, Txi, belongs to a hierarchical cell structure (HCS) layer, k, with a defined priority. The maximum range option (available in the System tab of the Predictions property dialog) is inactive. All Servers For each HCS layer, k, the service area of Txi corresponds to the bins where: Txi Minimum threshold P rec tt Maximum threshold 5.6.1.1.2 Best Signal Level per HCS Layer and a Margin For each HCS layer, k, the service area of Txi corresponds to the bins where: Txi Minimum threshold P rec tt Maximum threshold and Txi Txj P rec BCCH Best P rec BCCH – M ji where, M is the specified margin (dB). Best function: considers the highest value. 5.6.1.1.3 Best Signal Level of the Highest Priority HCS Layer and a Margin In this case, the service area of Txi corresponds to the bins where: Txi Minimum threshold P rec tt Maximum threshold and Txi Txj P rec BCCH Best P rec BCCH – M ji © Forsk 2009 AT281_TRG_E1 165 Technical Reference Guide and Txi belongs to the HCS layer with the highest priority where, M is the specified margin (dB). Best function: considers the highest value. 5.6.1.1.4 Second Best Signal Level per HCS Layer and a Margin For each HCS layer, k, the service area of Txi corresponds to the bins where: Txi Minimum threshold P rec tt Maximum threshold and Txi P rec BCCH 2 nd Txj Best P rec BCCH – M ji where, M is the specified margin (dB). 2nd Best function: considers the second highest value. Note: • When the maximum range option is selected, Atoll searches for interference on the bins: - Where the respective criteria described above are checked, and - Located within a specified distance from the transmitter (maximum range). 5.6.1.1.5 Best Idle Mode Reselection Criterion (C2) Such type of coverage would is useful : • • To compare Idle and Dedicated mode best servers for Voice traffic Display the GPRS/EDGE best server map (based on GSM idle mode) The path loss criterion parameter C1 used for cell selection and reselection is defined by : Txi C1 = P rec BCCH – MinimumThreshold BCCH The path loss criterion (GSM03.22) is satisfied if C1 0 . The reselection criterion C2 is used for cell reselection only and is defined by : C2 = C1 + CELL_RESELECT_OFFSET where CELL_RESELECT_OFFSET is the Cell Reselect Offset (in dB) defined for at the transmitter level. The service area of Txi corresponds to the bins where: Txi Txi Txi MinimumThreshold P rec BCCH or L total or L path MaximumThreshold And C2 Txi Txj BCCH = Best C2 BCCH j Best function: considers the highest value. On each bin, the best C2 value is kept. It corresponds to the best server in Idle Mode. Since the C2 value is an integer value, so must be rounded. 5.6.1.2 Carrier to Interference Ratio Calculation Atoll works out carrier to interference ratio on each bin of transmitter service areas. In order to understand the difference between each frequency hopping mode from the mobile point of view, it is interesting to consider the Mobile Station Allocation (MSA). MSA is characterised by the pair (Channel list, MAIO). When a non hopping (NH) mode is used, channel list is a channel while it corresponds to the mobile allocation list (MAL) in case of base band hopping (BBH) or synthesised frequency hopping (SFH). For BBH, channels of MAL belong to a unique TRX type. Examples: For each example given below, we assume that. In case of NH, we have: 166 TRX index Channel list MAIO MSA 1 53 * (53,*) 2 54 * (54,*) AT281_TRG_E1 © Forsk 2009 Chapter 5: GSM GPRS EDGE Networks In case of BBH, assuming TRXs belong to the same TRX type, we have: TRX index Channel list MAIO MSA 1 53 * ([53,54,55],0) 2 54 * ([53,54,55],1) 3 55 * ([53,54,55],2) TRX index Channel list MAIO MSA 1 53 54 55 56 2 ([53,54,55,56],2) 2 53 54 55 56 3 ([53,54,55,56],3) In case of SFH, we have: Therefore, for a mobile station, BBH and SFH work in the same way. Consider the following notations: v is a victim transmitter (TBC transmitter with a service area), MSAS(v) is the set of MSAs associated to v. The number of MSAS(v) depends on TRX type(s) to be analysed (option available in study properties): you may study a given TRX type tt (There are as many MSA(v) as TRXs allocated to the subcell (v,tt)) or all the TRX types (The number of MSA(v) corresponds to the number of TRXs allocated to v), i is a potential interfering transmitter (TBC transmitters which calculation area intersects service area of v), MSAS(i) is the set of MSAs related to potential interferers i, INT(v) is the set of transmitters that interfere v. Several MSAs, m, are related to a transmitter. Therefore, for each victim transmitter v with MSA m (m MSAS(v)), Atoll C v m - , received at the mobile; mobile is connected to a victim transmitter, v with calculates carrier to interference ratio --------------- Iv m v v a given m. C m is the carrier power level received from v on m and I m corresponds to the interference received from interfering transmitters i on m. Atoll studies the most interfered MSA. So, it considers: C v m C ---- = Min ----------------- except if analysis is detailed (Detailed result option). I v k Iv m If the interference conditions for the prediction study are defined using the option C/(I+N), Atoll takes the total noise N tot into account as well. The total noise is computed by adding the thermal noise N thermal (defined in the document database at -121 dBm by default) to the noise figure NF (either defined at the terminal type properties level, if a terminal type is defined for the study, or defined directly in the prediction study conditions) and the inter-technology downlink noise rise, if any, v DL NR inter – techno log y (defined at the TRX level). The inter-technology downlink noise rise models the interference level on m due to the mobiles in external linked projects. So, v DL N tot = N thermal + NF + NR inter – techno log y C Thus, for computations based on C/(I+N), ------------------ I + N tot v Cv m - = Min -----------------------------k Iv m + N tot Note: • The M Shadowing used in the computations of C/I is a function of C/I standard deviation and not the Model standard deviation. 5.6.1.2.1 Carrier Power Level v v C m = P rec m 5.6.1.2.2 Interference Calculation Potential interferers can be transmitters i (iv), using co-channels and/or adjacent channels. Therefore, we can write: v v v DL i I m = I co m + I adj m + I inter – techno log y m + I IMPx3 – G PC Where © Forsk 2009 v • I co m is the interference received at v on m due to co-channels, • I adj m is the interference received at v on m due to adjacent channels, v AT281_TRG_E1 167 Technical Reference Guide DL • I inter – techno log y m is the total inter-technology interference level on m due to one or several external linked • projects, I IMPx3 is the third order intermodulation interference, • G PC is the average power control gain defined for the interfering transmitter i. i v I co m is the interference received at v on m due to co-channels, given by: v I co m = i INT v n MSAS i v i i p m n P rec n T i n co v And, I adj m is the interference received at v on m due to adjacent channels, given by: v I adj m = i INT v n MSAS i i P rec n v i p m n ------------------- T i n F adj v i p m n is the probability of having a co- or adjacent channel collision between MSAs n and m (when n and m contain coand adjacent channels). It depends on the used frequency hopping mode. i P rec n is the carrier power level received from i on n, Ti(n) is occupancy of the MSA n. i i T i n = L traffic n f act n i If “Average” is selected in the study properties, L traffic n is the traffic load defined for the MSA n of i. If “Maximum” option i is selected, L traffic n = 1 . i f act n is the activity factor defined for the MSA n of i. If the subcell (i,tt) supports DTX mode, it is a global value specified in the study properties. Otherwise, the activity factor is 1. Note: • Since BCCH carrier is always On Air, DTX and traffic load gains do not reduce BCCH i i interfering energy. In other words, f act n = 1 and L traffic n = 1 on the BCCH for the interference estimation. DL Downlink external sources of interferences I inter – network are various and due to complex phenomena (Adjacent Channel interferences, Wideband Noise, Intermodulation between technologies). The way to easily integrate all these aspects in a unique parameter is to define Reduction Factors (or Inter-technology Channel Protections - ICP) between technologies. The value of ICP, in dB in a function of the following parameters: • • • • The interfering technology (CDMA, TDMA, OFDM) The interfering carrier bandwidth in kHz (e.g. 3840 khZ in UMTS) The victim carrier bandwidth in khZ (here 200 kHz in GSM) The frequency gap between the carriers of the different technologies (MHz) The contribution of an external transmitter Tx in the total downlink interferences, on a receiver m is defined by: Tx DL I inter – network m = P Transmitted ic i -----------------------------------------Tx Tx m L ICP ni total ic i f m Where: th • ic i is the i frequency used by the external transmitter Tx within its list of frequencies • P Transmitted ic i is the total transmitted Tx power on ic i (dBm) • L total are the total losses between the external transmitter and the receiver (dB) • ICP ic f Tx Tx Tx m i m is the Inter-technology Channel Protection between the signal transmitted by Tx (on carrier ic) and received by m (on frequency f m ) with a certain frequency gap Note: • • 168 In case of frequency hopping, the ICP value is weighted according to the fractional load. In the ICP, the frequency gap is based on the defined base frequency for each technology (e.g. 935 MHz in GSM 900) AT281_TRG_E1 © Forsk 2009 Chapter 5: GSM GPRS EDGE Networks I IMPx3 has three components, i.e., intermodulation interference from frequencies used by the interfering transmitter, interference due to spurious emissions from the interfering transmitter, and the intermodulation interference received at the mobile terminal: TX SE Term I IMPx3 = I IMPx3 + I IMPx3 + I IMPx3 The above components are calculated as follows: i P rec TX I IMPx3 = ---------------v L IMPx3 SE i SE I IMPx3 = P rec i 3 P rec Term I IMPx3 = -------------------------Prot 2 F IMPx3 i Where P rec is the carrier power level received from the interferer i, L IMPx3 is the third order intermodulation loss at the SE i Prot victim transmitter v, P rec is the spurious emission power level received from the interferer i, and F IMPx3 is the third order intermodulation protection factor for the terminal. For a pair of frequencies, f 1 and f 2 , two third order intermodulation products are generated at frequencies f 3 = 2 f 1 – f 2 and f 4 = 2 f 2 – f 1 . If a transmitter uses f 3 or f 4 , it is interfered by transmitters using f 1 and f 2 . All interferer frequencies are used to calculate intermodulation products. When several frequency pairs generate intermodulation products, the IMPs are independenly calculated and added to the interference. If power received over different frequencies is not the same for two frequencies (not the same power offset for example), the corresponding intermodulation frequencies are ignored. Frequency hopping is not considered to have any impact on the intermodulation products. IMPs for hopping and non-hopping cases are considered to be the same. Intermodulation products generated by the adjacent frequencies of the frequencies actually being used by an interferer are not taken into account. Similarly, intermodulation interference received on the adjacent frequencies of the frequencies used by the victim are also ignored. 5.6.1.2.3 Collision Probability for Non Hopping Mode v i We have: p m n = 1 5.6.1.2.4 Collision Probability for BBH and SFH Modes MSA m of v can be defined as the pair ([f1,f2,….fn], MAIO) and MSA n of i as the pair ([f’1,f’2,….f’n], MAIO’) (where f and f’ are channels). v i Now, let us consider the occurrence, OCCUR f m f' n , such that a channel f of m can meet a channel f’ of n during hopping sequence. There is a collision if f and f’ are co- or adjacent channels. Then, we can define a collision as follows: v i v i Collision = OCCUR f m f' n such that f m – f' n = v i ( equals 0 if f m and f' n are co-channels or 1 if adjacent channels) Therefore, we have: n collision v i p m n = -------------------------n occurence ncollision and noccurence respectively correspond to the number of collisions and the number of occurrences. They are closely linked to the correlation between m and n. We can have two cases: 1st Case: MSAs m and n are Correlated m and n must have identical HSN and synchronisation. The number of occurrences depends on the MAL size, MAIO And MAIO’. Example: Schematic view of hopping sequences © Forsk 2009 MSA m of v ([34 37 39], MAIO=0) 34 37 39 MSA n of i ([38 36 34], MAIO’=2) 38 36 34 AT281_TRG_E1 169 Technical Reference Guide Here, the number of occurrences is 3; the number of co-channel collisions is 1 and the number of adjacent channel collisions is 1. So, we have: v i v i 1 1 p m n co = --- and p m n adj = --3 3 2nd Case: MSAs m and n are Not Correlated Condition specified above is not fulfilled. Probability to have each pair is the same. All the occurrences are possible. Example: Schematic view of hopping sequences MSA m of v ([34 37 39], MAIO=0) 34 37 39 MSA n of i ([38 36 34], MAIO’=2) 38 36 34 Here, the number of occurrences is 9; the number of co-channel collisions is 1 and the number of adjacent channel collisions is 3. So, we have: v i v i 1 1 p m n co = --- and p m n adj = --9 3 Note: • 5.6.1.3 Only the carrier power level is downgraded by the shadowing margin. The interference level is not altered. Coverage Area Determination C C For each victim transmitter v, coverage area corresponds to bins where ---- or ------------ is between lower and upper I v I + N v thresholds specified in study properties. There are two possibilities: 5.6.1.3.1 Interference Condition Satisfied by At Least One TRX This criterion implies that the interference condition defined in the interference study properties dialog must be satisfied by at least on TRX of the transmitter in order for the pixel under study to be included in the coverage area. In this case, the coverage area of a transmitter Txi corresponds to the bins where: C Minimum threshold ---- I v TRX j where, C Maximum threshold or Minimum threshold ------------ I + N v Maximum threshold TRX j TRXj is any TRX belonging to Txi. This coverage area will include all the bins satisfying the above criteria even if they are only covered by the TRX with the best C/I or C/(I+N) conditions. 5.6.1.3.2 Interference Condition Satisfied by The Worst TRX This criterion implies that the interference condition defined in the interference study properties dialog must be satisfied by the worst TRX of the transmitter in order for the pixel under study to be included in the coverage area. In this case, the coverage area of a transmitter Txi corresponds to the bins where: C Minimum threshold ---- I v TRX j C Maximum threshold or Minimum threshold ------------ I + N v Maximum threshold TRX j where, TRXj is the TRX (belonging to Txi) with the worst C/I or C/(I+N) conditions at the bin. This coverage area will include only the bins satisfying the above criteria, i.e. covered by the TRX with the worst C/I or C/ (I+N) conditions. 5.6.1.4 Coverage Area Display You can display the transmitter coverage area depending on the C/I (or C/(I+N)) level, prefer a display depending on transmitter colour or on any other transmitter attribute. 5.6.1.4.1 C/I Level Each bin of the transmitter coverage area is coloured if the calculated C/I (or C/(I+N)) level exceeds ( ) the specified minimum thresholds (bin colour depends on C/I (or C/(I+N)) level). Coverage consists of several independent layers whose 170 AT281_TRG_E1 © Forsk 2009 Chapter 5: GSM GPRS EDGE Networks visibility in the workspace can be managed. There are as many layers as transmitter coverage areas. Each layer shows the different C/I levels available in the transmitter coverage area. 5.6.1.4.2 Max C/I Level Atoll compares calculated C/I (or C/(I+N)) levels received from transmitters on each bin of each transmitter coverage area where coverage areas overlap the studied one and chooses the highest value. A bin of a coverage area is coloured if the C/I (or C/(I+N)) level exceeds ( ) the specified thresholds (the bin colour depends on the C/I (or C/(I+N)) level). Coverage consists of several independent layers whose visibility in the workspace can be managed. There are as many layers as defined thresholds. Each layer corresponds to an area where the highest received C/I level exceeds a defined minimum threshold. 5.6.1.4.3 Min C/I Level Atoll compares C/I (or C/(I+N)) levels received from transmitters on each bin of each transmitter coverage area where the coverage areas overlap the studied one and chooses the lowest value. A bin of a coverage area is coloured if the C/I (or C/(I+N)) level exceeds ( ) the specified thresholds (the bin colour depends on the C/I (or C/(I+N)) level). Coverage consists of several independent layers whose visibility in the workspace can be managed. There are as many layers as defined thresholds. Each layer corresponds to an area where the lowest received C/I level exceeds a defined minimum threshold. 5.6.1.4.4 Transmitter Atoll colours each bin of each transmitter coverage area. The bin colour corresponds to the transmitter colour. Coverage consists of several independent layers whose visibility in the workspace can be managed. There are as many layers as interfered transmitters. 5.6.2 Point Analysis Analysis provided in the Interference tab is based on path loss matrices. You can study interference on: • • TBC transmitters for which path loss matrices have been computed, calculation areas. Atoll indicates the following at the receiver: • • • The carrier power level received from the victim transmitter v on the most interfered MAS m, Either the overall interference received from interfering transmitters i on MAS m (both co-channel and adjacent channel interferers are considered), or the co-channel interference received from co-channel interfering transmitters i on MAS m, or the adjacent channel interference received from adjacent channel interfering transmitters i on MAS m (for further information about noise calculation, please refer to Signal to noise calculation: noise calculation part) The interference level received from each interfering transmitter i on m. Interferers are sorted in a descending order w.r.t. carrier power level. Notes: • Neither DTX nor traffic load of TRXs are taken into account to evaluate interference levels. i i Therefore, we have T i n = L traffic n f act n = 1 . • 5.7 Only carrier power level is downgraded by the shadowing margin. The interference level is not altered. GPRS EDGE Coverage Studies Atoll calculates a coverage area for all the TBC transmitters, assuming that each bin within a TBC GPRS/EDGE transmitter calculation area corresponds to a probe mobile receiver. Coverage study parameters to be set are: • • 5.7.1 The study conditions in order to determine the coverage area of each TBC transmitter, The display settings to select how to colour coverage areas. Coverage Area Determination Let us assume that: • • • • Each transmitter, Txi, belongs to a HCS layer, k, with a defined priority and a reception threshold. Each transmitter, Txi, is a GPRS/EDGE station. GPRS/EDGE configuration installed on each transmitter, Txi, does not support 8PSK modulation. The maximum range option (available in the System tab of the Predictions property dialog) is inactive. We can have the following four cases. © Forsk 2009 AT281_TRG_E1 171 Technical Reference Guide 5.7.1.1 All Servers For each HCS layer, k, the coverage area of Txi corresponds to Txi calculation area. 5.7.1.2 Best Signal Level per HCS Layer and a Margin For each HCS layer, k, the coverage area of Txi corresponds to the bins where the signal level received from Txi, Txi – EGPRS P rec BCCH , is the highest one (Txi is the best server) or within a defined margin of the highest signal level (within a margin of the best server). Note: • If the margin equals 0, the coverage area of Txi corresponds to the bins where Txi – EGPRS P rec 5.7.1.3 BCCH is the highest. Second Best Signal Level per HCS Layer and a Margin For each HCS layer, k, the coverage area of Txi corresponds to the bins where the signal level received from Txi, Txi – EGPRS P rec BCCH , is the second highest one (Txi is the second best server) or within a defined margin of the second highest signal level (within a margin of the second best server). Note: • If the margin equals 0, the coverage area of Txi corresponds to the bins where Txi – EGPRS P rec 5.7.1.4 BCCH is the second highest. HCS Servers and a Margin For each HCS layer, k, the coverage area of Txi corresponds to the bins where the signal level received from Txi, Txi – EGPRS P rec BCCH , is the highest one (Txi is the best server) or within a defined margin of the highest signal level Txi – EGPRS (within a margin of the best server). In addition P rec BCCH must exceed the reception threshold defined per HCS layer. Notes: • If the margin equals 0, the coverage area of Txi corresponds to the bins where Txi – EGPRS P rec 5.7.1.5 BCCH is the highest. Highest Priority HCS Server and a Margin In this case, the coverage area of Txi corresponds to the bins where the signal level received from Txi, Txi – EGPRS P rec BCCH , is the highest one (Txi is the best server) or within a defined margin of the highest signal level (within a margin of the best server). And, Txi belongs to the HCS layer with the highest priority. The highest priority is Txi – EGPRS defined by the priority field (0: lowest) assuming the received P rec BCCH exceeds the reception threshold defined per HCS layer. Note: • 5.7.1.6 In the case two layers have the same priority, the traffic is served by the transmitter for which the difference between the received signal strength and the HCS threshold is the highest. The way the competition is managed between layers with the same priority can be modified. For more information, see the Administrator Manual. Best C2 In this case, the coverage area of Txi corresponds to the bins where the best C2 value received from Txi, is the highest one. It corresponds to the best server in Idle Mode. Since the C2 value is an integer value, so must be rounded. 5.7.2 Calculation Options GPRS/EDGE studies can be based either on signal level (C), or on the signal level and carrier-to-interference ratio (C/I) with or without considering the receiver noise (N). If a reference terminal type is defined when launching a CQI study, Atoll will consider the noise figure defined for that terminal type when computing the total noise ( N tot ). If no terminal type is defined, the value defined in the coverage prediction properties (8 dB, by default) is used. Different GPRS/EDGE configuration can be defined for a transmitter and for the reference terminal type. In this case, Atoll performs an intersection for the coding schemes defined in the transmitter and the reference terminal type GPRS/EDGE 172 AT281_TRG_E1 © Forsk 2009 Chapter 5: GSM GPRS EDGE Networks configuration to determine the coding schemes that are common in the two. Hence, Atoll creates a temporary GPRS/ EDGE configuration comprising only these common coding schemes and uses this configuration to eventually compute the coding scheme, throughput and other values. If no reference terminal type is defined or if the defined reference terminal type has no GPRS/EDGE configuration assigned to it, Atoll will perform the computations based on the GPRS/EDGE configuration of the transmitter. Similarly, if a transmitter has no GPRS/EDGE configuration defined, Atoll will compute the coverage study considering only the GPRS/ EDGE configuration defined for the reference terminal type. If there is no GPRS/EDGE configuration defined for the transmitter and for the reference terminal type, there will be no coverage for the transmitter. 5.7.2.1 Calculations Based on C In this case, only the received signal level is taken into account. Atoll evaluates the signal level received from GPRS/EDGE Txi – EGPRS transmitters on TRXs (TRX) belonging to a selected TRX type (tt) or on all the TRXs, P rec 5.7.2.2 TRX . Calculations Based on C/I Without Considering Thermal Noise For GPRS/EDGE studies based on the received signal level and C/I ratio, Atoll evaluates: • The signal level received from GPRS/EDGE transmitters on TRXs (TRX) belonging to the selected TRX type (tt) Txi – EGPRS or on all the TRXs, P rec • TRX , and The carrier-to-interference ratio received on TRXs (TRX) belonging to the selected TRX type (tt) or on all the Txi – EGPRS P rec TRX TRXs, --------------------------------------------------- . I Notes: 5.7.2.3 • When GPRS/EDGE prediction studies calculations are based on C/I, Atoll calculates the carrier-to-interference ratio for all the GPRS/EDGE TBC transmitters but takes into account all the TBC transmitters (GSM and GPRS/EDGE) to evaluate the interference. • For further information on interference (I) calculation, please refer to Interference prediction studies: Interference calculation part. Calculations Based on C/I Considering Thermal Noise For GPRS/EDGE studies based on the received signal level and C/I ratio considering the effect of thermal noise, Atoll evaluates: • The received signal-level-to-thermal-noise ratio from GPRS/EDGE transmitters on TRXs (TRX) belonging to the Txi – EGPRS P rec TRX selected TRX type (tt) or on all the TRXs, --------------------------------------------------- . N And • The carrier-to-interference-and-noise ratio received on TRXs (TRX) belonging to the selected TRX type (tt) or on Txi – EGPRS P rec TRX all the TRXs, --------------------------------------------------- . I+N Where, N is the thermal noise whose value is defined in the document database at -121 dBm by default. Notes: 5.7.2.4 • When GPRS/EDGE prediction studies calculations are based on C/I, Atoll calculates the carrier-to-interference ratio for all the GPRS/EDGE TBC transmitters but takes into account all the TBC transmitters (GSM and GPRS/EDGE) to evaluate the interference. • For further information on interference (I) calculation, please refer to Interference prediction studies: Interference calculation part. Ideal Link Adaptation (ILA) Ideal link adaptation implies that the coding scheme selected will be the one that provides the maximum throughput. 5.7.3 Coverage Study Scenarios With the above options, there are many different possible scenarios of calculations. These scenarios are described below. 5.7.3.1 GPRS/EDGE Studies Based on C Without ILA 5.7.3.1.1 Coding Scheme Based on C Without ILA Atoll calculates the signal level received from Txi on each bin of the Txi coverage area. Then, selects a coding scheme, cs, from among the coding schemes available in the GPRS/EDGE configuration, such that: © Forsk 2009 AT281_TRG_E1 173 Technical Reference Guide For each TRX type, tt, cs = Lowest CS Txi – EGPRS P rec TRX Reception Threshold CS Where, cs is the resulting coding scheme, CS is the set of all available coding schemes, and Reception Threshold CS are the values of reception thresholds for the coding schemes available in the GPRS/EDGE configuration, defined in the Reception Thresholds column of the properties dialog. There can be more than one coding schemes whose reception thresholds are less than the received signal level. cs is the coding scheme with the lowest coding scheme number from the lowest priority coding scheme list. Coding scheme lists are organised as follows from the highest to the lowest priority one : DBS, DAS, MCS and CS. A Power Backoff, in dBs, can be defined for each subcell using 8PSK, 16QAM or 32QAM modulations (EDGE) based coding scheme configuration. This power backoff is taken in to account when selecting the codec mode available in the coverage area of the subcell, such that: Txi – EGPRS For each TRX type, tt, P rec 5.7.3.1.2 Txi – EGPRS TRX – P Backoff TRX Reception Threshold CS Throughput Based on C Without ILA Txi – EGPRS Atoll reads the throughput value for the received signal level, P rec TRX , from the Throughput=f(C) graph asso- ciated to the coding scheme, cs, determined above. 5.7.3.2 GPRS/EDGE Studies Based on C With ILA 5.7.3.2.1 Coding Scheme Based on C With ILA With Ideal Link Adaptation active, Atoll selects the coding scheme that provides the highest throughput at the received signal level value for a bin. Atoll calculates the signal level received from Txi on each bin of the Txi coverage area. Then, selects a coding scheme, cs, from among the coding schemes available in the GPRS/EDGE configuration, such that: For each TRX type, tt, cs = Lowest CS Where, cs is the resulting Txi – EGPRS Highest TP=f C=P rec Txi – EGPRS TP = Highest TP=f C=P rec coding scheme, CS is the TRX set of all available coding schemes, and TRX is the highest throughput provided by any coding scheme at the received signal level, from the Throughput = f(C) graphs defined in the properties dialog. If there are more than one coding schemes providing the highest throughput at the bin, cs will be the one with the lowest coding scheme number from the lowest priority coding scheme list. Coding scheme lists are organised as follows from the highest to the lowest priority one : DBS, DAS, MCS and CS. A Power Backoff, in dBs, can be defined for each subcell using 8PSK, 16QAM or 32QAM modulations (EDGE) based coding scheme configuration. This power backoff is taken in to account when selecting the codec mode available in the coverage area of the subcell, such that: Txi – EGPRS For each TRX type, tt, TP = Highest TP=f C=P rec 5.7.3.2.2 Txi – EGPRS TRX - P Backoff TRX Throughput Based on C With ILA The throughput at the given bin and for each TRX type, tt, is simply the throughput computed earlier for the coding scheme, cs, determined above. This throughput is computed from the Throughput = f(C) graphs for the value of the received signal Txi – EGPRS level at the bin, P rec TRX . 5.7.3.3 GPRS/EDGE Studies Based on C/I Without ILA and Thermal Noise 5.7.3.3.1 Coding Scheme Based on C/I Without ILA and Thermal Noise Atoll calculates signal level and C/I level received from Txi on each bin of the Txi coverage area. Then, selects two coding schemes from among the coding schemes available in the GPRS/EDGE configuration, such that: For each TRX type, tt, cs C = Lowest CS And, cs C I = Lowest CS Txi – EGPRS P rec Txi – EGPRS P rec TRX TRX Reception Threshold CS ------------------------------------------------------ C ---- Threshold I CS I Where, csC is the coding scheme determined from the signal level, csC/I is the coding scheme determined from the C/I level, and CS is the set of all available coding schemes. Reception Threshold CS are the values of reception thresholds for the coding schemes available in the GPRS/EDGE C configuration, defined in the Reception Thresholds column of the properties dialog. And, ---- Threshold are the values I CS 174 AT281_TRG_E1 © Forsk 2009 Chapter 5: GSM GPRS EDGE Networks of C/I thresholds for the coding schemes available in the GPRS/EDGE configuration, defined in the C/I Thresholds column of the properties dialog. There can be more than one coding schemes whose reception thresholds are less than the received signal level, and whose C/I thresholds are less than the received C/I level. cs is the coding scheme with the lowest coding scheme number from the lowest priority coding scheme list. Coding scheme lists are organised as follows from the highest to the lowest priority one : DBS, DAS, MCS and CS. The resulting coding scheme, cs, is the coding scheme with the lowest coding scheme number from the lowest priority coding scheme list among csC and csC/I. Coding scheme lists are organised as follows from the highest to the lowest priority one : DBS, DAS, MCS and CS. A Power Backoff, in dBs, can be defined for each subcell using 8PSK, 16QAM or 32QAM modulations (EDGE) based coding scheme configuration. This power backoff is taken in to account when selecting the codec mode available in the coverage area of the subcell, such that: Txi – EGPRS For each TRX type, tt, P rec Txi – EGPRS TRX – P Backoff TRX Reception Threshold CS And Txi – EGPRS Txi – EGPRS P rec TRX – P Backoff TRX C ----------------------------------------------------------------------------------------------------------- ---- Threshold I CS I 5.7.3.3.2 Throughput Based on Worst Case Between C and C/I Without ILA Atoll determines two throughput values, TPC from the Throughput = f(C) graph corresponding to the coding scheme csC determined above, and TPC/I from Throughput = f(C/I) graph corresponding to the coding scheme csC/I determined above. The resulting throughput TP is the lower of the two values, TPC and TPC/I. TP = Lowest TP C TP C I 5.7.3.4 GPRS/EDGE Studies Based on C/I With ILA and Without Thermal Noise 5.7.3.4.1 Coding Scheme Based on C/I With ILA and Without Thermal Noise With Ideal Link Adaptation active, Atoll selects the coding scheme that provides the highest throughput at the received signal level and C/I value for a bin. Atoll calculates signal level and C/I level received from Txi on each bin of the Txi coverage area. Then, selects two coding schemes from among the coding schemes available in the GPRS/EDGE configuration, such that: For each TRX type, tt, cs C = Lowest CS And, cs C I = Lowest CS Txi – EGPRS TP = Highest TP=f C=P rec TRX Txi – EGPRS C P rec TP = Highest TP=f ---- = ----------------------------------- TRX I I Where, csC is the coding scheme determined from the signal level, csC/I is the coding scheme determined from the C/I level, and CS is the set of all available coding schemes. Txi – EGPRS Highest TP=f C=P rec TRX is the highest throughput provided by any coding scheme at the received signal Txi – EGPRS C P rec level, from the Throughput = f(C) graphs defined in the properties dialog. And, Highest TP=f ---- = -------------------------------- TRX I I is the highest throughput provided by any coding scheme at the received C/I level, from the Throughput = f(C/I) graphs defined in the properties dialog. If there are more than one coding schemes providing the highest throughput at the bin, csC and csC/I will be the ones with the lowest coding scheme number from the lowest priority coding scheme list. Coding scheme lists are organised as follows from the highest to the lowest priority one : DBS, DAS, MCS and CS. The resulting coding scheme, cs, is the coding scheme with the lowest coding scheme number from the lowest priority coding scheme list among csC and csC/I. Coding scheme lists are organised as follows from the highest to the lowest priority one : DBS, DAS, MCS and CS. A Power Backoff, in dBs, can be defined for each subcell using 8PSK, 16QAM or 32QAM modulations (EDGE) based coding scheme configuration. This power backoff is taken in to account when selecting the codec mode available in the coverage area of the subcell, such that: Txi – EGPRS For each TRX type, tt, TP = Highest TP=f C=P rec Txi – EGPRS TRX - P Backoff TRX And Txi – EGPRS Txi – EGPRS TRX - P Backoff TRX C P rec TP = Highest TP=f ---- = ------------------------------------------------------------------------------------------------------------- I I © Forsk 2009 AT281_TRG_E1 175 Technical Reference Guide 5.7.3.4.2 Throughput Based on Worst Case Between C and C/I With ILA Atoll determines two throughput values, TPC from the Throughput = f(C) graph corresponding to the coding scheme csC determined above, and TPC/I from Throughput = f(C/I) graph corresponding to the coding scheme csC/I determined above. The resulting throughput TP is the lower of the two values, TPC and TPC/I. TP = Lowest TP C TP C I 5.7.3.5 GPRS/EDGE Studies Based on C/I Without ILA and With Thermal Noise 5.7.3.5.1 Coding Scheme Based on C/I Without ILA and With Thermal Noise The reception thresholds given for signal level C are internally converted to C/N thresholds (where N is the thermal noise defined in the document database at -121 dBm by default) in order to be indexed by C/(I+N) values. C/I thresholds are also indexed by the C/(I+N) value. Atoll calculates the C/N and C/(I+N) level received from Txi on each bin of the Txi coverage area. Then, selects two coding schemes from among the coding schemes available in the GPRS/EDGE configuration, such that: For each TRX type, tt, cs C N = Lowest CS And, cs C I + N = Lowest CS Txi – EGPRS P rec TRX C ------------------------------------------------------ ---------- I + N Threshold CS N Txi – EGPRS P rec TRX C ------------------------------------------------------ ---------- I + N Threshold CS I+N Where, csC/N is the coding scheme determined from the C/N level, csC/(I+N) is the coding scheme determined from the C/ (I+N) level, and CS is the set of all available coding schemes. C ----------- Threshold I + N CS are the values of C/(I+N) thresholds for the coding schemes available in the GPRS/EDGE configuration, determined from the C/I threshold values defined in the C/I Thresholds column of the properties dialog. There can be more than one coding schemes whose C/(I+N) thresholds are less than the received C/N level, whose C/ (I+N) thresholds are less than the received C/(I+N) level. cs is the coding scheme with the lowest coding scheme number from the lowest priority coding scheme list. Coding scheme lists are organised as follows from the highest to the lowest priority one : DBS, DAS, MCS and CS. The resulting coding scheme, cs, is the coding scheme with the highest coding scheme number from the highest priority coding scheme list csC/N and csC/(I+N). Coding scheme lists are organised as follows from the highest to the lowest priority one : DBS, DAS, MCS and CS. A Power Backoff, in dBs, can be defined for each subcell using 8PSK, 16QAM or 32QAM modulations (EDGE) based coding scheme configuration. This power backoff is taken in to account when selecting the codec mode available in the coverage area of the subcell, such that: Txi – EGPRS Txi – EGPRS P rec TRX – P Backoff TRX C For each TRX type, tt, ------------------------------------------------------------------------------------------------------------ ------------ Threshold I + N CS N And Txi – EGPRS Txi – EGPRS P rec TRX – P Backoff TRX C ----------------------------------------------------------------------------------------------------------- ------------ Threshold I + N CS I+N 5.7.3.5.2 Throughput Based on Interpolation Between C/N and C/(I+N) Without ILA Atoll determines two throughput values, TPC/N from the Throughput = f(C) graph corresponding to the coding scheme csC/ determined above, and TPC/(I+N) from Throughput = f(C/I) graph corresponding to the coding scheme csC/(I+N) determined above. N The Throughput = f(C) graph is internally converted to Throughput = f(C/N) graph, in order to be indexed with the C/(I+N) value. The Throughput = f(C/I) graph is also indexed with the C/(I+N) value. The final throughput is computed by interpolating between the throughput values obtained from these two graphs. The throughput interpolation method consists in interpolating TPC/N and TPC/(I+N) according to the respective weights of I and N values. The resulting throughput TP is given by: TP = TP C N + 1 – TP C I + N Where, pN = --------------------pI + N pN is the thermal noise power (value in Watts) p(I+N) is the interferences + thermal noise power (value in Watts) 176 AT281_TRG_E1 © Forsk 2009 Chapter 5: GSM GPRS EDGE Networks TPC/N is the throughput obtained from the C/N graph TPC/(I+N) is the throughput obtained from the C/I+N graph 5.7.3.6 GPRS/EDGE Studies Based on C/I With ILA and Thermal Noise 5.7.3.6.1 Coding Scheme Based on C/I With ILA and Thermal Noise The reception thresholds given for signal level C are internally converted to C/N thresholds (where N is the thermal noise defined in the document database at -121 dBm by default) in order to be indexed by C/(I+N) values. C/I thresholds are also indexed by the C/(I+N) value. With Ideal Link Adaptation active, Atoll selects the coding scheme that provides the highest throughput at the received C/ N and C/(I+N) values for a bin. Atoll calculates the C/N and C/(I+N) level received from Txi on each bin of the Txi coverage area. Then, selects two coding schemes from among the coding schemes available in the GPRS/EDGE configuration, such that: For each TRX type, tt, cs C N = Highest CS And, cs C I + N = Highest CS Txi – EGPRS C P rec TP = Highest TP=f ------------ = ----------------------------------- TRX N I + N Txi – EGPRS C P rec TP = Highest TP=f ------------ = ----------------------------------- TRX I+N I + N Where, csC/N is the coding scheme determined from the C/N level, csC/(I+N) is the coding scheme determined from the C/ (I+N) level, and CS is the set of all available coding schemes. Txi – EGPRS C P rec Highest TP=f ------------ = -------------------------------- TRX is the highest throughput provided by any coding scheme at the received C/ N I + N N level, from the Throughput = f(C/(I+N)) graphs converted from the f(C/I) graphs defined in the properties dialog. And, Txi – EGPRS C P rec Highest TP=f ------------ = -------------------------------- TRX is the highest throughput provided by any coding scheme at the received C/ I + N I + N (I+N) level, from the Throughput = f(C/(I+N)) graphs converted from the f(C/I) graphs defined in the properties dialog. If there are more than one coding schemes providing the highest throughput at the bin, csC/N and csC/(I+N) will be the ones with the highest coding scheme number from the highest priority coding scheme list. Coding scheme lists are organised as follows from the highest to the lowest priority one : DBS, DAS, MCS and CS. The resulting coding scheme, cs, is the coding scheme with the highest coding scheme number from the highest priority coding scheme list among csC/N and csC/(I+N). Coding scheme lists are organised as follows from the highest to the lowest priority one : DBS, DAS, MCS and CS. A Power Backoff, in dBs, can be defined for each subcell using 8PSK, 16QAM or 32QAM modulations (EDGE) based coding scheme configuration. This power backoff is taken in to account when selecting the codec mode available in the coverage area of the subcell, such that: Txi – EGPRS Txi – EGPRS P rec TRX – P Backoff TRX C For each TRX type, tt, ------------------------------------------------------------------------------------------------------------ ------------ Threshold I + N CS N Txi – EGPRS Txi – EGPRS P rec TRX – P Backoff TRX C And ------------------------------------------------------------------------------------------------------------ ------------ Threshold I + N CS I+N 5.7.3.6.2 Throughput Based on Interpolation Between C/N and C/(I+N) With ILA Atoll determines two throughput values, TPC/N from the Throughput = f(C) graph corresponding to the coding scheme csC/ determined above, and TPC/(I+N) from Throughput = f(C/I) graph corresponding to the coding scheme csC/(I+N) determined above. N The Throughput = f(C) graph is internally converted to Throughput = f(C/N) graph, in order to be indexed with the C/(I+N) value. The Throughput = f(C/I) graph is also indexed with the C/(I+N) value. The final throughput is computed by interpolating between the throughput values obtained from these two graphs. The throughput interpolation method consists in interpolating TPC/N and TPC/(I+N) according to the respective weights of I and N values. The resulting throughput TP is given by: TP = TP C N + 1 – TP C I + N Where, pN = --------------------pI + N pN is the thermal noise power (value in Watts) © Forsk 2009 AT281_TRG_E1 177 Technical Reference Guide p(I+N) is the interferences + thermal noise power (value in Watts) TPC/N is the throughput obtained from the C/N graph TPC/(I+N) is the throughput obtained from the C/I+N graph 5.7.4 Coverage Display Coverage area can be displayed with colours depending on: 5.7.4.1 GPRS/EDGE Coding Schemes Study Display Types 5.7.4.1.1 Coding Schemes Only the bins with a coding scheme assigned are coloured. The bin colour depends on the assigned coding scheme. Coverage consists of several independent layers whose visibility in the map window can be managed. There are as many layers as transmitter coverage areas. Each layer shows the coding schemes available in the transmitter coverage area. 5.7.4.1.2 Best Coding Schemes On each bin, Atoll chooses the highest coding scheme available from the TRXs of different transmitters covering that bin. Only the bins with a coding scheme assigned are coloured. The bin colour depends on the assigned coding scheme. Coverage consists of several independent layers whose visibility in the map window can be managed. There are as many layers as possible coding schemes. Each layer shows the areas where a given coding scheme can be used. 5.7.4.2 RLC/MAC and Application Throughput/Timeslot Studies Display Types 5.7.4.2.1 Relation Between RLC/MAC and Application Throughputs Application throughput per timeslot is deduced from the RLC/MAC (or gross) throughput per timeslot by the equation: SF TP Application = TP RLC MAC ---------- – TP Offset 100 Where, TP Application = Application throughput, TP RLC MAC = RLC/MAC level throughput, TP Offset = Throughput offset (kbps) accounting for headers, guard-bits etc., SF = Throughput scaling factor (%) accounting for coding, redundance etc. 5.7.4.2.2 Throughput/Timeslot A bin of a coverage area is coloured if the calculated throughput exceeds the defined minimum threshold. The bin colour depends on throughput. Coverage consists of several independent layers whose visibility in the map window can be managed. There are as many layers as transmitter coverage areas. Each layer shows the throughputs that a transmitter can provide on one timeslot. 5.7.4.2.3 Best Throughput/Timeslot On each bin, Atoll chooses the highest throughput available from the TRXs of different transmitters covering that bin. A bin of a coverage area is coloured if the best throughput exceeds the defined minimum threshold. The bin colour depends on throughput. Coverage consists of several independent layers whose visibility in the map window can be managed. There are as many layers as defined thresholds. Each layer shows the areas where a throughput can be provided on one timeslot. 5.7.4.2.4 Average Throughput/Timeslot On each bin, Atoll calculates the average throughput available from the TRXs of different transmitters covering that bin. A bin of a coverage area is coloured if the average throughput exceeds the defined minimum threshold. The bin colour depends on throughput. Coverage consists of several independent layers whose visibility in the map window can be managed. There are as many layers as defined thresholds. Each layer shows the areas where a throughput can be provided on one timeslot. 5.7.4.2.5 Block Error Rate Computation TP Block error rate is computed according to the formula BLER = -----------------TP MAX Where, TP = Throughput per timeslot calculated for a bin, and TPMAX = Maximum throughput per timeslot deduced from the GPRS/EDGE configuration assigned to the terminal type (or transmitter, if no terminal type has been selected for the study) for the coding scheme calculated for a bin. Note: • 178 If TP > TPMAX, then BLER = 0. AT281_TRG_E1 © Forsk 2009 Chapter 5: GSM GPRS EDGE Networks 5.7.4.2.6 BLER Percentage Atoll calculates BLER percentage by considering throughput/timeslot per bin (computed as described earlier) and the maximum throughput/timeslot possible (deduced from the GPRS/EDGE configuration graphs). A bin of a coverage area is coloured if the calculated BLER percentage exceeds the defined minimum threshold. The bin colour depends on the BLER. Coverage consists of several independent layers whose visibility in the map window can be managed. There are as many layers as transmitter coverage areas. Each layer shows the BLERs that a transmitter experiences on one timeslot. 5.7.4.2.7 Maximum BLER Percentage On each bin, Atoll chooses the maximum BLER percentage from the BLER values corresponding to TRXs of different transmitters covering that bin. A bin of a coverage area is coloured if the maximum BLER exceeds the defined minimum threshold. The bin colour depends on the BLER. Coverage consists of several independent layers whose visibility in the map window can be managed. There are as many layers as defined thresholds. Each layer shows the areas where a BLER is observed on one timeslot. 5.8 Circuit Quality Indicators Studies Atoll calculates a coverage area for all the TBC transmitters. Let us assume that each bin within a TBC transmitter calculation area corresponds to a probe mobile receiver. Coverage study parameters to be set are: • • 5.8.1 The study conditions in order to determine the coverage area of each TBC transmitter, The display settings to select how to colour coverage areas. Circuit Quality Indicators Atoll has the following circuit quality indicators included by default: • • • FER or Frame Erasure Rate - The number of frames in error divided by the total number of frames. These frames are usually discarded, in which case this can be called the Frame Erasure Rate. BER or Bit Error Rate - BER is a measurement of the raw bit error rate in reception before the decoding process begins. Any factor that impacts the decoding performance, such as frequency hopping, will impact the correlation between BER and FER, or the perceived end-user voice quality. MOS or Mean Opinion Score - Voice quality can be quantified using mean opinion score (MOS). MOS values can only be measured in a test laboratory environment. MOS values range from 1 (bad) to 5 (excellent). Different voice codecs have slightly different FER to MOS correlation since the smaller the voice codec bit rate is, the more sensitive it becomes to frame erasures. There are various codec modes defined for AMR depending on the FR and HR channel modes that it supports. Codec modes defined in Atoll include the basic EFR, FR and HR codec modes along with the AMR codec modes: • • • • • AMR FR - AMR TCH/AFS12.2 - AMR TCH/AFS10.2 - AMR TCH/AFS7.95 - AMR TCH/AFS7.4 - AMR TCH/AFS6.7 - AMR TCH/AFS5.9 - AMR TCH/AFS5.15 - AMR TCH/AFS4.75 AMR HR - AMR TCH/AHS7.95 - AMR TCH/AHS7.4 - AMR TCH/AHS6.7 - AMR TCH/AHS5.9 - AMR TCH/AHS5.15 - AMR TCH/AHS4.75 EFR FR HR A codec configuration should contain codec mode adaptation thresholds and quality graphs for the relevant circuit quality indicators in order to be considered in circuit quality indicators coverage studies. The default codec configuration in Atoll include default FER, BER and MOS quality graphs with respect to the carrier to interference ratio, and codec mode adaptation thresholds (computed from the FER vs. C/I graphs for all codec modes at 5% FER.). Note: • © Forsk 2009 Depending on the reference CQI, codec mode that provides the lowest BER or FER, or the highest MOS are selected during computations. AT281_TRG_E1 179 Technical Reference Guide References: The above graphs are based on: [1] T. Halonen, J. Romero, J. Melero; GSM, GPRS and EDGE performance – Evolution towards 3G/UMTS, John Wiley and Sons Ltd. [2] J. Wigard, P. Mogensen; A simple mapping from C/I to FER and BER for a GSM type of air interface. [3] 3GPP Specifications TR 26.975 V6.0.0; Performance characterization of the Adaptive Multi-Rate (AMR) speech codec (Release 6) Figure 5.11: FER vs. C/I Graphs Figure 5.12: BER vs. C/I Graphs 180 AT281_TRG_E1 © Forsk 2009 Chapter 5: GSM GPRS EDGE Networks Figure 5.13: MOS vs. C/I Graphs 5.8.2 Coverage Area Determination We can have four different cases for coverage area determination. Let us assume that: • • • 5.8.2.1 Each transmitter, Txi, belongs to a HCS layer, k, with a defined priority. Each transmitter, Txi, is has a codec configuration assigned (Txi as notation). The maximum range option (available in the System tab of the Predictions property dialog) is inactive. All Servers For each HCS layer, k, the coverage area of Txi corresponds to Txi calculation area. 5.8.2.2 Best Signal Level per HCS Layer and a Margin For each HCS layer, k, the coverage area of Txi corresponds to the bins where the signal level received from Txi, Txi P rec BCCH , is the highest one (Txi is the best server) or within a defined margin of the highest signal level (within a margin of the best server). Note: • If the margin equals 0, the coverage area of Txi corresponds to the bins where Txi P rec BCCH is the highest. 5.8.2.3 Second Best Signal Level per HCS Layer and a Margin For each HCS layer, k, the coverage area of Txi corresponds to the bins where the signal level received from Txi, Txi P rec BCCH , is the second highest one (Txi is the second best server) or within a defined margin of the second highest signal level (within a margin of the second best server). Note: • If the margin equals 0, the coverage area of Txi corresponds to the bins where Txi P rec BCCH is the second highest. 5.8.2.4 HCS Servers and a Margin For each HCS layer, k, the coverage area of Txi corresponds to the bins where the signal level received from Txi, Txi P rec BCCH , is the highest one (Txi is the best server) or within a defined margin of the highest signal level (within a Txi margin of the best server). In addition P rec BCCH must exceed the reception threshold defined per HCS layer. Notes: • If the margin equals 0, the coverage area of Txi corresponds to the bins where Txi P rec BCCH is the highest. © Forsk 2009 AT281_TRG_E1 181 Technical Reference Guide 5.8.2.5 Highest Priority HCS Server and a Margin Txi In this case, the coverage area of Txi corresponds to the bins where P rec BCCH is the highest one (Txi is the best server) or within a defined margin of the highest signal level (within a margin of the best server). And, Txi belongs to the HCS layer with the highest priority. The highest priority is defined by the priority field (0: lowest) assuming the received Txi P rec BCCH exceeds the reception threshold defined per HCS layer. Note: • 5.8.3 In the case two layers have the same priority, the traffic is served by the transmitter for which the difference between the received signal strength and the HCS threshold is the highest. The way the competition is managed between layers with the same priority can be modified. For more information, see the Administrator Manual. Calculation Options CQI studies can be based either on the signal-to-noise level (C/N) or on the signal-to-noise-plus-interference ratio (C/ (I+N)). If a reference terminal type is defined when launching a CQI study, Atoll will consider the noise figure defined for that terminal type when computing the total noise (N). If no terminal type is defined, the value defined in the coverage prediction properties (8 dB, by default) is used. Different codec configuration can be defined for a transmitter and for the reference terminal type. In this case, Atoll performs an intersection for the codec modes defined in the transmitter and the reference terminal type codec configuration to determine the codec modes that are common in the two. Hence, Atoll creates a temporary codec configuration comprising only these common codec modes and uses this codec configuration to eventually compute the CQI values. If no reference terminal type is defined or if the defined reference terminal type has no codec configuration assigned to it, Atoll will perform the computations based on the codec configuration of the transmitter. Similarly, if a transmitter has no codec configuration defined, Atoll will compute the coverage study considering only the codec configuration defined for the reference terminal type. If there is no codec configuration defined for the transmitter and for the reference terminal type, there will be no coverage for the transmitter. For the case where more than one codec modes, compatible with the transmitter - reference terminal type pair, satisfy the C or C/I conditions at a bin under study, Atoll chooses the codec mode for CQI determination according to their selection priorities. The table below depicts the selection priorities for all codec modes modeled in Atoll. These selection priorities are based on the chronological order of their development and on their C/I - MOS performance. 5.8.3.1 Codec Mode Selection priority FR 1 HR 2 EFR 3 AMR TCH/AFS4.75 4 AMR TCH/AFS5.15 5 AMR TCH/AFS5.9 6 AMR TCH/AFS6.7 7 AMR TCH/AFS7.4 8 AMR TCH/AFS7.95 9 AMR TCH/AFS10.2 10 AMR TCH/AFS12.2 11 AMR TCH/AHS4.75 12 AMR TCH/AHS5.15 13 AMR TCH/AHS5.9 14 AMR TCH/AHS6.7 15 AMR TCH/AHS7.4 16 AMR TCH/AHS7.95 17 Calculations Based on C/N Txi In this case, only signal level received and the total noise are taken into account. Atoll evaluates P rec TRX , the signal level received from transmitter Txi on TRXs (TRX) belonging to the selected TRX type (tt), or on all the TRXs, on each bin of Txi coverage area and converts it into C/N values using the value of total noise computed as follows: N tot = N + NF 182 AT281_TRG_E1 © Forsk 2009 Chapter 5: GSM GPRS EDGE Networks Where, N is the thermal noise (defined in the document database at -121 dBm by default), and NF is the receiver noise figure (either defined at the terminal type properties level, if a reference terminal type is defined for the study, or defined in the coverage study properties). The computed total noise N tot is then compared to the codec configuration reference noise N Ref . If the values are the same, the defined graphs are used as is, unless the entry is downshifted by the difference N tot – N Ref . 5.8.3.2 Calculations Based on C/(I+N) For circuit quality indicator studies based on the signal-to-noise-and-interference ratio (C/(I+N)), Atoll evaluates: Txi • P rec TRX ----------------------------- : The signal-level-to-noise ratio received from transmitter Txi on TRXs (TRX) belonging to the selected N tot TRX type (tt) or on all the TRXs. And Txi • P rec TRX ----------------------------- : The carrier-to-interference-and-noise ratio received from transmitter Txi on TRXs (TRX) belonging I + N tot to the selected TRX type (tt) or on all the TRXs. The value of total noise computed as follows: N tot = N + NF Where, N is the thermal noise (defined in the document database at -121 dBm by default), and NF is the receiver noise figure (either defined at the terminal type properties level, if a terminal type is defined for the study, or defined in the coverage study properties). The computed total noise N tot is then compared to the codec configuration reference noise N Ref . If the values are the same, the defined graphs are used as is, unless the entry is downshifted by the difference N tot – N Ref . Note: • 5.8.3.3 Atoll calculates the carrier-to-interference ratio for all the TBC transmitters but takes into account all the transmitters (even the ones with no codec configuration assigned) to evaluate the interference. Ideal Link Adaptation (ILA) Ideal link adaptation for circuit quality indicator studies is defined at the codec configuration level. If the ideal link adaptation option is checked, Atoll will select the codec mode, for the transmitter under study, according to the codec quality graphs (CQI = f(C/N) and CQI = f(C/I)) related to the defined reference CQI, which may be different from the CQI being calculated. Otherwise, Atoll will use the adaptation thresholds defined in the Adaptation Thresholds tab to determine the codec mode to be used in the studies. 5.8.4 Calculation Scenarios With the above options, there are many different possible scenarios of calculations. These scenarios are described below. 5.8.4.1 CQI Study Based on C/N Without ILA Atoll calculates signal level received from Txi on each bin of Txi coverage area and converts it into C/N values as described earlier. Then, Atoll filters all the codec modes that satisfy the C/N values and are common between the transmitter and the terminal type codec configuration. It then determines the codec mode for the bin, such that: For each TRX type, tt, cm = Highest Priority CM Txi P rec TRX ------------------------------ Adaptation Threshold CM N tot Where, cm is the codec mode with the highest priority among the set of codec modes CM having their adaptation threshTxi P rec TRX olds less than the received C/N level, ----------------------------- . N tot From the CQI=f(C/N) graph associated to the selected codec mode cm, Atoll evaluates the CQI for which the study was Txi P rec TRX performed corresponding to ----------------------------- for the selected codec mode. N tot 5.8.4.2 CQI Study Based on C/N With ILA Ideal link adaptation is used by a codec configuration according to a defined reference CQI (MOS by default). © Forsk 2009 AT281_TRG_E1 183 Technical Reference Guide Atoll calculates signal level received from Txi on each bin of Txi coverage area and converts it into C/N values as described earlier. Then, Atoll filters all the codec modes that satisfy the C/N criterion (defined by the CQI = f(C/N) graphs for the reference CQI) and are common between the transmitter and the terminal type codec configuration. The selected codec mode among these filtered codec modes will be, For each TRX type, tt, cm = Highest Priority CM Or, cm = Highest Priority CM , for MOS Txi C P rec TRX CQI Ref = Highest CQI=f ---- = ------------------------------ N tot N , for BER and FER Txi C P rec TRX CQI Ref = Lowest CQI=f ---- = ------------------------------ N tot N Where, cm is the codec mode with the highest priority among the set of codec modes CM for which the reference CQI Txi P rec TRX gives the highest or the lowest value at the received C/N level, ----------------------------- . N tot If more than one codec mode graphs give the same value for reference CQI, then Atoll selects the codec mode with the highest priority. From the CQI = f(C/N) graph associated to the selected codec mode cm, Atoll evaluates the CQI for which the study was Txi P rec TRX performed corresponding to ----------------------------- for the selected codec mode. N tot 5.8.4.3 CQI Study Based on C/(I+N) Without ILA Atoll calculates the C/I level received from the transmitter on each bin of Txi coverage area, for each TRX and converts it into C/(I+N). Then, Atoll filters all the codec modes that satisfy the C/(I+N) values and are common between the transmitter and the terminal type codec configuration. It then determines the codec mode for the bin, such that: For each TRX type, tt, cm = Highest Priority CM Txi P rec TRX ------------------------------ Adaptation Threshold CM I + Ntot Where, cm is the codec mode with the highest priority among the set of codec modes CM having their adaptation threshTxi P rec TRX olds less than the received C/(I+N) level, ----------------------------- . I + Ntot From the CQI = f(C/I) graph associated to the selected codec mode cm (indexed with the C/(I+N) values), Atoll evaluates Txi P rec TRX the CQI for which the study was performed corresponding to ----------------------------- for the selected codec mode. I + N tot 5.8.4.4 CQI Study Based on C/(I+N) With ILA Ideal link adaptation is used by a codec configuration according to a defined reference CQI (MOS by default). Atoll calculates the C/I level received from the transmitter on each bin of Txi coverage area, for each TRX and converts it into C/(I+N). Then, Atoll filters all the codec modes that satisfy the C/(I+N) criteria (defined by the CQI = f(C/I) graphs for the reference CQI) and are common between the transmitter and the terminal type codec configuration. The selected codec mode among these filtered codec modes will be, For each TRX type, tt, cm = Highest Priority CM Or, cm = Highest Priority CM , for MOS Txi C P rec TRX CQI Ref = Highest CQI=f ---- = ------------------------------ I I + N tot , for BER and FER Txi C P rec TRX CQI Ref = Lowest CQI=f ---- = ------------------------------ I + N tot I Where, cm is the codec mode with the highest priority among the set of codec modes CM for which the reference CQI Txi P rec TRX gives the highest or the lowest value at the received C/(I+N) level, ----------------------------- . I + N tot If more than one codec mode graphs give the same value for reference CQI, then Atoll selects the codec mode with the highest priority. 184 AT281_TRG_E1 © Forsk 2009 Chapter 5: GSM GPRS EDGE Networks From the CQI = f(C/I) graph associated to the selected codec mode cm (indexed with the C/(I+N) values), Atoll evaluates Txi P rec TRX the CQI for which the study was performed corresponding to ----------------------------- for the selected codec mode. I + N tot 5.8.5 Coverage Display Coverage area can be displayed with colours depending on: 5.8.5.1 Circuit Quality Indicators Study Display Types 5.8.5.1.1 FER/BER/MOS Only the bins with a CQI assigned are coloured. The bin colour depends on the assigned CQI value. Coverage consists of several independent layers whose visibility in the map window can be managed. There are as many layers as transmitter coverage areas. Each layer shows the CQI values available in the transmitter coverage area. 5.8.5.1.2 Max FER/Max BER/Max MOS On each bin, Atoll chooses the maximum CQI value available from the TRXs of different transmitters covering that bin. Only the bins where the CQI values exceeds a defined threshold are coloured. The bin colour depends on the assigned CQI value. Coverage consists of several independent layers whose visibility in the map window can be managed. There are as many layers as the number of thresholds defined. Each layer shows the areas where a given CQI value is available. © Forsk 2009 AT281_TRG_E1 185 Technical Reference Guide 186 AT281_TRG_E1 © Forsk 2009 Chapter 6 UMTS HSPA Networks This chapter provides descriptions of all the algorithms for calculations, analyses, automatic allocations, simulations and prediction studies available in UMTS HSPA projects. Atoll RF Planning & Optimisation Software Technical Reference Guide 188 AT281_TRG_E1 © Forsk 2009 Chapter 6: UMTS HSPA Networks 6 UMTS HSPA Networks 6.1 General Prediction Studies 6.1.1 Calculation Criteria Three criteria can be studied in point analysis (Profile tab) and in common coverage studies. Study criteria are detailed in the table below: Study criteria Formulas Signal level ( P rec ) in dBm Signal level received from a transmitter on a carrier (cell) P rec ic = EIRP ic – L path – M Shadowing – model – L Indoor + G term – L term L path = L model + L ant Path loss ( L path ) in dBm Total losses ( L total ) in dBm Tx L total = L path + L Tx + L term + L indoor + M Shadowing – model – G Tx + G term where, EIRP is the effective isotropic radiated power of the transmitter, ic is a carrier number, L model is the loss on the transmitter-receiver path (path loss) calculated by the propagation model, L ant Tx is the transmitter antenna attenuation (from antenna patterns), M Shadowing – model is the shadowing margin. This parameter is taken into account when the option “Shadowing taken into account” is selected, L Indoor are the indoor losses, taken into account when the option “Indoor coverage” is selected, L term are the receiver losses, G term is the receiver antenna gain, G Tx is the transmitter antenna gain, L Tx is the transmitter loss ( L Tx = L total – DL ). For information on calculating transmitter loss, see "UMTS HSPA, CDMA2000 1xRTT 1xEV-DO, and TD-SCDMA Documents" on page 128. Notes: • EIRP ic = P pilot ic + G Tx – L Tx ( P pilot ic is the cell pilot power). • It is possible to analyse all the carriers. In this case, Atoll takes the highest pilot power of cells to calculate the signal level received from a transmitter. • Atoll considers that G term and L term equal zero. 6.1.2 Point Analysis 6.1.2.1 Profile Tab Atoll displays either the signal level received from the selected transmitter on a carrier ( P rec ic ), or the highest signal level received from the selected transmitter on all the carriers. Note: • For a selected transmitter, it is also possible to study the path loss, L path , or the total losses, L total . Path loss and total losses are the same on any carrier. 6.1.2.2 Reception Tab Analysis provided in the Reception tab is based on path loss matrices. So, you can study reception from TBC transmitters for which path loss matrices have been computed on their calculation areas. © Forsk 2009 AT281_TRG_E1 189 Technical Reference Guide For each transmitter, Atoll displays either the signal level received on a carrier, ( P rec ic ), or the highest signal level received on all the carriers. Reception bars are displayed in a decreasing signal level order. The maximum number of reception bars depends on the signal level received from the best server. Only reception bars of transmitters whose signal level is within a 30 dB margin from the best server can be displayed. Note: • For a selected transmitter, it is also possible to study the path loss, L path , or the total losses, L total . Path loss and total losses are the same on any carrier. • 6.1.3 You can use a value other than 30 dB for the margin from the best server signal level, for example a smaller value for improving the calculation speed. For more information on defining a different value for this margin, see the Administrator Manual. Coverage Studies For each TBC transmitter, Txi, Atoll determines the selected criterion on each pixel inside the Txi calculation area. In fact, each pixel within the Txi calculation area is considered as a potential (fixed or mobile) receiver. Coverage study parameters to be set are: • • 6.1.3.1 The study conditions in order to determine the service area of each TBC transmitter, The display settings to select how to colour service areas. Service Area Determination Atoll uses parameters entered in the Condition tab of the coverage study property dialogue to predetermine areas where it will display coverage. We can distinguish three cases: 6.1.3.1.1 All Servers The service area of Txi corresponds to the bins where: Txi Txi Txi MinimumThreshold P rec ic or L total or L path MaximumThreshold 6.1.3.1.2 Best Signal Level and a Margin The service area of Txi corresponds to the bins where: Txi Txi Txi MinimumThreshold P rec ic or L total or L path MaximumThreshold And Txi Txj P rec ic Best P rec ic – M ji M is the specified margin (dB). Best function: considers the highest value. Notes: • If the margin equals 0 dB, Atoll will consider bins where the signal level received from Txi is the highest. • If the margin is set to 2 dB, Atoll will consider bins where the signal level received from Txi is either the highest or 2dB lower than the highest. • If the margin is set to -2 dB, Atoll will consider bins where the signal level received from Txi is 2dB higher than the signal levels from transmitters, which are 2nd best servers. 6.1.3.1.3 Second Best Signal Level and a Margin The service area of Txi corresponds to the bins where: Txi Txi Txi MinimumThreshold P rec ic or L total or L path MaximumThreshold And Txi P rec ic 2 nd Best P Txj ic – M rec ji M is the specified margin (dB). 2nd Best function: considers the second highest value. 190 AT281_TRG_E1 © Forsk 2009 Chapter 6: UMTS HSPA Networks Notes: • If the margin equals 0 dB, Atoll will consider bins where the signal level received from Txi is the second highest. • If the margin is set to 2 dB, Atoll will consider bins where the signal level received from Txi is either the second highest or 2dB lower than the second highest. • If the margin is set to -2 dB, Atoll will consider bins where the signal level received from Txi is 2dB higher than the signal levels from transmitters, which are 3rd best servers. 6.1.3.2 Coverage Display 6.1.3.2.1 Plot Resolution Prediction plot resolution is independent of the matrix resolutions and can be defined on a per study basis. Prediction plots are generated from multi-resolution path loss matrices using bilinear interpolation method (similar to the one used to evaluate site altitude). 6.1.3.2.2 Display Types It is possible to display the transmitter service area with colours depending on any transmitter attribute or other criteria such as: Signal Level (in dBm, dBµV, dBµV/m) Atoll calculates signal level received from the transmitter on each pixel of each transmitter service area. A pixel of a service area is coloured if the signal level exceeds ( ) the defined minimum thresholds (pixel colour depends on signal level). Coverage consists of several independent layers whose visibility in the workspace can be managed. There are as many layers as transmitter service areas. Each layer shows the different signal levels available in the transmitter service area. Best Signal Level (in dBm, dBµV, dBµV/m) Atoll calculates signal levels received from transmitters on each pixel of each transmitter service area. Where other service areas overlap the studied one, Atoll chooses the highest value. A pixel of a service area is coloured if the signal level exceeds ( ) the defined thresholds (the pixel colour depends on the signal level). Coverage consists of several independent layers whose visibility in the workspace can be managed. There are as many layers as defined thresholds. Each layer corresponds to an area where the signal level from the best server exceeds a defined minimum threshold. Path Loss (dB) Atoll calculates path loss from the transmitter on each pixel of each transmitter service area. A pixel of a service area is coloured if path loss exceeds ( ) the defined minimum thresholds (pixel colour depends on path loss). Coverage consists of several independent layers whose visibility in the workspace can be managed. There are as many layers as service areas. Each layer shows the different path loss levels in the transmitter service area. Total Losses (dB) Atoll calculates total losses from the transmitter on each pixel of each transmitter service area. A pixel of a service area is coloured if total losses exceed ( ) the defined minimum thresholds (pixel colour depends on total losses). Coverage consists of several independent layers whose visibility in the workspace can be managed. There are as many layers as service areas. Each layer shows the different total losses levels in the transmitter service area. Best Server Path Loss (dB) Atoll calculates signal levels received from transmitters on each pixel of each transmitter service area. Where other service areas overlap the studied one, Atoll determines the best transmitter and evaluates path loss from the best transmitter. A pixel of a service area is coloured if the path loss exceeds ( ) the defined thresholds (pixel colour depends on path loss). Coverage consists of several independent layers whose visibility in the workspace can be managed. There are as many layers as defined thresholds. Each layer corresponds to an area where the path loss from the best server exceeds a defined minimum threshold. Best Server Total Losses (dB) Atoll calculates signal levels received from transmitters on each pixel of each transmitter service area. Where service areas overlap the studied one, Atoll determines the best transmitter and evaluates total losses from the best transmitter. A pixel of a service area is coloured if the total losses exceed ( ) the defined thresholds (pixel colour depends on total losses). Coverage consists of several independent layers whose visibility in the workspace can be managed. There are as many layers as defined thresholds. Each layer corresponds to an area where the total losses from the best server exceed a defined minimum threshold. © Forsk 2009 AT281_TRG_E1 191 Technical Reference Guide Number of Servers Atoll evaluates how many service areas cover a pixel in order to determine the number of servers. The pixel colour depends on the number of servers. Coverage consists of several independent layers whose visibility in the workspace can be managed. There are as many layers as defined thresholds. Each layer corresponds to an area where the number of servers exceeds ( ) a defined minimum threshold. Cell Edge Coverage Probability (%) On each pixel of each transmitter service area, the coverage corresponds to the pixels where the signal level from this transmitter fulfils signal conditions defined in Conditions tab with different Cell edge coverage probabilities. There is one coverage area per transmitter in the explorer. Best Cell Edge Coverage Probability (%) On each pixel of each transmitter service area, the coverage corresponds to the pixels where the best signal level received fulfils signal conditions defined in Conditions tab. There is one coverage area per cell edge coverage probability in the explorer. 6.2 Definitions and Formulas Input parameters and formulas used in simulations and predictions (coverage predictions and point analysis) are detailed in the tables below. 6.2.1 Inputs This table lists simulation and prediction inputs (calculation options, quality targets, active set management conditions, etc.). Name Value Unit Description F ortho Clutter parameter None Orthogonality factor Tx Site equipment parameter None MUD factor F MUD Terminal parameter - HSDPA properties None MUD factor ic Frequency band parameter None Carrier number AS_Th Txi ic Cell parameter None Threshold for macro diversity specified for a transmitter on a given carrier ic req E -----c- Mobility parameter I 0 threshold None Ec/I0 target on downlink for the best server Global parameter None Pilot RSCP threshold for compressed mode activation Global parameter None Ec/I0 threshold for compressed mode activation E -----b- (Reception equipment, R99 bearer, Mobility) parameter N t req None Eb/Nt target on downlink Global parameter None Downlink Eb/Nt target increase due to compressed mode activation E -----b- (Reception equipment, R99 bearer, Mobility) parameter N t req None Eb/Nt target on uplink Global parameter None Uplink Eb/Nt target increase due to compressed mode activation F MUD Term Q pilot CM – activation RSCP pilot CM – activation Q pilot DL DL Q req DL Q req UL UL Q req UL Q req CE – UL NI Site parameter None Number of channel elements available for a site on uplink CE – DL NI Site parameter None Number of channel elements available for a site on downlink N CE – UL NI Simulation result None Number of channel elements of a site consumed by users on uplink N CE – DL NI Simulation result None Number of channel elements of a site consumed by users on downlink N max N max 192 AT281_TRG_E1 © Forsk 2009 Chapter 6: UMTS HSPA Networks N Overhead – C E – UL Site equipment parameter - UL overhead resources for common channels/cell None Number of channel elements used by the cell for common channels on uplink N Overhead – C E – DL Site equipment parameter - DL overhead resources for common channels/cell None Number of channel elements used by the cell for common channels on downlink N R99 – T CH – C E – UL (R99 Bearer, site equipment) parameter None Number of channel elements used for R99 traffic channels on uplink N R99 – T CH – C E – DL (R99 Bearer, site equipment) parameter None Number of channel elements used for R99 traffic channels on downlink HSUPA – C E (HSUPA Bearer, site equipment) parameter None Number of channel elements consumed by the HSUPA bearer on uplink UL Site parameter kbps Maximum Iub backhaul throughput for a site in the uplink DL Site parameter kbps Maximum Iub backhaul throughput for a site in the downlink UL Simulation result kbps Iub backhaul throughput for a site in the uplink DL Simulation result kbps Iub backhaul throughput for a site in the downlink Site equipment parameter kbps Iub throughput required by the cell for common channels in the downlink Site equipment parameter % HSDPA Iub backhaul overhead Site equipment parameter kbps Throughput carried by an E1/T1/ Ethernet link R99 – T CH – UL (R99 Bearer, site equipment) parameter kbps Iub backhaul throughput consumed by the R99 bearer in the uplink R99 – T CH – DL (R99 Bearer, site equipment) parameter kbps Iub backhaul throughput consumed by the R99 bearer in the downlink HSUPA (HSUPA Bearer, site equipment) parameter kbps Iub backhaul throughput consumed by the HSUPA bearer in the uplink Simulation constraint None Maximum number of 512 bit-length OVSF codes available per cell (512) Simulation result None Number of 512 bit-length OVSF codes used by the cell Site equipment parameter - DL overhead resources for common channels/cell None Number of 256 bit-length OVSF codes used by the cell for common channels N T Iub –m ax N I T Iub –m ax N I T Iub N I T Iub N I Overhead – DL T Iub HSDPA Overhead Iub T E1 T1 Ethernet T Iub T Iub T Iub Codes N max Txi ic N N Codes Txi ic Overhead – C odes Codes – HS PDSCH Txi ic Cell parameter (for HSDPA only) None Maximum number of 16 bit-length OVSF codes available per cell for HSPDSCH Codes – HS PDSCH Txi ic Cell parameter (for HSDPA only) None Minimum number of 16 bit-length OVSF codes available per cell for HSPDSCH NF term Terminal parameter None Terminal Noise Figure NF Tx Transmitter parameter (user-defined or calculated from transmitter equipment characteristics) None Transmitter Noise Figure K 1.38 10-23 J/K Boltzman constant N max N min T 293 K Ambient temperature W 3.84 MHz Hz Spreading Bandwidth Tx DL Cell parameter None Inter-technology downlink noise rise NR inter – techno log y Tx UL Cell parameter only used as input of the Monte-Carlo simulation None Inter-technology uplink noise rise RF ic ic adj Network parameter If not defined, it is assumed that there is no inter-carrier interference None Interference reduction factor between two adjacent carriers ic and ic adj NR inter – techno log y Tx m ICP ic ic i Network parameter If not defined, it is assumed that there is no inter-technology downlink interferences due to external transmitters None Inter-technology Channel Protection between the signal transmitted by Tx and received by m assuming the frequency gap between ic i (external network) and ic © Forsk 2009 AT281_TRG_E1 193 Technical Reference Guide UL X max DL %Power max Simulation constraint (global parameter or cell parameter) % Maximum uplink load factor Simulation constraint (global parameter or cell parameter) % Maximum percentage of used power W Thermal noise at transmitter W Thermal noise at terminal bps Chip rate Tx UL Tx NF Tx K T W NR inter – techno log y Term NF Term K T W NR inter – techno log y N0 N0 Rc Tx DL W 10 –3 W UL Site equipment parameter None Uplink rake receiver efficiency factor DL Terminal parameter None Downlink rake receiver efficiency factor R nominal R99 bearer parameter kbps R99 bearer downlink nominal bit rate F spreading Active user R99 bearer parameter None Downlink spreading factor for active users DL R99 bearer parameter None Downlink spreading factor for inactive users f rake efficiency f rake efficiency DL DL F spreading Inactive user DL R99 bearer parameter None ratio between DPCCH and DPCH transmission duration on downlink DPCCH and DPCH respectively refer to the Dedicated Physical Control Channel and Dedicated Physical Channel DL Cell parameter kbps Maximum connection rate per user on downlink R99 bearer parameter kbps R99 bearer uplink nominal bit rate UL Service parameter kbps Uplink activity factor on E-DPCCH channels DL Service parameter kbps Downlink Activity factor on A-DPCH channel UL Service parameter kbps Minimum required bit rate that the service should have in order to be available in the uplink DL Service parameter kbps Minimum required bit rate that the service should have in order to be available in the downlink rc R max UL R nominal f act –ADPCH f act –ADPCH R Guaranteed R Guaranteed UL R99 bearer parameter None ratio between the DPCCH and DPCH powers transmitted on uplink DPCCH and DPCH respectively refer to the Dedicated Physical Control Channel and Dedicated Physical Channel UL Cell parameter kbps Maximum connection rate per user on uplink DL W ---------------------DL R nominal None Service downlink processing gain UL W ---------------------UL R nominal None Service uplink processing gain T application HSDPA study result kbps User application throughput on downlink R RLC – peak I HSDPABearer HSDPA Bearer parameter kbps RLC peak rate supported by the HSDPA bearer kbps RLC peak rate provided in the downlink rc R max Gp Gp DL DL HSDPA study result DL Without MIMO: R RLC – peak Index HSDPABearer DL R RLC – peak DL With MIMO (transmit diversity): R RLC – peak Index HSDPABearer With MIMO (spatial multiplexing): DL R RLC – peak Index HSDPABearer 194 Max 1 + f SM – Gain G SM – 1 AT281_TRG_E1 © Forsk 2009 Chapter 6: UMTS HSPA Networks R Guaranteed -------------------------------------------------------------------DL R RLC – peak I HSDPABearer % HSDPA bearer consumption for a packet (HSPA - Constant Bit Rate) service user HSDPA study result kbps RLC peak throughput supported by the HSDPA bearer T RLC – Av HSDPA study result kbps Average RLC throughput supported by the HSDPA bearer R MAC DL HSDPA study result kbps MAC rate supported by the HSDPA bearer DL HSDPA study result kbps MAC throughput supported by the HSDPA bearer T application HSUPA study result kbps User application throughput on uplink T application – Av UL HSUPA study result kbps User average application throughput on uplink R RLC – peak I HSUPABearer HSUPA Bearer parameter kbps RLC peak rate supported by the HSUPA bearer kbps RLC peak rate provided in the uplink R Guaranteed -------------------------------------------------------------------UL R RLC – peak I HSUPABearer % HSUPA bearer consumption for a packet (HSPA - Constant Bit Rate) service user UL HSUPA study result kbps Minimum RLC throughput supported by the HSUPA bearer T RLC – Av UL HSUPA study result kbps Average RLC throughput supported by the HSUPA bearer R MAC UL HSUPA study result kbps MAC rate supported by the HSUPA bearer R Service parameter (for HSDPA only) kbps Throughput offset SF Rate Service parameter (for HSDPA only) % Scaling factor P max Txi Transmitter parameter W Maximum shared power Available only if the inter-carrier power sharing option is activated P SCH Txi ic Cell parameter W Cell synchronisation channel power P OtherCCH Txi ic Cell parameter W P pilot Txi ic Cell parameter W Cell pilot power P HSDPA Txi ic Cell parameter (user-defined or simulation result) (for HSDPA only) P HS – PDSCH Txi ic + n HS – SCCH P HS – SCCH Txi ic W Available cell HSDPA power HSDPA: High Speed Downlink Packet Access P HS – PDSCH Txi ic Simulation result (for HSDPA only) W Cell HS-PDSCH power HS-PDSCH: High Speed Physical Downlink Shared Channel P HS – SCCH Txi ic Cell parameter (for HSDPA only) W Cell HS-SCCH power HS-SCCH: High Speed Shared Control Channel n HS – SCCH Cell parameter (user-defined or simulation result) (for HSDPA only) P Headroom Txi ic Cell parameter (for HSDPA only) W Cell headroom power P max Txi ic Cell parameter W Maximum Cell power P tch Txi ic Simulation result W R99 traffic channel power transmitted on carrier ic min R99 bearer parameter W Minimum power allowed on R99 traffic data channel P tch max R99 bearer parameter W Maximum power allowed on R99 traffic data channel P HSUPA Txi ic Cell parameter W Cell HSUPA power HSUPA: High Speed Uplink Packet Access DL C HSDPABearer DL T RLC – peak DL T MAC UL UL HSUPA study result UL R RLC – peak UL R RLC – peak I HSUPABearer UL C HSUPABearer T RLC – Min P tch © Forsk 2009 AT281_TRG_E1 Cell other common channels (except CPICH and SCH) powera number of HS-SCCH channels managed by the cell 195 Technical Reference Guide P tx –H SDPA Txi ic Simulation result W Transmitter HSDPA power transmitted on carrier ic W Transmitter R99 power transmitted on carrier ic Cell parameter or simulation result P pilot Txi ic + P SCH Txi ic + P OtherCCH Txi ic + P tx – R99 Txi ic P tch Txi ic + tch(ic) used for R99 users DL P tch Txi ic f act –ADPCH tch(ic) used for HSUPA users P tx Txi ic Simulation result P tx – R99 Txi ic + P tx –H SDPA Txi ic + P HSUPA Txi ic W Transmitter total power transmitted on carrier ic P term – R99 Simulation result W Terminal power transmitted to obtain the R99 radio bearer P term – HSUPA Simulation result W Terminal power transmitted to obtain the HSUPA radio bearer P term P term – R99 f act – ADPCH + P term – HSUPA for HSPA users W Total power transmitted by the terminal Simulation result UL P term – R99 for R99 users P term min Terminal parameter W Minimum terminal power allowed P term max Terminal parameter W Maximum terminal power allowed BTS BTS parameter % Percentage of BTS signal correctly transmitted term Terminal parameter % Percentage of terminal signal correctly transmitted Clutter parameter % Percentage of pilot finger - percentage of signal received by the terminal pilot finger G Tx Antenna parameter None Transmitter antenna gain G Term Terminal parameter None Terminal gain G Div DL R99 bearer parameter - Depends on the transmitter Tx diversity None Gain due to transmit diversity UL R99 bearer parameter - Depends on the transmitter Rx diversity None Gain due to receive diversity G SM Max MIMO configuration parameter dB Maximum spatial multiplexing gain for a given number of transmission and reception antennas G TD DL MIMO configuration parameter dB Downlink Transmit Diversity gain for a given number of transmission and reception antenna ports f SM – Gain Clutter parameter None Spatial multiplexing gain factor G TD Clutter parameter dB Additional diversity gain in downlink L Tx Transmitter parameter (user-defined or calculated from transmitter equipment characteristics) None Transmitter lossb L body Service parameter None Body loss L Term Terminal parameter None Terminal loss L indoor Clutter and frequency band parameter L path Propagation model result None Path loss M Shadowing – model Result calculated from cell edge coverage probability and model standard deviation None Model Shadowing margin Only used in prediction studies M Shadowing – Ec Io Result calculated from cell edge coverage probability and Ec/I0 standard deviation None Ec/I0 Shadowing margin Only used in prediction studies G Div DL DL M Shadowing – Eb Nt 196 npaths G macro – diversity = M Shadowing – Ec Io – M Shadowing – Ec Io DL G macro – diversity Indoor loss None n=2 or 3 DL Result calculated from cell edge coverage probability and DL Eb/Nt standard deviation AT281_TRG_E1 None DL gain due to availability of several pilot signals at the mobile c. DL Eb/Nt Shadowing margin Only used in prediction studies © Forsk 2009 Chapter 6: UMTS HSPA Networks M Shadowing – Eb Nt Result calculated from cell edge coverage probability and UL Eb/Nt standard deviation UL UL npaths G macro – diversity = M Shadowing – Eb Nt UL G macro – diversity UL – M Shadowing – Eb Nt n=2 or 3 Global parameter (default value) UL None None UL Eb/Nt Shadowing margin Only used in prediction studies UL quality gain due to signal diversity in soft handoffd. None Random shadowing error drawn during Monte-Carlo simulation Only used in simulations None Transmitter-terminal total loss P pilot Txi ic ----------------------------------LT W Chip power received at terminal DL P tch Txi ic -------------------------------LT W Bit power received at terminal on carrier ic DL P tx Txi ic -----------------------------LT W Total power received at terminal from a transmitter on carrier ic W Total power received at terminal from traffic channels of a transmitter on carrier ic P term -------------LT W Bit power received at transmitter on carrier ic used by terminal P term – R99 --------------------------LT W Bit power received at transmitter on carrier ic used by terminal W Bit power received at transmitter on DPDCH from a terminal on carrier ic E Shadowing Simulation result In prediction studiese For Ec/I0 calculation L path L Tx L term L body L indoor M Shadowing – Ec Io --------------------------------------------------------------------------------------------------------------------------------------------------G Tx G term For DL Eb/Nt calculation L path L Tx L term L body L indoor M Shadowing – Eb Nt DL -----------------------------------------------------------------------------------------------------------------------------------------------------------G Tx G term LT For UL Eb/Nt calculation L path L Tx L term L body L indoor M Shadowing – Eb Nt UL -----------------------------------------------------------------------------------------------------------------------------------------------------------G Tx G term In simulations L path L Tx L term L body L indoor E Shadowing -------------------------------------------------------------------------------------------------------------------------------G Tx G term P c Txi ic P b Txi ic P tot Txi ic DL P traf Txi ic tch ic UL P b ic UL P b – R99 ic UL P tch Txi ic -------------------------------LT UL P b – DPDCH ic UL P b – R99 ic 1 – r c a. For the calculation of interference, P OtherCCH Txi ic also includes the MBMS SCCPCH channel power when the optional MBMS feature is activated. You must modify the data structure for activating the optional MBMS feature. For more information, see the Administrator Manual. b. L Tx = L total – UL on uplink and L Tx = L total – DL on downlink. For information on calculating transmitter losses on uplink and downlink, see "UMTS HSPA, CDMA2000 1xRTT 1xEV-DO, and TD-SCDMA Documents" on page 128. c. npaths M Shadowing –Ec Io corresponds to the shadowing margin evaluated from the shadowing error probability density function (n paths) in case of downlink Ec/I0 modelling. d. npaths M Shadowing – Eb Nt UL corresponds to the shadowing margin evaluated from the shadowing error probability density function (n paths) in case of uplink soft handoff modelling. e. In uplink prediction studies, only carrier power level is downgraded by the shadowing margin ( M Shadowing – Eb Nt ). In downlink prediction studies, carrier power level and intra-cell interference are downgraded by UL the shadowing model ( M Shadowing – Eb Nt M Shadowing – Eb Nt 6.2.2 DL DL or M Shadowing – Ec Io ) while extra-cell interference level is not. Therefore, or M Shadowing – Ec Io is set to 1 in downlink extra-cell interference calculation. Ec/I0 Calculation This table details the pilot quality ( Q pilot or Ec Io ) calculations. © Forsk 2009 AT281_TRG_E1 197 Technical Reference Guide Name Value P SCH txi ic DL DL P tot txi ic – BTS P tot txi ic – -------------------------------- L DL I intra txi ic Unit Description W Downlink intra-cell interference at terminal on carrier ic W Downlink extra-cell interference at terminal on carrier ic W Downlink inter-carrier interference at terminal on carrier ic T DL I extra ic DL P tot txj ic txj j i Ptot txj icadj DL DL I inter – carrier ic txj j ------------------------------------------------ RF ic ic adj Tx P Transmitted ic i -----------------------------------------Tx Tx m L ICP DL I inter – techno log y ic ic i ic total ni W Downlink inter-technology interference at terminal on carrier ic a Without Pilot: DL DL DL DL I intra txi ic + I extra ic + I inter – carrier ic + I inter – techno log y ic Term + N0 DL I 0 ic – 1 – BTS P c txi ic DL Total noise: DL W Total received noise at terminal on carrier ic None Quality level at terminal on pilot for carrier ic DL P tot txi ic + I extra ic + I inter – carrier ic DL Term + I inter – techno log y ic + N 0 BTS P c txi ic ------------------------------------------------------DL I 0 ic Ec Q pilot txi ic ------ I0 a. In the case of an interfering GSM external network in frequency hopping, the ICP value is weighted according to the fractional load. 6.2.3 DL Eb/Nt Calculation Eb DL This table details calculations of downlink traffic channel quality ( Q tch or ------- ). When the optional MBMS feature is Nt DL activated, the MBMS Eb/Nt is also calculated in the same manner. You must modify the data structure for activating the optional MBMS feature. For more information, see the Administrator Manual. Name DL I intra txi ic Value Unit Description P SCH txi ic DL DL P tot txi ic – BTS F ortho P tot txi ic – -------------------------------- L W Downlink intra-cell interference at terminal on carrier ic W Downlink extra-cell interference at terminal on carrier ic W Downlink inter-carrier interference at terminal on carrier ic T DL I extra ic DL P tot txj ic txj j i Ptot txj icadj DL DL I inter – carrier ic txj j ------------------------------------------------ RF ic ic adj Tx P Transmitted ic i -----------------------------------------Tx Tx m L ICP DL I inter – techno log y ic DL N tot ic DL DL ic i ic total ni W DL Term DL I intra ic + I extra ic + I inter – carrier ic + I inter – techno log y ic + N 0 W Downlink inter-technology interference at terminal on carrier ic a Total received noise at terminal on carrier ic Without useful signal: DL Eb DL Q tch txi ic ------ N t DL BTS P b txi ic DL ---------------------------------------------------------------------------------------------------------------- G DL Div G p DL DL N tot ic – 1 – F ortho BTS P b txi ic None DL BTS P b txi ic DL - G DL Total Noise: -----------------------------------------------Div G p DL N tot ic Q 198 DL ic DL f rake efficiency DL Q tch tx k ic txk ActiveSet AT281_TRG_E1 None Quality level at terminal on a traffic channel from one transmitter on carrier ic b Quality level at terminal using carrier ic due to combination of all transmitters of the active set (Macrodiversity conditions). © Forsk 2009 Chapter 6: UMTS HSPA Networks DL Q ic ---------------------------------------------------------DL Q tch BestServer ic DL G SHO None Soft handover gain on downlink W Required transmitter traffic channel power to achieve Eb/Nt target at terminal on carrier ic DL Q req -------------------- P tch txi ic DL Q ic req P tch txi ic a. In the case of an interfering GSM external network in frequency hopping, the ICP value is weighted according to the fractional load. b. Calculation option may be selected in the Global parameters tab. The chosen option will be taken into account only in simulations. In point analysis and coverage studies, Atoll uses the option “Total noise” to evaluate DL and UL Eb/Nt. 6.2.4 UL Eb/Nt Calculation Eb UL This table details calculations of uplink traffic channel quality ( Q tch or ------- ). Nt UL Name UL intra I tot Pb UL txi ic UL extra I tot Value term txi txi ic term txj j i Pb ic Description W Total power received at transmitter from intra-cell terminals using carrier ic W Total power received at transmitter from extra-cell terminals using carrier ic W Uplink inter-carrier interference at terminal on carrier ic W Total received interference at transmitter on carrier ic W Total noise at transmitter on carrier ic (Uplink interference) UL P b ic UL UL I inter – carrier txi ic Unit ic adj term txj j -------------------------------------- RF ic ic adj UL I tot txi ic UL extra I tot UL intra Tx txi ic + 1 – F MUD term I tot UL UL N tot txi ic UL txi ic + I inter – carrier txi ic tx I tot txi ic + N 0 Without useful signal: UL Eb UL Q tch txi ic ------ N t UL term P b – DPDCH ic UL ---------------------------------------------------------------------------------------------------------------- G UL Div G p UL Tx UL N tot txi ic – 1 – F MUD term P b ic None UL term P b – DPDCH ic UL UL G Div G p Total noise: ---------------------------------------------------------UL N tot txi ic Quality level at transmitter on a traffic channel for carrier ic a UL No HO: Q tch txi ic UL Softer HO: f rake efficiency UL Q tch tx k ic tx k ActiveSet samesite Soft, softer/soft HO (No MRC): UL UL Max Q tch tx k ic G macro – diversity Q UL tx k ActiveSet ic Softer/soft HO (MRC): Quality level at site using carrier ic due to combination of all transmitters of the active set located at the same site and taking into account increasing of None the quality due to macro-diversity (macro-diversity gain). UL UL UL f rake efficiency Q tch tx k ic Q tch tx l ic tx ,tx ActiveSet k l tx samesite tx k k Max UL In simulations G macro – diversity = 1 . tx l othersite UL G macro – diversity UL UL G SHO © Forsk 2009 Q ic ---------------------------------------------------------UL Q tch BestServer ic AT281_TRG_E1 None Soft handover gain on uplink 199 Technical Reference Guide UL Q req -------------------- P term UL Q ic req P term ic W Required terminal power to achieve Eb/Nt target at transmitter on carrier ic a. Calculation option may be selected in the Global parameters tab. The chosen option will be taken into account only in simulations. In point analysis and coverage studies, Atoll uses the option “Total noise” to evaluate DL and UL Eb/Nt. 6.3 Active Set Management The mobile’s active set (AS) is the list of the transmitters to which the mobile is connected. The active set may consist of one or more transmitters; depending on whether the service supports soft handover and on the terminal active set size. The terminal frequency bands are taken into account and transmitters in the mobile’s active set must use a frequency band supported by the terminal. Finally, the quality of the pilot (Ec⁄I0) is what determines whether or not a transmitter can belong to the active set. The active set management is detailed hereafter. Cells entering a mobile’s active set must satisfy the following conditions: • The best server (first cell entering active set) The pilot quality from the best serving cell must exceed the Ec/I0 threshold. Best server cell is the one with the highest pilot quality. • Other cells in the active set - 6.4 Must use the same carrier as the best server, The pilot quality difference between other candidate cells and the best server must be less than the AS threshold specified for the best server, Other candidate cells must belong to the neighbour list of the best server if it is located on a site where the equipment imposes this restriction (the “restricted to neighbours” option selected in the equipment properties). Simulations The simulation process consists of two steps: 1. Obtaining a realistic user distribution Atoll generates a user distribution using a Monte-Carlo algorithm, which requires traffic maps and data as input. The resulting user distribution complies with the traffic database and maps provided to the algorithm. Each user is assigned a service, a mobility type, and an activity status by random trial, according to a probability law that uses the traffic database. The user activity status is an important output of the random trial and has direct consequences on the next step of the simulation and on the network interferences. A user may be either active or inactive. Both active and inactive users consume radio resources and create interference. Then, Atoll randomly assigns a shadowing error to each user using the probability distribution that describes the shadowing effect. Finally, another random trial determines user positions in their respective traffic zone and whether they are indoors or outdoors (according to the clutter weighting and the indoor ratio per clutter class defined for the traffic maps). 2. Power control simulation 6.4.1 Generating a Realistic User Distribution During the simulation, a first random trial is performed to determine the number of users and their activity status. Four activity status are modelled: • Active UL: the user is active on UL and inactive on DL • Active DL: the user is active on DL and inactive on UL • Active UL+DL: the user is active on UL and on DL • Inactive: the user is inactive on UL and on DL The determination of the number of users and the activity status allocation depend on the type of traffic cartography used. Note: • Atoll follows a Poisson distribution to determine the total number of users attempting a connection in each simulation. In order for Atoll to use a constant total number of users attempting a connection, the following lines must be added to the Atoll.ini file: [CDMA] RandomTotalUsers=0 200 AT281_TRG_E1 © Forsk 2009 Chapter 6: UMTS HSPA Networks 6.4.1.1 Simulations Based on User Profile Traffic Maps User profile environment based traffic maps: Each pixel of the map is assigned an environment class which contains a list of user profiles with an associated mobility type and a given density (number of subscribers with the same profile per km²). User profile traffic maps: Each polygon and line of the map is assigned a density of subscribers with given user profile and mobility type. If the map is composed of points, each point is assigned a number of subscribers with given user profile and mobility type. The user profile models the behaviour of the different subscriber categories. Each user profile contains a list of services and their associated parameters describing how these services are accessed by the subscriber. From environment (or polygon) surface (S) and user profile density (D), a number of subscribers (X) per user profile is inferred. X = SD Notes: • When user profile traffic maps are composed of lines, the number of subscribers (X) per user profile is calculated from the line length (L) and the user profile density (D) (nb of subscribers per km) as follows: X = L D The number of subscribers (X) is an input when a user profile traffic map is composed of points. • For each behaviour described in a user profile, according to the service, frequency use and exchange volume, Atoll calculates the probability for the user being active in uplink and in downlink at an instant t. 6.4.1.1.1 Circuit Switched Service (i) User profile parameters for circuit switched services are: • • The used terminal (equipment used for the service (from the Terminals table)), The average number of calls per hour N call , • The average duration of a call (seconds) d . The number of users and their distribution per activity status is determined as follows: Calculation of the service usage duration per hour ( p 0 : probability of a connection): 1. N call d p o = --------------------3600 2. Calculation of the number of users trying to access the service i ( n i ): ni = X p0 Next, we can take into account activity periods during the connection in order to determine the activity status of each user. 3. Calculation of activity probabilities: UL DL Probability of being inactive on UL and DL: p inactive = 1 – f act 1 – f act UL DL DL UL Probability of being active on UL only: p UL = f act 1 – f act Probability of being active on DL only: p DL = f act 1 – f act UL DL Probability of being active both on UL and DL: p UL + DL = f act f act UL DL Where, f act and f act are respectively the UL and DL activity factors defined for the circuit switched service i. 4. Calculation of number of users per activity status: inactive Number of inactive users on UL and DL: n i = n i p inactive Number of users active on UL and inactive on DL: n i UL = n i p UL Number of users active on DL and inactive on UL: n i DL = n i p DL Number of users active on UL and DL both: n i UL + DL = n i p UL + DL Therefore, a user when he is connected can have four different activity status: either active on both links, or inactive on both links, or active on UL only, or active on DL only. 6.4.1.1.2 Packet Switched Service (j) User profile parameters for packet switched services are: • © Forsk 2009 The used terminal (equipment used for the service (from the Terminals table)), AT281_TRG_E1 201 Technical Reference Guide • The average number of packet sessions per hour N sess , • The volume (in kbytes) which is transferred on the downlink V DL and the uplink V UL during a session. A packet session consists of several packet calls separated by a reading time. Each packet call is defined by its size and may be divided in packets of fixed size (1500 Bytes) separated by an inter arrival time. In Atoll, a packet session is described by following parameters: UL N packet –c all : Average number of packet calls on the uplink during a session, DL N packet –c all : Average number of packet calls on the downlink during a session, UL T packet – call : Average time (millisecond) between two packets calls on the uplink , DL T packet – call : Average time (millisecond) between two packets calls on the downlink , UL T packet : Average time (millisecond) between two packets on the uplink , DL T packet : Average time (millisecond) between two packets on the downlink , UL S packet : Packet size (Bytes) on uplink, DL S packet : Packet size (Bytes) on downlink. Figure 6.1: Description of a Packet Session The number of users and their distribution per activity status is determined as follows: 1. Calculation of the average packet call size (kBytes): V UL V DL UL DL - and S packet –c all = ------------------------------------------S packet –c all = ------------------------------------------UL UL DL DL N packet –c all f eff N packet – c all f eff UL DL Where f eff and f eff are the UL and DL efficiency factors defined for the packet switched service j. Note: UL 2. DL For packet (HSDPA) and packet (HSPA) services, f eff and f eff are set to 1. • Calculation of the average number of packets per packet call: UL DL S packet –c all S packet –c all UL - + 1 and N DL - + 1 N packet = int ----------------------------------packet = int ---------------------------------- S UL S DL 1024 packet packet 1024 Note: • 3. 1kBytes = 1024Bytes. Calculation of the average duration of inactivity within a packet call (s): UL UL DL DL N packet – 1 T packet N packet – 1 T packet UL DL - and D Inactivity packet – call = ------------------------------------------------------------- D Inactivity packet – call = -------------------------------------------------------------1000 1000 4. Calculation of the average duration of inactivity in a session (s): UL UL UL DL DL DL D Inactivity session = N packet –c all D Inactivity packet – call and D Inactivity session = N packet –c all D Inactivity packet – call 202 AT281_TRG_E1 © Forsk 2009 Chapter 6: UMTS HSPA Networks 5. Calculation of the average duration of activity in a session (s): UL UL DL DL N packet S packet 8 N packet S packet 8 UL UL DL - and D DL D Activity session = N packet – c all ----------------------------------------------------Activity session = N packet – c all ----------------------------------------------------UL DL R average 1000 R average 1000 UL DL Where R average and R average are the uplink and downlink average requested rates defined for the service j. Therefore, the average duration of a connection (in s) is: UL UL UL DL DL DL D Connection = D Activity session + D Inactivity session and D Connection = D Activity session + D Inactivity session 6. Calculation of the service usage duration per hour (probability of a connection): N sess N sess UL UL DL DL p Connection = -------------- D Connection and p Connection = -------------- D Connection 3600 3600 7. Calculation of the probability of being connected: UL DL p Connected = 1 – 1 – p Connection 1 – p Connection Therefore, the number of users who want to get the service j is: n j = X p Connected As you can see on the picture above, we have to consider three possible cases when a user is connected: • 1st case: At a given time, packets are downloaded and uploaded. In this case, the probability of being connected is: UL DL p Connection p Connection UL + DL p Connected = ---------------------------------------------------------------p Connected • 2nd case: At a given time, packet are uploaded (no packet is downloaded). Here, the probability of being connected is: UL DL p Connection 1 – p Connection UL p Connected = -----------------------------------------------------------------------------p Connected • 3rd case: At a given time, packet are downloaded (no packet is uploaded). In this case, the probability of being connected is: DL UL p Connection 1 – p Connection DL p Connected = -----------------------------------------------------------------------------p Connected Now, we have to take into account activity periods during the connection in order to determine the activity status of each user. 8. f UL Calculation of the probability of being active: UL DL D Activity session D Activity session DL - and f = ----------------------------------------------------------------------------------------------------= ----------------------------------------------------------------------------------------------------UL UL DL DL D Inactivity session + D Activity session D Inactivity session + D Activity session Therefore, we have: • 1st case: At a given time, packets are downloaded and uploaded. The user can be active on UL and inactive on DL; this probability is: 1 p UL = f UL 1 – f DL UL + DL p Connected The user can be active on DL and inactive on UL; this probability is: 1 p DL = f DL 1 – f UL UL + DL p Connected The user can be active on both links; this probability is: 1 p UL + DL = f UL f DL UL + DL p Connected The user can be inactive on both links; this probability is: 1 p inactive = 1 – f • UL 1 – f DL UL + DL p Connected 2nd case: At a given time, packet are uploaded (no packet is downloaded). The user can be active on UL and inactive on DL; this probability is: 2 p UL = f © Forsk 2009 UL UL p Connected AT281_TRG_E1 203 Technical Reference Guide The user can be inactive on both links; this probability is: 2 p inactive = 1 – f • UL UL p Connected 3rd case: At a given time, packet are downloaded (no packet is uploaded). The user can be active on DL and inactive on UL; this probability is: 3 p DL = f DL DL p Connected The user can be inactive on both links; this probability is: 3 p inactive = 1 – f 9. DL DL p Connected Calculation of number of users per activity status inactive Number of inactive users on UL and DL: n j 1 2 3 = n j p inactive + p inactive + p inactive 1 2 1 3 Number of users active on UL and inactive on DL: n j UL = n j p UL + p UL Number of users active on DL and inactive on UL: n j DL = n j p DL + p DL 1 Number of users active on UL and DL: n j UL + DL = n j p UL + DL Therefore, a user when he is connected can have four different activity status: either active on both links, or inactive on both links, or active on UL only, or active on DL only. Note: • 6.4.1.2 The user distribution per service and the activity status distribution between the users are average distributions. And the service and the activity status of each user are randomly drawn in each simulation. Therefore, if you compute several simulations at once, the average number of users per service and average numbers of inactive, active on UL, active on DL and active on UL and DL users, respectively, will correspond to calculated distributions. But if you check each simulation, the user distribution between services as well as the activity status distribution between users is different in each of them. Simulations Based on Sector Traffic Maps Sector traffic maps can be based on live traffic data from OMC (Operation and Maintenance Centre). Traffic is spread over the best server coverage area of each transmitter and each coverage area is assigned either the throughputs in the uplink and in the downlink or the number of users per activity status or the total number of users (including all activity statuses). 6.4.1.2.1 Throughputs in Uplink and Downlink When selecting Throughputs in Uplink and Downlink, you can input the throughput demands in the uplink and downlink for each sector and for each listed service. Atoll calculates the number of users active in uplink and in downlink in the Txi cell using the service (NUL and NDL) as follows: UL DL Rt Rt N UL = ---------------------and N DL = ---------------------UL DL R average R average UL is the kbits per second transmitted in UL in the Txi cell to supply the service. DL is the kbits per second transmitted in DL in the Txi cell to supply the service. Rt Rt DL R average is the downlink average requested rate defined for the service, UL R average is the uplink average requested rate defined for the service. NUL and NDL values include: • • • Users active in uplink and inactive in downlink (ni(UL)), Users active in downlink and inactive in uplink (ni(DL)), And users active in both links (ni(UL+DL)). Atoll takes into account activity periods during the connection in order to determine the activity status of each user. Activity probabilities are calculated as follows: UL DL Probability of being inactive in UL and DL: p inactive = 1 – f act 1 – f act UL DL Probability of being active in UL only: p UL = f act 1 – f act 204 AT281_TRG_E1 © Forsk 2009 Chapter 6: UMTS HSPA Networks DL UL Probability of being active in DL only: p DL = f act 1 – f act UL DL Probability of being active both in UL and DL: p UL + DL = f act f act UL DL Where, f act and f act are respectively the UL and DL activity factors defined for the service i. Note: UL DL For packet (HSDPA) and packet (HSPA) services, f act and f act are set to 1. • Then, Atoll calculates the number of users per activity status: We have: p UL + p UL + DL n j UL + n j DL + n j UL + DL = N UL p DL + p UL + DL n j UL + n j DL + n j UL + DL = N DL Therefore, we have: N UL p UL + DL N DL p UL + DL Number of users active in UL and DL both: n i UL + DL = min ------------------------------------- ------------------------------------- p UL + p UL + DL p DL + p UL + DL Number of users active in UL and inactive in DL: n i UL = N UL – n i UL + DL Number of users active in DL and inactive in UL: n i DL = N DL – n i UL + DL inactive Number of inactive users in UL and DL: n i n j UL + n j DL + n j UL + DL = -------------------------------------------------------------------------------------- p inactive 1 – p inactive Therefore, a connected user can have four different activity status: either active in both links, or inactive in both links, or active in UL only, or active in DL only. 6.4.1.2.2 Total Number of Users (All Activity Statuses) When selecting Total Number of Users (All Activity Statuses), you can input the number of connected users for each sector and for each listed service ( n i ). Atoll takes into account activity periods during the connection in order to determine the activity status of each user. Activity probabilities are calculated as follows: UL DL Probability of being inactive in UL and DL: p inactive = 1 – f act 1 – f act UL DL DL UL Probability of being active in UL only: p UL = f act 1 – f act Probability of being active in DL only: p DL = f act 1 – f act UL DL Probability of being active both in UL and DL: p UL + DL = f act f act UL DL Where, f act and f act are respectively the UL and DL activity factors defined for the service i. Note: • UL DL For packet (HSDPA) and packet (HSPA) services, f act and f act are set to 1. Then, Atoll calculates the number of users per activity status: inactive Number of inactive users in UL and DL: n i = n i p inactive Number of users active in UL and inactive in DL: n i UL = n i p UL Number of users active in DL and inactive in UL: n i DL = n i p DL Number of users active in UL and DL both: n i UL + DL = n i p UL + DL Therefore, a connected user can have four different activity status: either active in both links, or inactive in both links, or active in UL only, or active in DL only. 6.4.1.2.3 Number of Users per Activity Status inactive When selecting Number of Users per Activity Status, you can directly input the number of inactive users ( n i ), the number of users active in the uplink ( n i UL ), in the downlink ( n i DL ) and in the uplink and downlink ( n i UL + DL ), for each sector and for each service. © Forsk 2009 AT281_TRG_E1 205 Technical Reference Guide Note: • 6.4.2 The activity status distribution between users is an average distribution. In fact, in each simulation, the activity status of each user is randomly drawn. Therefore, if you compute several simulations at once, average numbers of inactive, active on UL, active on DL and active on UL and DL users correspond to the calculated distribution. But if you check each simulation, the activity status distribution between users is different in each of them. Power Control Simulation The power control algorithm simulates the way a UMTS network regulates itself by using uplink and downlink power controls in order to minimize interference and maximize capacity. HSDPA users (i.e., Packet (HSDPA), Packet (HSPA) and Packet (HSPA - Constant Bit Rate) service users) are linked to the A-DPCH radio bearer (an R99 radio bearer). Therefore, the network uses a A-DPCH power control on UL and DL and then it performs fast link adaptation on DL in order to select an HSDPA radio bearer. For HSUPA users (i.e., Packet (HSPA) and Packet (HSPA - Constant Bit Rate) service users), the network first uses a E-DPCCH/A-DPCH power control on UL and DL, checks that there is an HSDPA connection on downlink and then carries out noise rise scheduling in order to select an HSUPA radio bearer on uplink. Atoll simulates these network regulation mechanisms with an iterative algorithm and calculates, for each user distribution, network parameters such as cell power, mobile terminal power, active set and handoff status for each terminal. During each iteration of the algorithm, all the users (i.e., Circuit (R99), Packet (R99), Packet (HSDPA), Packet (HSPA) and Packet (HSPA - Constant Bit Rate) service users) selected during the user distribution generation (1st step) attempt to connect one by one to network transmitters. The process is repeated until the network is balanced, i.e., until the convergence criteria (on UL and DL) are satisfied. Initialisation R99 part Mi Best Server Determination Mi Active Set Determination For HSDPA users, this part of the algorithm is performed for the A-DPCH bearer (R99 bearer) For HSUPA users, this part is performed for the E-DPCCH/ADPCH bearer (R99 bearer) For each R99, HSDPA and HSUPA mobile, Mi UL Power Control DL Power Control UL and DL Interference Update Congestion and Radio Resource Control HSDPA part For each HSDPA and HSUPA mobile, Mi Fast Link Adaptation Mobile Scheduling Radio Resource Control HSUPA part Admission Control For each HSUPA mobile, Mi Noise Rise Scheduling Radio Resource Control Convergence Study Figure 6.2: UMTS HSPA Power Control Algorithm 206 AT281_TRG_E1 © Forsk 2009 Chapter 6: UMTS HSPA Networks As shown in Figure 6.2: on page 206, the simulation algorithm is divided in three parts. All users are evaluated by the R99 part of the algorithm. HSDPA and HSUPA bearer users, unless they have been rejected during the R99 part of the algorithm, are then evaluated by the HSDPA part of the algorithm. Finally, HSUPA bearer users, unless they have been rejected during the R99 or HSDPA parts of the algorithm, are then evaluated by the HSUPA part of the algorithm. The steps of this algorithm are detailed below. 6.4.2.1 Algorithm Initialization The total power transmitted by the base station txi on the carrier ic m , P Tx txi ic m , is initialised to P pilot txi ic m + P SCH txi ic m + P otherCCH txi ic m + P HSDPA txi ic m + P HSUPA txi ic . Uplink received powers by UL intra the base station txi on carrier ic m , I tot UL extra txi ic m , I tot UL txi ic m and I inter – carrier txi ic m are initialised to 0 W (i.e. no connected mobile). UL I tot txi ic m UL - = 0 X k txi ic m = --------------------------------UL N tot txi ic m 6.4.2.2 R99 Part of the Algorithm UL The algorithm is detailed for any iteration k. Xk is the value of the X (variable) at the iteration k. In the algorithm, all Q req DL and Q req thresholds depend on the user mobility type and are defined in the R99 bearer property dialogue. All variables are described in Definitions and formulas part. Here, the rate downgrading is not taken into account. The algorithm applies to single frequency band networks and to dual-band networks. Dual-band terminals can have the following configurations: - Configuration 1: The terminal can work on f1 and f2 without any priority (select "All" as main frequency band in the terminal property dialogue). Configuration 2: The terminal can work on f1 and f2 but f1 has a higher priority (select "f1" as main frequency band and "f2" as secondary frequency band in the terminal property dialogue). For each mobile Mb Determination of Mb’s Best Server For each transmitter txi containing Mb in its calculation area and working on the main frequency band supported by the Mb’s terminal (i.e. either f1 for a single frequency band network, or f1 or f2 for a dual-band terminal with the configuration 1, or f1 for a dual-band terminal with the configuration 2). BTS P c txi M b ic Calculation of Q pilot txi ic Mb = -------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------Term k DL DL DL DL P tot txi ic + I extra ic + I inter – carrier ic + I inter – techno log y ic + N 0 If user selects “without Pilot” BTS P c txi M b ic Q pilot txi ic Mb = ----------------------------------------------------------------------------------------------------------------------------------------------------------------------k DL DL DL DL I intra ic + I extra ic + I inter – carrier ic + I inter – techno log y ic Term + N0 – 1 – BTS P c txi M b ic Determination of the best transmitter, txBS, for each carrier ic. For each carrier ic, selection of the transmitter with the highest Q pilot txi M b ic , tx BS M b . k Analysis of candidate cells, (txBS,ic). For each pair (txBS,ic), calculation of the uplink load factor: UL I tot tx BS ic UL UL - + X X k tx BS ic = ---------------------------------UL N tot tx BS ic Rejection of bad candidate cells if the pilot is not received or if the uplink load factor is exceeded during the admission load control (if simulation respects a loading factor constraint and Mb was not connected in previous iteration) pilot If Q pilot tx BS M b ic Q req Mobility M b then (txBS,ic) is rejected by Mb k UL UL If X k tx BS ic X max , then (txBS,ic) is rejected by Mb Else Keep (txBS,ic) as good candidate cell © Forsk 2009 AT281_TRG_E1 207 Technical Reference Guide For dual band terminals with the configuration 1 or terminals working on one frequency band only, if no good candidate cell has been selected, Mb has failed to be connected to the network and is rejected. For dual band terminals with the configuration 2, if no good candidate cell has been selected, try to connect Mb to transmitters txi containing Mb in their calculation area and working on the secondary frequency band supported by the Mb’s terminal (i.e. f2). If no good candidate cell has been selected, Mb has failed to be connected to the network and is rejected. For each NodeB having candidate cells, determination of the best carrier, icBS, within the set of candidate cells of the NodeB. If a given carrier is specified for the service requested by Mb ic BS M b is the carrier specified for the service Else the carrier selection mode defined for the site equipment is considered. If carrier selection mode is “Min. UL Load Factor” UL ic BS M b is the cell with the lowest X k tx BS ic Else if carrier selection mode is “Min. DL Total Power” ic BS M b is the cell with the lowest P tx tx BS ic k Else if carrier selection mode is “Random” ic BS M b is randomly selected Else if carrier selection mode is "Sequential" UL UL ic BS M b is the first carrier where X k tx BS ic X max Endif max (tx BS,ic BS) k M b is the best serving cell ( BestCell k M b ) and its pilot quality is Q pilot M b k In the following lines, we will consider ic as the carrier used by the best serving cell Active Set Determination For each station txi containing Mb in its calculation area, using ic , and, if neighbours are used, neighbour of BestCell k M b BTS P c txi M b ic Calculation of Q pilot txi M b ic = -------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------DL DL DL DL Term k P tot txi ic + I extra ic + I inter – carrier ic + I inter – techno log y ic + N 0 If user selects “without Pilot” BTS P c txi M b ic Q pilot txi M b ic = --------------------------------------------------------------------------------------------------------------------------------------------------------------------------------k DL DL DL DL I intra txi ic + I extra ic + I inter – carrier ic + I inter – techno log y ic Term + N0 – 1 – BTS P c txi M b ic Rejection of txi from the active set if difference with the best server is too high max If Q pilot M b – Q pilot txi M b ic AS_Th BestCell k M b then txi is rejected k k Else txi is included in the Mb active set Rejection of a station if the mobile active set is full Station with the lowest Q pilot in the active set is rejected k EndFor Uplink Power Control R99 – req Calculation of the terminal power required by Mb to obtain the R99 radio bearer: P term M b ic k For each cell (txi,ic) of the Mb active set Calculation of quality level on Mb traffic channel at (txi,ic), with the minimum power allowed on traffic channel for the Mb service req P term – R99 M b ic k – 1 UL P b – R99 txi M b ic = --------------------------------------------------------L T txi M b UL UL UL P b – DPDCH txi M b ic = P b – R99 txi M b ic 1 – r c 208 AT281_TRG_E1 © Forsk 2009 Chapter 6: UMTS HSPA Networks UL UL UL P b – DPCCH txi M b ic = P b – R99 txi M b ic r c UL UL UL UL UL P b – R99 txi M b ic = P b – DPCCH txi M b ic + P b – DPDCH txi M b ic if the user is active, P b – R99 txi M b ic = P b – DPCCH txi M b ic if the user is inactive, UL term P b – DPDCH txi M b ic k UL UL - G UL Q tch txi M b ic k = -------------------------------------------------------------------------------------------------------------------------------------------------------p Service M b G div UL Tx UL N tot txi ic – 1 – F MUD term P b – R99 txi M b ic k – 1 If user selects "Total noise", UL term P b – DPDCH txi M b ic k UL UL - G UL Q tch txi M b ic k = --------------------------------------------------------------------------------p Service M b G div UL N tot txi ic End For If (Mb is in not in handoff) UL UL Q k M b = Q tch txi M b ic k Else if (Mi is in softer handoff) UL UL Q k M b = f rake efficiency UL Q tch txi M b ic k txi ActiveSet Else if (Mb is in soft, or softer/soft without MRC) UL UL UL Q k M b = Max Q tch txi M b ic k G macro – diversity 2 links txi ActiveSet Else if (Mb is in soft/soft) UL UL UL Q k M b = Max Q tch txi M b ic k G macro – diversity 3 links txi ActiveSet Else if (Mb is in softer/soft with MRC) UL UL UL UL UL Q k M b = Max f rake efficiency Q tch ic Q tch ic G macro – diversity 2 links other site txi ActiveSet samesite End If UL Q req Service M b Mobility M b req req P term – R99 M b ic k = ------------------------------------------------------------------------------------------- P term – R99 M b ic k – 1 UL Qk Mb If compressed mode is operated, Note: • Compressed mode is operated if: - Mi and Sj support compressed mode, And Resulting - Either Q pilot k CM – activation txi M b ic Q pilot CM – activation - Or P c txi M b ic RSCP pilot UL if the Ec/I0 Active option is selected, if the RSCP Active option is selected. UL Q req Service M b Mobility M b Q req Service M b Mobility M b req - P req P term – R99 M b ic k = -------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------term – R99 M b ic k – 1 UL Qk Mb req min req max req min If P term – R99 M b ic k P term M b then P term – R99 M b ic k = P term txi M b If P term – R99 M b ic k P term M b then Mb cannot select any cell and its active set is cleared UL UL If R nominal M b R max txi ic then Mb cannot be connected Endif © Forsk 2009 AT281_TRG_E1 209 Technical Reference Guide Downlink Power Control If (mobile does not use a packet switched service that is inactive on the downlink) For each cell (txi,ic) in Mb active set Calculation of quality level on (txi,ic) traffic channel at Mb with the minimum power allowed on traffic channel for the Mb service min P tch Service M b DL P b txi M b ic = ---------------------------------------------------L T txi M b DL BTS P b txi M b ic k DL DL - G DL Q tch txi M b ic k = -----------------------------------------------------------------------------------------------------------------------------------p Service M b G div DL DL N tot ic – 1 – F ortho BTS P b txi M b ic k – 1 If the user selects the option "Total noise" DL BTS P b txi M b ic k DL DL DL Q tch txi M b ic k = ------------------------------------------------------------- G p Service M b G div DL N tot ic End For DL DL Q k M b = f rake efficiency DL Q tch txi M b ic k txi ActiveSet Do For each cell (txi,ic) in Mb active set Calculation of the required power for DL traffic channel between (txi,ic) and Mb: DL Q req Service M b Mobility M b req min P tch txi M b ic k = ------------------------------------------------------------------------------------------- P tch Service M b DL Qk Mb If compressed mode is operated. DL DL Q req Service M b Mobility M b Q req Service M b Mobility M b req - P min P tch txi M b ic k = -------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------tch Service M b DL Qk Mb Note: • Compressed mode is operated if: - Mi and Sj support compressed mode, And Resulting - Either Q pilot k CM – activation txi M b ic Q pilot CM – activation - Or P c txi M b ic RSCP pilot req max if the Ec/I0 Active option is selected, if the RSCP Active option is selected. max If P tch txi M b ic k P tch Service M b then txi ic is set to P tch DL max Recalculation of a decreased Q req (a part of the required quality is managed by the cells set to P tch ) req P tch Service M b DL P b txi M b ic = --------------------------------------------------L T txi M b DL BTS P b txi M b ic DL DL DL Q tch txi M b ic k = -------------------------------------------------------------------------------------------------------------------------- G p Service M b G div DL DL N tot ic – 1 – F ortho BTS P b txi M b ic DL DL DL If the user is inactive, then his contribution to interference in the calculation of N tot ic is P b txi M b ic r c . EndFor DL DL Q k M b = f rake efficiency DL Q tch txi M b ic k txi ActiveSet While DL DL Qk Mb DL Q req Service M b Mobility M b and Mb active set is not empty DL If R nominal M b R max txi ic then Mb cannot be connected Endif 210 AT281_TRG_E1 © Forsk 2009 Chapter 6: UMTS HSPA Networks Uplink and Downlink Interference Update Update of interference on active mobiles only (old contributions of mobiles and stations are replaced by the new ones). For each cell (txi,ic) UL Update of N tot txi ic EndFor For each mobile Mi DL Update of N tot ic EndFor EndFor Control of Radio Resource Limits (OVSF Codes, Cell Power, Channel Elements, Iub Backhaul Throughput) For each cell (txi,ic) P tx txi ic k DL While ------------------------------ %Power max P max Rejection of the mobile with the lowest service priority starting from the last admitted EndFor For each cell (txi,ic) While N Codes Codes txi ic k N max txi ic Rejection of the mobile with the lowest service priority starting from the last admitted EndFor For each NodeB, Ni While N CE – DL CE – DL N i k N max Ni Rejection of the mobile with the lowest service priority starting from the last admitted While N CE – UL CE – UL N i k N max Ni Rejection of the mobile with the lowest service priority starting from the last admitted EndFor For each NodeB, Ni DL DL While T Iub N I k T Iub –m ax N I Rejection of the mobile with the lowest service priority starting from the last admitted UL UL While T Iub N I k T Iub –m ax N I Rejection of the mobile with the lowest service priority starting from the last admitted EndFor Uplink Load Factor Control For each cell (txi,ic) with X UL UL txi ic X max Rejection of the mobile with the lowest service priority starting from the last admitted EndFor While at least one cell with X 6.4.2.3 UL UL txi ic X max exists HSDPA Part of the Algorithm Packet (HSDPA) and packet (HSPA) service users active on DL as well as all packet (HSPA - Constant Bit Rate) service users (i.e., active and incative), unless they have been rejected during the R99 part of the algorithm, are then evaluated by the HSDPA part of the algorithm. 6.4.2.3.1 HSDPA Power Allocation The total transmitted power of the cell ( P tx ic ) is the sum of the transmitted R99 power, the HSUPA power and the transmitted HSDPA power. © Forsk 2009 AT281_TRG_E1 211 Technical Reference Guide P tx ic = P tx – R99 ic + P tx –H SDPA ic + P HSUPA ic • In case of a static HSDPA power allocation strategy, Atoll checks in the simulation that: DL P tx ic P max ic %Power max where: DL %Power max is the maximum DL load allowed. Therefore, if the maximum DL load is set to 100%, we have: P tx ic P max ic • In case of dynamic HSDPA power allocation strategy, Atoll checks in the simulation that: DL P tx – R99 ic + P HSUPA ic P max ic %Power max And it calculates the available HSDPA power as follows: P HSDPA ic = P max ic – P Headroom ic – P tx – R99 ic – P HSUPA ic 6.4.2.3.2 Number of HS-SCCH Channels and Maximum Number of HSDPA Bearer Users The number of HS-SCCH channels ( n HS – SCCH ) is the maximum number of HS-SCCH channels that the cell can manage. This parameter is used to manage the number of packet (HSDPA) and packet (HSPA) service users simultaneously connected to an HSDPA bearer. This parameter is not taken into account for packet (HSPA - Constant Bit Rate) service users as HS-SCCH-less operation (i.e., HS-DSCH transmissions without any accompanying HS-SCCH) is performed. Each packet (HSDPA) and packet (HSPA) service user consumes one HS-SCCH channel. Therefore, at a time (over a transmission time interval), the number of these users connected to an HSDPA bearer cannot exceed the number of HSSCCH channels per cell. The maximum number of HSDPA users ( n max ) corresponds to the maximum number of HSDPA bearer users that the cell can support. Here, all HSDPA bearer users, i.e., packet (HSDPA) service users, packet (HSPA) service users and packet (HSPA - Constant Bit Rate) service users, are taken into consideration. Let us assume there are 30 HSDPA bearer users in the cell: • • 10 packet (HSPA - Constant Bit Rate) service users with any activity status. 20 packet (HSDPA) and packet (HSPA) service users active on DL. All users are connected to the A-DCH R99 bearer. Finally, the number of HS-SCCH channels and the maximum number of HSDPA users respectively equal 4 and 25. The scheduler manages the maximum number of users within each cell. Packet (HSPA - Constant Bit Rate) service users have the highest priority and are processed first, in the order established during the generation of the user distribution. After processing the packet (HSPA - Constant Bit Rate) service users, the scheduler ranks the remaining HSDPA bearer users (i.e., packet (HSDPA) and packet (HSPA) service users) according to the selected scheduling technique. Users are treated as described in the figure below. Figure 6.3: Connection status of HSDPA bearer users • • All packet (HSPA - Constant Bit Rate) service users may be served if there are enough HSDPA power, Iub backhaul throughput and OVSF codes available in order for them to obtain the lowest HSDPA bearer that provides a RLC peak rate higher or equal to the guaranted bit rate defined for the service. In this case, they will be connected. Else, they will be rejected. Then, among the packet (HSDPA) and packet (HSPA) service users: - - 6.4.2.3.3 The first four users may be simultaneously served if there are enough HSDPA power, Iub backhaul throughput and OVSF codes available in order for them to obtain an HSDPA bearer. In this case, they will be connected. Else, they will be delayed. The next eleven ones will be delayed since there are no longer HS-SCCH channels available. Their connection status will be "HS-SCCH Channels Saturation". Finally, the last five users will be rejected beacuse the maximum number of HSDPA user has been fixed to 25. Their connection status will be "HSDPA Scheduler Saturation". HSDPA Bearer Allocation Process The HSDPA bearer allocation process depends on the type of service requested by the user. As explained before, packet (HSPA - Constant Bit Rate) service users have the highest priority and are processed first, in the order established during the generation of the user distribution. After processing the packet (HSPA - Constant Bit Rate) service users, the scheduler ranks the remaining HSDPA bearer users (i.e., packet (HSDPA) and packet (HSPA) service users) and shares the cell radio resources between them. 212 AT281_TRG_E1 © Forsk 2009 Chapter 6: UMTS HSPA Networks Packet (HSPA - Constant Bit Rate) Service Users Let us focus on the ten packet (HSPA - Constant Bit Rate) service users mentionned in the example of the previous paragraph "Number of HS-SCCH Channels and Maximum Number of HSDPA Bearer Users" on page 212. Fast link adaptation is carried out on these users in order to determine if they can obtain an HSDPA bearer that provides a RLC peak rate higher or equal to the service guaranteed bit rate. As HS-SCCH less operation is performed, only HSDPA bearers using the QPSK modulation and two HS-PDSCH channels at the maximum can be selected and allocated to the users. The users are processed in the order established during the generation of the user distribution and the cell’s available HSDPA power is shared between them as explained below. Several Packet (HSPA - Constant Bit Rate) service users can share the same HSDPA bearer. Then, Atoll calculates the HSDPA bearer consumption ( C in %) for each user and takes into account this parameter when it determines the resources consumed by the user (i.e., the HSDPA power used, the number of OVSF codes and the Iub backhaul throughput). In the bearer allocation process shown below, the 10 packet (HSPA - Constant Bit Rate) service users are represented by Mj, with j = 1 to 10. And, the initial values of their respective HSDPA powers is 0, i.e. PHSDPA(B(MX)) = 0, where X = 0 to 10. These power values are assigned one by one by the scheduler, so that with their allocated values, looped back to the starting point, are used in successive steps. For the user, Mj, with j varying from 1 to 10: Figure 6.4: HSDPA Bearer Allocation Process for Packet (HSPA - Constant Bit Rate) Service Users Packet (HSDPA) and Packet (HSPA) Service Users After processing the packet (HSPA - Constant Bit Rate) service users, the scheduler share the cell’s remaining resources between packet (HSDPA) and packet (HSPA) service users. Let us focus on the packet (HSDPA) and packet (HSPA) serv- © Forsk 2009 AT281_TRG_E1 213 Technical Reference Guide ice users, especially on the first four users mentionned in the example of the previous paragraph, "Number of HS-SCCH Channels and Maximum Number of HSDPA Bearer Users" on page 212. A new fast link adaptation is carried out on these users in order to determine if they can obtain an HSDPA bearer. They are processed in the order defined by the scheduler and the cell’s HSDPA power available after all Packet (HSPA - Constant Bit Rate) service users have been served is shared between them as explained below. In the bearer allocation process shown below, the 4 packet (HSDPA) and packet (HSPA) service users are represented by Mj, with j = 1 to 4. And, the initial values of their respective HSDPA powers is 0, i.e. PHSDPA(B(MX)) = 0, where X = 0 to 4. These power values are assigned one by one by the scheduler, so that with their allocated values, looped back to the starting point, are used in successive steps. For the user, Mj, with j varying from 1 to 4: Figure 6.5: HSDPA Bearer Allocation Process for Packet (HSDPA) and Packet (HSPA) Service Users 6.4.2.3.4 Fast Link Adaptation Modelling Fast link adaptation (or Adaptive Modulation and Coding) is used in HSDPA. The power on the HS-DSCH channel is transmitted at a constant power while the modulation, the coding and the number of codes are changed to adapt to the radio conditions variations. Based on the reported channel quality indicator (CQI), the node-B may change every 2ms the modulation (QPSK, 16QAM, 64QAM), the coding and the number of codes during a communication. Atoll calculates for each user either the best pilot quality (CPICH Ec/Nt) or the best HS-PDSCH quality (HS-PDSCH Ec/ Nt); this depends on the option selected in Global parameters (HSDPA part): CQI based on CPICH quality or CQI based 214 AT281_TRG_E1 © Forsk 2009 Chapter 6: UMTS HSPA Networks on HS-PDSCH quality (CQI means channel quality indicator). Then, it determines the HS-PDSCH CQI, calculates the best bearer that can be used and selects the suitable bearer so as to comply with cell and terminal user equipment HSDPA capabilities. Once the bearer selected, Atoll finds the highest downlink rate that can be provided to the user and may calculate the application throughput. CQI Based on CPICH Quality When the option “CQI based on CPICH quality” is selected, Atoll proceeds as follows. 1. CPICH Quality Calculation Ec Let us assume the following notation: ------- ic corresponds to the CPICH quality. Nt pilot Two options, available in Global parameters, may be used to calculate Nt: option Without useful signal or option Total noise. Therefore, we have: BTS P c ic i Ec ------- ic for the total noise option, = --------------------------------------------- Nt pilot DL N tot ic And BTS P c ic i Ec ------- ic - for the without useful signal option. = -------------------------------------------------------------------------------------- Nt pilot DL N tot ic – 1 – BTS P c ic i With DL DL DL DL DL term N tot ic = I intra ic + I extra ic + I inter – carrier ic + I inter – techno log y ic + N 0 DL DL DL P SCH ic P SCH ic DL term - – BTS P tot ic – ----------------------I intra ic = P tot ic + BTS 1 – F MUD 1 – P tot ic – ---------------------- LT LT txi txi txi DL I extra ic = DL P tot ic txj j i Ptot icadj DL DL I inter – carrier ic txj j = -------------------------------------RF ic ic adj icadj is a carrier adjacent to ic. RF ic ic adj is the interference reduction factor, defined between ic and icadj and set to a value different from 0. DL I inter – techno log y ic is the inter-technology interference at the receiver on ic. Tx DL I inter – techno log y ic = P Transmitted ic i -----------------------------------------Tx Tx m L ICP ni ic i is the i th total ic i ic interfering carrier of an external transmitter Tx m ICP ic ic is the inter-technology Channel Protection between the signal transmitted by Tx and received by m assuming i the frequency gap between ic i (external network) and ic . P pilot ic P c ic = ----------------------i LT i L path L Tx L term L body L indoor E Shadowing 3 ( ) L T = -------------------------------------------------------------------------------------------------------------------------------G Tx G term BTS , term and N 0 are defined in "Inputs" on page 192. Note: 3. In the HSDPA coverage prediction, L T is calculated as follows: L path L Tx L term L body L indoor M Shadowing – Ec Io -) L T = -------------------------------------------------------------------------------------------------------------------------------------------------G Tx G term © Forsk 2009 AT281_TRG_E1 215 Technical Reference Guide • Atoll performs intra-cell interference computations based on the total power. You can instruct Atoll to use maximum power by adding the following lines in the Atoll.ini file: [CDMA] PmaxInIntraItf = 1 In this case, Atoll considers the following formula: P max ic – P SCH ic P max ic – P SCH ic P max ic DL term - – BTS ----------------------------------------------------- - + BTS 1 – F MUD 1 – ----------------------------------------------------I intra ic = --------------------- LT LT LT 2. CPICH CQI Determination Let us assume the following notation: CQI pilot corresponds to the CPICH CQI. CQI pilot is read in the table Ec . This table is defined for the terminal reception equipment and the selected mobility. CQI pilot = f ------- ic Nt pilot 3. HS-PDSCH Quality Calculation Atoll proceeds as follows: 1st step: Atoll calculates the HS-SCCH power ( P HS – SCCH ). P HS – SCCH ic is the HS-SCCH power on carrier ic. It is either fixed by the user (when the option “HS-SCCH Power Dynamic Allocation”in the cell property dialogue is unchecked) or dynamically calculated (when the option “HS-SCCH Power Dynamic Allocation” is selected). req Ec In this case, the HS-SCCH power is controlled so as to reach the required HS-SCCH Ec/Nt (noted ------- ic ). It Nt HS – SCCH is specified in mobility properties. We have: BTS P c ic i Ec ------- ic for the total noise option, = ----------------------------------- Nt HS – SCCH DL N tot ic And BTS P c ic i Ec ------- ic - for the without useful signal option. = -------------------------------------------------------------------------------------------------------------------------------------- Nt HS – SCCH DL term N tot ic – 1 – F ortho 1 – F MUD BTS P c ic i With DL DL DL DL DL term N tot ic = I intra ic + I extra ic + I inter – carrier ic + I inter – techno log y ic + N 0 DL DL DL P SCH ic P SCH ic DL term - – BTS P tot ic – ----------------------I intra ic = P tot ic + BTS 1 – F MUD 1 – F ortho P tot ic – ---------------------- LT LT txi txi txi DL I extra ic = DL P tot ic txj j i Ptot icadj DL DL txj j I inter – carrier ic = -------------------------------------RF ic ic adj icadj is a carrier adjacent to ic. RF ic ic adj is the interference reduction factor, defined between ic and icadj and set to a value different from 0. DL I inter – techno log y ic is the inter-technology interference at the receiver on ic. Tx DL I inter – techno log y ic = P Transmitted ic i -----------------------------------------Tx Tx m ICP L ni ic i is the i th total ic i ic interfering carrier of an external transmitter Tx m ICP ic ic is the inter-technology Channel Protection between the signal transmitted by Tx and received by m assuming i the frequency gap between ic i (external network) and ic . P HS – SCCH ic P c ic = -------------------------------------i LT i 216 AT281_TRG_E1 © Forsk 2009 Chapter 6: UMTS HSPA Networks and L path L Tx L term L body L indoor E Shadowing 4 ( ) L T = -------------------------------------------------------------------------------------------------------------------------------G Tx G term term term BTS , F ortho , F MUD and N 0 are defined in "Inputs" on page 192. Therefore, req DL Ec ------- ic N tot ic HS – SCCH Nt P HS – SCCH ic = --------------------------------------------------------------------------- L T for the total noise option, i BTS And req DL Ec ------- ic N tot ic Nt HS – SCCH - L T for the without useful signal option. P HS – SCCH ic = ---------------------------------------------------------------------------------------------------------------------------------------------------------req i term Ec- ic BTS 1 + 1 – F ortho 1 – F MUD ----- HS – SCCH Nt 2nd step: Atoll calculates the HS-PDSCH power ( P HS – PDSCH ). P HSDPA ic is the power available for HSDPA on the carrier ic. This parameter is either a simulation output, or a userdefined cell input. P HSDPA ic = P HS – PDSCH ic + n HS – SCCH P HS – SCCH ic Therefore, we have: P HS – PDSCH ic = P HSDPA ic – n HS – SCCH P HS – SCCH ic n HS – SCCH is the number of HS-SCCH channels. 3rd step: Then, Atoll evaluates the HS-PDSCH quality Ec Let us assume the following notation: ------- ic corresponds to the HS-PDSCH quality. Nt HS – PDSCH We have: BTS P c ic i Ec ------- ic for the total noise option, = ----------------------------------- Nt HS – PDSCH DL N tot ic And BTS P c ic i Ec ------- ic - for the without useful signal option. = -------------------------------------------------------------------------------------------------------------------------------------- Nt HS – PDSCH P c ic DL term i N tot ic – 1 – F ortho 1 – F MUD BTS ---------------n Here, Atoll works on the assumption that five HS-PDSCH channels are used (n=5). With DL DL DL DL DL term N tot ic = I intra ic + I extra ic + I inter – carrier ic + I inter – techno log y ic + N 0 DL DL DL P SCH ic P SCH ic DL term - – BTS P tot ic – ----------------------I intra ic = P tot ic + BTS 1 – F MUD 1 – F ortho P tot ic – ---------------------- LT LT txi txi txi DL I extra ic = DL P tot ic txj j i Ptot icadj DL DL txj j I inter – carrier ic = -------------------------------------RF ic ic adj icadj is a carrier adjacent to ic. RF ic ic adj is the interference reduction factor, defined between ic and icadj and set to a value different from 0. 4. In the HSDPA coverage prediction, L T is calculated as follows: L path L Tx L term L body L indoor M Shadowing – Ec Io -) L T = -------------------------------------------------------------------------------------------------------------------------------------------------G Tx G term © Forsk 2009 AT281_TRG_E1 217 Technical Reference Guide DL I inter – techno log y ic is the inter-technology interference at the receiver on ic. DL I inter – techno log y ic = ni ic i is the i th Tx P Transmitted ic i -----------------------------------------Tx Tx m L total ICP ic ic i interfering carrier of an external transmitter Tx m ICP ic ic is the inter-technology Channel Protection between the signal transmitted by Tx and received by m assuming i the frequency gap between ic i (external network) and ic . P HS – PDSCH ic P c ic = -----------------------------------------i LT i And L path L Tx L term L body L indoor E Shadowing 5 ( ) L T = -------------------------------------------------------------------------------------------------------------------------------G Tx G term term term BTS , F ortho , F MUD and N 0 are defined in "Inputs" on page 192. Note: • Atoll performs intra-cell interference computations based on the total power. You can instruct Atoll to use maximum power by adding the following lines in the Atoll.ini file: [CDMA] PmaxInIntraItf = 1 In this case, Atoll considers the following formula: P max ic – P SCH ic P max ic – P SCH ic P max ic DL term - – BTS ----------------------------------------------------- -+ BTS 1 – F MUD 1 – F ortho ----------------------------------------------------I intra ic = --------------------- LT LT LT 4. HS-PDSCH CQI Determination The best bearer that can be used depends on the HS-PDSCH CQI. Let us assume the following notation: CQI HS – PDSCH corresponds to the HS-PDSCH CQI. Atoll calculates CQI HS – PDSCH as follows: CQI HS – PDSCH = CQI pilot – P pilot + P HS – PDSCH 5. HSDPA Bearer Selection Atoll selects the HSDPA bearer associated to this CQI (in the table Best Bearer=f(HS-PDSCH CQI) defined for the terminal reception equipment and the user mobility) and compatible with the user equipment and cell capabilities. HSDPA bearers can be classified into two categories: • HSDPA bearers using QPSK and 16QAM modulations: They can be selected for all users connected to HSPA and HSPA+ capable cells. The number of HS-PDSCH channels required by the bearer must not exceed the maximum number of HS-PDSCH codes available for the cell. For packet (HSPA - Constant Bit Rate) service users, HS-SCCH-less operation (i.e., HS-DSCH transmissions without any accompanying HS-SCCH) is performed. In this case, the UE is not informed about the transmission format and has to revert to blind decoding of the transport format used on the HS-DSCH. Complexity of blind detections in the UE is decreased by limiting the transmission formats that can be used (i.e., the HSDPA bearers available). Therefore, only HSDPA bearers using the QPSK modulation and two HS-PDSCH channels at the maximum can be selected and allocated to these users. Additionally, the selected HSDPA bearer must provide a RLC peak rate higher or equal to the guaranted bit rate defined for the service. • HSDPA bearers using 64QAM modulation (improvement introduced by the release 7 of the 3GPP UTRA specifications, referred to as HSPA+): These HSDPA bearers can be allocated to packet (HSDPA) and packet (HSPA) users connected to cells with HSPA+ capabilities only. The number of HS-PDSCH channels required by the bearer must not exceed the maximum number of HS-PDSCH codes available for the cell. These HSDPA bearers cannot be allocated to packet (HSPA - Constant Bit Rate) service users. Atoll considers an HSDPA bearer as compatible with the user equipment if: • • • 5. The transport block size does not exceed the maximum transport block size supported by the user equipment. The number of HS-PDSCH channels required by the bearer does not exceed the maximum number of HS-PDSCH channels that the terminal can use. The modulation is supported by the user equipment. In the HSDPA coverage prediction, L T is calculated as follows: L path L Tx L term L body L indoor M Shadowing – Ec Io -) L T = -------------------------------------------------------------------------------------------------------------------------------------------------G Tx G term 218 AT281_TRG_E1 © Forsk 2009 Chapter 6: UMTS HSPA Networks When there are several HSDPA bearers compatible, Atoll selects the HSDPA bearer that provides the highest RLC peak rate. When several HSDPA bearers can supply the same RLC peak rate, Atoll chooses the HSDPA bearer with the highest modulation scheme. Finally, if no HSDPA bearer is compatible, Atoll allocates a lower HSDPA bearer compatible with the user equipment and cell capabilities which needs fewer resources. Let’s consider the following examples. Example1: One packet (HSDPA) user with category 13 user equipment and a 50km/h mobility. The user equipment capabilities are: • • • • Maximum transport block size: 35280 bits Maximum number of HS-PDSCH channels: 15 Highest modulation supported: 64QAM MIMO Support: No Figure 6.6: HSDPA UE Categories Table The cell to which the user is connected supports HSPA+ functionalities (i.e. 64QAM modulation in the DL and MIMO systems) and the maximum number of HS-PDSCH channels is 15. 1st case: The CQI experienced by the user equals 26. Therefore, Atoll can choose between two HSDPA bearers, the bearer indexes 26 and 31. Characteristics of the bearer index 26 are: • • • • Transport block size: 17237 bits Number of HS-PDSCH channels used: 12 16QAM modulation is used RLC Peak Rate: 8.32 Mb/s Characteristics of the bearer index 31 are: • • • • Transport block size: 15776 bits Number of HS-PDSCH channels used: 10 64QAM modulation is used RLC Peak Rate: 7.36 Mb/s Both HSDPA bearers are compatible with the user equipment and cell capabilities. Atoll selects the HSDPA bearer that provides the highest RLC peak rate, i.e. the bearer index 26. © Forsk 2009 AT281_TRG_E1 219 Technical Reference Guide Figure 6.7: HSDPA Radio Bearers Table 2nd case: The CQI experienced by the user equals 27. Therefore, Atoll can choose between two HSDPA bearers, the bearer indexes 27 and 32. Characteristics of the bearer index 27 are: • • • • Transport block size: 21754 bits Number of HS-PDSCH channels used: 15 16QAM modulation is used RLC Peak Rate: 10.24 Mb/s Characteristics of the bearer index 32 are: • • • • Transport block size: 21768 bits Number of HS-PDSCH channels used: 12 64QAM modulation is used RLC Peak Rate: 10.24 Mb/s Both HSDPA bearers are compatible with the user equipment and cell capabilities and the RLC peak rate they provide is the same. Atoll selects the HSDPA bearer using the highest modulation scheme, i.e. the bearer index 32. Example 2: One packet (HSDPA) user experiencing a CQI of 26. Therefore, Atoll can choose between two HSDPA bearers, the bearer indexes 26 and 31. Characteristics of the bearer index 26 are: • • • • Transport block size: 17237 bits Number of HS-PDSCH channels used: 12 16QAM modulation is used RLC Peak Rate: 8.32 Mb/s Characteristics of the bearer index 31 are: • • • • Transport block size: 15776 bits Number of HS-PDSCH channels used: 10 64QAM modulation is used RLC Peak Rate: 7.36 Mb/s 1st case: The user equipment category is 9. The cell to which the user is connected supports HSPA+ functionalities (i.e. 64QAM modulation in the DL and MIMO systems) and the maximum number of HS-PDSCH channels is 15. The user equipment characteristics are the following: • • • • Maximum transport block size: 20251 bits Maximum number of HS-PDSCH channels: 15 Highest modulation supported: 16QAM MIMO Support: No The bearer index 31 cannot be selected because it requires a modulation scheme not supported by the terminal. Only the bearer index 26 is compatible with the user equipment capabilities. Atoll selects it. 220 AT281_TRG_E1 © Forsk 2009 Chapter 6: UMTS HSPA Networks 2nd case: The user equipment category is 8. The cell to which the user is connected supports HSPA+ functionalities (i.e. 64QAM modulation in the DL and MIMO systems) and the maximum number of HS-PDSCH channels is 15. The user equipment characteristics are the following: • • • • Maximum transport block size: 14411 bits Maximum number of HS-PDSCH channels: 10 Highest modulation supported: 16QAM MIMO Support: No Here, none of HSDPA bearers are compatible with the user equipment capabilities. The bearer index 31 cannot be selected because it requires a modulation scheme not supported by the terminal. With the bearer index 26, the number of HS-PDSCH channels (12) exceeds the maximum number of HS-PDSCH channels the terminal can use (10), and the transport block size (17237 bits) exceeds the maximum transport block size (14411 bits) the terminal can carried. In the HSDPA Radio Bearer table, Atoll selects a lower HSDPA bearer compatible with cell and UE category capabilities. It selects the bearer index 25. • • • The number of HS-PDSCH channels (10) does not exceed the maximum number of HS-PDSCH channels the terminal can use (10) and the maximum number of HS-PDSCH channels available at the cell level (15), The transport block size (14411 bits) does not exceed the maximum transport block size (14411 bits) the terminal can carried. 16QAM modulation is supported by the terminal and the cell. 3rd case: The user equipment category is 13. The cell to which the user is connected supports HSPA functionalities and the maximum number of HS-PDSCH channels is 15. The user equipment capabilities are: • • • • Maximum transport block size: 35280 bits Maximum number of HS-PDSCH channels:15 Highest modulation supported: 64QAM MIMO Support: No The bearer index 31 cannot be selected because it requires a modulation scheme not supported by the cell. On the other hand, the bearer index 26 is compatible with cell and UE category capabilities. Therefore, it is allocated. 6. HS-PDSCH Quality Update Once the bearer selected, Atoll exactly knows the number of HS-PDSCH channels. Therefore, when the method “Without useful signal” is used, it may recalculate the HS-PDSCH quality with the real number of HS-PDSCH channels (A default value (5) was taken into account in the first HS-PDSCH quality calculation). CQI Based on HS-PDSCH Quality When the option “CQI based on HS-PDSCH quality” is selected, Atoll proceeds as follows. 1. HS-PDSCH Quality Calculation Atoll proceeds as follows: 1st step: Atoll calculates the HS-SCCH power ( P HS – SCCH ). P HS – SCCH ic is the HS-SCCH power on carrier ic. It is either fixed by the user (when the option “HS-SCCH Power Dynamic Allocation”in the cell property dialogue is unchecked) or dynamically calculated (when the option “HS-SCCH Power Dynamic Allocation” is selected). req Ec In this case, the HS-SCCH power is controlled so as to reach the required HS-SCCH Ec/Nt (noted ------- ic ). It Nt HS – SCCH is specified in mobility properties. We have: BTS P c ic i Ec ------- ic for the total noise option, = ----------------------------------- Nt HS – SCCH DL N tot ic And BTS P c ic i Ec ------- ic - for the without useful signal option. = -------------------------------------------------------------------------------------------------------------------------------------- Nt HS – SCCH DL term N tot ic – 1 – F ortho 1 – F MUD BTS P c ic i With DL DL DL DL DL term N tot ic = I intra ic + I extra ic + I inter – carrier ic + I inter – techno log y ic + N 0 DL DL DL P SCH ic P SCH ic DL term - – BTS P tot ic – ----------------------I intra ic = P tot ic + BTS 1 – F MUD 1 – F ortho P tot ic – ---------------------- LT LT txi txi txi © Forsk 2009 AT281_TRG_E1 221 Technical Reference Guide DL I extra ic = DL P tot ic txj j i Ptot icadj DL DL txj j I inter – carrier ic = -------------------------------------RF ic ic adj icadj is a carrier adjacent to ic. RF ic ic adj is the interference reduction factor, defined between ic and icadj and set to a value different from 0. DL I inter – techno log y ic is the inter-technology interference at the receiver on ic. DL I inter – techno log y ic = ni ic i is the i th Tx P Transmitted ic i -----------------------------------------Tx Tx m L total ICP ic ic i interfering carrier of an external transmitter Tx m ICP ic ic is the inter-technology Channel Protection between the signal transmitted by Tx and received by m assuming i the frequency gap between ic i (external network) and ic . P HS – SCCH ic P c ic = -------------------------------------i LT i And L path L Tx L term L body L indoor E Shadowing 6 ( ) L T = -------------------------------------------------------------------------------------------------------------------------------G Tx G term term term BTS , F ortho , F MUD and N 0 are defined in "Inputs" on page 192. Therefore, req DL Ec ------- ic N tot ic HS – SCCH Nt P HS – SCCH ic = --------------------------------------------------------------------------- L T for the total noise option, i BTS And req DL Ec ------- ic N tot ic Nt HS – SCCH - L T for the without useful signal option. P HS – SCCH ic = ---------------------------------------------------------------------------------------------------------------------------------------------------------req i term Ec- ic BTS 1 + 1 – F ortho 1 – F MUD ----- HS – SCCH Nt 2nd step: Atoll calculates the HS-PDSCH power ( P HS – PDSCH ) P HSDPA ic is the power available for HSDPA on the carrier ic. This parameter is either a simulation output, or a userdefined cell input. P HSDPA ic = P HS – PDSCH ic + n HS – SCCH P HS – SCCH ic Therefore, we have: P HS – PDSCH ic = P HSDPA ic – n HS – SCCH P HS – SCCH ic n HS – SCCH is the number of HS-SCCH channels. 3rd step: Then, Atoll evaluates the HS-PDSCH quality Ec Let us assume the following notation: ------- ic corresponds to the HS-PDSCH quality. Nt HS – PDSCH Two options, available in Global parameters, may be used to calculate Nt: option Without useful signal or option Total noise. We have: 6. In the HSDPA coverage prediction, L T is calculated as follows: L path L Tx L term L body L indoor M Shadowing – Ec Io -) L T = -------------------------------------------------------------------------------------------------------------------------------------------------G Tx G term 222 AT281_TRG_E1 © Forsk 2009 Chapter 6: UMTS HSPA Networks BTS P c ic i Ec ------- ic for the total noise option, = ----------------------------------- Nt HS – PDSCH DL N tot ic And BTS P c ic i Ec ------- ic - for the without useful signal option. = -------------------------------------------------------------------------------------------------------------------------------------- Nt HS – PDSCH P c ic DL term i N tot ic – 1 – F ortho 1 – F MUD BTS ----------------n Here, Atoll works on the assumption that five HS-PDSCH channels are used (n=5). Then, it calculates the HS-PDSCH CQI and the bearer to be used. Once the bearer selected, Atoll exactly knows the number of HS-PDSCH channels and recalculates the HS-PDSCH quality with the real number of HS-PDSCH channels. With DL DL DL DL DL term N tot ic = I intra ic + I extra ic + I inter – carrier ic + I inter – techno log y ic + N 0 DL DL DL P SCH ic P SCH ic DL term - – BTS P tot ic – ----------------------I intra ic = P tot ic + BTS 1 – F MUD 1 – F ortho P tot ic – ---------------------- LT LT txi txi txi DL I extra ic = DL P tot ic txj j i Ptot icadj DL DL txj j I inter – carrier ic = -------------------------------------RF ic ic adj icadj is a carrier adjacent to ic. RF ic ic adj is the interference reduction factor, defined between ic and icadj and set to a value different from 0. DL I inter – techno log y ic is the inter-technology interference at the receiver on ic. DL I inter – techno log y ic = ni ic i is the i th Tx P Transmitted ic i -----------------------------------------Tx Tx m L total ICP ic ic i interfering carrier of an external transmitter Tx m ICP ic ic is the inter-technology Channel Protection between the signal transmitted by Tx and received by m assuming i the frequency gap between ic i (external network) and ic . P HS – PDSCH ic P c ic = -----------------------------------------i LT i And L path L Tx L term L body L indoor E Shadowing 7 ( ) L T = -------------------------------------------------------------------------------------------------------------------------------G Tx G term term term BTS , F ortho , F MUD and N 0 are defined in "Inputs" on page 192. Note: • Atoll performs intra-cell interference computations based on the total power. You can instruct Atoll to use maximum power by adding the following lines in the Atoll.ini file: [CDMA] PmaxInIntraItf = 1 In this case, Atoll considers the following formula: P max ic – P SCH ic P max ic – P SCH ic P max ic DL term - – BTS ----------------------------------------------------- -+ BTS 1 – F MUD 1 – F ortho ----------------------------------------------------I intra ic = --------------------- LT LT L T 2. HS-PDSCH CQI Determination 7. In the HSDPA coverage prediction, L T is calculated as follows: L path L Tx L term L body L indoor M Shadowing – Ec Io -) L T = -------------------------------------------------------------------------------------------------------------------------------------------------G Tx G term © Forsk 2009 AT281_TRG_E1 223 Technical Reference Guide Let us assume the following notation: CQI HS – PDSCH corresponds to the HS-PDSCH CQI. CQI HS – PDSCH is read in Ec . This table is defined for the terminal reception equipment and the the table CQI HS – PDSCH = f ------- ic Nt HS – PDSCH specified mobility. 3. HSDPA Bearer Selection The bearer is selected as described in "HSDPA Bearer Selection" on page 218. 6.4.2.3.5 MIMO Modelling MIMO - Transmit Diversity If the cell to which the user is connected supports HSPA+ with transmit diversity and if the user’s terminal HSDPA UE category supports MIMO, we have: Ec DL DL Ec ------- ic = ------- ic + G TD + G TD in dB Nt HS – PDSCH Nt HS – PDSCH Where DL G TD is the downlink transmit diversity gain (in dB) corresponding to the numbers of transmission and reception antenna ports (respectively defined in the transmitter and terminal properties). DL G TD is the additional diversity gain in downlink (in dB). It is defined for the clutter class of the user. MIMO - Spatial Multiplexing DL R RLC – peak Index HSDPABearer is the RLC peak rate that the selected HSDPA bearer ( Index HSDPABearer ) can provide. It is read in the HSDPA Radio Bearer table. If the cell to which the user is connected supports HSPA+ with spatial multiplexing and if the user’s terminal HSDPA UE category supports MIMO, we have: DL DL Max R RLC – peak = R RLC – peak Index HSDPABearer 1 + f SM – Gain G SM – 1 Where Max G SM is the maximum spatial multiplexing gain (in dB) for a given number of transmission and reception antennas (respectively defined in the transmitter and terminal properties). f SM – Gain is the spatial multiplexing gain factor defined for the clutter class of the user. 6.4.2.3.6 Scheduling Algorithms The scheduler manages the maximum number of users within each cell. Packet (HSPA - Constant Bit Rate) service users have the highest priority and are processed first, in the order established during the generation of the user distribution. After processing the packet (HSPA - Constant Bit Rate) service users, the scheduler ranks the remaining HSDPA bearer users (i.e., packet (HSDPA) and packet (HSPA) service users) according to the selected scheduling technique.Three scheduling algorithms are available , Max C/I, Round Robin and Proportional Fair. Impact they have on the simulation result is described in the tables below. Let us consider a cell with 16 packet (HSDPA) and packet (HSPA) service users. All of them are active on DL and connected to the A-DCH R99 bearer. There is no packet (HSPA - Constant Bit Rate) service user in the cell and the number of HS-SCCH channels and the maximum number of HSDPA users have been respectively set to 4 and 15. • 224 Max C/I: 15 users (where 15 corresponds to the maximum number of HSDPA users defined) enters the scheduler in the same order as in the simulation. Then, they are sorted in descending order by the channel quality indicator (CQI), i.e. in a best bearer descending order. Mobiles Simulation Rank Best Bearer (kbps) DL Obtained Rate (kbps) Connection Status M1 2 2400 2400 Connected M2 15 2400 1440 Connected M3 8 2080 160 Connected M4 9 2080 3.4 Delayed M5 10 2080 3.4 Delayed M6 12 2080 3.4 Delayed M7 13 2080 3.4 Delayed M8 14 2080 3.4 Delayed M9 7 1920 3.4 Delayed AT281_TRG_E1 © Forsk 2009 Chapter 6: UMTS HSPA Networks • • M10 1 1600 3.4 Delayed M11 3 1600 3.4 Delayed M12 4 1600 3.4 Delayed M13 5 1600 3.4 Delayed M14 6 1600 3.4 Delayed M15 11 1440 3.4 Delayed M16 16 2080 0 Scheduler Saturation Round Robin: Users are taken into account in the same order than the one in the simulation (random order). Mobiles Simulation Rank Best Bearer (kbps) DL Obtained Rate (kbps) Connection Status M1 1 1600 1600 Connected M2 2 2400 960 Connected M3 3 1600 3.4 Delayed M4 4 1600 3.4 Delayed M5 5 1600 3.4 Delayed M6 6 1600 3.4 Delayed M7 7 1920 3.4 Delayed M8 8 2080 3.4 Delayed M9 9 2080 3.4 Delayed M10 10 2080 3.4 Delayed M11 11 1440 3.4 Delayed M12 12 2080 3.4 Delayed M13 13 2080 3.4 Delayed M14 14 2080 3.4 Delayed M15 15 2400 3.4 Delayed M16 16 2080 0 Scheduler Saturation Proportional Fair: 15 users (where 15 corresponds to the maximum number of HSDPA users defined) enters the scheduler in the same order as in the simulation. Then, they are sorted in an ascending order according to a new random parameter which corresponds to a combination of the user rank in the simulation and the channel quality indicator (CQI). For a user i, the random parameter RP i is calculated as follows: Simu RP i = 50 R i CQI + 50 R i Where, Simu is the user rank in the simulation. Ri CQI Ri is the user rank according to the CQI. Note: • © Forsk 2009 You can change the default weights by editing the atoll.ini file. For more information, see the Administrator Manual. Mobiles Simulation Rank CQI Rank RP M1 2 1 150 2400 2400 Connected M2 1 10 550 1600 960 Connected M3 8 3 550 2080 160 Connected M4 9 4 650 2080 3.4 Delayed M5 3 11 700 1600 3.4 Delayed M6 10 5 750 2080 3.4 Delayed M7 4 12 800 1600 3.4 Delayed AT281_TRG_E1 Best Bearer DL Obtained (kbps) Rate (kbps) Connection Status 225 Technical Reference Guide M8 7 9 800 1920 3.4 Delayed M9 15 2 850 2400 3.4 Delayed M10 5 13 900 1600 3.4 Delayed M11 12 6 900 2080 3.4 Delayed M12 6 14 1000 1600 3.4 Delayed M13 13 7 1000 2080 3.4 Delayed M14 14 8 1100 2080 3.4 Delayed M15 11 15 1300 1440 3.4 Delayed 0 Scheduler Saturation M16 6.4.2.4 16 - - 2080 HSUPA Part of the Algorithm Packet (HSPA) service users active on UL as well as all packet (HSPA - Constant Bit Rate) service users (i.e., active and incative), unless they have been rejected during the R99 or HSDPA parts of the algorithm, are then evaluated by the HSUPA part of the algorithm. Atoll manages the maximum number of users within each cell. Packet (HSPA - Constant Bit Rate) service users have the highest priority and are processed first, in the order established during the generation of the user distribution. Then, Atoll considers packet (HSPA) service users in the order established during the generation of the user distribution. Let us assume there are 12 HSUPA bearer users in the cell: • • 3 packet (HSPA - Constant Bit Rate) service users with any activity status. All of them have been connected to an HSDPA bearer. 9 packet (HSPA) service users active on UL. The first four packet (HSPA) have been connected to an HSDPA bearer, the last one has been rejected and the remaining four have been delayed in the HSDPA part. Finally, the maximum number of HSUPA users equals 10. In this case, Atoll will consider the first ten HSUPA bearer users only and will reject the last two users in order not to exceed the maximum number of HSUPA users allowed in the cell (their connection status is "HSUPA scheduler saturation"). 6.4.2.4.1 HSDPA Connection Status Evaluation by the HSUPA part of the algorithm Mobiles Service Simulation Rank M1 Packet (HSPA - Constant Bit Rate) 4 Connected Yes M2 Packet (HSPA - Constant Bit Rate) 7 Connected Yes M3 Packet (HSPA - Constant Bit Rate) 9 Connected Yes M4 Packet (HSPA) 1 Connected Yes M5 Packet (HSPA) 2 Connected Yes M6 Packet (HSPA) 3 Connected Yes M7 Packet (HSPA) 5 Connected Yes M8 Packet (HSPA) 6 Delayed Yes M9 Packet (HSPA) 8 Delayed Yes M10 Packet (HSPA) 10 Delayed Yes M11 Packet (HSPA) 11 Delayed No M12 Packet (HSPA) 12 Rejected No Admission Control During admission control, Atoll selects a list of HSUPA bearers for each user. The selected HSUPA bearers have to be compatible with the user equipment and capabilities of each HSUPA cell of the active set. For packet (HSPA - Constant Bit Rate) service users, the list is restricted to HSUPA bearers that provide a RLC peak rate higher than the guaranteed bit rate. Let us focus on one packet (HSPA) service user with category 3 user equipment and a 50km/h mobility. This user is connected to one cell only. The cell supports HSPA+ functionalities, i.e the cell supports QPSK and 16QAM modulations in the UL. HSUPA user equipment categories are provided in the HSUPA User Equipment Categories table. The capabilities of the category 3 user equipment are: • • • • • 226 Maximum Number of E-DPDCH codes: 2 TTI 2 ms: No so it supports 10 ms TTI Minimum Spreading Factor: 4 Maximum Block Size for a 2ms TTI: no value Maximum Block Size for a 10ms TTI: 14484 bits AT281_TRG_E1 © Forsk 2009 Chapter 6: UMTS HSPA Networks • Highest Modulation Supported: QPSK Figure 6.8: HSUPA UE Categories Table HSUPA bearer characteristics are provided in the HSUPA Bearer table. An HSUPA bearer is described with following characteristics: • • • • • • • Radio Bearer Index: The bearer index number. TTI Duration (ms): The TTI duration in ms. The TTI can be 2 or 10 ms. Transport Block Size (Bits): The transport block size in bits. Number of E-DPDCH Codes: The number of E-DPDCH channels used. Minimum Spreading Factor: The smallest spreading factor used. Modulation: the modulation used (QPSK or 16QAM) RLC Peak Rate (bps): The RLC peak rate represents the peak rate without coding (redundancy, overhead, addressing, etc.). HSUPA bearers can be classified into two categories: • HSUPA bearers using QPSK modulation: They can be selected for users connected to HSPA and HSPA+ capable cells. • HSUPA bearers using 16QAM modulation (improvement introduced by the release 7 of the 3GPP UTRA specifications, referred to as HSPA+). These HSUPA bearers can be allocated to users connected to cells with HSPA+ capabilities only. Atoll considers an HSUPA bearer as compatible with the category 3 user equipment if: • • • • • The TTI duration used by the bearer is supported by the user equipment (10 ms). The transport block size does not exceed the maximum transport block size supported by the user equipment (14484 bits): The number of E-DPDCH channels required by the bearer does not exceed the maximum number of E-DPDCH channels that the terminal can use (2). The minimum spreading factor used by the bearer is not less than the smallest spreading factor supported by the terminal (4). The modulation required by the bearer is supported by the terminal. The HSUPA bearers compatible with category 3 user equiment are framed in red: Figure 6.9: HSUPA Radio Bearers Table Then, during admission control, Atoll checks that the lowest compatible bearer in terms of the required E-DPDCH Ec⁄Nt does not require a terminal power higher than the maximum terminal power allowed. Atoll uses the HSUPA Bearer Selection table. Among the compatible HSUPA bearers, Atoll chooses the one with the lowest required Ec/Nt threshold. Here, this is the index 1 HSUPA bearer; the required Ec/Nt threshold to obtain this bearer is -21.7dB. Ec req req Then, from the required Ec/Nt threshold, ------- , Atoll calculates the required terminal power, P term – HSUPA . Nt E – DPDCH © Forsk 2009 AT281_TRG_E1 227 Technical Reference Guide req Ec req UL P term – HSUPA = ------- L T N tot Nt E – DPDCH With UL UL intra tx N tot ic = 1 – F MUD term I tot UL extra ic + I tot UL tx ic + I inter – carrier ic + N 0 L path L Tx L term L body L indoor E Shadowing 8 L T = -------------------------------------------------------------------------------------------------------------------------------( ) G Tx G term tx UL intra term , F MUD , I tot UL extra , I tot UL tx , I inter – carrier and N 0 are defined in "Inputs" on page 192. Figure 6.10: HSUPA Bearer SelectionTable req Atoll rejects the user if the terminal power required to obtain the lowest compatible HSUPA bearer ( P term – HSUPA ) exceeds the maximum terminal power (his connection status is "HSUPA Admission Rejection"). At the end of this step, the number of non-rejected HSUPA bearer users is n HSUPA . All of them will be connected to an HSUPA bearer at the end. 6.4.2.4.2 HSUPA Bearer Allocation Process The HSUPA bearer allocation process depends on the type of service requested by the user. As explained before, packet (HSPA - Constant Bit Rate) service users have the highest priority and are processed first, in the order established during the generation of the user distribution. After the admission control on packet (HSPA - Constant Bit Rate) service users, Atoll performs a noise rise scheduling, followed by a radio resource control. Then, it repeats the same steps on packet (HSPA) service users. Packet (HSPA - Constant Bit Rate) Service Users Let us focus on the three packet (HSPA - Constant Bit Rate) service users mentionned in the example of the previous paragraph "HSUPA Part of the Algorithm" on page 226. We assume that all of them have been admitted. Noise rise scheduling and radio resource control are carried out on each user in order to determine the best HSUPA bearer that the user can obtain. Several Packet (HSPA - Constant Bit Rate) service users can share the same HSUPA bearer. Then, Atoll calculates the HSUPA bearer consumption ( C in %) for each user and takes into account this parameter when it determines the resources consumed by the user (i.e., the terminal power used, the number of channel elements and the Iub backhaul throughput). 8. In the HSUPA coverage prediction, L T is calculated as follows: L path L Tx L term L body L indoor M Shadowing – Eb Nt UL -) L T = -----------------------------------------------------------------------------------------------------------------------------------------------------------G Tx G term 228 AT281_TRG_E1 © Forsk 2009 Chapter 6: UMTS HSPA Networks In the bearer allocation process shown below, the 3 packet (HSPA - Constant Bit Rate) service users are represented by Mj, with j = 1 to 3. For the user, Mj, with j varying from 1 to 3: Figure 6.11: HSUPA Bearer Allocation Process for Packet (HSPA - Constant Bit Rate) Service Users Packet (HSPA) Service Users Let us focus on the seven packet (HSPA) service users mentionned in the example of the previous paragraph "HSUPA Part of the Algorithm" on page 226. We assume that all of them have been admitted. Noise rise scheduling and radio resource control are carried out on each user in order to determine the best HSUPA bearer that the user can obtain. In the bearer allocation process shown below, the 7 packet (HSPA) service users are represented by Mj, with j = 1 to 7. For the user, Mj, with j varying from 1 to 7: Figure 6.12: HSUPA Bearer Allocation Process for Packet (HSPA) Service Users 6.4.2.4.3 Noise Rise Scheduling Determination of the Obtained HSUPA Bearer The obtained HSUPA radio bearer is the bearer that the user obtains after noise rise scheduling and radio resource control. © Forsk 2009 AT281_TRG_E1 229 Technical Reference Guide Packet (HSPA - Constant Bit Rate) service users have the highest priority and are processed first. Therefore, after the admission control, the noise rise scheduling algorithm attempts to evenly share the remaining cell load between the packet (HSPA - Constant Bit Rate) service users admitted in admission control; in terms of HSUPA, each user is allocated a right UL to produce interference. The remaining cell load factor on uplink ( X HSPA – CBR txi ic ) depends on the maximum load factor allowed on uplink and how much uplink load is produced by the served R99 traffic. It can be expressed as follows: UL UL UL X HSPA – CBR txi ic = X max txi ic – X R99 txi ic Then, Atoll evenly shares the remaining cell load factor between the packet (HSPA - Constant Bit Rate) service users admitted during the previous step ( n HSPA – CBR ). UL X HSPA – CBR txi ic UL X user txi ic = ------------------------------------------------------n HSPA – CBR Ec max From this value, Atoll calculates the maximum E-DPDCH Ec⁄Nt allowed ( ------- ) for each packet (HSPA Nt E – DPDCH Constant Bit Rate) service user. For further information on the calculation, see "Uplink Load Factor Due to One User" on page 244. max 1 Ec ------- = ------------------------------------------------ for the Without useful signal option Nt E – DPDCH UL F txi ic -------------------------------------- – 1 UL X user txi ic UL max X user Ec ------- - for the Total noise option = ---------------- Nt E – DPDCH UL F Then, it selects an HSUPA bearer. The allocation depends on the maximum E-DPDCH Ec⁄Nt allowed and on UE and cell capabilities. Atoll selects the best HSUPA bearer from the HSUPA compatible bearers. This is the HSUPA bearer UL R RLC – peak Index HSUPABearer ( Index HSUPABearer ) with the highest potential throughput ( ------------------------------------------------------------------------------------ ) where: N Rtx Index HSUPABearer • req Ec max Ec ------- ------- Nt E – DPDCH Nt E – DPDCH • And P term – HSUPA P term max req req Ec When several HSUPA bearers are available, Atoll selects the one with the lowest ------- . Nt E – DPDCH After the noise rise scheduling, Atoll carries out radio resource control, verifying if enough channel elements and Iub backhaul throughput are available for the HSUPA bearer assigned to the user. For information on radio resource control, see "Radio Resource Control" on page 233. After processing all packet (HSPA - Constant bit rate) service users, Atoll carries out noise rise scheduling and radio resource control on packet (HSPA) service users. During the noise rise scheduling, Atoll distributes the remaining cell load factor available after all packet (HSPA - Constant Bit Rate) service users have been served. It can be expressed as follows: UL UL UL UL X HSPA txi ic = X max txi ic – X R99 txi ic – X HSPA – CBR txi ic The remaining cell load factor is shared equally between the admitted packet (HSPA) service users ( n HSPA ). UL X HSPA txi ic UL X user txi ic = ---------------------------------------n HSPA max Ec From this value, Atoll calculates the maximum E-DPDCH Ec⁄Nt allowed ( ------- ) as explained above and selects Nt E – DPDCH an HSUPA bearer for each packet (HSPA) service user. After the noise rise scheduling, Atoll carries out radio resource control on packet (HSPA) service users. For information on radio resource control, see "Radio Resource Control" on page 233. Example: We have a cell with six packet (HSPA) service users and no packet (HSPA - Constant Bit Rate) user. All packet (HSPA) service users have been admitted. The remaining cell load factor equal to 0.6 is shared between the packet (HSPA) service users. Therefore, the UL load factor alloted to each user is 0.1. Let’s take the cell UL reuse factor equal to 1.5. Atoll calculates the maximum E-DPDCH Ec⁄Nt allowed (the Without useful signal option is selected). Ec max We have: ------- = -11.5 dB Nt E – DPDCH Here, the obtained HSUPA bearer is the index 5 HSUPA bearer. It provides a potential throughput of 128 kbps and requires E-DPDCH Ec⁄Nt of -13 dB (lower than -11.5 dB) and a terminal power lower than the maximum terminal power allowed. 230 AT281_TRG_E1 © Forsk 2009 Chapter 6: UMTS HSPA Networks . HSUPA Bearers Index Required Ec/Nt Threshold (dB) Nb of Retransmissions RLC Peak Rate (kbps) Potential Throughput (kbps) 1 -21.7 2 32 16 2 -19 2 64 32 3 -16.1 2 128 64 4 -13.9 2 192 96 5 -13 2 256 128 6 -10.1 2 512 256 7 -8 2 768 384 8 -7 2 1024 512 Noise Rise Scheduling in Soft Handover With HSUPA, uplink soft handover impacts the scheduling operation. While HSDPA sends data from one cell only, with HSUPA all cells in the active set receive the transmission from the terminal. Therefore, all the cells are impacted by the transmission in terms of noise rise. For each HSUPA capable cell of the active set tx k ic , Atoll calculates the maximum E-DPDCH Ec⁄Nt allowed Ec max tx ic ) as explained in "HSUPA Bearer Allocation Process" on page 228. ( ------- Nt E – DPDCH k For each cell of the active set tx k ic , Atoll calculates the maximum terminal power allowed to obtain an HSUPA radio max bearer ( P term – HSUPA tx k ic ). max Ec max UL max P term – HSUPA tx k ic = min ------- tx ic L T N tot P term Nt E – DPDCH k With UL UL intra tx N tot ic = 1 – F MUD term I tot UL extra ic + I tot UL tx ic + I inter – carrier ic + N 0 L path L Tx L term L body L indoor E Shadowing 9 L T = -------------------------------------------------------------------------------------------------------------------------------( ) G Tx G term tx UL intra term , F MUD , I tot UL extra , I tot UL tx , I inter – carrier and N 0 are defined in "Inputs" on page 192. As HSUPA bearer users in soft handover use the lowest granted noise rise, Atoll chooses the lowest of maximum terminal power allowed for each cell of the active set tx k ic . max P term – HSUPA = min txk AS max P term – HSUPA tx k ic max Once Atoll knows the selected maximum terminal power ( P term – HSUPA ), it recalculates the maximum E-DPDCH Ec⁄Nt Ec max allowed ( ------- tx ic ) for each HSUPA capable cell of the active set. Nt E – DPDCH k max max P term – HSUPA Ec ------- tx ic = ---------------------------------- Nt E – DPDCH k UL L T N tot Ec max Then, Atoll calculates the maximum E-DPDCH Ec⁄Nt allowed ( ------- ) after signal recombination of all HSUPA Nt E – DPDCH capable cells of the active set 10. For softer (1/2) and softer-softer (1/3) handovers, we have: 9. In the HSUPA coverage prediction, L T is calculated as follows: L path L Tx L term L body L indoor M Shadowing – Eb Nt UL -) L T = -----------------------------------------------------------------------------------------------------------------------------------------------------------G Tx G term © Forsk 2009 AT281_TRG_E1 231 Technical Reference Guide max UL Ec ------- = f rake efficiency Nt E – DPDCH max Ec ------- tx ic Nt E – DPDCH k tx k ActiveSet samesite Ec max For soft (2/2) and soft-soft (3/3) handovers, we have: ------- = Nt E – DPDCH max tx k Ec tx ic Max ------- Nt E – DPDCH k ActiveSet For softer-soft handover (2/3), it depends on if the MRC option is selected (option available in Global parameters). If selected, we have: max Ec ------- = Nt E – DPDCH UL Ec max Ec max tx k ic ------ tx l ic f rake efficiency ------- txk ,tx l ActiveSet Nt Nt E – DPDCH E – DPDCH tx k samesite txk Max tx othersite l max max Ec = Else, we have: ------- Nt E – DPDCH Ec tx ic Max ------- Nt E – DPDCH k tx k ActiveSet Then, Atoll selects an HSUPA bearer as previously explained in "HSUPA Bearer Allocation Process" on page 228. The allocation depends on the maximum E-DPDCH Ec⁄Nt allowed and on UE and cell capabilities. Atoll selects the best HSUPA bearer from the HSUPA compatible bearers. This is the HSUPA bearer ( Index HSUPABearer ) with the highest poUL R RLC – peak Index HSUPABearer tential throughput ( ------------------------------------------------------------------------------------ ) where: N Rtx Index HSUPABearer req Ec max Ec ------- ------- Nt E – DPDCH Nt E – DPDCH • 10. In HSUPA coverage predictions, we have the following: max Ec UL For softer (1/2) and softer-softer (1/3) handovers: ------- = f rake efficiency Nt E – DPDCH max Ec ------- tx ic Nt E – DPDCH k tx k ActiveSet samesite Ec max For soft handover (2/2): ------- = Nt E – DPDCH max tx k Ec UL tx ic G macro – diversity 2links Max ------- Nt E – DPDCH k ActiveSet max Ec = For soft-soft handover (3/3): ------- Nt E – DPDCH tx k Ec max UL tx k ic G macro – diversity 3links Max ------- Nt E – DPDCH ActiveSet For softer-soft handover (2/3), it depends on if the MRC option is selected (option available in Global parameters). If selected, we have: max Ec ------- = Nt E – DPDCH UL Ec max Ec max tx k ic ------ tx l ic f rake efficiency ------- tx ,tx ActiveSet Nt Nt k l E – DPDCH E – DPDCH tx samesite txk k Max tx l othersite UL G macro – diversity 2links Ec max = Else, we have: ------- Nt E – DPDCH 232 max tx k Ec UL tx ic G macro – diversity 2links Max ------- Nt E – DPDCH k ActiveSet AT281_TRG_E1 © Forsk 2009 Chapter 6: UMTS HSPA Networks req Ec When several HSUPA bearers are available, Atoll selects the one with the lowest ------- . Nt E – DPDCH Determination of the Requested HSUPA Bearer The requested HSUPA radio bearer is selected from the HSUPA bearers compatible with the user equipment. Atoll determines the HSUPA bearer the user would obtain by considering the entire remaining load of the cell. The user is treated as if he is the only user in the cell. Therefore, if we go on with the previous example, the maximum E-DPDCH Ec⁄Nt allowed is equal to -1.8 dB and the requested HSUPA bearer is the index 7 HSUPA bearer. It requires E-DPDCH Ec⁄Nt of -8 dB (lower than -1.8 dB) and a terminal power lower than the maximum terminal power allowed. 6.4.2.4.4 Radio Resource Control Atoll checks to see if enough channel elements are available and if the Iub backhaul throughput is sufficient for the HSUPA bearer assigned to the user (taking into account the maximum number of channel elements defined for the site and the maximum Iub backhaul throughput allowed on the site in the uplink). If not, Atoll allocates a lower HSUPA bearer ("downgrading") which needs fewer channel elements and consumes lower Iub backhaul throughput. If no channel elements are available, the user is rejected. On the same hand, if the maximum Iub backhaul throughput allowed on the site in the uplink is still exceeded even by using the lowest HSDPA bearer, the user is rejected. 6.4.2.5 Convergence Criteria The convergence criteria are evaluated for each iteration, and can be written as follow: DL max P tx ic k – P tx ic k – 1 max N DL user ic k – N user ic k – 1 Stations Stations - 100 DL = max int --------------------------------------------------------------------------------------- 100 int ---------------------------------------------------------------------------------------------------DL P tx ic k N user ic k UL UL max N UL max I UL tot ic k – I tot ic k – 1 user ic k – N user ic k – 1 Stations Stations - 100 int ---------------------------------------------------------------------------------------------------- 100 UL = max int --------------------------------------------------------------------------------------UL UL I tot ic k N user ic k Atoll stops the algorithm if: 1st case: Between two successive iterations, UL and DL are lower ( ) than their respective thresholds (defined when creating a simulation). The simulation has reached convergence. Example: Let us assume that the maximum number of iterations is 100, UL and DL convergence thresholds are set to 5. If UL 5 and DL 5 between the 4th and the 5th iteration, Atoll stops the algorithm after the 5th iteration. Convergence has been reached. 2nd case: After 30 iterations, UL and/or DL are still higher than their respective thresholds and from the 30th iteration, UL and/or DL do not decrease during the next 15 successive iterations. The simulation has not reached convergence (specific divergence symbol). Examples: Let us assume that the maximum number of iterations is 100, UL and DL convergence thresholds are set to 5. 1. After the 30th iteration, UL and/or DL equal 100 and do not decrease during the next 15 successive iterations: Atoll stops the algorithm at the 46th iteration. Convergence has not been reached. 2. After the 30th iteration, UL and/or DL equal 80, they start decreasing slowly until the 40th iteration (without going under the thresholds) and then, do not change during 15 successive iterations: Atoll stops the algorithm at the 56th iteration without reaching convergence. 3rd case: After the last iteration. If UL and/or DL are still strictly higher than their respective thresholds, the simulation has not reached convergence (specific divergence symbol). If UL and DL are lower than their respective thresholds, the simulation has reached convergence. 6.4.3 Results 6.4.3.1 R99 Related Results This table contains some R99 specific simulation results provided in the Cells and Mobiles tabs of the simulation property dialogue. © Forsk 2009 AT281_TRG_E1 233 Technical Reference Guide Name Value Nb E1 T1 Ethernet Unit DL UL RoundUp Max T Iub N I T E1 T1 Ethernet T Iub N I T E1 T1 Ethernet None DL P SCH txi ic P txi ic – --------------------------------DL P tot txi ic – F ortho BTS tot LT txi DL I intra txi ic Description Number of E1/T1/Ethernet links required by the site None Downlink intra-cell interference at terminal on carrier ic W Downlink extra-cell interference at terminal on carrier ic W Downlink inter-carrier interference at terminal on carrier ic DL – 1 – F ortho BTS P b txi ic DL I extra ic DL P tot txj ic txj j i Ptot txj icadj DL DL I inter – carrier ic txj j ------------------------------------------------ RF ic ic adj DL I inter – techno log y ic ni DL DL I tot ic DL UL extra i I tot ic + N 0 W Total received noise at terminal on carrier ic Pb W Total power received at transmitter from intra-cell terminals using carrier ic W Total power received at transmitter from extra-cell terminals using carrier ic W Uplink inter-carrier interference at terminal on carrier ic W Total received interference at transmitter on carrier ic W Total noise at transmitter on carrier ic (Uplink interference) None Cell uplink load factor on carrier ic Term UL UL P b ic term txj j i Pb UL UL I inter – carrier txi ic term txi txi ic ic at terminal on carrier ic a Total effective interference at terminal on carrier ic (after unscrambling) DL DL ic Downlink inter-technology interference W DL DL I tot W I intra ic + I extra ic + I inter – carrier ic + I inter – techno log y ic N tot ic UL intra I tot txi Tx P Transmitted ic i -----------------------------------------Tx Tx m L total ICP n ic ic adj term txj j -------------------------------------- RF ic ic adj UL I tot txi ic UL extra I tot UL intra Tx txi ic + 1 – F MUD term I tot UL UL N tot txi ic UL txi ic +I inter – carrier txi ic tx I tot txi ic + N 0 UL X UL txi ic I tot txi ic ----------------------------UL N tot txi ic F UL txi ic I tot txi ic ------------------------------------------------------------------------------------------UL intra Tx I tot txi ic 1 – F MUD term None Cell uplink reuse factor on carrier ic E UL txi ic 1 -----------------------------UL F txi ic None Cell uplink reuse efficiency factor on carrier ic None Downlink load factor on carrier ic UL Simulation result available per cell DL I extra ic DL + I inter – carrier ic L T ---------------------------------------------------------------------------------------- + 1 – F ortho BTS DL P Tx txi ic -------------------------------------------------------------------------------------------------------------------------------------------1 ------------- + 1 – F ortho BTS tch DL CI req X DL txi ic DL Q req DL with CI req = ----------DL Gp Simulation result available per mobile DL I tot ic -------------------DL N tot ic 234 AT281_TRG_E1 © Forsk 2009 Chapter 6: UMTS HSPA Networks DL F DL I tot ic ------------------------------DL I intra txi ic txi ic None Downlink reuse factor on a carrier ic NR DL txi ic – 10 log 1 – X DL txi ic dB Noise rise on downlink NR UL txi ic – 10 log 1 – X UL txi ic dB Noise rise on uplink a. In the case of an interfering GSM external network in frequency hopping, the ICP value is weighted according to the fractional load. 6.4.3.2 HSPA Related Results At the end of the R99 part, packet (HSDPA), packet (HSPA) and packet (HSPA - Constant Bit Rate) service users can be: • • Either connected and in this case, they obtain the requested R99 bearer, Or rejected exactly for the same reasons as R99 users. Only connected packet (HSDPA), packet (HSPA) and packet (HSPA - Constant Bit Rate) service users are considered in the HSDPA part. At the end of the HSDPA part, packet (HSDPA) and packet (HSPA) service users can be: • • • Either connected if they obtain an HSDPA bearer, Or rejected if the maximum number of HSDPA users per cell is exceeded, Or delayed in case of lack of resources (HSDPA power, HS-SCCH power, HS-SCCH channels, OVSF codes). Packet (HSPA - Constant Bit Rate) service users can be: • • Either connected if they obtain an HSDPA bearer, Or rejected for the following reasons: the maximum number of HSDPA users per cell is exceeded, the lowest HSDPA bearer the user can obtain does not provide a RLC peak rate higher than the guaranted bit rate, the HSSCCH signal quality is not sufficient, there are no more OVSF codes available, the maximum Iub backhaul throughput allowed on the site in the downlink is exceeded. In the HSUPA part, Atoll processes packet (HSPA) service users and packet (HSPA - Constant Bit Rate) service users who are connected to an HSDPA bearer or were delayed in the previous step. At the end, they can be: • • 6.4.3.2.1 Either connected if they obtain an HSUPA bearer, Or rejected for the following reasons: the maximum number of HSUPA users per cell is exceeded, the terminal power required to obtain the lowest compatible HSUPA bearer exceeds the maximum terminal power, there are no more channel elements available, the maximum Iub backhaul throughput allowed on the site in the uplink is exceeded, the lowest compatible HSUPA bearer they can obtain does not provide a RLC peak rate higher than the guaranted bit rate (only for packet (HSPA - Constant Bit Rate) service users). Statistics Tab In the Statistics tab, Atoll displays as results: • • • The number of rejected users. The number of delayed users. The number of R99 bearer users connected to a cell (result of the R99 part). This figure includes R99 users as well as HSDPA and HSUPA bearer users since all of them request an R99 bearer. - The number of R99 bearer users per frequency band. The number of R99 bearer users per activity status. - The downlink and uplink rates ( R R99 and R R99 ) generated by their connection to R99 bearers. Only active DL UL users are considered. DL R R99 = DL UL R nominal R99 Bearer and R R99 = Active users UL R nominal R99 Bearer Active users DL UL R nominal R99 Bearer is the downlink nominal rate of the user R99 radio bearer and R nominal R99 Bearer is the uplink nominal rate of the user R99 radio bearer. • The number of connected users with an HSDPA bearer (result of the HSDPA part) and the downlink rate they generate. Packet (HSDPA), packet (HSPA) and packet (HSPA - Constant Bit Rate) service users are considered since they all request an HSDPA bearer. On the other hand, only active users are taken into consideration in the downDL link rate calculation ( R HSDPA ). DL R HSDPA = DL R RLC – peak Active users DL R RLC – peak is the RLC peak rate provided in the downlink. • © Forsk 2009 The number of connected HSUPA bearer users (result of the HSUPA part). Only packet (HSPA) and packet (HSPA - Constant Bit Rate) service users are considered. AT281_TRG_E1 235 Technical Reference Guide In addition, Atoll indicates the uplink data rate generated by active users connected with an HSUPA bearer UL ( R HSUPA ): UL R HSUPA = UL R RLC – peak Active users UL R RLC – peak is the RLC peak rate provided in the uplink. 6.4.3.2.2 Mobiles Tab In the Mobiles tab, Atoll indicates for each user: • UL DL The uplink and downlink total requested rates in kbps (respectively, R requested M b and R requested M b ) For circuit and packet (R99) service users, the DL and UL total requested rates correspond to the DL and UL nominal rates of the R99 bearer associated to the service. DL DL UL UL R requested M b = R nominal R99 Bearer R requested M b = R nominal R99 Bearer For packet (HSDPA) service users, the uplink requested rate corresponds to the nominal rate of ADPCH R99 radio bearer and the downlink requested rate is the sum of the ADPCH radio bearer nominal rate and the RLC peak rate that the selected HSDPA radio bearer can provide. Here, the user is treated as if he is the only user in the cell and then, Atoll determines the HSDPA bearer the user would obtain by considering the entire HSDPA power available of the cell. DL DL UL UL DL R requested M b = R nominal ADPCH R99 Bearer + R RLC – peak R requested M b = R nominal ADPCH R99 Bearer For HSUPA bearer users (i.e., packet (HSPA) and packet (HSPA - Constant Bit Rate) service users), the uplink requested rate is equal to the sum of the ADPCH-EDPCCH radio bearer nominal rate and the RLC peak rate of the requested HSUPA radio bearer. The requested HSUPA radio bearer is selected from the HSUPA bearers compatible with the user equipment. Here, the user is treated as if he is the only user in the cell and then, Atoll determines the HSUPA bearer the user would obtain by considering the entire remaining load of the cell. The downlink requested rate is the sum of the ADPCHEDPCCH radio bearer nominal rate and the RLC peak rate that the requested HSDPA radio bearer can provide. The requested HSDPA radio bearer is determined as explained in the previous paragraph. DL DL DL UL UL UL R requested M b = R nominal ADPCH – EDPCCH R99 Bearer + R RLC – peak R requested M b = R nominal ADPCH – EDPCCH R99 Bearer + R RLC – peak • UL DL The uplink and downlink total obtained rates in kbps (respectively, R obtained M b and R obtained M b ) For circuit and packet (R99) service users, the obtained rate is the same as the requested rate if he is connected without being downgraded. Otherwise, the obtained rate is lower (it corresponds to the nominal rate of the selected R99 bearer). If the user is rejected, the obtained rate is zero. For a packet (HSDPA) service connected to an HSDPA bearer, the uplink obtained rate equals the requested one and the downlink obtained rate corresponds to the instantaneous rate; this is the sum of the A-DPCH radio bearer nominal rate and the RLC peak rate provided by the selected HSDPA radio bearer after scheduling and radio resource control. If the user is delayed (he is only connected to an R99 radio bearer), uplink and downlink obtained rates correspond to the uplink and downlink nominal rates of ADPCH radio bearer. Finally, if the user is rejected either in the R99 part or in the HSDPA part (i.e., because the HSDPA scheduler is saturated), the uplink and downlink obtained rates are zero. For a connected packet (HSPA) service user, on uplink, if the user is connected to an HSUPA bearer, the obtained uplink rate is the sum of the ADPCH-EDPCCH radio bearer nominal rate and the RLC peak rate provided by the selected HSUPA radio bearer after noise rise scheduling. On downlink, if the user is connected to an HSDPA bearer, the obtained downlink rate corresponds to the instantaneous rate. The instantaneous rate is the sum of the ADPCH-EDPCCH radio bearer nominal rate and the RLC peak rate provided by the selected HSDPA radio bearer after scheduling and radio resource control. If the user is delayed, the obtained downlink rate corresponds to the downlink nominal rate of ADPCH-EDPCCH radio bearer. If the user is rejected, the obtained uplink and downlink rates are "0." For a connected packet (HSPA - Constant Bit Rate) service user, the uplink and downlink total obtained rates are the sum of the ADPCH-EDPCCH radio bearer nominal rate and the guaranteed bit rate defined for the service. If the user is rejected, the uplink and downlink total obtained rates are "0". • The mobile total power ( P term ) UL P term = P term – R99 f act – EDPCCH + P term – HSUPA for packet (HSPA) service users 236 AT281_TRG_E1 © Forsk 2009 Chapter 6: UMTS HSPA Networks UL P term = P term – R99 f act – EDPCCH + P term – HSUPA C HSDPABearer for packet (HSPA - Constant Bit Rate) service users Note: UL For packet (HSPA - Constant Bit Rate) service users, f act –EDPCCH = 0.1 . And P term = P term – R99 for circuit and packet (R99) service users and packet (HSDPA) service users • DL The HSDPA application throughput in kbps ( T application M b ) This is the net HSDPA throughput without coding (redundancy, overhead, addressing, etc.). DL R obtained M b 1 – BLER HSDPA SF Rate – R DL T application M b = ----------------------------------------------------------------------------------------------------------------------------------TTI Where: BLER HSDPA is read in the quality graph defined for the triplet “reception equipment-selected bearer-mobility” (HSDPA Quality Graphs tab in the Reception equipment properties). This graph describes the variation of BLER as a function of the measured quality (HS-PDSCH Ec/Nt). Knowing the HS-PDSCH Ec/Nt, Atoll calculates the corresponding BLER. SF Rate and R respectively represent the scaling factor between the application throughput and the RLC (Radio Link Control) throughput and the throughput offset. These two parameters model the header information and other supplementary data that does not appear at the application level. They are defined in the service properties. TTI is the minimum number of TTI (Transmission Time Interval) between two TTI used; it is defined in the terminal user equipment category properties. • The number of OVSF codes This is the number of 512-bit length OVSF codes consumed by the user. • The required HSDPA power in dBm ( P HSDPA required ) It corresponds to the HSDPA power required to provide the HSDPA bearer user with the downlink requested rate. The downlink requested rate is the data rate the user would obtain if he was the only user in the cell. In this case, Atoll determines the HSDPA bearer the user would obtain by considering the entire HSDPA power available of the cell. P HSDPA required = P HS – PDSCH used + n HS – SCCH P HS – SCCH P HS – PDSCH used is the HS-PDSCH power required to obtain the selected HSDPA bearer (in dBm). If the HSDPA bearer allocated to the user is the best one, P HS – PDSCH used corresponds to the available HS-PDSCH power of the cell. On the other hand, if the HSDPA bearer has been downgraded in order to be compliant with cell and UE capabilities or for another reason, P HS – PDSCH used will be lower than the available HS-PDSCH power of the cell. • The served HSDPA power in dBm ( P HSDPA served ) This is the HSDPA power required to provide the HSDPA bearer user with the downlink obtained rate. The downlink obtained rateis the data rate experienced by the user after scheduling and radio resource control. P HSDPA served = P HS – PDSCH used + n HS – SCCH P HS – SCCH for packet (HSDPA) and packet (HSPA) service users And P HSDPA served = P HS – PDSCH used C HSDPABearer for packet (HSPA - Constant Bit Rate) service users Where P HS – PDSCH used is the HS-PDSCH power required to obtain the selected HSDPA bearer. • The No. of HSUPA Retransmissions (Required) The maximum number of retransmissions in order to have the requested HSUPA radio bearer with a given BLER. • The No. of HSUPA Retransmissions (Obtained) The maximum number of retransmissions in order to have the obtained HSUPA radio bearer with a given BLER. • UL The HSUPA application throughput in kbps ( T application M b ) This is the net HSUPA throughput without coding (redundancy, overhead, addressing, etc.). UL R obtained M b 1 – BLER HSUPA SF Rate – R UL T application M b = ----------------------------------------------------------------------------------------------------------------------------------N Rtx Where: © Forsk 2009 AT281_TRG_E1 237 Technical Reference Guide BLER HSUPA is the residual BLER after N Rtx retransmissions. It is read in the quality graph defined for the quartet “reception equipment-selected bearer-number of retransmissions-mobility” (HSUPA Quality Graphs tab in the Reception equipment properties). This graph describes the variation of BLER as a function of the measured quality (E-DPDCH Ec/Nt). Knowing the E-DPDCH Ec/Nt, Atoll calculates the corresponding BLER. SF Rate and R respectively represent the scaling factor between the application throughput and the RLC (Radio Link Control) throughput and the throughput offset. These two parameters model the header information and other supplementary data that does not appear at the application level. They are defined in the service properties. N Rtx is the maximum number of retransmissions for the obtained HSUPA bearer. This figure is read in the HSUPA Bearer Selection table. The following columns appear if, when creating the simulation, you select "Detailed information about mobiles": • The uplink and downlink requested RLC peak rates (kbps) Downlink and uplink requested RLC peak rates are not calculated for circuit and packet (R99) service users. For packet (HSDPA) service users, the uplink RLC peak rate is not calculated and the downlink requested RLC peak rate is the data rate that the selected HSDPA radio bearer can provide. Here, the user is treated as if he is the only user in the cell and then, Atoll determines the HSDPA bearer he would obtain by considering the entire HSDPA power available of the cell. For HSUPA bearer users (i.e., packet (HSPA) and packet (HSPA - Constant Bit Rate) service users), the requested uplink RLC peak rate is the data rate of the requested HSUPA radio bearer. The requested HSUPA radio bearer is selected from the HSUPA bearers compatible with the user equipment. Here, the user is treated as if he is the only user in the cell and then, Atoll determines the HSUPA bearer the user would obtain by considering the entire remaining load of the cell. If the user is connected to an HSDPA bearer in the downlink, the downlink requested RLC peak rate is the rate that the requested HSDPA radio bearer can provide. The requested HSDPA radio bearer is determined as explained in the previous paragraph. • The uplink and downlink obtained RLC peak rate (kbps) Downlink and uplink obtained RLC peak rates are not calculated for circuit and packet (R99) service users. For a packet (HSDPA) service user connected to an HSDPA bearer, the uplink obtained RLC peak rate is not calculated, and the downlink obtained RLC peak rate is the rate provided by the selected HSDPA radio bearer after scheduling and radio resource control. For a connected packet (HSPA) service user, on uplink, if the user is connected to an HSUPA bearer, the obtained uplink RLC peak rate is the rate provided by the selected HSUPA radio bearer after noise rise scheduling. On downlink, if the user is connected to an HSDPA bearer, the downlink obtained RLC peak rate is the rate provided by the selected HSDPA radio bearer after scheduling and radio resource control. For a connected packet (HSPA - Constant Bit Rate) service user, the uplink and downlink obtained RLC peak rates are the uplink and downlink guaranteed bit rates defined for the service. 6.4.3.2.3 Cells Tab In the Cells tab, Atoll gives: • The available HSDPA power in dBm ( P HSDPA ic ) This is: - Either a fixed value in case of a static HSDPA power allocation strategy, Or a simulation result when the option "HSDPA Power Dynamic Allocation" is selected. We have: P HSDPA ic = P max ic – P Headroom ic – P tx – R99 ic – P HSUPA ic with P tx – R99 ic = P pilot ic + P SCH ic + P OtherCCH ic + P tch ic + tch used for R99 users • DL P tch ic f act – ADPCH tch used for HSPA users The transmitted HSDPA power in dBm ( P tx –H SDPA ic ) It corresponds to the HSDPA power used to serve HSDPA bearer users. P tx – H SDPA cell = P HSDPA M b served M b cell • The number of HSDPA users in the cell They are the connected and delayed HSDPA bearer users. This figure includes packet (HSDPA), packet (HSPA) and packet (HSPA - Constant Bit Rate) users. • The number of simultaneous HSDPA users in the cell ( n M ) b It corresponds to the number of connected HSDPA bearer users that the cell supports at a time, i.e. within one transmission time interval. All these users are connected to the cell at the end of the HSDPA part of the simulation; they have a connection with the R99 bearer and an HSDPA bearer. • 238 DL The instantaneous HSDPA rate in kbps ( R Inst cell ) AT281_TRG_E1 © Forsk 2009 Chapter 6: UMTS HSPA Networks This is the number of kilobits per second that the cell supports on downlink to provide simultaneous connected HSDPA bearer users with an HSDPA bearer. DL R Inst cell = DL R obtained M b M b cell DL The instantaneous HSDPA MAC Throughput in kbps ( T MAC cell ) • DL T MAC cell = M b cell S block M b ------------------------------------------T TTI TTI M b Where, S block M b is the transport block size (in kbits) of the HSDPA bearer selected by the user; it is defined for each HSDPA bearer in the HSDPA Radio Bearers table. TTI M b is the minimum number of TTI (Transmission Time Interval) between two TTI used; it is defined in the terminal user equipment category properties. –3 T TTI is the TTI duration, i.e. 2 10 s (2000 TTI in one second). This value is specified by the 3GPP. DL The average instantaneous HSDPA rate in kbps ( R Av – Inst cell ) • DL R obtained M b M cell DL b R Av – Inst cell = -------------------------------------------------------nM b DL The HSDPA application throughput in kbps ( T application cell ) • DL Either T application cell = DL T application M b if the scheduling algorithm is Round Robin or Proportional Fair, M b cell DL DL Or T application cell = T application M b maxC I if the scheduling algorithm is Max C/I. M b maxC I is the user with the highest C I in the cell. • DL The minimum HSDPA RLC peak rate in kbps ( min R obtained M b ) M b cell It corresponds to the lowest of RLC peak rates obtained by HSDPA bearer users connected to the cell. • The maximum HSDPA RLC peak rate in kbps ( DL max R obtained M b ) M b cell It corresponds to the highest of RLC peak rates obtained by HSDPA bearer users connected to the cell. • The number of HSUPA users in the cell ( n M ): c They are the HSDPA bearer users connected to the cell. • UL The HSUPA application throughput in kbps ( T application cell ) UL T application cell = UL T application M b M b cell • UL The uplink cell load factor due to HSUPA traffic ( X HSUPA cell ): UL I tot cell HSUPA UL X HSUPA cell = -------------------------------------------UL N tot cell Where UL I tot cell HSUPA is the total interference at transmitter received from HSUPA bearer users. 6.4.3.2.4 Sites Tab In the Sites tab, Atoll displays: • © Forsk 2009 DL The instantaneous HSDPA rate carried by the site in kbps ( R Inst site ) AT281_TRG_E1 239 Technical Reference Guide DL R Inst site = DL R Inst cell cell site • DL The instantaneous HSDPA MAC Throughput carried by the site in kbps ( T MAC site in kbps) DL T MAC site = DL T MAC cell cell site • R UL The HSUPA rate carried by the site in kbps ( R site = UL site ) UL R obtained M c M c site 6.4.4 Appendices 6.4.4.1 Admission Control in the R99 Part During admission control of the R99 part of the simulation, Atoll calculates the uplink load factor of a considered cell assuming the mobile concerned is connected with it. Here, activity status assigned to users is not taken into account. So even if the mobile is not active on UL, it can be rejected due to cell load saturation. To calculate the cell UL load factor, either Atoll takes into account the mobile power determined during power control if mobile was connected in previous iteration, or it estimates a load rise due to the mobile and adds it to the current load. The load rise ( X follows: X 6.4.4.2 6.4.4.2.1 UL UL ) is calculated as 1 = -------------------------------------------------W 1 + ---------------------------------------UL UL Q req R nominal Resources Management OVSF Codes Management OVSF codes are managed on the downlink during the simulation since this resource is downlink limited only. Atoll checks the availability of this resource during the simulation, first in the R99 part and then in the HSDPA part. It determines the number of codes that will be consumed by each cell. OVSF codes form a binary tree. Codes of longer lengths are generated from codes of a shorter length. Length-k OVSF codes are generated from length-k/2 OVSF codes. Therefore, if one channel needs 1 length-k/2 OVSF code, it is equivalent to use 2 length-k OVSF codes, or 4 length-2k OVSF codes and so on. 512 512-bit-length codes per cell are available in UMTS HSPA projects. In the R99 part, during the resource control, Atoll determines the number of 512 bit-length codes that will be consumed for each cell. If the cell supports HSUPA, Atoll allocates codes for the DL channels used for HSUPA: • • A 128 bit-length code for the E-HICH and E-RGCH channels (i.e. four 512 bit-length OVSF codes), for each cell. Therefore, Atoll will take four 512-bit-length codes, A 256 bit-length code for the E-AGCH channel (i.e. two 512 bit-length OVSF codes), for each cell. Therefore, Atoll will take two 512-bit-length codes, If the cell supports HSDPA, Atoll reserves for potential HSDPA bearer users: • Codes – HS – PDSCH The minimum number of HS-PDSCH codes defined for the cell, N min . They are 16-bit length OVSF Codes – HS – PDSCH codes (i.e. thirty-two 512 bit-length OVSF codes). Therefore, Atoll will take 32 N min • 512-bit- length codes, A 128 bit-length code per HS-SCCH channel (i.e. four 512 bit-length OVSF codes), for each cell. Therefore, Atoll will take 4 n HS – SCCH 512-bit-length codes, Then, it allocates to the cell OVSF codes to support R99 bearers required by users: • A 256 bit-length code per common channel (i.e. two 512 bit-length OVSF codes), for each cell. Therefore, Atoll will • take 2 N 512-bit-length codes, A code per cell-receiver link, for TCH (traffic channels). The length of code to be allocated, Code_Length, depends on the user activity. We have: Overhead – Codes DL Either Code_Length = F spreading Active user when the user is active, DL Or Code_Length = F spreading Inactive user if the user is inactive. 240 AT281_TRG_E1 © Forsk 2009 Chapter 6: UMTS HSPA Networks The number of 512 bit-length OVSF codes needed N as follows: N Codes-TCH Codes-TCH is calculated from the length of the code to be allocated 512 = -----------------------------------Code_Length Figure 6.13: OVSF Code Tree Indices (Not OVSF Code Numbers) The OVSF code allocation follows the “Buddy” algorithm, which guarantees that: • • If a k-length OVSF code is used, all of its children with lengths 2k, 4k, …, cannot be used as they will not be orthogonal. If a k-length OVSF code is used, all of its ancestors with lengths k/2, k/4, …, cannot be used as they will not be orthogonal. Example: We consider a user with a service requiring the UDD64 R99 radio bearer. This user is active on DL while connected to a cell (which does not support HSDPA). The spreading factor for active users has been set to 64 and site equipment requires four overhead downlink channel elements per cell. Atoll will consume four 256 bit-length OVSF codes for common channels (i.e. eight 512 bit-length OVSF codes) and a 64 bit-length OVSF code for traffic channels (i.e. eight additional 512 bit-length OVSF codes). Notes: • In the R99 part, the OVSF code allocation follows the mobile connection order (mobile order in the Mobiles tab). • The OVSF code and channel element management is differently dealt with in case of “softer” handover. Atoll allocates OVSF codes for each cell-mobile link while it globally assigns channel elements to a site. In the HSDPA part, packet (HSDPA), packet (HSPA) and packet (HSPA - Constant Bit Rate) service users) are assigned an HSDPA bearer (Fast link adaptation). Therefore, Atoll allocates to the cell: • 16-bit length OVSF codes per cell-HSDPA receiver, for HS-PDSCH. This figure depends on the HSDPA bearer assigned to the user and on the type of service. For packet (HSDPA) and packet (HSPA) service users, Atoll needs 32 N for each user connected to the cell. N HSDPA bearer. Codes – HS – PDSCH 512-bit-length codes is the number of HS-PDSCH channels required by the For packet (HSPA - Constant Bit Rate) service users, Atoll needs 32 N bit-length codes for each user connected to the cell. N required by the HSDPA bearer. Codes – HS – PDSCH Codes – HS – PDSCH Codes – HS – PDSCH C HSDPABearer 512- is the number of HS-PDSCH channels Note: • When HSDPA bearer users (at least one) are connected to the cell, Atoll gives the cell back Codes – HS – PDSCH the minimum number of OVSF codes reserved for HS-PDSCH ( N min ). On the other hand, if no HSDPA bearer user is connected, Atoll still keeps these codes and the codes for HS-SCCH too. This is the same with HSUPA bearer users. Even if no HSUPA bearer user is connected to the cell, Atoll still keeps the codes for E-HICH, E-RGCH and EAGCH channels. 6.4.4.2.2 Channel Elements Management Channel elements are controlled in the R99 and the HSUPA parts of the simulation. Atoll checks the availability of this resource in the uplink and downlink. In the R99 part, during the resource control, Atoll determines the number of channel elements required by each site for R99 bearer users in the uplink and downlink. Then, in the HSUPA part, Atoll carries out another resource control after allo- © Forsk 2009 AT281_TRG_E1 241 Technical Reference Guide cating HSUPA bearers. It takes into account the channel elements consumed by HSUPA bearer users in the uplink and recalculates the number of channel elements required by each site in the uplink. In the uplink, Atoll consumes N • CE – UL j channel elements for each cell j on a site NI. This figure includes: Channel elements for R99 bearers: - Overhead – CE – UL N channel elements for control channels, R99 – T CH – CE – UL • per cell-receiver link, for R99 TCH (traffic channels). N Channel elements for HSUPA bearers: - N HSUPA – CE N HSUPA – CE per cell-receiver link, for packet (HSPA) service users. C HSUPABearer per cell-receiver link, for packet (HSPA - Constant Bit Rate) service users. Therefore, the number of channel elements required on uplink at the site level, N N CE – UL N NI = CE – UL CE – UL N I , is: j j NI On downlink, Atoll consumes N • CE – DL j channel elements for each cell j on a site NI. This figure includes: Channel elements for R99 bearers Overhead – CE – DL channel elements for control channels (Pilot channel, Synchronisation channel, common R99 – T CH – CE – DL per cell-receiver link, for R99 TCH (traffic channels). - N channels), - N Therefore, the number of channel elements required on downlink at the site level, N N CE – DL NI = N CE – DL CE – DL N I , is: j j NI Note: • 6.4.4.2.3 In case of “softer” handover (the mobile has several links with co-site cells), Atoll allocates channel elements for the best serving cell-mobile link only. Iub Backhaul Throughput The Iub backhaul throughput is controlled in the R99, the HSDPA and the HSUPA parts of the simulation. Atoll checks the availability of this resource in the uplink and downlink. In the R99 part, during the resource control, Atoll determines the Iub throughput required by each site for R99 bearer users in the uplink and downlink. Then, in the HSDPA part, Atoll performs a resource control in the downlink after allocating HSDPA bearers. It takes into account the Iub backhaul throughput consumed by HSDPA bearer users in the downlink and recalculates the Iub backhaul throughput required by each site in the downlink. Finally, in the HSUPA part, Atoll carries out a resource control in the uplink after allocating HSUPA bearers. It takes into account the Iub backhaul throughput consumed by HSUPA bearer users in the uplink and updates the Iub backhaul throughput required by each site in the uplink. UL In the uplink, the Iub backhaul throughput consumed by each cell j on a site NI, T Iub j , includes: • The Iub backhaul throughput required for R99 bearers: - • R99 – T CH – UL T Iub per cell-receiver link, for R99 TCH (traffic channels). The Iub backhaul throughput required for HSUPA bearers: HSUPA - T Iub - HSUPA T Iub per cell-receiver link, for packet (HSPA) service users. C HSUPABearer per cell-receiver link, for packet (HSPA - Constant Bit Rate) service users. UL Therefore, the Iub backhaul throughput required on uplink at the site level, T Iub N I , is: UL T Iub N I = TIub j UL j NI DL In the downlink, the Iub backhaul throughput consumed by each cell j on a site NI, T Iub j , includes: • • 242 The Iub backhaul throughput required for R99 bearers: Overhead – DL - T Iub for R99 control channels (Pilot channel, Synchronisation channel, common channels). - R99 – T CH – DL T Iub per cell-receiver link, for R99 TCH (traffic channels). The Iub backhaul throughput required for HSUPA bearers: AT281_TRG_E1 © Forsk 2009 Chapter 6: UMTS HSPA Networks HSDPA - T Iub - HSDPA T Iub per cell-receiver link, for packet (HSDPA) and packet (HSPA) service users. C HSDPABearer per cell-receiver link, for packet (HSPA - Constant Bit Rate) service users. HSDPA With T Iub DL HSDPA = R RLC – peak + Overhead Iub DL R RLC – peak DL Therefore, the Iub backhaul throughput required on downlink at the site level, T Iub N I , is: DL T Iub N I = TIub j DL j NI Note: • 6.4.4.3 In case of “softer” handover (the mobile has several links with co-site cells), Iub backhaul throughput is consumed by the best serving cell-mobile link only. Downlink Load Factor Calculation Atoll calculates a downlink load factor for each cell (available in the Cells tab of any simulation result) and each connected mobile (available in the Mobiles tab of any given simulation result). 6.4.4.3.1 Downlink Load Factor per Cell Approach for downlink load factor evaluation is highly inspired by the downlink load factor defined in the book “WCDMA for UMTS by Harry Holma and Antti Toskala”. DL Q req - be the required quality. Let CI req = ----------DL Gp DL Gp DL and Q req are the processing gain on downlink and the Eb/Nt target on downlink respectively. In case of soft-handoff, required quality is limited to the effective contribution of the transmitter. DL P tx ic = P pilot ic + P SCH ic + P otherCCH ic + Ptch ic tch DL ortho nonOrtho P tx ic = P CCH ic + P CCH ic + Ptch ic tch where ortho P CCH ic = P pilot ic + P otherCCH ic nonOrtho P CCH ic = P SCH ic At mobile level, we have a required power, Ptch: term P tch ic = CI req I extra ic + I inter – carrier ic + I inter – techno log y ic + I intra ic + N 0 DL With r = 1 when the user is active on the downlink and r = r c LT r when the user is inactive. In case of an HSDPA bearer DL user, r = f act – ADPCH . P tch ic = CI req I extra ic + I inter – carrier ic + I inter – techno log y ic DL nonOrtho nonOrtho P tx ic – P CCH ic – P tch ic P CCH ic term - + N0 + 1 – F ortho BTS ---------------------------------------------------------------------------------------------- + ---------------------------------LT LT L r T DL I extra ic + I inter – carrier ic + I inter – techno log y ic L T r + 1 – F ortho BTS P tx ic r + nonOrtho term F ortho BTS P CCH ic r + N 0 LT r P tch ic = -------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------1 ---------------------- + 1 – F ortho BTS CI req r I intra ic is the total power received at the receiver from the cell with which it is connected. I extra ic is the total power received at the receiver from other cells. I inter – carrier ic is the inter-carrier interference received at the terminal. I inter – techno log y ic is the inter-technology interference received at the terminal from an external transmitter. © Forsk 2009 AT281_TRG_E1 243 Technical Reference Guide We have: ortho nonOrtho P CCH ic + P CCH DL P tx ic DL P tx ic = ic I extra ic + I inter – carrier ic + I inter – techno log y ic L T r DL nonOrtho term 1 F + – P ic r + F P ic r + N L r ortho BTS tx ortho BTS CCH 0 T -------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- + 1 --------------------+ – 1 F ortho BTS tch CI req r I extra ic + I inter – carrier ic + I inter – techno log y ic L T r ----------------------------------------------------------------------------------------------------------------------------------------------------------- P DL tx ic DL P tx ic = P ortho ic + P nonOrtho ic + ------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- + CCH CCH 1 ---------------------- + 1 – F ortho BTS tch CI req r DL 1 – F ortho BTS P tx ic r -----------------------------------------------------------------------------------+ 1 tch ---------------------- + 1 – F ortho BTS CI req r nonOrtho term F ortho BTS P CCH ic r + N 0 LT r ---------------------------------------------------------------------------------------------------------------------------1 ---------------------- + 1 – F ortho BTS tch CI req r I extra ic + I inter – carrier ic + I inter – techno log y ic L T r ---------------------------------------------------------------------------------------------------------------------------------------------------------- + 1 – F ortho BTS r DL P ic DL tx --------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- P DL P tx ic – tx ic 1 ---------------------- + 1 – F ortho BTS tch r CI req ortho nonOrtho = P CCH ic + P CCH nonOrtho ic + F ortho BTS P CCH term ic r + N 0 LT r ---------------------------------------------------------------------------------------------------------------------------1 ---------------------- + 1 – F tch CI req r nonOrtho ortho BTS term F ortho BTS P CCH ic r + N 0 LT r ---------------------------------------------------------------------------------------------------------------------------1 ---------------------- + 1 – F ortho BTS tch CI req r DL P tx ic = -------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- I extra ic + I inter – carrier ic + I inter – techno log y ic L T r ----------------------------------------------------------------------------------------------------------------------------------------------------------- + 1 – F ortho BTS r DL P tx ic --------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- 1– 1 ---------------------- + 1 – F ortho BTS tch CI req r ortho nonOrtho P CCH ic + P CCH ic + Therefore, the downlink load factor can be expressed as: X DL I extra ic + I inter – carrier ic + I inter – techno log y ic L T r ----------------------------------------------------------------------------------------------------------------------------------------------------------- + 1 – F ortho BTS r DL P tx ic = --------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------1 ---------------------- + 1 – F ortho BTS tch CI req r The downlink load factor represents the signal degradation in relation to the reference interference (thermal noise plus synchronisation channel power). 6.4.4.3.2 Downlink Load Factor per Mobile Atoll evaluates the downlink load factor for any connected mobile as follows: X 6.4.4.4 DL DL I tot ic = ------------------DL N tot ic Uplink Load Factor Due to One User UL This part details how Atoll calculates the contribution of one user to the UL load factor ( X k ). In this calculation, we assume that the cell UL reuse factor ( F UL txi ic ) is constant. The result depends on the option used to calculate Nt (Without useful signal or Total noise that you may select in Global parameters). Without Useful Signal Option UL P b k req W UL - ------------------------------------------------------------------------------------------------------------------------Q req k = ----------------------------UL UL tx R nominal k I intra – P b k req + I extra + I inter – carrier + N 0 244 AT281_TRG_E1 © Forsk 2009 Chapter 6: UMTS HSPA Networks UL P b k req W UL - ------------------------------------------------------------------------------Q req k = ----------------------------UL UL UL tx R nominal k I intra F – P b k req + N 0 UL UL R nominal k R nominal k UL UL UL UL tx P b k req 1 + Q req k ------------------------------ = Q req k ------------------------------ I intra F + N 0 W W UL UL R nominal k R nominal k UL UL UL tx Q req k ------------------------------ I intra F Q req k ------------------------------ N 0 W W = -------------------------------------------------------------------------------------------- + -----------------------------------------------------------------------UL UL R nominal k R nominal k UL UL 1 + Q req k -----------------------------1 + Q req k -----------------------------W W UL P b k req UL req R nominal k Ec UL We note ------- k = Q req k ----------------------------- Nt E – DPDCH W UL tx N0 I intra F UL - + ------------------------------------------------------------ P b k req = ------------------------------------------------------------ 1 1 + 1 ---------------------------------------------- + 1 ---------------------------------------------req Ec req Ec - k - k ----- ----- Nt E – DPDCH Nt E – DPDCH Pb UL As I intra = k req , we have: K I intra = I intra F UL 1 K tx N0 1 - + N 0 ------------------------------------------------------------- ------------------------------------------------------------ tx 1 + 1 ---------------------------------------------req Ec - k ----- Nt E – DPDCH K 1 + 1 ---------------------------------------------req Ec - k ----- Nt E – DPDCH 1 ------------------------------------------------------------ 1 + 1 ---------------------------------------------req Ec - k ----- Nt E – DPDCH = -----------------------------------------------------------------------------------------------UL 1 1–F ------------------------------------------------------------- K 1 + 1 ---------------------------------------------req Ec - k ----- Nt E – DPDCH K I intra tx UL N0 F I intra = -----------------------------------------------------------------------------------------------1 --------------------------------------------------------------------------------------- – 1 UL 1 F ------------------------------------------------------------- K 1 ---------------------------------------------+ 1 req Ec - k ----- Nt E – DPDCH X UL UL I intra + I extra + I inter – carrier I intra F 1 - = -------------------------------------= -----------------------------------------------------------------------------------= -----------------------------------------tx UL tx tx I intra F + N 0 N0 I intra + I extra + I inter – carrier + N 0 1 + --------------------------UL I intra F Therefore, we have: X UL = F UL 1 ------------------------------------------------------------ K 1 + 1 ---------------------------------------------req Ec ------- Nt k E – DPDCH So, we can conclude that the contribution of one user to the UL load is defined as: UL X k © Forsk 2009 = F UL 1 ------------------------------------------------------------- 1 + 1 ---------------------------------------------req Ec - k ----- Nt E – DPDCH AT281_TRG_E1 245 Technical Reference Guide Total Noise Option UL P b k req W UL - -----------------------------------------------------------------------------------Q req k = ----------------------------UL tx R nominal k I intra + I extra + I inter – carrier + N 0 UL P b k req W UL - -----------------------------------------Q req k = ----------------------------UL UL tx R nominal k I intra F + N 0 UL R nominal k UL UL UL tx P b k req = Q req k ------------------------------ I intra F + N 0 W UL req R nominal k Ec UL We note ------- k = Q req k ----------------------------- Nt E – DPDCH W req Ec UL UL tx P b k req = ------- k I intra F + N 0 Nt E – DPDCH Pb UL As I intra = k req , we have: K I intra = I intra F UL tx + N0 Ec req - k -----Nt E – DPDCH K tx N0 Ec req - k -----Nt E – DPDCH K I intra = --------------------------------------------------------------------UL 1–F X UL I intra + I extra + I inter – carrier I intra F 1 - = -------------------------------------= -----------------------------------------------------------------------------------= -----------------------------------------UL tx tx tx I intra F + N 0 N0 I intra + I extra + I inter – carrier + N 0 1 + --------------------------UL I intra F UL Therefore, we have: X UL = F UL Ec req - k -----Nt E – DPDCH K So, we can conclude that the contribution of one user to the UL load is defined as: UL X k 6.4.4.5 = F UL req Ec ------- k Nt E – DPDCH Inter-carrier Power Sharing Modelling Inter-carrier power sharing enables the network to dynamically allocate available power from R99-only and HSDPA carriers among HSDPA carriers. In this part, we will consider the most common scenario, a network consisting of an R99-only carrier (c1) and an HSDPA carrier with dynamic power allocation (c2) (c2 does not support HSUPA). As explained in The User Manual, the maximum power of the HSDPA cell must be set to the same value as the maximum shared power in order to use power sharing efficiently. In this case, the HSDPA cell can use 100% of the available power, i.e, all of the R99-only cell’s unused power can be allocated to the HSDPA cell. Let’s take the following example to measure the impact of the inter-carrier power sharing. • 1st case: Inter-carrier power sharing is not activated On c1, we have: P max Tx c 1 = 43dBm and P tx – R99 Tx c 1 = 39.1dBm . On c2, we have: P max Tx c 2 = 43dBm , P tx – R99 Tx c 2 = 36.1dBm and P Headroom Tx c 2 = 0dB . Therefore, P HSDPA Tx c 2 = P max Tx c 2 – P tx – R99 Tx c 2 – P Headroom Tx c 2 = 42dBm • 2nd case: Inter-carrier power sharing is activated and P max Tx = 46dBm On c1, we have: P max Tx c 1 = 43dBm and P tx – R99 Tx c 1 = 39.1dBm . On c2, we have: P max Tx c 2 = 46dBm , P tx – R99 Tx c 2 = 36.1dBm and P Headroom Tx c 2 = 0dB . Therefore, P HSDPA Tx c 2 = P max Tx – P tx – R99 Tx c 1 – P tx – R99 Tx c 2 – P Headroom Tx c 2 = 44.4dBm 246 AT281_TRG_E1 © Forsk 2009 Chapter 6: UMTS HSPA Networks 6.4.4.6 Best Server Determination in Monte Carlo Simulations - Old Method Before Atoll 2.8.0, best server determination used to be performed by selecting the best carrier within transmitters according to the selected method (site equipment) and then the best transmitter using the best carrier. To switch back to this method, add the following lines in the Atoll.ini file: [CDMA] MultiBandSimu = 0 The method is described below: For each station txi containing Mb in its calculation area and using the main frequency band supported by the Mb’s terminal (i.e. either f1 for a single frequency band network, or f1 or f2 for a dual-band terminal without any priority on frequency bands, or f1 for a dual-band terminal with f1 as main frequency band). Determination of BestCarrier k txi M b . If a given carrier is specified for the service requested by Mb and if it is used by txi BestCarrier k txi M b is the carrier specified for the service. Else the carrier selection mode defined for txi is considered. If carrier selection mode is “Min. UL Load Factor” For each carrier ic used by txi, we calculate current loading factor: UL I tot txi ic UL UL - + X X k txi ic = ----------------------------UL N tot txi ic EndFor UL BestCarrier k txi M b is the carrier with the lowest X k txi ic Else if carrier selection mode is “Min. DL Total Power” BestCarrier k txi M b is the carrier with the lowest P tx txi ic k Else if carrier selection mode is “Random” BestCarrier k txi M b is randomly selected Else if carrier selection mode is "Sequential" UL UL BestCarrier k txi M b is the first carrier so that X k txi ic X max Calculation of BTS P c txi M b BestCarrier Q pilot txi BestCarrier = -------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------k DL DL P tot txi BestCarrier k txi M b + I extra BestCarrier k txi M b + DL DL Term I inter – carrier BestCarrier k txi M b + I inter – techno log y BestCarrier k txi M b + N 0 If user selects “without Pilot” BTS P c txi M b BestCarrier Q pilot txi BestCarrier = ------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------k DL DL P tot txi BestCarrier k txi M b + I extra BestCarrier k txi M b DL DL +I BestCarrier k txi M b + I inter – techno log y BestCarrier k txi M b inter – carrier Term + N0 – 1 – BTS P c txi M b BestCarrier Rejection of station txi if the pilot is not received pilot If Q pilot txi M b BestCarrier Q req Mobility M b then txi is rejected by Mb k max If Q pilot txi M b BestCarrier Q pilot M b k k Admission control (If simulation respects a loading factor constraint and Mb was not connected in previous iteration). UL UL If X k txi BestCarrier txi M b X max , then txi is rejected by Mb Else max Q pilot M b = Q pilot txi M b BestCarrier k k Tx BS M b = txi © Forsk 2009 AT281_TRG_E1 247 Technical Reference Guide Endif EndFor If no TxBS has been selected and Mb’s terminal can work on one frequency band only, Mb has failed to be connected to the network and is rejected. If no TxBS has been selected and Mb’s terminal can work on another frequency band. Determination of BestCarrier k txi M b for each station txi containing Mb in its calculation area and using another frequency band supported by the Mb’s terminal (i.e. f1 or f2 for a dual-band terminal without any priority on frequency bands, or f2 for a dual-band terminal with f2 as secondary frequency band) If a given carrier is specified for the service requested by Mb and if it is used by txi BestCarrier k txi M b is the carrier specified for the service. Else the carrier selection mode defined for txi is considered. If carrier selection mode for txi is “Min. UL Load Factor” For each carrier ic used by txi, we calculate current loading factor: UL I tot txi ic UL UL - + X X k txi ic = ----------------------------UL N tot txi ic EndFor UL BestCarrier k txi M b is the carrier with the lowest X k txi ic Else if carrier selection mode is “Min. DL Total Power” BestCarrier k txi M b is the carrier with the lowest P tx txi ic k Else if carrier selection mode is “Random” BestCarrier k txi M b is randomly selected Else if carrier selection mode is "Sequential" UL UL BestCarrier k txi M b is the first carrier so that X k txi ic X max Calculation of BTS P c txi M b BestCarrier Q pilot txi BestCarrier = -------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------k DL DL txi BestCarrier txi M + I BestCarrier txi M + P tot k b extra k b DL DL Term I inter – carrier BestCarrier k txi M b + I inter – techno log y BestCarrier k txi M b + N 0 If user selects “without Pilot” BTS P c txi M b BestCarrier Q pilot txi BestCarrier = ------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------k DL DL P tot txi BestCarrier k txi M b + I extra BestCarrier k txi M b DL + I DL BestCarrier k txi M b + I inter – techno log y BestCarrier k txi M b inter – carrier Term + N0 – 1 – BTS P c txi M b BestCarrier Rejection of station txi if the pilot is not received pilot If Q pilot txi M b BestCarrier Q req Mobility M b then txi is rejected by Mb k max If Q pilot txi M b BestCarrier Q pilot M b k k Admission control (If simulation respects a loading factor constraint and Mb was not connected in previous iteration). UL UL If X k txi BestCarrier txi M b X max , then txi is rejected by Mb Else max Q pilot M b = Q pilot txi M b BestCarrier k k Tx BS M b = txi Endif EndFor If no TxBS has been selected, Mb has failed to be connected to the network and is rejected. 248 AT281_TRG_E1 © Forsk 2009 Chapter 6: UMTS HSPA Networks 6.5 UMTS HSPA Prediction Studies 6.5.1 Point Analysis 6.5.1.1 AS Analysis Tab Let us suppose a receiver with a terminal, a service and a mobility type. This receiver does not create any interference. You can make the prediction for a specific carrier or for all carriers of the main frequency band for the selected terminal. If you have selected a dual-band terminal, you can make the coverage prediction on a specific carrier or on all carriers of any frequency band for the selected terminal, or for all the carriers of all the frequency bands. The analysis is based on the following parameters: • • • The uplink load factor and the downlink total power of cells, The available HSDPA power of the cell in case of an HSDPA bearer user, The cell UL reuse factor, the cell UL load factor due to HSUPA and the maximum cell UL load factor for HSUPA bearer users. These parameters can be results of a given simulation, average values calculated from a group of simulations, or userdefined cell inputs. In the last case, when no value is defined in the Cells table, Atoll uses the following default values: • • • • • Total transmitted power = 50% of the maximum power (i.e, 40 dBm if the maximum power is set to 43 dBm) Uplink load factor = 50%. Uplink reuse factor = 1 Uplink load factor due to HSUPA = 0% Maximum uplink load factor = 75% On the other hand, no default value is used for the HSDPA power; this parameter must be defined by the user. 6.5.1.1.1 Bar Graph and Pilot Sub-Menu We can consider the following cases: 1st case: Analysis based on a specific carrier The carrier that can be used by transmitters is fixed. In this case, for each transmitter i containing the receiver in its calculation area and using the selected carrier, Atoll calculates the pilot quality at the receiver on this carrier. Then, it determines the best serving transmitter using the selected carrier ic. 2nd case: Analysis based on all carriers Atoll determines the best carrier for each transmitter i which contains the receiver in its calculation area and uses a frequency band supported by the receiver’s terminal. The best carrier selection depends on the option selected for the site equipment (UL minimum noise, DL minimum power, random, sequential). Then, Atoll calculates the pilot quality at the receiver from these transmitters on their best carriers (ic) and defines the best server (on its best carrier). 3rd case: Analysis based on all carriers of any frequency band (for dual-band terminals with priority defined on frequency bands only) The frequency band that can be used is fixed. Atoll determines the best carrier for each transmitter i containing the receiver in its calculation area and using the selected frequency band. The best carrier selection depends on the option selected for the site equipment (UL minimum noise, DL minimum power, random, sequential). Then, Atoll calculates the pilot quality at the receiver from these transmitters on their best carriers (ic) and defines the best server (on its best carrier). Ec/I0 (or Q pilot ic ) Evaluation Let us assume that ic is either the best carrier or the selected carrier of a transmitter i containing the receiver in its radius calculation and icadj is another carrier adjacent to ic. An interference reduction factor, RF ic ic adj , is defined between ic and icadj and set to a value different from 0. Two ways may be used to calculate I0. Option Total noise: Atoll considers the noise generated by all the transmitters and the thermal noise. Option Without pilot: Atoll considers the total noise deducting the pilot signal. Calculation option may be selected in Global parameters. Therefore, we have: BTS P c i ic Q pilot i ic = ------------------------------------------------DL I 0 ic With, DL DL DL DL DL term I 0 ic = P tot i ic + I extra ic + I inter – carrier ic + I inter – techno log y ic + N 0 for the total noise option, And © Forsk 2009 AT281_TRG_E1 249 Technical Reference Guide DL DL DL DL DL term I 0 ic = I intra ic + I extra ic + I inter – carrier ic + I inter – techno log y ic + N 0 – 1 – BTS P c i ic for the without pilot option. 1st step: P c i ic calculation for each cell (i,ic) P c i ic is the pilot power of a transmitter i on carrier ic at the receiver. P pilot i ic P c i ic = --------------------------LT I L T is the total loss between transmitter i and receiver. I L Tx L path L term L body L Indoor M Shadowing – Ec Io L T = -------------------------------------------------------------------------------------------------------------------------------------------------I G Tx G term DL DL DL 2nd step: P tot j ic , P tot i ic and P tot j ic adj calculations We have: DL I extra ic = DL P tot j ic txj j i P SCH ic DL DL DL I intra ic = P tot i ic – BTS P tot i ic – ---------------------- L T Ptot j icadj DL DL txj j I inter – carrier ic = ------------------------------------------RF ic ic adj and Tx DL I inter – techno log y ic = P Transmitted ic i -----------------------------------------Tx Tx m L ICP ni ic i ic total DL For each transmitter of the network, P tot ic is the total power received at the receiver from the transmitter on the best carrier ic of the transmitter i. P Tx ic DL P tot ic = -----------------LT P Tx ic is the total power transmitted by the transmitter on the best carrier. Total power transmitted by each cell is either a simulation result (provided in Simulation properties (Cells tab)) or a value user-defined in Cell properties. DL For each transmitter of the network, P tot ic adj is the total power received at the receiver from the transmitter on the carrier icadj. This carrier is adjacent to ic. P Tx ic adj DL P tot ic adj = ------------------------LT P Tx ic adj is the total power transmitted by the transmitter on the carrier icadj. Total power transmitted by each cell is either a simulation result (provided in Simulation properties (Cells tab)) or a value user-defined in Cell properties. term 3rd step: N 0 term N0 calculation Tx DL = NF Term K T W NR inter – techno log y DL 4th step: I 0 ic and Q pilot i ic evaluation using formulas described above DL 5th step: G macro – diversity calculation DL The macro-diversity gain, G macro – diversity , models the decrease in shadowing margin due to the fact there are several available pilot signals at the mobile. DL npaths G macro – diversity = M Shadowing – Ec Io – M Shadowing – Ec Io npaths M Shadowing – Ec Io is the shadowing margin when the mobile receives n pilot signals (not necessarily from transmitters belonging to the mobile active set). 250 AT281_TRG_E1 © Forsk 2009 Chapter 6: UMTS HSPA Networks Note: • This parameter is determined from cell edge coverage probability and Ec/I0 standard deviation. When the Ec/I0 standard deviation is set to 0, the macro-diversity gain equals 0. 6th step: Determination of active-set Atoll takes the transmitter i with the highest Q pilot i ic and calculates the best pilot quality received with a fixed cell edge Resulting coverage probability, Q pilot Resulting Q pilot ic . DL ic = G macro – diversity max Q pilot i ic Resulting req Resulting Q pilot , it means pilot quality at the receiver exceeds Q pilot If Q pilot ic x% of time (x is the fixed cell edge cover- age probability). The cell whose Q pilot i ic is the highest one enters the active set as best server ( Q pilot BS ic ) and the best carrier (icBS) of the best server, BS, will be the carrier used by other transmitters of the active set (when active set size is greater than 1). Pilot is available. Resulting If Q pilot req Q pilot , no cell (i,ic) can enter the active set. Pilot is unavailable. Then, pilot qualities at the receiver from transmitters i (except the best server) on the best carrier of the best server, icBS, are recalculated to determine the entire receiver active set (when active set size is greater than 1). Same formulas and DL calculation method are used to update I 0 ic BS value and determine Q pilot i ic BS . We have: BTS P c i ic Q pilot i ic = ------------------------------------------------DL I 0 ic With, DL DL DL DL DL term I 0 ic = P tot i ic + I extra ic + I inter – carrier ic + I inter – techno log y ic + N 0 for the total noise option, And DL DL DL DL DL term I 0 ic = I intra ic + I extra ic + I inter – carrier ic + I inter – techno log y ic + N 0 – 1 – BTS P c i ic for the without pilot option. Other cells (i,icBS) in the active set must satisfy the following criteria: Q pilot i ic BS – Q pilot BS ic BS AS_threshold i BS ic BS i ic BS neighbour list i BS ic BS (optionally) Number of Cells in Active Set This is a user-specified input in the Terminal properties. It corresponds to the active set size. Thermal Noise This parameter is calculated as described above (3rd step). I0 (Best Server) I0 (Best server) is the total noise received at the receiver on icBS. The notation “Best server” refers to the best server of active set. This is relevant when using the calculation option “Without pilot”. In this case, it informs that the pilot signal of the best server (BS,icBS) is deducted from the total noise. Downlink Macro-Diversity Gain This parameter is calculated as described above (5th step). 6.5.1.1.2 Downlink Sub-Menu The Downlink sub-menu may contain R99-related results and HSDPA-related results when an HSPA bearer user is modelled. • R99-related Results Atoll calculates the traffic channel quality from each cell (k,icBS) of the receiver’s active set at the receiver. No power control is performed as in simulations. Here, Atoll determines the downlink traffic channel quality at the receiver for the maximum allowed traffic channel power per transmitter. Then, after combination, the total downlink traffic channel quality is evaluated and compared with the specified target quality. © Forsk 2009 AT281_TRG_E1 251 Technical Reference Guide Eb/Nt Target DL Eb/Nt target ( Q req ) is defined for a given R99 bearer, a mobility type and a reception equipment. This parameter is available in the R99 Bearer Selection table. Notes: • Compressed mode is operated when: - A mobile supporting compressed mode is connected to a cell located on a site with a compressed-mode-capable equipment And - Either the received Ec/I0 is lower than the Ec/I0 activation threshold (Global parameters): Resulting Q pilot CM – activation Q pilot , - Or the pilot RSCP is lower than the pilot RSCP activation threshold (Global parameters): CM – activation P c RSCP pilot • . When compressed mode is activated, the downlink Eb/Nt target is increased by the value DL user-defined for the DL Eb/Nt target increase field (Global parameters), Q req . Required transmitter power on traffic channels req The calculation of the required transmitter power on traffic channels ( P tch ) may be divided into three steps. DL 1st step: Q max k ic BS evaluation for each cell DL Let us assume the following notation: Eb/Nt max corresponds to Q max Therefore, for each cell (k,icBS), we have: DL BTS P b – max k ic BS DL DL - G DL Q max k ic BS = ------------------------------------------------------------p G Div DL N tot ic BS max P tch DL With P b – max k ic BS = -----------LT k DL DL DL DL DL term and N tot ic BS = I intra ic BS + I extra ic BS + I inter – carrier ic BS + I inter – techno log y ic BS + N 0 Where max P tch is the maximum power allowed on traffic channels. This parameter is user-defined in the R99 Radio Bearers table. DL N tot ic BS is the total noise at the receiver on the best carrier of the best server. DL I intra ic BS is the intra-cell interference at the receiver on the best carrier of the best server. P SCH k ic BS DL I intra ic BS = P DL k ic – BTS F ortho P DL k ic – ----------------------------------- tot tot BS BS L T DL I extra ic BS is the extra-cell interference at the receiver on the best carrier of the best server. DL I extra ic BS = Ptot j icBS DL j j k DL I inter – carrier ic BS is the inter-carrier interference at the receiver on the best carrier of the best server. Ptot j icadj DL DL I inter – carrier ic BS txj j = ------------------------------------------RF ic BS ic adj icadj is a carrier adjacent to icBS. RF ic BS ic adj is the interference reduction factor, defined between ic and icadj and set to a value different from 0. DL I inter – techno log y ic BS is the inter-technology interference at the receiver on the best carrier of the best server. DL I inter – techno log y ic BS = Tx P Transmitted ic i L---------------------------------------------Tx Tx m ICP ni 252 total ic i ic BS AT281_TRG_E1 © Forsk 2009 Chapter 6: UMTS HSPA Networks ic i is the i Tx m ICP ic ic i BS th interfering carrier of an external transmitter is the inter-technology Channel Protection between the signal transmitted by Tx and received by m assuming the frequency gap between ic i (external network) and ic BS . 2nd step: Calculation of the total traffic channel quality DL Q MAX is the traffic channel quality at the receiver on icBS after signal combination of all the transmitters k of the active set. On downlink, if there is no handoff, we have: DL DL Q MAX ic BS = Q max k ic BS For any other handoff status, we have: DL DL Q MAX ic BS = f rake efficiency Qmax k icBS DL k Where DL f rake efficiency is the downlink rake efficiency factor defined in Terminal properties. req 3rd step: P tch calculation DL Q req req - P max P tch = ------------------------------tch DL Q MAX ic BS Notes: • Compressed mode is operated when: - A mobile supporting compressed mode is connected to a cell located on a site with a compressed-mode-capable equipment And - Either the received Ec/I0 is lower than the Ec/I0 activation threshold (Global parameters): Resulting Q pilot CM – activation Q pilot . - Or the pilot RSCP is lower than the pilot RSCP activation threshold (Global parameters): CM – activation P c RSCP pilot • When compressed mode is activated, the downlink Eb/Nt target is increased by the value DL user-defined for the DL Eb/Nt target increase field (Global parameters), Q req . In this DL DL Q req Q req req - P max case, we have: P tch = --------------------------------tch DL Q MAX ic BS Eb/Nt Max for Each Cell of Active Set For each cell (k,icBS), we have: DL BTS P b – max k ic BS DL DL - G DL Q max k ic BS = ------------------------------------------------------------p G Div DL N tot ic BS max P tch DL With P b – max k ic BS = -----------LT k DL DL DL DL DL term N tot ic BS = I intra ic BS + I extra ic BS + I inter – carrier ic BS + I inter – techno log y ic BS + N 0 max req P SCH k ic BS P tch – P tch DL - – 1 – BTS max (-----------------------------I intra ic BS = P DL k ic – BTS F ortho P DL k ic – ------------------------------------,0) tot tot BS BS L L T DL I extra ic BS = Tk Ptot j icBS DL j j k Ptot j icadj DL DL txj j I inter – carrier ic BS = ------------------------------------------RF ic BS ic adj © Forsk 2009 AT281_TRG_E1 253 Technical Reference Guide Tx DL I inter – techno log y ic BS = P Transmitted ic i L---------------------------------------------Tx Tx m ICP ni ic i ic BS total Where req P tch is the required transmitter power on traffic channels. Eb/Nt Max DL Q MAX is the traffic channel quality at the receiver on icBS after signal combination of all the transmitters k of the active set. On downlink, if there is no handoff, we have: DL DL Q MAX ic BS = Q max k ic BS For any other handoff status, we have: DL DL Q MAX ic BS = f rake efficiency Qmax k icBS DL k Where DL f rake efficiency is the downlink rake efficiency factor defined in Terminal properties. DL DL DL DL DL Therefore, the service on the downlink traffic channel is available if Q MAX ic BS Q req (or Q MAX ic BS Q req Q req when compressed mode is activated). Effective Eb/Nt DL Q eff is the effective traffic channel quality at the receiver on icBS. DL DL DL DL DL DL DL Q eff = min Q MAX Q req (or Q eff = min Q MAX Q req Q req when compressed mode is activated). Downlink Soft Handover Gain DL G SHO corresponds to the DL soft handover gain. DL Q MAX ic BS DL G SHO = ----------------------------------------------------DL max Q max k ic BS DL DL max Q max k ic BS corresponds to the highest Q max k ic BS value. • HSDPA-related Results Atoll determines the best HSDPA bearer that the user can obtain. The HSDPA bearer user is processed as if he is the only user in the cell i.e. he uses the entire HSDPA power available in the cell. For further information on the fast link adaptation modelling, see "Fast Link Adaptation Modelling" on page 214. HS-PDSCH Ec/Nt Atoll calculates the best HS-PDSCH quality (HS-PDSCH Ec/Nt). The way of calculating it depends on the selected option in the transmitters global parameters (HSDPA part): CQI based on CPICH quality or CQI based on HS-PDSCH quality. For further details on the HS-PDSCH quality calculation, see either "HS-PDSCH Quality Calculation" on page 216 if the selected option is "CQI based on CPICH quality" or "HS-PDSCH Quality Calculation" on page 221 if the selected option is "CQI based on HS-PDSCH quality". HS-SCCH Ec/Nt When the HS-SCCH power allocation strategy is dynamic, this parameter corresponds to the HS-SCCH Ec/Nt threshold defined for the selected mobility type. When the HS-SCCH power allocation strategy is static, the HS-SCCH Ec/Nt is calculated from the fixed HS-SCCH power. We have: BTS P c ic i Ec ------- ic for the total noise option, = ----------------------------------- Nt HS – SCCH DL N tot ic And 254 AT281_TRG_E1 © Forsk 2009 Chapter 6: UMTS HSPA Networks BTS P c ic i Ec ------- ic - for the without useful signal option. = -------------------------------------------------------------------------------------------------------------------------------------- Nt HS – SCCH DL term N tot ic – 1 – F ortho 1 – F MUD BTS P c ic i With DL DL DL DL DL term N tot ic = I intra ic + I extra ic + I inter – carrier ic + I inter – techno log y ic + N 0 DL DL DL P SCH ic P SCH ic DL term - – BTS P tot ic – ----------------------I intra ic = P tot ic + BTS 1 – F MUD 1 – F ortho P tot ic – ---------------------- LT LT txi txi txi DL I extra ic = DL P tot ic txj j i Ptot icadj DL DL txj j I inter – carrier ic = -------------------------------------RF ic ic adj icadj is a carrier adjacent to ic. RF ic ic adj is the interference reduction factor, defined between ic and icadj and set to a value different from 0. DL I inter – techno log y ic is the inter-technology interference at the receiver on ic. DL I inter – techno log y ic = ni ic i is the i th Tx P Transmitted ic i -----------------------------------------Tx Tx m L total ICP ic ic i interfering carrier of an external transmitter Tx m ICP ic ic is the inter-technology Channel Protection between the signal transmitted by Tx and received by m assuming i the frequency gap between ic i (external network) and ic . P HS – SCCH ic P c ic = -------------------------------------i LT i And L path L Tx L term L body L indoor M Shadowing – Ec Io L T = -------------------------------------------------------------------------------------------------------------------------------------------------G Tx G term term term BTS , F ortho , F MUD and N 0 are defined in "Inputs" on page 192. CQI It corresponds to the HS-PDSCH CQI. The way of calculating it depends on the selected option in the transmitters global parameters (HSDPA part): CQI based on CPICH quality or CQI based on HS-PDSCH quality. For further details on the HS-PDSCH quality calculation, see either "HS-PDSCH CQI Determination" on page 218 if the selected option is "CQI based on CPICH quality" or "HS-PDSCH CQI Determination" on page 223 if the selected option is "CQI based on HS-PDSCH quality". RLC Peak Rate Knowing the HS-PDSCH CQI, Atoll calculates the best HSDPA bearer that can be used and selects a bearer compatible with cell and terminal user equipment HSDPA capabilities. Once the bearer selected, Atoll determines the RLC peak rate DL that can be provided to the user, R RLC – peak . For further details of the HSDPA bearer selection, see "HSDPA Bearer Selection" on page 218. Bearer Consumption Atoll provides this result for packet (HSPA - Constant Bit Rate) service users only. The minimum bit rate required by the service is allocated to these users. Therefore, they parly consume the HSDPA bearer. The bearer consumption expressed in %, C HSDPABearer , is calculated as follows: DL R Guaranteed C HSDPABearer = -------------------------------------------------------------------DL R RLC – peak I HSDPABearer © Forsk 2009 AT281_TRG_E1 255 Technical Reference Guide 6.5.1.1.3 Uplink Sub-Menu The Uplink sub-menu may contain R99-related results and HSUPA-related results when an HSPA bearer user is modelled. • R99-related Results For each cell (k,icBS) in the receiver’s active set, Atoll calculates uplink traffic channel quality from receiver. No power control is performed as in simulations. Here, Atoll determines the uplink traffic channel quality at the cell for the maximum terminal power allowed. Then, the total uplink traffic channel quality is evaluated with respect to the receiver handover status. From this value, Atoll calculates the terminal power required to obtain the R99 bearer and compares it to the maximum terminal power allowed. Max Terminal Power max Max terminal power ( P term ) is an input user-defined for each terminal. It corresponds to the terminal’s maximum power. Required Terminal Power req The calculation of the terminal power required to obtain an R99 bearer ( P term – R99 ) may be divided into three steps. UL 1st step: Q max k ic BS evaluation for each cell For each cell (k,icBS) in the receiver’s active set, we have: UL term P b – max k ic BS UL UL - G UL Q max k ic BS = -------------------------------------------------------------p G Div UL N tot k ic BS max UL P term 1 – r c UL With P b – max k ic BS = -----------------------------------------LT k UL N tot k ic BS is the total noise at the transmitter on the best carrier of the best server. This value is calculated from the cell uplink load factor X UL k ic BS . tx N0 UL N tot k ic BS = ----------------------------------------UL 1 – X k ic BS tx N 0 is the transmitter thermal noise. 2nd step: Calculation of the total traffic channel quality UL Q MAX ic BS is the traffic channel quality at the transmitter on icBS after signal combination of all the transmitters k of the active set. UL UL If there is no handoff (1/1): Q MAX ic BS = Q max k ic BS For soft handoff (2/2): UL UL UL Q MAX ic BS = G macro – diversity 2 links max Q max k ic BS UL G macro – diversity 2 links is the uplink macro-diversity gain. This parameter is determined from the fixed cell edge coverage probability and the uplink Eb/Nt standard deviation. When the option “Shadowing taken into account” is not selected (Prediction properties), Atoll considers the uplink macro-diversity gain defined by the user in Global parameters. UL UL max Q max k ic BS corresponds to the highest Q max k ic BS value. For soft-soft handoffs (3/3): UL UL UL Q MAX ic BS = G macro – diversity 3 links max Q max k ic BS UL G macro – diversity 3 links is the uplink macro-diversity gain. This parameter is determined from the fixed cell edge coverage probability and the uplink Eb/Nt standard deviation. When the option “Shadowing taken into account” is not selected (Prediction properties), Atoll considers the uplink macro-diversity gain defined by the user in Global parameters. For softer and softer-softer handoffs (1/2 and 1/3): UL UL Q MAX ic BS = f rake efficiency Qmax k icBS UL k For softer-soft handoffs (2/3), there are two possibilities. If the MRC option is selected (option available in Global parameters), we have: 256 AT281_TRG_E1 © Forsk 2009 Chapter 6: UMTS HSPA Networks UL UL UL Q MAX ic BS = G macro – diversity 2 links max f rake efficiency UL UL Q max k ic BS Q max k on the same site k on the same site k ic BS Else, UL UL UL Q MAX ic BS = G macro – diversity 2 links max Q max k ic BS req 3rd step: P term – R99 calculation req P term – R99 is the required terminal power. UL Q req req - P max P term – R99 = ------------------------------term UL Q MAX ic BS UL Q req is the uplink traffic quality target defined by the user for a given reception equipment, a given R99 bearer and a given mobility type. This parameter is available in the R99 Bearer Selection table. Notes: • Compressed mode is operated when: - A mobile supporting compressed mode is connected to a cell located on a site with a compressed-mode-capable equipment, and - The received Ec/I0 is lower than the Ec/I0 activation threshold (Global parameters): Resulting Q pilot CM – activation Q pilot . - The pilot RSCP is lower than the pilot RSCP activation threshold (Global parameters): CM – activation P c RSCP pilot • When compressed mode is activated, the uplink Eb/Nt target is increased by the value UL user-defined for the UL Eb/Nt target increase field (Global parameters), Q req . In this UL UL Q req Q req req - P max case, we have: P term – R99 = --------------------------------term UL Q MAX ic BS req max Therefore, the service on the uplink traffic channel is available if P term – R99 P term . Eb/Nt Max For each cell (k,icBS) in the receiver’s active set, we have: UL term P b – max k ic BS UL UL - G UL Q max k ic BS = -------------------------------------------------------------p G Div UL N tot k ic BS max UL P term 1 – r c UL With P b – max k ic BS = -----------------------------------------LT k UL N tot k ic BS is the total noise at the transmitter on the best carrier of the best server. This value is calculated from the cell uplink load factor X UL k ic BS . tx max req N0 P term – P term – R99 UL - + 1 – term max (----------------------------------------------N tot k ic BS = -----------------------------------------,0) UL LT 1 – X k ic BS k tx N 0 is the transmitter thermal noise. UL Q MAX ic BS is the traffic channel quality at the transmitter on icBS after signal combination of all the transmitters k of the active set. UL UL If there is no handoff (1/1): Q MAX ic BS = Q max k ic BS For soft handoff (2/2): UL UL UL Q MAX ic BS = G macro – diversity 2 links max Q max k ic BS UL G macro – diversity 2 links is the uplink macro-diversity gain. This parameter is determined from the fixed cell edge coverage probability and the uplink Eb/Nt standard deviation. When the option “Shadowing taken into account” is not selected (Prediction properties), Atoll considers the uplink macro-diversity gain defined by the user in Global parameters. © Forsk 2009 AT281_TRG_E1 257 Technical Reference Guide UL UL max Q max k ic BS corresponds to the highest Q max k ic BS value. For soft-soft handoffs (3/3): UL UL UL Q MAX ic BS = G macro – diversity 3 links max Q max k ic BS UL G macro – diversity 3 links is the uplink macro-diversity gain. This parameter is determined from the fixed cell edge coverage probability and the uplink Eb/Nt standard deviation. When the option “Shadowing taken into account” is not selected (Prediction properties), Atoll considers the uplink macro-diversity gain defined by the user in Global parameters. For softer and softer-softer handoffs (1/2 and 1/3): UL UL Q MAX ic BS = f rake efficiency Qmax k icBS UL k For softer-soft handoffs (2/3), there are two possibilities. If the MRC option is selected (option available in Global parameters), we have: UL UL UL Q MAX ic BS = G macro – diversity 2 links max f rake efficiency UL UL Q max k ic BS Q max k on the same site k on the same site k ic BS Else, UL UL UL Q MAX ic BS = G macro – diversity 2 links max Q max k ic BS Effective Eb/Nt UL Q eff is the effective traffic channel quality at the transmitter on icBS. UL UL UL UL UL UL UL Q eff = min Q MAX Q req (or Q eff = min Q MAX Q req Q req when compressed mode is activated). Uplink Soft Handover Gain UL G SHO corresponds to the uplink soft handover gain. UL Q MAX ic BS UL G SHO = ----------------------------------------------------UL max Q max k ic BS UL UL max Q max k ic BS corresponds to the highest Q max k ic BS value. • HSUPA-related Results Atoll determines the best HSUPA bearer that the user can obtain. The HSUPA bearer user is processed as if he is the only user in the cell i.e. he uses the entire remaining load of the cell. For further information on the HSUPA bearer selection, see "HSUPA Bearer Allocation Process" on page 228. Required E-DPDCH Ec/Nt req Ec It corresponds to the E-DPDCH Ec/Nt required to obtain the HSUPA bearer ( ------- ). This value is defined for an Nt E – DPDCH HSUPA bearer ( Index HSUPABearer ) and a number of retransmissions ( N Rtx ) in the HSUPA Bearer Selection table. Required Terminal Power req Ec req From ------- , Atoll calculates the terminal power required to obtain the HSUPA bearer, P term – HSUPA . Nt E – DPDCH Ec req req UL P term – HSUPA = ------- L T N tot Nt E – DPDCH With UL UL intra tx N tot ic = 1 – F MUD term I tot UL extra ic + I tot UL tx ic + I inter – carrier ic + N 0 L path L Tx L term L body L indoor M Shadowing – Eb Nt UL L T = -----------------------------------------------------------------------------------------------------------------------------------------------------------G Tx G term tx UL intra term , F MUD , I tot 258 UL extra , I tot UL tx , I inter – carrier and N 0 are defined in "Inputs" on page 192. AT281_TRG_E1 © Forsk 2009 Chapter 6: UMTS HSPA Networks RLC Peak Rate Atoll selects the best HSUPA bearer from the HSUPA compatible bearers. This is the HSUPA bearer with the highest poUL R RLC – peak Index HSUPABearer tential throughput ( ------------------------------------------------------------------------------------ ) where: N Rtx Index HSUPABearer • req Ec max Ec ------- ------- Nt E – DPDCH Nt E – DPDCH • And P term – HSUPA P term max req With max Ec ------- : the maximum E-DPDCH Ec⁄Nt allowed. Nt E – DPDCH max P term : the maximum terminal power allowed. UL After selecting the HSUPA bearer, Atoll determines the corresponding RLC peak rate, R RLC – peak . Application Throughput UL Atoll displays the provided application throughput ( T application ). The application throughput represents the net throughput after deduction of coding (redundancy, overhead, addressing, etc.). This one is calculated as follows: UL R RLC –p eak 1 – BLER HSUPA SF Rate – R UL T application M b = -------------------------------------------------------------------------------------------------------------------------N Rtx Where: BLER HSUPA is the residual BLER after N Rtx retransmissions. It is read in the quality graph defined for the quartet “reception equipment-selected bearer-number of retransmissions-mobility” (HSUPA Quality Graphs tab in the Reception equipment properties). This graph describes the variation of BLER as a function of the measured quality (E-DPDCH Ec/Nt). Knowing the E-DPDCH Ec/Nt, Atoll finds the corresponding BLER. SF Rate and R respectively represent the scaling factor between the application throughput and the RLC (Radio Link Control) throughput and the throughput offset. These two parameters model the header information and other supplementary data that does not appear at the application level. They are defined in the service properties. Bearer Consumption Atoll provides this result for packet (HSPA - Constant Bit Rate) service users only. The minimum bit rate required by the service is allocated to these users. Therefore, they parly consume the HSUPA bearer. The bearer consumption expressed in %, C HSUPABearer , is calculated as follows: UL R Guaranteed C HSUPABearer = -------------------------------------------------------------------UL R RLC – peak I HSUPABearer 6.5.2 Coverage Studies Let us assume each pixel on the map corresponds to a probe receiver with a terminal, a mobility type and a service. This receiver does not create any interference. You can make the coverage prediction for a specific carrier or for all carriers of the main frequency band for the selected terminal. If you have selected a dual-band terminal, you can make the coverage prediction on a specific carrier or on all carriers of any frequency band for the selected terminal, or for all the carriers of all the frequency bands. Coverage predictions are based on parameters that can be either simulation results, or user-defined cell inputs. 6.5.2.1 Pilot Reception Analysis For further details of calculation formulas and methods, please refer to Definitions and formulas part, and Point analysis – AS analysis tab – Pilot sub-menu part. We consider the following cases: 1st case: Analysis Based on a Specific Carrier The carrier that can be used by transmitters is fixed. In this case, for each transmitter i containing the receiver in its calculation area and using the selected carrier, Atoll calculates the pilot quality at the receiver on this carrier icgiven. Then, it determines the best serving transmitter BS using the carrier icgiven ( Q pilot ic given ) and calculates the best pilot quality BS received with a fixed cell edge coverage probability, Resulting Q pilot ic given . Atoll displays the best pilot quality received with a fixed cell edge coverage probability. © Forsk 2009 AT281_TRG_E1 259 Technical Reference Guide 2nd case: Analysis Based on All Carriers Atoll proceeds as in point predictions. It determines the best carrier of each transmitter i containing the receiver in its calculation area and using a frequency band supported by the receiver’s terminal. The best carrier selection depends on the option selected for the site equipment (UL minimum noise, DL minimum power, random, sequential) and is based on the UL load percentage and the downlink total power of cells (simulation results or cell properties). Atoll calculates the pilot quality at the receiver from these transmitters on their best carriers and determines the best serving transmitter BS on its best carrier icBS ( Q pilot ic BS ). Then, it calculates the best pilot quality received with a fixed cell edge coverage probaBS bility, Resulting Q pilot ic BS . Atoll displays the best pilot quality received with a fixed cell edge coverage probability. 3rd case: Analysis based on all carriers of any frequency band (for dual-band terminals with priority defined on frequency bands only) The frequency band that can be used is fixed. Atoll determines the best carrier of each transmitter i containing the receiver in its calculation area and using the selected frequency band. The best carrier selection depends on the option selected for the site equipment (UL minimum noise, DL minimum power, random, sequential) and is based on the UL load percentage and the downlink total power of cells (simulation results or cell properties). Then, Atoll calculates the pilot quality at the receiver from these transmitters on their best carriers and determines the best serving transmitter BS on its best carrier icBS ( Q pilot ic BS ). Then, it calculates the best pilot quality received with a fixed cell edge coverage probability, BS Resulting Q pilot ic BS . Atoll displays the best pilot quality received with a fixed cell edge coverage probability. 6.5.2.1.1 Prediction Study Inputs The Pilot Reception Analysis depends on the downlink total transmitted power of cells. This parameter can be either a simulation output, or a user-defined cell input. In the last case, when no value is defined in the Cells table for the total transmitted power, Atoll considers 50% of the maximum power as default value (i.e. 40 dBm if the maximum power is set to 43 dBm). 6.5.2.1.2 Study Display Options Single colour Resulting Atoll displays a coverage if Q pilot req ic Q pilot . Coverage consists of a single layer with a unique colour req ( ic = ic BS or ic given ). Q pilot is a target value defined in the Mobility table by the user. Colour per transmitter Resulting Atoll displays a coverage if Q pilot req ic Q pilot ( ic = ic BS or ic given ). Coverage consists of several layers with asso- ciated colours. There is a layer per transmitter with no intersection between layers. Layer colour is the colour assigned to the best serving transmitter BS. Colour per mobility In this case, receiver is not completely defined and no mobility is assigned. Coverage consists of several layers with a layer per user-defined mobility defined in Mobility sub-folder. For each layer, Resulting area is covered if Q pilot req ic Q pilot ( ic = ic BS or ic given ). Each layer is assigned a colour and displayed with inter- sections between layers. Colour per probability This display option is available only if analysis is based on all simulations in a group (i.e. if you select a group of simulations and the “All” option in the Simulation tab of prediction properties). Coverage consists of several layers with a layer per user-defined probability level defined in the Display tab (Prediction properties). For each layer, area is covered if Resulting Q pilot req ic Q pilot ( ic = ic BS or ic given ) in the required number of simulations. Each layer is assigned a colour and displayed with intersections between layers. Colour per cell edge coverage probability Coverage consists of several layers with a layer per user-defined cell edge coverage probability, p, defined in the Display Resulting tab (Prediction properties). For each layer, area is covered if Q pilot req ic p Q pilot ( ic = ic BS or ic given ). Each layer is assigned a colour and displayed with intersections between layers. 260 AT281_TRG_E1 © Forsk 2009 Chapter 6: UMTS HSPA Networks Colour per quality level (Ec/I0) Coverage consists of several layers with a layer per user-defined quality threshold defined in the Display tab (Prediction Resulting properties). For each layer, area is covered if Q pilot ic Q pilot threshold ( ic = ic BS or ic given ). Each layer is assigned a colour and displayed with intersections between layers. Colour per quality margin (Ec/I0 margin) Coverage consists of several layers with a layer per user-defined quality margin defined in the Display tab (Prediction propResulting erties). For each layer, area is covered if Q pilot req ic – Q pilot Q pilot m arg in ( ic = ic BS or ic given ). Each layer is assigned a colour and displayed with intersections between layers. 6.5.2.2 Downlink Service Area Analysis As in point predictions, Atoll calculates traffic channel quality at the receiver for each cell (k,ic) (with ic=icBS or icgiven) in the receiver’s active set. No power control is performed as in simulations. Here, Atoll determines downlink traffic channel quality at the receiver for a maximum allowed traffic channel power for transmitters. Then, the total downlink traffic channel DL quality ( Q MAX ic ) is evaluated after recombination. Note: • Best server and active set determination is performed as in point prediction (AS analysis). Atoll displays traffic channel quality at the receiver for transmitters in active set on the carrier ic ( ic BS or ic given ). For further details of calculation formulas and methods, see "Downlink Sub-Menu" on page 251. 6.5.2.2.1 Prediction Study Inputs The Downlink Service Area Analysis depends on the downlink total transmitted power of cells. This parameter can be either a simulation output, or a user-defined cell input. In the last case, when no value is defined in the Cells table for the total transmitted power, Atoll considers 50% of the maximum power as default value (i.e. 40 dBm if the maximum power is set to 43 dBm). 6.5.2.2.2 Study Display Options Single colour DL DL DL DL DL Atoll displays a coverage with a unique colour if Q MAX ic Q req (or Q MAX ic Q req Q req if compressed mode is activated). DL Q req is the downlink traffic quality target defined by the user for a given reception equipment, a given R99 bearer and a given mobility type. This parameter is available in the R99 Bearer Selection table. DL Q req is the DL Eb/Nt target increase; this parameter is user-defined in the Global parameters. Colour per transmitter DL DL DL DL DL Atoll displays a coverage if Q MAX ic Q req (or Q MAX ic Q req Q req if compressed mode is activated). Coverage consists of several layers with associated colours. There is a layer per transmitter with no intersection between layers. Layer colour is the colour assigned to best serving transmitter. Colour per mobility In this case, receiver is not completely defined and no mobility is assigned. Coverage consists of several layers with a DL DL layer per user-defined mobility defined in Mobility sub-folder. For each layer, area is covered if Q MAX ic Q req (or DL DL DL Q MAX ic Q req Q req if compressed mode is activated). Each layer is assigned a colour and displayed with intersections between layers. Colour per service In this case, receiver is not completely defined and no service is assigned. Coverage consists of several layers with a layer DL DL per user-defined service defined in Services sub-folder. For each layer, area is covered if Q MAX ic Q req (or DL DL DL Q MAX ic Q req Q req if compressed mode is activated). Each layer is assigned a colour and displayed with intersections between layers. © Forsk 2009 AT281_TRG_E1 261 Technical Reference Guide Colour per probability This display option is available only if analysis is based on all simulations in a group (i.e. if you select a group of simulations and the “All” option in the Simulation tab of prediction properties). Coverage consists of several layers with a layer per user-defined probability level defined in the Display tab (Prediction properties). For each layer, area is covered if DL DL Q MAX ic Q req in the required number of simulations. Each layer is assigned a colour and displayed with intersections between layers. Colour per cell edge coverage probability Coverage consists of several layers with a layer per user-defined cell edge coverage probability, p, defined in the Display DL DL DL DL DL tab (Prediction properties). For each layer, area is covered if Q MAX ic p Q req (or Q MAX ic Q req Q req if compressed mode is activated). Each layer is assigned a colour and displayed with intersections between layers. Colour per maximum quality level (max Eb/Nt) Coverage consists of several layers with a layer per user-defined quality threshold defined in the Display tab (Prediction DL properties). For each layer, area is covered if Q MAX ic Threshold . Each layer is assigned a colour and displayed with intersections between layers. Colour per effective quality level (Effective Eb/Nt) Coverage consists of several layers with a layer per user-defined quality threshold defined in the Display tab (Prediction DL properties). For each layer, area is covered if Q eff ic Threshold . Each layer is assigned a colour and displayed with DL DL DL DL DL DL DL intersections between layers. Q eff ic = min Q MAX ic Q req (or Q eff ic = min Q MAX ic Q req Q req when compressed mode is activated). Colour per quality margin (Eb/Nt margin) Coverage consists of several layers with a layer per user-defined quality margin defined in the Display tab (Prediction propDL DL DL DL DL erties). For each layer, area is covered if Q MAX ic – Q req M arg in (or Q MAX ic – Q req Q req M arg in when compressed mode is activated). Each layer is assigned a colour and displayed with intersections between layers. Colour per required power req Atoll calculates the downlink required power, P tch ic , as follows: DL Q req req - P max P tch ic = -----------------------tch DL Q MAX ic Where DL Q req is the Eb/Nt target on downlink. This parameter, available in the R99 Bearer Selection table, is user-defined for a given R99 bearer, a given reception equipment and a mobility type. max P tch is a user-defined input for each bearer related to a service. It corresponds to the maximum allowable traffic channel power for a transmitter. DL DL Q req Q req req - P max When compressed mode is activated, we have: P tch ic = --------------------------------tch . DL Q MAX ic Coverage consists of several layers with a layer per user-defined required power threshold defined in the Display tab req (Prediction properties). For each layer, area is covered if P tch ic Threshold . Each layer is assigned a colour and displayed with intersections between layers. Colour per required power margin Coverage consists of several layers with a layer per user-defined power margin defined in the Display tab (Prediction propreq max erties). For each layer, area is covered if P tch ic – P tch M arg in . Each layer is assigned a colour and displayed with intersections between layers. 6.5.2.3 Uplink Service Area Analysis As in point prediction, Atoll calculates uplink traffic channel quality from receiver for each cell (k,ic) (with ic=icBS or icgiven) in receiver active set. No power control simulation is performed. Atoll determines uplink traffic channel quality at the trans- 262 AT281_TRG_E1 © Forsk 2009 Chapter 6: UMTS HSPA Networks UL mitter for the maximum terminal power allowed. Then, the total uplink traffic channel quality ( Q MAX ic ) is evaluated with respect to receiver handover status. Note: • Best server and active set determination is performed as in point prediction (AS analysis). Atoll displays traffic channel quality at transmitters in active set on the carrier ic ( ic BS or ic given ) received from the receiver. For further details of calculations formulas and methods, see "Uplink Sub-Menu" on page 256. 6.5.2.3.1 Prediction Study Inputs The Uplink Service Area Analysis depends on the UL load factor of cells. This parameter can be either a simulation output, or a user-defined cell input. In the last case, when no value is defined in the Cells table for the uplink load factor, Atoll uses 50% as default value. 6.5.2.3.2 Study Display Options Single colour UL UL UL UL UL Atoll displays a coverage if Q MAX ic Q req (or Q MAX ic Q req Q req if compressed mode is activated). Coverage colour is unique. UL Q req is defined for a reception equipment, a R99 bearer and a mobility type. This parameter is available in the R99 Bearer Selection table. UL Q req is the UL Eb/Nt target increase; this parameter is user-defined in the Global parameters. Colour per transmitter UL UL UL UL UL Atoll displays a coverage if Q MAX ic Q req (or Q MAX ic Q req Q req if compressed mode is activated). Coverage consists of several layers with associated colours. There is a layer per transmitter with no intersection between layers. Layer colour is the colour assigned to best server transmitter. Colour per mobility In this case, receiver is not completely defined and no mobility is assigned. Coverage consists of several layers with a UL UL layer per user-defined mobility defined in Mobility sub-folder. For each layer, area is covered if Q MAX ic Q req (or UL UL UL Q MAX ic Q req Q req if compressed mode is activated). Each layer is assigned a colour and displayed with intersections between layers. Colour per service In this case, receiver is not completely defined and no service is assigned. Coverage consists of several layers with a layer UL UL per user-defined service defined in Services sub-folder. For each layer, area is covered if Q MAX ic Q req (or UL UL UL Q MAX ic Q req Q req if compressed mode is activated). Each layer is assigned a colour and displayed with intersections between layers. Colour per probability This display option is available only if analysis is based on all simulations in a group (i.e. if you select a group of simulations and the “All” option in the Simulation tab of prediction properties). Coverage consists of several layers with a layer per user-defined probability level defined in the Display tab (Prediction properties). For each layer, area is covered if UL UL UL UL UL Q MAX ic Q req (or Q MAX ic Q req Q req if compressed mode is activated) in the required number of simulations. Each layer is assigned a colour and displayed with intersections between layers. Colour per maximum quality level (Max Eb/Nt) Coverage consists of several layers with a layer per user-defined quality threshold defined in the Display tab (Prediction UL properties). For each layer, area is covered if Q MAX ic Threshold . Each layer is assigned a colour and displayed with intersections between layers. © Forsk 2009 AT281_TRG_E1 263 Technical Reference Guide Colour per effective quality level (Effective Eb/Nt) Coverage consists of several layers with a layer per user-defined quality threshold defined in the Display tab (Prediction UL properties). For each layer, area is covered if Q effective ic Threshold . Each layer is assigned a colour and displayed with intersections between layers. UL UL UL UL UL UL UL Q eff ic = min Q MAX ic Q req (or Q eff ic = min Q MAX ic Q req Q req when compressed mode is activated). Colour per quality margin (Eb/Nt margin) Coverage consists of several layers with a layer per user-defined quality margin defined in the Display tab (Prediction propUL UL UL UL UL erties). For each layer, area is covered if Q MAX ic – Q req M arg in (or Q MAX ic – Q req Q req M arg in if compressed mode is activated). Each layer is assigned a colour and displayed with intersections between layers. Colour per required power Coverage consists of several layers with a layer per user-defined power threshold defined in the Display tab (Prediction req properties). For each layer, area is covered if P term – R99 ic Threshold . Each layer is assigned a colour and displayed with intersections between layers. Colour per required power margin Coverage consists of several layers with a layer per user-defined power margin defined in the Display tab (Prediction propreq max erties). For each layer, area is covered if P term – R99 ic – P term M arg in . Each layer is assigned a colour and displayed with intersections between layers. Colour per soft handover gain Coverage consists of several layers with a layer per soft handover gain value defined in the Display tab (Prediction propUL erties). For each layer, area is covered if G SHO Threshold . Each layer is assigned a colour and displayed with intersections between layers. 6.5.2.4 Downlink Total Noise Analysis Atoll determines the downlink total noise generated by cells. Ptot icadj DL DL N tot ic = txj j DL j --------------------------------------+ P tot ic + txj RF ic ic adj ni Tx P Transmitted ic i term + N0 -----------------------------------------Tx Tx m L total ICP ic ic i DL Downlink noise rise, NR DL ic , is calculated from the downlink total noise, N tot , as follows: term N0 - NR DL ic = – 10 log ------------ N DL tot 6.5.2.4.1 Study Inputs The Downlink Total Noise Analysis depends on the downlink total transmitted power of cells. This parameter can be either a simulation output, or a user-defined cell input. In the last case, when no value is defined in the Cells table for the total transmitted power, Atoll considers 50% of the maximum power as default value (i.e. 40 dBm if the maximum power is set to 43 dBm). 6.5.2.4.2 Analysis on All Carriers If all the carriers are selected, Atoll determines DL total noise for all the carriers. Then, allows the user to choose different colours. Colour per minimum noise level Coverage consists of several layers with a layer per user-defined noise level defined in the Display tab (Prediction propDL erties). For each layer, area is covered if minN tot ic Threshold . Each layer is assigned a colour and displayed with ic intersections between layers. 264 AT281_TRG_E1 © Forsk 2009 Chapter 6: UMTS HSPA Networks Colour per maximum noise level Coverage consists of several layers with a layer per user-defined noise level defined in the Display tab (Prediction propDL erties). For each layer, area is covered if maxN tot ic Threshold . Each layer is assigned a colour and displayed with ic intersections between layers. Colour per average noise level Coverage consists of several layers with a layer per user-defined noise level defined in the Display tab (Prediction propDL erties). For each layer, area is covered if averageN tot ic Threshold . Each layer is assigned a colour and displayed ic with intersections between layers. Colour per minimum noise rise Atoll displays bins where minNR DL ic Threshold . Coverage consists of several areas with an area per user-defined ic noise rise threshold defined in the Display tab. Each area is assigned a colour with intersections between areas. Colour per maximum noise rise Atoll displays bins where maxNR DL ic Threshold . Coverage consists of several areas with an area per user-defined ic noise rise threshold defined in the Display tab. Each area is assigned a colour with intersections between areas. Colour per average noise rise Atoll displays bins where averageNR DL ic Threshold . Coverage consists of several areas with an area per useric defined noise rise threshold defined in the Display tab. Each area is assigned a colour with intersections between areas. 6.5.2.4.3 Analysis on a Specific Carrier When only one carrier is analysed, Atoll determines DL total noise or DL noise rise on this carrier. In this case, the displayed coverage is the same for any selected display per noise level (average, minimum, maximum) or any display per noise rise (average, minimum, maximum). Colour per noise level Coverage consists of several layers with a layer per user-defined noise level defined in the Display tab (Prediction propDL erties). For each layer, area is covered if N tot ic Threshold . Each layer is assigned a colour and displayed with intersections between layers. Colour per noise rise Atoll displays bins where NR DL ic Threshold . Coverage consists of several areas with an area per user-defined noise rise threshold defined in the Display tab. Each area is assigned a colour with intersections between areas. 6.5.2.5 HSDPA Prediction Study When calculating the HSDPA coverage prediction, either you can take all the possible HSDPA radio bearers into consideration, or you can study a certain HSDPA radio bearer. Then, available display options depend on what you have selected. When considering all the HSDPA radio bearers, you can set display parameters: • • • To analyse the uplink and downlink A-DPCH qualities on the map, To analyse the HS-SCCH quality/power, To model fast link adaptation for a single HSDPA bearer user or for a defined number of HSDPA bearer users. When studying a certain HSDPA radio bearer, you can display areas where a certain RLC peak rate is available with different cell edge coverage probabilities (i.e. the probability of having a certain RLC peak rate). Let us assume each pixel on the map corresponds to one or several users with HSDPA capable terminal, mobility and HSDPA service. Each user may be using a specific carrier or all of them. Moreover, he does not create any interference. Note that the HSDPA service area is limited by the pilot quality and the A-DPCH quality. 6.5.2.5.1 Prediction Study Inputs Parameters used as input for the HSDPA prediction study are: • • • © Forsk 2009 The available HSDPA power of the cell, The downlink total transmitted power of the cell, The number of HSDPA users within the cell if the study is calculated for several users. AT281_TRG_E1 265 Technical Reference Guide These parameters can be either simulation outputs, or user-defined cell inputs. In the last case, when no value is defined in the Cells table for the total transmitted power and the number of HSDPA users, Atoll uses the following default values: • • Total transmitted power = 50% of the maximum power (i.e, 40 dBm if the maximum power is set to 43 dBm) Number of HSDPA users = 1 On the other hand, no default value is used for the available HSDPA power; this parameter must be defined by the user. 6.5.2.5.2 Study Display Options When considering all the HSDPA radio bearers, several display options are available in the study properties dialogue. They can be regrouped in four categories according to the objective of the study: • • • • To analyse the uplink and downlink A-DPCH qualities on the map, To analyse the HS-SCCH quality/power, To model fast link adaptation for a single HSDPA bearer user To model fast link adaptation for a defined number of HSDPA bearer users. When studying a certain HSDPA radio bearer, only one display option is available. It allows you to display where a certain RLC peak rate is available with different cell edge coverage probabilities. Analysis of UL And DL A-DPCH Qualities • Colour per Max A-DPCH Eb/Nt DL DL Atoll displays the A-DPCH quality at the receiver ( Q MAX ic ) for the best server on the carrier ic ( ic BS or ic given ). No power control is performed as in simulations. Here, Atoll determines downlink traffic channel quality at the receiver for a maximum traffic channel power allowed for the best server. For further details of calculation formulas and methods, please refer to Prediction studies: Point analysis – AS analysis tab – Downlink sub-menu part. Coverage consists of several layers with a layer per user-defined quality threshold defined in the Display tab (Prediction DL properties). For each layer, area is covered if Q MAX ic Threshold . Each layer is assigned a colour and displayed with intersections between layers. • Colour per Max A-DPCH Eb/Nt UL UL Atoll displays the A-DPCH quality at the best server ( Q MAX ic ) on the carrier ic ( ic BS or ic given ). No power control is performed as in simulations. Here, Atoll determines uplink traffic channel quality at the receiver for a maximum terminal power allowed. For further details of calculations formulas and methods, please refer to Point analysis – AS analysis tab – Uplink submenu part. Coverage consists of several layers with a layer per user-defined quality threshold defined in the Display tab (Prediction UL properties). For each layer, area is covered if Q MAX ic Threshold . Each layer is assigned a colour and displayed with intersections between layers. Analysis of The HS-SCCH Quality/Power • Colour per HS-SCCH Power This display option is relevant in case of dynamic HS-SCCH power allocation only. In this case, Atoll displays on each pixel the HS-SCCH power per HS-SCCH channel. Coverage consists of several layers with a layer per threshold. For each layer, area is covered if P HS – SCCH ic Threshold . Each layer is assigned a colour and displayed with intersections between layers. • Colour per HS-SCCH Ec/Nt This display option is relevant in case of static HS-SCCH power allocation only. In this case, Atoll displays on each pixel the HS-SCCH quality per HS-SCCH channel. Coverage consists of several layers with a layer per threshold. For each Ec layer, area is covered if ------- ic Threshold . Each layer is assigned a colour and displayed with intersections Nt HS – SCCH between layers. Fast Link Adaptation Modelling For A Single User When you calculate the study with the following display options, Atoll considers one user on each pixel and determines the best HSDPA bearer that the user can obtain. On each pixel, the user is processed as if he is the only user in the cell i.e. he uses the entire HSDPA power available in the cell. For further information on the fast link adaptation modelling, see "Fast Link Adaptation Modelling" on page 214. 266 AT281_TRG_E1 © Forsk 2009 Chapter 6: UMTS HSPA Networks • Colour per HS-PDSCH Ec/Nt Atoll displays on each pixel the HS-PDSCH quality. Coverage consists of several layers with a layer per threshold. For Ec each layer, area is covered if ------- ic Threshold . Each layer is assigned a colour and displayed with inter Nt HS – PDSCH sections between layers. • Colour per CQI Atoll displays either the CPICH CQI (see the calculation detail in "CPICH CQI Determination" on page 216) when the selected option in Global parameters (HSDPA part) is CQI based on CPICH quality, or the HS-PDSCH CQI (see the calculation detail in the section 10.7.1.2.2) when considering the CQI based on HS-PDSCH quality option. Coverage consists of several layers with a layer per CQI threshold ( CQI threshold ). For each layer, area is covered if CQI CQI threshold . Each layer is assigned a colour and displayed with intersections between layers. • Colour per MAC Rate DL Atoll displays the MAC rate ( R MAC ) provided on each pixel. The MAC rate is calculated as follows: S block DL R MAC = --------------T TTI Where, S block is the transport block size (in kbits) of the selected HSDPA bearer; it is defined for each HSDPA bearer in the related table. –3 T TTI is the TTI duration, i.e. 2 10 s (2000 TTI in one second). This value is specified by the 3GPP. DL Coverage consists of several layers with a layer per possible MAC rate ( R MAC ). For each layer, area is covered if the MAC rate exceeds the user-defined thresholds. Each layer is assigned a colour and displayed with intersections between layers. • Colour per MAC Throughput DL Atoll displays the MAC throughput ( T MAC ) provided on each pixel. The MAC throughput is calculated as follows: S block DL T MAC = -----------------------------T TTI TTI Where, S block is the transport block size (in kbits) of the selected HSDPA bearer; it is defined for each HSDPA bearer in the HSDPA Radio Bearers table. TTI is the minimum number of TTI (Transmission Time Interval) between two TTI used; it is defined in the terminal user equipment category properties. –3 T TTI is the TTI duration, i.e. 2 10 s (2000 TTI in one second). This value is specified by the 3GPP. DL Coverage consists of several layers with a layer per possible MAC throughput ( T MAC ). For each layer, area is covered if the MAC throughput exceeds the user-defined thresholds. Each layer is assigned a colour and displayed with intersections between layers. • Colour per RLC Peak Rate DL After selecting the bearer, Atoll reads the corresponding RLC peak rate ( R RLC –p eak I HSDPABearer ). This is the highest DL rate that the bearer can provide on each pixel. Then, it determines the RLC peak rate provided in the downlink, R RLC –p eak . DL Coverage consists of several layers with a layer per possible RLC peak rate ( R RLC –p eak ). For each layer, area is covered if the RLC peak rate can be provided. Each layer is assigned a colour and displayed with intersections between layers. • Colour per RLC Peak Throughput DL Atoll displays the RLC peak throughput ( T RLC –p eak ) provided on each pixel. The RLC peak throughput is calculated as follows: DL R RLC – p eak DL T RLC –p eak = --------------------------TTI Where TTI is the minimum number of TTI (Transmission Time Interval) between two TTI used; it is defined in the terminal user equipment category properties. © Forsk 2009 AT281_TRG_E1 267 Technical Reference Guide DL Coverage consists of several layers with a layer per possible RLC peak throughput ( T RLC –p eak ). For each layer, area is covered if the RLC peak throughput exceeds the user-defined thresholds. Each layer is assigned a colour and displayed with intersections between layers. • Colour per Average RLC Throughput DL Atoll displays the average RLC throughput ( T RLC – Av ) provided on each pixel. The average RLC throughput is calculated as follows: DL R RLC – p eak 1 – BLER HSDPA DL T RLC – Av = ---------------------------------------------------------------------------------TTI Where, BLER HSDPA is read in the quality graph defined for the triplet “reception equipment-selected bearer-mobility” (HSDPA Quality Graphs tab in the Reception equipment properties). This graph describes the variation of BLER as a function of the measured quality (HS-PDSCH Ec/Nt). Knowing the HS-PDSCH Ec/Nt, Atoll finds the corresponding BLER. TTI is the minimum number of TTI (Transmission Time Interval) between two TTI used; it is defined in the terminal user equipment category properties. DL Coverage consists of several layers with a layer per possible average RLC throughput ( T RLC – Av ). For each layer, area is covered if the average RLC throughput exceeds the user-defined thresholds. Each layer is assigned a colour and displayed with intersections between layers. • Colour per Application Throughput DL Atoll displays the application throughput ( T application ) provided on each pixel. The application throughput represents the net throughput after deduction of coding (redundancy, overhead, addressing, etc.). This one is calculated as follows: DL R RLC –p eak 1 – BLER HSDPA SF Rate – R DL T application = -------------------------------------------------------------------------------------------------------------------------TTI Where: BLER HSDPA is read in the quality graph defined for the triplet “reception equipment-selected bearer-mobility” (HSDPA Quality Graphs tab in the Reception equipment properties). This graph describes the variation of BLER as a function of the measured quality (HS-PDSCH Ec/Nt). Knowing the HS-PDSCH Ec/Nt, Atoll finds the corresponding BLER. SF Rate and R respectively represent the scaling factor between the application throughput and the RLC (Radio Link Control) throughput and the throughput offset. These two parameters model the header information and other supplementary data that does not appear at the application level. They are defined in the service properties. TTI is the minimum number of TTI (Transmission Time Interval) between two TTI used; it is defined in the terminal user equipment category properties. DL Coverage consists of several layers with a layer per possible application throughput ( T application ). For each layer, area is covered if the application throughput exceeds the user-defined thresholds. Each layer is assigned a colour and displayed with intersections between layers. Fast Link Adaptation Modelling For Several Users When you calculate the study with the following display options, Atoll considers several users per pixel and determines the best HSDPA bearer that each user can obtain. In this case, the cell available HSDPA power is shared between HSDPA bearer users. When the coverage prediction is not based on a simulation, the number of HSDPA bearer users is taken from the cell properties. The displayed results of the coverage prediction will be an average result for one user. For further information on the HSDPA bearer allocation process when there are several users, see "HSDPA Bearer Allocation Process" on page 212 For further information on the fast link adaptation modelling, see "Fast Link Adaptation Modelling" on page 214. • Colour per MAC Throughput Per Mobile DL Atoll displays the average MAC throughput per mobile ( T MAC average ) provided on each pixel. The average MAC throughput per mobile is calculated as follows: n HSDPA DL DL T MAC x x=1 T MAC average = --------------------------------------n HSDPA Where, n HSDPA is the number of HSDPA users within the cell. 268 AT281_TRG_E1 © Forsk 2009 Chapter 6: UMTS HSPA Networks DL T MAC x is the MAC throughput of each HSDPA bearer user. For further information on the calculation of the MAC throughput, see "Colour per MAC Throughput" on page 267. DL Coverage consists of several layers with a layer per possible average MAC throughput per mobile ( T MAC average ). For each layer, area is covered if the average MAC throughput per mobile exceeds the user-defined thresholds. Each layer is assigned a colour and displayed with intersections between layers. • Colour per RLC Throughput Per Mobile DL Atoll displays the average RLC throughput per mobile ( T RLC average ) provided on each pixel. The average RLC throughput per mobile is calculated as follows: n HSDPA DL DL T RLC – p eak x x=1 T RLC average = ---------------------------------------------------n HSDPA Where, n HSDPA is the number of HSDPA users within the cell. DL T RLC –p eak x is the RLC peak throughput of each HSDPA bearer user. For further information on the calculation of the RLC peak throughput, see "Colour per RLC Peak Throughput" on page 267. DL Coverage consists of several layers with a layer per possible average RLC throughput per mobile ( T RLC average ). For each layer, area is covered if the average RLC throughput per mobile exceeds the user-defined thresholds. Each layer is assigned a colour and displayed with intersections between layers. • Colour per ApplicationThroughput Per Mobile DL Atoll displays the average application throughput per mobile ( T application average ) provided on each pixel. The average application throughput per mobile is calculated as follows: n HSDPA DL DL T application x x=1 T application average = ----------------------------------------------------n HSDPA Where, n HSDPA is the number of HSDPA users within the cell. DL T application x is the application throughput of each HSDPA bearer user. For further information on the calculation of the application throughput, see "Colour per Application Throughput" on page 268. Coverage consists of several layers with a layer per possible average application throughput per mobile DL ( T application average ). For each layer, area is covered if the average application throughput per mobile exceeds the userdefined thresholds. Each layer is assigned a colour and displayed with intersections between layers. Probability of Having a Certain RLC Peak Rate This result can be obtained only if you have selected an HSDPA radio bearer in the Condition tab. • Colour per Cell Edge Coverage Probability Atoll shows areas where the selected HSDPA radio bearer is available with different cell edge coverage probabilities. Coverage consists of several layers with a layer per cell edge coverage probability defined in the Display tab. For each layer, area is covered if the selected HSDPA radio bearer is available. Each layer is assigned a colour and displayed with intersections between layers. 6.5.2.6 HSUPA Prediction Study A dedicated HSUPA study is available with different calculation and display options. Atoll determines on each pixel the best HSUPA bearer that can be obtained; it can consider either a single HSUPA bearer user or several ones on each pixel. For further information on the HSUPA bearer selection, see "HSUPA Bearer Allocation Process" on page 228. By caclulating this study with suitable display options, it is possible: • • • To analyse the power required by the selected terminal, To analyse the required E-DPDCH quality, To analyse rates and throughputs. Let us assume each pixel on the map corresponds to one or several users with HSUPA capable terminal, mobility and HSUPA service. Each user may be using a specific carrier or all of them. Moreover, he does not create any interference. © Forsk 2009 AT281_TRG_E1 269 Technical Reference Guide 6.5.2.6.1 Prediction Study Inputs Parameters used as input for the HSUPA prediction study are: • • • • • The cell UL load factor, The cell UL reuse factor, The cell UL load factor due to HSUPA, The maximum cell UL load factor, The number of HSUPA users within the cell if the study is calculated for several users. These parameters can be either simulation outputs, or user-defined cell inputs. In the last case, When no value is defined in the Cells table, Atoll uses the following default values: • • • • • 6.5.2.6.2 Uplink load factor = 50% Uplink reuse factor = 1 Uplink load factor due to HSUPA = 0% Maximum uplink load factor = 75% Number of HSUPA users = 1 Calculation Options Atoll can calculate the HSUPA coverage prediction in one of two ways: • • 6.5.2.6.3 HSUPA resources can be dedictated to a single user: On each pixel, the user is processed as if he is the only user in the cell i.e he will use the entire remaining load after allocating capacity to all R99 users. HSUPA resources can be shared by HSUPA users defined or calculated per cell: Atoll considers several HSUPA bearer users per pixel. After allocating capacity to all R99 users, the remaining load of the cell will be shared equally between all the HSUPA bearer users. When the coverage prediction is not based on a simulation, the number of HSUPA users is taken from the cell properties. The displayed results of the coverage prediction will be an average result for one user. Display Options The following display options are available in the prediction property dialogue. Colour per Required E-DPDCH Ec/Nt Atoll displays on each pixel the E-DPDCH Ec/Nt required to obtain the selected HSUPA bearer. Coverage consists of Ec req Threshold . Each layer is several layers with a layer per threshold. For each layer, area is covered if ------- Nt E – DPDCH assigned a colour and displayed with intersections between layers. Colour per Required Terminal Power Atoll displays on each pixel the terminal power required to obtain the selected HSUPA bearer. The required terminal power is calculated from the required E-DPDCH Ec/Nt. Coverage consists of several layers with a layer per threshold. For each req layer, area is covered if P term Threshold . Each layer is assigned a colour and displayed with intersections between layers. Colour per MAC Rate UL Atoll displays the MAC rate ( R MAC ) provided on each pixel. The MAC rate is calculated as follows: UL S block UL R MAC = --------------T TTI Where, UL S block is the transport block size (in kbits) for the selected HSUPA bearer; it is defined for each HSUPA bearer in the HSUPA Radio Bearers table. T TTI is the duration of one TTI for the selected HSUPA bearer; it is defined for each HSUPA bearer in the HSUPA Radio Bearers table. UL Coverage consists of several layers with a layer per possible MAC rate ( R MAC ). For each layer, area is covered if the MAC rate exceeds the user-defined thresholds. Each layer is assigned a colour and displayed with intersections between layers. Colour per RLC Peak Rate After selecting the HSUPA bearer, Atoll reads the corresponding RLC peak rate. This is the highest rate that the selected HSUPA bearer can provide on each pixel. UL Coverage consists of several layers with a layer per possible RLC peak rate ( R RLC –p eak ). For each layer, area is covered if the RLC peak rate can be provided. Each layer is assigned a colour and displayed with intersections between layers. 270 AT281_TRG_E1 © Forsk 2009 Chapter 6: UMTS HSPA Networks Colour per Minimum RLC Throughput UL Atoll displays the minimum RLC throughput ( T RLC – Min ) provided on each pixel. The minimum RLC throughput corresponds to the RLC throughput obtained for a given BLER and the maximum number of retransmissions. It is calculated as follows: UL R RLC –p eak 1 – BLER HSUPA UL T RLC – Min = ---------------------------------------------------------------------------------N Rtx Where, BLER HSUPA is the residual BLER for the selected uplink transmission format (HSUPA bearer with N Rtx retransmissions). It is read in the quality graph defined for the quartet “reception equipment-selected bearer-number of retransmissions-mobility” (HSUPA Quality Graphs tab in the Reception equipment properties). This graph describes the variation of BLER as a function of the measured quality (E-DPDCH Ec/Nt). Knowing the E-DPDCH Ec/Nt, Atoll finds the corresponding BLER. N Rtx is the maximum number of retransmissions for the selected HSUPA bearer. This figure is read in the HSUPA Bearer Selection table. DL Coverage consists of several layers with a layer per possible minimum RLC throughput ( T RLC – Min ). For each layer, area is covered if the minimum RLC throughput exceeds the user-defined thresholds. Each layer is assigned a colour and displayed with intersections between layers. Colour per Average RLC Throughput When HARQ (Hybrid Automatic Repeat Request) is used, the required average number of retransmissions is smaller and UL the RLC throughput is an average RLC throughput ( T RLC – Av ). This is the RLC throughput obtained for a given BLER and the average number of retransmissions. It is calculated as follows: UL R RLC – p eak 1 – BLER HSUPA UL T RLC – Av = --------------------------------------------------------------------------------- N Rtx av BLER HSUPA is the residual BLER for the selected uplink transmission format (HSUPA bearer with N Rtx retransmissions). It is read in the quality graph defined for the quartet “reception equipment-selected bearer-number of retransmissions-mobility” (HSUPA Quality Graphs tab in the Reception equipment properties). This graph describes the variation of BLER as a function of the measured quality (E-DPDCH Ec/Nt). Knowing the E-DPDCH Ec/Nt, Atoll finds the corresponding BLER. The average number of retransmissions ( N Rtx av ) is determined from early termination probabilities defined for the selected HSUPA bearer (in the HSUPA Bearer Selection table). The Early Termination Probability graph shows the probability of early termination ( p ) as a function of the number of retransmissions ( N Rtx ). Atoll calculates the average number of retransmissions ( N Rtx av ) as follows: N Rtx max p N Rtx – p N Rtx – 1 N Rtx N Rtx = 1 N Rtx av = -----------------------------------------------------------------------------------------------------p N Rtx max DL Coverage consists of several layers with a layer per possible average RLC throughput ( T RLC – Av ). For each layer, area is covered if the minimum RLC throughput exceeds the user-defined thresholds. Each layer is assigned a colour and displayed with intersections between layers. Colour per Application Throughput UL Atoll displays the application throughput ( T application ) provided on each pixel. The application throughput represents the net throughput after deduction of coding (redundancy, overhead, addressing, etc.). This one is calculated as follows: UL UL T application M b = T RLC – Min SF Rate – R Where: SF Rate and R respectively represent the scaling factor between the application throughput and the minimum RLC (Radio Link Control) throughput and the throughput offset. These two parameters model the header information and other supplementary data that does not appear at the application level. They are defined in the service properties. UL Coverage consists of several layers with a layer per possible application throughput ( T application ). For each layer, area is covered if the application throughput exceeds the user-defined thresholds. Each layer is assigned a colour and displayed with intersections between layers. © Forsk 2009 AT281_TRG_E1 271 Technical Reference Guide Colour per Average Application Throughput UL Atoll displays the average application throughput ( T application – Av ) provided on each pixel. It is calculated as follows: UL UL T application – Av M b = T RLC – Av SF Rate – R Where: SF Rate and R respectively represent the scaling factor between the average application throughput and the average RLC (Radio Link Control) throughput and the throughput offset. These two parameters model the header information and other supplementary data that does not appear at the application level. They are defined in the service properties. UL Coverage consists of several layers with a layer per possible average application throughput ( T application – Av ). For each layer, area is covered if the average application throughput exceeds the user-defined thresholds. Each layer is assigned a colour and displayed with intersections between layers. 6.6 Automatic Neighbour Allocation Atoll permits the automatic allocation of intra-technology neighbours in the current network. Two allocation algorithms are available, one dedicated to intra-carrier neighbours and the other for inter-carrier neighbours. The intra-technology neighbour allocation algorithms take into account all the cells of TBC transmitters. It means that all the cells of TBC transmitters of your .atl document are potential neighbours. The cells to be allocated will be called TBA cells. They must fulfil following conditions: • • • • They are active, They satisfy the filter criteria applied to the Transmitters folder, They are located inside the focus zone, They belong to the folder on which allocation has been executed. This folder can be either the Transmitters folder or a group of transmitters or a single transmitter. Only TBA cells may be assigned neighbours. Note: • If no focus zone exists in the .atl document, Atoll takes into account the computation zone. In this section, the following are explained: • • • 6.6.1 "Neighbour Allocation for All Transmitters" on page 272. "Neighbour Allocation for a Group of Transmitters or One Transmitter" on page 276. "Importance Calculation" on page 276. Neighbour Allocation for All Transmitters We assume that we have a reference, cell A, and a candidate neighbour, cell B. When the automatic neighbour allocation starts, Atoll checks the following conditions: 1. 2. The distance between both cells must be less than the user-definable maximum inter-site distance. If the distance between the reference cell and the candidate neighbour is greater than this value, then the candidate neighbour is discarded. The calculation options, Carriers: This option enables you to select the carrier(s) on which you want to run the allocation. You may choose one or more carriers. Atoll will allocate neighbours to cells using the selected carriers. Force co-site cells as neighbours: This option enables you to force cells located on the reference cell site in the candidate neighbour list. This constraint can be weighted among the others and ranks the neighbours through the importance field (see after). Force adjacent cells as neighbours (only for intra-carrier neighbours): This option enables you to force cells geographically adjacent to the reference cell in the candidate neighbour list.This constraint can be weighted among the others and ranks the neighbours through the importance field (see after). Notes: • 272 Adjacence criterion: Let CellA be a candidate neighbour cell of CellB. CellA is considered adjacent to CellB if there exists at least one pixel in the CellB Best Server coverage area where CellA is Best Server (if several cells have the same best server value) or CellA is the second best server that enters the Active Set (respecting the HO margin of the allocation). AT281_TRG_E1 © Forsk 2009 Chapter 6: UMTS HSPA Networks • When this option is checked, adjacent cells are sorted and listed from the most adjacent to the least, depending on the above criterion. Adjacence is relative to the number of pixels satisfying the criterion. Force neighbour symmetry: This option enables user to force the reciprocity of a neighbourhood link. Therefore, if the reference cell is a candidate neighbour of another cell, this one will be considered as candidate neighbour of the reference cell. Force exceptional pairs: This option enables you to force/forbid some neighbourhood relationships. Therefore, you may force/forbid a cell to be candidate neighbour of the reference cell. Delete existing neighbours: When selecting the Delete existing neighbours option, Atoll deletes all the current neighbours and carries out a new neighbour allocation. If not selected, the existing neighbours are kept. There must be an overlapping zone ( S A S B ) with a given cell edge coverage probability: 3. • Intra-carrier neighbours: intra-carrier handover is a soft handover. The reference cell A and the candidate cell B are located inside a continuous layer of cells with carrier c1 (c1 is the selected carrier on which you run the allocation). SA is the area where the cell A is the best serving cell. It means that the cell A is the first one in the active set. - The pilot signal received from the cell A is greater than the minimum pilot signal level. The pilot quality from A exceeds a user-definable minimum value (minimum Ec/I0). The pilot quality from A is the best. SB is the area where the cell B can enter the active set. - The pilot signal received from the cell B is greater than the minimum pilot signal level. The pilot quality from B is greater than the pilot quality from A minus the Ec/I0 margin. The Ec/I0 margin has the same meaning as the AS-threshold defined in the Cell properties. So, it should logically have the same value. Figure 6.14: Overlapping Zone for Intra-carrier Neighbours • © Forsk 2009 Inter-carrier neighbours: inter-frequency handover is a hard handover. It is needed in a multi-carrier W-CDMA network: AT281_TRG_E1 273 Technical Reference Guide - To balance loading between carriers and layers (1st case), - To make a coverage reason handover from micro cell frequency to macro cells (2nd case). 1st case: the reference cell A is located inside a continuous layer of cells with carrier c1 (c1 is the selected carrier on which you run the allocation) and the candidate cell B belongs to a layer of cells with carrier c2. SA is the area where the cell A is not the best serving cell of its layer but can enter the active set. - The pilot signal received from the cell A is greater than the minimum pilot signal level. The pilot quality from A exceeds a user-definable minimum value (minimum Ec/I0). The pilot quality from A is not the highest one. It is strictly lower than the best pilot quality received and greater than the best pilot quality minus the Ec/I0 margin. SB is the area where the cell B is the best serving cell of its layer. - The pilot signal received from the cell B is greater than the minimum pilot signal level. The pilot quality from B exceeds a user-definable minimum value (minimum Ec/I0). The pilot quality from B is the highest one. Figure 6.15: Overlapping Zone for Inter-carrier Neighbours - 1st Case 2nd case: the reference cell A is located on the border of a layer with carrier c1 (c1 is the selected carrier on which you run the allocation) and the candidate cell B belongs to a layer of cells with carrier c2. SA is the area where the pilot quality from the cell A starts significantly decreasing but the cell A is still the best serving cell of its layer (since it is on the border). - The pilot signal received from the cell A is greater than the minimum pilot signal level. The pilot quality from A is the highest one The pilot quality from A is lower than a user-definable minimum value (minimum Ec/I0) plus the Ec/I0 margin. SB is the area where the cell B is the best serving cell of its layer. - The pilot signal received from the cell B is greater than the minimum pilot signal level. The pilot quality from B exceeds a user-definable minimum value (minimum Ec/I0). The pilot quality from B is the highest one. Note: • Two ways enable you to determine the I0 value: 1 - Global Value: A percentage of the cell maximum power is considered. If the % of maximum power is too low, i.e. if % P max P pilot , Atoll takes into account the pilot power of the cell. Then, I0 represents the sum of values calculated for each cell. 2 - Defined per Cell: Atoll takes into account the total downlink power defined per cell. I0 represents the sum of total transmitted powers. 274 AT281_TRG_E1 © Forsk 2009 Chapter 6: UMTS HSPA Networks Figure 6.16: Overlapping Zone for Inter-carrier Neighbours - 2nd Case SA SB Atoll calculates the percentage of covered area ( ---------------------- 100 ) and compares this value to the % minimum covered SA area. If this percentage is not exceeded, the candidate neighbour B is discarded. 4. The importance of neighbours. For information on the importance calculation, see "Importance Calculation" on page 276. Importance values are used by the allocation algorithm to rank the neighbours according to the allocation reason. Atoll lists all neighbours and sorts them by importance value so as to eliminate some of them from the neighbour list if the maximum number of neighbours to be allocated to each transmitter is exceeded. If we consider the case for which there are 15 candidate neighbours and the maximum number of neighbours to be allocated to the reference cell is 8. Among these 15 candidate neighbours, only 8 (having the highest importance values) will be allocated to the reference cell. Note that specific maximum numbers of neighbours (maximum number of intra-carrier neighbours, maximum number of inter-carrier neighbours) can be defined at the cell level (property dialogue or cell table). If defined there, this value is taken into account instead of the default one available in the Neighbour Allocation dialogue. In the Results part, Atoll provides the list of neighbours, the number of neighbours and the maximum number of neighbours allowed for each cell. In addition, it indicates the importance (in %) of each neighbour and the allocation reason. Therefore, a neighbour may be marked as exceptional pair, co-site, adjacent, coverage or symmetric. For neighbours accepted for co-site, adjacency and coverage reasons, Atoll displays the percentage of area meeting the coverage conditions and the corresponding surface area (km2), the percentage of area meeting the adjacency conditions and the corresponding surface area (km2). Finally, if cells have previous allocations in the list, neighbours are marked as existing. Notes: • No simulation or prediction study is needed to perform an automatic neighbour allocation. When starting an automatic neighbour allocation, Atoll automatically calculates the path loss matrices if not found. • Even if no specific terminal, mobility or service is selected in the automatic allocation, it is interesting to know that the algorithm works such as finding the maximum number of neighbours by selection the multi-service traffic data as follows: Service: selection of the one with the lowest body loss. Mobility: no impact on the allocation, no specific selection. Terminal: selection of the one with the greatest (Gain - Loss) value, and, if equal, the one with the lowest noise figure. • The neighbour lists may be optionally used in the power control simulations to determine the mobile's active set. • A forbidden neighbour must not be listed as neighbour except if the neighbourhood relationship already exists and the Delete existing neighbours option is unchecked when you start the new allocation. In this case, Atoll displays a warning in the Event viewer indicating that the constraint on the forbidden neighbour will be ignored by algorithm because the neighbour already exists. • The force neighbour symmetry option enables the users to consider the reciprocity of a neighbourhood link. This reciprocity is allowed only if the neighbour list is not already full. Thus, if the cell B is a neighbour of the cell A while the cell A is not a neighbour of the cell B, two cases are possible: 1st case: There is space in the cell B neighbour list: the cell A will be added to the list. It will be the last one. © Forsk 2009 AT281_TRG_E1 275 Technical Reference Guide 2nd case: The cell B neighbour list is full: Atoll will not include cell A in the list and will cancel the link by deleting cell B from the cell A neighbour list. 6.6.2 • When the options “Force exceptional pairs” and “Force symmetry” are selected, Atoll considers the constraints between exceptional pairs in both directions so as to respect symmetry condition. On the other hand, if neighbourhood relationship is forced in one direction and forbidden in the other one, symmetry cannot be respected. In this case, Atoll displays a warning in the Event viewer. • In the Results, Atoll displays only the cells for which it finds new neighbours. Therefore, if a TBA cell has already reached its maximum number of neighbours before starting the new allocation, it will not appear in the Results table. Neighbour Allocation for a Group of Transmitters or One Transmitter Atoll allocates neighbours to: • • • TBA cells, Neighbours of TBA cells marked as exceptional pair, adjacent and symmetric, Neighbours of TBA cells that satisfy coverage conditions. Automatic neighbour allocation parameters are described in "Neighbour Allocation for All Transmitters" on page 272. 6.6.3 Importance Calculation Importance values are used by the allocation algorithm to rank the neighbours according to the allocation reason, and to quantify the neighbour importance. 6.6.3.1 Importance of Intra-carrier Neighbours As indicated in the table below, the neighbour importance depends on the neighbourhood cause; this value varies between 0 and 100%. Neighbourhood cause When Importance value Existing neighbour Only if the Delete existing neighbours option is not selected and in case of a new allocation Existing importance Exceptional pair Only if the Force exceptional pairs option is selected 100 % Co-site transmitter Only if the Force co-site cells as neighbours option is selected IF Adjacent transmitter Only if the Force adjacent cells as neighbours option is selected IF Neighbourhood relationship that fulfils coverage conditions Only if the % minimum covered area is exceeded IF Symmetric neighbourhood relationship Only if the Force neighbour symmetry option is selected IF Except the case of forced neighbours (importance = 100%), priority assigned to each neighbourhood cause is determined using the Importance Function (IF). The IF considers three factors for calculating the importance: • • • The co-site factor (C) which is a Boolean The adjacency factor (A) which deals with the percentage of adjacency The overlapping factor (O) meaning the percentage of overlapping The IF is user-definable using the Min importance and Max importance fields. Factor Min importance Default value Max importance Default value Overlapping factor (O) Min O 1% Max O 30% Adjacency factor (A) Min A 30% Max A 60% Co-site factor (C) Min C 60% Max C 100% The IF evaluates importance as follows: Neighbourhood cause 276 IF Resulting IF using the default values from the table above Co-site Adjacent No No Min O + O O 1% + 29% O No Yes Min A + A Max O O + 100% – Max O A 30% + 30% 30% O + 70% A AT281_TRG_E1 © Forsk 2009 Chapter 6: UMTS HSPA Networks Yes Min C + C Max O O + 100% – Max O A Yes 60% + 40% 30% O + 70% A Where X = Max X – Min X Notes: • If there is no overlapping between the range of each factor, the neighbours will be ranked by neighbourhood cause. Using the default values for minimum and maximum importance fields, neighbours will be ranked in the following order: i. Co-site neighbours ii. Adjacent neighbours iii. Neighbours based on coverage overlapping 6.6.3.2 • If the ranges of the importance factors overlap, the neighbours may not be ranked according to the neighbourhood cause. • The ranking between neighbours from the same category depends on the factors (A) and (O). • The default value of Min(O) = 1% ensures that neighbours selected for symmetry will have an importance greater than 0%. With a value of Min(O) = 0%, neighbours selected for symmetry will have an importance field greater than 0% only if there is some coverage overlapping. Importance of Inter-carrier Neighbours As indicated in the table below, the neighbour importance depends on the neighbourhood cause; this value varies between 0 to 100%. Neighbourhood cause When Importance value Existing neighbour If the Delete existing neighbours option is not selected Existing importance Exceptional pair If the Force exceptional pairs option is selected 100 % Co-site transmitter If the Force co-site cells as neighbours option is selected IF Neighbourhood relationship that fulfils coverage conditions If the % minimum covered area is exceeded IF Symmetric neighbourhood relationship If the Force neighbour symmetry option is selected IF Except the case of forced neighbours (importance = 100%), priority assigned to each neighbourhood cause is determined using the Importance Function (IF). The IF considers two factors for calculating the importance: • • The co-site factor (C) which is a Boolean The overlapping factor (O) meaning the percentage of overlapping The IF is user-definable using the Min importance and Max importance fields. Factor Min importance Default value Max importance Default value Overlapping factor (O) Min O 1% Max O 60% Co-site factor (C) Min C 60% Max C 100% The IF evaluates importance as follows: Co-site Neighbourhood cause IF Resulting IF using the default values from the table above No Min O + O O 1% + 59% O Yes Min C + C O 60% + 40% O Where X = Max X – Min X Notes: • If there is no overlapping between the range of each factor, the neighbours will be ranked by neighbourhood cause. Using the default values for minimum and maximum importance fields, neighbours will be ranked in the following order: i. Co-site neighbours ii. Neighbours based on coverage overlapping • © Forsk 2009 If the ranges of the importance factors overlap, the neighbours may not be ranked according to the neighbourhood cause. AT281_TRG_E1 277 Technical Reference Guide 6.7 • The ranking between neighbours from the same category depends on the factor (O). • The default value of Min(O) = 1% ensures that neighbours selected for symmetry will have an importance greater than 0%. With a value of Min(O) = 0%, neighbours selected for symmetry will have an importance field greater than 0% only if there is some coverage overlapping. Primary Scrambling Code Allocation Downlink primary scrambling codes enable you to distinguish cells from one another (cell identification). By default, there are 512 primary scrambling codes numbered (0...511). The cells to which Atoll allocates scrambling codes are referred to as the TBA cells (cells to be allocated). TBA cells fulfil following conditions: - They are active, They satisfy the filter criteria applied to the Transmitters folder, They are located inside the focus zone, They belong to the folder on which allocation has been executed. This folder can be either the Transmitters folder or a group of transmitters or a single transmitter. Note: • If no focus zone exists in the .atl document, Atoll takes into account the computation zone. 6.7.1 Automatic Allocation Description 6.7.1.1 Options and Constraints The scrambling code allocation algorithm can take into account following constraints and options: 1. Neighbourhood between cells, You may consider: • • • First order neighbours: The neighbours of TBA cells listed in the Intra-technology neighbours table, Second order neighbours: The neighbours of neighbours, Third order neighbours: The neighbour’s neighbour’s neighbours. Notes: 2. • In the context of the primary scrambling code allocation, the term "neighbours" refers to intra-carrier neighbours. • Atoll can take into account inter-technology neighbour relations as constraints to allocate different scrambling codes to the UMTS neighbours of a GSM transmitter. In order to consider inter-technology neighbour relations in the scrambling code allocation, you must make the Transmitters folder of the GSM .atl document accessible in the UMTS .atl document. For information on making links between GSM and UMTS .atl documents, see the User Manual. • Atoll considers symmetry relationship between a cell, its first order neighbours, its second order neighbours and its third order neighbours. Cells fulfilling a criterion on Ec/I0 (option “Additional Overlapping Conditions”), For a reference cell “A”, Atoll considers all the cells “B” that can enter the active set on the area where the reference cell is the best server (area where (Ec/I0)A exceeds the minimum Ec/I0 and is the highest one and (Ec/I0)B is within a Ec/I0 margin of (Ec/I0)A). Note: • 3. Atoll considers either a percentage of the cell maximum powers or the total downlink power used by the cells in order to evaluate I0. In this case, I0 equals the sum of total transmitted powers. When this parameter is not specified in the cell properties, Atoll uses 50% of the maximum power. Reuse distance, Notes: • 278 Reuse distance is a constraint on the allocation of scrambling codes. A code cannot be reused at a cell that is not at least as far away as the reuse distance from the cell allocated with the particular code. AT281_TRG_E1 © Forsk 2009 Chapter 6: UMTS HSPA Networks • 4. 5. Scrambling code reuse distance can be defined at cell level. If this value is not defined, then Atoll will use the default reuse distance defined in the Scrambling Code Automatic Allocation dialogue. Exceptional pairs, Domains of scrambling codes, Note: • 6. When no domain is assigned to cells, Atoll considers the 512 primary scrambling codes available. The number of primary scrambling codes per cluster. In Atoll, we call "cluster", a group of scrambling codes as defined in 3GPP specifications. 3GPP specifications define 64 clusters consisting of 8 scrambling codes (in this case, clusters are numbererd from 0 to 63). However, you can define another value (e.g. if you set the number of codes per cluster to 4, scrambling codes will be distributed in 128 clusters). When the allocation is based on a Distributed strategy (Distributed per Cell or Distributed per Site), this parameter can also be used to define the interval between the primary scrambling codes assigned to cells on a same site. The defined interval is applied by adding the following lines in the Atoll.ini file: [PSC] ConstantStep = 1 For more information about setting options in the atoll.ini file, see the Administrator Manual. 7. The carrier on which the allocation is run: It can be a given carrier or all of them. In this case, either Atoll independently plans scrambling codes for the different carriers, or it allocates the same primary scrambling code to each carrier of a transmitter if the option "Allocate carriers identically" is selected. The possibility to use a maximum of codes from the defined domains (option "Use a Maximum of Codes"): Atoll will try to spread the scrambling code spectrum the most. The "Delete All Codes" option: When selecting this option, Atoll deletes all the current scrambling codes and carries out a new scrambling code allocation. If not selected, the existing scrambling codes are kept. 8. 9. In addition, it depends on the selected allocation strategy. Allocation strategies can be: • • • • Clustered allocation: The purpose of this strategy is to choose for a group of mutually constrained cells, scrambling codes among a minimum number of clusters. In this case, Atoll will preferentially allocate all the codes within the same cluster. Distributed per cell allocation: This strategy consists in using as many clusters as possible. Atoll will preferentially allocate codes from different clusters. One cluster per site allocation: This strategy allocates one cluster to each site, then, one code from the cluster to each cell of each site. When all the clusters have been allocated and there are still sites remaining to be allocated, Atoll reuses the clusters as far as possible at another site. Distributed per site allocation: This strategy allocates a group of adjacent clusters to each site, then, one cluster to each transmitter on the site according to its azimuth and finally, one code from the cluster to each cell of each transmitter. The number of adjacent clusters per group depends on the number of transmitters per site you have in your network; this information is required to start allocation based on this strategy. When all the groups of adjacent clusters have been allocated and there are still sites remaining to be allocated, Atoll reuses the groups of adjacent clusters as far as possible at another site. In the Results table, Atoll only displays scrambling codes allocated to TBA cells. 6.7.1.2 Allocation Process For each TBA cell, Atoll lists all cells which have constraints with the cell. They are referred to as near cells. The near cells of a TBA cell may be: • • • • • • Its neighbour cells: the neighbours listed in the Intra-technology neighbours table (options “Existing neighbours” and "First Order"), The neighbours of its neighbours (options “Existing neighbours” and “Second Order”), The third order neighbours (options “Existing neighbours” and “Third Order”), The cells that fulfil Ec/I0 condition (option “Additional Overlapping Conditions”), The cells with distance from the TBA cell less than the reuse distance, The cells that make exceptional pairs with the TBA cell. Additional constraints are considered when: • • The cell and its near cells are neighbours of a same GSM transmitter (only if the Transmitters folder of the GSM .atl document is accessible in the UMTS .atl document), The neighbour cells cannot share the same cluster (for the "Distributed per site" allocation strategy only). These constraints have a certain weight taken into account to determine the TBA cell priority during the allocation process and the cost of the scrambling code plan. During the allocation, Atoll tries to assign different scrambling codes to the TBA cell and its near cells. If it respects all the constraints, the cost of the scrambling code plan is 0. When a cell has too many constraints and there are not anymore scrambling codes available, Atoll breaks the constraint with the lowest cost so as to generate the scrambling code plan with the lowest cost. For information on the cost generated by each constraint, see "Cell Priority" on page 281. © Forsk 2009 AT281_TRG_E1 279 Technical Reference Guide 6.7.1.2.1 Single Carrier Network The allocation process depends on the selected strategy. Algorithm works as follows: Strategies: Clustered and Distributed per Cell Atoll processes TBA cells according to their priority. It allocates scrambling codes starting with the highest priority cell and its near cells, and continuing with the lowest priority cells not allocated yet and their near cells. For information on calculating cell priority, see "Cell Priority" on page 281. Strategy: One Cluster per Site All sites which have constraints with the studied site are referred to as near sites. Atoll assigns a cluster to each site, starting with the highest priority site and its near sites, and continuing with the lowest priority sites not allocated yet and their near sites. When all the clusters have been allocated and there are still sites remaining to be allocated, Atoll reuses the clusters at another site. When the Reuse Distance option is selected, the algorithm reuses the clusters as soon as the reuse distance is exceeded. Otherwise, when the option is not selected, the algorithm tries to assign reused clusters as spaced out as possible. Then, Atoll allocates a primary scrambling code from the cluster to each cell located on the sites (codes belong to the assigned clusters). It starts with the highest priority cell and its near cells and goes on with the lowest priority cells not allocated yet and their near cells. For information on calculating site priority, see "Site Priority" on page 283. For information on calculating cell priority, see "Cell Priority" on page 281. Strategy: Distributed per Site All sites which have constraints with the studied site are referred to as near sites. Atoll assigns a group of adjacent clusters to each site, starting with the highest priority site and its near sites, and continuing with the lowest priority sites not allocated yet and their near sites. When all the groups of adjacent clusters have been allocated and there are still sites remaining to be allocated, Atoll reuses the groups of adjacent clusters at another site. When the Reuse Distance option is selected, the algorithm reuses the groups of adjacent clusters as soon as the reuse distance is exceeded. Otherwise, when the option is not selected, the algorithm tries to assign reused groups of adjacent clusters as spaced out as possible. Then, Atoll assigns each cluster of the group to each transmitter of the site according to the transmitter azimuth and selected neighbourhood constraints (options "Neighbours in Other Clusters" and "Secondary Neighbours in Other Clusters"). Then, Atoll allocates a primary scrambling code to each cell located on the transmitters (codes belong to the assigned clusters). It starts with the highest priority cell and its near cells and goes on with the lowest priority cells not allocated yet and their near cells. For information on calculating site priority, see "Site Priority" on page 283. For information on calculating cell priority, see "Cell Priority" on page 281. Determination of Groups of Adjacent Clusters In order to determine the groups of adjacent clusters to be used, Atoll proceeds as follows: It defines theoretical groups of adjacent clusters, independently of the defined domain, considering the 512 primary scrambling codes available and the specified number of codes per cluster (if this one is set to 8, 64 clusters are supposed to be available). It starts the division in group from the cluster 0 (hard coded) and takes into account the maximum number of transmitters per site user-specified in order to determine the number of clusters in each group and then, the number of possible groups. Let us assume that the number of codes per cluster is set to 8 and the maximum number of transmitters per site in the network is 3. In this case, we have the following theoretical groups: Group 1 Group 2 Group 3 Group 4 ... Group 21 Cluster 0 Cluster 1 Cluster 2 Cluster 3 Cluster 4 Cluster 5 Cluster 6 Cluster 7 Cluster 8 Cluster 9 Cluster 10 Cluster 11 ... Cluster 61 Cluster 62 Cluster 63 If no domain is assigned to cells, Atoll can use all these groups for the allocation. On the other hand, if a domain is used, the tool compares adjacent clusters really available in the assigned domain to the theoretical groups and only keeps adjacent clusters mapping the theoretical groups. Let us assume that we have a domain consisted of 12 clusters: clusters 1 to 8 and clusters 12 to 15. Therefore, Atoll will be able to use the following groups of adjacent clusters: • • • • Group 2 with cluster 3, 4 and 5, Group 3 with cluster 6, 7 and 8, Group 6 with cluster 12, 13 and 14. The clusters 1, 2 and 15 will not be used. If a domain does not contain any adjacent clusters, the user is warned through the 'Event Viewer'. 6.7.1.2.2 Multi-Carrier Network In case you have a multi-carrier network and you run the scrambling code allocation on all the carriers, the allocation process depends on the allocation strategy as detailed above and in addition, wether the option "Allocate Carriers Identically" is selected or not. 280 AT281_TRG_E1 © Forsk 2009 Chapter 6: UMTS HSPA Networks When the option is not selected, algorithm works for each strategy, as explained above. On the other hand, when the option is selected, allocation order changes. It is no longer based on the cell priority but depends on the transmitter priority. All transmitters which have constraints with the studied transmitter will be referred to as near transmitters. In case of a "Per cell" strategy (Clustered and Distributed per cell), Atoll starts scrambling code allocation with the highest priority transmitter and its near transmitters and continues with the lowest priority transmitters not allocated yet and their near transmitters. The same scrambling code is assigned to each cell of the transmitter. In case of the "One cluster per site" strategy, Atoll assigns a cluster to each site and then, allocates a scrambling code to each transmitter. It starts with the highest priority transmitter and its near transmitters and continues with the lowest priority transmitters not allocated yet and their near transmitters. The same scrambling code is assigned to each cell of the transmitter. In case of the "Distributed per site" strategy, Atoll assigns a group of adjacent clusters to each site, then a cluster to each transmitter and finally, allocates a scrambling code to each transmitter. It starts with the highest priority transmitter and its near transmitters and continues with the lowest priority transmitters not allocated yet and their near transmitters. The same scrambling code is assigned to each cell of the transmitter. For information on calculating transmitter priority, see "Transmitter Priority" on page 283. Note: • 6.7.1.3 6.7.1.3.1 When cells, transmitters or sites have the same priority, processing is based on an alphanumeric order. Priority Determination Cell Priority Scrambling code allocation algorithm in Atoll allots priorities to cells before performing the actual allocation. Priorities assigned to cells depend upon how much constrained each cell is and the cost defined for each constraint. A cell without any constraint has a default cost, C , equal to 0. The higher the cost on a cell, the higher the priority it has for the scrambling code allocation process. There are six criteria employed to determine the cell priority: • Scrambling Code Domain Criterion The cost due to the domain constraint, C i Dom , depends on the number of scrambling codes available for the allocation. The domain constraint is mandatory and cannot be broken. When no domain is assigned to cells, 512 scrambling codes are available and we have: C i Dom = 0 When domains of scrambling codes are assigned to cells, each unavailable scrambling code generates a cost. The higher the number of codes available in the domain, the less will be the cost due to this criterion. The cost is given as: C i Dom = 512 – Number of scrambling codes in the domain • Distance Criterion The constraint level of any cell i depends on the number of cells (j) present within a radius of "reuse distance" from its centre. The total cost due to the distance constraint is given as: C i Dist = Cj Dist i j Each cell j within the reuse distance generates a cost given as: C j Dist i = w d ij c dis tan ce Where w d ij is a weight depending on the distance between i and j. This weight is inversely proportional to the inter-cell distance. For a reuse distance of 2000m, the weight for an inter-cell distance of 1500m is 0.25, the weight for co-site cells is 1 and the weight for two cells spaced out 2100m apart is 0. c dis tan ce is the cost of the distance constraint. This value can be defined in the Constraint Cost dialogue. • Exceptional Pair Criterion The constraint level of any cell i depends on the number of exceptional pairs (j) for that cell. The total cost due to exceptional pair constraint is given as: C i EP = cEP i – j j Where c EP is the cost of the exceptional pair constraint. This value can be defined in the Constraint Cost dialogue. • © Forsk 2009 Neighbourhood Criterion AT281_TRG_E1 281 Technical Reference Guide The constraint level of any cell i depends on the number of its neighbour cells j, the number of second order neighbours k and the number of third order neighbours l. Let’s consider the following neighbour schema: Figure 6.17: Neighbourhood Constraints The total cost due to the neighbour constraint is given as: Ci N = Cj N1 i + Cj – j N1 i + Ck N2 i + Ck – k N2 i + Cl N3 i + Cl – l N3 i j j k k l l Each first order neighbour cell j generates a cost given as: C j N1 i = I j c N1 Where I j is the importance of the neighbour cell j. c N1 is the cost of the first order neighbour constraint. This value can be defined in the Constraint Cost dialogue. Because two first order neighbours must not have the same scrambling code, Atoll considers the cost created by two first order neighbours to be each other. C j N1 i + C j N1 i C j – j N1 i = ---------------------------------------------------------2 Each second order neighbour cell k generates a cost given as: C k N2 i = Max ( C j N1 i C k N1 j , C j N1 i C k N1 j ) c N2 Where c N2 is the cost of the second order neighbour constraint. This value can be defined in the Constraint Cost dialogue. Because two second order neighbours must not have the same scrambling code, Atoll considers the cost created by two second order neighbours to be each other. C k N2 i + C k N2 i C k – k N2 i = ------------------------------------------------------------2 Each third order neighbour cell l generates a cost given as: C N1 i C k N1 j C l N1 k C j N1 i C k N1 j C l N1 k C l N3 i = Max j c N3 C j N1 i C k N1 j C l N1 k C j N1 i C k N1 j C l N1 k Where c N3 is the cost of the third order neighbour constraint. This value can be defined in the Constraint Cost dialogue. Because two third order neighbours must not have the same scrambling code, Atoll considers the cost created by two third order neighbours to be each other. C l N3 i + C l N3 i C l – l N3 i = ---------------------------------------------------------2 Note: • Atoll considers the highest cost of both links when a neighbour relation is symmetric and the importance value is different. In this case, we have: C j N1 i = Max I i – j I j – i c N1 And C k N2 i = Max (C j N1 i C k N1 j ,C j N1 k C i N1 j ) c N2 282 AT281_TRG_E1 © Forsk 2009 Chapter 6: UMTS HSPA Networks • GSM Neighbour Criterion This criterion is considered when the co-planning mode is activated (i.e. the Transmitters folder of the GSM .atl document is made accessible in the UMTS .atl document) and inter-technology neighbours have been allocated. If the cell i is neighbour of a GSM transmitter, the cell constraint level depends on how many cells j are neighbours of the same GSM transmitter. The total cost due to GSM neighbour constraint is given as: C i N 2G = cN 2G j – Tx 2G j Where cN 2G is the cost of the GSM neighbour constraint. This value can be defined in the Constraint Cost dialogue. • Cluster Criterion When the "Distributed per Site" allocation strategy is used, you can consider additional constraints on allocated clusters (one cell, its first order neighbours and its second order neighbours must be assigned scrambling codes from different clusters). In this case, the constraint level of any cell i depends on the number of first and second order neighbours, j and k. The total cost due to the cluster constraint is given as: C i Cluster = Cj N1 i cCluster + Ck N2 i cCluster j k Where c Cluster is the cost of the cluster constraint. This value can be defined in the Constraint Cost dialogue. Therefore, the total cost due to constraints on any cell i is defined as: C i = C i Dom + C i U With C i U = C i Dist + C i EP + C i N + C i N 2G + C i Cluster 6.7.1.3.2 Transmitter Priority In case you have a multi-carrier network and you run scrambling code allocation on "all" the carriers with the option "allocate carriers identically", algorithm in atoll allots priorities to transmitters. Priorities assigned to transmitters depend on how much constrained each transmitter is and the cost defined for each constraint. The higher the cost on a transmitter, the higher the priority it has for the scrambling code allocation process. Let us consider a transmitter Tx with two cells using carriers 0 and 1. The cost due to constraints on the transmitter is given as: C Tx = C Tx Dom + C Tx U With C Tx U = Max C U and C Dom = 512 – Number of scrambling codes in the domain i Tx i Tx Here, the domain available for the transmitter is the intersection of domains assigned to cells of the transmitter. The domain constraint is mandatory and cannot be broken. 6.7.1.3.3 Site Priority In case of "Per Site" allocation strategies (One cluster per site and Distributed per site), algorithm in Atoll allots priorities to sites. Priorities assigned to sites depend on how much constrained each site is and the cost defined for each constraint. The higher the cost on a site, the higher the priority it has for the scrambling code allocation process. Let us consider a site S with three transmitters; each of them has two cells using carriers 0 and 1. The cost due to constraints on the site is given as: C S = C S U + C S Dom With C S U = Max C U and C Dom = 512 – Number of scrambling codes in the domain Tx S Tx S Here, the domain considered for the site is the intersection of domains available for transmitters of the site. The domain constraint is mandatory and cannot be broken. 6.7.2 Allocation Examples 6.7.2.1 Allocation Strategies and Use a Maximum of Codes In order to understand the differences between the different allocation strategies and the behaviour of algorithm when using a maximum of codes or not, let us consider the following sample scenario: © Forsk 2009 AT281_TRG_E1 283 Technical Reference Guide Figure 6.18: Primary Scrambling Codes Allocation Let Site0, Site1, Site2 and Site3 be four sites with 3 cells using carrier 0 whom scrambling codes have to be allocated out of three clusters consisted of 8 primary scrambling codes. This implies that the domain of scrambling codes for the four sites is from 0 to 23 (cluster 0 to cluster 2). The reuse distance is supposed to be less than the inter-site distance. Only co-site neighbours exist. The following section lists the results of each combination of options with explanation where necessary. 6.7.2.1.1 Strategy: Clustered Since the restrictions of neighbourhood only apply to co-sites with the same importance and sites distances are greater than reuse distances, every cell has the same priority. Then, scrambling code allocation to cells is performed in an alphanumeric order. Without ‘Use a Maximum of Codes’ With ‘Use a Maximum of Codes’ Atoll starts allocating the codes from the start of cluster 0 at As it is possible to use a maximum of codes, Atoll starts each site. allocation at the start of a different cluster at each site. When a cluster is reused, and there are non allocated codes left in the cluster, Atoll first allocates those codes before reusing the already used ones. 284 AT281_TRG_E1 © Forsk 2009 Chapter 6: UMTS HSPA Networks 6.7.2.1.2 Strategy: Distributed Since the restrictions of neighbourhood only apply to co-sites with the same importance and sites distances are greater than reuse distances, every cell has the same priority. Then, scrambling code allocation to cells is performed in an alphanumeric order. Without ‘Use a Maximum of Codes’ With ‘Use a Maximum of Codes’ Atoll allocates codes from different clusters to each cell of Atoll allocates codes from different clusters to each site’s the same site. Under given constraints of neighbourhood cells. As it is possible to use a maximum of codes, Atoll alloand reuse distance, same codes can be allocated to each cates the codes so that there is least repetition of codes. site’s cells. 6.7.2.1.3 Strategy: ‘One Cluster per Site Since the restrictions of neighbourhood only apply to co-sites with the same importance and sites distances are greater than reuse distances, every site has the same priority. Then, cluster allocation to sites is performed in an alphanumeric order. Without ‘Use a Maximum of Codes’ With ‘Use a Maximum of Codes’ In this strategy, a cluster of codes is limited to be used at When it is possible to use a maximum of codes, Atoll can just one site at a time unless all codes and clusters have allocate different codes from a reused cluster at another been allocated and there are still sites remaining to be allo- site. cated. In this case Atoll reuses the clusters as far as possible at another site. © Forsk 2009 AT281_TRG_E1 285 Technical Reference Guide 6.7.2.1.4 Strategy: ‘Distributed per Site Since the restrictions of neighbourhood only apply to co-sites with the same importance and sites distances are greater than reuse distances, every site has the same priority. Then, the group of adjacent clusters allocation to sites is performed in an alphanumeric order. Without ‘Use a Maximum of Codes’ With ‘Use a Maximum of Codes’ In this strategy, a group of adjacent clusters is limited to be When it is possible to use a maximum of codes, Atoll can used at just one site at a time unless all codes and groups allocate different codes from a reused group of adjacent of adjacent clusters have been allocated and there are still cluster at another site. sites remaining to be allocated. In this case (here only one group of adjacent clusters (clusters 0, 1 and 2) is available), Atoll reuses the group at another site. 6.7.2.2 Allocate Carriers Identically In order to understand the behaviour of algorithm when using the option "Allocate Carriers Identically" or not, let us consider the following sample scenario: Let Site0, Site1, Site2 and Site3 be four sites with 3 cells using carrier 0 and 3 cells using carrier 1. Scrambling codes have to be allocated out of 3 clusters consisted of 8 primary scrambling codes. This implies that the domain of scrambling codes for the five sites is from 0 to 23 (cluster 0 to cluster 2). The reuse distance is supposed to be less than the inter-site distance. Only co-site neighbours exist. Allocation algorithm will be based on the "One Cluster per Site" strategy and the option "Use a Maximum of Codes" is selected. Without ‘Allocate Carriers Identically’ With ‘Allocate Carriers Identically’ Atoll allocates one cluster at each site as detailed in the In this case, Atoll allocates one cluster at each site and previous section. Then, it allocates a code from the cluster then, one code to each transmitter so as to use a maximum to each cell of the site so as to use a maximum of codes. of codes. Then, the same code is given to each cell of the transmitter. In both cases (with and without ’Allocate Carriers Identically’), every site has the same priority. Then, cluster allocation to sites is performed in an alphanumeric order. 286 AT281_TRG_E1 © Forsk 2009 Chapter 6: UMTS HSPA Networks 6.8 Automatic GSM-UMTS Neighbour Allocation 6.8.1 Overview You can automatically calculate and allocate neighbours between GSM and UMTS networks. In Atoll, it is called inter-technology neighbour allocation. Inter-technology handover is used in two cases: • • When the UMTS coverage is not continuous. In this case, the UMTS coverage is extended by UMTS-GSM handover into the GSM network, And in order to balance traffic and service distribution between both networks. Note that the automatic inter-technology neighbour allocation algorithm takes into account both cases. In order to be able to use the inter-technology neighbour allocation algorithm, you must have: • • An .atl document containing the GSM network, GSM.atl, and another one describing the UMTS network, UMTS.atl, An existing link on the Transmitters folder of GSM.atl into UMTS.atl. The external neighbour allocation algorithm takes into account all the GSM TBC transmitters. It means that all the TBC transmitters of GSM.atl are potential neighbours. The cells to be allocated will be called TBA cells which, being cells of UMTS.atl, satisfy following conditions: • • • • They are active, They satisfy the filter criteria applied to Transmitters folder, They are located inside the focus zone, They belong to the folder for which allocation has been executed. This folder can be either the Transmitters folder or a group of transmitters subfolder. Only UMTS TBA cells may be assigned neighbours. 6.8.2 Automatic Allocation Description The allocation algorithm takes into account criteria listed below: • • • • The inter-transmitter distance, The maximum number of neighbours fixed, Allocation options, The selected allocation strategy, Two allocation strategies are available: the first one is based on distance and the second one on coverage overlapping. We assume we have a UMTS reference cell, A, and a GSM candidate neighbour, transmitter B. 6.8.2.1 Algorithm Based on Distance When automatic allocation starts, Atoll checks following conditions: 1. The distance between the UMTS reference cell and the GSM neighbour must be less than the user-definable maximum inter-site distance. If the distance between the UMTS reference cell and the GSM neighbour is greater than this value, then the candidate neighbour is discarded. Candidate neighbours are sorted in descending order with respect to distance. Note: • 2. Transmitter azimuths are taken into account to evaluate the inter-transmitter distance (for further information on inter-transmitter distance calculation, please refer to "Calculation of Inter-Transmitter Distance" on page 290) The calculation options, Carriers: This option enables you to select the carrier(s) on which you want to run the allocation. You may choose one or more carriers. Atoll will allocate neighbours to cells using the selected carriers. Force co-site cells as neighbours: It enables you to automatically include GSM transmitters located on the same site as the reference UMTS cell in the candidate neighbour list. This option is automatically selected. Force exceptional pairs: This option enables you to force/forbid some neighbourhood relationships. Therefore, you may force/forbid a GSM transmitter to be candidate neighbour of the reference UMTS cell. Delete existing neighbours: When selecting the Delete existing neighbours option, Atoll deletes all the current neighbours and carries out a new neighbour allocation. If not selected, existing neighbours are kept. 3. The importance of neighbours. Importance values are used by the allocation algorithm to rank the neighbours according to the allocation reason. Atoll lists all neighbours and sorts them by importance value so as to eliminate some of them from the neighbour list if the maximum number of neighbours to be allocated to each cell is exceeded. If we consider the case for which there are 15 candidate neighbours and the maximum number of neighbours to be allocated to the reference cell is 8. Among these 15 candidate neighbours, only 8 (having the highest importance values) will be allocated to the reference cell. Note that the © Forsk 2009 AT281_TRG_E1 287 Technical Reference Guide maximum number of inter-technology neighbours can be defined at the cell level (property dialogue or cell table). If defined there, this value is taken into account instead of the default one available in the Neighbour Allocation dialogue. As indicated in the table below, the neighbour importance depends on the neighbourhood cause; this value varies between 0 to 100%. Neighbourhood cause When Importance value Existing neighbour If the Delete existing neighbours option is not selected Existing importance Exceptional pair If the Force exceptional pairs option is selected 100 % Co-site transmitter If the Force co-site cells as neighbours option is selected 100 % Neighbourhood relationship that fulfils distance conditions If the maximum distance is not exceeded d 1 – -----------d max Where d is the distance between the UMTS reference cell and the GSM neighbour and d max is the maximum inter-site distance. In the Results part, Atoll provides the list of neighbours, the number of neighbours and the maximum number of neighbours allowed for each cell. In addition, it indicates the importance (in %) of each neighbour and the allocation reason. Therefore, a neighbour may be marked as exceptional pair, co-site, or distance. For neighbours accepted for distance reasons, Atoll displays the distance from the reference cell (m). Finally, if cells have previous allocations in the list, neighbours are marked as existing. 6.8.2.2 Algorithm Based on Coverage Overlapping When automatic allocation starts, Atoll checks following conditions: 1. The distance between the UMTS reference cell and the GSM neighbour must be less than the user-definable maximum inter-site distance. If the distance between the UMTS reference cell and the GSM neighbour is greater than this value, then the candidate neighbour is discarded. Note: • 2. Here, real inter-transmitter distance is considered. The calculation options, Carriers: This option enables you to select the carrier(s) on which you want to run the allocation. You may choose one or more carriers. Atoll will allocate neighbours to cells using the selected carriers. Force co-site cells as neighbours: It enables you to automatically include GSM transmitters located on the same site as the reference UMTS cell in the candidate neighbour list. This option is automatically selected. Force exceptional pairs: This option enables you to force/forbid some neighbourhood relationships. Therefore, you may force/forbid a GSM transmitter to be candidate neighbour of the reference UMTS cell. Delete existing neighbours: When selecting the Delete existing neighbours option, Atoll deletes all the current neighbours and carries out a new neighbour allocation. If not selected, existing neighbours are kept. 3. There must be an overlapping zone ( S A S B ) with a given cell edge coverage probability. Four different cases may be considered for SA: - 1st case: SA is the area where the cell A is the best serving cell of the UMTS network. - The pilot signal received from A is greater than the minimum pilot signal level, - The pilot quality from A exceeds a user-definable minimum value (minimum Ec/I0) and is the highest one. In this case, the Ec/I0 margin must be equal to 0dB and the max Ec/I0 option disabled. - 2nd case: SA represents the area where the pilot quality from the cell A strats decreasing but the cell A is still the best serving cell of the UMTS network. The Ec/I0 margin must be equal to 0dB, the max Ec/I0 option selected and a maximum Ec/I0 user-defined. - - The pilot signal received from A is greater than the minimum pilot signal level, The pilot quality from A exceeds the minimum Ec/I0 but is lower than the maximum Ec/I0. The pilot quality from A is the highest one. 3rd case: SA represents the area where the cell A is not the best serving cell but can enter the active set. Here, the Ec/I0 margin has to be different from 0dB and the max Ec/I0 option disabled. - - 288 The pilot signal received from A is greater than the minimum pilot signal level, The pilot quality from A is within a margin from the best Ec/I0, where the best Ec/I0 exceeds the minimum Ec/I0. 4th case: SA represents the area where: - The pilot signal received from A is greater than the minimum pilot signal level, AT281_TRG_E1 © Forsk 2009 Chapter 6: UMTS HSPA Networks - The pilot quality from A is within a margin from the best Ec/I0 (where the best Ec/I0 exceeds the minimum Ec/I0) and lower than the maximum Ec/I0. In this case, the margin must be different from 0dB, the max Ec/I0 option selected and a maximum Ec/I0 userdefined. Two different cases may be considered for SB: - 1st case: SB is the area where the cell B is the best serving cell of the GSM network. In this case, the margin must be set to 0dB. - - The signal level received from B on the BCCH TRX type exceeds the user-defined minimum threshold and is the highest one. 2nd case: The margin is different from 0dB and SB is the area where: - The signal level received from B on the BCCH TRX type exceeds the user-defined minimum threshold and is within a margin from the best BCCH signal level. SA SB Atoll calculates the percentage of covered area ( ---------------------- 100 ) and compares this value to the % minimum covered SA area. If this percentage is not exceeded, the candidate neighbour B is discarded. Candidate neighbours fulfilling coverage conditions are sorted in descending order with respect to % of covered area. Guidelines for the automatic allocation When the automatic allocation is based on coverage overlapping, we recommend you to perform two successive automatic allocations: - A first allocation in order to find handovers due to non-continuous UMTS coverage. In this case, you have to select the max Ec/I0 option and define a high enough value. - A second allocation in order to complete the previous list with handovers motivated for reasons of traffic and service distribution. Here, the max Ec/I0 option must be disabled. 4. The importance of neighbours. Importance values are used by the allocation algorithm to rank the neighbours according to the allocation reason. Atoll lists all neighbours and sorts them by importance value so as to eliminate some of them from the neighbour list if the maximum number of neighbours to be allocated to each cell is exceeded. If we consider the case for which there are 15 candidate neighbours and the maximum number of neighbours to be allocated to the reference cell is 8. Among these 15 candidate neighbours, only 8 (having the highest importance values) will be allocated to the reference cell. Note that the maximum number of inter-technology neighbours can be defined at the cell level (property dialogue or cell table). If defined there, this value is taken into account instead of the default one available in the Neighbour Allocation dialogue. As indicated in the table below, the neighbour importance depends on the cause; this value varies between 0 to 100%. Neighbourhood reason When Importance value Existing neighbour If the Delete existing neighbours option is not selected Existing importance Exceptional pair If the Force exceptional pairs option is selected 100 % Co-site transmitter If the Force co-site cells as neighbours option is selected IF Neighbourhood relationship that fulfils coverage conditions If the % minimum covered area is exceeded IF Except the case of forced neighbours (importance = 100%), priority assigned to each neighbourhood cause is determined using the Importance Function (IF). The IF considers two factors for calculating the importance: • • The co-site factor (C) which is a Boolean The overlapping factor (O) meaning the percentage of overlapping The IF is user-definable using the Min importance and Max importance fields. Factor Min importance Default value Max importance Default value Overlapping factor (O) Min O 1% Max O 60% Co-site factor (C) Min C 60% Max C 100% The IF evaluates importance as follows: Co-site neighbourhood reason IF Resulting IF using the default values from the table above No Min O + O O 1% + 59% O Yes Min C + C O 60% + 40% O Where X = Max X – Min X © Forsk 2009 AT281_TRG_E1 289 Technical Reference Guide Notes: • If there is no overlapping between the range of each factor, the neighbours will be ranked by neighbourhood cause. Using the default values for minimum and maximum importance fields, neighbours will be ranked in the following order: i. Co-site neighbours ii. Neighbours based on coverage overlapping • If the ranges of the importance factors overlap, the neighbours may not be ranked according to the neighbourhood cause. • The ranking between neighbours from the same category depends on the factor (O). In the Results part, Atoll provides the list of neighbours, the number of neighbours and the maximum number of neighbours allowed for each cell. In addition, it indicates the importance (in %) of each neighbour and the allocation reason. Therefore, a neighbour may be marked as exceptional pair, co-site or coverage. For neighbours accepted for co-site and coverage reasons, Atoll displays the percentage of area meeting the coverage conditions and the corresponding surface area (km2). Finally, if cells have previous allocations in the list, neighbours are marked as existing. Notes: • No prediction study is needed to perform an automatic neighbour allocation. When starting an automatic neighbour allocation, Atoll automatically calculates the path loss matrices if not found. • A forbidden neighbour must not be listed as neighbour except if the neighbourhood relationship already exists and the Delete existing neighbours option is unchecked when you start the new allocation. In this case, Atoll displays a warning in the Event viewer indicating that the constraint on the forbidden neighbour will be ignored by algorithm because the neighbour already exists. • In the Results, Atoll displays only the cells for which it finds new neighbours. Therefore, if a TBA cell has already reached its maximum number of neighbours before starting the new allocation, it will not appear in the Results table. 6.8.2.3 Appendices 6.8.2.3.1 Delete Existing Neighbours Option As explained above, Atoll keeps the existing inter-technology neighbours when the Delete existing neighbours option is not checked. We assume that we have an existing allocation of inter-technology neighbours. A new TBA cell i is created in UMTS.atl. Therefore, if you start a new allocation without selecting the Delete existing neighbours option, Atoll determines the neighbour list of the cell i. If you change some allocation criteria (e.g. increase the maximum number of neighbours or create a new GSM TBC transmitter) and start a new allocation without selecting the Delete existing neighbours option, it examines the neighbour list of TBA cells and checks allocation criteria if there is space in their neighbour lists. A new GSM TBC transmitter can enter the TBA cell neighbour list if allocation criteria are satisfied. It will be the first one in the neighbour list. 6.8.2.3.2 Calculation of Inter-Transmitter Distance When allocation algorithm is based on distance, Atoll takes into account the real distance ( D in m) and azimuths of antennas in order to calculate the effective inter-transmitter distance ( d in m). d = D 1 + x cos – x cos where x = 0.5% so that the maximum D variation does not exceed 1%. Figure 6.19: Inter-Transmitter Distance Computation The formula above implies that two cells facing each other will have a smaller effective distance than the real physical distance. It is this effective distance that will be taken into account rather than the real distance. Note: • 290 This formula is not used when allocation algorithm is based on coverage overlapping. In this case, real inter-transmitter distance is considered. AT281_TRG_E1 © Forsk 2009 Chapter 7 CDMA2000 1xRTT 1xEV-DO Networks This chapter provides descriptions of all the algorithms for calculations, analyses, automatic allocations, simulations and prediction studies available in CDMA2000 projects. Atoll RF Planning & Optimisation Software Technical Reference Guide 292 AT281_TRG_E1 © Forsk 2009 Chapter 7: CDMA2000 Networks 7 CDMA2000 Networks 7.1 General Prediction Studies 7.1.1 Calculation Criteria Three criteria can be studied in point analysis (Profile tab) and in common coverage studies. Study criteria are detailed in the table below: Study criteria Formulas Signal level ( P rec ) in dBm Signal level received from a transmitter on a carrier (cell) P rec ic = EIRP ic – L path – M Shadowing – model – L Indoor + G term – L term L path = L model + L ant Path loss ( L path ) in dBm Total losses ( L total ) in dBm Tx L total = L path + L Tx + L term + L indoor + M Shadowing – model – G Tx + G term where, EIRP is the effective isotropic radiated power of the transmitter, ic is a carrier number, L model is the loss on the transmitter-receiver path (path loss) calculated by the propagation model, L ant Tx is the transmitter antenna attenuation (from antenna patterns), M Shadowing – model is the shadowing margin. This parameter is taken into account when the option “Shadowing taken into account” is selected, L Indoor are the indoor losses, taken into account when the option “Indoor coverage” is selected, L term are the receiver losses, G term is the receiver antenna gain, G Tx is the transmitter antenna gain, L Tx is the transmitter loss ( L Tx = L total – DL ). For information on calculating transmitter loss, "UMTS HSPA, CDMA2000 1xRTT 1xEV-DO, and TD-SCDMA Documents" on page 128. Notes: • For CDMA2000 1xRTT systems, EIRP ic = P pilot ic + G Tx – L Tx (where, P pilot ic is the cell pilot power). • For CDMA2000 1xEV-DO systems, EIRP ic = P max ic + G Tx – L Tx (where P max ic is the maximum cell power). • It is also possible to analyse all the carriers at once. In this case, Atoll displays the best signal level received from a transmitter. Therefore, if the network consists of 1xRTT and 1xEV-DO carriers, Atoll takes the highest power of both cells for each transmitter (i.e. the highest value between the pilot power of the 1xRTT cell and the maximum power of the 1xEV-DO cell) to calculate the received signal level. • Atoll considers that G term and L term equal zero. 7.1.2 Point Analysis 7.1.2.1 Profile Tab Atoll displays either the signal level received from the selected transmitter on a carrier ( P rec ic ), or the highest signal level received from the selected transmitter on all the carriers. Note: • For a selected transmitter, it is also possible to study the path loss, L path , or the total losses, L total . Path loss and total losses are the same on any carrier. © Forsk 2009 AT281_TRG_E1 293 Technical Reference Guide 7.1.2.2 Reception Tab Analysis provided in the Reception tab is based on path loss matrices. So, you can study reception from TBC transmitters for which path loss matrices have been computed on their calculation areas. For each transmitter, Atoll displays either the signal level received on a carrier, ( P rec ic ), or the highest signal level received on all the carriers. Reception bars are displayed in a decreasing signal level order. The maximum number of reception bars depends on the signal level received from the best server. Only reception bars of transmitters whose signal level is within a 30 dB margin from the best server can be displayed. Note: • For a selected transmitter, it is also possible to study the path loss, L path , or the total losses, L total . Path loss and total losses are the same on any carrier. • 7.1.3 You can use a value other than 30 dB for the margin from the best server signal level, for example a smaller value for improving the calculation speed. For more information on defining a different value for this margin, see the Administrator Manual. Coverage Studies For each TBC transmitter, Txi, Atoll determines the selected criterion on each bin inside the Txi calculation area. In fact, each bin within the Txi calculation area is considered as a potential (fixed or mobile) receiver. Coverage study parameters to be set are: • • 7.1.3.1 The study conditions in order to determine the service area of each TBC transmitter, The display settings to select how to colour service areas. Service Area Determination Atoll uses parameters entered in the Condition tab of the coverage study property dialogue to predetermine areas where it will display coverage. We can distinguish three cases: 7.1.3.1.1 All Servers The service area of Txi corresponds to the bins where: Txi Txi Txi Minimum threshold P rec ic or L total or L path Maximum threshold 7.1.3.1.2 Best Signal Level and a Margin The service area of Txi corresponds to the bins where: Txi Txi Txi Minimum threshold P rec ic or L total or L path Maximum threshold And Txi Txj P rec ic Best P rec ic – M ji M is the specified margin (dB). Best function: considers the highest value. Notes: • If the margin equals 0 dB, Atoll will consider bins where the signal level received from Txi is the highest. • If the margin is set to 2 dB, Atoll will consider bins where the signal level received from Txi is either the highest or 2dB lower than the highest. • If the margin is set to -2 dB, Atoll will consider bins where the signal level received from Txi is 2dB higher than the signal levels from transmitters, which are 2nd best servers. 7.1.3.1.3 Second Best Signal Level and a Margin The service area of Txi corresponds to the bins where: Txi Txi Txi Minimum threshold P rec ic or L total or L path Maximum threshold And Txi P rec ic 2 294 nd Txj Best P rec ic – M ji AT281_TRG_E1 © Forsk 2009 Chapter 7: CDMA2000 Networks M is the specified margin (dB). 2nd Best function: considers the second highest value. Notes: • If the margin equals 0 dB, Atoll will consider bins where the signal level received from Txi is the second highest. • If the margin is set to 2 dB, Atoll will consider bins where the signal level received from Txi is either the second highest or 2dB lower than the second highest. • If the margin is set to -2 dB, Atoll will consider bins where the signal level received from Txi is 2dB higher than the signal levels from transmitters, which are 3rd best servers. 7.1.3.2 Coverage Display 7.1.3.2.1 Plot Resolution Prediction plot resolution is independent of the matrix resolutions and can be defined on a per study basis. Prediction plots are generated from multi-resolution path loss matrices using bilinear interpolation method (similar to the one used to evaluate site altitude). 7.1.3.2.2 Display Types It is possible to display the transmitter service area with colours depending on any transmitter attribute or other criteria such as: Signal Level (in dBm, dBµV, dBµV/m) Atoll calculates signal level received from the transmitter on each bin of each transmitter service area. A bin of a service area is coloured if the signal level exceeds ( ) the defined minimum thresholds (bin colour depends on signal level). Coverage consists of several independent layers whose visibility in the workspace can be managed. There are as many layers as transmitter service areas. Each layer shows the different signal levels available in the transmitter service area. Best Signal Level (in dBm, dBµV, dBµV/m) Atoll calculates signal levels received from transmitters on each bin of each transmitter service area. Where other service areas overlap the studied one, Atoll chooses the highest value. A bin of a service area is coloured if the signal level exceeds ( ) the defined thresholds (the bin colour depends on the signal level). Coverage consists of several independent layers whose visibility in the workspace can be managed. There are as many layers as defined thresholds. Each layer corresponds to an area where the signal level from the best server exceeds a defined minimum threshold. Path Loss (dB) Atoll calculates path loss from the transmitter on each bin of each transmitter service area. A bin of a service area is coloured if path loss exceeds ( ) the defined minimum thresholds (bin colour depends on path loss). Coverage consists of several independent layers whose visibility in the workspace can be managed. There are as many layers as service areas. Each layer shows the different path loss levels in the transmitter service area. Total Losses (dB) Atoll calculates total losses from the transmitter on each bin of each transmitter service area. A bin of a service area is coloured if total losses exceed ( ) the defined minimum thresholds (bin colour depends on total losses). Coverage consists of several independent layers whose visibility in the workspace can be managed. There are as many layers as service areas. Each layer shows the different total losses levels in the transmitter service area. Best Server Path Loss (dB) Atoll calculates signal levels received from transmitters on each bin of each transmitter service area. Where other service areas overlap the studied one, Atoll determines the best transmitter and evaluates path loss from the best transmitter. A bin of a service area is coloured if the path loss exceeds ( ) the defined thresholds (bin colour depends on path loss). Coverage consists of several independent layers whose visibility in the workspace can be managed. There are as many layers as defined thresholds. Each layer corresponds to an area where the path loss from the best server exceeds a defined minimum threshold. Best Server Total Losses (dB) Atoll calculates signal levels received from transmitters on each bin of each transmitter service area. Where service areas overlap the studied one, Atoll determines the best transmitter and evaluates total losses from the best transmitter. A bin of a service area is coloured if the total losses exceed ( ) the defined thresholds (bin colour depends on total losses). Coverage consists of several independent layers whose visibility in the workspace can be managed. There are as many layers as defined thresholds. Each layer corresponds to an area where the total losses from the best server exceed a defined minimum threshold. © Forsk 2009 AT281_TRG_E1 295 Technical Reference Guide Number of Servers Atoll evaluates how many service areas cover a bin in order to determine the number of servers. The bin colour depends on the number of servers. Coverage consists of several independent layers whose visibility in the workspace can be managed. There are as many layers as defined thresholds. Each layer corresponds to an area where the number of servers exceeds ( ) a defined minimum threshold. Cell Edge Coverage Probability (%) On each bin of each transmitter service area, the coverage corresponds to the pixels where the signal level from this transmitter fulfils signal conditions defined in Conditions tab with different Cell edge coverage probabilities. There is one coverage area per transmitter in the explorer. Best Cell Edge Coverage Probability (%) On each bin of each transmitter service area, the coverage corresponds to the pixels where the best signal level received fulfils signal conditions defined in Conditions tab. There is one coverage area per cell edge coverage probability in the explorer. 7.2 Definitions and Formulas 7.2.1 Parameters Used for CDMA2000 1xRTT Modelling 7.2.1.1 Inputs This table lists simulation and prediction inputs (calculation options, quality targets, active set management conditions, etc.) Name Value Unit Description F ortho Clutter parameter None Orthogonality factor F MUD Tx Site equipment parameter None MUD factor ic Frequency band parameter None Carrier number req Q pilot txi ic + Q pilot min req req None Active set upper threshold (used to determine the best server in the active set) Q pilot txi ic + Q pilot min min None Active set lower threshold (used to determine other members of the active set) req Min. Ec/I0 - Cell parameter None Minimum Ec/I0 required from the cell to be the best server in the active set min T_Drop - Cell parameter None Minimum Ec/I0 required from the cell not to be rejected from the active set req Delta Min. Ec/I0 - Mobility parameter None Variation of the minimum Ec/I0 required from the cell to be the best server in the active set min Delta T_Drop - Mobility parameter None Variation of the minimum Ec/I0 required from the cell not to be rejected from the active set None Eb/Nt target for FCH channel on downlink None Eb/Nt target for SCH channel on downlink None Eb/Nt target for FCH channel on uplink None Eb/Nt target for SCH channel on uplink None Number of channel elements available for a site on uplink Q pilot Q pilot Q pilot txi ic Q pilot txi ic Q pilot Q pilot DL Q req FCH E -----b- N t req FCH – DL (Service, Terminal, Mobility) parameter E -----b- N t req SCH – DL DL Q req SCH (Service, Terminal, Mobility, SCH rate multiple) parameter UL Q req FCH E -----b- N t req FCH – UL (Service, Terminal, Mobility) parameter E -----b- N t req SCH – UL UL Q req SCH (Service, Terminal, Mobility, SCH rate multiple) parameter CE – U L N max 296 NI Site parameter AT281_TRG_E1 © Forsk 2009 Chapter 7: CDMA2000 Networks CE – D L NI Site parameter None Number of channel elements available for a site on downlink N CE – U L NI Simulation result None Number of channel elements of a site consumed by users on uplink N CE – D L NI Simulation result None Number of channel elements of a site consumed by users on downlink N max N Overhead – C E – UL Site equipment parameter None Number of channel elements used by the cell for common channels on uplink N Overhead – C E – DL Site equipment parameter None Number of channel elements used by the cell for common channels on downlink N FCH – C E – UL (Terminal, site equipment) parameter None Number of channel elements used for FCH on uplink N FCH – C E – DL (Terminal, site equipment) parameter None Number of channel elements used for FCH on downlink Simulation constraint None Maximum number of Walsh codes available per cell (128) Simulation result None Number of Walsh codes used by the cell NF term Terminal parameter None Terminal Noise Figure NF Tx Transmitter parameter (user-defined or calculated from transmitter equipment characteristics) None Transmitter Noise Figure K 1.38 10-23 J/K Boltzman constant T 293 K Ambient temperature W 1.23 MHz Hz Spreading Bandwidth Tx DL Cell parameter None Inter-technology downlink noise rise NR inter – techno log y Tx UL Cell parameter None Inter-technology uplink noise rise RF ic ic adj Network parameter If not defined, it is assumed that there is no inter-carrier interference None Interference reduction factor between two adjacent carriers ic and ic adj Codes N max txi ic N Codes txi ic NR inter – techno log y Tx m ICP ic ic i Network parameter If not defined, it is assumed that there is no inter-technology downlink interferences due to external transmitters None Inter-technology Channel Protection between the signal transmitted by Tx and received by m assuming the frequency gap between ic i (external network) and ic UL X max DL %Power max Simulation constraint (global parameter or cell parameter) % Maximum uplink load factor Simulation constraint (global parameter or cell parameter) % Maximum percentage of used power W Thermal noise at transmitter Tx UL Tx NF Tx K T W NR inter – techno log y Term NF Term K T W NR inter – techno log y W Thermal noise at terminal Rc W bps Chip rate f rake efficiency UL Equipment parameter None Uplink rake receiver efficiency factor DL Terminal parameter None Downlink rake receiver efficiency factor Frate SCH Simulation result None SCH rate factor (drawn following the SCH probabilities of the service) R FCH DL Terminal parameter bps Downlink FCH nominal rate DL R FCH Frate SCH bps Downlink SCH bit rate Frate SCH Simulation result None SCH rate factor (drawn following the SCH probabilities of the service) UL Terminal parameter bps Uplink FCH nominal rate N0 N0 f rake efficiency DL R SCH UL R FCH © Forsk 2009 Tx DL DL DL AT281_TRG_E1 297 Technical Reference Guide UL UL UL R FCH Frate SCH bps Uplink SCH bit rate W -------------DL R FCH None Downlink service processing gain on FCH W -------------DL R SCH None Downlink service processing gain on SCH W ------------UL R FCH None Uplink service processing gain on FCH W -------------UL R SCH None Uplink service processing gain on SCH DL Service parameter None Downlink activity factor on FCH AF FCH UL Service parameter None Uplink activity factor on FCH P Sync txi ic Cell parameter W Cell synchronisation channel power P paging txi ic Cell parameter W Cell other common channels (except CPICH and SCH) power P pilot txi ic Cell parameter W Cell pilot power P max txi ic Cell parameter W Maximum cell power M pooling txi ic Cell parameter dB Maximum amount of power reserved for pooling P FCH min Service parameter W Minimum power allowed for FCH P FCH max Service parameter W Maximum power allowed for FCH P SCH min Service parameter W Minimum power allowed for SCH P SCH max Service parameter W Maximum power allowed for SCH P FCH txi ic tch Simulation result including the term AFFCH Serv W Cell FCH power for a traffic channel on carrier ic W Total FCH power on carrier ic Simulation result W Transmitter SCH power for a traffic channel on carrier ic W Total SCH power on carrier ic W Transmitter total transmitted power on carrier ic R SCH FCH – DL Gp SCH – DL Gp FCH – UL Gp SCH – UL Gp AF FCH P FCH txi ic DL P FCH txi ic tch tch FCH ic P SCH txi ic tch P SCH txi ic P SCH ic tch tch SCH ic P tx txi ic + P FCH txi ic P term min Terminal parameter W Minimum terminal power allowed max Terminal parameter W Maximum terminal power allowed P term FCH Simulation result including the term AFFCH Serv W Terminal FCH power transmitted in carrier ic P term ic SCH Simulation result W Terminal SCH power transmitted on carrier ic BTS BTS parameter % Percentage of BTS signal correctly transmitted term Terminal parameter % Percentage of terminal signal correctly transmitted Clutter parameter % Percentage of pilot finger - percentage of signal received by the terminal pilot finger G Tx Antenna parameter None Transmitter antenna gain G Term Terminal parameter None Terminal gain P term ic 298 P pilot txi ic + P Sync txi ic + P paging txi ic + P SCH txi ic UL AT281_TRG_E1 © Forsk 2009 Chapter 7: CDMA2000 Networks L Tx Transmitter parameter (user-defined or calculated from transmitter equipment characteristics) None Transmitter lossa L body Service parameter None Body loss L Term Terminal parameter None Terminal loss L indoor Clutter and frequency band parameter L path Propagation model result None Path loss f Terminal parameter None Number of fingers p Terminal parameter % Pilot power percentage M Shadowing – model Result calculated from cell edge coverage probability and model standard deviation None Model Shadowing margin Only used in prediction studies M Shadowing – Ec Io Result calculated from cell edge coverage probability and Ec/I0 standard deviation None Ec/I0 Shadowing margin Only used in prediction studies DL Indoor loss npaths G macro – diversity = M Shadowing – Ec Io – M Shadowing –Ec Io DL G macro – diversity None n=2 or 3 M Shadowing – Eb Nt DL M Shadowing – Eb Nt UL pilot signals at the mobile b. Result calculated from cell edge coverage probability and DL Eb/Nt standard deviation None DL Eb/Nt Shadowing margin Only used in prediction studies Result calculated from cell edge coverage probability and UL Eb/Nt standard deviation None UL Eb/Nt Shadowing margin Only used in prediction studies UL UL G macro – diversity DL gain due to availability of several npaths G macro – diversity = M Shadowing – Eb Nt UL – M Shadowing – Eb Nt n=2 or 3 Global parameter (default value) E Shadowing UL None UL quality gain due to signal diversity in soft handoffc. None Random shadowing error drawn during Monte-Carlo simulation Only used in simulations None Transmitter-terminal total loss P pilot txi ic --------------------------------LT W Chip power received at terminal Simulation result In prediction studiesd For Ec/I0 calculation L path L Tx L term L body L indoor M Shadowing – Ec Io --------------------------------------------------------------------------------------------------------------------------------------------------G Tx G term For DL Eb/Nt calculation L path L Tx L term L body L indoor M Shadowing – Eb Nt DL -----------------------------------------------------------------------------------------------------------------------------------------------------------G Tx G term LT For UL Eb/Nt calculation L path L Tx L term L body L indoor M Shadowing – Eb Nt UL -----------------------------------------------------------------------------------------------------------------------------------------------------------G Tx G term In simulations L path L Tx L term L body L indoor E Shadowing -------------------------------------------------------------------------------------------------------------------------------G Tx G term P c txi ic FCH – DL txi ic tch P FCH txi ic tch ---------------------------------------------LT W Bit received power at terminal for FCH on carrier ic SCH – DL txi ic tch P SCH txi ic tch ---------------------------------------------LT W Bit received power at terminal for SCH on carrier ic W Bit received power at terminal for FCH+SCH on carrier ic W Total received power at terminal from a transmitter on carrier ic W Total power received at terminal from traffic channels of a transmitter on carrier ic W Bit received power at transmitter for FCH on carrier ic Pb Pb DL P b txi ic tch FCH – DL Pb DL FCH – UL Pb © Forsk 2009 txi ic tch P tx txi ic ---------------------------LT DL P tot txi ic P traf txi ic SCH – DL txi ic tch + P b tch ic P FCH txi ic + P SCH txi ic --------------------------------------------------------------------------LT FCH ic P term -------------LT AT281_TRG_E1 299 Technical Reference Guide SCH – UL Pb SCH P term -------------LT ic W Bit received power at transmitter for SCH on carrier ic UL Pb ic W Bit received power at transmitter for SCH+FCH on carrier ic UL P b ic UL UL P b ic + P c ic = ------------------1 – p W Total power transmitted by the terminal on carrier ic UL p P tot ic W Chip received power at transmitter FCH – UL P b ic SCH – UL ic + P b UL P tot ic UL P c ic a. L Tx = L total – UL on uplink and L Tx = L total – DL on downlink. For information on calculating transmitter losses on uplink and downlink, see "UMTS HSPA, CDMA2000 1xRTT 1xEV-DO, and TD-SCDMA Documents" on page 128. b. npaths M Shadowing –Ec Io corresponds to the shadowing margin evaluated from the shadowing error probability density function (n paths) in case of downlink Ec/I0 modelling. c. npaths M Shadowing – Eb Nt UL corresponds to the shadowing margin evaluated from the shadowing error probability density function (n paths) in case of uplink soft handoff modelling. d. In uplink prediction studies, only carrier power level is downgraded by the shadowing margin ( M Shadowing – Eb Nt ). In downlink prediction studies, carrier power level and intra-cell interference are downgraded by UL the shadowing model ( M Shadowing – Eb Nt M Shadowing – Eb Nt 7.2.1.2 DL DL or M Shadowing – Ec Io ) while extra-cell interference level is not. Therefore, or M Shadowing – Ec Io is set to 1 in downlink extra-cell interference calculation. Ec/I0 Calculation This table details the pilot quality ( Q pilot or Ec Io ) calculations. Name Value DL DL I intra txi ic P tot txi ic DL I extra ic DL P tot txj ic Unit Description W Downlink intra-cell interference at terminal on carrier ic W Downlink extra-cell interference at terminal on carrier ic W Downlink inter-carrier interference at terminal on carrier ic txj j i Ptot txj icadj DL DL I inter – carrier ic txj j ------------------------------------------------ RF ic ic adj Tx P Transmitted ic i -----------------------------------------Tx Tx m L ICP DL I inter – techno log y ic ni DL I 0 ic Ec Q pilot txi ic ------ I0 DL DL W ic i ic total DL DL Term I intra txi ic + I extra ic + I inter – carrier ic + I inter – techno log y ic + N 0 BTS P c txi ic ------------------------------------------------------DL I 0 ic W None Downlink inter-technology interference at terminal on carrier ic a Total received noise at terminal on carrier ic b Quality level at terminal on pilot for carrier ic a. In the case of an interfering GSM external network in frequency hopping, the ICP value is weighted according to the fractional load. Term b. In an active set, N 0 7.2.1.3 is calculated for all its members with Inter-technology downlink noise rise of the best server. DL Eb/Nt Calculation Eb DL This table details calculations of downlink traffic channel quality ( Q tch (tch could be FCH or SCH) or ------- ). Nt DL Name DL I intra txi ic 300 Value Unit Description 1 – BTS F ortho P DL txi ic tot W Downlink intra-cell interference at terminal on carrier ic AT281_TRG_E1 © Forsk 2009 Chapter 7: CDMA2000 Networks DL I extra ic DL P tot txj ic W Downlink extra-cell interference at terminal on carrier ic W Downlink inter-carrier interference at terminal on carrier ic txj j i Ptot txj icadj DL DL I inter – carrier ic txj j ------------------------------------------------ RF ic ic adj DL I inter – techno log y ic ni DL N tot ic DL DL Tx P Transmitted ic i -----------------------------------------Tx Tx m L total ICP ic ic W i DL Term DL I intra ic + I extra ic + I inter – carrier ic + I inter – techno log y ic + N 0 W Downlink inter-technology interference at terminal on carrier ic a Total received noise at terminal on carrier ic Without useful signal: FCH – DL E b DL DL Q FCH txi ic ------ N t FCH DL Q FCH ic BTS P b txi ic tch – DL ---------------------------------------------------------------------------------------------------------------- G FCH p DL DL N tot ic – 1 – F ortho BTS P b txi ic None FCH channel on carrier ic b FCH – DL BTS P b txi ic tch – DL - G FCH Total noise: --------------------------------------------------------------------------p DL N tot ic DL f rake efficiency DL Q FCH tx k ic Quality level at terminal on a traffic channel from one transmitter for a None txk ActiveSet FCH Quality level at terminal for FCH using carrier ic due to combination of all transmitters of the active set (Macrodiversity conditions). Without useful signal: SCH – DL E b DL DL Q SCH txi ic ------ N t SCH DL Q SCH ic BTS P b txi ic tch – DL ---------------------------------------------------------------------------------------------------------------- G SCH p DL DL N tot ic – 1 – F ortho BTS P b txi ic None SCH channel on carrier icc SCH – DL BTS P b txi ic tch – DL - G SCH Total noise: --------------------------------------------------------------------------p DL N tot ic DL f rake efficiency DL Q SCH tx k ic None Quality level at terminal for SCH using carrier ic due to combination of all transmitters of the active set (Macrodiversity conditions). None Downlink soft handover gain for FCH channel on carrier ic None Downlink soft handover gain for SCH channel on carrier ic W Required transmitter FCH traffic channel power to achieve Eb/Nt target at terminal on carrier ic W Required transmitter SCH traffic channel power to achieve Eb/Nt target at terminal on carrier ic W Required transmitter traffic channel power on carrier ic txk ActiveSet SCH DL DL G SHO FCH Q FCH ic ------------------------------------------------------------DL Q FCH BestServer ic DL DL G SHO SCH Q SCH ic ------------------------------------------------------------DL Q SCH BestServer ic DL req P FCH txi ic Q req FCH --------------------------- P FCH txi ic DL Q FCH ic DL req P SCH txi ic req P tch txi ic Q req SCH --------------------------- P SCH txi ic DL Q SCH ic req req P FCH txi ic + P SCH txi ic Quality level at terminal on a traffic channel from one transmitter for a a. In the case of an interfering GSM external network in frequency hopping, the ICP value is weighted according to the fractional load. b. Calculation option may be selected in the Global parameters tab. The chosen option will be taken into account only in simulations. In point analysis and coverage studies, Atoll uses the option “Total noise” to evaluate DL and UL Eb/Nt. c. Calculation option may be selected in the Global parameters tab. The chosen option will be taken into account only in simulations. In point analysis and coverage studies, Atoll uses the option “Total noise” to evaluate DL and UL Eb/Nt. 7.2.1.4 UL Eb/Nt Calculation Eb UL This table details calculations of uplink traffic channel quality ( Q tch (tch could be FCH or SCH) or ------- ). Nt UL © Forsk 2009 AT281_TRG_E1 301 Technical Reference Guide Name UL intra I tot Pb UL txi ic UL extra I tot Value UL term txj j i UL UL I inter – carrier txi ic W Total power received at transmitter from intra-cell terminals using carrier ic W Total power received at transmitter from extra-cell terminals using carrier ic W Uplink inter-carrier interference at terminal on carrier ic W Total received interference at transmitter on carrier ic UL P b ic + P c ic Pb Description UL ic + P c ic term txi txi ic Unit UL ic adj + P c ic adj term txj j ----------------------------------------------------------------------------- RF ic ic adj UL I tot txi ic UL extra I tot UL intra Tx txi ic + 1 – F MUD term I tot UL UL N tot txi ic UL txi ic +I inter – carrier txi ic tx I tot txi ic + N 0 W Total noise at transmitter on carrier ic (Uplink interference) a Without useful signal: FCH – UL Eb UL Q FCH txi ic ------ N t UL term P b ic – UL ---------------------------------------------------------------------------------------------------------------- G FCH p UL Tx UL N tot txi ic – 1 – F MUD term P b ic None Quality level at transmitter on a traffic channel for the FCH channel on carrier icb FCH – UL term P b ic – UL - G FCH Total noise: -----------------------------------------------------p UL N tot txi ic Without useful signal: SCH – UL Eb UL Q SCH txi ic ------ N t UL term P b ic – UL ---------------------------------------------------------------------------------------------------------------- G SCH p UL Tx UL N tot txi ic – 1 – F MUD term P b ic None Quality level at transmitter on a traffic channel for the SCH channel on carrier icc SCH – UL term P b ic – UL - G SCH Total noise: -----------------------------------------------------p UL N tot txi ic UL No HO: Q tch txi ic UL Softer HO: f rake efficiency UL Q tch tx k ic tx k ActiveSet samesite Soft, Softer/Soft HO (No MRC): UL UL Max Q tch tx k ic G macro – diversity txk ActiveSet UL Q tch ic Softer/Soft HO (MRC): Quality level at site using carrier ic due to combination of all transmitters of the active set located at the same site and taking into account increase of the None quality due to macro-diversity (macrodiversity gain). tch could be FCH or SCH UL UL UL f rake efficiency Q tch tx k ic Q tch tx l ic tx k ,txl ActiveSet txk samesite tx k Max UL In simulations, G macro – diversity = 1 . tx othersite l UL G macro – diversity UL UL G SHO FCH Q FCH ic ------------------------------------------------------------UL Q FCH BestServer ic None Uplink soft handover gain for FCH channel on carrier ic None Uplink soft handover gain for SCH channel on carrier ic W Required terminal power to achieve Eb/Nt target at transmitter for FCH on carrier ic UL UL G SHO SCH Q SCH ic ------------------------------------------------------------UL Q SCH BestServer ic UL FCH – req P term 302 ic Q req FCH --------------------------- P FCH term ic UL Q FCH ic AT281_TRG_E1 © Forsk 2009 Chapter 7: CDMA2000 Networks W Required terminal power to achieve Eb/Nt target at transmitter for SCH on carrier ic W Required terminal power on carrier ic UL SCH – req P term Q req SCH -------------------------- P SCH term ic UL Q SCH ic ic req FCH – req P term ic P term SCH – req ic + P term ic tx a. In an active set, N 0 is calculated for all its members with Inter-technology uplink noise rise of the best server. b. Calculation option may be selected in the Global parameters tab. The chosen option will be taken into account only in simulations. In point analysis and coverage studies, Atoll uses the option “Total noise” to evaluate DL and UL Eb/Nt. c. Calculation option may be selected in the Global parameters tab. The chosen option will be taken into account only in simulations. In point analysis and coverage studies, Atoll uses the option “Total noise” to evaluate DL and UL Eb/Nt. 7.2.1.5 Simulation Results This table contains some simulation results provided in the Cells and Mobiles tabs of the simulation property dialogue. Name Value DL DL P tot txi ic – F ortho BTS P tot txi ic DL I intra txi ic – 1 – F ortho BTS DL I extra ic DL P b txi Unit Description None Downlink intra-cell interference at terminal on carrier ic W Downlink extra-cell interference at terminal on carrier ic W Downlink inter-carrier interference at terminal on carrier ic ic DL P tot txj ic txj j i Ptot txj icadj DL DL I inter – carrier ic txj j ------------------------------------------------ RF ic ic adj DL I inter – techno log y ic ni DL DL I tot ic DL DL DL Term I tot ic + N 0 Pb UL txi ic UL extra I tot i DL DL UL intra UL term txj j i Pb UL ic at terminal on carrier ic a Total effective interference at terminal on carrier ic (after unscrambling) W Total received noise at terminal on carrier ic W Total power received at transmitter from intra-cell terminals using carrier ic W Total power received at transmitter from extra-cell terminals using carrier ic W Uplink inter-carrier interference at terminal on carrier ic W Total received interference at transmitter on carrier ic W Total noise at transmitter on carrier ic (Uplink interference) None Cell uplink load factor on carrier ic UL P b ic + P c ic Downlink inter-technology interference W UL ic + P c ic term txi txi ic UL I inter – carrier txi W I intra ic + I extra ic + I inter – carrier ic + I inter – techno log y ic N tot ic I tot Tx P Transmitted ic i -----------------------------------------Tx Tx m L total ICP ic ic UL ic adj + P c ic adj term txj j ----------------------------------------------------------------------------- RF ic ic adj UL I tot txi ic UL N tot txi ic UL extra I tot UL intra Tx txi ic + 1 – F MUD term I tot UL UL txi ic +I inter – carrier txi ic tx I tot txi ic + N 0 UL txi ic I tot txi ic ----------------------------UL N tot txi ic F UL txi ic I tot txi ic ------------------------------------------------------------------------------------------UL intra Tx I tot txi ic 1 – F MUD term None Cell uplink reuse factor on carrier ic E UL txi ic 1 -----------------------------UL F txi ic None Cell uplink reuse efficiency factor on carrier ic P tx txi ic -------------------------------- 100 P max txi ic None Percentage of max transmitter power used. X UL UL %Power © Forsk 2009 DL txi ic AT281_TRG_E1 303 Technical Reference Guide Simulation result available per cell DL I extra ic DL + I inter – carrier ic L T ---------------------------------------------------------------------------------------- + 1 – F ortho BTS P tx txi ic ------------------------------------------------------------------------------------------------------------------------------------------1 ------------- + 1 – F ortho BTS tch DL CI req X DL txi ic with DL CI req SCH – DL FCH – DL None Downlink load factor on carrier ic None Downlink reuse factor on a carrier ic Q req Q req = ------------------------+ -----------------------SCH – DL FCH – DL Gp Gp DL I tot ic Simulation result available per mobile: -------------------DL N tot ic DL F DL I tot ic ------------------------------DL I intra txi ic txi ic NR DL txi ic – 10 log 1 – X DL txi ic dB Noise rise on downlink NR UL txi ic – 10 log 1 – X UL txi ic dB Noise rise on uplink a. In the case of an interfering GSM external network in frequency hopping, the ICP value is weighted according to the fractional load. 7.2.2 Parameters Used for CDMA2000 1xEV-DO Modelling 7.2.2.1 Inputs This table lists simulation and prediction inputs (calculation options, quality targets, active set management conditions, etc.) Name Value Unit Description F ortho Clutter parameter None Orthogonality factor F MUD Tx Site equipment parameter None MUD factor ic Frequency band parameter None Carrier number req Q pilot txi ic + Q pilot min req req None Active set upper threshold (used to determine the best server in the active set) Q pilot txi ic + Q pilot min min None Active set lower threshold (used to determine other members of the active set) req Min. Ec/I0 - Cell parameter None Minimum Ec/I0 required from the cell to be the best server in the active set min T_Drop - Cell parameter None Minimum Ec/I0 required from the cell not to be rejected from the active set req Delta Min. Ec/I0 - Mobility parameter None Variation of the minimum Ec/I0 required from the cell to be the best server in the active set Q pilot min Delta T_Drop - Mobility parameter None Variation of the minimum Ec/I0 required from the cell not to be rejected from the active set E -----c- N t min Mobility parameter for 1xEV-DO Rev. 0 users Parameter read in the 1xEV-DO Rev. A Radio Bearer Selection (Uplink) table for 1xEV-DO Rev. A users None Minimum pilot quality level on uplink n SF 1xEV-DO Rev. A Radio Bearer Selection (Uplink) table None Number of subframes associated to uplink 1xEV-DO Rev. A bearer R RLC – peak Uplink 1xEV-DO Rev. A Radio Bearer table None Uplink RLC peak rate provided by the 1xEV-DO Rev. A bearer E -----c- N t min Mobility parameter for 1xEV-DO Rev. 0 users Parameter read in the 1xEV-DO Rev. A Radio Bearer Selection (Downlink) table for 1xEV-DO Rev. A users None Minimum pilot quality level required to obtain a data rate on downlink n TS 1xEV-DO Rev. A Radio Bearer Selection (Downlink) table None Number of timeslots associated to downlink 1xEV-DO Rev. A bearer Q pilot Q pilot Q pilot txi ic Q pilot txi ic Q pilot UL UL DL 304 AT281_TRG_E1 © Forsk 2009 Chapter 7: CDMA2000 Networks DL R RLC – peak None Downlink RLC peak rate provided by the 1xEV-DO Rev. A bearer EVDO – CE NI Site parameter None Number of EVDO channel elements available for a site on uplink and downlink EVDO – CE NI Simulation result None Total number of EVDO channel elements of a site consumed by users on uplink and downlink (Terminal, site equipment) parameter None Number of channel elements used for TCH on uplink N max N Downlink 1xEV-DO Rev. A Radio Bearer Table N TCH – C E – UL MacIndexes txi ic Simulation constraint None Maximum number of MAC indexes available per cell (59) MacIndexes txi ic Simulation result None Number of MAC indexes used by the cell Simulation constraint (cell parameter) None Maximum number of EVDO users that can be connected to the cell Simulation result None Number of EVDO users connected to the cell NF term Terminal parameter None Terminal Noise Figure NF Tx Transmitter parameter (user-defined or calculated from transmitter equipment characteristics) None Transmitter Noise Figure K 1.38 10-23 J/K Boltzman constant T 293 K Ambient temperature W 1.23 MHz Hz Spreading Bandwidth Tx DL Cell parameter None Inter-technology downlink noise rise NR inter – techno log y Tx UL Cell parameter None Inter-technology uplink noise rise RF ic ic adj Network parameter If not defined, it is assumed that there is no inter-carrier interference None Interference reduction factor between two adjacent carriers ic and ic adj N max N EVDO n max txi ic n EVDO txi ic NR inter – techno log y Tx m ICP ic ic i Network parameter If not defined, it is assumed that there is no inter-technology downlink interferences due to external transmitters None Inter-technology Channel Protection between the signal transmitted by Tx and received by m assuming the frequency gap between ic i (external network) and ic UL X max Simulation constraint (global parameter or cell parameter) Tx UL % Maximum uplink load factor W Thermal noise at transmitter Tx NF Tx K T W NR inter – techno log y Term NF Term K T W NR inter – techno log y W Thermal noise at terminal Rc W bps Chip rate f rake efficiency Equipment parameter None Uplink rake receiver efficiency factor Simulation result bps Uplink data rate R TCP – ACK Simulation result bps Uplink data rate due to TCP aknowledgements R BCMCS Cell parameter bps Downlink data rate for Broadcast/ Multicast services DL Simulation result bps Downlink maximum data rate supplied to the terminal DL Simulation result bps Downlink average cell data rate N0 N0 UL R UL UL R max R avg DL Tx DL DL R application SF rate R max – R bps Downlink user application throughput SF Rate Service parameter % Scaling factor © Forsk 2009 AT281_TRG_E1 305 Technical Reference Guide R Service parameter kbps Offset Gp W ---------UL R None Uplink service processing gain on FCH G idle – power Cell parameter None Idle power gain G MU Cell parameter None Multi user gain P max txi ic Cell parameter W Max cell power P tx txi ic b pilot P max txi ic W Pilot burst transmitted by the transmitter on carrier ic. W Traffic burst transmitted by the transmitter on carrier ic. UL P max txi ic if users to support P tx txi ic b traffic ER DRC Cell parameter % Error rate on the DRC channel TS BCMCS Cell parameter % Pourcentage of EVDO timeslots dedicated to Broadcast/Multicast services TS EVDO – CCH Cell parameter % Pourcentage of EVDO timeslots dedicated to control channels P term ic Simulation result W Terminal power transmitted on carrier ic P term min Terminal parameter W Minimum terminal power allowed P term max Terminal parameter W Maximum terminal power allowed BTS BTS parameter % Percentage of BTS signal correctly transmitted term Terminal parameter % Percentage of terminal signal correctly transmitted Clutter parameter % Percentage of pilot finger - percentage of signal received by the terminal pilot finger G Tx Antenna parameter None Transmitter antenna gain G Term Terminal parameter None Terminal gain L Tx Transmitter parameter (user-defined or calculated from transmitter equipment characteristics) None Transmitter lossa L body Service parameter None Body loss L Term Terminal parameter None Terminal loss L indoor Clutter and frequency band parameter L path Propagation model result None Path loss G ACK Terminal parameter None Acknowledgement Channel gain G RRI Terminal parameter (for 1xEV-DO Rev A terminals only) None Reverse Rate Indicator Channel gain G DRC Terminal parameter None Data Rate Control Channel gain G Auxiliary – pilot Terminal parameter (for 1xEV-DO Rev A terminals only) None Auxiliary Pilot Channel gain G TCH Terminal parameter None Traffic data Channel gain M Shadowing – model Result calculated from cell edge coverage probability and model standard deviation None Model Shadowing margin Only used in prediction studies M Shadowing – Ec Io Result calculated from cell edge coverage probability and Ec/I0 standard deviation None Ec/I0 Shadowing margin Only used in prediction studies DL G macro – diversity 306 P max txi ic G idle – power if no user to support DL Indoor loss npaths G macro – diversity = M Shadowing – Ec Io – M Shadowing – Ec Io n=2 or 3 AT281_TRG_E1 None DL gain due to availability of several pilot signals at the mobile b. © Forsk 2009 Chapter 7: CDMA2000 Networks M Shadowing – Eb Nt Result calculated from cell edge coverage probability and UL Eb/Nt standard deviation UL UL npaths G macro – diversity = M Shadowing – Eb Nt UL G macro – diversity UL – M Shadowing – Eb Nt n=2 or 3 Global parameter (default value) UL None None UL Eb/Nt Shadowing margin Only used in prediction studies UL quality gain due to signal diversity in soft handoffc. None Random shadowing error drawn during Monte-Carlo simulation Only used in simulations None Transmitter-terminal total loss P tx txi ic b pilot -------------------------------------------LT W Pilot burst received at terminal from a transmitter on carrier ic P tx txi ic b traffic ----------------------------------------------LT W Traffic burst received at terminal from a transmitter on carrier ic P term -------------LT W Bit received power at transmitter on carrier ic Cell parameter dB Cell uplink noise rise threshold Cell parameter dB Cell uplink noise rise upgrading/ downgrading delta E Shadowing Simulation result In prediction studiesd For Ec/I0 and Ec/Nt calculations L path L Tx L term L body L indoor M Shadowing – Ec Io --------------------------------------------------------------------------------------------------------------------------------------------------G Tx G term For UL Eb/Nt calculation L path L Tx L term L body L indoor M Shadowing – Eb Nt UL -----------------------------------------------------------------------------------------------------------------------------------------------------------G Tx G term LT In simulations L path L Tx L term L body L indoor E Shadowing -------------------------------------------------------------------------------------------------------------------------------G Tx G term DL P tot txi ic b pilot DL P tot txi ic b traffic UL P b ic UL NR threshold txi ic UL NR threshold txi ic a. L Tx = L total – UL on uplink and L Tx = L total – DL on downlink. b. M Shadowing –Ec Io corresponds to the shadowing margin evaluated from the shadowing error probability npaths density function (n paths) in case of downlink Ec/I0 modelling. c. npaths M Shadowing – Eb Nt UL corresponds to the shadowing margin evaluated from the shadowing error probability density function (n paths) in case of uplink soft handoff modelling. d. In uplink prediction studies, only carrier power level is downgraded by the shadowing margin ( M Shadowing – Eb Nt ). In downlink prediction studies, carrier power level and intra-cell interference are downgraded by UL the shadowing model ( M Shadowing – Ec Io ) while extra-cell interference level is not. Therefore, M Shadowing – Ec Io is set to 1 in downlink extra-cell interference calculation. 7.2.2.2 Ec/I0 and Ec/Nt Calculations Ec Ec Ec This table details ------ txi ic b pilot , ------ txi ic b pilot and ------ txi ic b traffic calculations. I0 Nt Nt Name Value Unit Description txi ic DL I intra b pilot or b traffic 0 W Downlink intra-cell interference at terminal on carrier ic (only one mobile is served at a time) W Downlink extra-cell interference based on pilot at terminal on carrier ic DL I extra ic b pilot DL I extra ic b traffic P tot txj ic b pilot P tot txj ic b traffic W Downlink extra-cell interference based on traffic at terminal on carrier ic Ptot txj icadj bpilot W Downlink inter-carrier interference based on pilot at terminal on carrier ic DL txj j i DL txj j i DL DL I inter – carrier ic b pilot txj j ----------------------------------------------------------------- RF ic ic adj © Forsk 2009 AT281_TRG_E1 307 Technical Reference Guide Ptot txj icadj btraffic DL DL I inter – carrier ic b traffic W txj j -------------------------------------------------------------------- RF ic ic adj Tx P Transmitted ic i -----------------------------------------Tx Tx m L ICP DL I inter – techno log y ic DL ic i ic total ni W DL DL P tot txi ic b pilot + I extra ic b pilot + I inter – carrier ic b pilot DL I 0 ic b pilot + DL W Total noise based on traffic received at terminal on carrier ic I extra ic b pilot + N 0 W Total noise based on pilot received at terminal on carrier ic DL W Total noise based on traffic received at terminal on carrier ic None Pilot quality level at terminal on carrier ic None Pilot quality level at terminal on carrier ic None Traffic quality level at terminal on carrier ic + DL term N0 DL DL I inter – techno log y ic DL N tot ic b pilot DL N tot ic b traffic + term N0 term term I extra ic b traffic + N 0 Q pilot txi ic DL BTS P tot txi ic b pilot --------------------------------------------------------------------------DL I 0 ic b pilot Ec ------ txi ic b pilot I0 at terminal on carrier ic a Total noise based on pilot received at terminal on carrier ic DL + Downlink inter-technology interference W DL I inter – techno log y ic P tot txi ic b traffic + I extra ic b traffic + I inter – carrier ic b traffic DL I 0 ic b traffic Downlink inter-carrier interference based on traffic at terminal on carrier ic DL Ec ------ txi ic b pilot Nt BTS P tot txi ic b pilot -----------------------------------------------------------------------------------------------------------------------DL DL N tot ic b pilot + 1 – BTS P tot txi ic b pilot Ec ------ txi ic b traffic Nt BTS P tot txi ic b traffic ------------------------------------------------------------------------------------------------------------------------------DL DL N tot ic b traffic + 1 – BTS P tot txi ic b traffic DL a. In the case of an interfering GSM external network in frequency hopping, the ICP value is weighted according to the fractional load. 7.2.2.3 UL Eb/Nt Calculation This table details calculations of uplink quality ( Q Name UL intra I tot txi UL extra I tot UL Eb or ------- ). Nt UL Value Pb UL ic txi ic term txj j i Pb ic Description W Total power received at transmitter from intra-cell terminals using carrier ic W Total power received at transmitter from extra-cell terminals using carrier ic W Uplink inter-carrier interference at terminal on carrier ic W Total received interference at transmitter on carrier ic W Total noise at transmitter on carrier ic (Uplink interference) UL P b ic UL UL I inter – carrier txi ic term txi Unit ic adj term txj j -------------------------------------- RF ic ic adj UL I tot txi ic UL N tot txi ic 308 UL extra I tot UL intra Tx txi ic + 1 – F MUD term I tot UL UL txi ic +I inter – carrier txi ic tx I tot ic + N 0 AT281_TRG_E1 © Forsk 2009 Chapter 7: CDMA2000 Networks Without useful signal: UL Q UL term P b ic ---------------------------------------------------------------------------------------------------------------- G UL p UL Tx UL N tot txi ic – 1 – F MUD term P b ic Eb txi ic ------ N t UL None UL term P b ic - G UL Total noise: --------------------------------------p UL N tot txi ic No HO: Q Softer HO: UL f rake efficiency UL UL Q tch tx k ic Soft, Softer/Soft HO (No MRC): UL UL Max Q tch tx k ic G macro – diversity tx ActiveSet k UL ica txi ic tx k ActiveSet samesite Q total ic Quality level at transmitter on carrier Softer/Soft HO (MRC): Quality level at site using carrier ic due to combination of all transmitters of the active set located at the same site and taking into account increase of the None quality due to macro-diversity (macrodiversity gain). Max UL UL UL f Q tx ic Q tx ic rake efficiency tch k tch l tx ,tx ActiveSet k l txk samesite tx k UL In simulations, G macro – diversity = 1 . tx othersite l UL G macro – diversity UL Q total ic --------------------------------------------------------UL Q BestServer ic UL G SHO None Uplink soft handover gain on carrier ic None Eb/Nt target on uplink W Required terminal power to achieve Eb/Nt target at transmitter on carrier ic For 1xEV-DO Rev 0 terminal UL E -----c- G p 1 + G ACK + G DRC + G TCH N t min UL UL Q req For 1xEV-DO Rev A terminalb When the acknoledgement signal is considered UL E -----c- G p 1 + G ACK + G RRI + G DRC + G TCH + G Auxiliary – Pilot N t min UL When the acknoledgement signal is not considered UL E UL c ------ G p 1 + G RRI + G DRC + G TCH + G Auxiliary – Pilot N t min UL req P term ic Q req ----------------------- P term UL Q total ic a. Calculation option may be selected in the Global parameters tab. The chosen option will be taken into account only in simulations. In point analysis and coverage studies, Atoll uses the option “Total noise” to evaluate DL and UL Eb/Nt. b. In simulations, the uplink Eb/Nt target is calculated whithout considering the aknoledgement signal. 7.2.2.4 Simulation Results This table contains some simulation results provided in the Cells and Mobiles tabs of the simulation property dialogue. Name Value I intra txi ic b traffic 1 – F ortho BTS P tot txi ic b traffic = 0 DL DL I extra ic b traffic DL DL P tot txj ic b traffic Unit Description W Downlink intra-cell interference at terminal on carrier ic (only one mobile is served at a time) W Downlink extra-cell interference based on traffic at terminal on carrier ic W Downlink inter-carrier interference based on traffic at terminal on carrier ic txj j i Ptot txj icadj btraffic DL DL I inter – carrier ic b traffic txj j -------------------------------------------------------------------- RF ic ic adj DL I inter – techno log y ic ni © Forsk 2009 Tx P Transmitted ic i -----------------------------------------Tx Tx m L total ICP n ic i AT281_TRG_E1 W Downlink inter-technology interference at terminal on carrier ic a 309 Technical Reference Guide DL DL N tot ic b traffic UL intra I tot + DL term I tot ic b traffic + N 0 Pb UL ic term txi txi ic Pb UL UL Total effective interference based on traffic at terminal on carrier ic (after unscrambling) W Total noise based on traffic received at terminal on carrier ic W Total power received at transmitter from intra-cell terminals using carrier ic W Total power received at transmitter from extra-cell terminals using carrier ic W Uplink inter-carrier interference at terminal on carrier ic W Total received interference at transmitter on carrier ic UL P b ic term txj j i I inter – carrier txi ic W DL DL I inter – techno log y ic txi ic UL extra I tot DL I intra ic b traffic + I extra ic b traffic + I inter – carrier ic b traffic DL I tot ic b traffic ic adj term txj j -------------------------------------- RF ic ic adj UL UL extra I tot txi ic I tot UL intra Tx txi ic + 1 – F MUD term I tot UL txi ic +I inter – carrier txi ic N tot txi ic I tot txi ic + N 0 W Total noise at transmitter on carrier ic (Uplink interference) N mobiles txi ic Simulation result None Number of mobiles connected to transmitter txi on carrier ic None Cell downlink load factor on carrier ic None Cell uplink load factor on carrier ic UL UL tx DL X DL txi ic I tot ic b traffic --------------------------------------DL N tot ic b traffic X UL txi ic I tot txi ic ----------------------------UL N tot txi ic F UL txi ic I tot txi ic ------------------------------------------------------------------------------------------UL intra Tx I tot txi ic 1 – F MUD term None Cell uplink reuse factor on carrier ic E UL txi ic 1 -----------------------------UL F txi ic None Cell uplink reuse efficiency factor on carrier ic UL UL NR DL txi ic – 10 log 1 – X DL txi ic dB Noise rise on downlink NR UL txi ic – 10 log 1 – X UL txi ic dB Noise rise on uplink a. In the case of an interfering GSM external network in frequency hopping, the ICP value is weighted according to the fractional load. 7.3 Active Set Management The mobile active set is the list of the transmitters to which the mobile is connected. The active set may consist of one or more transmitters; depending on whether the service supports soft handoff and on the terminal active set size. The terminal frequency bands are taken into account and transmitters in the mobile active set must use a frequency band with which the terminal is compatible. It is, however, the quality of the pilot (Ec⁄I0) that finally determines whether or not a transmitter can belong to the active set. Cells entering the mobile’s active set must fulfill the following conditions: 1. The best server (first cell entering active set) In order for a given transmitter to enter the mobile active set as best server, the quality of this transmitter’s pilot must be the highest one and it must exceed an upper threshold equal to the sum of the minimum Ec/I0 defined in the properties of the best serving cell and the Delta minimum Ec/I0 defined in the properties of the mobility type. The upper threshold is set for the carrier as defined in the cell properties and can also take into account the user mobility type if the Delta minimum Ec/I0 defined in the mobility type is different from 0. 2. 310 In order for a transmitter to enter the active set (other cells of active set): - They must use the same carrier as the best server cell, - The pilot quality from other candidate cells must exceed a lower threshold. The lower threshold depends both on the type of carrier and the mobility type. It is equal to the sum of T_Drop defined in the properties of the best server and the Delta T_Drop defined in the properties of the mobility type. AT281_TRG_E1 © Forsk 2009 Chapter 7: CDMA2000 Networks - 7.4 If you have selected to restrict the active set to neighbours, the cell must be a neighbour of the best server (the restricted to neighbours” option is selected in the equipment properties). Simulations The simulation process is divided into two steps: 1. Obtaining a realistic user distribution Atoll generates a user distribution using a Monte-Carlo algorithm, which requires traffic maps and data as input. The resulting user distribution complies with the traffic database and maps provided to the algorithm. Each user is assigned a service, a mobility type, and an activity status by random trial, according to a probability law that uses the traffic database. The user activity status is an important output of the random trial and has direct consequences on the next step of the simulation and on the network interferences. A user may be either active or inactive. Both active and inactive users consume radio resources and create interference. Additionally, each 1xEV-DO Rev. 0 user is assigned a transition flag ("True" or "False") for each possible data rate transition (from 9.6 to 19.2 kbps, 19.2 to 38.4 kbps, 38.4 to 76.8 kbps, and 76.8 to 153.6 kbps for data rate upgrading and from 153.6 to 76.8 kbps, 76.8 to 38.4 kbps, 38.4 to 19.2 kbps, and 19.2 to 9.6 kbps for data rate downgrading). These transition flags are based on the data rate downgrading and upgrading probabilities. If a transition flag is "True," the user data rate can be downgraded or upgraded if necessary. Then, Atoll randomly assigns a shadowing error to each user using the probability distribution that describes the shadowing effect. Finally, another random trial determines user positions in their respective traffic zone and whether they are indoors or outdoors (according to the clutter weighting and the indoor ratio per clutter class defined for the traffic maps). 2. Modelling the network regulation mechanism This algorithm depends on the network. Atoll uses a power control algorithm in case of CDMA2000 1xRTT networks and a different algorithm, which mixes data rate control on downlink and power control on uplink, for CDMA2000 1xEV-DO networks. 7.4.1 Generating a Realistic User Distribution 7.4.1.1 Number of Users, User Activity Status and User Data Rate During the simulation, a first random trial is performed to determine the number of users and their activity status. The determination of the number of users and the activity status allocation depend on the type of traffic cartography used. Note: • Atoll follows a Poisson distribution to determine the number of total connected users before each simulation. In order to make Atoll use a constant number of total connected users, the following lines must be added to the Atoll.ini file: [CDMA] RandomTotalUsers=0 7.4.1.1.1 Simulations Based on User Profile Traffic Maps User profile environment based traffic maps: Each pixel of the map is assigned an environment class which contains a list of user profiles with an associated mobility type and a given density (number of subscribers with the same profile per km²). User profile traffic maps: Each polygon and line of the map is assigned a density of subscribers with given user profile and mobility type. If the map is composed of points, each point is assigned a number of subscribers with given user profile and mobility type. The user profile models the behaviour of the different subscriber categories. Each user profile contains a list of services and their associated parameters describing how these services are accessed by the subscriber. From environment (or polygon) surface (S) and user profile density (D), a number of subscribers (X) per user profile is inferred. X = SD Notes: • • © Forsk 2009 In case of user profile traffic maps composed of lines, the number of subscribers (X) per user profile is calculated from the line length (L) and the user profile density (D) (nb of subscribers per km) as follows: X = L D The number of subscribers (X) is an input when a user profile traffic map is composed of points. AT281_TRG_E1 311 Technical Reference Guide For each behaviour described in a user profile, according to the service, frequency use and exchange volume, Atoll calculates the probability for the user being connected in uplink and in downlink at an instant t. 1. Calculation of the service usage duration per hour ( p 0 : probability of a connection): N call d p 0 = --------------------3600 where N call is the number of calls per hour and d is the average call duration (in second). Then, Atoll calculates the total number of users trying to access a certain service. Calculation of the number of users trying to access the service j ( n j ): 2. nj = X p0 The next step determines the activity status of each user. 3. Calculation of number of users per activity status: This steps depends on the type of service (Voice, 1xRTT data, 1xEV-DO data…). • CDMA2000 1xRTT Services Activity status of voice and data service users is determined as follows. Users are always active on FCH in both directions, uplink and downlink. Therefore, we have: Probability of being active on UL: p UL = 0 Probability of being active on DL: p DL = 0 Probability of being active both on UL and DL: p UL + DL = 1 Probability of being inactive: p inactive = 0 Thus, for voice and data services, we have: Number of inactive users: n j inactive = n j p inactive = 0 Number of users active on UL: n j UL = n j p UL = 0 Number of users active on DL: n j DL = n j p DL = 0 Number of users active on UL and DL both: n j UL + DL = n j p UL + DL = n j n j = n j UL + n j DL + n j UL + DL + n j inactive = n j UL + DL - Voice Users Voice users are active on uplink and downlink. However, the FCH can have inactivity periods on both links. This is UL DL modelled by the FCH activity factor, AF FCH and AF FCH . Therefore, all voice service users try to access the service with UL UL DL DL the following FCH rates, R FCH AF FCH on uplink and R FCH AF FCH on downlink. UL DL R FCH and R FCH are respectively the uplink and downlink FCH nominal rates. - Data Users Data service users are active on uplink and downlink. FCH is always allocated but can have inactivity periods on both links; UL DL this is modelled by the FCH activity factor, AF FCH and AFFCH . SCH may be allocated with four possible rates (2x, 4x, 8x and 16xFCH nominal rate). Therefore, data service users can access the service with different rates. Possible rates are detailed in the table below: Allocated rates SCH rate factor r k Only FCH is used - UL AF FCH On DL DL R FCH DL AF FCH UL UL R FCH AF FCH + 2 UL UL R FCH AF FCH + 4 UL UL R FCH AF FCH + 8 2x R FCH AF FCH + 2 4x R FCH AF FCH + 4 8x R FCH AF FCH + 8 16x R FCH AF FCH + 16 Both FCH and SCH are used UL On UL UL R FCH UL UL DL DL DL DL DL DL DL DL R FCH AF FCH + 16 DL R FCH and R FCH are respectively the uplink and downlink FCH nominal rates. 312 AT281_TRG_E1 © Forsk 2009 Chapter 7: CDMA2000 Networks Then, Atoll determines the distribution of users between the different possible rates. UL In case of a data service, j, several data rate probabilities, P k DL and P k , can be assigned to different rate factors, r k , for SCH channel. Note: • For non-data services, these probabilities are 0. For data service users, a random trial compliant with data rate probabilities is performed for each link in order to determine the rate for each user. On uplink, we have: rk UL UL For each SCH rate factor, r k , the number of users n j with the data rate R FCH AF FCH + r k is calculated as follows, rk UL nj = Pr k nj FCH Therefore, the number of users n j FCH nj = nj – UL UL with the data rate, R FCH AF FCH , is: rk nj rk On downlink, we have: rk DL DL For each SCH rate factor, r k , the number of users, n j with the data rate, R FCH AF FCH + r k , is calculated as follows, rk DL nj = Pr k nj FCH Therefore, the number of users n j FCH nj = nj – DL DL with the data rate, R FCH AF FCH , is: rk nj rk • CDMA2000 1xEV-DO Services As power control is performed on uplink only, 1xEV-DO data service users will be considered either active on uplink or inactive. 1xEV-DO data Rev. 0 service users can access the service with uplink rates of 9.6, 19.2, 38.4, 76.8 and 153.6 kbps. 1xEV-DO data Rev. A service users can access the service with uplink rates of 4.8, 9.6, 19.2, 38.4, 76.8, 115.2, 153.6, 230.4, 307.2, 460.8, 614.4, 921.6, 1,228.8 and 1,848.2 kbps. UL UL For each service, j, several data rate probabilities, P k , can be assigned to different rates R k . The number of users active on uplink ( n j UL ) and the number of inactive users ( n j inactive ) are calculated as follows: Probability of being active on UL: p UL = Pk UL UL Rk UL Rk Probability of being inactive: p inactive = 1 – Pk UL UL Rk UL Rk Probability of being active on DL: p DL = 0 Probability of being active on UL and DL both: p UL + DL = 0 Therefore, we have: Number of users active on UL: n j UL = n j p UL Number of inactive users: n j inactive = n j p inactive Number of users active on DL: n j DL = n j p DL = 0 Number of users active on UL and DL both: n j UL + DL = n j p UL + DL = 0 n j = n j UL + n j DL + n j UL + DL + n j inactive = n j UL + n j inactive UL Then, Atoll determines the distribution of users between the different possible rates, R k . The number of users with the UL UL data rate R k , n j R k , is calculated as follows: UL UL nj Rk = Pk nj Inactive users have a requested data rate equal to 0. © Forsk 2009 AT281_TRG_E1 313 Technical Reference Guide Notes: • The user distribution per service is an average distribution and the service of each user is randomly drawn in each simulation. Therefore, if you compute several simulations at once, the average number of users per service will correspond to the calculated distribution. But if you check each simulation, the user distribution between services is different in each of them. It is the same for the SCH rate distribution between 1xRTT data service users and the traffic data rate distribution between 1xEV-DO data service users. • In calculations detailed above, we assume that the sum of data rate probabilities is less than or equal to 1. If the sum of data rate probabilities exceeds 1, Atoll considers normalised data rate probabilities values, P r k Pr , instead of specified data rate k rk probabilities P r . k 7.4.1.1.2 Simulations Based on Sector Traffic Maps Sector traffic maps can be based on live traffic data from OMC (Operation and Maintenance Centre). Traffic is spread over the best server coverage area of each transmitter and each coverage area is assigned either the throughputs in the uplink and in the downlink, or the number of users per activity status or the total number of users (including all activity statuses). CDMA2000 1xRTT Services • Voice Service (j) For each transmitter, Txi, Atoll proceeds as follows: - UL When selecting Throughputs in Uplink and Downlink, you can input the throughput demands in UL ( R t and DL DL ( Rt ) ) for each sector. Atoll calculates the number of users active in UL and DL using the voice service in the Txi cell as follows: UL DL Rt Rt - and N DL = --------N UL = --------UL DL Rj Rj Where, UL Rt is the number of kbits per second transmitted in UL in the Txi cell to provide the service j to the users (user-defined value in the traffic map properties) DL Rt is the number of kbits per second transmitted in DL in the Txi cell to provide the service j to the users (user-defined value in the traffic map properties). UL Rj DL and R j correspond to the UL and DL rates of a user. FCH is always allocated to active users but can UL have inactivity periods on both links. Therefore, we have R j UL UL UL UL = R FCH AF FCH (where R FCH is the service FCH nominal rate on UL and AF FCH DL Rj is the service FCH nominal rate on DL and AFFCH corresponds to the = DL R FCH DL AF FCH (where DL R FCH corresponds to the FCH activity factor on UL) and DL FCH activity factor on DL). Users are always active on FCH for both links. Therefore, we have following activity probabilities. Probability of being active in UL: p UL = 0 Probability of being active in DL: p DL = 0 Probability of being active in UL and DL both: p UL + DL = 1 Probability of being inactive: p inactive = 0 Then, Atoll calculates the number of users per activity status: Number of users active in UL and DL both: n j UL + DL = max (N UL,N DL) Number of users active in UL and inactive in DL: n j UL = 0 Number of users active in DL and inactive in UL: n j DL = 0 inactive Number of inactive users in UL and DL: n j 314 AT281_TRG_E1 = 0 © Forsk 2009 Chapter 7: CDMA2000 Networks Therefore, all connected voice users ( n j ) are active in both links. - When selecting Total Number of Users (All Activity Statuses), you can input the number of connected users for each sector ( n j ). Users are always active on FCH for both links. Therefore, we have following activity probabilities. Probability of being active in UL: p UL = 0 Probability of being active in DL: p DL = 0 Probability of being active in UL and DL both: p UL + DL = 1 Probability of being inactive: p inactive = 0 Then, Atoll calculates the number of users per activity status: inactive Number of inactive users in UL and DL: n j = n j p inactive = 0 Number of users active in UL and inactive in DL: n j UL = n j p UL = 0 Number of users active in DL and inactive in UL: n j DL = n j p DL = 0 Number of users active in UL and DL both: n j UL + DL = n j p UL + DL = n j Therefore, all connected users ( n j ) are active in both links. - When selecting Number of Users per Activity Status, you can directly input the number of users active in the uplink and downlink ( n j UL + DL ), for each sector. UL UL DL DL Voice service users try to access the service with the FCH rates, R FCH AF FCH on uplink and R FCH AF FCH on downlink. All user characteristics determined, a second random trial is performed to obtain their geographical positions. • Data Service Users (j) FCH is always allocated to active users but can have inactivity periods on both links. This is modelled by the FCH activity UL DL factors, AF FCH and AF FCH . SCH may be allocated with four possible rates (2x, 4x, 8x, 16xFCH nominal rate). Several UL data rate probabilities, P k DL and P k , can be assigned to different rates factor, r k , for SCH channel. Note: • For non-data services, these probabilities are 0. For each transmitter, Txi, Atoll proceeds as follows: - UL When selecting Throughputs in Uplink and Downlink, you can input the throughput demands in UL ( R t and DL DL ( Rt ) ) for each sector. Atoll calculates the number of users active in UL and DL using the service in the Txi cell as follows: UL DL Rt Rt - and N DL = --------N UL = --------UL DL Rj Rj Where, UL Rt is the number of kbits per second transmitted in UL in the Txi cell to provide the service j to the users (user-defined value in the traffic map properties) DL Rt is the number of kbits per second transmitted in DL in the Txi cell to provide the service j to the users (user-defined value in the traffic map properties). UL and R j UL = Rj Rj DL correspond to uplink and downlink rates of a user. rk + AFFCH RFCH Pr k rk + AFFCH RFCH Pr k UL UL UL rk DL Rj = DL rk © Forsk 2009 DL DL + 1 – Pr + 1 – Pr AT281_TRG_E1 UL k rk DL rk k UL UL DL DL R FCH AF FCH R FCH AF FCH 315 Technical Reference Guide UL DL R FCH and R FCH are the uplink and downlink FCH nominal rates respectively. Note: • In calculations detailed above, we assume that the sum of data rate probabilities is less than or equal to 1. If the sum of data rate probabilities exceeds 1, Atoll considers normalised data rate probabilities values, P r k Pr , k instead of specified data rate rk probabilities P r . k Users are always active on FCH for both links. Therefore, we have following activity probabilities. Probability of being active in UL: p UL = 0 Probability of being active in DL: p DL = 0 Probability of being active in UL and DL both: p UL + DL = 1 Probability of being inactive: p inactive = 0 Then, Atoll calculates the number of users per activity status and the total number of users: Number of users active in UL and DL both: n j UL + DL = max (N UL,N DL) Number of users active in UL and inactive in DL: n j UL = 0 Number of users active in DL and inactive in UL: n j DL = 0 inactive Number of inactive users in UL and DL: n j = 0 Therefore, all connected users ( n j ) are active in both links. - When selecting Total Number of Users (All Activity Statuses), you can input the number of connected users for each sector ( n j ). Users are always active on FCH for both links. Therefore, we have following activity probabilities. Probability of being active in UL: p UL = 0 Probability of being active in DL: p DL = 0 Probability of being active in UL and DL both: p UL + DL = 1 Probability of being inactive: p inactive = 0 Then, Atoll calculates the number of users per activity status: inactive Number of inactive users in UL and DL: n j = n j p inactive = 0 Number of users active in UL and inactive in DL: n j UL = n j p UL = 0 Number of users active in DL and inactive in UL: n j DL = n j p DL = 0 Number of users active in UL and DL both: n j UL + DL = n j p UL + DL = n j Therefore, all connected users ( n j ) are active in both links. - When selecting Number of Users per Activity Status, you can directly input the number of users active in the uplink and downlink ( n i UL + DL ), for each sector. As explained above, data service users can access the service with different rates. Possible rates are detailed in the table below: SCH rate factor r k Only FCH is used 316 - AT281_TRG_E1 Allocated rates On UL UL R FCH UL AF FCH On DL DL R FCH DL AF FCH © Forsk 2009 Chapter 7: CDMA2000 Networks UL UL R FCH AF FCH + 2 UL UL R FCH AF FCH + 4 UL UL R FCH AF FCH + 8 2x R FCH AF FCH + 2 4x R FCH AF FCH + 4 8x R FCH AF FCH + 8 16x R FCH AF FCH + 16 Both FCH and SCH are used UL UL DL DL DL DL DL DL DL DL R FCH AF FCH + 16 Atoll determines the distribution of users with the different possible rates. A random trial compliant with data rate probabilities is performed for each link in order to determine the data rate of each user. On uplink, we have, rk UL UL For each SCH rate factor, r k , the number of users n j with the data rate R FCH AF FCH + r k is calculated as follows, rk UL nj = Pr k nj FCH Therefore, the number of users n j FCH nj = nj – UL UL with the data rate, R FCH AF FCH , is, rk nj rk On downlink, we have, rk DL DL For each SCH rate factor, r k , the number of users, n j with the data rate, R FCH AF FCH + r k , is calculated as follows, k DL nj = Pk nj FCH Therefore, the number of users n j FCH nj = nj – DL DL with the data rate, R FCH AF FCH , is, rk nj rk CDMA2000 1xEV-DO Services As power control is performed on uplink only, 1xEV-DO data service users will be considered either active on uplink or inactive. 1xEV-DO data Rev. 0 service users can access the service with uplink rates of 9.6, 19.2, 38.4, 76.8 and 153.6 kbps. 1xEV-DO data Rev. A service users can access the service with uplink rates of 4.8, 9.6, 19.2, 38.4, 76.8, 115.2, 153.6, 230.4, 307.2, 460.8, 614.4, 921.6, 1,228.8 and 1,848.2 kbps. UL UL For each service, j, several data rate probabilities, P k , can be assigned to different uplink rates R k . The number of users active in uplink ( n j UL ) and the number of inactive users ( n j inactive ) are calculated into several steps. First of all, Atoll determines the number of users active in UL using the service j in the Txi cell. For each transmitter, Txi, and each service j: - UL When selecting Throughputs in Uplink and Downlink, you can input the throughput demands in UL ( R t ) for each sector. Atoll calculates the number of users active in UL using the service j in the Txi cell as follows: UL Rt N UL = --------UL Rj Where: UL Rt is the number of kbits per second transmitted on UL in the Txi cell to provide the service j (user-defined value in the traffic map properties). UL corresponds to the uplink data rate for a user. UL = Rj Rj Pk UL UL Rk k © Forsk 2009 AT281_TRG_E1 317 Technical Reference Guide Note: • In calculations detailed above, we assume that the sum of data rate probabilities is less than or equal to 1. If the sum of data rate probabilities exceeds 1, Atoll considers normalised data rate probabilities values, P r k Pr , instead of specified data rate k rk probabilities P r . k We have the following activity probabilities: Probability of being active in UL: p UL = Pk UL UL Rk UL Rk Probability of being inactive: p inactive = 1 – Pk UL UL Rk UL Rk Probability of being active in DL: p DL = 0 Probability of being active in UL and DL both: p UL + DL = 0 Therefore, we have: Number of users active in UL: n j UL = N UL p UL Number of inactive users: n j inactive = N UL p inactive Number of users active in DL: n j DL = 0 Number of users active in UL and DL both: n j UL + DL = 0 Total number of connected users: n j = n j UL + n j inactive - When selecting Total Number of Users (All Activity Statuses), you can input the number of connected users for each sector ( n j ). We have the following activity probabilities: Probability of being active in UL: p UL = Pk UL UL Rk UL Rk Probability of being inactive: p inactive = 1 – Pk UL UL Rk UL Rk Probability of being active in DL: p DL = 0 Probability of being active in UL and DL both: p UL + DL = 0 Therefore, we have: Number of users active in UL: n j UL = n j p UL Number of inactive users: n j inactive = n j p inactive Number of users active in DL: n j DL = 0 Number of users active in UL and DL both: n j UL + DL = 0 - When selecting Number of Users per Activity Status, you can directly input the number of inactive users ( n j inactive ) and the number of users active in the uplink ( n j UL ), for each sector. The total number of connected users ( n j ) is calculated as follows n j = n j UL + n j inactive Then, Atoll determines the distribution of users with the different possible rates. The number of users with the data rate UL UL R k , n j R k , is calculated as follows: UL UL nj Rk = Pk nj Inactive users have a requested data rate equal to 0. 318 AT281_TRG_E1 © Forsk 2009 Chapter 7: CDMA2000 Networks Note: • 7.4.1.2 The user distribution per service is an average distribution and the service of each user is randomly drawn In each simulation. Therefore, if you compute several simulations at once, the average number of users per service will correspond to the calculated distribution. But if you check each simulation, the user distribution between services is different in each of them. It is the same for the SCH rate distribution between 1xRTT data service users and the traffic data rate distribution between 1xEV-DO data service users. Transition Flags for 1xEV-DO Rev.0 User Data Rates For 1xEV-DO Rev. 0 services supporting data rate downgrading, you can define the probability of the service being UL UL UL UL UL upgraded ( P Upg – k R k ) or downgraded ( P Downg – k R k ) on the uplink (reverse link) for each data rate ( R k ). The probabilities are taken into account in order to determine if a user with a certain data rate can be upgraded or downgraded. User data rate downgrading and upgrading occur during congestion control when the cell is over- or underloaded. The following table shows the data rate changes that are possible when a data rate is upgraded or downgraded. The probabilities are defined with a number from 1 to 255 for each data rate. Possible Data Rate Changes During Upgrading From To Possible Data Rate Changes During Downgrading From To 9.6 kbps 19.2 kbps 153.6 kbps 76.8 kbps 19.2 kbps 38.4 kbps 76.8 kbps 38.4 kbps 38.4 kbps 76.8 kbps 38.4 kbps 19.2 kbps 76.8 kbps 153.6 kbps 19.2 kbps 9.6 kbps During the generation of the user distribution, each 1xEV-DO Rev. 0 user is assigned a random number between 1 and 255 for each possible data rate transition. When this number is lower or equal to the value of the probability, the transition flag for this data rate transition is set to "True" meaning that this data rate transition can be performed if necessary. UL The number of 1xEV-DO Rev. 0 users with a certain data rate that can be downgraded ( n j R k Downg ) and upgraded UL ( n j R k Upg ) are calculated as follows: UL UL UL P Upg – k R k n j R k UL n j R k Upg = -------------------------------------------------------------255 And UL UL UL P Downg – k R k n j R k UL n j R k Downg = -------------------------------------------------------------------255 Note: • 7.4.1.3 The number of users with a certain data rate that can be downgraded or upgraded is an average. Therefore, if you compute several simulations at once, the average number of users with a certain data rate that can be downgraded or upgraded will correspond to the calculated value. But if you check each simulation, this number is different in each of them. User Geographical Position Once all the user characteristics determined, another random trial is performed to obtain their geographical positions and whether they are indoors or outdoors according to the percentage of indoor users per clutter class defined for the traffic maps. 7.4.2 Network Regulation Mechanism 7.4.2.1 CDMA2000 1xRTT Power Control Simulation Algorithm CDMA2000 1xRTT network automatically regulates itself using traffic driven uplink and downlink power control on the fundamental and supplemental channels (FCH and SCH respectively) in order to minimize interference and maximize capacity. Atoll simulates this network regulation mechanism with an iterative algorithm and calculates, for each user distribution, network parameters such as base station power, mobile terminal power, active set and handoff status for each terminal. The power control simulation is based on an iterative algorithm, where in each iteration, all the mobiles selected during the user distribution generation (1st step) try to connect to network active transmitters with a calculation area. The process is repeated from iteration to iteration until convergence is achieved. The algorithm steps are detailed below. © Forsk 2009 AT281_TRG_E1 319 Technical Reference Guide Figure 7.1: CDMA2000 1xRTT Power Control Algorithm 7.4.2.1.1 Algorithm Initialization Total power on carrier ic, P Tx ic , of base station Sj is initialised to P pilot ic + P sync ic + P paging ic . UL intra Uplink received powers on carrier ic, I tot UL extra ic , I tot UL ic and I inter – carrier ic , at base station Sj are initialised to 0 W (no connected mobile). UL I tot S j ic UL - = 0 X k S j ic = ---------------------------UL N tot S j ic 7.4.2.1.2 Presentation of the Algorithm UL The algorithm is detailed for any iteration k. Xk is the value of the variable X at the iteration k. In the algorithm, all Q req DL and Q req thresholds depend on user mobility type and are defined in Service and Mobility parameters tables. All variables are described in Definitions and formulas part. The algorithm applies to single frequency band networks and to dual-band networks. Dual-band terminals can have the following configurations: - Configuration 1: The terminal can work on f1 and f2 without any priority (select "All" as main frequency band in the terminal property dialogue). Configuration 2: The terminal can work on f1 and f2 but f1 has a higher priority (select "f1" as main frequency band and "f2" as secondary frequency band in the terminal property dialogue). For each mobile Mi Determination of Mi’s Best Server (SBS(Mi)) For each transmitter Sj containing Mi in its calculation area and working on the main frequency band supported by the Mi’s terminal (i.e. either