SlideShare a Scribd company logo
IK2514
       Wireless Infrastructure Deployment & Economics




Homework 3
Dimensioning and Cost Structure Analysis
of Wide Area Data Service Network




                     Laili Aidi (aidi@kth.se)
             Communication Systems, School of ICT, KTH
Scenario

  Coverage type
“Urban”: Population density 2000 / km2, total area 10,000 km2.

  Usage type
“MBB Substitute”, starting from 5 GB/Month in year 0, increasing
prediction 1 GB/Month each year.

  User penetration
“Substitute_1”: starting from 1 % of total population in year 0, increasing
prediction 1% each year.

  Operator type
“Greenfield”: has to deploy the network from scratch.

  RAT options
•  UMTS Macro
•  HSDPA Macro
•  HSDPA Micro
Cost Dimensioning
  UMTS Macro & HSDPA Macro
Cost Dimensioning (cont.)
  HSDPA Micro
Money ?
Approach
1.  Coverage (km2) & User demand
Example Year 0:
•  20% coverage area means:
           20 % x 10,000 km2 = 0 km2 total required coverage
•  1 % user penetration means:
         1 % x (2,000 x 10,000) = 200,000 total predicted user

                                                                         Total Predicted User
            Total Required Coverage (km2)
                                                     1400000
12000
                                                                                                             1200000
                                             10000   1200000
10000
                                                                                                   1000000
                                                     1000000
                                      8000
 8000                                                                                     800000
                                                     800000
                               6000
 6000                                                                            600000
                                                     600000
                        4000                                            400000
 4000                                                400000

                2000                                           200000
 2000                                                200000

        0                                                 0
    0
                                                                 1        2        3        4        5         6
        1         2      3      4      5      6
Approach
2. Capacity demand (Mbps)
Example Year 1:
  Usage per User 6 GB/month/user, thus the user demand (UD1) is:
                   6 GB/month/user x 1,024 = 6144 MB/month/user
As traffic is concentrated in 4 hours / day, thus the user demand in Mbps (UD2) is:
               (UD1)/(30 days x 4 hours x 60 minutes x 60 seconds) x 8
                               = 0.113777778 Mbps/user

  Then the capacity demand for the system would be:
                       (UD2) x 400000 users = 45511.1 Mbps

                                   Total Capacity Demand (Mbps)
                250000                                                       227555.6

                200000
                                                                  170666.7

                150000
                                                       121362.9

                100000                       79644.4

                                   45511.1
                50000
                         18962.9

                    0
                           1          2        3          4          5          6
Approach
3. Total equipment demand for each RAT option

   Coverage achieved (CvTot)
 Coverage achieved by BTS deployment, would be:
                Cv = Maximum cell range * Amount of BTS
 Thus, total Coverage achieved on that year (CvTot) would be:
                      CvTot = Cv + CvTot last years

   Capacity achieved (CpTot)
 Capacity achieved by BTS deployment (Cp1) would be:
                 Cp1 = Maximum capacity * Amount BTS

 Capacity achieved by add cell deployment (Cp2) would be:
                     Cp2 = Maximum capacity * Cell
 Where Add.Cell (Cell) is:
                   Cell = Amount of (Cp) BTS * (6-1)

 Thus, total Capacity achieved on that year (CpTot) would be:
                  CpTot = Cp1 + Cp2 + CpTot last years
Approach

 Data Line (DL)
                     DL = (Cp1 + Cp2) / Data line capacity

 Site installation (SI) and Site build out (SB)
                       SI or SB = Amount of BTS purchased

 Site Lease (SL) and Electricity (EL)
   SL or EL = Amount of BTS purchased + Amount of BTS purchased last year

 Leased Line (LL)
                       LL = CpTot / Leased line capacity
Result - UMTS Macro

  BTS & Add Cell Demand




  Installation - Built Out and Running Demand
Result - HSDPA Macro

  BTS & Add Cell Demand




 Installation - Built Out and Running Demand
Result - HSDPA Micro


  BTS Demand




 Installation - Built Out and Running Demand
Comparison
Comparison   (cont.)
Approach
4. CAPEX, OPEX, and Total Cost
           CAPEX = (RTE Cost) + (Installation & Build out Cost)
               OPEX = Running Cost + (10 % x CAPEX)
                     Total Cost = CAPEX + OPEX
Approach
5. NPV for each RAT option: Financial Viability
                      PV = CF / (1 + r)^n
                   NPV = PV0 + PV1 + .. + PV5
Conclusion & Recommendation
    UMTS Macro:
-    High Add. Cell needs
-    High RTE cost,
-    High Installation & Build out cost
-    Sharp increasing of OPEX
    HSDPA Micro:
-    Highest BTS deployment needs
-    High Installation & Build out cost
-    Sharp increasing of OPEX
-    Highest capacity achieved
    HSDPA Macro:
-    Less BTS deployment needs
-    Less CAPEX,
-    Slow increasing of OPEX
-    Best NPV



                  Go for HSDPA Macro !
Thank You!

More Related Content

Viewers also liked

AIRCOM LTE Webinar 6 - Comparison between GSM, UMTS & LTE
AIRCOM LTE Webinar 6 - Comparison between GSM, UMTS & LTEAIRCOM LTE Webinar 6 - Comparison between GSM, UMTS & LTE
AIRCOM LTE Webinar 6 - Comparison between GSM, UMTS & LTE
AIRCOM International
 
Quality of service
Quality of serviceQuality of service
Quality of service
vmkris000
 
Fyp Presentation
Fyp PresentationFyp Presentation
Fyp Presentation
Arsalan Mir
 
Zte umts load-monitoring and expansion guide
Zte umts load-monitoring and expansion guideZte umts load-monitoring and expansion guide
Zte umts load-monitoring and expansion guide
Alfri Dinata
 
Hsdpa over iur several rnc report
Hsdpa over iur several rnc reportHsdpa over iur several rnc report
Hsdpa over iur several rnc report
Ketut Widya
 
Bay Talkitec Represented at The Mobile VAS SUMMIT 2009 by Virtue Insight
Bay Talkitec Represented at The Mobile VAS SUMMIT 2009 by Virtue InsightBay Talkitec Represented at The Mobile VAS SUMMIT 2009 by Virtue Insight
Bay Talkitec Represented at The Mobile VAS SUMMIT 2009 by Virtue InsightParitosh Sharma
 
ZXSDR Trainning
ZXSDR TrainningZXSDR Trainning
ZXSDR Trainning
Najam Saqib
 
3G basic good
3G basic good3G basic good
3G basic good
Jit Pal Dhanjal
 
Tr@Ins3 Techno Economical Study Bart Lannoo
Tr@Ins3 Techno Economical Study   Bart LannooTr@Ins3 Techno Economical Study   Bart Lannoo
Tr@Ins3 Techno Economical Study Bart Lannooimec.archive
 
WCDMA Tems Parameters Investigation and Drive Testing
WCDMA Tems Parameters Investigation and Drive TestingWCDMA Tems Parameters Investigation and Drive Testing
WCDMA Tems Parameters Investigation and Drive Testing
S Mohib Naqvi
 
Zte hsdpa
Zte hsdpaZte hsdpa
Zte hsdpa
tmukuze
 

Viewers also liked (13)

AIRCOM LTE Webinar 6 - Comparison between GSM, UMTS & LTE
AIRCOM LTE Webinar 6 - Comparison between GSM, UMTS & LTEAIRCOM LTE Webinar 6 - Comparison between GSM, UMTS & LTE
AIRCOM LTE Webinar 6 - Comparison between GSM, UMTS & LTE
 
Quality of service
Quality of serviceQuality of service
Quality of service
 
Fyp Presentation
Fyp PresentationFyp Presentation
Fyp Presentation
 
Zte umts load-monitoring and expansion guide
Zte umts load-monitoring and expansion guideZte umts load-monitoring and expansion guide
Zte umts load-monitoring and expansion guide
 
Hsdpa over iur several rnc report
Hsdpa over iur several rnc reportHsdpa over iur several rnc report
Hsdpa over iur several rnc report
 
Bay Talkitec Represented at The Mobile VAS SUMMIT 2009 by Virtue Insight
Bay Talkitec Represented at The Mobile VAS SUMMIT 2009 by Virtue InsightBay Talkitec Represented at The Mobile VAS SUMMIT 2009 by Virtue Insight
Bay Talkitec Represented at The Mobile VAS SUMMIT 2009 by Virtue Insight
 
ZXSDR Trainning
ZXSDR TrainningZXSDR Trainning
ZXSDR Trainning
 
3G basic good
3G basic good3G basic good
3G basic good
 
Tr@Ins3 Techno Economical Study Bart Lannoo
Tr@Ins3 Techno Economical Study   Bart LannooTr@Ins3 Techno Economical Study   Bart Lannoo
Tr@Ins3 Techno Economical Study Bart Lannoo
 
WCDMA Tems Parameters Investigation and Drive Testing
WCDMA Tems Parameters Investigation and Drive TestingWCDMA Tems Parameters Investigation and Drive Testing
WCDMA Tems Parameters Investigation and Drive Testing
 
Hspa and hsdpa
Hspa and hsdpaHspa and hsdpa
Hspa and hsdpa
 
Zte hsdpa
Zte hsdpaZte hsdpa
Zte hsdpa
 
DC-HSPA+ technology
DC-HSPA+ technologyDC-HSPA+ technology
DC-HSPA+ technology
 

Similar to Dimensioning and Cost Structure Analysis of Wide Area Data Service Network - Presentation

Network dimensoning and cost structure analysis of Radio access Network
Network dimensoning and cost structure analysis of Radio access NetworkNetwork dimensoning and cost structure analysis of Radio access Network
Network dimensoning and cost structure analysis of Radio access NetworkAsfak Rahman
 
Solutions for the Texas Energy Shortage
Solutions for the Texas Energy Shortage Solutions for the Texas Energy Shortage
Solutions for the Texas Energy Shortage
Rick Borry
 
Png 492 pec final-presentation
Png 492  pec final-presentationPng 492  pec final-presentation
Png 492 pec final-presentationnas-psu
 
Png 492 pec final-presentation[1][1]
Png 492  pec final-presentation[1][1]Png 492  pec final-presentation[1][1]
Png 492 pec final-presentation[1][1]nas-psu
 
La Sperimentazione White Spaces in Piemonte Applicazioni per Reti Veicolari
La Sperimentazione White Spaces in Piemonte Applicazioni per Reti VeicolariLa Sperimentazione White Spaces in Piemonte Applicazioni per Reti Veicolari
La Sperimentazione White Spaces in Piemonte Applicazioni per Reti Veicolari
CSP Scarl
 
Dimensioning and cost structure analysis of a Wide area data service network
Dimensioning and cost structure analysis of a Wide area data service networkDimensioning and cost structure analysis of a Wide area data service network
Dimensioning and cost structure analysis of a Wide area data service network
Ahmad Bazzari
 
Acceleration for big data, hadoop and memcached it168文库
Acceleration for big data, hadoop and memcached it168文库Acceleration for big data, hadoop and memcached it168文库
Acceleration for big data, hadoop and memcached it168文库Accenture
 
Acceleration for big data, hadoop and memcached it168文库
Acceleration for big data, hadoop and memcached it168文库Acceleration for big data, hadoop and memcached it168文库
Acceleration for big data, hadoop and memcached it168文库Accenture
 
Access to open data through open access articles in the life sciences
Access to open data through open access articles in the life sciencesAccess to open data through open access articles in the life sciences
Access to open data through open access articles in the life sciences
Conferência Luso-Brasileira de Ciência Aberta
 
Cloud Computing: Is it really new?
Cloud Computing: Is it really new?Cloud Computing: Is it really new?
Cloud Computing: Is it really new?
GovCloud Network
 
Benchmark InfraBees Fund
Benchmark InfraBees FundBenchmark InfraBees Fund
Benchmark InfraBees Fund
granny2010
 
Cryptographic Data Splitting and Cloud Computing
Cryptographic Data Splitting and Cloud ComputingCryptographic Data Splitting and Cloud Computing
Cryptographic Data Splitting and Cloud Computing
GovCloud Network
 
Geographical Citizen Science
Geographical Citizen ScienceGeographical Citizen Science
Geographical Citizen Science
Muki Haklay
 
SSI Event monetization method and Startups
SSI Event monetization method and StartupsSSI Event monetization method and Startups
SSI Event monetization method and Startups
01Booster
 
It Excellence Winner Hampshire Cc
It Excellence Winner   Hampshire CcIt Excellence Winner   Hampshire Cc
It Excellence Winner Hampshire CcSocitm
 
London buses Mike Weston
London buses Mike WestonLondon buses Mike Weston
London buses Mike Westonhybriduserforum
 
Graham Brennan - SEI - Renewable Energy and Transport Developments in Ireland
Graham Brennan - SEI - Renewable Energy and Transport Developments in IrelandGraham Brennan - SEI - Renewable Energy and Transport Developments in Ireland
Graham Brennan - SEI - Renewable Energy and Transport Developments in Ireland
Electric Vehicle Association of Ireland
 
Fabio Ghioni Asymmetric Warfare and Interception revealed
Fabio Ghioni Asymmetric Warfare and Interception revealedFabio Ghioni Asymmetric Warfare and Interception revealed
Fabio Ghioni Asymmetric Warfare and Interception revealed
Fabio Ghioni
 
Sv interim report presentation compress
Sv interim report presentation compressSv interim report presentation compress
Sv interim report presentation compressfregoneseassociates
 

Similar to Dimensioning and Cost Structure Analysis of Wide Area Data Service Network - Presentation (20)

Network dimensoning and cost structure analysis of Radio access Network
Network dimensoning and cost structure analysis of Radio access NetworkNetwork dimensoning and cost structure analysis of Radio access Network
Network dimensoning and cost structure analysis of Radio access Network
 
Solutions for the Texas Energy Shortage
Solutions for the Texas Energy Shortage Solutions for the Texas Energy Shortage
Solutions for the Texas Energy Shortage
 
Png 492 pec final-presentation
Png 492  pec final-presentationPng 492  pec final-presentation
Png 492 pec final-presentation
 
Png 492 pec final-presentation[1][1]
Png 492  pec final-presentation[1][1]Png 492  pec final-presentation[1][1]
Png 492 pec final-presentation[1][1]
 
La Sperimentazione White Spaces in Piemonte Applicazioni per Reti Veicolari
La Sperimentazione White Spaces in Piemonte Applicazioni per Reti VeicolariLa Sperimentazione White Spaces in Piemonte Applicazioni per Reti Veicolari
La Sperimentazione White Spaces in Piemonte Applicazioni per Reti Veicolari
 
Dimensioning and cost structure analysis of a Wide area data service network
Dimensioning and cost structure analysis of a Wide area data service networkDimensioning and cost structure analysis of a Wide area data service network
Dimensioning and cost structure analysis of a Wide area data service network
 
Acceleration for big data, hadoop and memcached it168文库
Acceleration for big data, hadoop and memcached it168文库Acceleration for big data, hadoop and memcached it168文库
Acceleration for big data, hadoop and memcached it168文库
 
Acceleration for big data, hadoop and memcached it168文库
Acceleration for big data, hadoop and memcached it168文库Acceleration for big data, hadoop and memcached it168文库
Acceleration for big data, hadoop and memcached it168文库
 
Access to open data through open access articles in the life sciences
Access to open data through open access articles in the life sciencesAccess to open data through open access articles in the life sciences
Access to open data through open access articles in the life sciences
 
Cloud Computing: Is it really new?
Cloud Computing: Is it really new?Cloud Computing: Is it really new?
Cloud Computing: Is it really new?
 
Benchmark InfraBees Fund
Benchmark InfraBees FundBenchmark InfraBees Fund
Benchmark InfraBees Fund
 
Cryptographic Data Splitting and Cloud Computing
Cryptographic Data Splitting and Cloud ComputingCryptographic Data Splitting and Cloud Computing
Cryptographic Data Splitting and Cloud Computing
 
Geographical Citizen Science
Geographical Citizen ScienceGeographical Citizen Science
Geographical Citizen Science
 
SSI Event monetization method and Startups
SSI Event monetization method and StartupsSSI Event monetization method and Startups
SSI Event monetization method and Startups
 
Lte asia 2011 s niri
Lte asia 2011 s niriLte asia 2011 s niri
Lte asia 2011 s niri
 
It Excellence Winner Hampshire Cc
It Excellence Winner   Hampshire CcIt Excellence Winner   Hampshire Cc
It Excellence Winner Hampshire Cc
 
London buses Mike Weston
London buses Mike WestonLondon buses Mike Weston
London buses Mike Weston
 
Graham Brennan - SEI - Renewable Energy and Transport Developments in Ireland
Graham Brennan - SEI - Renewable Energy and Transport Developments in IrelandGraham Brennan - SEI - Renewable Energy and Transport Developments in Ireland
Graham Brennan - SEI - Renewable Energy and Transport Developments in Ireland
 
Fabio Ghioni Asymmetric Warfare and Interception revealed
Fabio Ghioni Asymmetric Warfare and Interception revealedFabio Ghioni Asymmetric Warfare and Interception revealed
Fabio Ghioni Asymmetric Warfare and Interception revealed
 
Sv interim report presentation compress
Sv interim report presentation compressSv interim report presentation compress
Sv interim report presentation compress
 

More from Laili Aidi

Mobile Music Business Models in Asia's Emerging Markets
Mobile Music Business Models in Asia's Emerging MarketsMobile Music Business Models in Asia's Emerging Markets
Mobile Music Business Models in Asia's Emerging Markets
Laili Aidi
 
Stream Control Transmission Protocol (SCTP) - Introduction
Stream Control Transmission Protocol (SCTP) - IntroductionStream Control Transmission Protocol (SCTP) - Introduction
Stream Control Transmission Protocol (SCTP) - Introduction
Laili Aidi
 
Internet of Things
Internet of ThingsInternet of Things
Internet of Things
Laili Aidi
 
Study Abroad in the Land of Nobel
Study Abroad in the Land of NobelStudy Abroad in the Land of Nobel
Study Abroad in the Land of Nobel
Laili Aidi
 
Go International: Challenges and Opportunities
Go International: Challenges and OpportunitiesGo International: Challenges and Opportunities
Go International: Challenges and Opportunities
Laili Aidi
 
Master Thesis Report: Business Models for Mobile Broadband Media Services – C...
Master Thesis Report: Business Models for Mobile Broadband Media Services – C...Master Thesis Report: Business Models for Mobile Broadband Media Services – C...
Master Thesis Report: Business Models for Mobile Broadband Media Services – C...
Laili Aidi
 
Paper - Competing or Aligning? Assessment for Telecom Operator's strategy to ...
Paper - Competing or Aligning? Assessment for Telecom Operator's strategy to ...Paper - Competing or Aligning? Assessment for Telecom Operator's strategy to ...
Paper - Competing or Aligning? Assessment for Telecom Operator's strategy to ...
Laili Aidi
 
Master Thesis Presentation: Business Models for Mobile Broadband Media Servic...
Master Thesis Presentation: Business Models for Mobile Broadband Media Servic...Master Thesis Presentation: Business Models for Mobile Broadband Media Servic...
Master Thesis Presentation: Business Models for Mobile Broadband Media Servic...
Laili Aidi
 
Abstract - Competing or Aligning? Assessment for Telecom Operator's strategy ...
Abstract - Competing or Aligning? Assessment for Telecom Operator's strategy ...Abstract - Competing or Aligning? Assessment for Telecom Operator's strategy ...
Abstract - Competing or Aligning? Assessment for Telecom Operator's strategy ...
Laili Aidi
 
Music Service Monetization 2.0
Music Service Monetization 2.0Music Service Monetization 2.0
Music Service Monetization 2.0
Laili Aidi
 
Master Thesis Proposal Presentation: Business Models for Mobile-broadband Med...
Master Thesis Proposal Presentation: Business Models for Mobile-broadband Med...Master Thesis Proposal Presentation: Business Models for Mobile-broadband Med...
Master Thesis Proposal Presentation: Business Models for Mobile-broadband Med...
Laili Aidi
 
Master Thesis Proposal: Business Models for Mobile-broadband Media Services –...
Master Thesis Proposal: Business Models for Mobile-broadband Media Services –...Master Thesis Proposal: Business Models for Mobile-broadband Media Services –...
Master Thesis Proposal: Business Models for Mobile-broadband Media Services –...
Laili Aidi
 
Steganography Tool & Steganography Detection Tool - Presentation
Steganography Tool & Steganography Detection Tool - PresentationSteganography Tool & Steganography Detection Tool - Presentation
Steganography Tool & Steganography Detection Tool - Presentation
Laili Aidi
 
Delay Tolerant Network - Presentation
Delay Tolerant Network - PresentationDelay Tolerant Network - Presentation
Delay Tolerant Network - Presentation
Laili Aidi
 
Delay Tolerant Network - Journal
Delay Tolerant Network - JournalDelay Tolerant Network - Journal
Delay Tolerant Network - Journal
Laili Aidi
 
Analysis of WiMAX regulation in South Korea and Indonesia - Presentation
Analysis of WiMAX regulation in South Korea and Indonesia - PresentationAnalysis of WiMAX regulation in South Korea and Indonesia - Presentation
Analysis of WiMAX regulation in South Korea and Indonesia - Presentation
Laili Aidi
 
SNMP Project: SNMP-based Network Anomaly Detection Using Clustering
SNMP Project: SNMP-based Network Anomaly Detection Using ClusteringSNMP Project: SNMP-based Network Anomaly Detection Using Clustering
SNMP Project: SNMP-based Network Anomaly Detection Using Clustering
Laili Aidi
 
Sweden’s Telecom Markets, Actors & Roles - Presentation
Sweden’s Telecom Markets, Actors & Roles - PresentationSweden’s Telecom Markets, Actors & Roles - Presentation
Sweden’s Telecom Markets, Actors & Roles - Presentation
Laili Aidi
 
Condroid KTH Summer CSD 2011 - Final Report
Condroid KTH Summer CSD 2011 - Final ReportCondroid KTH Summer CSD 2011 - Final Report
Condroid KTH Summer CSD 2011 - Final Report
Laili Aidi
 
Condroid KTH Summer CSD 2011 - Lesson Learned and Individual Contribution List
Condroid KTH Summer CSD 2011 - Lesson Learned and Individual Contribution ListCondroid KTH Summer CSD 2011 - Lesson Learned and Individual Contribution List
Condroid KTH Summer CSD 2011 - Lesson Learned and Individual Contribution List
Laili Aidi
 

More from Laili Aidi (20)

Mobile Music Business Models in Asia's Emerging Markets
Mobile Music Business Models in Asia's Emerging MarketsMobile Music Business Models in Asia's Emerging Markets
Mobile Music Business Models in Asia's Emerging Markets
 
Stream Control Transmission Protocol (SCTP) - Introduction
Stream Control Transmission Protocol (SCTP) - IntroductionStream Control Transmission Protocol (SCTP) - Introduction
Stream Control Transmission Protocol (SCTP) - Introduction
 
Internet of Things
Internet of ThingsInternet of Things
Internet of Things
 
Study Abroad in the Land of Nobel
Study Abroad in the Land of NobelStudy Abroad in the Land of Nobel
Study Abroad in the Land of Nobel
 
Go International: Challenges and Opportunities
Go International: Challenges and OpportunitiesGo International: Challenges and Opportunities
Go International: Challenges and Opportunities
 
Master Thesis Report: Business Models for Mobile Broadband Media Services – C...
Master Thesis Report: Business Models for Mobile Broadband Media Services – C...Master Thesis Report: Business Models for Mobile Broadband Media Services – C...
Master Thesis Report: Business Models for Mobile Broadband Media Services – C...
 
Paper - Competing or Aligning? Assessment for Telecom Operator's strategy to ...
Paper - Competing or Aligning? Assessment for Telecom Operator's strategy to ...Paper - Competing or Aligning? Assessment for Telecom Operator's strategy to ...
Paper - Competing or Aligning? Assessment for Telecom Operator's strategy to ...
 
Master Thesis Presentation: Business Models for Mobile Broadband Media Servic...
Master Thesis Presentation: Business Models for Mobile Broadband Media Servic...Master Thesis Presentation: Business Models for Mobile Broadband Media Servic...
Master Thesis Presentation: Business Models for Mobile Broadband Media Servic...
 
Abstract - Competing or Aligning? Assessment for Telecom Operator's strategy ...
Abstract - Competing or Aligning? Assessment for Telecom Operator's strategy ...Abstract - Competing or Aligning? Assessment for Telecom Operator's strategy ...
Abstract - Competing or Aligning? Assessment for Telecom Operator's strategy ...
 
Music Service Monetization 2.0
Music Service Monetization 2.0Music Service Monetization 2.0
Music Service Monetization 2.0
 
Master Thesis Proposal Presentation: Business Models for Mobile-broadband Med...
Master Thesis Proposal Presentation: Business Models for Mobile-broadband Med...Master Thesis Proposal Presentation: Business Models for Mobile-broadband Med...
Master Thesis Proposal Presentation: Business Models for Mobile-broadband Med...
 
Master Thesis Proposal: Business Models for Mobile-broadband Media Services –...
Master Thesis Proposal: Business Models for Mobile-broadband Media Services –...Master Thesis Proposal: Business Models for Mobile-broadband Media Services –...
Master Thesis Proposal: Business Models for Mobile-broadband Media Services –...
 
Steganography Tool & Steganography Detection Tool - Presentation
Steganography Tool & Steganography Detection Tool - PresentationSteganography Tool & Steganography Detection Tool - Presentation
Steganography Tool & Steganography Detection Tool - Presentation
 
Delay Tolerant Network - Presentation
Delay Tolerant Network - PresentationDelay Tolerant Network - Presentation
Delay Tolerant Network - Presentation
 
Delay Tolerant Network - Journal
Delay Tolerant Network - JournalDelay Tolerant Network - Journal
Delay Tolerant Network - Journal
 
Analysis of WiMAX regulation in South Korea and Indonesia - Presentation
Analysis of WiMAX regulation in South Korea and Indonesia - PresentationAnalysis of WiMAX regulation in South Korea and Indonesia - Presentation
Analysis of WiMAX regulation in South Korea and Indonesia - Presentation
 
SNMP Project: SNMP-based Network Anomaly Detection Using Clustering
SNMP Project: SNMP-based Network Anomaly Detection Using ClusteringSNMP Project: SNMP-based Network Anomaly Detection Using Clustering
SNMP Project: SNMP-based Network Anomaly Detection Using Clustering
 
Sweden’s Telecom Markets, Actors & Roles - Presentation
Sweden’s Telecom Markets, Actors & Roles - PresentationSweden’s Telecom Markets, Actors & Roles - Presentation
Sweden’s Telecom Markets, Actors & Roles - Presentation
 
Condroid KTH Summer CSD 2011 - Final Report
Condroid KTH Summer CSD 2011 - Final ReportCondroid KTH Summer CSD 2011 - Final Report
Condroid KTH Summer CSD 2011 - Final Report
 
Condroid KTH Summer CSD 2011 - Lesson Learned and Individual Contribution List
Condroid KTH Summer CSD 2011 - Lesson Learned and Individual Contribution ListCondroid KTH Summer CSD 2011 - Lesson Learned and Individual Contribution List
Condroid KTH Summer CSD 2011 - Lesson Learned and Individual Contribution List
 

Recently uploaded

DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
RTTS
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
Elena Simperl
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Tobias Schneck
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
OnBoard
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
Product School
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
Dorra BARTAGUIZ
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Product School
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
Elena Simperl
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 

Recently uploaded (20)

DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 

Dimensioning and Cost Structure Analysis of Wide Area Data Service Network - Presentation

  • 1. IK2514 Wireless Infrastructure Deployment & Economics Homework 3 Dimensioning and Cost Structure Analysis of Wide Area Data Service Network Laili Aidi (aidi@kth.se) Communication Systems, School of ICT, KTH
  • 2. Scenario   Coverage type “Urban”: Population density 2000 / km2, total area 10,000 km2.   Usage type “MBB Substitute”, starting from 5 GB/Month in year 0, increasing prediction 1 GB/Month each year.   User penetration “Substitute_1”: starting from 1 % of total population in year 0, increasing prediction 1% each year.   Operator type “Greenfield”: has to deploy the network from scratch.   RAT options •  UMTS Macro •  HSDPA Macro •  HSDPA Micro
  • 3. Cost Dimensioning   UMTS Macro & HSDPA Macro
  • 6. Approach 1.  Coverage (km2) & User demand Example Year 0: •  20% coverage area means: 20 % x 10,000 km2 = 0 km2 total required coverage •  1 % user penetration means: 1 % x (2,000 x 10,000) = 200,000 total predicted user Total Predicted User Total Required Coverage (km2) 1400000 12000 1200000 10000 1200000 10000 1000000 1000000 8000 8000 800000 800000 6000 6000 600000 600000 4000 400000 4000 400000 2000 200000 2000 200000 0 0 0 1 2 3 4 5 6 1 2 3 4 5 6
  • 7. Approach 2. Capacity demand (Mbps) Example Year 1:   Usage per User 6 GB/month/user, thus the user demand (UD1) is: 6 GB/month/user x 1,024 = 6144 MB/month/user As traffic is concentrated in 4 hours / day, thus the user demand in Mbps (UD2) is: (UD1)/(30 days x 4 hours x 60 minutes x 60 seconds) x 8 = 0.113777778 Mbps/user   Then the capacity demand for the system would be: (UD2) x 400000 users = 45511.1 Mbps Total Capacity Demand (Mbps) 250000 227555.6 200000 170666.7 150000 121362.9 100000 79644.4 45511.1 50000 18962.9 0 1 2 3 4 5 6
  • 8. Approach 3. Total equipment demand for each RAT option   Coverage achieved (CvTot) Coverage achieved by BTS deployment, would be: Cv = Maximum cell range * Amount of BTS Thus, total Coverage achieved on that year (CvTot) would be: CvTot = Cv + CvTot last years   Capacity achieved (CpTot) Capacity achieved by BTS deployment (Cp1) would be: Cp1 = Maximum capacity * Amount BTS Capacity achieved by add cell deployment (Cp2) would be: Cp2 = Maximum capacity * Cell Where Add.Cell (Cell) is: Cell = Amount of (Cp) BTS * (6-1) Thus, total Capacity achieved on that year (CpTot) would be: CpTot = Cp1 + Cp2 + CpTot last years
  • 9. Approach  Data Line (DL) DL = (Cp1 + Cp2) / Data line capacity  Site installation (SI) and Site build out (SB) SI or SB = Amount of BTS purchased  Site Lease (SL) and Electricity (EL) SL or EL = Amount of BTS purchased + Amount of BTS purchased last year  Leased Line (LL) LL = CpTot / Leased line capacity
  • 10. Result - UMTS Macro   BTS & Add Cell Demand   Installation - Built Out and Running Demand
  • 11. Result - HSDPA Macro   BTS & Add Cell Demand  Installation - Built Out and Running Demand
  • 12. Result - HSDPA Micro   BTS Demand  Installation - Built Out and Running Demand
  • 14. Comparison (cont.)
  • 15. Approach 4. CAPEX, OPEX, and Total Cost CAPEX = (RTE Cost) + (Installation & Build out Cost) OPEX = Running Cost + (10 % x CAPEX) Total Cost = CAPEX + OPEX
  • 16. Approach 5. NPV for each RAT option: Financial Viability PV = CF / (1 + r)^n NPV = PV0 + PV1 + .. + PV5
  • 17. Conclusion & Recommendation   UMTS Macro: -  High Add. Cell needs -  High RTE cost, -  High Installation & Build out cost -  Sharp increasing of OPEX   HSDPA Micro: -  Highest BTS deployment needs -  High Installation & Build out cost -  Sharp increasing of OPEX -  Highest capacity achieved   HSDPA Macro: -  Less BTS deployment needs -  Less CAPEX, -  Slow increasing of OPEX -  Best NPV Go for HSDPA Macro !