MASTER'S THESIS. Contention-based uplink transmission in unscheduled access

Size: px
Start display at page:

Download "MASTER'S THESIS. Contention-based uplink transmission in unscheduled access"

Transcription

1 MASTER'S THESIS 2010:009 CIV Contention-based uplink transmission in unscheduled access Lilian Sunna Luleå University of Technology MSc Programmes in Engineering Computer Science and Engineering Department of Computer Science and Electrical Engineering Division of Computer Communication 2010:009 CIV - ISSN: ISRN: LTU-EX--10/009--SE

2 Contention-based uplink transmission in unscheduled access Lilian K. S. Sunna LTU Dept. of Computer Science and Electrical Engineering Ericsson AB Dept. of Wireless Access Networks Div. of Wireless IP Optimizations January 15, 2010

3

4 ABSTRACT Voice communication has traditionally been carried out on circuit switched networks only. This is not true today since some voice communication is done over IP-networks, such as the Internet. A general term for this type of voice communication transmission is Voice over Internet Protocol, or simply VoIP. The main benefit of VoIP is its cost-efficiency concerning both system maintenance and international calls. VoIP-services will probably have an increased popularity with the switch to Long Term Evolution (LTE), due to its high capacity and bit-rates. Voice communication is highly sensitive to end-to-end delay. Obtaining transmission resources in LTE using the conventional contention-free transmission method contributes to the end-to-end latency. This is due to the scheduling signalling which can only be done in specified intervals on a scheduling channel, so called D-SR intervals. The D-SR interval can be long if the load is high. This work investigates the possible capacity gain for VoIP-users by using an alternative contention-based transmission method. This method uses a pre-set broadcast grant to be used by any user. However, as the load increases, the contention from several users will become more common since the grant is shared by everyone. Hence, restrictions to the alternative transmission method in order to decrease the load are also analysed. Two different grant methods are evaluated: the conventional contention-free and the contention-based. A system simulator is used to investigate the two grant methods. The simulator models a complete LTE system in a multi-cell environment. The simulations show it is necessary to limit the contention-based access to only VoIP packets of a certain size. Unlimited use of contention-based access is clearly shown to be useless: the capacity is zero VoIP-users per cell. Further on, when comparing contention-free access to contention-based limited to VoIP packets for different D-SR intervals, it is found that the two methods have similar VoIP-user capacities for D-SR interval of 10 ms and lower. VoIP packet limited contention-based transmissions have a significantly higher VoIP-user capacity for D-SR intervals over 10 ms. iii

5

6 PREFACE The difficulty level of this thesis project turned out to be significantly higher than I initially expected, but it pushed me to gain invaluable knowledge. It has truly been a rewarding experience. Realization of the project would not have been possible without the support and guidance from several people and thanking them is truly a pleasure. First, I would like to thank Mårten Ericson, my supervisor at Ericsson. His positive attitude, encouragement and knowledge is highly appreciated and has been of great assistance. IwouldliketothankMatsNordbergforgivingmetheopportunitytorealizethisthesis. Kristofer Sandlund deserves a special thanks for his invaluable aid with practically everything regarding the simulator, the protocol standards and always taking the time to listen. There is no doubt that this thesis project never could have been finished without his support! IamalsoindebtedtothankalltheemployeesatEricssonResearchfortheirhelpand guidance with problems of all magnitudes. Also, thanks to Ulf Bodin, my supervisor at Luleå UniversityofTechnology,foralltheinputandtips. Last but not least, I would like to thank my family and friends for all the support and love they have given me. The joy and happiness their presence brings, makes even the greatest challenge seem possible. v

7

8 CONTENTS Chapter 1 Scope Purpose Problem statement Objective Delimitations Outline Chapter 2 Introduction VoIP LTE Chapter 3 LTE implementation in the simulator Chapter introduction Simulation system environment Conventional resource scheduling Channel mapping for the uplink Obtaining uplink transmission resources Key parameters Protocol layers of the LTE architecture Chapter 4 Implementation Granting uplink resources Transport format Failed transmissions Simplification of the simulation models Chapter 5 Simulations The simulation system design Definitions System description and parameter settings Iteration parameters Limitation Chapter 6 Results Pure VoIP, no limitation

9 6.2 Pure VoIP, contention-based limitations Mixed traffic Chapter 7 Discussion Analysis of results Reliability of results Conclusions Further studies Appendix A Abbreviations 53 Appendix B Simulation results: CDF of latencies 55 B.1 Pure VoIP B.2 Mixed traffic: VoIP and web browsing Appendix C Simulation results: user satisfaction, different D-SR intervals 77 C.1 Pure VoIP C.2 Mixed traffic viii

10 CHAPTER 1 Scope 1.1 Purpose Voice communication has traditionally been carried out on circuit switched networks. This is not true today since some voice communication is done over IP-networks, such as the Internet[1]. Voice over Internet Protocol, or simply VoIP, is a general term for this type of voice communication transmission. VoIP-services will probably have an increased popularity with the switch to Long Term Evolution (LTE), due to its high capacity and bit-rates. LTE is only a packet switched network: the circuit switched technology previously used for voice communication will not work. LTE networks are the last step toward the next generation mobile telecommunication networks: 4G. Whenever a mobile, or any type of wireless user equipment, has data to send via awirelessbase-station,itneedstobegranteduplinktransmissionresources. Without granted resources, the user equipment is unabletocommunicatethroughthebase-station. In the present LTE standard, the access to system resources is initiated by transmitting aschedulingrequestfromthemobiletothebasestation,seesection3.2. The scheduling signalling between the user equipment and the base-station adds to the latency. For most services, latency is not a problem and can easily be handled, but voice communication demands short and constant latencies. There is a possibility of decreasing this delay is by switching to another access method: the contention-based transmissions. With this alternative method, the signalling to request uplink transmission grants is not needed. The purpose of this thesis project is to examine this possibility. 1.2 Problem statement Contention-based transmission can be achieved with a pre-set broadcast grant, see section 3.3. By merely broadcasting the grant, the scheduling request signalling described in 1

11 2 Scope section 3.2 becomes unnecessary. For small loads this may work well, but the collision probability increases with the load. This is due to the risk of several users transmitting simultaneously using the pre-set broadcast grant, which increases with the load. The idea is to examine different use of contention-based grants and find under which properties and restrictions the average satisfaction ratio and capacity for VoIP-users will be maximised. This will also be compared to the conventional contention-free access method. 1.3 Objective Higher satisfaction ratio and capacity for VoIP-users requires decreasing the uplink transmission resource access delay. Since contention-based grants have a high contention probability for high load, suitable access limitation parameters will be evaluated. Four types of restrictions to the contention-based grants will be compared with contention-free transmissions. The comparison will also be done to contention-based grants available for all users. Evaluation will take consideration to the initial delay due to gaining access to the signalling channel. The evaluation is done using simulations of a radio access network. This Java-based simulator is developed at Ericsson AB. 1.4 Delimitations Only LTE wireless network system is considered. This study will only focus on the end-to-end latency for VoIP. Latency for other services such as FTP and web browsing will not be considered. There are numerous sources that contribute to VoIP latency, such as access latency, routing, switching and processing at the receiver and the transmitter. Only the latency due to the air interface delay between a user equipment and its base-station will be considered here. Mixed traffic analysis is limited to two simultaneous traffic types: VoIP and web browsing. Four types of limitations to the contention-based transmissions are done: QoS-class, RLC-buffer size, voice frames and a combination of QoS-class and RLC-buffer size. The analysis will be based on simulations of model descriptions together with a random component. However even the most complete simulator can never imitate the infinite possibilities and chaos of reality.

12 1.5. Outline Outline This report describes part of the current LTE standards and architecture as it is implemented in the simulator (see chapter 3). The new complementary uplink transmission method is described in section See section 4 for the necessary changes to the complementary transmission method and the simulator environment for this evaluation. The most important results can be found in section 6, the rest can be found in appendices B and C. The analysis and conclusions can be read in section 7.

13

14 CHAPTER 2 Introduction 2.1 VoIP Introduction The idea of VoIP was born in 1974 as Vinton G. Cerf and Robert E. Kahn presented the paper A protocol for Packet Network Intercommunication [2]. One of the best known VoIP-services today is Skype, but numerous other services are available on the market. The main benefit of VoIP is its cost-efficiency for both the provider and consumer. The cost for international calls can be greatly decreased by switching to VoIP, because delivering voice packets on IP-network is as cheap as other data traffic transmissions. Maintenance costs can be greatly reduced by switching to VoIP, since the voice communication is done through existent IP-traffic system instead of a separate network Delay causes and their effects Even though VoIP was presented in 1974, it has not been widely used until recently. The main problem has been the poor sound quality and long and varying delay, mostly due to low bandwidth[3]. Voice services are extremely sensitive to transmission delay, which increases as the bandwidth decreases. Even a constant latency of merely a few hundred milliseconds has a significant impact on the experienced sound quality[18]. As the latency increases, the conversation becomes hesitant and unnatural. This thesis is limited to reducing the delay between the caller and the base-station through its access method. There are however other aspects which adds to the complete latency, such as routing/switching, sample resolution and frequency, jitter and buffering[4]. A slightly longer and constant end-to-end delay does not affect the speech quality as much as jitter influence. 5

15 6 Introduction 2.2 LTE A short history The mobile telecommunication networks of today consists of 1G, 2G and 3G. The older systems are being phased out as the bit-rate and capacity demands increase. The history can be read in e.g. Multiple Access Protocols for Mobile Communications: GPRS, UMTS and beyond [5]. 1G It started in the late 1970s and early 1980s with the first generation (1G), a low-speed fully-automatic analogue telecommunication system. There are several standards, such as NMT, AMPS and TACS, but all are voice-only and can only offer low system capacity. The 1G standards suffered from clicking noises interrupting the speech, as network control messages were transmitted on the same channels as voice. 2G The second generation (2G), also known as GSM (Global System for Mobile communications), was unlike the first generation digital and came in the early 1990 s. The capacity was significantly increased with the use of low bit-rate speech codecs and dedicated channels for network control information. However, GSM still has traffic channels contaminated by handover signalling. Unlike 1G standards, the technology in 2G did not only support voice calls but also was able to offer short message service (SMS). This was unexpectedly a huge success and changed the way people communicated. Other features were added as well, such as fax and voice mail. CDMA is another 2G access method[6], but not a 3GPP specification[7]. 3G Third generation services includes voice calls, video calls and wireless data. Unlike 2G systems, the voice and data transmissions can be done simultaneously in 3G, which opened up for a whole set of new services such as mobile TV, video conferencing and location based services. A higher spectral efficiency also increased the capacity. LTE As our usage of services with high data-rates and quality of service demands increase, 3G is not sufficient and a new standard is necessary. Long Term Evolution, or LTE, is the last step from 3G to the next generation of mobile telecommunication networks, 4G. In 2014, 2.7 billion people are estimated to use mobile broadband and most of them will be served by Long Term Evolution or High Speed Packet Access (HSPA) networks[8]. HSPA[10] is another type of bridge between the 3G and 4G standards and offers up to 14 Mbit/s for the downlink and 5.8 Mbit/s for the uplink. LTE is more advanced than HSPA and offers IP-transparency (see section 2.2.2), hence a closer step towards 4G.

16 2.2. LTE 7 Release 8 of the LTE standardisation has been presented and has been frozen since December 2008[9]. The current LTE equipments are based on this release. Further improvement of the standardisation is possible in future releases Current LTE general features LTE release 8 feature[9]: Uplink access scheme is DFTS-OFDM and downlink is OFDMA. Compatible with earlier 3GPP-standards. Variable bandwidth: 1.4, 3, 5, 10, 15 and 20 MHz. 15 khz sub-carrier spacing. Modulations QPSK, 16QAM and 64QAM. More useful bits can be squeezed into apacketwithahighercomplexityofmodulationandgoodchannelquality. See section Low latencies. Short set-up time and short transfer delay. Minimum transmission time per interval (TTI) as low as 1 millisecond. Ideally a packet can be transmitted each millisecond. The idea of LTE is not merely to increase the bit-rate. The future usage of mobile telecommunication moves clearly towards All-IP Networks, AIPN[12], as the trend of IP traffic usage in mobile systems increases. Mobile data traffic is estimated to double every year through 2013 and increase 66 times from 2008 to 2013[11]. AIPN offers gains such as decreased cost for the operators, flexibility of deployment and improved user experience[13]. With the use of IP transparency that AIPN brings, the access can also be done with WiFi, WiMAX or regular wired systems. Hence, AIPN is not limited to UTRAN[14] and GERAN[15] based access networks[12], i.e. 3G and GSM/EDGE. LTE supports handover between its own systems and existing mobile networks, which means it can be partially built while regular mobile broadband is offered where LTE lacks coverage. More information can be found on the 3GPP website: LTE does not sufficiently meet the standards of 4G due to one area: bit-rate. The peak bit-rate required for 4G is 1Gbit/s for stationary and 100 Mbit/s for mobile usage. With LTE Advanced the 4G ITU requirements should be fulfilled.

17 8 Introduction Transmission resources: frequency-time domain LTE supports both frequency division duplexing (FDD) and time division duplexing (TDD) within the same single radio access technology. Base-stations in an LTE network can schedule users on several different spectrum bands, more commonly known as subbands, every transmission time interval. This works the same way for the transmission time intervals, or TTIs. AusercanbescheduledforoneormoresubbandsonespecificTTIandscheduledfor more subbands in a future TTI. The following scheduling does not have to use same subbands as the previous one. Although there are other scheduling restrictions, the scheduler has higher freedom to chose appropriate resources for users and still the availability to try to fully utilize its set of subbands. In June 2009, fifteen paired and eight unpaired spectrum bands were specified for LTE and this will be increased[8].

18 CHAPTER 3 LTE implementation in the simulator 3.1 Chapter introduction The following chapter describes the LTE standard and architecture as it is used in the simulator. The conventional contention-free uplink transmission method (see section 3.5.1) and the lower protocol architecture (see section 3.7) are examples of the LTE standard. Parameter settings are also described, such as the scheduling algorithm (see section 3.3.2). Last section, i.e. section 3.7, describes the LTE lower and higher protocol architecture. This is necessary for the understanding of chapter Simulation system environment The simulator is a Java-based object-oriented event-driven radio access simulator developed at Ericsson AB. The simulator implements the standardisation as well as other functions of an LTE system over a time-period in pseudo-reality. Several models are used for the simulations: system descriptions, physical environments (here: urban topology), users and their characteristics (location, movement, activity etcetera), traffic models, radio channels, interference, antenna models to name a few. Some aspects are directly affected by the pseudo random component, such as user location and channel disturbance. 9

19 10 LTE implementation in the simulator 3.3 Conventional resource scheduling General If a user equipment wants to transmit data to the base-station, it needs to be granted uplink transmission resources by the base-station. The base-station has to use a scheduling algorithm (see section 3.3.2) to be as fair as possibletoalluserswhendecidingwhena user equipment can transmit and how many subbands it can use. Otherwise, some users might not be scheduled at all. Next step is for the base-station to decide the modulationmethod(seesection3.3.3)and the transport format (see section 3.3.4) for the uplink transmission. These two aspects specifies how the uplink transmission will be done. All uplink transmission information will be packaged into a grant, which will be transmitted from the base-station to the user equipment Scheduling algorithm The default setting in the simulator is round-robin as grant scheduling algorithm. This type of scheduling dedicates equal resources per user and distributes them in a circular fashion. For example, if there are two resources and three users, then for the first transmission time interval (TTI) users 1 and 2 will be scheduled. The second TTI users 2 and 3willbescheduled. Users3and1willbescheduledthethirdTTI,repeatingaslongas the users have data to transmit. In reality most radio access networks use some sort of quality of service weight for their scheduling. This is necessary in order to avoid unfairness, since the latency tolerance differ depending on service. VoIP is highly sensitive to latency, but when transferring large data files between users, latency is not as significant. Interference is a large problem for transmissions. The interference will vary quickly: the interference from other users can be high one TTI and insignificant the next TTI. In order to avoid inter-cell interference, the scheduler will pick randomly a subband from the set of available subbands. If the user to be scheduled should be granted more subbands, it will be a subband next to the previous one Transport format The transport format specifies how many subbands to use each transmission time interval together with a specified modulation method. This simulator branch uses a scheduler with a greedy selection algorithm for its contention-free transmissions. The transport format is decided upon several user aspects: the amount of data in the transmission buffer, its channel quality indicator, settings whether or not to minimise the transport format, etcetera. The channel quality is measured every 40 milliseconds in the simulator. The base-station estimates the channel quality indicator for a specific user on its uplink

20 3.4. Channel mapping for the uplink 11 transmission on the physical uplink control channel(pucch,see section 3.4). Since this is something a user never can measure by itself,itcannotdecideitsowntransport format Modulation method LTE offers three different modulation types: QPSK, 16-QAM and 64-QAM[16]. Higher modulation complexity enables the transport block to carry more data. QPSK Quadriphase-shift keying carries the information in the phase of the transmission wave. The phase can take the value of four equally spaced values: π/4, 3π/4, 5π/4 and 7π/4. These phases corresponds to a set of bits each: 10, 00, 01, 11. Hence, QPSK carries two bits of information per interval. 16-QAM 16-Quadrature Amplitude Modulation carries information in the phase and in the amplitude. This enables it to carry a larger amount of information than the QPSK modulation. M-ary QAM-modulations are able to carry L information bits, where M = L 2. This enables 16-QAM to carry 4 bits of information. 64-QAM 64-Quadrature Amplitude Modulation works the same way as 16-QAM. Since 64 = 8, this modulation method can carry 8 bits of information. 3.4 Channel mapping for the uplink There are three different types of channels: physical, transport and logical[17]. The physical channels in the uplink are used for carrying user information and data. Physical Random Access Channel (PRACH) is only used for initial access and synchronization. Physical Uplink Control Channel (PUCCH) carries the Uplink Control Information (UCI). When transmitting a scheduling request, it is done on PUCCH. However the load on PUCCH increases with the number of users. To decrease the load, the scheduling request interval has to increase. Hence a user has to wait longer for access to PUCCH if the system expects a larger amount of users. An alternative method is to increase the number of PUCCH channels: this will decrease the load without increasing the access interval. There is a cost - more PUCCH means less PUSCH. The Physical Uplink Shared Channel (PUSCH) is used for transmitting data. Unlike PUCCH and PRACH, scheduling controls access to the PUSCH. The scheduling grant given by the base-station will specify which resources the user equipment can use on PUSCH.

21 12 LTE implementation in the simulator The transport channels carry the characteristics of transmission information on the radio interface. These channels are a service fromthephysicallayertothemac-layer and higher layers. Uplink Shared Channel (UL-SCH) is the transport channel that handles uplink data transmission. Random Access Channel (RACH) is used for synchronization with the base-station and initialization. The physical counterpart PRACH carry information to this transport channel. Even though the RACH never transmits any transport blocks, it is regarded as atransportchannel. The logical channels are defined by the type of information they carry. Control channels carry control and configuration information needed for transmissions. Traffic channels contain data from the users. Common Control Channel (CCCH) handles control information. Dedicated Traffic Channel (DTCH) transmits the data traffic from the user equipment. Dedicated Control Channel (DCCH) transmits the control information from the user equipment. This channel handles the individual configuration information such as handovers. The downlink has several more channels than these three. In Figure 3.1, the relations between the physical channels, transport channels and logical channels for the uplink can be seen. 3.5 Obtaining uplink transmission resources Conventional method: contention-free transmissions The conventional way of obtaining transmission resources in radio access networks is through contention-free access. Each specific transmission is individually scheduled by the base-station and the grant is then transmitted to the user equipment. This grant will inform the user equipment which subbands the base-station has pre-allocated for it together with information about when and how to use them. The signalling of the resource request required for the transmission initialization adds to the overall latency. Contention-free resource access can be done with the following steps: 1. The mobile has to wait for the physical uplink control channel (PUCCH, see section 3.1) to become available. This dedicated scheduling request (D-SR) interval is determined by the base-station. The D-SR interval is in this example 5 ms, hence the average delay is 2.5 ms. With numerous VoIP users, the interval should be larger in order to minimize the

22 3.5. Obtaining uplink transmission resources 13 Figure 3.1: Channel mapping for logical channels, transport channels and physical channels[17]. load on the PUCCH. This can lead to average delays as large as 20 ms (for D-SR intervals of 40 ms). 2. The user equipment transmits a D-SR on the PUCCH along with a buffer status report (BSR). Time: 1 ms. 3. The base station decodes the received D-SR and generates a scheduling grant (SG). Time: 3 ms. 4. Transmission of the SG. Time: 1 ms. 5. The user equipment processes the received SG and encodes the uplink data. Time: 3 ms. 6. Transmission of the uplink data on the physical uplink shared channel (PUSCH). Time: 1 ms

23 14 LTE implementation in the simulator 7. Processing delay for the base station. Time: 3 ms. These steps are shown in Figure 3.2. Obtaining resources with the access scheme described above, does not include the necessary signalling for synchronisation and initialisation at the start-up. The simulator implements the delays for each step as an approximation to reality. This description is also a generalization. The signallingofschedulingrequestismerelya bit transmitted on PUCCH: it does not contain a buffer status report. The buffer status report is essential for the scheduling at the base-station: for a fair scheduling for user equipments, the base-station needs to be aware of the amount of data each user equipment wants to transmit. In order for the base-station to be aware of the actual buffer size at the user equipment, it will first transmit a smaller grant, but large enough to fit a buffer status report. At this point the user equipment will have triggered its buffer status report. Next time the user equipment will try to transmit using the dedicated resources, its buffer status report will be appended to the payload. When the base-station receives this, it will grant for the now known buffer size at the user equipment. As mentioned previously, the D-SR interval in Figure 3.2 is 5 milliseconds. In reality, this scheduling interval is selected by the base-station and dependent on its load. To decrease the load on PUCCH, the number of PUCCH resources can be increased. However it would be at the cost of PUSCH resources Alternative method: contention-based transmissions This alternative method is not a part of the LTE standard yet, but has been discussed at 3GPP meetings and was partly already implemented in the radio network simulator for evaluation purposes. The contention-free access method described in section has a significant latency whenever there is a long scheduling request interval. This could be avoided with a contention-based grant. With this method, the base-station broadcasts a grant any user equipment can use for its transmission. With this shared grant, there is no need to wait for the PUCCH to become available. The contention-based uplink transmission can be done with the following steps: 1. The base-station waits for the beginning of the transmission time interval (TTI). Average time: 0.5 ms. 2. Transmission of the contention-based resource grant. This will be read by the user equipment on the physical downlink control channel (PDCCH). The grant is transmitted by the base-station every TTI when it feels it has available subbands. Time: 1 ms.

24 3.5. Obtaining uplink transmission resources 15 Contention free UE enb Time 0 ms 2.5 ms SR 3.5 ms 7.5 ms SG 6.5 ms 10.5 ms Data 11.5 ms 14.5 ms Figure 3.2: Contention-free access between a user equipment (UE) and a base-station (enb). 3. The user equipment processes the received scheduling grant and encodes the uplink data. Time: 3 ms. 4. Transmission of the uplink data. This data is transmitted using the contentionbased resources previously granted by the base-station. Time: 1 ms. 5. Processing delay for the base-station. Time: 3 ms. This is also shown in Figure 3.3. Nevertheless, it means using the same uplink data transmission resource for all user equipments (UEs). If two or more UEs are trying to access the same resource simultaneously, there is a risk of contention of packets. If this happens often, it will significantly affect the throughput: if retransmissions are enabled, retransmitting the unsuccessful data will increase the delay. With no retransmissions, the

25 16 LTE implementation in the simulator unsuccessful data will merely be discarded. Clearly the use of contention-based grants needs to be restricted such that only the users that has most to gain shall use it. Time Contention based UE enb 1.5 ms CB Grant 0 ms 0.5 ms 4.5 ms Data 5.5 ms 8.5 ms Figure 3.3: Contention-based access between a user equipment (UE) and a base-station (enb). 3.6 Key parameters The purpose of this thesis is to evaluate the VoIP-user capacity and satisfaction ratio for two uplink transmission methods: contention-free (see section 3.5.1) and contentionbased (see section 3.5.2). Two key parameters arenecessary forestimating thesatisfaction ratio: the amount of transmitted packets from one end and the amount of received packets and their delays at the other end. If two or more users are simultaneously transmitting using a contention-based grant, their transmissions will be on the same subtends. This means that the base-station will receive

26 3.7. Protocol layers of the LTE architecture 17 asignalwhichisacombinationofallthesimultaneouscontention-basedtransmissions. It is highly important that the simulator will take this into consideration. Since the contention-based grant does not take into consideration a user s channel quality, it is important that the simulator has a varying channel quality. 3.7 Protocol layers of the LTE architecture General The transport protocol consists of several different layers. As the transport block ascends in the protocol hierarchy, the header of the current layer is removed and checked. Like peeling an onion, so are the transport blocks handled in the protocol hierarchy. This can be seen in Figure 3.4. Figure 3.4: Lower protocol layer structure for LTE[17].

27 18 LTE implementation in the simulator The description of the lower layers in the LTE protocol architecture[17], starting at the lowest and ascending: 1. Physical layers 2. MAC 3. RLC 4. PDCP Physical layers The physical layer is the first and lowest layer and handles[17]: Mapping of the signal to the correct time-frequency resource. Mapping of the physical channels to the transport channels. Coding/decoding. Modulation/demodulation. For the uplink: the DFT. Cyclic Redundancy Check (CRC) is used as an early error detection. It is calculated for each transport block and attached after it. When a transport block is received, the same CRC is calculated at the receiver and then compared with the received appended CRC. If an inconsistency is detected, a retransmission can be triggered by signalling a HARQ-error at the MAC-level MAC Medium Access Control (MAC) handles the uplink and downlink scheduling and HARQ retransmissions[17]. HARQ (Hybrid Automatic Repeat request) is a method used for error-control at the MAC-level. The uplink and downlink scheduling is only performed at the base-station since no user equipment performs any type of scheduling. MAC also uses logical channels as a service to carry information to the RLC-level. Hence, this layer handles the mapping of logical channels to the appropriate transport channels and the multiplexing of different logical channels. This can be seen in Figure 3.1.

28 3.7. Protocol layers of the LTE architecture RLC RLC is an abbreviation for Radio Link Control and handles segmentation,concatenation and ARQ (Automatic Repeat request)[17]. The packets received from PDCP may be too large to fit inside the available size left at the RLC-level. Hence it may need to be segmented into smaller pieces. RLC handles the segmentation and keeps track of whether or not the following and/or previous service data unit(sdu)is concatenated with the current one. Channel condition fluctuations can cause one segment of a larger PDCP packet to be lost. It would be a waste of resources retransmitting successful segments from the same PDCP packet. A retransmission operates at the RLC-level between the transmitter and the receiver, in order to only retransmit the lost segment. Therefore transmission errors due to noise, an unpredicted drop of channel quality, etcetera, can be handled at this level. Status reports will be transmitted from the RLC entity at the receiver regarding the incoming segments. The RLC entity at the transmitter receives this status report and is able to act upon it. A retransmission will be performed in the acknowledged mode, but ignored in the unacknowledged mode. VoIP traditionally uses the unacknowledged mode in order to minimise the mouth-to-ear delay PDCP The Packet Data Convergence Protocol (PDCP) layer handles header compression and ciphering[17]. Without no specified header compression, the data unit will be unchanged. Robust header compression (ROHC) is recommended, but not a part of the standard Above The PDCP is followed by IP for data traffic. The IP (Internet Protocol) layer handles the addressing and routing of packets on a packet-switched interwork. The addressing is distinguished such that packets can be delivered from its source to its host without any other information. Layers on top of the IP-layer differs depending on service. Figure 3.5 shows the upper layers of two different services: VoIP to the left and web browsing to the right. The IP layer is at the bottom and the higher the layer, the further up in the protocol hierarchy.

29 20 LTE implementation in the simulator VoIP RTP Web UDP TCP IP IP Lower layers Figure 3.5: Higher protocol layer structure for VoIP (left) and web browsing (right).

30 CHAPTER 4 Implementation 4.1 Granting uplink resources Whenever the base-station has not fully scheduled the uplink, i.e. has available resources, it will transmit a contention-based grant. In reality this is a broadcast: it will be transmitted once to all users and any user in range will receive it. This is not the case in the Java-based simulator used for the study. A pseudo broadcast is used instead. The base-station will start with scheduling the regular contention-free users - the ones who have transmitted a scheduling request and have been granted resources. Second step is to schedule all users which have their channel quality indicator triggered. If there still are available resources, then the remaining users will be scheduled for the same contention-based resources. The grant will be duplicated and transmitted on the physical downlink control channel (PDCCH) to all the remaining users. The base-station in the radio access simulator is unaware of users that have not had their initial signalling on physical uplink control channel(pucch).inordertobescheduled for contention-based resources, the user needs to first be scheduled for the conventional contention-free resources. In reality this initial contention-free scheduling will not be required, although the users still needs to do all the initial signalling with the base-station to get synchronized. 4.2 Transport format The transport format in contention-free access differs depending on the user to be scheduled: its buffer size, channel quality, etcetera (see section 3.3.3). For contention-based scheduling this brings a significant problem: when the base-station is transmitting its contention-based grant, it is unaware of which user will actually use it. Even if the basestation would know all of the users current channel qualities, it would not know which one to base the transport format on. In order to avoid this, the pre-set contention-based 21

31 22 Implementation transport format needed to be robust enough to handle most channel qualities,but still be able to carry enough information to be useful. Since the object of this paper is to minimise the latency for VoIP-users, it is important that one grant is able to fit one voice frame (see section 5.3). The voice frames in the simulator at the RLC-level (see section 3.7.4) are all 296 bits each and the silence insertion descriptor (SID) frames are 96 bits. The size of the grant was set to 328 bits, to be able to append headers. Since the channel quality is unknown, it was decided that the modulation method should be one with high robustness. Hence the choice fell on QPSK (see section 3.3.4). The transport format tables used for this simulator implementation, could use 1, 2, 3, 4, 5, 6, 8 or 9 subbands and still fulfil the requirements of 328 bits and QPSK modulation. Using a large amount of subbands would be affected by the background load: if there are already several users scheduled for regular resources, the contention-based grant might not be able to be scheduled at all. Given the above, the choice fell on two subbands in order to often schedule contention-based grants. 4.3 Failed transmissions Failure detection Using contention-based resources leads to a high probability of collision. This is due to enabling several users transmissions in the same cell on the same subbands and transmission time interval. In reality, one user can successfully be decoded at the base-station if the others transmissions were unsuccessful due to path loss or other disturbances. The base-station could by analysing the signal-to-noise ratio of the successful transmission, be able to detect the failed transmission attempts of the other users. For contention-free transmissions this is not an issue: the base-station is aware of which users are enabled for transmission since the transmissions are already scheduled. The base-station would also not schedule several users for the same resource, but it is the core of contention-based access. The contention-based grant is broadcast to the users in the cell, meaning the basestation has no clue which of the user is actually trying to transmit. If the transmission attempt fails, then the packet cannot be decoded and the source cannot be detected. If an acknowledgement (ACK) is sent to the user of the successful transmission, then the users that failed might interpret this as acknowledgements of their transmissions. The simulator uses a simplified collision model when it comes to contention of several transmissions. If several users try to transmit simultaneously on the same resource, the regular channel model in the simulator will treat them as if they are separate transmissions. In other words, it does not take into consideration the intra-cell interference of the multiple transmissions and will decode each transmission as if it was alone. This

32 4.3. Failed transmissions 23 is not suitable for simulations with higher load on contention-based resources, therefore changes were required. Apart from the regular actionsofthecollisionmodel, itwillalso look at the amount of users trying to simultaneously access the same subband. If only one user attempts use the grant, then everything proceeds as normally. For several users, then all will be considered as failures and negative acknowledgements (NACK) will be transmitted. Thus ignoring the case when one user might succeed despite contention from other simultaneous transmissions using the same resources Error handling There are two types of error detection: either a received HARQ NACK for a certain process or a process time-out at the user equipment, triggered by no received ACK/NACK before its deadline. The error detection by time-out is simple, due to the synchronous nature of the simulator: there are no variations. The time-out interval in the simulator is set to 8 milliseconds. The reality is unfortunately not synchronous. In order to cope with smaller variations, extra intervals are necessary and the time-out is thus in the magnitude of milliseconds. As mentioned in section 3.7.4, there are two types of transmission modes: acknowledged mode (AM) and unacknowledged mode (UM). AM has by definition its own error handling and retransmission. The normal error procedure for UM is to merely discard the data and proceed as normal. If several user equipments in UM try to repeatedly transmit their packets simultaneously using contention-based resources, nothing will get through and the packets will be lost. Due to the high collision probability, the services using contention-based resources needs some sort of retransmission. VoIP-services cannot use the retransmission from AM, since it leads to longer latencies. Hence another retransmission procedure needed to be implemented for UM. The error handling for UM is as follows: Atransmissionerrorisdetectedattheuserequipment,eitherbyareceivedNACK or triggered by a time-out. If the failed transmission was contention-free, proceed as normal UM: discard the data and continue as previously. If contention-based, put the payload back into the buffer and switch to contention-free access with a scheduling request. The new buffer status estimator will do its buffer size calculation after the negatively acknowledged data has returned to the buffer. There is however an exception: if the payload is older than the maximum tolerable delay of 140 milliseconds, then it will not be returned to the buffer at a NACK. The switch to contention-free transmission will still occur together with a current

33 24 Implementation buffer status estimator. Retransmitting an out-dated packet is a waste of resources, seeing that the data unit will be regarded as useless at the receiver. After the scheduling request has been sent, the user equipment will disregard any contention-based grant while waiting for its contention-free grant. At the reception of its requested contention-free grant, continue as normally. In order to return the payload to the transmission buffer after a failure, the transmission process for UM needed to be changed slightly as well. After transmitting a packet, the user equipment stores the sent data while waiting for an ACK or NACK. The buffer with stored sent data will be updated at every new transmissionandout-dateddatawillbe removed. The expiration time of the stored data is important: otherwise an unnecessary high amount of data would be stored. If an ACK is received when in UM, nothing will happen. The corresponding packet with the same identity number will merely be deleted from the buffer after 140 milliseconds. The error handling above also depicts the switch from contention-based to contention-free transmissions. A user equipment is able to switch back to contention-based access if the contention-free transmission was successful. At the next triggering of scheduling request transmission, the user equipment will instead halt and wait for next contention-based grant. 4.4 Simplification of the simulation models Several simplifications of the simulation models were made. The reason was simply the time-constraints of the project and the complexity of the simulator. Header sizes have been dramatically cut. Handling the retransmission of failed contention-based packets in unacknowledged mode turned out to be cumbersome since in many cases it demanded resegmentation. There was clearly not enough time to fix this properly. In order to ensure that a retransmitted packet would not get segmented during the retransmission, header sizes had to be minimised. Dynamic robust header compressions on PDCP-level is often used, but cutting down the header sizes such as done here is more like a simplistic ROHC. Instead, UDP and IP headers are both set to zero. The RTP header size is 12B as default setting, but is here set to 3B. As mentioned previously, the retransmission model could not handle segmentation. As a result, only users with an unsegmented data unit for transmission that can completely fit inside the transport format can use the contention-based grant. Collision model is simplified. Whenever two users transmit on the same subband simultaneously, both packets will be regarded as corrupted and NACKs will be transmitted. In reality, different channel qualities and signal strengths might lead to

34 4.4. Simplification of the simulation models 25 one packet being successfully decoded and the other one corrupted. The simulated case is thus a worst-case scenario. It would have been too cumbersome for this project to implement a proper collision model.

35

36 CHAPTER 5 Simulations 5.1 The simulation system design The simulations are done for the transmission between a user equipment (for example a cellphone) located in a cell within the system and a non-wireless device at the core of the system, see Figure 5.1. For the uplink the following delays will occur: 1. Processing delay at the front-end of communication. Front end in Figure 5.1: device B. Estimated time: 5 milliseconds. 2. Air interface delay. Delay due to transmission between front-end and its basestation. If the base-station detects a failure, a retransmission may be done (depending on mode). This is not a fixed delay and is dependent on load in the cell and channel quality. However the largest tolerable delay for this simpler system is 140 milliseconds. After subtracting the other fixed delays, 80 milliseconds is left for the air interface delay. 3. Delay due to switching and routing between the base-station at the front-end to the back-end (device A). Estimated time: 20 milliseconds. 4. Processing delay at the other end of communication (device A). Estimated time: 35 milliseconds. This is a simpler scenario: the worst case scenario for access transmission time is between two wireless devices, see Figure 5.2. The maximum tolerable end-to-end delay for two-way voice communication was decided to be 240 milliseconds. With this mouth-toear delay, 85% of all conversational speech users are very satisfied or satisfied[18]. Delay due to switching and routing is estimated in total to 40 milliseconds. An additional 5 milliseconds at the front-end and 35 milliseconds at the other end is required for 27

37 28 Simulations Figure 5.1: The simpler end-to-end transmission model used in the simulator. processing. This leaves us with 160 milliseconds for two air interference delays, hence a maximum of 80 milliseconds latency per wireless link at each end. Using the easier case implemented in the radio access simulator and still making sure to handle the worst case scenario, leaves us with a system maximum end-to-end delay of 140 milliseconds. 5.2 Definitions Packet failure There is a difference between completely lost packets and late packets flagged as lost. If a voice packet does not reach the destination at all, it is completely lost. If a packet arrives at the destination after its deadline of 140 milliseconds, it is flagged as lost, since it is useless. See section for discarded and late data

38 5.2. Definitions 29 Figure 5.2: The worst case end-to-end transmission model. due to failure detection and its handling. Satisfaction Auserisregardedassatisfiedifitreceives99%ofthevoiceframeson time. Hence, up to 1% of the packets can be late or lost. Capacity The system capacity is dependent on the satisfaction ratio. The capacity criteria in this work is the amount of users when 95% of them are satisfied.

39 30 Simulations Figure 5.3: Simulation model of seven base-stations with three hexagonal cells each. 5.3 System description and parameter settings System The simulated system consists of seven base-stations with three cells each, see Figure 5.3. Every cell is in a hexagonal form with the radius of m and a typical urban environment model. The attenuation model includes path loss. Radio interface The uplink and downlink has 25 subbands each and a bandwidth of 4.5 GHz. Users The number of initial users is specified. The users will be randomly distributed over the system and will move in a straight line with the velocity of 3 km/h. See section for amount of users in the simulations. The users can use different services. In these simulations, the users are predefined as one of two different services: VoIP Avoiceframeisgeneratedevery20millisecondsanditiscrucialitarrives before its deadline of 140 milliseconds. It wouldbeawasteofresourcestransmitting voice frames of silence every 20 milliseconds. When one user is detected as silent, the voice frame is replaced with a silent insertion descriptor (SID). First SID is generated after 20 milliseconds, same interval as with voice frames. But if the silence continues, the SID interval will double its interval at every new reception of a SID frame, until the interval is 160 milliseconds, assuming no new speech. The SID interval will remain at 160 milliseconds until the speech continues. The speech activity ratio is set to 0.5: each end of the conversation is active approximately half of the time. When one user stops talking, the other one begins. The mean talk spurt duration issetto5.0seconds. Thecalllength

LTE Radio Interface Architecture

LTE Radio Interface Architecture 3G Evolution Chapte r: 15 LTE Radio Interface Architecture Department of Electrical and Information Technology Johan Löfgren 2009-03-19 3G Evolution - HSPA and LTE for Mobile Broadband 1 Outline Architecture

More information

Key Performance Aspects of an LTE FDD based Smart Grid Communications Network

Key Performance Aspects of an LTE FDD based Smart Grid Communications Network Key Performance Aspects of an LTE FDD based Smart Grid Communications Network Presented by: Ran Zhang Supervisors: Prof. Sherman(Xuemin) Shen, Prof. Liang-liang Xie Main Reference Jason Brown, and Jamil

More information

Performance of UMTS Radio Link Control

Performance of UMTS Radio Link Control Performance of UMTS Radio Link Control Qinqing Zhang, Hsuan-Jung Su Bell Laboratories, Lucent Technologies Holmdel, NJ 77 Abstract- The Radio Link Control (RLC) protocol in Universal Mobile Telecommunication

More information

1.1 Beyond 3G systems

1.1 Beyond 3G systems 1 Introduction The cellular wireless communications industry witnessed tremendous growth in the past decade with over four billion wireless subscribers worldwide. The first generation (1G) analog cellular

More information

LTE Radio Interface Architecture. Sherif A. Elgohari

LTE Radio Interface Architecture. Sherif A. Elgohari LTE Radio Interface Architecture Sherif A. Elgohari (selgohari@ieee.org) Agenda Overall System Architecture Radio Protocol Architecture Radio Link Control Medium Access Control Physical Layer Control Plan

More information

HSPA evolution. ericsson White paper July beyond 3gpp release 10

HSPA evolution. ericsson White paper July beyond 3gpp release 10 ericsson White paper 284 23-3156 July 2011 HSPA evolution HSPA evolution beyond 3gpp release 10 Many mobile operators around the world have HSPA technology to thank for their mobile broadband success.

More information

SIMULATION FRAMEWORK MODELING

SIMULATION FRAMEWORK MODELING CHAPTER 5 SIMULATION FRAMEWORK MODELING 5.1 INTRODUCTION This chapter starts with the design and development of the universal mobile communication system network and implementation of the TCP congestion

More information

MASTER'S THESIS. Evaluating Video Quality Degradation From Data Packet Losses in an LTE Environment

MASTER'S THESIS. Evaluating Video Quality Degradation From Data Packet Losses in an LTE Environment MASTER'S THESIS 2009:111 Evaluating Video Quality Degradation From Data Packet Losses in an LTE Environment Alfonso Daniel Nombela Gordo Luleå University of Technology Master Thesis, Continuation Courses

More information

Keywords Quality of Service (QoS), Long Term Evolution (LTE), System Architecture Evolution (SAE), Evolved Packet System (EPS).

Keywords Quality of Service (QoS), Long Term Evolution (LTE), System Architecture Evolution (SAE), Evolved Packet System (EPS). Volume 5, Issue 7, July 2015 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com A Review of 3GPP-LTE

More information

Wireless systems overview

Wireless systems overview Wireless systems overview Evolution of systems from 1G to 4G 1G, 4G major features Specifications comparison 5G communication systems Summary Wireless Systems 2016 Evolution of cellular networks WiMAX

More information

Development of MD8430A for LTE-Advanced Tests

Development of MD8430A for LTE-Advanced Tests Masaki Hizume, Hidenori Konno, Toshiro Miyazaki, Masato Sasaki, Katsuo Sakurai, Satoshi Wakasa, Shinichi Segawa, Tomoyuki Fujiwara, Yuji Sakai [Summary] As part of the expansion of LTE (Long Term Evolution)

More information

Third generation WCDMA radio evolution

Third generation WCDMA radio evolution WIRELESS COMMUNICATIONS AND MOBILE COMPUTING Wirel. Commun. Mob. Comput. 2003; 3:987 992 (DOI: 10.1002/wcm.134) Third generation WCDMA radio evolution Harri Holma*,y and Antti Toskala Nokia Networks, IP

More information

Enhancing Packet Data Access in WCDMA

Enhancing Packet Data Access in WCDMA Enhancing Packet Data Access in WCDMA Janne Peisa a, Stefan Parkvall b, Erik Dahlman b, Pål Frenger b, Per Beming b a Ericsson Research, FIN-02420 Jorvas, Finland b Ericsson Research, 164 80 Stockholm,

More information

WCDMA evolution: HSPA and MBMS

WCDMA evolution: HSPA and MBMS Chapter: 3G Evolution 8 WCDMA evolution: HSPA and MBMS Isael Diaz isael.diaz@eit.lth.se Department of Electrical and Information Technology 02-Apr-2009 3G Evolution - HSPA and LTE for Mobile Broadband

More information

ELEC 691X/498X Broadcast Signal Transmission Winter 2018

ELEC 691X/498X Broadcast Signal Transmission Winter 2018 ELEC 691X/498X Broadcast Signal Transmission Winter 2018 Instructor: DR. Reza Soleymani, Office: EV 5.125, Telephone: 848 2424 ext.: 4103. Office Hours: Wednesday, Thursday, 14:00 15:00 Slide 1 In this

More information

Abstract of the Book

Abstract of the Book Book Keywords IEEE 802.16, IEEE 802.16m, mobile WiMAX, 4G, IMT-Advanced, 3GPP LTE, 3GPP LTE-Advanced, Broadband Wireless, Wireless Communications, Cellular Systems, Network Architecture Abstract of the

More information

NETWORK DIAGNOSTICS Testing HSDPA, HSUPA for 3G mobile apps

NETWORK DIAGNOSTICS Testing HSDPA, HSUPA for 3G mobile apps NETWORK DIAGNOSTICS Testing HSDPA, HSUPA for 3G mobile apps By Simon Binar Protocol Monitoring Division Tektronix Inc. The market for broadband cellular data services is rapidly evolving. From its deployment

More information

INTRODUCTION TO LTE. ECE MOBILE COMMUNICATION Monday, 25 June 2018

INTRODUCTION TO LTE. ECE MOBILE COMMUNICATION Monday, 25 June 2018 INTRODUCTION TO LTE ECE 2526 - MOBILE COMMUNICATION Monday, 25 June 2018 1 WHAT IS LTE? 1. LTE stands for Long Term Evolution and it was started as a project in 2004 by the Third Generation Partnership

More information

COPYRIGHTED MATERIAL. Introduction. Harri Holma and Antti Toskala. 1.1 WCDMA technology and deployment status

COPYRIGHTED MATERIAL. Introduction. Harri Holma and Antti Toskala. 1.1 WCDMA technology and deployment status 1 Introduction Harri Holma and Antti Toskala 1.1 WCDMA technology and deployment status The first Third Generation Partnership Project (3GPP) Wideband Code Division Multiple Access (WCDMA) networks were

More information

Wireless Communication

Wireless Communication Wireless Communication Hwajung Lee Key Reference: Prof. Jong-Moon Chung s Lecture Notes at Yonsei University Wireless Communications Bluetooth Wi-Fi Mobile Communications LTE LTE-Advanced Mobile Communications

More information

The Open-Source SDR LTE Platform for First Responders. Software Radio Systems

The Open-Source SDR LTE Platform for First Responders. Software Radio Systems The Open-Source SDR LTE Platform for First Responders Software Radio Systems www.softwareradiosystems.com www.github.com/srslte Outline SRS - Software Radio Systems NIST PSIAP and OpenFirst srslte The

More information

Mobile Broadband Comparison. CDMA Development Group March 2008

Mobile Broadband Comparison. CDMA Development Group March 2008 Mobile Broadband Comparison CDMA Development Group March 2008 Assumptions and Notes for the Technology Comparison This document compares the performance of existing and future mobile communications systems

More information

LTE multi-cellular system in urban environment: inter-cell interference Impact on the Downlink radio transmission

LTE multi-cellular system in urban environment: inter-cell interference Impact on the Downlink radio transmission LTE multi-cellular system in urban environment: inter-cell interference Impact on the Downlink radio transmission Younes BALBOUL Signals, Systems and Components Lab Faculty of Science and Technology, Fez,

More information

Mobile Network Evolution Part 2

Mobile Network Evolution Part 2 Mobile Network Evolution Part 2 From UMTS to LTE or How to Further Increase Network Capacity and QoS Andreas Mitschele-Thiel Advanced Mobile Communication Networks 1 Outline Evolution from Circuit Switching

More information

RADIO PROTOCOLS FOR LTE AND LTE-ADVANCED

RADIO PROTOCOLS FOR LTE AND LTE-ADVANCED RADIO PROTOCOLS FOR LTE AND LTE-ADVANCED Seungjune Yi SungDuck Chun YoungDae Lee Sungjun Park SungHoon Jung LG Electronics, South Korea WILEY Foreword by Takehiro Nakamura Preface About the Authors 1 Introduction

More information

DAY 2. HSPA Systems Architecture and Protocols

DAY 2. HSPA Systems Architecture and Protocols DAY 2 HSPA Systems Architecture and Protocols 1 LTE Basic Reference Model UE: User Equipment S-GW: Serving Gateway P-GW: PDN Gateway MME : Mobility Management Entity enb: evolved Node B HSS: Home Subscriber

More information

Dual Connectivity in LTE

Dual Connectivity in LTE Dual Connectivity in LTE 1 Background Scenario Architecture User Plane feature Control Plane feature Outline 6-1 Background Scenario Architecture User Plane feature Control Plane feature Outline Background

More information

Call Establishment and Handover Procedures of PS Calls using HSDPA

Call Establishment and Handover Procedures of PS Calls using HSDPA 3 Call Establishment and Handover Procedures of PS Calls using HSDPA The following chapter explains special performance measurement requirements for PS calls that use HSDPA. Differences in performance

More information

ETSI TS V ( ) Technical Specification

ETSI TS V ( ) Technical Specification TS 136 314 V10.1.0 (2011-06) Technical Specification LTE; Evolved Universal Terrestrial Radio Access (E-UTRA); Layer 2 - Measurements (3GPP TS 36.314 version 10.1.0 Release 10) 1 TS 136 314 V10.1.0 (2011-06)

More information

Header Compression Capacity Calculations for Wireless Networks

Header Compression Capacity Calculations for Wireless Networks Header Compression Capacity Calculations for Wireless Networks Abstract Deployment of wireless transport in a data-centric world calls for a fresh network planning approach, requiring a balance between

More information

Original Circular Letter

Original Circular Letter LTE-Advanced Original Circular Letter LTE-Advanced will be an evolution of LTE. Therefore LTE- Advanced must be backward compatible with LTE Release 8. LTE-Advanced requirements will meet or even exceed

More information

MPEG4 VIDEO OVER PACKET SWITCHED CONNECTION OF THE WCDMA AIR INTERFACE

MPEG4 VIDEO OVER PACKET SWITCHED CONNECTION OF THE WCDMA AIR INTERFACE MPEG4 VIDEO OVER PACKET SWITCHED CONNECTION OF THE WCDMA AIR INTERFACE Jamil Y. Khan 1, Pratik Das 2 School of Electrical Engineering and Computer Science, University of Newcastle, Callaghan, NSW 238,

More information

5G Techniques for Ultra Reliable Low Latency Communication. Dr. Janne Peisa Principal Researcher, Ericsson Research

5G Techniques for Ultra Reliable Low Latency Communication. Dr. Janne Peisa Principal Researcher, Ericsson Research 5G Techniques for Ultra Reliable Low Latency Communication Dr. Janne Peisa Principal Researcher, Ericsson Research 5G is use case driven Massive MTC Critical MTC LOGISTICS TRAFFIC SAFETY & CONTROL SMART

More information

Infrastructure Test System

Infrastructure Test System Infrastructure Test System TM500 HSPA Test Mobile Data Sheet The most important thing we build is trust The industry standard test system for HSPA infrastructure development, test and demonstrations 3GPP

More information

PERFORMANCE ANALYSIS OF VoIP SERVICES IN LTE NETWORKS

PERFORMANCE ANALYSIS OF VoIP SERVICES IN LTE NETWORKS Bulletin of the Transilvania University of Braşov Vol. 9 (58) No. 2-2016 Series I: Engineering Sciences PERFORMANCE ANALYSIS OF VoIP SERVICES IN LTE NETWORKS R. CURPEN 1 S. ZAMFIR 1 I. ILIESCU 1 T. BĂLAN

More information

GPRS and UMTS T

GPRS and UMTS T GPRS and UMTS T-110.2100 Global Packet Radio Service GPRS uses the time slots not used for circuit switched services Data rate depends on the availability of free time slots GPRS uses the multislot technique,

More information

The Effect of VoIP Payload Size on Upload Delay Values in Wireless Broadband (WiBro) Networks

The Effect of VoIP Payload Size on Upload Delay Values in Wireless Broadband (WiBro) Networks ISBN 978-93-84468-20-0 Proceedings of 2015 International Conference on Future Computational Technologies (ICFCT'2015) Singapore, March 29-30, 2015, pp. 89-95 The Effect of VoIP Payload Size on Upload Delay

More information

Strengthening Unlicensed Band Wireless Backhaul

Strengthening Unlicensed Band Wireless Backhaul be in charge Strengthening Unlicensed Band Wireless Backhaul Use TDD/TDMA Based Channel Access Mechanism WHITE PAPER Strengthening Unlicensed Band Wireless Backhaul: Use TDD/TDMA Based Channel Access Mechanism

More information

4G Mobile Communications

4G Mobile Communications 4G Mobile Communications Welcome to 4G The term 4G is used broadly to include several types of broadband wireless access communication systems, not only cellular telephone systems. One of the terms to

More information

Wireless Communication

Wireless Communication Wireless Communication Hwajung Lee Key Reference: Prof. Jong-Moon Chung s Lecture Notes at Yonsei University Wireless Communications Bluetooth Wi-Fi Mobile Communications LTE LTE-Advanced Mobile Communications

More information

Master Thesis. Mobility Management and eicic in LTE Femtocells

Master Thesis. Mobility Management and eicic in LTE Femtocells Master Thesis Mobility Management and eicic in LTE Femtocells by Pantha Ghosal Faculty of Engineering and IT University of Technology, Sydney August, 2017 Supervisor : A/Prof. Dr. Kumbesan Sandrasegaran

More information

3G Technical Evolution as an evolving broadband solution

3G Technical Evolution as an evolving broadband solution ITU-D Regional Development Forum for the Asia Pacific Region NGN and Broadband, Opportunities and Challenges Yogyakarta, Indonesia, 27 29 July 2009 3G Technical Evolution as an evolving broadband solution

More information

3GPP TS V ( )

3GPP TS V ( ) TS 36.314 V10.2.0 (2011-09) Technical Specification 3rd Generation Partnership Project; Technical Specification Group Radio Access Network; Evolved Universal Terrestrial Radio Access (E-UTRA); Layer 2

More information

Technical Specification LTE; Evolved Universal Terrestrial Radio Access (E-UTRA); Layer 2 - Measurements (3GPP TS version 11.0.

Technical Specification LTE; Evolved Universal Terrestrial Radio Access (E-UTRA); Layer 2 - Measurements (3GPP TS version 11.0. TS 136 314 V11.0.0 (2012-10) Technical Specification LTE; Evolved Universal Terrestrial Radio Access (E-UTRA); Layer 2 - Measurements (3GPP TS 36.314 version 11.0.0 Release 11) 1 TS 136 314 V11.0.0 (2012-10)

More information

HSUPA Services Achieving Maximum Uplink Speed of 5.7 Mbit/s

HSUPA Services Achieving Maximum Uplink Speed of 5.7 Mbit/s HSUPA Services Achieving Maximum Uplink Speed of 5.7 Mbit/s Enhanced Uplink FOMA Mobile Terminals Maximum Uplink Speed of 5.7 Mbit/s HSUPA Services Achieving Maximum Uplink Speed of 5.7 Mbit/s NTT DOCOMO

More information

Lecture overview. Modifications and derivatives of GSM Data transmission in GSM: HSCSD GPRS part one EDGE

Lecture overview. Modifications and derivatives of GSM Data transmission in GSM: HSCSD GPRS part one EDGE Lecture overview Modifications and derivatives of GSM Data transmission in GSM: HSCSD GPRS part one EDGE Modifications and derivatives of GSM Introduction of half-rate speech coding (BR 6.5 kb/s) Two users

More information

Performance Challenge of 3G over Satellite Methods for Increasing Revenue & Quality of Experience. February 2018

Performance Challenge of 3G over Satellite Methods for Increasing Revenue & Quality of Experience. February 2018 Performance Challenge of 3G over Satellite Methods for Increasing Revenue & Quality of Experience February 2018 Mobile telephony has been in existence for over 40 years. The first generation (1G) developed

More information

Wireless Network Virtualization LTE case study

Wireless Network Virtualization LTE case study Wireless Network Virtualization LTE case study Yasir Zaki ComNets TZI University of Bremen, Germany April 23 rd, 2010 April 23, 2010 1 Outline Introduction to Wireless Virtualization State-of-the-art LTE

More information

Session 2: 4G to 5G networks and standard releases

Session 2: 4G to 5G networks and standard releases Session 2: 4G to 5G networks and standard releases ITU Asia-Pacific Centre of Excellence Training On Traffic engineering and advanced wireless network planning 17-19 October 2018, Suva, Fiji Sami Tabbane

More information

QOS ANALYSIS OF 3G AND 4G. Khartoum, Sudan 2 unversity of science and Technology, Khartoum, Sudan

QOS ANALYSIS OF 3G AND 4G. Khartoum, Sudan 2 unversity of science and Technology, Khartoum, Sudan QOS ANALYSIS OF 3G AND 4G Doaa Hashim Osman 1, Amin Babiker 2 and Khalid hammed Bellal 1 Department of Communication, Faculty of Engineering, AL Neelain University, Khartoum, Sudan 2 unversity of science

More information

Chapter - 1 INTRODUCTION

Chapter - 1 INTRODUCTION Chapter - 1 INTRODUCTION Worldwide Interoperability for Microwave Access (WiMAX) is based on IEEE 802.16 standard. This standard specifies the air interface of fixed Broadband Wireless Access (BWA) system

More information

ETSI Project BRAN Hiperlan Type 2 for IEEE 1394 Applications System Overview

ETSI Project BRAN Hiperlan Type 2 for IEEE 1394 Applications System Overview ETSI Project BRAN Hiperlan Type 2 for IEEE 1394 Applications System Overview Source : Jamshid Khun Jush (Ericsson) (THOMSON multimedia) 1 HIPERLAN/2 Standard A new standard developed by the ETSI Project

More information

GPRS System Architecture

GPRS System Architecture 1 LECTURE 6 GPRS What is GPRS? 2 General Packet Radio Service is an overlay on top of GSM physical layer and network entities It extends data capabilities of GSM and provides connection to external packet

More information

Introduction to Mobile Broadband (imb)

Introduction to Mobile Broadband (imb) Introduction to Mobile Broadband (imb) Teaching By Asst.Prof.Dr. Suwat Pattaramalai suwat.pat@kmutt.ac.th Tel. 02-470-9079 Material: http://webstaff.kmutt.ac.th/~suwat.pat/ 3GPP WiMAX FORUM Introduction

More information

I. INTRODUCTION. each station (i.e., computer, telephone, etc.) directly connected to all other stations

I. INTRODUCTION. each station (i.e., computer, telephone, etc.) directly connected to all other stations I. INTRODUCTION (a) Network Topologies (i) point-to-point communication each station (i.e., computer, telephone, etc.) directly connected to all other stations (ii) switched networks (1) circuit switched

More information

TTCN3 in Wireless Testing Eco Space

TTCN3 in Wireless Testing Eco Space TTCN3 in Wireless Testing Eco Space Accenture, its logo, and Accenture High Performance Delivered are trademarks of Accenture. Agenda Challenges in Test environment development for Wireless Products Critical

More information

Distributed Queue Dual Bus

Distributed Queue Dual Bus Distributed Queue Dual Bus IEEE 802.3 to 802.5 protocols are only suited for small LANs. They cannot be used for very large but non-wide area networks. IEEE 802.6 DQDB is designed for MANs It can cover

More information

Communication Systems for the Mobile Information Society

Communication Systems for the Mobile Information Society Communication Systems for the Mobile Information Society Martin Sauter Nortel Networks, Germany John Wiley Si Sons, Ltd Contents Preface List of Figures List of Tables List of Abbreviations xi xiii xix

More information

Wireless Backhaul Synchronization

Wireless Backhaul Synchronization Wireless Backhaul Synchronization Abstract This paper focuses on Next Generation Backhaul Networks Synchronization and the way it is implemented by Ceragon s high capacity, LTE Ready point to point microwave

More information

HSDPA Protocols & Resource Allocation: Contents

HSDPA Protocols & Resource Allocation: Contents HSDPA Protocols & Resource Allocation: Contents HSDPA Transport Channel: HSDPA Protocol Architecture tasks/hsdpa Resource Allocation: Fast Packet Scheduling Fast Link Adaptation Fast H-ARQ () controls

More information

Evaluation of End-to-End TCP performance over WCDMA

Evaluation of End-to-End TCP performance over WCDMA Evaluation of End-to-End TCP performance over WCDMA Liang Hu Department of Communications, Optics & Materials Technical University of Denmark, Lyngby, Denmark Email:{lh}@com.dtu.dk Abstract this article

More information

HSPA+ Advanced Smart Networks: Multipoint Transmission

HSPA+ Advanced Smart Networks: Multipoint Transmission Qualcomm Incorporated February 2011 Table of Contents 1. Introduction... 1 2. Multipoint HSPA Description... 2 Single Frequency Multipoint HSPA... 2 Dual Frequency Multipoint HSPA... 3 3. Advantages...

More information

Chapter 5. Voice Network Concepts. Voice Network Concepts. Voice Communication Concepts and Technology

Chapter 5. Voice Network Concepts. Voice Network Concepts. Voice Communication Concepts and Technology Chapter 5 Voice Communication Concepts and Technology Voice Network Concepts Telephone switchboard - Circa 1898 Voice Network Concepts Telephone calls are connected from source via circuit switching. Circuit

More information

A study of Skype over IEEE networks: voice quality and bandwidth usage

A study of Skype over IEEE networks: voice quality and bandwidth usage Graduate Theses and Dissertations Graduate College 2011 A study of Skype over IEEE 802.16 networks: voice quality and bandwidth usage Kuan-yu Chen Iowa State University Follow this and additional works

More information

Real-World Experience with a Mobile Broadband Network

Real-World Experience with a Mobile Broadband Network Real-World Experience with a Mobile Broadband Network Dr. Jin Yang Verizon Wireless jin.yang@ieee.org September 23, 2004 IEEE Communications Society Oakland-East Bay Chapter, CA Outline Introduction Overview

More information

Primebit Solution MASTERED DIPLOMA IN PROTOCOL DEVELOPMENT COURSE CONTENT

Primebit Solution MASTERED DIPLOMA IN PROTOCOL DEVELOPMENT COURSE CONTENT MASTERED DIPLOMA IN PROTOCOL DEVELOPMENT COURSE CONTENT MODULE 1 : UMTS (3G) AND GSM (2G) BASIC 2G and 3G Network Architecture - CS & PS domain. RAT- FDMA, TDMA, CDMA, WCDMA, DFDMA, SCFDMA. SDU,PDU,UMTS

More information

4G LTE MOBILE TOWER TRANSMITTER RECEIVER REAL SYSTEM TRAINER MODEL - 4GLTE100

4G LTE MOBILE TOWER TRANSMITTER RECEIVER REAL SYSTEM TRAINER MODEL - 4GLTE100 4G LTE MOBILE TOWER TRANSMITTER RECEIVER REAL SYSTEM TRAINER MODEL - 4GLTE100 This trainer has been designed with a view to provide practical and experimental knowledge of 4G LTE Realtime Mobile Transmitter

More information

HSPA+ R8. February 2009

HSPA+ R8. February 2009 HSPA+ R8 February 2009 Disclaimer Nothing in this presentation is an offer to sell any of the parts referenced herein. This presentation may reference and/or show images of parts and/or devices utilizing

More information

Infrastructure Test System TM500 LTE 3GPP LTE Test Data Sheet

Infrastructure Test System TM500 LTE 3GPP LTE Test Data Sheet Infrastructure Test System TM500 LTE 3GPP LTE Test Data Sheet The most important thing we build is trust The widely used test system for 3GPP LTE infrastructure development, test and demonstrations Functional,

More information

3G/4G Mobile Communications Systems. Dr. Stefan Brück Qualcomm Corporate R&D Center Germany

3G/4G Mobile Communications Systems. Dr. Stefan Brück Qualcomm Corporate R&D Center Germany 3G/4G Mobile Communications Systems Dr. Stefan Brück Qualcomm Corporate R&D Center Germany Chapter IX: Mobility Control 2 Slide 2 Mobility Control Handover Types Mobility Measurements in UMTS Mobility

More information

Mesh Networks

Mesh Networks Institute of Computer Science Department of Distributed Systems Prof. Dr.-Ing. P. Tran-Gia Decentralized Bandwidth Management in IEEE 802.16 Mesh Networks www3.informatik.uni-wuerzburg.de Motivation IEEE

More information

HSDPA/HSUPA for UMTS. High Speed Radio Access for Mobile Communications. Harri Holma and Antti Toskala JOHN WILEY & SONS, LTD.

HSDPA/HSUPA for UMTS. High Speed Radio Access for Mobile Communications. Harri Holma and Antti Toskala JOHN WILEY & SONS, LTD. HSDPA/HSUPA for UMTS High Speed Radio Access for Mobile Communications Edited by Harri Holma and Antti Toskala Both of Nokia Networks, Finland JOHN WILEY & SONS, LTD Preface Acknowledgements Abbreviations

More information

Convergence of IP and Mobile Communications. Albert Coronel RedLink Communications Co., Ltd. MMNOG, November 21, 2015

Convergence of IP and Mobile Communications. Albert Coronel RedLink Communications Co., Ltd. MMNOG, November 21, 2015 Convergence of IP and Mobile Communications Albert Coronel RedLink Communications Co., Ltd. MMNOG, November 21, 2015 Mobile terminals Netgear Skype phone first released 2007 Makes and receives Skype calls

More information

Lecture 4: Wireless MAC Overview. Hung-Yu Wei National Taiwan University

Lecture 4: Wireless MAC Overview. Hung-Yu Wei National Taiwan University Lecture 4: Wireless MAC Overview Hung-Yu Wei National Taiwan University Medium Access Control Topology 3 Simplex and Duplex 4 FDMA TDMA CDMA DSSS FHSS Multiple Access Methods Notice: CDMA and spread spectrum

More information

What is wimax How is it different from GSM or others WiMAX setup Wimax Parameters-ranges BW etc Applns Where is it Deployed Who is the operator

What is wimax How is it different from GSM or others WiMAX setup Wimax Parameters-ranges BW etc Applns Where is it Deployed Who is the operator What is wimax How is it different from GSM or others WiMAX setup Wimax Parameters-ranges BW etc Applns Where is it Deployed Who is the operator Introduction- What is WiMAX WiMAX -Worldwide Interoperability

More information

McGill University - Faculty of Engineering Department of Electrical and Computer Engineering

McGill University - Faculty of Engineering Department of Electrical and Computer Engineering McGill University - Faculty of Engineering Department of Electrical and Computer Engineering ECSE 494 Telecommunication Networks Lab Prof. M. Coates Winter 2003 Experiment 5: LAN Operation, Multiple Access

More information

University of Würzburg Institute of Computer Science Research Report Series. Performance Comparison of Handover Mechanisms in Wireless LAN Networks

University of Würzburg Institute of Computer Science Research Report Series. Performance Comparison of Handover Mechanisms in Wireless LAN Networks University of Würzburg Institute of Computer Science Research Report Series Performance Comparison of Handover Mechanisms in Wireless LAN Networks Rastin Pries and Klaus Heck Report No. 339 September 2004

More information

CHAPTER 3 4G NETWORK ARCHITECTURE

CHAPTER 3 4G NETWORK ARCHITECTURE 62 CHAPTER 3 4G NETWORK ARCHITECTURE Wireless mobile communication system generations are all the time, a big topic for the research. Cellular service providers are already in the last phase of the deployment

More information

Mobile and Sensor Systems

Mobile and Sensor Systems Mobile and Sensor Systems Lecture 2: Mobile Medium Access Control Protocols and Wireless Systems Dr Cecilia Mascolo In this lecture We will describe medium access control protocols and wireless systems

More information

Throughput Considerations for Wireless Networks

Throughput Considerations for Wireless Networks Wi4Net White Paper: Throughput Considerations for Wireless Networks About us CelPlan Technologies has been a worldwide leading provider of wireless network design, optimization and performance evaluation

More information

DOCSIS FOR LTE SMALL CELL BACKHAUL ADDRESSING PERFORMANCE AND THROUGHPUT REQUIREMENTS FOR MOBILE BACKHAUL

DOCSIS FOR LTE SMALL CELL BACKHAUL ADDRESSING PERFORMANCE AND THROUGHPUT REQUIREMENTS FOR MOBILE BACKHAUL DOCSIS FOR LTE SMALL CELL BACKHAUL ADDRESSING PERFORMANCE AND THROUGHPUT REQUIREMENTS FOR MOBILE BACKHAUL WHITE PAPER Small cells can be used to increase wireless network capacity, provide coverage in

More information

CCNA Exploration1 Chapter 7: OSI Data Link Layer

CCNA Exploration1 Chapter 7: OSI Data Link Layer CCNA Exploration1 Chapter 7: OSI Data Link Layer LOCAL CISCO ACADEMY ELSYS TU INSTRUCTOR: STELA STEFANOVA 1 Explain the role of Data Link layer protocols in data transmission; Objectives Describe how the

More information

Infrastructure Test System

Infrastructure Test System Infrastructure Test System TM500 TD-LTE Single UE 3GPP TD-LTE Release 8 Test Data Sheet The most important thing we build is trust The industry standard test system for 3GPP LTE infrastructure development,

More information

4G LTE Technologies: System Concepts

4G LTE Technologies: System Concepts 4G LTE Technologies: System Concepts CK Toh, PhD, Chief Technology Advisor, ALICO Systems Inc., Torrance, CA, US ABSTRACT Recently, we have witnessed the roll out of LTE (Long Term Evolution, or so called

More information

Data Link Layer: Overview, operations

Data Link Layer: Overview, operations Data Link Layer: Overview, operations Chapter 3 1 Outlines 1. Data Link Layer Functions. Data Link Services 3. Framing 4. Error Detection/Correction. Flow Control 6. Medium Access 1 1. Data Link Layer

More information

Links Reading: Chapter 2. Goals of Todayʼs Lecture. Message, Segment, Packet, and Frame

Links Reading: Chapter 2. Goals of Todayʼs Lecture. Message, Segment, Packet, and Frame Links Reading: Chapter 2 CS 375: Computer Networks Thomas Bressoud 1 Goals of Todayʼs Lecture Link-layer services Encoding, framing, and error detection Error correction and flow control Sharing a shared

More information

ET4254 Communications and Networking 1

ET4254 Communications and Networking 1 Topic 10:- Local Area Network Overview Aims:- LAN topologies and media LAN protocol architecture bridges, hubs, layer 2 & 3 switches 1 LAN Applications (1) personal computer LANs low cost limited data

More information

Business Drivers for Selecting LTE Technology. HSPA+ & LTE Executive Briefing, Jan 27, 2009 Hank Kafka, Vice President, Network Architecture, AT&T

Business Drivers for Selecting LTE Technology. HSPA+ & LTE Executive Briefing, Jan 27, 2009 Hank Kafka, Vice President, Network Architecture, AT&T Business Drivers for Selecting LTE Technology HSPA+ & LTE Executive Briefing, Jan 27, 2009 Hank Kafka, Vice President, Network Architecture, AT&T Why LTE? HSPA, HSPA+ provides great data speeds with impressive

More information

Multiple Access Protocols

Multiple Access Protocols Multiple Access Protocols Computer Networks Lecture 2 http://goo.gl/pze5o8 Multiple Access to a Shared Channel The medium (or its sub-channel) may be shared by multiple stations (dynamic allocation) just

More information

4G Technology in contrast with other G Technologies Raja Solanki,Vineeet Godara, Prashant Solanki, Dhronacharya Engineering College,Gurgaon,India

4G Technology in contrast with other G Technologies Raja Solanki,Vineeet Godara, Prashant Solanki, Dhronacharya Engineering College,Gurgaon,India Technology in contrast with other G Technologies Raja Solanki,Vineeet Godara, Prashant Solanki, Dhronacharya Engineering College,Gurgaon,India Abstract-Wireless services have the highest demand in internet

More information

Wideband Cell Division Multiple Access Enhanced Uplink Principles and Basic Operation

Wideband Cell Division Multiple Access Enhanced Uplink Principles and Basic Operation International Journal of Information and Computation Technology. ISSN 0974-2239 Volume 3, Number 4 (2013), pp. 293-302 International Research Publications House http://www. irphouse.com /ijict.htm Wideband

More information

2.1 CHANNEL ALLOCATION 2.2 MULTIPLE ACCESS PROTOCOLS Collision Free Protocols 2.3 FDDI 2.4 DATA LINK LAYER DESIGN ISSUES 2.5 FRAMING & STUFFING

2.1 CHANNEL ALLOCATION 2.2 MULTIPLE ACCESS PROTOCOLS Collision Free Protocols 2.3 FDDI 2.4 DATA LINK LAYER DESIGN ISSUES 2.5 FRAMING & STUFFING UNIT-2 2.1 CHANNEL ALLOCATION 2.2 MULTIPLE ACCESS PROTOCOLS 2.2.1 Pure ALOHA 2.2.2 Slotted ALOHA 2.2.3 Carrier Sense Multiple Access 2.2.4 CSMA with Collision Detection 2.2.5 Collision Free Protocols 2.2.5.1

More information

Concepts of HSUPA. Agilent Technologies. Concepts of HSUPA

Concepts of HSUPA. Agilent Technologies. Concepts of HSUPA Agilent Technologies Agenda What is HSUPA? Layer 1 Overview UE and Network HSUPA Additions: Layer 2 and 3 Overview HSUPA Throughput Page 2 What is HSUPA? Why important? Three terms for the same thing:

More information

LTE : The Future of Mobile Broadband Technology

LTE : The Future of Mobile Broadband Technology LTE : The Future of Mobile Broadband Technology Erick Setiawan tukangbajaksawah@gmail.com 1 Become a necessity today, where the wireless broadband technology needed to meet increasing expectations in terms

More information

Enhancement of LTE Radio Access Protocols for Efficient Video Streaming

Enhancement of LTE Radio Access Protocols for Efficient Video Streaming Enhancement of LTE Radio Access Protocols for Efficient Video Streaming by Balaaji Tirouvengadam A thesis submitted to the Faculty of Graduate and Postdoctoral Studies in partial fulfillment of the requirements

More information

Data Link Control Protocols

Data Link Control Protocols Protocols : Introduction to Data Communications Sirindhorn International Institute of Technology Thammasat University Prepared by Steven Gordon on 23 May 2012 Y12S1L07, Steve/Courses/2012/s1/its323/lectures/datalink.tex,

More information

COPYRIGHTED MATERIAL. Introduction. Harri Holma and Antti Toskala. 1.1 WCDMA in Third-Generation Systems

COPYRIGHTED MATERIAL. Introduction. Harri Holma and Antti Toskala. 1.1 WCDMA in Third-Generation Systems 1 Introduction Harri Holma and Antti Toskala 1.1 WCDMA in Third-Generation Systems Analog cellular systems are commonly referred to as first-generation systems. The digital systems, such as Global System

More information

CHAPTER 5. QoS RPOVISIONING THROUGH EFFECTIVE RESOURCE ALLOCATION

CHAPTER 5. QoS RPOVISIONING THROUGH EFFECTIVE RESOURCE ALLOCATION CHAPTER 5 QoS RPOVISIONING THROUGH EFFECTIVE RESOURCE ALLOCATION 5.1 PRINCIPLE OF RRM The success of mobile communication systems and the need for better QoS, has led to the development of 3G mobile systems

More information

Enhanced MBMS. Introduction. January 13, Why do we need an efficient multicast solution?

Enhanced MBMS. Introduction. January 13, Why do we need an efficient multicast solution? Enhanced MBMS January 13, 2005 Introduction Why do we need an efficient multicast solution? Motivation Offer portable TV on demand type of devices UE effectively becomes the last caching node in the network

More information

Error resilient packet switched H.264 video telephony over third generation networks

Error resilient packet switched H.264 video telephony over third generation networks Error resilient packet switched H.264 video telephony over third generation networks Muneeb Dawood Faculty of Technology, De Montfort University A thesis submitted in partial fulfillment of the requirements

More information