Professional Documents
Culture Documents
Supervisor:
Persefoni Kyritsi - Haibo Wang
8th semester
May 2007
Contents
1 Introduction 4
1.1 Background . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4
1.2 Report Outline . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5
2 Theoretical Aspect 6
2.1 GPRS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6
2.1.1 GPRS Architecture . . . . . . . . . . . . . . . . . . . . . . 7
2.1.2 GPRS Layers . . . . . . . . . . . . . . . . . . . . . . . . . 8
2.1.3 GPRS Time slots . . . . . . . . . . . . . . . . . . . . . . . 9
2.1.4 GPRS Modulation . . . . . . . . . . . . . . . . . . . . . . 11
2.1.5 Mobile Station . . . . . . . . . . . . . . . . . . . . . . . . 12
2.2 EGPRS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13
2.2.1 EGPRS Modulation . . . . . . . . . . . . . . . . . . . . . 13
2.2.2 EGPRS Coding Schemes . . . . . . . . . . . . . . . . . . . 14
2.3 Interference . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16
3 Problem Analysis 19
3.1 Problem definition . . . . . . . . . . . . . . . . . . . . . . . . . . 19
3.2 Power control . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19
3.2.1 The Wireless Network . . . . . . . . . . . . . . . . . . . . 20
3.2.2 Distributed Power Control (DPC) . . . . . . . . . . . . . 22
3.2.3 Distributed Power Control with Active Link Protection
(DPC/ALP) . . . . . . . . . . . . . . . . . . . . . . . . . 23
3.3 Beamforming . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 26
3.3.1 MMSE . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 27
3.3.2 Interference-plus-noise rejecter . . . . . . . . . . . . . . . 27
3.3.3 LCMV . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 27
3.3.4 MCMV . . . . . . . . . . . . . . . . . . . . . . . . . . . . 28
3.4 Schedule . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 28
3.4.1 Scheduling in GPRS . . . . . . . . . . . . . . . . . . . . . 28
3.4.2 QoS in GPRS . . . . . . . . . . . . . . . . . . . . . . . . . 28
3.4.3 Explanation of scheduling techniques . . . . . . . . . . . . 30
4 Delimitation 31
4.1 Wireless channel . . . . . . . . . . . . . . . . . . . . . . . . . . . 31
4.1.1 General characteristics . . . . . . . . . . . . . . . . . . . . 31
4.1.2 Path Loss: Deterministic parameter . . . . . . . . . . . . 33
4.1.3 Shadowing: Log-normal distribution . . . . . . . . . . . . 35
1
4.1.4 Multipath: Rayleigh distribution . . . . . . . . . . . . . . 35
4.2 Throughput . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 38
5 Simulation Analysis 41
5.1 Description . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 41
5.2 Initialization . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 43
5.3 Environment . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 44
5.3.1 Creation of the cells and clusters . . . . . . . . . . . . . . 44
5.3.2 Wrap around . . . . . . . . . . . . . . . . . . . . . . . . . 45
5.4 Mobility model . . . . . . . . . . . . . . . . . . . . . . . . . . . . 46
5.5 Channel Model . . . . . . . . . . . . . . . . . . . . . . . . . . . . 49
5.5.1 Shadowing . . . . . . . . . . . . . . . . . . . . . . . . . . 49
5.5.2 Shadow fading correlation . . . . . . . . . . . . . . . . . . 50
5.5.3 Path loss . . . . . . . . . . . . . . . . . . . . . . . . . . . 50
5.5.4 Short Scale Fading . . . . . . . . . . . . . . . . . . . . . . 52
5.5.5 CIR . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 55
5.6 Traffic generator . . . . . . . . . . . . . . . . . . . . . . . . . . . 56
5.7 Scheduling . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 60
5.7.1 Intercell scheduling . . . . . . . . . . . . . . . . . . . . . . 60
5.7.2 Intracell Scheduling . . . . . . . . . . . . . . . . . . . . . 60
5.8 Power Control . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 63
5.8.1 Basic Algorithm . . . . . . . . . . . . . . . . . . . . . . . 63
5.8.2 DPC Algorithm . . . . . . . . . . . . . . . . . . . . . . . . 64
7 Conclusion 74
Bibliography 74
List of Figures 77
List of Tables 79
A Glossar 80
Ålborg university
E-Studyboard
Mobile Communications 8th semester
TITLE:
THEME:
PROJECT PERIOD:
PROJECT GROUP:
07-gr-895
GROUP MEMBERS:
Berder Quentin
De Carolis Emanuele
Hagenhuber Philipp
Tempesta Francesca
SUPERVISORS:
Kyristi Persefoni
Wang Haibo
ABSTRACT:
With the development of multimedia application over Internet, the demand for
high data rate connection is increasing. Obviously this happen also for mobile
phones connected through GPRS/EDGE connections. Nevertheless interference
is an important limitation to reach higher data rates. In this way, the aim of
this project is to study and investigate several possibilities to reduce the effects
of those interference on GPRS/EGPRS services in a multi-cell scenario.
3
Chapter 1
Introduction
1.1 Background
The fast development of wireless technology and the increase of demand
for private usage and in business for a high data rate make of this technology
one of the most important fields of research in this decade. Furthermore the
emergence of multimedia applications such as television or internet on mobile
stations requires a high data rate.
Since circuit and packet switched services share the same physical resources,
a notably increase in the interference level is appreciated in the whole system.
On the other hand, in order to lessen this negative effect, they have more flexi-
bility to make the system complex, improving the system capacity. The power
can be varied to improve the data rate. Different scheduling techniques can be
used to have different user data rates; moreover, beam-forming can also be used
to achieve the best system performance.
This project analyzes a multi-cell scenario i.e. a certain amount of cells will
be considered in which a number of users will be modelized. All the effects
inherit in this the type of environment, such as buildings or trees and of the
position of the users in the cells, will be simulated in order to obtain a simulation
as close as possible to the reality.
4
1.2 Report Outline
This report is based on the traffic analysis in GPRS connections. The aim of
this project is to analyze the impact of various technique such as scheduling and
power control in a multi-cell scenario during a download session. This report is
divided in five parts:
5
Chapter 2
Theoretical Aspect
2.1 GPRS
GSM has been under very stable usage for mobile communication. GSM, in
addition to voice communication, provides mobile phone communication based
on digital data interchange. GSM is the core on which the second generation
mobile phones are based. Actually, there are some limitations of GSM - namely,
that is only provides voice services - that inhibit the widespread use of this
technology GSM is a circuit switched connection. This means that the commu-
nication between nodes and terminal is dedicated for each call session. Each
circuit that is dedicated cannot be used by other callers until the circuit is re-
leased and a new connection is set up. There is no incompatibility with the
TCP/IP protocol and the mobile devices support just simply functions because
of their easy hardware.
6
2.1.1 GPRS Architecture
The architecture of the GPRS network is shown in the following figure.
• BSS The Base Station Subsystem consists of the BTS and BSC. It has
been adapted to support the GPRS packets operations.
• BTS The Base Transceiver System handles all the radio transmission de-
vices.
• BSC The Base Station Controller manages the resources in the communi-
cation. Several BSCs can manage more than one BTS. It contains also the
Packet Control Unit (PCU) which controls the data traffic in the GPRS
network.
The BSS consists of BTS and BSC. When voice or data needs to flow through
the network, in the down link channel, it is transported over the air interface to
BSC, and from the BSC to the BTS. The voice has is own path in the network,
and the data passes through a new device called SGSN, via the PCU.
7
• SGSN: The Serving GPRS Support Node maintains the logical connection
with the Mobile Station (MS), forwarding incoming packets from the MS
to the appropriate network node and vice-versa. Only one SGSN serves
the MS in its own service area.
• GGSN: Gateway GPRS Support Node provides the interface to external
packet data network (PDN) and forwards packets destined for the MS to
the SGSN that is serving it.
The SGSN can be compared to a packet sorting center that delivers packet
data within its service area. SGSNs take care about the detection and the man-
aging of new GPRS mobile station within their control area.
The following up layers are the radio link control (RLC) and the medium
access control (MAC) which controls the logical connection between mobile sta-
tion and base station. They are also the layer which will format the data to
pass to the upper layers, the logical link layer (LLC). The LLC is the layer who
handles the connection between SGSN, BSS, and mobile station. In this layer
the packets contain the user data. The LLC layer is important because in it
the authentication takes place, the mobile is attached to the SGSN through the
LLC layer. The following figure 2.2 shows the position of the different layers
within the GPRS communication.
8
Figure 2.2: GPRS Layers organization
9
Different classes of GPRS are made based on the number of up-link and
down-link available time slots. The table 2.1 is showing the different classes of
GPRS with the relative number of time slots.
Within the same cell, different rates can be achieved by a single mobile
device. The speed depends on the coding scheme used for the communication.
It must be added that the maximum rate the is only available under the most
favorable conditions. On the other hand, with the slowest transmission the
maximum area of the cell (98% of the entire cell) is covered. The value, in the
figure 2.2, are shown in kilobits per second (Kbps).
CS-1 provides for the most correction and detection capabilities for situa-
tions in which the carrier-to-interference level are very low. The CS-2 and CS-3
are something more balanced and, at last, CS-4 is used in the ideal situation
where carrier-to-interference level are optimum. Here, no correction encoding is
used at all. In the ideal conditions the maximum data rate for a GPRS frame,
assuming that all slots are used for data, is 8 × 21.4K = 171,2Kbps. This rep-
resents the most ideal location and situation, where there is no error correction
at all.
10
2.1.4 GPRS Modulation
The modulation used for a GSM/GPRS connection is the Gaussian Minimum
Shift Keying (GMSK) [2]. This modulation comes directly from the Frequency
Shift Keying (FSK) modulation in which the information is associated by par-
ticular variation of the carrier signal frequency between two values f1 and f2 .
where N0 is the spectral noise density and E is the energy of the received signal
and it’s in relation with the received power PR and with the bit rate B by the
follow expression:
2PR
E= (2.2)
B
PR = AyGc (2.3)
where A is the path loss coefficient (A < 1) and Gc the coding gain.
11
From the probability of error given by the equation 2.1 it is possible to have
a probability of error per bit equal to:
PE
Pb ≈ (2.5)
2
Finally:
r !
1 AyGc
Pb = erf c (2.6)
2 N0 B
12
2.2 EGPRS
A different modulation technique and error-tolerant transmission methods
make, starting from the GPRS’ bases, another type of connection named EG-
PRS. The objective of this technology is to increase data transmission rates and
spectrum efficiency using a new modulation technique and a new channel cod-
ing and, due to this, to facilitate the use of new application on mobile devices.
EDGE is used for the transmission of data on the same network as the GPRS’
data, therefore it is an add-on to GPRS and cannot work alone. [3]
The symbol rate remains the same as the GMSK, but each symbol represents
three bits instead of only one. The increased number of possible symbols means
a shorter distance between each of them. Because of this, under poor radio
condition, the risk of misinterpretation is higher because for the radio receiver
it is more difficult to detect which symbol has been received. Anyway, the extra
bits are added to improve the error control coding, and the correct information
can be recovered. Only under very poor radio environments the GMSK method
is more efficient.
13
As said for the GMSK modulation, the energy of the received signal E is
in relation with the received power PR and with the bit rate B by the follow
general expression:
PR
E= log2 (M ) (2.8)
B
where
PR = AyGc (2.9)
Substituting these results in the expression 2.7, it results that the probabil-
ity of error for a M-PSK modulation is:
r !
AyGc π
PE = erf c log2 (M )sin (2.10)
N0 B M
14
Figure 2.6: Modulation Coding scheme in EGPRS
The GPRS saturation limit is at 20 Kbps with the best coding scheme. In
the best possible condition of EGPRS, it is possible to reach up to 59.2 Kbps.
The two different technologies are based on the same GMSK modulation, but
the last five MCS of EGPRS are based on 8PSK modulation, which increase the
throughput. The difference in performance is partly due to the different header
size of the EGPRS packets. A packet sent with a fast MSC that is received with
some error, can be retransmitted again by using a more-secure MSC (more error
correction) if the radio environment requires it. This possibility of retransmit-
ting by using different coding schemes is the reason why EGPRS and GPRS do
not have the same performances: GPRS cannot support the re-segmentation.
15
2.3 Interference
It is known that the capacity of a cellular system is determined by the in-
terference associated with it. In a multi-cell scenario the interference consists of
inter-cell interference arriving from neighbour cells. The intra-cell interference
is avoided in GSM technology. The interference power received at a base station
of a given cell can be estimated by knowing the number of users within a cell
(intra-cell interference), and the number of users and their locations in the adja-
cents cells (inter-cell interference). In this report only the inter-cell interference
will be treated. The possible sources of interference are shown in figure 2.7
According to [4] it is possible to consider two cells i and j. The users power
is controlled by the base station of cell j at the distance rj (x, y). The distance
of the same user from the base station in cell i is ri (x, y). Assuming that in cell
j there are nj users denoted by region Cj and area Aj = Area(Cj ).
Figure 2.8: Multi-cell scenario & division of a cell for the integer
16
According to [4], the relative average interference at cell i caused by nj users
in cell j can be written as
ξj
rjm (x, y)10 10 nj
Z Z
Iji = E m 2 dA(x, y) (2.12)
Cj ri (x, y)/χi Aj
where σ = ln(10)
10 . In equations 2.12 and 2.13 the denominator represents the
propagation loss to the given base station and the numerator is the gain adjust-
ment through power control by the nearest base station.
According to [4], to obtain the per-user inter-cell interference fji , Iji is di-
vided by the total number of users in cell j. In this model, fii equals zero and fji
can be viewed as elements in a two dimensionnal matrix F with i, j = 1, ..., M ,
where M is the total number of cells in the network. Each column i of F con-
tains the per-user inter-cell interference radiated by cell j on every other cell
i. The relative average inter-cell interference in cell i is the summation of the
product of number of users nj in cell j. The per-user interference factor fji
is the column vector i in F . It is possible to write the total relative average
inter-cell interference as
XM
Ii = nj F [j, i] (2.14)
j=1
where w(x, y) is the user density at (x, y). We can define kji as the per-user
relative inter-cell interference factor from cell j to base station i and write it as
2 Z Z
e(γσs ) rjm (x, y)
Iji = m w(x, y)dA(x, y) (2.16)
Aj Cj ri (x, y)
If the mobile station exact location is taken into account for the determina-
tion of interference, the matrix F cannot be calculated in advance. For a user
k in cell j, the relative interference offered by the mobile station to cell i is
m
(λσs )2 rj
(Uji )k = e (2.17)
ri
17
Finally, the total inter-cell interference at cell i due to the nj mobile stations
in cell j can be written as
M Xnj
X
Ii = (Uji )k (2.18)
j=1 k=1
This vector represents the actual interference caused by each mobile station
on every cell.
18
Chapter 3
Problem Analysis
Power control permits to change the MS’s and BTS’s transmission power,
so that it is able to use the minimum required power to obtain a good quality
of transmission; in this way, if the MS is close to the BTS, it has to transmit
with a lower power, as shown in fig. 3.1
19
Figure 3.1: Ideal Power Control: (a) constant transmission power; in that case the received
power increases when MS approaches the BTS; (b) the transmission power is reduced when
the MT approaches the BTS; in this way the received power is constant an equal to PRIF ,
minimizing the interference [5].
where Gij > o is the power gain (loss) from the BSj to the i-th receiver and it
includes the free space loss, the multi path fading and the shadowing; Pi and
ηi > 0 are the transmitted power on the i-th link and the thermal noise power
at its receiver node.
To guarantee the minimum QoS, every i-th link has to have a SIR more than
a threshold value γi ≥ 0, so it’s required that
20
where P = (P1 , P2 , ..., Pi , ...PN ) is the column vector of transmitted powers
and
γ1 η1 γ2 η2 γ3 η3 γi ηi γN ηN
u= , , , ..., , ..., (3.4)
G11 G22 G33 Gii GN N
is the column vectors of normalized noise powers, and F is the matrix with
elements
(
0 if i=j
Fij = γi Gij (3.5)
Gij if i 6= j
lim Fk = 0 (3.6)
k→+∞
P0 = (I − F)−1 u (3.7)
This is a Pareto-optimal solution, that means that any other vector that
satisfies the equation 3.3 is so that
P ≥ P0 (3.8)
If it is possible to satisfy the equation 3.2 for all links at the same time, it
is a good strategy to set the power of transmitters to P0 in order to minimize
the power consumption [6].
21
3.2.2 Distributed Power Control (DPC)
To describe in detail the DCP algorithm the word distributed must be de-
fined in the specific context of this analyzes.
In the DCP algorithm every link increases autonomously its power when the
SIR is under its threshold γi and decreases it otherwise.
DPC Algorithm
The following algorithm was proposed by Foschini and Miljanic in [7]. In
this algorithm it is possible to observe that the iterative formula
"k−1 #
X
k i
lim P(k) = lim F P(0) + lim F u (3.11)
k→+∞ k→+∞ k→+∞
i=0
"k−1 #
X
i
= 0+ F u (3.12)
i=0
−1
= (I − F) u = P0 (3.13)
22
Considering the equation 3.9, the i-th link’s variation of the power is given by
γi X
Pi (k + 1) = Gij Pj (k) + ηi (3.14)
Gii
j6=i
where Ri (k) stands for the i-th link’s SIR at time k. Therefore every link
increases its power independently from any other when the SIR is under its
threshold value γi and decreases it in the opposite case. To do that, the receiver
take a measure of interference and transmit this value to the transmitter, which
decide how to modify the transmission power.
Ri (k) ≥ γi (3.17)
23
Let Bk be the set of non-active links during the k-th step. Finally, let δ be
a control parameter bigger that 1, so that
The previous equation shows that established links update their power fol-
lowing the DPC Algorithm, while new ones increase gradually their power. The
SIR threshold is δγ and give a margin for the protection of the active link equal
to = δ − 1 > 0; this means that latter ones can maintain the SIR over the
threshold γ also when other links try to access the channel.
Ri (k) ≥ γi ⇒ Ri (k + 1) ≥ γi (3.21)
hence
i ∈ Ak ⇒ i ∈ Ak + 1 (3.22)
or, equivalently
Ak ⊆ Ak + 1 (3.23)
and
Bk ⊆ Bk + 1 (3.24)
This proposition says that active links at the beginning remain active during
the whole evolution of DPC/ALP algorithm.
24
Proposition 1. Given δ ∈ (1, +∞), it results that
Ri (k + 1) ≤ Ri (k + 1) (3.26)
25
3.3 Beamforming
Due to the limitations of the channel bandwidth, the increase of data rate
increases interference. A way to reduce the interference is to use beamform-
ing by the use of adaptive/smart antennas. Adaptive antennas are composed
of a system of antenna arrays usually controlled by a signal processing algorithm.
Beamforming is divided into three parts. Firstly, the system estimates the
directions-of-arrival (DOAs) of the sources. This permits a signal-blocking (SB)
transformation which removes from the coherent signal the interference and the
noise. The SB signal is then used to determine the Inteference blocking (IB)
which permits determination the optimum beamforming. Optimum beamform-
ing then maximizes the output SINR.
where sd (t) represents the desired signal, αi represents the complex amplitude
of the coherent signal and a(θ) is the steering vector of the array. si (t) repre-
sents the i th interference with power σi2 = E|si (t)|2 . n(t) is a spatially white
noise vector power σn2 . Assume that sd (t), si (t) and n(t) are not correlated with
each other.
where A = [a(θd1 ), ..., a(θdP )] and α = [α1 , ..., αJ ]T . ã is called the generalized
array manifold (GAM).
26
Various beamformers are now possible: the minimum mean square error
(MMSE), the interference-plus-noise rejecter, the linearly constrained minimum
variance (LCMV) or the multiple constrained minimum variance (MCMV). The
first two beamformers need a training signal which leads to a waste of bandwith
and this training signal can be not available in pratical situation. The LCMV
and the MCMV approaches require no training signal and can be called a blind
beamforming approach.
3.3.1 MMSE
To use the MMSE combiner, the desired signal has to be known. The mean
square error function is
E|sd (t) − wH .x(t)|2 (3.31)
The optimum weight vector is
The solution is
wMMSE = Rxx −1 rxs (3.33)
with
rxs = E|x(t).s∗d (t)| (3.34)
Rin −1 .ã
win = (3.37)
ãH .Rin −1 .ã
3.3.3 LCMV
If we know the GAM, so the complex amplitudes and the DOAs of the
coherent signal, it is possible to use the LCMV. The optimum weight is
27
3.3.4 MCMV
This beamformer use the DOA to construct multiple constraints for the
minimum variance beamformer. The optimum weight is
3.4 Schedule
Scheduling is a basic principle used in systems with different tasks/processes
at the same time, independent of their purpose. With different kinds of schedul-
ing it is possible to change the behavior of the system regarding the tasks/processes
(see [12]).
Scheduling is only for data information. The voice information can not be
scheduled, because voice needs a dedicated bandwidth.
Due to the fact that the channel has a different behavior in up- and downlink,
different techniques are used (see [13]):
Downlink
“First-come first-serve” scheduling (see chapter 3.4.3) is used in the downlink.
Uplink
With slotted ALOHA (see chapter 3.4.3) the reservation of the timeslot in
the channel happens. Afterward the actual data is transmitted via “first-come
first-serve” again.
28
Important for the QoS in GPRS are following properties:
• priority
• reliability
• mean throughput
• peak throughput
Table 3.1: delay classes and requirements for different packet sizes (see [14])
For a useful performance measure with respect to the different delay classes
and packet sizes the delays should be normalized.
29
3.4.3 Explanation of scheduling techniques
“First-come first-serve” scheduling
The tasks/processes are handled in order of their chronological appearance.
If not enough capacity is available, the appearing task/process at this point of
time is shifted to the end of a waiting queue.
A downlink buffer timeslot will only be serviced if all higher prior buffers
are empty.
Slotted ALOHA
The slotted ALOHA technique is based on the ALOHA technique:
The main problem with this algorithm is, that the time which a task/process
has to wait is not defined. That can lead to unequal conditions, if one task/process
uses a shorter delay than the others.
But in the case of GPRS this Problem disappear because of the timeslots
of the system –> slotted ALOHA. A transmission can only be started at the
beginning of a timeslot, and the delay time is given.
This adaption also increases the maximum throughput because of the specified
delay time.
30
Chapter 4
Delimitation
Let us consider a link between BTS and MS. The transmission channel for
that link has characteristics that can be modeled with just a statistic approach.
MS’s antenna is usually close to the ground and often not visible from the
BTS because of many obstacles (shadowing). Furthermore it is possible to no-
tice the presence of propagative phenomena diffraction, absorption (path loss)
and diffusion as well as multiple ways to arrive at the receiver antenna (multi-
path).
31
In this case the i-th path suffer for:
– reduction;
– time delay;
– shift of carrier frequency (Doppler effect) fdi
The difference between the minimum delay and the maximum is Delay
Spread, which is a measure for channel time dispersion. Its mutual value
is defined as Coherence Bandwidth that is the limit for the bandwidth
beyond which the channel becomes frequency selective [2].
32
4.1.2 Path Loss: Deterministic parameter
The pathloss is the amount of energy that gets lost from the signal during
transmission through a channel. It depends on the environment how much the
influence of the pathloss is.
An easier description of a channel model is used to explain the behavior
of the channel. Regarding to the environment, i.e. rural, suburban, urban or
heavy urban, the channel model uses different parameters (see [15]).
Okumura-Hata model
This model derives its name from its creators, Yoshihisa Okumura and Masa-
haru Hata. It is quite easy to handle, built for frequencies up to 1000 MHZ and
distances between 1 and 20 km with higher locations for the transmit antennas
(above 30m).
A(dB) = 69.55 + 26.16 log(F ) − 13.82 log(H) + (44.9 − 6.55 log(H)) log(D) + C
(4.1)
The constants have the following meaning:
• F for frequency in MHz
• H for the efficient height of the BS-Antenna in m
• D for the distance between BS and MS in km
• C for the kind of environment:
– 0 for heavy urban
– -5 for urban
– -10 for suburban
– -17 for rural
33
– -2 for heavy urban
– -5 for urban
– -10 for suburban
– -20 for rural
If the frequency is above 450MHz and the efficient MS’s height is below
3m, the pathloss for a distance between 1km to 10km can be calculated in a
logarithmic format as followed:
f
P( E) = P0 − y log(d) − 3 log( ) + K0 (4.3)
900
With d as the distance between BS and MS in km and f for the frequency
in MHz. P0 (reference input power) and y (base attenuation) are depending on
the kind of environment and can be assumed as listed below:
Table 4.1: assumed values for P0 and y for Lee’s propagation model (see [15])
34
4.1.3 Shadowing: Log-normal distribution
Shadow fading, also called shadowing or slow fading, is defined as the fluc-
tuation in the received power averaged over a small area, typically a diameter
of 10 to 50 wavelengths in an outdoor environment.
Environment σX (dB)
Urban micro cell 2.3
Urban micro cell - Manhattan layout 3.1
LOS fixed station (rooftop to rooftop) 3.4
Urban macro cell 8
Sub-urban macro cell 8.2-10.6
Indoor small office 12
where the real component cR (t) and the imaginary one cI (t) are independent
random variables with Gaussian statistic.
35
Expressing the same signal in a complex formula it is possible to write:
with
q
α(t) = c2R (t) + c2I (t) (4.13)
cI (t)
ϕ(t) = arctan (4.14)
cR (t)
α2
F (α) ∼
= (4.17)
2σ 2
Probability of error
A non-selective channel is represented by an impulse response like:
36
Assuming that the variations of α(t) and τ0 (t) are unimportant in the sym-
bol range T , the impulse response in 0 ≤ t ≤ T has the expression:
A general expression for the probability of error, for every possible value of
α is:
Z ∞
Pb = Pb (α)f (α)dα (4.20)
0
while E(α2 ) is the average value of the random Rayleigh variable α, so that:
E(α2 ) = 2σ 2 (4.23)
Starting from the general expression is easy to find the expression for the
probability of error for modulations GMSK and MPSK [18].
we have that the probability of error per bit in a Rayleigh fading channel is:
v
u AyGc 2
1 B 2σ
u
Pb = 1 − t N0AyG (4.25)
2 1 + N0 Bc 2σ 2
For the general M-PSK modulation, the probability of error per bit is given
by:
r
1 ρb
Pb = 1− (4.26)
log2 (M ) 1 + ρb
37
where
AyGc π
ρb = log2 (M )sin2 2σ 2 (4.27)
N0 B M
In our case M = 8, so the final probability of error per bit for a 8-PSK
modulation is:
v
u 3AyGc
u N B sin2 π8 2σ 2
1
Pb = 1−t 0 (4.28)
1 + 3AyG 2 π 2σ 2
3 N B sin
c
8 0
4.2 Throughput
The definition of the Steady-state Long Term Throughput f is:
Nt
f = lim (4.29)
t→∞ t
where Nt is the number of transmitted segments in the range [0, t]. To analyze
the throughput expression as function of the channel quality it is necessary to
define the probability to lose a segment, composed by J blocks, as follow:
PS = 1 − (1 − Pblock )J (4.30)
where Pblock is the probability to lose a block that can be approximated by:
In this case Pb is the probability of error per bit and it depends on the mod-
ulation while δ is the maximum number of retransmissions that is possible, and
it is given directly by the Link-Layer Protocol used.
After these conditions it is possible to write the final expression for the
throughput [19]:
Wmax 1
f (PS ) ≈ min
RT T , q q
2PS 3PS 2
RT T 3 + T0 min 1, 3 8 PS (1 + 32PS )
(4.32)
38
J
X
RT T = T + 2D + TS + (2D + Tb ) δi (4.33)
i=0
in which T is the RTT of the wired part of the link, D is the propagation time
one-way, TS is the time for the transmission of one segment, Tb is the time
for the transmission of a block and δi is a random variable that stands for the
number of retransmissions.
J
X
E(RT T ) = T + 2D + TS + (2D + Tb ) E(δi ) (4.34)
i=0
= T + 2D + TS + (2D + Tb )JE(δi ) (4.35)
39
In order to simulate this function it is possible to make a linear interpolation
as shown as in figure 4.4.
40
Chapter 5
Simulation Analysis
5.1 Description
The main objective of this project is to simulate users moving within a cell
representative of an urban area. The environment has been set to nine base
stations. The number of users is changing, and each user is moving within its
own cell. Path-loss, shadowing and small scale fading will be evaluated based on
statistical distributions. Hence, this channel model will modify the value of gain
for all the users and for all the positions they pass trough. Spatial correlation
will also be taken in account.
41
The following diagram shows the different parts of the simulation.
42
5.2 Initialization
The different number of simulations will be based on different environmental
conditions. As was stated in the previous sub-chapter, the channel model will
define the behavior of the gain and, based on this, different Coding Schemes will
be assigned to different users during their transmissions.All the parameters that
can determine the network characteristics are determined by the environment.
43
5.3 Environment
RUNE (Rudimentary Network Emulator) is a collection of MATLAB func-
tions designed to simulate a cellular network and many of its features. It was
originally developed at Ericsson and later enhanced for the book "Radio Re-
sources Management for Wireless Networks" [21] by the authors Magnus Alm-
gren and Olav Queseth. RUNE functions permit the manipulation of various
aspects of a hypothetical cellular system environment such as the creation of
cells, base stations, propagation losses, interference, channel assignment or mo-
bility of the MSs.
44
5.3.2 Wrap around
The main objective of cellular network simulations is to replicate reality as
closely as possible. These simulations require a lot of computer memory. If the
size of the cellular network increases, the computer memory needed increases as
well, as does the computing time. The best way to deal with this problem is to
create and repeat a small amount of cells. A method to do this is to put the
cells in a rhombus and then wrap the edges. That means that the top meets the
bottom and the right meets the left. Illustration of a wrap around technique is
shown in figure 5.3. It is also possible to refer to [22] to have more information
about the wrap-around optimization in network simulation.
45
5.4 Mobility model
The mobility model is used to simulate a random walk of a pedestrian inside
a cell. This permits a more dynamic and realistic simulation.
During the initiation the number and size of the cells, the size of the cluster
and the number of mobiles are given by the author of the source code as a test
phase. In the further implementation the variables will be given by preceding
routines of the simulation itself.
The first part of the source code "Mobilitymobile.m" is to initialise the po-
sition and velocity of the various MSs, respectively noted xym and xyv. It is
performed by the following code lines:
xym=nans(nmob,1);
xyv=nans(nmob,1);
The velocity given to the users is in m.s−1 . The coordinates are represented
by a real component which represents East-West direction and an imaginary
component which represents the North-South direction.
The code line used to perform the movement of the MSs is:
[xym,xyv] = mobmove(xym,xyv,par.vmean,par.amean,par.dt,rombvec);
As INPUT parameters, we have:
• xym: last postion of the MSs;
• xyv: last velocity of the MSs;
• par.vmean: mean velocity of the MSs in m.s−1 ;
• par.amean: mean acceleration of the MSs in m.s−2 ;
• par.dt: time step in seconds;
• rombvec: two complex vectors determining the area within the mobile
users are folded;
As OUTPUT parameters, we have:
• xym: new position of the MSs;
• xyv: new velocity of the MSs;
The function mobmove found in RUNE permits, from a given position and
velocity, the calculation of a new position and velocity according to the follow-
ing equations
dt.amean
ρ = exp(− ) (5.1)
vmean
p
vn = vn−1 .ρ + 1 − ρ2 .vmean .X (5.2)
46
where ρ is the correlation of the velocity between the times steps with dt the
time step, amean the mean acceleration in m.s−2 , vmean the mean velocity. X
is the complex random number whose magnitude is Rayleigh distributed.
To avoid the handover between the BSs i.e. the movement of a MS from a
cell to another one, it is possible to constraint the MS to stay in its cell. The
bounce function is used in this way. If a MS is too far from its linked BS and
cross the borders of its cell, it is automatically replaced near its linked BS.
Results
As a result of the simulation the figure 5.4 shows 100 MSs, uniformly dis-
tributed, in a cluster containing 36 cells.
Figure 5.4: Mobility model for 100 MSs in a cluster containing 36 cells
47
Figure 5.5: Zoom in a cell to show the mobility model
It is also possible, as shown on the figure 5.6 to see the wrap effect -i.e.- if a
MS go out from the cluster it will reappear in the other side of the cluster like
a 3D-torus.
48
5.5 Channel Model
To model the channel, taking into account just path-loss and Large Scale
Fading (or Shadowing) we use for our simulations the tool RUNE that gives us
some important functions useful for a cellular network.
5.5.1 Shadowing
To generate a shadowing map that follows the log-normal distribution, is
still possible to use one of the RUNE’s functions:crelognmap.
• mapvec: two complex vector elements that are used to calculate the dis-
tance at which the map will be repeated.
In the next figures the shadowing map is shown, and it is also applied to the
cell map. It is possible to see how the shadowing map has to be calculated in
terms of cell’s border. The figure shows how the shadowing map covers the cell
map.
49
Figure 5.7: Shadowing map
50
Figure 5.8: Modelling correlated shadow fading using a Gaussian white process
and a first order low filter
base stations.
51
• lognmap: given by the function crelognmap;
• mapvec: given by the function crelognmap.
The OUTPUT parameter is the matrix g with the total gain for each link.
The figure 5.9 shows the total pathgain between 3 different MSs and all the
BSs. In this example the MS1 will be linked to the BS 3 which is the BS with
the highest total path-gain.
Figure 5.9: Total path-gain between 3 MSs and all the BSs
As shown in figure 5.10 the MS has a fixed path-loss and shadowing depend-
ing on its position far R from the BS, but a different path-gain in respect to
time given by localized movements of the user within a small space dR.
To take into account the small variation in positions of Short Scale Fading
(SSF) that adds the third dimension to our path-gain matrix with respect to
the time must be considered.
52
Figure 5.10: Variation of the position of the MS responsible for the Rayleigh
fading
where
and
1
xQ,i , xI,i ∼ N (0, ) (5.7)
2
Moreover the number of samples is given by the time that we observe the
channel divided by the time between each sample that can guarantee the corre-
lation between two measurements:
Ttot
N= (5.8)
Tcorr
To have a vector of complex random variables normally distributed with a
certain correlation normalized to the power of one, the vector of uncorrelated
samples X must be multiplied by the square root of a correlation matrix R:
Y = R1/2 ∗ X (5.9)
53
In our case, the correlation matrix is given by a symmetric matrix given by
Bessel function as follows:
J0 2π v∗T J0 2π v∗2T ... J0 2π v∗(Nλ−1)T
1 λ λ
v∗(N −2)T
J0 2π v∗T v∗T
1 J 2π ... J 2π
λ 0 λ 0 λ
J=
...
J0 2π v∗(Nλ−1)T J0 2π v∗(Nλ−2)T J0 2π v∗(Nλ−3)T ... 1
(5.10)
From that multiplication in 5.11, we have the desired randomly correlated
variables and their envelope is Rayleigh distributed normalized to 1.
To obtain the correct samples of the path-gain for the context, this vector is
multiplied by the square-root of the power G, transformed in linear scale, given
by the matrix of path-gain obtained, considering only shadowing and path-loss.
√
Z= GY (5.11)
Repeating this process for every mobile station and base station, we have
the desired 3-dimensional matrix that contain the values of the path-gain for
each user, for each base station and for each time sample.
Figure 5.11 shows the total path gain, given by path-loss, shadowing and
SSF, depending on the time for a MS linked to its BS. Figure 5.12 shows the
distance between the MS and its BS within the cell.
54
Figure 5.12: Distance between the MS and its BS
5.5.5 CIR
Based on the values of path-gain, it is easy to calculate the link between each
mobile and the base station to connect. This link is created with the base station
that has the higher value of path-gain. This is possible to be implemented in
RUNE using assign
55
After this assignment it becomes easy to calculate the CIR ratio for each
mobile, if it is supposed that every base station use the same channel (so that
we will always have interference between two base stations), using the following
equation:
PBSj ∗ gBSj →M Si
CIRM Si = Pn (5.12)
k=1 PBSk ∗ gBSk →M Si − PBSj ∗ gBSj →M Si
in which we suppose that the i-th mobile is linked to the j-th base station and
capture the interference from the other base stations.
With this formula we can calculate this CIR for each mobile and for each
time sample so that, at the end of our simulation, we will have another matrix
that contains the CIR referred to every mobile in every possiple time.
56
Figure 5.13: Number of pages per single user
Moreover, the waiting time between one page and another has been
considered in the simulation. When the user is connected to the Inter-
net, the request for downloading a page comes with some delay from the
previous one. This is due to the time required to read the page, check
information, or find the correct link to click. This waiting time, in statis-
tical terms, follows a negative exponential distribution. The result of this
complete analysis of the traffic is the following plot 5.16. It is possible to
observe that the user 3, which is the user with largest number of pages, is
the last one to finish his WWW session.
57
Figure 5.15: Size of the object included in the pages
• E-mail model is simulating the download of the e-mail data from a cer-
tain server in the web. This traffic is applicable to a continuous amount of
data downloadable from the network. The only parameter is the amount
of data per e-mail. A mean value for the e-mail size is chosen with the
presupposition that no large attachments will be downloaded on the mo-
bile devices. The distribution for the e-mail size is log2 -normal and it has
different mean values because of two different type of e-mail analyzed. A
mean value of 1.7 kByte is chosen for a large number of e-mails. A small
number of e-mail are simulated using mean value of 16 kByte. This is due
to the simulation of larger attachments in the e-mail traffic.
58
The figure 5.17 shows the behavior of the channel during a session of 1000
e-mails.
The last table 5.2 is a resume of all the different distribution used for each
one of the relevant parameters into the traffic generator model [24].
59
5.7 Scheduling
Scheduling is necessary if there is not enough capacity for all requests. It is
useful in guaranteeing that no request is lost.
During the initiation the occurring traffic and amount of users are given by
the author of the source code as a test phase. In the further implementation
the variables will be given by preceding subprograms of the simulation itself.
An easy technique is to form two groups of BSs: one with the odd BSs and
the other with the even BSs. Then the times slots are divided in two parts, each
dedicated to a group of BSs. The figure 5.18 represents the cells used during
the simulations and the two groups of BSs. More advanced techniques can be
found in [25].
60
All the other requests are stored and handled as resources become available
again. This means that the second highest rate is served immediately after the
highest rated buffer is empty, within the same channel.
“find2max.m”
This is a subprogram which searches for the actual highest and second
highest active rating in the buffer and returns the indexes of the corresponding
users.
Result
As result of the C/I scheduling the figure 5.19 shows the state of the dif-
ferent buffer of each user. It is also pictured that only the highest rate (coding
scheme) is served and the other requests are delayed in the meanwhile.
The rising edge marks the appearing traffic (here as amount of needed times-
lots). The falling edge shows the current status of the buffer and therefore the
time needed to transfer all remaining packets.
FIFO scheduling
During this scheduling technique no user has priority. The only important
variable is the point in time in which the traffic occurs. The first user is served
and all other user have to wait until the buffer of the first served user is empty.
All the other requests are stored and handled as resources become available
again. This means that the next occurred traffic is served immediately after the
previous buffer is empty, within the same channel.
61
“findFIFOorder.m”
This subprogram searches for the chronological occurrence of the different
user, remembers the ranking and returns the first two users with active buffer.
Result
The figure 5.20 shows the current progress of the FIFO scheduling. As can
be seen the priority is given by the point in time the traffic occurs; the condition
of the users does not matter.
The rising edge marks the appearing traffic (here as amount of needed times-
lots). The falling edge shows the current status of the buffer and therefore the
time needed to transfer all remaining packets.
All the other requests are stored and handled as resources become available
again. This means that the second highest rate is served immediately after the
highest rated buffer is empty, within the same channel.
“findFAIRmax.m”
This is a subprogram that searches for the actual highest and second highest
active rating in the buffer and returns the indexes of the corresponding users.
62
Result
As a result of the “proportional fair” scheduling, the figure 5.21 shows the
state of the different buffer of each user. It is also pictured that only the highest
rate is served and the other requests are meanwhile delayed.
The rising edge marks the appearing traffic (here as amount of needed times-
lots). The falling edge shows the current status of the buffer and therefore the
time needed to transfer all remaining packets.
63
In particular, this power is decreased by a fixed amount δ if the measured
CIR is over a certain threshold γ and is increased by the same amount otherwise.
P (k) − δ if CIR ≥ γ
P (k + 1) = (5.13)
P (k) + δ if CIR < γ
64
Chapter 6
In order to be able to see the effect of scheduling and power control on the
interference it is necessary to simulate various scenarios and compare them.
The first step of this simulation is to compare a scenario without any power
control or a particular scheduling technique, and compare it to a scenario us-
ing power control. The scheduling technique used for all the simulations is the
FIFO. Moreover, different scheduling algorithms will be evaluated to check the
different results they produce. As shown as in figure 6.1, it is possible to ’switch’
between the various techniques to see their different influences and interactions.
65
The following diagram shows the simulation approach.
66
6.1 Description
The simulation is built as a model of the real GPRS-system with some par-
ticular features. To get a statistically significant result, the simulation is based
on four different shadowing maps. Each of those maps has been used as a inde-
pendent scenario to perform all the simulations. Moreover, for each shadowing
map a set of users position is calculated and, related to it, the set of correlation
values of SSF is determined using the Bessel function.
For all the repetitions, with changing traffic, it was possible to use the same
correlation values because always the same movement for all the users has been
used. Each user has a different starting position but has the same movement
and velocity for every repetition. The position changes according to the mobil-
ity model every 5 seconds.
All the different algorithms are simulated 10 times in order to have a statis-
tical result. Afterwords, the mean value of all repetition is giving the average
behavior of the entire system and different algorithm can be compared.
Therefore, the exspected results of the impact of the techniques are described
in advance.
Because of different positions of all the users, each of them has a different
distance to it’s linked BS. This produces a different CIR and, based on the CIR,
different Coding Schemes are chosen. This results in different throughput for
all the users and, as a consequence, a different throughput for the entire system.
• C/I scheduling
This technique should achieve the best result because the user with the
best C/I, and therefore the highest data rate, is always served. So it is
guaranteed that no resources lie idle.
• FIFO scheduling
For the rating in this technique only the time of arrival of the traffic is
important. So the served user is independent of the C/I and the result
is not based on the C/I; for this reason the best throughput cannot be
ensured.
• Proportional fair scheduling
Within the proportional fair algorithm the C/I and the theoretical through-
put of every user are taken into account. The theoretical throughput is
67
calculated based on the Coding Scheme assigned to the user, indepen-
dently of whether the user is transmitting or not. The unique throughput
for every user is also affected by the time since the traffic occurs. For
that reason the user with the best conditions is not always the user which
receives data. Thus is appears that this technique, though not the best
technique in terms of throughput, is likely better than FIFO.
Influence of intercell-scheduling
In the realization of IS used in this simulation the BS are split into two
groups and the TSs of every channel are halved from eight into four TSs. The
basic idea is to reach a higher C/I by avoiding the biggest interference from BS
that are close to each other.
IS will only show a positive effect if the improvement of the C/I and the
respective throughput is bigger than the amount of data that is lost for the
transmission because of the reduced amount of TSs.
68
6.2 CIR
The CIR shows the different behavior of the channel for every user’s connec-
tion. As one of the parameter of the project work, the CIR is calculated as mean
value over the simulation time for every single user. Then, this mean value, is
used to calculate the mean over all the user for all the repetitions. Checking the
behavior for different numbers of users it is possible to appreciate the changing
of the CIR due to the different algorithms used and to the different number of
users as shown as in figure 6.2.
In this figure we can see that the various techniques developed in this re-
port permit to achieve a better CIR level. Comparing the case without any
Power Control with case with the Power Control, it is possible to appreciate
how much the PC can improve the CIR condition. This is possible due to the
theory predicted in chapter 3.2 where the PC algorithm is going to change the
value of power for all the BS which are transmitting on the same channel at
the same timeslot. It is also possible to appreciate the different improvements
made by Power Control and Intercell Scheduling. When the Intercell Schedul-
ing is active, a better CIR is reached according on the aim of this algorithm.
Due to the fewer timeslots available for each user, there is a smaller number of
users transmitting at the same time and this is reducing the interference. This
improvement is smaller than the one obtained from the Power Control and this
is an important point for the improvement of the entire system.
However, the best results showed in the figure are related to the "Power
Control without Intercell Scheduling" algorithm, but in the real condition this
could be a wrong result. The number of users considered during the entire
simulation is too small to appreciate the true behavior of the system. Because of
this, the Intercell Scheduling is not having such importance for the interference
optimization because 25 users are a very small number in the studied area of 9
cell.
69
Furthermore, we can think that after a certain number of users, we will reach
a physical limit in the BSs which will result at a constant level of CIR. We can
also think that as the number of users increase further, PC will not anymore be
efficient and the CIR level will decrease.
70
6.3 Throughput
The throughput considered as a performance parameter, is used to establish
which is the most useful combination of algorithms in terms of sent data. It
is given by the carried traffic normalized to the capacity of the system as a
function of the load of the same system.
As said in 6.3, the system is not showing its entire features because of the
too small number of users that are not able to raise the system load above 20%.
This problem occurs also for the throughput representation. With a larger num-
ber of users, the system load should increase and it would be possible to see how
much traffic can be sent before reaching the saturation point. As the number of
user is increasing, the number of users which are waiting is also increasing. This
means that after a certain point the load will keep growing while the throughput
will be constant.
Anyway, for the small amount of traffic we find a better performance for the
FIFO algorithm. The second best algorithm is the CI technique. The difference
between those two algorithms began to be bigger with increasing load. The
behavior of the Proportional Fair Algorithm is different from our expectation
71
because it appears clearly that it is not a function of the amount of load, so it
remains always a constant value and this is not a proper behavior.
From figure 6.4 it is possible to compare the situation in which the inter-cell
scheduling is applied with the case where the Power Control is applied.
In this figure we can not see a really different behavior between the two
different setting, so we can conclude that the Power Control algorithm does not
influence the amount of carried traffic.
72
Figure 6.5: Throughput of inter-cell scheduling with or without PC
73
Chapter 7
Conclusion
Based on the initial purpose of this project, we can say that the demand
of high data rate is not a big problem for the GPRS/EDGE connection. As
said in the beginning of the Report, the coming out of multimedia applications
such as television or Internet on mobile stations, requires an optimization of the
connection. Now we know that this could be reached by using additional tech-
niques without having bad implications. Using algorithms in order to rise the
CIR while having the same behavior of the throughput is a very good starting
point for the optimization of the GPRS system.
The work done in this project has been based on two different algorithms
turned toward the interference optimization (PC and IS). After our simulations
it appears clear that the implementation of different algorithms has a consider-
able effect on the performance of our system in terms of carried traffic and CIR
level. One of the most important results is that a system in which there are no
added techniques, it is the most easy to create but is also the one that shows the
worst performance. On the other hand, a system with an inter-cell scheduling
(which is definitely not complex to obtain) can improve the CIR of the users
having a very small payment in terms of throughput. Moreover, another obser-
vation can be done about the Power Control algorithm: from our simulation it
is possible to notice that the introduction of the PC do not have a big effect on
the throughput behavior, and at the same time it has a very high improvement
of the CIR level; it means that its implementation, even if make the system
more complex, gives better results in term of interference optimization.
Future Work
A future work based on this report can be to investigate deeper the effect of
beamforming on interference in a multi-cell scenario. This will probably increase
the level of CIR as Power Control and inter-cell scheduling are doing. Moreover,
Smart inter-cell scheduling can also be integrated in a multi-cell scenario con-
taining more BSs to increase the CIR. Indeed in our scenario, containing 9 BSs,
a smart inter-cell scheduling will not be worth in comparison with the increase
of the complexity of this system. Moreover, additional techniques in term of
power control and scheduling can be implement and analyzed.
74
Bibliography
75
[15] Dipl. Ing. Ralf Dieter Wölfle. Ausbreitungs-Modellrechnungen. 2007. Elek-
trosmoginfo1of2.pdf.
76
List of Figures
3.1 Ideal Power Control: (a) constant transmission power; in that case the re-
ceived power increases when MS approaches the BTS; (b) the transmission
power is reduced when the MT approaches the BTS; in this way the received
power is constant an equal to PRIF , minimizing the interference [5]. . . . . 20
77
5.19 result of the C/I scheduling . . . . . . . . . . . . . . . . . . . . . 61
5.20 result of the FIFO scheduling . . . . . . . . . . . . . . . . . . . . 62
5.21 result of the “proportional fair” scheduling . . . . . . . . . . . . . 63
78
List of Tables
3.1 delay classes and requirements for different packet sizes (see [14]) 29
4.1 assumed values for P0 and y for Lee’s propagation model (see [15]) 34
4.2 Some typical values for the deviation σX [17] . . . . . . . . . . . 35
79
Appendix A
Glossar
IB Inteference blocking
LCMV Linearly constrained minimum variance
M-PSK M-ary Phase Shifting Keying
MCMV Multiple constrained minimum variance
80
SB Signal-blocking
SIR Signal-to-Interference Ratio
81