This document provides a tutorial on self-optimization of the random access procedure in 3G Long Term Evolution (LTE) networks. It describes the key components and steps of the random access procedure, including random access preambles, formats, opportunities, and the contention-based procedure. It also addresses relevant performance metrics like access probability, detection miss probability, and contention probability. The paper discusses modeling radio network simulations and collecting performance data to enable self-optimization of random access parameters to meet specified requirements. The goal is to present relevant self-optimization problems rather than complete solutions.
Novel Position Estimation using Differential Timing Information for Asynchron...IJCNCJournal
Positioning techniques have been a common objective since the early development of wireless networks. However, current positioning methods in cellular networks, for instance, are still primarily focused on the use of the Global Navigation Satellite System (GNSS), which has several limitations, like high power drainage and failure in indoor scenarios. This study introduces a novel approach employing standard LTE signaling in order to provide high accuracy positioning estimation. The proposed technique is designed in analogy to the human sound localization system, eliminating the need of having information from three spatially diverse Base Stations (BSs). This is inspired by the perfect human 3D sound localization with two ears. A field study is carried out in a dense urban city to verify the accuracy of the proposed technique, with more than 20 thousand measurement samples collected. The achieved positioning accuracy is meeting the latest Federal Communications Commission (FCC) requirements in the planner dimension.
An Efficient and Stable Routing Algorithm in Mobile Ad Hoc NetworkIJCNCJournal
Mobile Ad hoc Network (MANET) is mainly designed to set up communication among devices in infrastructure-less wireless communication network. Routing in this kind of communication network is highly affected by its restricted characteristics such as frequent topological changes and limited battery power. Several research works have been carried out to improve routing performance in MANET. However, the overall performance enhancement in terms of packet delivery, delay and control message overhead is still not come into the wrapping up. In order to overcome the addressed issues, an Efficient and Stable-AODV (EFST-AODV) routing scheme has been proposed which is an improvement over AODV to establish a better quality route between source and destination. In this method, we have modified the route request and route reply phase. During the route request phase, cost metric of a route is calculated on the basis of parameters such as residual energy, delay and distance. In a route reply phase, average residual energy and average delay of overall path is calculated and the data forwarding decision is taken at the source node accordingly. Simulation outcomes reveal that the proposed approach gives better results in terms of packet delivery ratio, delay, throughput, normalized routing load and control message overhead as compared to AODV.
A Cluster-Based Routing Protocol and Fault Detection for Wireless Sensor NetworkIJCNCJournal
The document proposes a new clustering and routing algorithm for wireless sensor networks that aims to extend network lifetime. Key points:
- The algorithm divides nodes into sensing nodes and relay nodes, with relay nodes responsible for forwarding data to reduce cluster head burden.
- It selects cluster heads and relay nodes based on residual energy to distribute load and avoid early node death.
- A routing tree is constructed among relay nodes to transmit data to the base station in a multi-hop manner, selecting next hops based on residual energy and number of child nodes to balance energy usage.
- The goal is to improve energy efficiency, extend network lifetime, and increase data accuracy through mechanisms like clustering, load balancing, and fault detection
PERFORMANCE ANALYSIS IN CELLULAR NETWORKS CONSIDERING THE QOS BY RETRIAL QUEU...IJCNCJournal
In this article, a retrial queueing model will be considered with persevering customers for wireless cellular
networks which can be frequently applied in the Fractional Guard Channel (FGC) policies, including
Limited FGC (LFGC), Uniform FGC (UFGC), Limited Average FGC (LAFGC) and Quasi Uniform FGC
(QUFGC). In this model, the examination on the retrial phenomena permits the analyses of important
effectiveness measures pertained to the standard of services undergone by users with the probability that a
fresh call first arrives the system and find all busy channels at the time, the probability that a fresh call
arrives the system from the orbit and find all busy channels at the time and the probability that a handover
call arrives the system and find all busy channels at the time. Comparison between four types of the FGC
policy can befound to evaluate the performance of the system.
B ENCHMARKING OF C ELL T HROUGHPUT U SING P ROPORTIONAL F AIR S CHEDULE...ijwmn
The proportional fair (PF) scheduling algorithm com
promises between cell throughput and fairness. Many
research findings have been published by various re
searchers about PF algorithm based on mathematical
model and simulations. In this paper we have taken
the practical route to analyse the algorithm based
on
three types of subscription. In this benchmarking s
tudy, the user subscriptions are differentiated as
Gold,
Silver and Bronze schemes and they are provisioned
with certain throughputs. Apart from subscriptions
plans, the channel condition also plays a major rol
e in determining the throughput. So in order to ens
ure
fairness among different subscriptions even in the
bad channel conditions and to deliver the provision
ed
throughputs certain priorities are attached with th
e subscriptions. As per the subscription plans Gold
subscribers are assigned with 50% of the speed offe
red by the network as maximum based on CAT3 speed
(100 Mbps in DL and 50 Mbps in UL), Silver is assig
ned with 25% of the max speed and Bronze is
assigned with 12% of the max speed. The priorities
assigned to subscribers determines the fairness in
the
unfavourable channel conditions - Bronze (high), Si
lver and Gold (medium). In this paper, an
benchmarking tests have been performed with all of
three types of subscribers for nearly two hours in
the
live single cell network without any heterogeneous
cells influencing it. Furthermore, the results are
compared with the simulation results.
3GPP has introduced LTE Femtocells to manipulate the traffic for indoor users and to minimize
the charge on the Macro cells. A key mechanism in the LTE traffic handling is the packet
scheduler which is in charge of allocating resources to active flows in both the frequency and
time dimension. So several scheduling algorithms need to be analyzed for femtocells networks.
In this paper we introduce a performance analysis of three distinct scheduling algorithms of
mixed type of traffic flows in LTE femtocells networks. The particularly study is evaluated in
terms of throughput, packet loss ratio, fairness index and spectral efficiency.
Design and analysis of routing protocol for cognitive radio ad hoc networks i...IJECEIAES
Multi-hop routing protocol in cognitive radio mobile ad hoc networks (CRMANETs) is a critical issue. Furthermore, the routing metric used in multi-hop CRMANETs should reflect the bands availability, the links quality, the PU activities and quality of service (QoS) requirements of SUs. For the best of our knowledge, many of researchers investigated the performance of the different routing protocols in a homogeneous environment only. In this paper, we propose a heterogeneous cognitive radio routing protocol (HCR) operates in heterogeneous environment (i.e. the route from source to destination utilize the licensed and unlicensed spectrum bands). The proposed routing protocol is carefully developed to make a tradeoff between the channel diversity of the routing path along with the CRMANETs throughput. Using simulations, we discuss the performance of the proposed HCR routing protocol and compare it with the AODV routing protocol using a discrete-event simulation which we developed using JAVA platform.
A Survey of Various Routing and Channel Assignment Strategies for MR-MC WMNsijsrd.com
One fundamental problem of WMNs with a limited number of radio interfaces and orthogonal channels is that the performance degrades significantly as the network size grows. This results from increased interference between nodes and diminished spatial reuse over the network. A WMN node needs to share a common channel with each of its neighbours in the communication range, requiring it to set up a virtual link. Moreover, to reduce network interference, a node should minimize the number of neighbours that it shares a common channel with. The objective of a channel assignment strategy is to ensure efficient utilization of the available channels (e.g., by minimizing interference) while maximizing connectivity in the network. However, since these two requirements are conflicting with each other, the goal is to achieve a balance between these two. The major constraints which need to be satisfied by a channel assignment scheme include fixed number of channels in the network, limited number of radios in mesh nodes, common channel between two communicating nodes, and limited channel capacity. Also, a channel assignment scheme should take the amount of traffic load supported by each mesh node into consideration.
Novel Position Estimation using Differential Timing Information for Asynchron...IJCNCJournal
Positioning techniques have been a common objective since the early development of wireless networks. However, current positioning methods in cellular networks, for instance, are still primarily focused on the use of the Global Navigation Satellite System (GNSS), which has several limitations, like high power drainage and failure in indoor scenarios. This study introduces a novel approach employing standard LTE signaling in order to provide high accuracy positioning estimation. The proposed technique is designed in analogy to the human sound localization system, eliminating the need of having information from three spatially diverse Base Stations (BSs). This is inspired by the perfect human 3D sound localization with two ears. A field study is carried out in a dense urban city to verify the accuracy of the proposed technique, with more than 20 thousand measurement samples collected. The achieved positioning accuracy is meeting the latest Federal Communications Commission (FCC) requirements in the planner dimension.
An Efficient and Stable Routing Algorithm in Mobile Ad Hoc NetworkIJCNCJournal
Mobile Ad hoc Network (MANET) is mainly designed to set up communication among devices in infrastructure-less wireless communication network. Routing in this kind of communication network is highly affected by its restricted characteristics such as frequent topological changes and limited battery power. Several research works have been carried out to improve routing performance in MANET. However, the overall performance enhancement in terms of packet delivery, delay and control message overhead is still not come into the wrapping up. In order to overcome the addressed issues, an Efficient and Stable-AODV (EFST-AODV) routing scheme has been proposed which is an improvement over AODV to establish a better quality route between source and destination. In this method, we have modified the route request and route reply phase. During the route request phase, cost metric of a route is calculated on the basis of parameters such as residual energy, delay and distance. In a route reply phase, average residual energy and average delay of overall path is calculated and the data forwarding decision is taken at the source node accordingly. Simulation outcomes reveal that the proposed approach gives better results in terms of packet delivery ratio, delay, throughput, normalized routing load and control message overhead as compared to AODV.
A Cluster-Based Routing Protocol and Fault Detection for Wireless Sensor NetworkIJCNCJournal
The document proposes a new clustering and routing algorithm for wireless sensor networks that aims to extend network lifetime. Key points:
- The algorithm divides nodes into sensing nodes and relay nodes, with relay nodes responsible for forwarding data to reduce cluster head burden.
- It selects cluster heads and relay nodes based on residual energy to distribute load and avoid early node death.
- A routing tree is constructed among relay nodes to transmit data to the base station in a multi-hop manner, selecting next hops based on residual energy and number of child nodes to balance energy usage.
- The goal is to improve energy efficiency, extend network lifetime, and increase data accuracy through mechanisms like clustering, load balancing, and fault detection
PERFORMANCE ANALYSIS IN CELLULAR NETWORKS CONSIDERING THE QOS BY RETRIAL QUEU...IJCNCJournal
In this article, a retrial queueing model will be considered with persevering customers for wireless cellular
networks which can be frequently applied in the Fractional Guard Channel (FGC) policies, including
Limited FGC (LFGC), Uniform FGC (UFGC), Limited Average FGC (LAFGC) and Quasi Uniform FGC
(QUFGC). In this model, the examination on the retrial phenomena permits the analyses of important
effectiveness measures pertained to the standard of services undergone by users with the probability that a
fresh call first arrives the system and find all busy channels at the time, the probability that a fresh call
arrives the system from the orbit and find all busy channels at the time and the probability that a handover
call arrives the system and find all busy channels at the time. Comparison between four types of the FGC
policy can befound to evaluate the performance of the system.
B ENCHMARKING OF C ELL T HROUGHPUT U SING P ROPORTIONAL F AIR S CHEDULE...ijwmn
The proportional fair (PF) scheduling algorithm com
promises between cell throughput and fairness. Many
research findings have been published by various re
searchers about PF algorithm based on mathematical
model and simulations. In this paper we have taken
the practical route to analyse the algorithm based
on
three types of subscription. In this benchmarking s
tudy, the user subscriptions are differentiated as
Gold,
Silver and Bronze schemes and they are provisioned
with certain throughputs. Apart from subscriptions
plans, the channel condition also plays a major rol
e in determining the throughput. So in order to ens
ure
fairness among different subscriptions even in the
bad channel conditions and to deliver the provision
ed
throughputs certain priorities are attached with th
e subscriptions. As per the subscription plans Gold
subscribers are assigned with 50% of the speed offe
red by the network as maximum based on CAT3 speed
(100 Mbps in DL and 50 Mbps in UL), Silver is assig
ned with 25% of the max speed and Bronze is
assigned with 12% of the max speed. The priorities
assigned to subscribers determines the fairness in
the
unfavourable channel conditions - Bronze (high), Si
lver and Gold (medium). In this paper, an
benchmarking tests have been performed with all of
three types of subscribers for nearly two hours in
the
live single cell network without any heterogeneous
cells influencing it. Furthermore, the results are
compared with the simulation results.
3GPP has introduced LTE Femtocells to manipulate the traffic for indoor users and to minimize
the charge on the Macro cells. A key mechanism in the LTE traffic handling is the packet
scheduler which is in charge of allocating resources to active flows in both the frequency and
time dimension. So several scheduling algorithms need to be analyzed for femtocells networks.
In this paper we introduce a performance analysis of three distinct scheduling algorithms of
mixed type of traffic flows in LTE femtocells networks. The particularly study is evaluated in
terms of throughput, packet loss ratio, fairness index and spectral efficiency.
Design and analysis of routing protocol for cognitive radio ad hoc networks i...IJECEIAES
Multi-hop routing protocol in cognitive radio mobile ad hoc networks (CRMANETs) is a critical issue. Furthermore, the routing metric used in multi-hop CRMANETs should reflect the bands availability, the links quality, the PU activities and quality of service (QoS) requirements of SUs. For the best of our knowledge, many of researchers investigated the performance of the different routing protocols in a homogeneous environment only. In this paper, we propose a heterogeneous cognitive radio routing protocol (HCR) operates in heterogeneous environment (i.e. the route from source to destination utilize the licensed and unlicensed spectrum bands). The proposed routing protocol is carefully developed to make a tradeoff between the channel diversity of the routing path along with the CRMANETs throughput. Using simulations, we discuss the performance of the proposed HCR routing protocol and compare it with the AODV routing protocol using a discrete-event simulation which we developed using JAVA platform.
A Survey of Various Routing and Channel Assignment Strategies for MR-MC WMNsijsrd.com
One fundamental problem of WMNs with a limited number of radio interfaces and orthogonal channels is that the performance degrades significantly as the network size grows. This results from increased interference between nodes and diminished spatial reuse over the network. A WMN node needs to share a common channel with each of its neighbours in the communication range, requiring it to set up a virtual link. Moreover, to reduce network interference, a node should minimize the number of neighbours that it shares a common channel with. The objective of a channel assignment strategy is to ensure efficient utilization of the available channels (e.g., by minimizing interference) while maximizing connectivity in the network. However, since these two requirements are conflicting with each other, the goal is to achieve a balance between these two. The major constraints which need to be satisfied by a channel assignment scheme include fixed number of channels in the network, limited number of radios in mesh nodes, common channel between two communicating nodes, and limited channel capacity. Also, a channel assignment scheme should take the amount of traffic load supported by each mesh node into consideration.
Multipath Routing Protocol by Breadth First Search Algorithm in Wireless Mesh...IOSR Journals
This document proposes a multipath routing protocol for wireless mesh networks that uses a parallel layer-based approach and breadth-first search algorithm to discover multiple paths between a source and destination. It organizes nodes into layers based on distance from the destination and performs iterative breadth-first searches to find partial paths connecting nodes in lower layers, storing the partial paths. This process repeats until reaching the destination to find all possible paths. The primary path is then elected using an Expected Forwarding Counter metric to select the most reliable path. The protocol was evaluated in NS-2 and showed improved throughput, delivery ratio, and reduced delay compared to other protocols.
Heterogeneous LTE Networks and Inter-Cell Interference Coordination - Dec 201...Eiko Seidel
This document discusses heterogeneous LTE networks and inter-cell interference coordination (ICIC). It begins by explaining that initial LTE networks consisted of homogeneous macro cell deployments but that heterogeneous networks using smaller pico and femto cells are now being implemented to improve capacity and coverage. This introduces new interference challenges. The document then outlines various ICIC methods like frequency reuse and power control techniques that can help mitigate interference. It provides simulation results showing the benefits of heterogeneous networks and techniques like range expansion.
The improvement of end to end delays in network management system using netwo...IJCNCJournal
The document summarizes research on improving end-to-end delays in a network management system using network coding. Specifically, it applies network coding to manage radio and television broadcast stations in a wireless network. The study shows that a proposed "Fast Forwarding Strategy" using network coding outperforms a classical routing strategy in reducing end-to-end delays from source to destination. It analyzes end-to-end delays theoretically using network calculus and conducts a practical study on a network of broadcast stations, finding the proposed strategy reduces delays compared to the classical strategy.
A DDRESSING T HE M ULTICHANNEL S ELECTION , S CHEDULING A ND C OORDINATION...pijans
We discuss a new multichannel coordination and sche
duling challenge called the Multichannel Scheduling
Cost (MSC). It is caused by the inability of the co
ntrol channel to schedule simultaneous transmission
s
resulting in data channels lying idle and their ban
dwidth underutilized. As a result, wasted bandwidth
increases as the number of data channels increases.
To address this challenge, a cyclic scheduling
Algorithm (CSA) is proposed. It employs one dedicat
ed signaling channel and 4 data channels. It is
premised on a proactive channel reservation scheme
which reduces the idleness of channels. The scheme
ensures that data channels are reserved while they
are still busy. The data channels are reserved whil
e
their remaining transmission duration is equal to t
he virtual carrier sensing duration. This gives the
next
pair sufficient time to reserve the current data ch
annel before it becomes available, limiting the MSC
to the
first cycle. The simulation results show a performa
nce benefit of the CSA scheme in addressing the eff
ects
of the MSC
Macro with pico cells (hetnets) system behaviour using well known scheduling ...ijwmn
This paper demonstrates the concept of using Heterogeneous networks (HetNets) to improve Long Term Evolution (LTE) system by introducing the LTE Advance (LTE-A). The type of HetNets that has been chosen for this study is Macro with Pico cells. Comparing the system performance with and without Pico cells has clearly illustrated using three well-known scheduling algorithms (Proportional Fair PF, Maximum Largest Weighted Delay First MLWDF and Exponential/Proportional Fair EXP/PF). The system is judged based on throughput, Packet Loss Ratio PLR, delay and fairness.. A simulation platform called LTE-Sim has been used to collect the data and produce the paper’s outcomes and graphs. The results prove that adding Pico cells enhances the overall system performance. From the simulation outcomes, the overall system performance is as follows: throughput is duplicated or tripled based on the number of users, the PLR is almost quartered, the delay is nearly reduced ten times (PF case) and changed to be a half (MLWDF/EXP cases), and the fairness stays closer to value of 1. It is considered an efficient and cost effective way to increase the throughput, coverage and reduce the latency.
Performance Analysis of Ad-hoc on Demand Distance Vector Routing (AODV) and D...ijceronline
International Journal of Computational Engineering Research (IJCER) is dedicated to protecting personal information and will make every reasonable effort to handle collected information appropriately. All information collected, as well as related requests, will be handled as carefully and efficiently as possible in accordance with IJCER standards for integrity and objectivity.
This document analyzes the performance of the LTE physical layer under 3GPP standards parameters. It summarizes an analysis of downlink and uplink throughput for LTE operating in both FDD and TDD modes with different system bandwidths, antenna configurations, modulation schemes, and coding rates. The key results showed that LTE can support downlink throughputs up to 300Mbps with 20MHz bandwidth using MIMO 4x4, and uplink throughputs up to 75Mbps.
Improved AODV based on Load and Delay for Route Discovery in MANETIOSR Journals
This document proposes an improved AODV routing protocol for mobile ad hoc networks (MANETs) that considers both node load and routing delay when selecting routes. It calculates a "route weight" based on the average load and delay of the nodes along each potential path from source to destination. The path with the lowest route weight is then selected for routing to help balance traffic loads across the network and minimize delays. Simulation results showed this approach can dynamically balance traffic allocation between paths and optimize resource utilization in the MANET.
This document proposes a new cell selection and handover approach for heterogeneous LTE networks that considers additional criteria of base station capacity estimation and user speed. The proposed algorithm aims to improve network load balancing and user quality of service. It estimates base station capacity based on average resource availability over time and calculates user speed to reduce the impact of sudden speed changes on cell selection and handover decisions. Simulation results show the approach contributes to macrocell offloading, load balancing and improved user QoS.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
DESIGN OF A COMPACT CIRCULAR MICROSTRIP PATCH ANTENNA FOR WLAN APPLICATIONS pijans
This paper presents the design of a compact circular microstrip patch antenna for WLAN applications which covers the band 5.15 to 5.825 GHz. The antenna is designed using 1.4mm thick FR-4 (lossy)substrate with relative permittivity 4.4 and a microstrip line feed is used. The radius of the circular patch is chosen as 7.62mm. To reduce the size and enhance the performance of the proposed antenna, a circular slot is loaded on circular patch and a square slot is etched on the ground plane of dimension 30mm×30mm. Design of the antenna is carried out using CST Microsoft Studio Sonimulation Software. The proposed antenna resonates at 5.5 GHz with a wider bandwidth of 702 MHz and it provides low return loss of -31.58 dB, good gain of 3.23 dB and directivity of 4.28 dBi and high efficiency of around 79% against the resonance frequency. The geometry of the proposed circular antenna with reduced size and its various performance parameters such as return loss, bandwidth, VSWR, gain, directivity, efficiency and radiation pattern plots are presented and discussed.
MECC scheduling algorithm in vehicular environment for uplink transmission in...IJECEIAES
Single Carrier Frequency Division Multiple Access (SC-FDMA) is chosen because of the lower peak-to-average power ratio (PAPR) value in uplink transmission. However, the contiguity constraint is one of the major constraint presents in uplink packet scheduling, where all RBs allocated to a single UE must be contiguous in the frequency-domain within each time slot to maintain its single carrier. This paper proposed an uplink-scheduling algorithm namely the Maximum Expansion with Contiguity Constraints (MECC) algorithm, which supports both the RT and NRT services. The MECC algorithm is deployed in two stages. In the first stage, the RBs are allocated fairly among the UEs. The second stage allocates the RBs with the highest metric value and expands the allocation on both sides of the matrix, M with respect to the contiguity constraint. The performance of the MECC algorithm was observed in terms of throughput, fairness, delay, and Packet Loss Ratio (PLR) for VoIP, video and best effort flows. The MECC scheduling algorithm is compared to other algorithms namely the Round Robin (RR), Channel-Dependent First Maximum Expansion (CD-FME), and Proportional Fairness First Maximum Expansion (PF-FME). From here, it can be concluded that the MECC algorithm shows the best results among other algorithms by delivering the highest throughput which is up to 81.29% and 90.04% than CD-FME and RR scheduler for RT and NRT traffic respectively, having low PLR and delay which is up to 93.92% and 56.22% of improvement than CD-FME for the RT traffic flow. The MECC also has a satisfactory level of fairness for the cell-edge users in a vehicular environment of LTE network.
Evaluation of Energy Consumption of Reactive and Proactive Routing Protocols ...IJCNCJournal
Mobile Ad hoc Network (MANET) is a distributed, infrastructure-less and decentralized network. A routing
protocol in MANET is used to find routes between mobile nodes to facilitate communication within the
network. Numerous routing protocols have been proposed for MANET. Those routing protocols are
designed to adaptively accommodate for dynamic unpredictable changes in network's topology. The mobile
nodes in MANET are often powered by limited batteries and network lifetime relies heavily on the energy
consumption of nodes. In consequence, the lack of a mobile node can lead to network partitioning. In this
paper we analyse, evaluate and measure the energy efficiency of three prominent MANET routing protocols
namely DSR, AODV and OLSR in addition to modified protocols. These routing protocols follow the
reactive and the proactive routing schemes. A discussion and comparison highlighting their particular
merits and drawbacks are also presented. Evaluation study and simulations are performed using NS-2 and
its accompanying tools for analysis and investigation of results.
This document summarizes a research paper that proposes a new Position Based Opportunistic Routing Protocol (POR) to improve reliable data delivery in mobile ad hoc networks. Existing geographic routing protocols have issues with route failures and delays in discovering new routes when nodes move. The proposed POR protocol selects multiple forwarding candidate nodes to opportunistically forward packets. If the primary forwarder fails, backup candidates can forward packets to avoid transmission interruptions. Simulation results show the POR protocol has lower delay and higher packet delivery ratio compared to existing protocols.
Improved routing scheme with ACO in WSN in comparison to DSDVijsrd.com
Routing is the process of selecting best paths in a network in terms of energy and distance. In adhoc it is critical to collect the information in an efficient manner as it has limitations in terms of centralized congestion. In such case to perform the effective communication there is the requirement of some such routing approach that can provide the routing with optimized path. In this work, ACO based routing approach is defined to generate the optimized path in comparison to DSDV over the network. The presented approach is implemented in matlab environment and obtained results shows the effective results in terms of optimized path.
PERFORMANCE ANALYSIS OF OLSR PROTOCOL IN MANET CONSIDERING DIFFERENT MOBILITY...ijwmn
A Mobile Ad Hoc Network (MANET) is created when an independent mobile node network is connected
dynamically via wireless links. MANET is a self-organizing network that does not rely on pre-existing
infrastructure such as wired or wireless network routers. Mobile nodes in this network move randomly,
thus, the topology is always changing. Routing protocols in MANET are critical in ensuring dependable
and consistent connectivity between the mobile nodes. They conclude logically based on the interaction
between mobile nodes in MANET routing and encourage them to choose the optimum path between source
and destination. Routing protocols are classified as proactive, reactive, or hybrid. The focus of this project
will be on Optimized Link State Routing (OLSR) protocol, a proactive routing technique. OLSR is known as
the optimized variant of link state routing in which packets are sent throughout the network using the
multipoint relay (MPR) mechanism. This article evaluates the performance of the OLSR routing protocol
under condition of changing mobility speed and network density. The study's performance indicators are
average packet throughput, packet delivery ratio (PDR), and average packet latency. Network Simulator 2
(NS-2) and an external patch UM-OLSR are used to simulate and evaluate the performance of such
protocol. As a result of research, the approach of implementing the MPR mechanism are able to minimise
redundant data transmission during the normal message broadcast. The MPRs enhance the link state
protocols’ traditional diffusion mechanism by selecting the right MPRs. Hence, the number of undesired
broadcasts can be reduced and limited. Further research will focus on different scenario and environment
using different mobility model
Congestion Control in Manets Using Hybrid Routing ProtocolIOSR Journals
As the network size increases the probability of congestion occurrence at nodes increases. This is
because of the event driven nature of ad hoc networks that leads to unpredictable network load. As a result
congestion may occur at the nodes which receive more data than that can be forwarded and cause packet losses.
In this paper we propose a hybrid scheme that attempts to avoid packet loss due to congestion as well as reduce
end to end delay in delivering data packets by combining two protocols- Destination sequenced distance vector
routing (DSDV), which is a table driven or proactive protocol and Improved Ad-hoc on demand vector routing
(IAODV) which is an on-demand or reactive protocol that reduces packet loss due to congestion. The strategy
adopted is use DSDV for path selection and if congestion occurs than switch over to IAODV. The routing
performance of this model is then compared with IAODV and DSDV in terms of end to end delay, throughput
and packet delivery fraction
Ant colony optimization is an optimization technique inspired by the behavior of real ant colonies. The technique was introduced in the 1990s and uses indirect coordination between agents through pheromone trails to solve problems. Ants communicate by laying pheromone trails and tend to follow stronger trails, with the result that the paths between food sources emerge from their collective behavior without centralized control. The ant colony optimization algorithm applies this behavior to problems by having artificial "ants" probabilistically build solutions and adjust pheromone levels to guide future construction. The algorithm has been successfully applied to problems like the traveling salesman problem.
Ant colony optimization is a swarm intelligence technique inspired by the behavior of ants. It is used to find optimal paths or solutions to problems. The key aspects are that ants deposit pheromones as they move, influencing the paths other ants take, with shorter paths receiving more pheromones over time. This results in the emergence of the shortest path as the most favorable route. The algorithm is often applied to problems like the traveling salesman problem to find the shortest route between nodes.
The document discusses ant colony optimization (ACO), which is a metaheuristic algorithm inspired by the behavior of real ant colonies. It describes how real ants deposit pheromone trails to communicate indirectly and find the shortest path between their colony and food sources. The algorithm works by "artificial ants" probabilistically building solutions to optimization problems and adjusting pheromone levels based on solution quality, similar to how real ants reinforce shorter paths. It provides examples of how ACO has been applied to problems like the traveling salesman problem and discusses some extensions to the basic ACO algorithm.
Multipath Routing Protocol by Breadth First Search Algorithm in Wireless Mesh...IOSR Journals
This document proposes a multipath routing protocol for wireless mesh networks that uses a parallel layer-based approach and breadth-first search algorithm to discover multiple paths between a source and destination. It organizes nodes into layers based on distance from the destination and performs iterative breadth-first searches to find partial paths connecting nodes in lower layers, storing the partial paths. This process repeats until reaching the destination to find all possible paths. The primary path is then elected using an Expected Forwarding Counter metric to select the most reliable path. The protocol was evaluated in NS-2 and showed improved throughput, delivery ratio, and reduced delay compared to other protocols.
Heterogeneous LTE Networks and Inter-Cell Interference Coordination - Dec 201...Eiko Seidel
This document discusses heterogeneous LTE networks and inter-cell interference coordination (ICIC). It begins by explaining that initial LTE networks consisted of homogeneous macro cell deployments but that heterogeneous networks using smaller pico and femto cells are now being implemented to improve capacity and coverage. This introduces new interference challenges. The document then outlines various ICIC methods like frequency reuse and power control techniques that can help mitigate interference. It provides simulation results showing the benefits of heterogeneous networks and techniques like range expansion.
The improvement of end to end delays in network management system using netwo...IJCNCJournal
The document summarizes research on improving end-to-end delays in a network management system using network coding. Specifically, it applies network coding to manage radio and television broadcast stations in a wireless network. The study shows that a proposed "Fast Forwarding Strategy" using network coding outperforms a classical routing strategy in reducing end-to-end delays from source to destination. It analyzes end-to-end delays theoretically using network calculus and conducts a practical study on a network of broadcast stations, finding the proposed strategy reduces delays compared to the classical strategy.
A DDRESSING T HE M ULTICHANNEL S ELECTION , S CHEDULING A ND C OORDINATION...pijans
We discuss a new multichannel coordination and sche
duling challenge called the Multichannel Scheduling
Cost (MSC). It is caused by the inability of the co
ntrol channel to schedule simultaneous transmission
s
resulting in data channels lying idle and their ban
dwidth underutilized. As a result, wasted bandwidth
increases as the number of data channels increases.
To address this challenge, a cyclic scheduling
Algorithm (CSA) is proposed. It employs one dedicat
ed signaling channel and 4 data channels. It is
premised on a proactive channel reservation scheme
which reduces the idleness of channels. The scheme
ensures that data channels are reserved while they
are still busy. The data channels are reserved whil
e
their remaining transmission duration is equal to t
he virtual carrier sensing duration. This gives the
next
pair sufficient time to reserve the current data ch
annel before it becomes available, limiting the MSC
to the
first cycle. The simulation results show a performa
nce benefit of the CSA scheme in addressing the eff
ects
of the MSC
Macro with pico cells (hetnets) system behaviour using well known scheduling ...ijwmn
This paper demonstrates the concept of using Heterogeneous networks (HetNets) to improve Long Term Evolution (LTE) system by introducing the LTE Advance (LTE-A). The type of HetNets that has been chosen for this study is Macro with Pico cells. Comparing the system performance with and without Pico cells has clearly illustrated using three well-known scheduling algorithms (Proportional Fair PF, Maximum Largest Weighted Delay First MLWDF and Exponential/Proportional Fair EXP/PF). The system is judged based on throughput, Packet Loss Ratio PLR, delay and fairness.. A simulation platform called LTE-Sim has been used to collect the data and produce the paper’s outcomes and graphs. The results prove that adding Pico cells enhances the overall system performance. From the simulation outcomes, the overall system performance is as follows: throughput is duplicated or tripled based on the number of users, the PLR is almost quartered, the delay is nearly reduced ten times (PF case) and changed to be a half (MLWDF/EXP cases), and the fairness stays closer to value of 1. It is considered an efficient and cost effective way to increase the throughput, coverage and reduce the latency.
Performance Analysis of Ad-hoc on Demand Distance Vector Routing (AODV) and D...ijceronline
International Journal of Computational Engineering Research (IJCER) is dedicated to protecting personal information and will make every reasonable effort to handle collected information appropriately. All information collected, as well as related requests, will be handled as carefully and efficiently as possible in accordance with IJCER standards for integrity and objectivity.
This document analyzes the performance of the LTE physical layer under 3GPP standards parameters. It summarizes an analysis of downlink and uplink throughput for LTE operating in both FDD and TDD modes with different system bandwidths, antenna configurations, modulation schemes, and coding rates. The key results showed that LTE can support downlink throughputs up to 300Mbps with 20MHz bandwidth using MIMO 4x4, and uplink throughputs up to 75Mbps.
Improved AODV based on Load and Delay for Route Discovery in MANETIOSR Journals
This document proposes an improved AODV routing protocol for mobile ad hoc networks (MANETs) that considers both node load and routing delay when selecting routes. It calculates a "route weight" based on the average load and delay of the nodes along each potential path from source to destination. The path with the lowest route weight is then selected for routing to help balance traffic loads across the network and minimize delays. Simulation results showed this approach can dynamically balance traffic allocation between paths and optimize resource utilization in the MANET.
This document proposes a new cell selection and handover approach for heterogeneous LTE networks that considers additional criteria of base station capacity estimation and user speed. The proposed algorithm aims to improve network load balancing and user quality of service. It estimates base station capacity based on average resource availability over time and calculates user speed to reduce the impact of sudden speed changes on cell selection and handover decisions. Simulation results show the approach contributes to macrocell offloading, load balancing and improved user QoS.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
DESIGN OF A COMPACT CIRCULAR MICROSTRIP PATCH ANTENNA FOR WLAN APPLICATIONS pijans
This paper presents the design of a compact circular microstrip patch antenna for WLAN applications which covers the band 5.15 to 5.825 GHz. The antenna is designed using 1.4mm thick FR-4 (lossy)substrate with relative permittivity 4.4 and a microstrip line feed is used. The radius of the circular patch is chosen as 7.62mm. To reduce the size and enhance the performance of the proposed antenna, a circular slot is loaded on circular patch and a square slot is etched on the ground plane of dimension 30mm×30mm. Design of the antenna is carried out using CST Microsoft Studio Sonimulation Software. The proposed antenna resonates at 5.5 GHz with a wider bandwidth of 702 MHz and it provides low return loss of -31.58 dB, good gain of 3.23 dB and directivity of 4.28 dBi and high efficiency of around 79% against the resonance frequency. The geometry of the proposed circular antenna with reduced size and its various performance parameters such as return loss, bandwidth, VSWR, gain, directivity, efficiency and radiation pattern plots are presented and discussed.
MECC scheduling algorithm in vehicular environment for uplink transmission in...IJECEIAES
Single Carrier Frequency Division Multiple Access (SC-FDMA) is chosen because of the lower peak-to-average power ratio (PAPR) value in uplink transmission. However, the contiguity constraint is one of the major constraint presents in uplink packet scheduling, where all RBs allocated to a single UE must be contiguous in the frequency-domain within each time slot to maintain its single carrier. This paper proposed an uplink-scheduling algorithm namely the Maximum Expansion with Contiguity Constraints (MECC) algorithm, which supports both the RT and NRT services. The MECC algorithm is deployed in two stages. In the first stage, the RBs are allocated fairly among the UEs. The second stage allocates the RBs with the highest metric value and expands the allocation on both sides of the matrix, M with respect to the contiguity constraint. The performance of the MECC algorithm was observed in terms of throughput, fairness, delay, and Packet Loss Ratio (PLR) for VoIP, video and best effort flows. The MECC scheduling algorithm is compared to other algorithms namely the Round Robin (RR), Channel-Dependent First Maximum Expansion (CD-FME), and Proportional Fairness First Maximum Expansion (PF-FME). From here, it can be concluded that the MECC algorithm shows the best results among other algorithms by delivering the highest throughput which is up to 81.29% and 90.04% than CD-FME and RR scheduler for RT and NRT traffic respectively, having low PLR and delay which is up to 93.92% and 56.22% of improvement than CD-FME for the RT traffic flow. The MECC also has a satisfactory level of fairness for the cell-edge users in a vehicular environment of LTE network.
Evaluation of Energy Consumption of Reactive and Proactive Routing Protocols ...IJCNCJournal
Mobile Ad hoc Network (MANET) is a distributed, infrastructure-less and decentralized network. A routing
protocol in MANET is used to find routes between mobile nodes to facilitate communication within the
network. Numerous routing protocols have been proposed for MANET. Those routing protocols are
designed to adaptively accommodate for dynamic unpredictable changes in network's topology. The mobile
nodes in MANET are often powered by limited batteries and network lifetime relies heavily on the energy
consumption of nodes. In consequence, the lack of a mobile node can lead to network partitioning. In this
paper we analyse, evaluate and measure the energy efficiency of three prominent MANET routing protocols
namely DSR, AODV and OLSR in addition to modified protocols. These routing protocols follow the
reactive and the proactive routing schemes. A discussion and comparison highlighting their particular
merits and drawbacks are also presented. Evaluation study and simulations are performed using NS-2 and
its accompanying tools for analysis and investigation of results.
This document summarizes a research paper that proposes a new Position Based Opportunistic Routing Protocol (POR) to improve reliable data delivery in mobile ad hoc networks. Existing geographic routing protocols have issues with route failures and delays in discovering new routes when nodes move. The proposed POR protocol selects multiple forwarding candidate nodes to opportunistically forward packets. If the primary forwarder fails, backup candidates can forward packets to avoid transmission interruptions. Simulation results show the POR protocol has lower delay and higher packet delivery ratio compared to existing protocols.
Improved routing scheme with ACO in WSN in comparison to DSDVijsrd.com
Routing is the process of selecting best paths in a network in terms of energy and distance. In adhoc it is critical to collect the information in an efficient manner as it has limitations in terms of centralized congestion. In such case to perform the effective communication there is the requirement of some such routing approach that can provide the routing with optimized path. In this work, ACO based routing approach is defined to generate the optimized path in comparison to DSDV over the network. The presented approach is implemented in matlab environment and obtained results shows the effective results in terms of optimized path.
PERFORMANCE ANALYSIS OF OLSR PROTOCOL IN MANET CONSIDERING DIFFERENT MOBILITY...ijwmn
A Mobile Ad Hoc Network (MANET) is created when an independent mobile node network is connected
dynamically via wireless links. MANET is a self-organizing network that does not rely on pre-existing
infrastructure such as wired or wireless network routers. Mobile nodes in this network move randomly,
thus, the topology is always changing. Routing protocols in MANET are critical in ensuring dependable
and consistent connectivity between the mobile nodes. They conclude logically based on the interaction
between mobile nodes in MANET routing and encourage them to choose the optimum path between source
and destination. Routing protocols are classified as proactive, reactive, or hybrid. The focus of this project
will be on Optimized Link State Routing (OLSR) protocol, a proactive routing technique. OLSR is known as
the optimized variant of link state routing in which packets are sent throughout the network using the
multipoint relay (MPR) mechanism. This article evaluates the performance of the OLSR routing protocol
under condition of changing mobility speed and network density. The study's performance indicators are
average packet throughput, packet delivery ratio (PDR), and average packet latency. Network Simulator 2
(NS-2) and an external patch UM-OLSR are used to simulate and evaluate the performance of such
protocol. As a result of research, the approach of implementing the MPR mechanism are able to minimise
redundant data transmission during the normal message broadcast. The MPRs enhance the link state
protocols’ traditional diffusion mechanism by selecting the right MPRs. Hence, the number of undesired
broadcasts can be reduced and limited. Further research will focus on different scenario and environment
using different mobility model
Congestion Control in Manets Using Hybrid Routing ProtocolIOSR Journals
As the network size increases the probability of congestion occurrence at nodes increases. This is
because of the event driven nature of ad hoc networks that leads to unpredictable network load. As a result
congestion may occur at the nodes which receive more data than that can be forwarded and cause packet losses.
In this paper we propose a hybrid scheme that attempts to avoid packet loss due to congestion as well as reduce
end to end delay in delivering data packets by combining two protocols- Destination sequenced distance vector
routing (DSDV), which is a table driven or proactive protocol and Improved Ad-hoc on demand vector routing
(IAODV) which is an on-demand or reactive protocol that reduces packet loss due to congestion. The strategy
adopted is use DSDV for path selection and if congestion occurs than switch over to IAODV. The routing
performance of this model is then compared with IAODV and DSDV in terms of end to end delay, throughput
and packet delivery fraction
Ant colony optimization is an optimization technique inspired by the behavior of real ant colonies. The technique was introduced in the 1990s and uses indirect coordination between agents through pheromone trails to solve problems. Ants communicate by laying pheromone trails and tend to follow stronger trails, with the result that the paths between food sources emerge from their collective behavior without centralized control. The ant colony optimization algorithm applies this behavior to problems by having artificial "ants" probabilistically build solutions and adjust pheromone levels to guide future construction. The algorithm has been successfully applied to problems like the traveling salesman problem.
Ant colony optimization is a swarm intelligence technique inspired by the behavior of ants. It is used to find optimal paths or solutions to problems. The key aspects are that ants deposit pheromones as they move, influencing the paths other ants take, with shorter paths receiving more pheromones over time. This results in the emergence of the shortest path as the most favorable route. The algorithm is often applied to problems like the traveling salesman problem to find the shortest route between nodes.
The document discusses ant colony optimization (ACO), which is a metaheuristic algorithm inspired by the behavior of real ant colonies. It describes how real ants deposit pheromone trails to communicate indirectly and find the shortest path between their colony and food sources. The algorithm works by "artificial ants" probabilistically building solutions to optimization problems and adjusting pheromone levels based on solution quality, similar to how real ants reinforce shorter paths. It provides examples of how ACO has been applied to problems like the traveling salesman problem and discusses some extensions to the basic ACO algorithm.
Soft computing is an emerging approach to computing that aims to mimic human reasoning and learning in uncertain and imprecise environments. It includes neural networks, fuzzy logic, and genetic algorithms. The main goals of soft computing are to develop intelligent machines to solve real-world problems that are difficult to model mathematically, while exploiting tolerance for uncertainty like humans. Some applications of soft computing include consumer appliances, robotics, food preparation devices, and game playing. Soft computing is well-suited for problems not solvable by traditional computing due to its characteristics of tractability, low cost, and high machine intelligence.
The document discusses various optimization methods used in the pharmaceutical industry including evolutionary operations, simplex method, Lagrangian method, search method, and canonical analysis. It provides examples of how each method can be applied to optimize different parameters of a tablet formulation such as concentrations of excipients, compression force, and disintegrant levels to minimize disintegration time and friability while meeting constraints. The search method example involves using a five-factor central composite design to optimize tablet properties and identify the best formulation based on constraints for multiple response variables.
ADAPTIVE HANDOVER HYSTERESIS AND CALL ADMISSION CONTROL FOR MOBILE RELAY NODESIJCNCJournal
The aim of equipping a wireless network with a mobile relay node is to support broadband wireless communications for vehicular users and their devices. The high mobility of vehicular users, possibly at a very high velocity in the area in which two cells overlap, could cause the network to suffer from a reduced handover success rate and, hence, increased radio link failure. The combined impact of these problems is service interruptions to vehicular users. Thus, the handover schemes are crucial in solving these problems. In this work, we first present the adaptive handover hysteresis scheme for the wireless network with mobile relay nodes in the high-speed train scenario. Specifically, our proposed adaptive hysteresis scheme is based on the velocity of the train. Second, the handover call dropping probability is reduced by introducing a modified call admission control scheme to support radio resource reservation for handover calls that prioritizes handover calls of mobile relay over the other calls. The proposed solution in which adaptive parameter is combined with call admission control is evaluated by system level simulation. Our simulation results illustrate an increased handover success rate and reduced radio link failures.
Spectrum Sharing between Cellular and Wi-Fi Networks based on Deep Reinforcem...IJCNCJournal
Recently, mobile traf ic is growing rapidly and spectrum resources are becoming scarce in wireless
networks. Due to this, the wireless network capacity will not meet the traf ic demand. To address this
problem, using cellular systems in an unlicensed spectrum emerged as an ef ective solution. In this case,
cellular systems need to coexist with Wi-Fi and other systems. For that, we propose an ef icient channel
assignment method for Wi-Fi AP and cellular NB, based on the DRL method. To train the DDQN model,
we implement an emulator as an environment for spectrum sharing in densely deployed NB and APs in
wireless heterogeneous networks. Our proposed DDQN algorithm improves the average throughput from
25.5% to 48.7% in dif erent user arrival rates compared to the conventional method. We evaluated the
generalization performance of the trained agent, to confirm channel allocation ef iciency in terms of
average throughput under the dif erent user arrival rates
Spectrum Sharing between Cellular and Wi-Fi Networks based on Deep Reinforcem...IJCNCJournal
Recently, mobile traffic is growing rapidly and spectrum resources are becoming scarce in wireless networks. Due to this, the wireless network capacity will not meet the traffic demand. To address this problem, using cellular systems in an unlicensed spectrum emerged as an effective solution. In this case, cellular systems need to coexist with Wi-Fi and other systems. For that, we propose an efficient channel assignment method for Wi-Fi AP and cellular NB, based on the DRL method. To train the DDQN model, we implement an emulator as an environment for spectrum sharing in densely deployed NB and APs in wireless heterogeneous networks. Our proposed DDQN algorithm improves the average throughput from 25.5% to 48.7% in different user arrival rates compared to the conventional method. We evaluated the generalization performance of the trained agent, to confirm channel allocation efficiency in terms of average throughput under the different user arrival rates.
PERFORMANCE ANALYSIS OF RESOURCE SCHEDULING IN LTE FEMTOCELLS NETWORKScscpconf
3GPP has introduced LTE Femtocells to manipulate the traffic for indoor users and to minimize the charge on the Macro cells. A key mechanism in the LTE traffic handling is the packet
scheduler which is in charge of allocating resources to active flows in both the frequency and time dimension. So several scheduling algorithms need to be analyzed for femtocells networks. In this paper we introduce a performance analysis of three distinct scheduling algorithms of mixed type of traffic flows in LTE femtocells networks. The particularly study is evaluated in terms of throughput, packet loss ratio, fairness index and spectral efficiency.
Fuzzy Based Vertical Handoff Decision Controller for Future NetworksIJAEMSJORNAL
Abstract— In Next generation wireless Networks, the received signals (RSS) from different networks do not have a same meaning since each network is composed of its specific characteristics and there is no common pilot signal. Then, RSS comparisons are insufficient for handoff decision and may be inefficient and impractical. A more complex decision criterion that combines a large number of parameters or factors such as monetary cost, bandwidth, and power consumption and user profile is necessary. Though there are a lot works available for vertical handoff decision (VHD) for wireless networks, the selection of best network is still challenging problem. In this paper we propose a Fuzzy based vertical handoff decision controller (FVHDC) Which performs handover decision based on the output of fuzzy based rules.
LTE is an emerging wireless data communication technology to provide broadband ubiquitous Internet
access. Femtocells are included in 3GPP since Release 8 to enhance the indoor network coverage and
capacity. The main challenge of mobility management in hierarchical LTE structure is to guarantee
efficient handover to or from/to/between Femtocells. This paper focuses, on different types of Handover
and comparison performance between different decision algorithms. Furthermore, a speed based Handover
algorithm for macro-femto scenario is proposed with simulation results
An Enhanced Algorithm for Load-based Handover Decision-making in 5G Wireless ...IRJET Journal
This paper proposes an enhanced algorithm for load-based handover decision making in 5G wireless networks. The current handover decision making process does not consider the load of potential target cells, which can lead to handover failures if a user is handed over to an overloaded cell. The proposed algorithm uses fuzzy logic to determine if a candidate cell is suitable for handover based on its current load. Simulation results show the new algorithm improves network load balancing and reduces handover failures compared to existing methods.
Call Admission Control Scheme With Multimedia Scheduling Service in WiMAX Net...Waqas Tariq
WiMAX network introduces a multimedia data scheduling service with different quality of service (QoS) requirements. Transmission opportunities are scheduled by the service according to the types of traffic data for the different connections or users. In the paper, we first propose a uniform definition of QoS level for the multimedia data types in the service. The QoS level of a connection are determined by the type of data of the connection and its allocated resources. Based on these QoS levels, we propose a call admission control (CAC) scheme for the entry admission of a new connection without degrading the network performance and the QoS of ongoing connections. The key idea of this scheme is to regulate the arriving traffic of the network such that the network can work at an optimal point, given under a heavy load traffic. Taking advantage of the simulation experiments, we confirm the fact that the proposed scheme can achieve better trade-off between the overall performance of network system and the QoS level of individual connection.
A SURVEY ON CALL ADMISSION CONTROL SCHEMES IN LTEIJCSES Journal
The growing number of mobile users with diverse applications such as VoIP, video, internet surfing etc. has made LTE networks to adopt a CAC strategy in order to ensure the quality of service (QoS) requirements of these applications. Over the years, several CAC schemes have been proposed to either accept or reject service requests. This paper presents a survey of these schemes under four different classes. The classes are: Bandwidth Reservation (BR), Bandwidth Degradation (BD), BR and BD and Non-BR and Non-BD (NBR-NBD). In each of the classification, the operation procedure, strengths and weaknesses of each scheme has been discussed. Furthermore, a comparative analysis of these schemes is also presented. The analysis provides insight into the challenges in the design of CAC by highlighting open research issues for future directions.
Handover management scheme in LTE FEMTOCELL networksijcsit
This document discusses handover management in LTE femtocell networks. It presents the architecture of LTE femtocell networks and investigates different handover scenarios, particularly macrocell to femtocell handover which is difficult due to the large number of candidate femtocells. The document proposes using the HeNB Policy Function entity to optimize handover decision making by selecting the target femtocell based on constraints to make the optimal decision and reduce unnecessary handovers. An analytical model is also presented to evaluate handover signalling costs.
HANDOVER NECESSITY ESTIMATION FOR 4G HETEROGENEOUS NETWORKSijistjournal
One of the most challenges of 4G network is to have a unified network of heterogeneous wireless networks. To achieve seamless mobility in such a diverse environment, vertical hand off is still a challenging problem. In many situations handover failures and unnecessary handoffs are triggered causing degradation of services, reduction in throughput and increase the blocking probability and packet loss. In this paper a new vertical handoff decision algorithm handover necessity estimation (HNE), is proposed to minimize the number of handover failure and unnecessary handover in heterogeneous wireless networks. we have proposed a multi criteria vertical handoff decision algorithm based on two parts: traveling time estimation and time threshold calculation. Our proposed methods are compared against two other methods: (a) the fixed RSS threshold based method, in which handovers between the cellular network and the WLAN are initiated when the RSS from the WLAN reaches a fixed threshold, and (b) the hysteresis based method, in which a hysteresis is introduced to prevent the ping-pong effect. Simulation results show that, this method reduced the number of handover failures and unnecessary handovers up to 80% and 70%, respectively.
HANDOVER NECESSITY ESTIMATION FOR 4G HETEROGENEOUS NETWORKSijistjournal
One of the most challenges of 4G network is to have a unified network of heterogeneous wireless networks. To achieve seamless mobility in such a diverse environment, vertical hand off is still a challenging problem. In many situations handover failures and unnecessary handoffs are triggered causing degradation of services, reduction in throughput and increase the blocking probability and packet loss. In this paper a new vertical handoff decision algorithm handover necessity estimation (HNE), is proposed to minimize the number of handover failure and unnecessary handover in heterogeneous wireless networks. we have proposed a multi criteria vertical handoff decision algorithm based on two parts: traveling time estimation and time threshold calculation. Our proposed methods are compared against two other methods: (a) the fixed RSS threshold based method, in which handovers between the cellular network and the WLAN are initiated when the RSS from the WLAN reaches a fixed threshold, and (b) the hysteresis based method, in which a hysteresis is introduced to prevent the ping-pong effect. Simulation results show that, this method reduced the number of handover failures and unnecessary handovers up to 80% and 70%, respectively.
PERFORMANCE EVALUATION OF VERTICAL HARD HANDOVERS IN CELLULAR MOBILE SYSTEMSijngnjournal
With the rapid increase of new and diverse cellular mobile services, the overlapping of cells has become typical in the majority of the coverage area of the network. Vertical handovers occur between two layers of cells when a user is switched from one layer to the other. In this paper we investigate the influence of network parameters on vertical hard handover performance in a cell environment. The work considers two layers of cells: a layer of macrocells and a layer of microcells. Handover requests enter the macrocell from neighbor macrocells and from microcells that belong to a different layer. Using Markov chain analysis and simulation we calculate network performance parameters such as mean queue delay, handover dropping probability and channel utilization. We also compare the handover performance for the macrocell and macrocell traffic separately. Our results show the influence of total channels, maximum queue size and handover request arrival rate on handover performance. They also show that when the traffic from each layer is treated with equal priority in the system, the performance of each layer is comparable.
PERFORMANCE EVALUATION OF VERTICAL HARD HANDOVERS IN CELLULAR MOBILE SYSTEMSijngnjournal
With the rapid increase of new and diverse cellular mobile services, the overlapping of cells has become typical in the majority of the coverage area of the network. Vertical handovers occur between two layers of cells when a user is switched from one layer to the other. In this paper we investigate the influence of network parameters on vertical hard handover performance in a cell environment. The work considers two layers of cells: a layer of macrocells and a layer of microcells. Handover requests enter the macrocell from neighbor macrocells and from microcells that belong to a different layer. Using Markov chain analysis and simulation we calculate network performance parameters such as mean queue delay, handover dropping probability and channel utilization. We also compare the handover performance for the macrocell and macrocell traffic separately. Our results show the influence of total channels, maximum queue size and handover request arrival rate on handover performance. They also show that when the traffic from each layer is treated with equal priority in the system, the performance of each layer is comparable.
PERFORMANCE EVALUATION OF VERTICAL HARD HANDOVERS IN CELLULAR MOBILE SYSTEMSjosephjonse
With the rapid increase of new and diverse cellular mobile services, the overlapping of cells has become typical in the majority of the coverage area of the network. Vertical handovers occur between two layers of cells when a user is switched from one layer to the other. In this paper we investigate the influence of network parameters on vertical hard handover performance in a cell environment. The work considers two layers of cells: a layer of macrocells and a layer of microcells. Handover requests enter the macrocell from neighbor macrocells and from microcells that belong to a different layer. Using Markov chain analysis and simulation we calculate network performance parameters such as mean queue delay, handover dropping probability and channel utilization. We also compare the handover performance for the macrocell and macrocell traffic separately. Our results show the influence of total channels, maximum queue size and handover request arrival rate on handover performance. They also show that when the traffic from each layer is treated with equal priority in the system, the performance of each layer is comparable.
Performance Evaluation of Vertical Hard Handovers in Cellular Mobile Systemsjosephjonse
With the rapid increase of new and diverse cellular mobile services, the overlapping of cells has become typical in the majority of the coverage area of the network. Vertical handovers occur between two layers of cells when a user is switched from one layer to the other. In this paper we investigate the influence of network parameters on vertical hard handover performance in a cell environment. The work considers two layers of cells: a layer of macrocells and a layer of microcells. Handover requests enter the macrocell from neighbor macrocells and from microcells that belong to a different layer. Using Markov chain analysis and simulation we calculate network performance parameters such as mean queue delay, handover dropping probability and channel utilization. We also compare the handover performance for the macrocell and macrocell traffic separately. Our results show the influence of total channels, maximum queue size and handover request arrival rate on handover performance. They also show that when the traffic from each layer is treated with equal priority in the system, the performance of each layer is comparable.
Performance Evaluation of Vertical Hard Handovers in Cellular Mobile Systemsjosephjonse
With the rapid increase of new and diverse cellular mobile services, the overlapping of cells has become typical in the majority of the coverage area of the network. Vertical handovers occur between two layers of cells when a user is switched from one layer to the other. In this paper we investigate the influence of network parameters on vertical hard handover performance in a cell environment. The work considers two layers of cells: a layer of macrocells and a layer of microcells. Handover requests enter the macrocell from neighbor macrocells and from microcells that belong to a different layer. Using Markov chain analysis and simulation we calculate network performance parameters such as mean queue delay, handover dropping probability and channel utilization. We also compare the handover performance for the macrocell and macrocell traffic separately. Our results show the influence of total channels, maximum queue size and handover request arrival rate on handover performance. They also show that when the traffic from each layer is treated with equal priority in the system, the performance of each layer is comparable.
NOVEL POSITION ESTIMATION USING DIFFERENTIAL TIMING INFORMATION FOR ASYNCHRON...IJCNCJournal
Positioning techniques have been a common objective since the early development of wireless networks. However, current positioning methods in cellular networks, for instance, are still primarily focused on the use of the Global Navigation Satellite System (GNSS), which has several limitations, like high power drainage and failure in indoor scenarios. This study introduces a novel approach employing standard LTE signaling in order to provide high accuracy positioning estimation. The proposed technique is designed in analogy to the human sound localization system, eliminating the need of having information from three spatially diverse Base Stations (BSs). This is inspired by the perfect human 3D sound localization with two ears. A field study is carried out in a dense urban city to verify the accuracy of the proposed technique, with more than 20 thousand measurement samples collected. The achieved positioning accuracy is meeting the latest Federal Communications Commission (FCC) requirements in the planner dimension.
An efficient vertical handoff mechanism for future mobile networkBasil John
This document proposes a novel fuzzy logic based vertical handoff decision algorithm for heterogeneous wireless networks. It introduces a speed-adaptive system discovery scheme to improve the update rate of candidate networks based on the mobile terminal's speed. It also includes a pre-handoff decision method to quickly filter candidate networks and reduce unnecessary handoffs. The key aspects of the proposed algorithm are: 1) It uses a speed-adaptive scheme to dynamically adjust the discovery of candidate networks. 2) It employs a pre-handoff decision method to filter networks and reduce ping-pong effects. 3) It applies fuzzy logic to evaluate multiple parameters like bandwidth, RSS, and cost to select the best network. Simulations show it outperforms traditional RSS-based
PERFORMANCE ANALYSIS OF THE LINK-ADAPTIVE COOPERATIVE AMPLIFY-AND-FORWARD REL...IJCNCJournal
This paper analyzes the performance of cooperative amplify-and-forward (CAF) relay networks that
employ adaptive M-ary quadrature amplitude modulation (M-QAM)/M-ary phase shift keying (M-PSK)
digital modulation techniques in Nakagami-m fading channel. In particular, we present and compared the
analysis of CAF relay networks with different cooperative diversity and opportunistic routing strategies
such as regular Maximal Ratio Combining (MRC), Selection Diversity Combining (SDC), Opportunistic
Relay Selection with Maximal Ratio Combining (ORS-MRC) and Opportunistic Relay Selection with
Selection Diversity Combining (ORS-SDC). We advocate a simple yet unified numerical approach based on
the marginal moment generating function (MGF) of the total received SNR to compute the average symbol
error rate (ASER), mean achievable spectral efficiency, and outage probability performance metrics.
PERFORMANCE ANALYSIS OF THE LINK-ADAPTIVE COOPERATIVE AMPLIFY-AND-FORWARD REL...
Im2009
1. On Self-Optimization of the Random Access Procedure
in 3G Long Term Evolution
Mehdi Amirijoo, Pål Frenger, Fredrik Gunnarsson, Johan Moe, Kristina Zetterberg
Wireless Access Networks,
Ericsson Research, Ericsson AB, Sweden.
{mehdi.amirijoo, pal.frenger, fredrik.gunnarsson, johan.moe, kristina.zetterberg}@ericsson.com
Abstract—Operationally efficient radio networks typically feature a
high degree of self-organization. This means less planning efforts
and manual intervention, and a potential for better radio resource
utilization when network elements adapts its operation to the
observed local conditions. The focus in this paper is self-
optimization of the random access channel (RACH) in the 3G Long
Term Evolution (LTE). A comprehensive tutorial about the RACH
procedure is provided to span the complexity of the self-
optimization. Moreover, the paper addresses RACH key
performance metrics and appropriate modeling of the various steps
and components of the procedure. Finally, some coupling between
parameters and key performance metrics as well as self-
optimization examples are presented together with a feasibility
discussion. The main ambition with this workshop paper is to
present and define a relevant set of self-optimization problems,
rather than to provide a complete solution.
Keywords – 3GPP; LTE; Self-Organization; Random
Access;RACH; E-UTRAN; Self-Tuning; Self-Optimization
I. INTRODUCTION
There is a strong momentum for Self-Organizing Network
(SON) features in wireless communication networks, both via
requirements from operators and through standardization work.
The Next Generation Mobile Network (NGMN) association of
operators brings forward requirements on management simplicity
and cost efficiency [1]. The vision is that algorithms automate
tasks that currently require significant planning efforts. In
parallel, the 3rd
Generation Partnership Program (3GPP) works
on specifications for 3G Long Term Evolution (LTE), and SON
is central in the network management and optimization
discussions [2]. SON can mean vastly different things, but three
components are central
• Self-configuration, i.e. plug and play functionality
where network elements are configured (identity
allocation, software upgrade, communication link
establishment, etc) automatically.
• Self-optimization, i.e. a more or less continuous
adaptation of parameters to meet specified
requirements, typically specified at a high level.
• Self-healing, i.e. algorithms to handle disruptive
events and to minimize negative consequences on
services.
The random access procedure in LTE can benefit from self-
optimization. A mobile (User Equipment, UE in LTE) in an idle
state is essentially unknown to the network (except for some
rough localization information). In order to establish a relation to
the network, for example to initiate some service, the mobile
scans the carrier frequencies to determine the most suitable cell
and associated base station (eNodeB or eNB in LTE) for
communication. The broadcast information from this base station
provides the mobile with cell-specific random access procedure
details. Optimal random access performance is central to obtain
intended coverage and low delays, while avoiding excessive
interference to communication links in other cells and
maintaining a desired balance in the radio resource allocation
between random access and data services.. The considered delays
include call setup delays, session resuming delays, handover
delays, etc. The challenge is to balance the resource allocation
between random access and other communication needs, while
adapting to local radio characteristics, cell size and variations in
terms of traffic in the cell and neighboring cells.
One approach to random access procedure configuration is to
use a set of standard parameter values in all base stations,
typically based on extensive simulations. This may, however,
result in a suboptimal performance since the cell-specific
characteristics are not catered for. Another approach is to – by
means of simulation, prediction, or field trials – evaluate a wide
range of random access parameters and choose those cell-specific
settings that satisfy given requirements. The drawbacks include
the need for extensive simulation, planning and/or field trial
efforts. Furthermore, it is difficult to be responsive to variations
in the radio network, not the least due to gradual deployment of
additional network elements. Therefore, self-optimization of the
random access procedure has great potential.
Self-organization and tuning have been previously addressed
in the literature. For an overview on autonomic communication
in networks refer to [3]. Automation of neighbor relation lists has
received some attention lately [4][5]. Several publications related
to automation in 3G networks exists, e.g., capacity and coverage
balancing [6][7], and admission control [8]. The project
29978-1-4244-3924-9/09/$25.00 c 2009 IEEE
2. SOCRATES aims at the development of self-organization
methods for future wireless access networks [9]. Papers [10][11]
address WCDMA random access optimization by means of
simulations.
The outline of this paper is as follows. Section II gives an
extensive tutorial on the random access procedure in LTE, while
Section III addresses relevant performance specification aspects
and modeling. Selected experiments in Section IV illustrate the
relation between random access parameters and traffic on one
hand and performance of the other, and Section V gives a self-
optimization example, before Section VI concludes the paper.
II. RANDOM ACCESS PROCEDURE IN LTE
The random access procedure in LTE is performed at any of
the following five events: i) initial access of an idle mobile, ii) re-
establishment after radio link failure, iii) handover to a different
cell, iv) downlink data transmission to a mobile, which is out of
time-synchronization, and v) uplink data transmission from an
out-of-synch mobile. In all cases, one objective is to establish
uplink time synchronization, while in some it also provides the
means for the mobile to notify the network about its presence,
and for network to give the mobile initial access. At events iii) to
and v), the serving base station can control the procedure to avoid
collisions and ambiguities in the random access (non-contention
based procedure). However, in the general case, the possibility of
a collision, or contention, between different users’ access
attempts needs to be handled (contention-based procedure). The
former is essentially a simpler version of the latter.
Prior to sending the random access preamble, the mobile
performs cell selection if necessary, and establishes downlink
synchronization. The mobile acquires broadcasted information
about the random access resources and procedure configuration.
These parameters are further described in the following
subsections. For further details on the random access procedure
in LTE, see [12][13][14][15][16].
A. Random Access Physical Resources
The random access physical resource consists of a set of
preambles, a set of formats, and a set of random access
opportunities.
1) Random Access Preambles
The requirements on the sequence comprising the preamble
are two-fold: good correlation properties to allow precise arrival
time estimation and low correlation with other preambles to
suppress interference from other mobiles. A sequence that has
ideal such properties is the Zadoff-Chu sequence (root sequence)
[14][17]. The periodic auto-correlation function (ACF) of a
Zadoff-Chu sequence is only non-zero at time-lag zero (and
periodic extensions) and the magnitude of the correlation with
other sequences is equal to the square-root of the sequence length
N. In LTE, the sequence length N = 839.
Multiple preamble sequences can be derived from one
Zadoff-Chu sequence by cyclically shifting the sequence. Each
cell is assigned 64 preambles [14]. For small cells up to 1.5 km
radii all 64 preambles can be derived from a single root sequence
and are therefore orthogonal to each other. In larger cells not all
preambles can be derived from a single root sequence and
multiple root sequences must be allocated to a cell. Preambles
derived from different root sequences are not orthogonal to each
other, but the cross-correlation is low.
High mobile velocities relative to the base station cause
additional correlation peaks, which lead to ambiguous timing
determination. In order to cope with this problem in LTE high-
speed mode root sequences are defined, for which certain cyclic
shift values are disabled so that transmitted preamble and round
trip time can uniquely be identified.
2) Random Access Formats
The transmitted preambles travel along different paths to the
receiver, causing a delay spread of the received preamble. By
adopting a cyclic prefix (the last part of the preamble is copied
and prefixed the preamble before transmission), the receiver can
suppress this spread. Furthermore, random access coverage is
related to the maximum transmission power of the mobile. For
large cells, some mobiles are unable to provide the receiver with
sufficient received energy for correct preamble detection due to
this limit. An alternative means to increase the received energy at
the receiver is to transmit for a longer time. Therefore, some
formats feature a repetition of the preamble.
Figure 1 illustrates the four random access formats for LTE
frequency division duplex (FDD), featuring both short and long
cyclic prefix corresponding to capabilities to handle narrow and
wide delay spreads, and single and repeated random access
preambles to enable coverage in cells with different sizes [14].
Format 0 fits within 1ms (one subframe), format 1 and 2 fits
within 2ms, while format 3 fits within 3ms.
3) Random Access Opportunities
103 μs 839 samples = 800 μs
RA sequence
time
TX
CP
a) Format 0
103 μs 839 samples = 800 μs
RA sequence
time
TX
CP
a) Format 0
684 μs 800 μs
RA sequence
time
TX
CP
b) Format 1
203 μs 1600 μs
RA sequence
time
TX
CP
c) Format 2
TX
d) Format 3
RA sequence
CP
684 μs
TX
1600 μs
RA sequence
time
RA sequence
Figure 1. LTE random access formats for FDD.
30 2009 IFIP/IEEE Intl. Symposium on Integrated Network Management — Workshops
3. In the classical random access scheme Slotted Aloha, access
attempts are restricted to slots to avoid partial overlap between
users. Similarly, in LTE the reserved time-frequency resources
for random access – the random access opportunities – are
slotted, and the mobile selects an opportunity at random among
the available opportunities, see Figure 2. The considered
resources for the physical random access channel, PRACH, can
also be allocated to the physical uplink shared channel (PUSCH)
used for scheduled uplink data transmission. The latter channel
can also carry uplink control information as an alternative to the
less flexible and capable physical uplink control channel
(PUCCH). Therefore, the resource allocation needs to consider
the balance between the PRACH and PUSCH demands. The
plausible random access opportunities [14] dictate both the
opportunity period and the timing, for example enabling non-
overlapping opportunities for three cells at the same site.
Furthermore, the opportunity selection is also related to the
random access format, since the opportunities needs to be sparse
enough to fit the length of the selected format (1, 2 or 3 ms),
while avoiding preamble overlaps.
B. Contention-Based Random Access
The contention-based random access procedure can be
applied to all random access events. It is possible that at least two
mobiles select the same resources (preamble and opportunity) for
random access, and therefore the contention situation needs to be
resolved. The procedure is outlined in Figure 3, and the steps are
further described below.
1) Random Access Preamble
The mobile selects a preamble and an opportunity at random,
and determines the format based on the broadcasted system
information. In addition, the mobile determines the preamble
transmission power by estimating the downlink path loss PL from
the downlink reference signal (pilot signal) and using the
broadcasted parameters P0_RACH (the desired received power),
ΔRACH (the power ramping step) and ΔPreamble (the preamble-based
offset equal to 0 dB for formats with a single preamble, i.e.,
formats 0 and 1 and equal to – 3dB for formats with duplicate
preambles, i.e., format 2 and 3). The mobile also monitors the
preamble transmission attempt number m. For the initial
preamble transmission, m=1, and the preamble transmission
power is set according to
})1(,min{ _0max PreambleRACHRACHRACH mPLPPP Δ+Δ−+−= (1)
Finally, the selected preamble is sent with the determined
power level and format in the selected opportunity.
2) Random Access Response
The base station correlates the received signal in each random
access opportunity with all possible preamble sequences. Figure
4 illustrates the detector and the corresponding round trip time
estimation subject to noise and interference. Upon detection of a
preamble in an opportunity, the base station signals timing
adjustment information, and an uplink resource allocation, and all
mobiles that used the specific preamble in the specific random
access opportunity considers this information.
If no response is obtained within a configured time window,
the mobile increases the preamble transmission attempt number
m and returns to step 1) unless the max number of attempts has
been reached.
3) Scheduled Transmission
Using the allocated uplink resource, the mobile transmits an
identity that uniquely identifies the mobile in the base station.
4) Contention Resolution
During step 3 of the random access procedure, several
mobiles that have sent the same preamble may respond. The base
Figure 3. Contention-based random access procedure for LTE with four
steps.
6 RB
1 RB
20 ms
time
frequency
1 ms
PRACH
PUSCH
PUCCH
Figure 2. Example of random access opportunities. The opportunities
repeats every 20 ms.
Correlation
Correlation zone
Detection threshold
Noise and interference
time
TCS
preamble
Detection threshold
Roundtrip time estimate
Correlation
Correlation zone
Detection threshold
Noise and interference
time
TCS
preamble
Detection threshold
Roundtrip time estimate
Figure 4. Random access preamble correlation detector, and round trip
time estimation for cyclic shift length TCS.
2009 IFIP/IEEE Intl. Symposium on Integrated Network Management — Workshops 31
4. station chooses one of the mobile identities and responds with the
identity of the selected mobile, and only this mobile acknowledge
the reception of the contention resolution.
C. Non-Contention-Based Random Access
This procedure is applicable when the base station can signal
a reserved random access preamble to the mobile, i.e. at handover
and uplink synch failure. In this case, all necessary information
(essentially timing) is acquired at the random access response.
III. REQUIREMENTS AND MODELING
This section addresses both key performance metrics and
their observation, and well as more general radio network
simulation modeling.
A. Performance Requirements and Observations
The main objective with the random access procedure is to
provide prompt and reliable access. Therefore, the access
probability is of interest, i.e. the probability that a mobile
acquires access upon an attempt. It is likely that an operator or
vendor would like to specify the access probability APm at
attempt m, i.e. the probability that the UE has access after attempt
m (1 m M), and then use autonomous algorithms to adjust the
random access related parameters accordingly. For example, AP1
= 0.8 and AP3 = 0.99. Furthermore, it is instructive to express the
access probability APm as a function of the detection miss
probability and the contention probability.
The detection miss probability DMPm at attempt m is defined
as the probability of a preamble, transmitted at attempt m, not
being detected at the base station. Moreover, the contention
probability CP is defined as the probability that a UE is not
granted access due to a preamble collision, conditional that the
preamble of the UE is detected. The access probability at attempt
m can therefore be expressed as
( )∏=
×−+−=
m
i
iim CPDMPDMPAP
1
)1(1 . (2)
The corresponding observables are denoted access ratio,
detection miss ratio, and contention ratio. Assume that random
access procedure data is collected over time intervals of length T,
and let n(k) denote the counter value gathered over the time
interval [(k-1)T,kT]. In particular, denote the number of sent
preambles by ns(k), number of detected preambles by nd(k), and
number of mobiles that have successful random access by na(k).
An additional subscript m may be used to denote a particular
attempt number. For example, ns,m(k) gives the number of sent
preambles for attempt number m during the time interval [(k-
1)T,kT]. Hence, the preamble detection miss ratio for attempt m
is given by,
=
>−
=
0)(,0
0)(,
)(
)(
1
)(
,
,
,
,
kn
kn
kn
kn
kDMR
ms
ms
ms
md
m
The contention ratio is defined as,
=
>−
=
0)(,0
0)(,
)(
)(
1
)(
kn
kn
kn
kn
kCR
d
d
d
a
Finally, the access ratio is obtained via DMR and CR and (2).
The number of detected preambles nd and number of mobiles that
are granted access na are directly measurable at the base station
and it is therefore tractable to estimate CR. However, it is not
possible to measure ns at the base station unless this is reported
by the mobiles. An undetected preamble is simply a correlation
peak below the detection threshold (see Figure 4), which is
classified as noise at the base station detector. Henceforth, we
assume that mobiles report the number of attempts needed to
obtain access once the mobile is granted access to the network
(see the PREAMBLE_TRANSMISSION_COUNTER in [15]).
These reports from the mobile enable the derivation of DMRm.
Note that this particular mobile report is not yet standardized for
LTE at the moment of writing.
B. Radio Network and Random Access Modeling
The simulation work in this paper is based on a semi-static
simulator with random drops of mobiles without mobility
modeling, but with time correlations (e.g. a failed random access
attempt at one time instant will result in a retransmission by the
same mobile at later time). It models the random access
procedure in a multi-cell scenario with interfering uplink data
traffic. The network is deployed in a hexagonal layout of 7 sites
each 3-sectored and wrap-around propagation. The path loss
predictions are adopted from [18] and the antenna models from
[19].
The number of created mobiles at each drop that initiate the
random access procedure follows a Poisson process with the
mean arrival intensity LoadRACH (number of mobiles/second/cell),
and they are uniformly distributed over the simulated area.
Uplink data traffic is modeled by the PUSCH load (denoted
LoadPUSCH), defined as the fraction of the frequency band that is
used for PUSCH during a sumframe of 1ms (c.f. Fig. 4.). A cell
with no random access opportunity at a specific subframe
randomizes (depending on the PUSCH load) whether uplink data
is scheduled in the frequency band where random access is
configured. If uplink data is scheduled then a PUSCH user is
randomized in the cell. Moreover, PUSCH power control is based
on [16] and simplified to open-loop power control,
dBm},min{ _0max PLPPP PUSCHPUSCH += .
where P0_PUSCH is the desired target received power, PL is the
path loss estimated by the UE based on the downlink reference
signal, and Pmax is the maximum transmission power.
Random access mobiles select a preamble (randomly) and an
opportunity (typically the next available), and transmit at a power
given by (1). However, the path loss estimate PL is measured for
the downlink and not the uplink, and therefore additive white
32 2009 IFIP/IEEE Intl. Symposium on Integrated Network Management — Workshops
5. Gaussian measurement noise with standard deviation σEE is
considered.
The received preambles are processed and the signal to
interference and noise ratio SINRp,c of each preamble p received
at cell c is computed according to,
NII
gP
SINR
cRACHcPUSCH
cpp
cp
++
=
,,
,
,
where Pp is the transmission power of the mobile transmitting
preamble p, gp,c is the path gain from the mobile to the based
station of cell c, N is the thermal noise power over the random
access frequency band, IPUSCH,c is the received interference power
from PUSCH at cell c from users in other cells, and IRACH,c is the
received interference power from random access preambles
transmitted by other mobiles in the same cell (typically zero if all
preambles originates from the same root sequence). The SINRp,c
is then mapped to a preamble detection probability (see [21]). If
several mobiles transmit the same preamble in the same
opportunity in a cell, then contention resolution is carried out by
randomly choosing a preamble (i.e. mobile) among the detected
preambles. Table I summarizes central parameter values used in
the simulations.
TABLE I. SIMULATION PARAMETERS
Parameter Value
User distribution Uniform
Site to site distance 500 m (5000m Section IV.E)
Antenna Tilt 8 degrees
PMAX 23 dBm W
P0_PUSCH -89 dBm
N -109 dBm W
σEE 3 dB
Path loss L L = 128.1+37.6log10(d), d [km]
Log-normal shadowing 8 dB standard deviation
TABLE II. DEFAULT EXPERIMENT SETUP
Parameter Default Value
LoadPUCSH 0.5
LoadRACH 250 preambles/cell/s
RACH Format 0
RACH Opp interval 5 ms
P0_RACH -120 dBW
ΔRACH 2 dB
M 8
Simulation Time 180 s
IV. EXPERIMENTS
The experiment objectives are to illustrate the coupling
between various tunable parameters, the performance of random
access, and the interference caused by random access. Table II
gives the standard parameters used in all experiments (if not
otherwise stated).
Note that the standard value for LoadRACH may seem too high.
Since at the time of the writing LTE has not been deployed in
large scale and typical loads are not yet available, we assume a
wide range of RACH loads in the simulations. The default
RACH load has been selected such that CR = 0.01 for one
random access opportunity per 5 ms [14]. Also a higher RACH
load enables shorter simulations times since more data is
gathered compared to a lower RACH load.
A. Effects of Varying PUSCH Load
The goal of this experiment is to study the effects of P0_RACH
and LoadPUSCH on DMR and CR. Recall that P0_RACH dictates the
received signal power and LoadPUSCH determines the interference
on RACH. The parameters are altered according to LoadPUSCH =
{0.0,0.2,…,1.0} and P0_RACH = [-150,-120] dBW in steps of 10
dBW.
As shown in Fig. 5(a) the DMR of the first attempt (DMR1)
increases with increasing LoadPUSCH and decreasing P0_RACH. The
DMR of attempts 2-8 show similar behavior. Fig. 5(a) indicates
that some P0_RACH values result in very low DMR and robustness
to varying LoadPUSCH and interference. Consequently it seems
that setting P0_RACH to, e.g., -130 dBW, will give a satisfactory
RACH performance. However, these results hold only for the
deployment used and the models and assumptions of, e.g.,
propagation, PUSCH and RACH. There may be cases where a
P0_RACH lower (or higher) than -130 dBW should be used
depending on prevailing conditions.
0 0.2 0.4 0.6 0.8 1
0
0.5
1
PUSCH Load
DMR
Attempt Nr 1
(a)
0 0.2 0.4 0.6 0.8 1
0
0.005
0.01
0.015
0.02
PUSCH Load
CR
-120dBW
-130dBW
-140dBW
-150dBW
0 0.2 0.4 0.6 0.8 1
0
0.005
0.01
0.015
0.02
PUSCH Load
CR
-120dBW
-130dBW
-140dBW
-150dBW
(b)
Figure 5. DMR and CR as a function of LoadPUSCH and P0_RACH.
2009 IFIP/IEEE Intl. Symposium on Integrated Network Management — Workshops 33
6. Fig. 5(b) shows that CR increases as LoadPUSCH increases and
P0_RACH decreases. This is a result of an increasing number of
preamble retransmissions (due detection misses) causing a higher
contention probability.
In conclusion, the PUSCH load and the induced PUSCH
interference heavily affect DMR of all attempts. To counteract
this, the power control parameter P0_RACH can be adjusted to an
appropriate setting. Further, DMR and CR are coupled, meaning
that an increase in DMR results in an increase in CR.
B. Effects of Varying Power Control Parameters
The goal of this experiment is to study the effects of P0_RACH
and ΔRACH on DMR and to establish whether a given performance
specification in terms of DMR for each attempt number can be
satisfied. The parameters are altered according to P0RACH = {-
120,-125,…,-150} dBW and ΔRACH = {0,2,4,6} dB.
The results for DMR1, DMR3 and DMR5 are given in Fig. 6. In
general, the DMR of all attempts decreases nonlinearly with
increasing P0_RACH. As expected, for the first attempt the DMR
does not vary over ΔRACH. As such, the only way to control DMR
for the first attempt is to set P0_RACH. For attempts greater than
one, DMR varies over both P0_RACH and ΔRACH. The amount by
which DMR decreases when increasing ΔRACH depends on the
attempt number. This implies that for low attempt numbers there
are limits for how much DMR can be altered by using ΔRACH. As
such, it may be necessary to alter P0_RACH to not only satisfy the
first attempt, but also to satisfy attempt numbers greater than one.
The conclusion of this experiment is that it is possible to
control DMR by using P0_RACH and ΔRACH. The parameter P0_RACH
can be set according to the DMR requirements of the first
attempt, whereas ΔRACH can be tuned to satisfy DMR
requirements for the other attempts. In some cases the latter may
not be possible and in such circumstances P0_RACH must be
adjusted as well.
C. Effects of Varying RACH Load and Configuration
The goal of this experiment is to study the effects of RACH
load and RACH configuration on CR. RACH load is altered
according to LoadRACH = {100,300,…,900} preambles/cell/s.
RACH configuration corresponds to random access opportunity
intervals (RAOI) of 20, 5, 2 , and 1 ms. Note that P0_RACH = -120
dBW, which results in the majority of the preambles to be
detected at the first attempt.
As expected CR increases with increasing LoadRACH and
increasing random access opportunity period (determined by the
RACH configuration), as shown in Fig. 7. The conclusion of this
experiment is that it is possible to control CR by altering the
configuration.
D. Interference on PUSCH by Random Access Preambles
The goal of this experiment is to study the interference on
PUSCH generated by random access preamble transmissions.
The idea is to show whether there is a benefit of adjusting P0_RACH
in order to reduce the interference on PUSCH (compared to
setting P0_RACH = -120 dBW). The generated interference is a
function of the preamble transmission power and number
preamble transmissions. For this reason we vary P0_RACH and the
RACH load. The parameters are altered according to LoadRACH =
{1,5,10,25,50,100,200,300} preambles/cell/s and P0_RACH =
{-120,-130,-140,-150} dBW. Define the PUSCH noise rise as,
0 200 400 600 800
0
0.02
0.04
0.06
0.08
0.1
0.12
0.14
RACH Load
CR
RAOI = 20ms
RAOI = 5ms
RAOI = 2ms
RAOI = 1ms
0 200 400 600 800
0
0.02
0.04
0.06
0.08
0.1
0.12
0.14
RACH Load
CR
RAOI = 20ms
RAOI = 5ms
RAOI = 2ms
RAOI = 1ms
Figure 7. Effect of RACH load and random access opportunity interval
(RAOI) on CR.
-150 -145 -140 -135 -130 -125 -120
0
0.2
0.4
0.6
0.8
P0_RACH
DMR
Attempt Nr 1
ΔRACH
=0
ΔRACH
=2
ΔRACH
=4
ΔRACH
=6
-150 -145 -140 -135 -130 -125 -120
0
0.2
0.4
0.6
0.8
P0_RACH
DMR
Attempt Nr 3
-150 -145 -140 -135 -130 -125 -120
0
0.2
0.4
0.6
0.8
P0_RACH
DMR
Attempt Nr 5
Figure 6. DMR as a function of P0_RACH and ΔRACH
34 2009 IFIP/IEEE Intl. Symposium on Integrated Network Management — Workshops
7. RB
RBtotRACH
N
NI
NR
+
= ,
where IRACH,tot denotes the received RACH inter-cell interference
power (on PUSCH) and NRB -146 dBW is the noise power over
one resource block (corresponding to a 180 kHz frequency band).
The noise rise over all simulated cells is given in Fig. 8. The
noise rise increases as a result of increasing LoadRACH and
P0_RACH. The noise rise is substantial for some preamble
transmissions when P0_RACH = -120 dBW and very small when
P0_RACH = -140 dBW. Although, mobiles close to the base station
may not suffer significantly from inter-cell RACH interference,
mobiles at the cell edge may, and the result may be a decreased
PUSCH coverage and/or performance. As such, there may be a
benefit in decreasing the interference on PUSCH by lowering
P0_RACH. The conclusion of this experiment is that RACH may
cause interference on PUSCH for high P0_RACH and RACH load
and this may be alleviated by appropriately setting P0_RACH (given
the performance requirements are satisfied). Note, the need of
adjusting P0_RACH only is valid during excessive RACH load.
E. Random Access Format Coverage Implication
The goal of this experiment is to study the effect of RACH
format on RACH coverage performance. Therefore, the P0_RACH
and format are varied for a much sparser deployment with 5000
meters inter-site distance. From Fig. 9, it is evident that formats
with repeated preambles improve the random access coverage.
Furthermore, some mobiles in bad coverage spots will still have
insufficient power to succeed with the random access, and raising
the P0_RACH will not change this fact. A format with a repeated
preamble will help some, but not all.
V. SELF-OPTIMIZATION EXAMPLE
In order to exemplify how the information and models in this
paper can form the basis for self-optimization, we illustrate that
DMR1 can be controlled to meet a given performance
specification by automatically adjusting P0_RACH. Recall from
above that DMR is heavily affected by the PUSCH load.
Therefore, LoadPUSCH is varied according to Fig. 10. Although the
stepwise changes in LoadPUSCH may not be realistic, this gives the
worst-case interference change on RACH and, allows us to study
the performance of the controller under extreme conditions. The
initial value of P0_RACH is -120 dBW. Detection miss probability
for the first attempt should be 0.01. An integrating controller (I
controller)
))(01.0()1()( 1_0_0 kDMRKkPkP IRACHRACH −+−=
is used where KI is a tunable parameter, and sampling period is
1s.
The results are given in Fig. 10, where the average over all
cells is shown for LoadPUSCH, DMR1, and P0_RACH. We can see
that the controller is capable of adjusting P0_RACH so that DMR1
tracks its target value (0.01). At time 45s and 80s, the PUSCH
load increases significantly resulting in DMR1 overshoots. The
overshoots cannot be avoided unless a mechanism that predicts
the increase in LoadPUSCH is available. One conclusion is that
using a simple I controller it is possible to control P0_RACH such
0 5 10 15 20
0
0.2
0.4
0.6
0.8
1
CDF
Noise Rise (dB)
0 5 10 15 20
0
0.2
0.4
0.6
0.8
1
CDF
Noise Rise (dB)
(a) (b) (c)
Figure 8. Noise rise distributions as functions of P0_RACH and LoadRACH: (a) P0_RACH = -120 dBW (b) P0_RACH = -130 dBW (c) P0_RACH = -140 dBW.
0 5 10 15 20
0
0.2
0.4
0.6
0.8
1
CDF
Noise Rise (dB)
LoadRACH = 300
LoadRACH = 1
-150 -145 -140 -135 -130 -125 -120
0
0.05
0.1
P0_RACH
DMR
Attempt Nr 1
Format=0
Format=2
Format=3
-150 -145 -140 -135 -130 -125 -120
0
0.02
0.04
0.06
0.08
P0_RACH
DMR
Attempt Nr 2
-150 -145 -140 -135 -130 -125 -120
0
0.05
0.1
P0_RACH
DMR
Attempt Nr 1
Format=0
Format=2
Format=3
-150 -145 -140 -135 -130 -125 -120
0
0.02
0.04
0.06
0.08
P0_RACH
DMR
Attempt Nr 2
Figure 9. DMR for first and second attempt and 5000 m inter-site distance.
2009 IFIP/IEEE Intl. Symposium on Integrated Network Management — Workshops 35
8. that DMR1 satisfies a given performance specification in terms of
a given target value.
VI. CONCLUSION
In this paper we have argued that there is an increasing need
for self-organization in future wireless access networks. To meet
these expectations there has been a significant effort carried out
in academia, standardization bodies (e.g., 3GPP), and industry.
One aspect that benefits from automation is RACH optimization,
and the random access procedure is thoroughly described. We
have studied the feasibility of RACH self-optimization in LTE
by providing simulation results showing the impact of a set of
key parameters on the RACH performance. Further an algorithm
was presented, which tunes the RACH power control parameters
such that the detection miss probability of transmitted preambles
tracks given requirements. In order to automate the optimization
of RACH power control parameters there is, however, a need for
the UEs to report the number of sent preambles. These reports
enable the derivation of preamble detection miss probability,
which can be used for controlling the network access delay.
REFERENCES
[1] NGMN, “Use Cases related to Self Organising Network. Overall
Description”, ver. 1.53
[2] 3GPP TR 36.902, “E-UTRA Self-configuring and self-optimizing network
use cases and solutions”
[3] C. Prehofer and C. Bettstetter, “Self-organization in communication
networks: principles and design paradigms”, IEEE Communications
Magazine, July 2005.
[4] M. Amirijoo et al., “Neighbor cell relation list and measured cell identity
management in LTE”, IEEE/IFIP Networking Operations and Management
Symposium, 2008.
[5] D. Soldani and I. Ore, “Self-optimizing neighbor cell lists for UTRA FDD
networks using detected set reporting”, IEEE Vehicular Technology
Conference, 2007.
[6] G. Hampel, et al., “The tradeoff between coverage and capacity in dynamic
optimization of 3G cellular networks’, IEEE Vehicular Technology
Conference, 2003.
[7] K. Valkealahti, et al., “WCDMA common pilot power control for load and
coverage balancing”, IEEE International Symposium on Personal, Indoor
and Mobile Radio Communications, 2002.
[8] C. Lindemann, et al., “Adaptive call admission control for QoS/revenue
optimization in CDMA cellular networks”, Journal of Wireless Networks,
vol. 10, no. 4, July 2004, Springer.
[9] Socrates webpage, http://www.fp7-socrates.org/
[10] J. Reig et al., “Random Access Channel (RACH) Parameters Optimization
in WCDMA Systems”, IEEE Vehicular Technology Conference, Fall,
2004.
[11] S. Kim et al., “Uplink Capacity Maximization based on Random Access
Channel (RACH) Parameters in WCDMA”, IEEE Vehicular Technology
Conference, Spring, 2006.
[12] E. Dahlman, S. Parkvall, J. Sköld, and P. Beming, 3G Evolution, second
edition.
[13] 3GPP TS 36.300, “E-UTRA and E-UTRAN Overall Description, Stage 2”
[14] 3GPP TS 36.211, “E-UTRA Physical Channels and Modulation”
[15] 3GPP TS 36.321: “E-UTRA Medium Acces Control (MAC) Protocol
Specification”
[16] 3GPP TS 36.213, “E-UTRA Physical layer procedures”
[17] B. M. Popovic. Generalized chirp-like polyphase sequences with optimum
correlation properties. IEEE Transactions on Information Theory, Vol. 38,
No. 4, Pages 1406-1409, July 1992.
[18] 3GPP TS 25.814, “Physical layer aspect for evolved Universal Terrestrial
Radio Access (UTRA)”.
[19] F. Gunnarsson et al., “Downtilted Base Station Antennas – A Simulation
Model Proposal and Impact on HSPA and LTE Performance”, IEEE
Vehicular Technology Conference, Fall, 2008.
[20] M. Amirijoo et al., “Towards Random Access Channel Self-Tuning in
LTE”, IEEE Vehicular Technology Conference, Spring, 2009.
[21] 3GPP R4-071951, “PRACH Simulation Results”, Ericsson
[22] 3GPP R1-080879, “Power Control for PRACH”, Ericsson
[23] J. Laiho, A. Wacker, T. Novosad, editors, Radio Network Planning and
Optimization for UMTS, John Wiley & Sons, first edition, 2002.
0 50 100 150
0
0.5
1
Time (s)
LoadPUSCH
0 50 100 150
0
0.05
Time (s)
DMR1
DMR
Target
0 50 100 150
-130
-120
Time (s)
P0RACH
[dB]
Figure 10. Result of a self-tuning algorithm that autmatically sets P0_RACH
based on observed DMR1.
36 2009 IFIP/IEEE Intl. Symposium on Integrated Network Management — Workshops