SlideShare a Scribd company logo
 Conventional Cell and Frequency Planning
 Radio Network Features and their impact
 Real” Cell and Frequency Planning
 Site selection
Spectrum available
Traffic
Cost
GoS
QoS
Quality
Coverage
Speech Quality
C/I
Lee’s model and other empirical models
 Ploss = PR1 + g10log(d / d1) + n10 log( f / f0) - a0
 PR1 is the reference loss at d1(normally 1 mile)
 (e.g. -84dBm in a city like Tokyo and -49dBm for
 open areas)
 g depends on the type of terrain
 (value between 2 and 4)
 n is between 2 and 3
Info
bits
Coding
bits
Code
Rate
Max data
rate
(kbs) /TS
Required
C/I (dB)
modulation
GSM 260 196 0.5 13.3 9 GMSK
CS-1 181 275 0.45 9.05 9 GMSK
CS-2 268 188 0.65 13.4 13 GMSK
CS-3 312 144 0.75 15.6 15 GMSK
CS-4 428 28 21.4 23 GMSK
MCS-1 176 0.53 8.4 9 GMSK
MCS-2 224 0.69 11.2 13 GMSK
MCS-3 296 0.89 14.8 15 GMSK
MCS-4 352 1 16.8 23 GMSK
MCS-5 448 0.38 22.4 14.5 8PSK
MCS-6 592 0.5 29.6 17 8PSK
MCS-7 896 0.78 44.8 23.5 8PSK
MCS-8 1088 0.92 54.4 29 8PSK
MCS-9 1184 1 59.2 32 8PSK
 for co-channel interference C/Ic=9 Db
 for adjacent (200 kHz) interference C/Ia1=-9 dB
 for adjacent (400 kHz) interference C/Ia2=-41 dB
 for adjacent (600 kHz) interference C/Ia3=-49 dB
GSM cell are basically geographical area
Covered by radio frequencies of BTS antennas
The hypothetical shape of a GSM cell is a Hexagon.
Two types of GSM cell
 Omni directional
 Sector cell
dc
a e
f
b
R
d
Area
A=3(3)½R²/2
Distance between centers
of two adjacent cells:
d = (3)½R
 An omni-directional cell (or omnicell) is served by a
BTS with an antenna which transmits equally in all
directions (360 degrees).
BTS
A sector cell is the area of coverage from an antenna,
which transmits, in a given direction only. For example,
this may be equal to 120 degrees or 180 degrees of an
equivalent omni- directional cell. One BTS can serve one
of these sector cells with a collection of BTS’s at a site
serving more than one, leading to terms such as two-
sectored sites and more commonly, three-sectored sites.
Typically, omni-directional cells are used to gain
coverage, whereas sector cells are used to gain capacity.
BTS
• The frequency reuse concept is to use same frequency channel
with another cell within the same GSM cell cluster.
• Since cells are more or less close to each other there is not perfect
solution.
• Cells will always interfere with each other even if they are not
immediate neighbors.
• How many cells must we consider when we do our planning?
how many closest neighbors do we have?
• The frequency re-use patterns recommended for GSM are the 4/12
and the 3/9 pattern.
The only (almost) noise we have to consider comes from interfering
base stations.
If we want to reduce interference from neighbors we need to increase
the D/R ratio.
If D = R sqr(3k) then sqr(3k) should be big, that is increase k!
If we need a C/I ratio of 18dB then we need k > 6.
In GSM networks a frequency reuse pattern with k = 3, 7 or 12.
In the 900-band, which is 2x25MHz wide, we can have 124 carriers.
If these are divided into groups of 12 frequencies we can have 10
groups.
One cell can thus be covered by 10 carriers.
Each carrier can have 8 connections thus a
maximum of 80 calls in an area covered by a cell.
reuse distance
D
k = 6
number of
cells in
pattern
U
V
j
i
30º
D = (i2 + ij + j2)½2Rcos 30°
D = (i2 + ij + j2)½ (3) ½ R
Number of cells in the
re-use pattern
N = i2 + ij + j2
i in (1,2,3,4 …..)
j in (0,1,2,3,4 …..)
D/R = (3N)½
 Umbrella Cell:
 Macro Cell: Antenna above average rooftop height
 Micro Cell: Antenna below average rooftop height
 Pico Cell: Indoors
Average Voice activity is around 50%
DTX is a feature that allows to be transmitted only when
there is something to be transmitted
Uses VAD (Voice Activity Detector)
It safes on battery power
Improves the overall network quality by reducing
unnecessary interference
This enable the BTS and the Mobile to transmit
only the power necessary for effective communications
Power Control Commands are via the SACCH
This improves the battery live of Mobile Phones
And it improve the overall network quality by reducing
unnecessary interference
 Number of frequencies equal to number of transceiivers
Controller
Call 1
Controller
Call 2
Controller
Call 3
Controller
Call 4
Tx and Rx on
f0
Tx and Rx on
f1
Tx and Rx on
f2
Tx and Rx on
f3
C
O
M
B
I
N
E
R
f2 f3 f0 f1
f3 f0 f1 f2
f1 f2 f3 f0
f0 f1 f2 f3
 Number of frequencies more or equal to number of transceiivers
Controller
Call 1
Controller
Call 2
Controller
Call 3
Controller
Call 4
Tx and Rx
hopping
Tx and Rx
hopping
Tx and Rx
hopping
Tx and Rx
hopping
f2 f3 f0 f1
f3 f0 f1 f2
f1 f2 f3 f0
f0 f1 f2 f3
 Raleigh fading is frequency dependent
 Diversity: combining two or more uncorrelated versions of the
same signal
 For “conventional” frequency diversity the info is sent on two
different frequencies at the same time.
 To be uncorrelated the two frequencies should be more than
1/(multi-path spread), where the multi-path spread is dependent on
the environment.
 For urban areas the frequencies should be more than 600kHz apart
Review interleaving
 If one timeslot gets completely lost during transmission
1/8 of two speech frames are lost.
 At the receiver the speech frames are de-interleaved
 The channel coding can recover from the 12.5% BER.
 Interleaving and Channel Coding is part and parcel of
the GSM standard - it works even without hopping.
 Extent of Interference diversity depends on:
Interference load (DTX and Power Control)
Frequency reuse: low re-use -> low gain;
dependent on area type.
Number of Frequencies (less -> less gain)
Cyclic or Random
 Interference diversity gain reached with 25%
load, 12 frequencies in Urban area with
random hopping is 2.5dB - mostly it is less.
 Use separate frequency blocks for TCH and BCCH
 BCCH frequency channel must be Always On No
hopping over BCCH.
 Plan TCH layer:
 MAL : Mobile radio frequency channel Allocation List
 HSN: Hopping sequence number
 MAIO: Mobile Allocation Index Offset
 MAI: Mobile Allocation Index
 Why a BCCH block?
Identifying the source of interference
Re-evaluation of the neighbor list
For collecting data for a measurement based plan
 Optimum size?
 Where a change in a BCCH carrier will on average
make the same difference as a change in a TCH carrier
in the optimized plan
Block Size BCCH =
Total Number of Carriers Available/(Average Traffic on TCH layer per
cell/8)*Scaling (DTX.PC) + 1
MAIO MA
MAI 0 2 1A 2A 3A 1B 2B 3B 1C 2C 3C
1 1 3 1 2 3 4 5 6 7 8 9
2 2 4 10 11 12 13 14 15 16 17 18
3 3 1 19 20 21 22 23 24 25 26 27
4 4 2 28 29 30 31 32 33 34 35 36
HSN = X 4 1 2 3 2 4 3 1
TRX1 ON 1A has MAIO = 0 28 1 10 19 10 28 19 1
TRX1 ON 1A has MAIO = 2 10 19 28 1 28 10 1 19
SHASHANK ASTHANA

More Related Content

What's hot

Gsm Cell Planning And Optimization
Gsm Cell Planning And OptimizationGsm Cell Planning And Optimization
Gsm Cell Planning And Optimization
Yasir Azmat
 
3G Radio Network Planning
3G Radio Network Planning3G Radio Network Planning
3G Radio Network Planning
toha ardi nugraha
 
2 g training optimization
2 g training optimization2 g training optimization
2 g training optimization
Ahmed Gad
 
GSM capacity planning
GSM capacity planningGSM capacity planning
GSM capacity planning
Deepak Joshi
 
GSM Channel Concept
GSM Channel ConceptGSM Channel Concept
GSM Channel Concept
Md Mustafizur Rahman
 
Gsm technology
Gsm technologyGsm technology
Gsm technology
ggrajan46
 
gsm layer 3 messages
 gsm layer 3 messages gsm layer 3 messages
gsm layer 3 messages
Jorge Genes Forcadell
 
Part 1 fundamentals of 3 g
Part 1  fundamentals of 3 gPart 1  fundamentals of 3 g
Part 1 fundamentals of 3 g
Henry Chikwendu
 
Part 2 planning of 3G
Part 2  planning of 3GPart 2  planning of 3G
Part 2 planning of 3G
Henry Chikwendu
 
LTE introduction part1
LTE introduction part1LTE introduction part1
LTE introduction part1
Pei-Che Chang
 
Logical channels
Logical channelsLogical channels
Logical channels
UthsoNandy
 
2G Handover Details (Huawei)
2G Handover Details (Huawei)2G Handover Details (Huawei)
2G Handover Details (Huawei)
Md Mustafizur Rahman
 
GSM channels
GSM channelsGSM channels
GSM channels
Mohd Nazir Shakeel
 
DT analysis how to analyze crossed feeder issue by dt
DT analysis  how to analyze crossed feeder issue by dtDT analysis  how to analyze crossed feeder issue by dt
DT analysis how to analyze crossed feeder issue by dtSandy Sandyy
 
introduction to lte 4g lte advanced bsnl training
introduction to lte 4g lte advanced bsnl training introduction to lte 4g lte advanced bsnl training
introduction to lte 4g lte advanced bsnl training
SumanPramanik7
 
Presentation Rf Optimization And Planning
Presentation  Rf Optimization And PlanningPresentation  Rf Optimization And Planning
Presentation Rf Optimization And Planning
Ummaarraa Raa
 
Basic of gsm by pawan
Basic of gsm by pawanBasic of gsm by pawan
Basic of gsm by pawan
Pawan Kumar
 
Lte power control
Lte power controlLte power control
Lte power control
Pranay Akul
 

What's hot (20)

Gsm Cell Planning And Optimization
Gsm Cell Planning And OptimizationGsm Cell Planning And Optimization
Gsm Cell Planning And Optimization
 
3G Radio Network Planning
3G Radio Network Planning3G Radio Network Planning
3G Radio Network Planning
 
2 g training optimization
2 g training optimization2 g training optimization
2 g training optimization
 
GSM capacity planning
GSM capacity planningGSM capacity planning
GSM capacity planning
 
08. DRIVE TEST Analysis
08. DRIVE TEST Analysis08. DRIVE TEST Analysis
08. DRIVE TEST Analysis
 
GSM Channel Concept
GSM Channel ConceptGSM Channel Concept
GSM Channel Concept
 
Gsm technology
Gsm technologyGsm technology
Gsm technology
 
LTE Air Interface
LTE Air InterfaceLTE Air Interface
LTE Air Interface
 
gsm layer 3 messages
 gsm layer 3 messages gsm layer 3 messages
gsm layer 3 messages
 
Part 1 fundamentals of 3 g
Part 1  fundamentals of 3 gPart 1  fundamentals of 3 g
Part 1 fundamentals of 3 g
 
Part 2 planning of 3G
Part 2  planning of 3GPart 2  planning of 3G
Part 2 planning of 3G
 
LTE introduction part1
LTE introduction part1LTE introduction part1
LTE introduction part1
 
Logical channels
Logical channelsLogical channels
Logical channels
 
2G Handover Details (Huawei)
2G Handover Details (Huawei)2G Handover Details (Huawei)
2G Handover Details (Huawei)
 
GSM channels
GSM channelsGSM channels
GSM channels
 
DT analysis how to analyze crossed feeder issue by dt
DT analysis  how to analyze crossed feeder issue by dtDT analysis  how to analyze crossed feeder issue by dt
DT analysis how to analyze crossed feeder issue by dt
 
introduction to lte 4g lte advanced bsnl training
introduction to lte 4g lte advanced bsnl training introduction to lte 4g lte advanced bsnl training
introduction to lte 4g lte advanced bsnl training
 
Presentation Rf Optimization And Planning
Presentation  Rf Optimization And PlanningPresentation  Rf Optimization And Planning
Presentation Rf Optimization And Planning
 
Basic of gsm by pawan
Basic of gsm by pawanBasic of gsm by pawan
Basic of gsm by pawan
 
Lte power control
Lte power controlLte power control
Lte power control
 

Similar to GSM Cell planning and frequency reuse

Wat question papers
Wat question papersWat question papers
Wat question papersUday Sharma
 
Basic of gsm anurag
Basic of gsm  anuragBasic of gsm  anurag
Basic of gsm anurag
Anurag Sharma
 
Popular Interview Wireless Question with Answer
Popular Interview Wireless Question with AnswerPopular Interview Wireless Question with Answer
Popular Interview Wireless Question with Answer
VARUN KUMAR
 
Code Division Multiple Access.pptx
Code Division Multiple Access.pptxCode Division Multiple Access.pptx
Code Division Multiple Access.pptx
zakariahassanhassan1
 
Radio network overview
Radio network overviewRadio network overview
Radio network overview
Md Mustafizur Rahman
 
lec.2 Multiple Access.pptx
lec.2 Multiple Access.pptxlec.2 Multiple Access.pptx
lec.2 Multiple Access.pptx
Muhammed A
 
lec.2 Multiple Access.pptx
lec.2 Multiple Access.pptxlec.2 Multiple Access.pptx
lec.2 Multiple Access.pptx
Muhammed A
 
Celllular concept
Celllular conceptCelllular concept
Celllular concept
Arshad_Iqbal096
 
Cell System propagation.ppt
Cell System propagation.pptCell System propagation.ppt
Cell System propagation.ppt
ssuser744b41
 
L4 multiplexing & multiple access 16
L4 multiplexing & multiple access 16L4 multiplexing & multiple access 16
L4 multiplexing & multiple access 16
SangeethaSasi1
 
Ece mimo ppt
Ece mimo pptEce mimo ppt
Ece mimo ppt
balachandran88
 
microwave_communications1__1.pptx
microwave_communications1__1.pptxmicrowave_communications1__1.pptx
microwave_communications1__1.pptx
GeoffreyAlleyne
 
Relay lte
Relay lteRelay lte
Third Generation Wireless Modeling in Urban Environment
Third Generation Wireless Modeling in Urban EnvironmentThird Generation Wireless Modeling in Urban Environment
Third Generation Wireless Modeling in Urban Environment
EECJOURNAL
 
850 MHz & 900 MHz Co-Existence
850 MHz & 900 MHz Co-Existence850 MHz & 900 MHz Co-Existence
850 MHz & 900 MHz Co-Existence
Sitha Sok
 

Similar to GSM Cell planning and frequency reuse (20)

Cellular concepts
Cellular conceptsCellular concepts
Cellular concepts
 
Wat question papers
Wat question papersWat question papers
Wat question papers
 
Basic of gsm anurag
Basic of gsm  anuragBasic of gsm  anurag
Basic of gsm anurag
 
Popular Interview Wireless Question with Answer
Popular Interview Wireless Question with AnswerPopular Interview Wireless Question with Answer
Popular Interview Wireless Question with Answer
 
Code Division Multiple Access.pptx
Code Division Multiple Access.pptxCode Division Multiple Access.pptx
Code Division Multiple Access.pptx
 
Radio network overview
Radio network overviewRadio network overview
Radio network overview
 
lec.2 Multiple Access.pptx
lec.2 Multiple Access.pptxlec.2 Multiple Access.pptx
lec.2 Multiple Access.pptx
 
lec.2 Multiple Access.pptx
lec.2 Multiple Access.pptxlec.2 Multiple Access.pptx
lec.2 Multiple Access.pptx
 
Celllular concept
Celllular conceptCelllular concept
Celllular concept
 
Cell System propagation.ppt
Cell System propagation.pptCell System propagation.ppt
Cell System propagation.ppt
 
L4 multiplexing & multiple access 16
L4 multiplexing & multiple access 16L4 multiplexing & multiple access 16
L4 multiplexing & multiple access 16
 
Ece mimo ppt
Ece mimo pptEce mimo ppt
Ece mimo ppt
 
Lecture 9
Lecture 9Lecture 9
Lecture 9
 
microwave_communications1__1.pptx
microwave_communications1__1.pptxmicrowave_communications1__1.pptx
microwave_communications1__1.pptx
 
Relay lte
Relay lteRelay lte
Relay lte
 
Frequency Reuse
Frequency ReuseFrequency Reuse
Frequency Reuse
 
Third Generation Wireless Modeling in Urban Environment
Third Generation Wireless Modeling in Urban EnvironmentThird Generation Wireless Modeling in Urban Environment
Third Generation Wireless Modeling in Urban Environment
 
IMT Advanced
IMT AdvancedIMT Advanced
IMT Advanced
 
Frp Ccc
Frp CccFrp Ccc
Frp Ccc
 
850 MHz & 900 MHz Co-Existence
850 MHz & 900 MHz Co-Existence850 MHz & 900 MHz Co-Existence
850 MHz & 900 MHz Co-Existence
 

More from Shashank Asthana

Operating system Memory management
Operating system Memory management Operating system Memory management
Operating system Memory management
Shashank Asthana
 
Border Gatway Protocol
Border Gatway ProtocolBorder Gatway Protocol
Border Gatway Protocol
Shashank Asthana
 
IPv4 addressing and subnetting
IPv4 addressing and subnettingIPv4 addressing and subnetting
IPv4 addressing and subnetting
Shashank Asthana
 
Masters porting linux
Masters porting linuxMasters porting linux
Masters porting linux
Shashank Asthana
 
Call flow and MS attach in LTE
Call flow and MS attach in LTECall flow and MS attach in LTE
Call flow and MS attach in LTE
Shashank Asthana
 

More from Shashank Asthana (6)

Operating system Memory management
Operating system Memory management Operating system Memory management
Operating system Memory management
 
Border Gatway Protocol
Border Gatway ProtocolBorder Gatway Protocol
Border Gatway Protocol
 
IPv4 addressing and subnetting
IPv4 addressing and subnettingIPv4 addressing and subnetting
IPv4 addressing and subnetting
 
Masters porting linux
Masters porting linuxMasters porting linux
Masters porting linux
 
Call flow and MS attach in LTE
Call flow and MS attach in LTECall flow and MS attach in LTE
Call flow and MS attach in LTE
 
LTE 3GPP
LTE 3GPPLTE 3GPP
LTE 3GPP
 

Recently uploaded

Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
SOFTTECHHUB
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
SOFTTECHHUB
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
Matthew Sinclair
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
Matthew Sinclair
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
Adtran
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex ProofszkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
Alex Pruden
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
danishmna97
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
Matthew Sinclair
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
Uni Systems S.M.S.A.
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
Neo4j
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
名前 です男
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
DianaGray10
 

Recently uploaded (20)

Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex ProofszkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
 

GSM Cell planning and frequency reuse

  • 1.
  • 2.  Conventional Cell and Frequency Planning  Radio Network Features and their impact  Real” Cell and Frequency Planning  Site selection
  • 4. Lee’s model and other empirical models  Ploss = PR1 + g10log(d / d1) + n10 log( f / f0) - a0  PR1 is the reference loss at d1(normally 1 mile)  (e.g. -84dBm in a city like Tokyo and -49dBm for  open areas)  g depends on the type of terrain  (value between 2 and 4)  n is between 2 and 3
  • 5. Info bits Coding bits Code Rate Max data rate (kbs) /TS Required C/I (dB) modulation GSM 260 196 0.5 13.3 9 GMSK CS-1 181 275 0.45 9.05 9 GMSK CS-2 268 188 0.65 13.4 13 GMSK CS-3 312 144 0.75 15.6 15 GMSK CS-4 428 28 21.4 23 GMSK MCS-1 176 0.53 8.4 9 GMSK MCS-2 224 0.69 11.2 13 GMSK MCS-3 296 0.89 14.8 15 GMSK MCS-4 352 1 16.8 23 GMSK MCS-5 448 0.38 22.4 14.5 8PSK MCS-6 592 0.5 29.6 17 8PSK MCS-7 896 0.78 44.8 23.5 8PSK MCS-8 1088 0.92 54.4 29 8PSK MCS-9 1184 1 59.2 32 8PSK
  • 6.  for co-channel interference C/Ic=9 Db  for adjacent (200 kHz) interference C/Ia1=-9 dB  for adjacent (400 kHz) interference C/Ia2=-41 dB  for adjacent (600 kHz) interference C/Ia3=-49 dB
  • 7. GSM cell are basically geographical area Covered by radio frequencies of BTS antennas The hypothetical shape of a GSM cell is a Hexagon. Two types of GSM cell  Omni directional  Sector cell
  • 8. dc a e f b R d Area A=3(3)½R²/2 Distance between centers of two adjacent cells: d = (3)½R
  • 9.  An omni-directional cell (or omnicell) is served by a BTS with an antenna which transmits equally in all directions (360 degrees). BTS
  • 10. A sector cell is the area of coverage from an antenna, which transmits, in a given direction only. For example, this may be equal to 120 degrees or 180 degrees of an equivalent omni- directional cell. One BTS can serve one of these sector cells with a collection of BTS’s at a site serving more than one, leading to terms such as two- sectored sites and more commonly, three-sectored sites. Typically, omni-directional cells are used to gain coverage, whereas sector cells are used to gain capacity.
  • 11. BTS
  • 12. • The frequency reuse concept is to use same frequency channel with another cell within the same GSM cell cluster. • Since cells are more or less close to each other there is not perfect solution. • Cells will always interfere with each other even if they are not immediate neighbors. • How many cells must we consider when we do our planning? how many closest neighbors do we have? • The frequency re-use patterns recommended for GSM are the 4/12 and the 3/9 pattern.
  • 13. The only (almost) noise we have to consider comes from interfering base stations. If we want to reduce interference from neighbors we need to increase the D/R ratio. If D = R sqr(3k) then sqr(3k) should be big, that is increase k! If we need a C/I ratio of 18dB then we need k > 6. In GSM networks a frequency reuse pattern with k = 3, 7 or 12. In the 900-band, which is 2x25MHz wide, we can have 124 carriers. If these are divided into groups of 12 frequencies we can have 10 groups. One cell can thus be covered by 10 carriers. Each carrier can have 8 connections thus a maximum of 80 calls in an area covered by a cell.
  • 14. reuse distance D k = 6 number of cells in pattern U V j i 30º
  • 15. D = (i2 + ij + j2)½2Rcos 30° D = (i2 + ij + j2)½ (3) ½ R Number of cells in the re-use pattern N = i2 + ij + j2 i in (1,2,3,4 …..) j in (0,1,2,3,4 …..) D/R = (3N)½
  • 16.  Umbrella Cell:  Macro Cell: Antenna above average rooftop height  Micro Cell: Antenna below average rooftop height  Pico Cell: Indoors
  • 17. Average Voice activity is around 50% DTX is a feature that allows to be transmitted only when there is something to be transmitted Uses VAD (Voice Activity Detector) It safes on battery power Improves the overall network quality by reducing unnecessary interference
  • 18. This enable the BTS and the Mobile to transmit only the power necessary for effective communications Power Control Commands are via the SACCH This improves the battery live of Mobile Phones And it improve the overall network quality by reducing unnecessary interference
  • 19.  Number of frequencies equal to number of transceiivers Controller Call 1 Controller Call 2 Controller Call 3 Controller Call 4 Tx and Rx on f0 Tx and Rx on f1 Tx and Rx on f2 Tx and Rx on f3 C O M B I N E R f2 f3 f0 f1 f3 f0 f1 f2 f1 f2 f3 f0 f0 f1 f2 f3
  • 20.  Number of frequencies more or equal to number of transceiivers Controller Call 1 Controller Call 2 Controller Call 3 Controller Call 4 Tx and Rx hopping Tx and Rx hopping Tx and Rx hopping Tx and Rx hopping f2 f3 f0 f1 f3 f0 f1 f2 f1 f2 f3 f0 f0 f1 f2 f3
  • 21.  Raleigh fading is frequency dependent  Diversity: combining two or more uncorrelated versions of the same signal  For “conventional” frequency diversity the info is sent on two different frequencies at the same time.  To be uncorrelated the two frequencies should be more than 1/(multi-path spread), where the multi-path spread is dependent on the environment.  For urban areas the frequencies should be more than 600kHz apart
  • 22. Review interleaving  If one timeslot gets completely lost during transmission 1/8 of two speech frames are lost.  At the receiver the speech frames are de-interleaved  The channel coding can recover from the 12.5% BER.  Interleaving and Channel Coding is part and parcel of the GSM standard - it works even without hopping.
  • 23.  Extent of Interference diversity depends on: Interference load (DTX and Power Control) Frequency reuse: low re-use -> low gain; dependent on area type. Number of Frequencies (less -> less gain) Cyclic or Random  Interference diversity gain reached with 25% load, 12 frequencies in Urban area with random hopping is 2.5dB - mostly it is less.
  • 24.  Use separate frequency blocks for TCH and BCCH  BCCH frequency channel must be Always On No hopping over BCCH.  Plan TCH layer:  MAL : Mobile radio frequency channel Allocation List  HSN: Hopping sequence number  MAIO: Mobile Allocation Index Offset  MAI: Mobile Allocation Index
  • 25.  Why a BCCH block? Identifying the source of interference Re-evaluation of the neighbor list For collecting data for a measurement based plan  Optimum size?  Where a change in a BCCH carrier will on average make the same difference as a change in a TCH carrier in the optimized plan
  • 26. Block Size BCCH = Total Number of Carriers Available/(Average Traffic on TCH layer per cell/8)*Scaling (DTX.PC) + 1
  • 27. MAIO MA MAI 0 2 1A 2A 3A 1B 2B 3B 1C 2C 3C 1 1 3 1 2 3 4 5 6 7 8 9 2 2 4 10 11 12 13 14 15 16 17 18 3 3 1 19 20 21 22 23 24 25 26 27 4 4 2 28 29 30 31 32 33 34 35 36 HSN = X 4 1 2 3 2 4 3 1 TRX1 ON 1A has MAIO = 0 28 1 10 19 10 28 19 1 TRX1 ON 1A has MAIO = 2 10 19 28 1 28 10 1 19