elaboration of laboratory experiments for teaching purposes in the area of lte, wimax networks...
DESCRIPTION
This thesis presents the concept of laboratory experiments realized for teaching purposes at the Warsaw University of Technology. The addressed technical areas include simulations for LTE Technology, WiMAX Network Planning and deployment of Self-Organizing Networks. The majority of the proposed lab experiments have been implemented in a MATLAB-based link level simulator from IS-Wireless, which is part of 4G University Suite. For more information about 4G University Suite, please have a look http://is-wireless.com/products/4g-university-suite.TRANSCRIPT
Academic Year 2010/2011
ELECTRICAL AND COMPUTER ENGINEERING
THE INSTITUTE OF TELECOMMUNICATIONS
FACULTY OF ELECTRONICS AND INFORMATION TECHNOLOGY
WARSAW UNIVERSITY OF TECHNOLOGY
MASTER OF SCIENCE THESIS
ELABORATION OF LABORATORY EXPERIMENTS
FOR TEACHING PURPOSES IN THE AREA OF LTE,
WIMAX NETWORKS PLANNING, SON NETWORKS.
Jarosław MEDWID
Supervisor:
Mirosław SŁOMIŃSKI,
Associate Professor
...........................................................
Evaluation
...........................................................
Signature of the Head
of Examination Committee
Warsaw, September 2011
ELABORATION OF LABORATORY EXPERIMENTS
FOR TEACHING PURPOSES IN THE AREA OF LTE,
WIMAX NETWORKS PLANNING, SON NETWORKS.
Abstract
My Master of Science Thesis presents a concept of laboratory experiments for teaching
purposes in the area of simulations utilizing LTE Technology, WiMAX Network Planning
and Self-Organizing Networks. Elaborated laboratory experiments concepts referring directly
to the issues that will be described on the newly-formed course based on the modern wireless
technologies. Thesis includes theoretical introductions, task descriptions and utilized tools
instructions for each of the elaborated laboratory experiments. Software tools were selected
after investigations of the set of tools available on the software market. Elaborated laboratory
experiments are combining selected software tools with the demands of the examined subject
for particular investigation area.
OPRACOWANIE ĆWICZEŃ LABORATORYJNYCH
W ZAKRESIE TECHNOLOGII LTE, PLANOWANIA
SIECI WIMAX, SIECI SON.
Streszczenie
Moja Praca Magisterska prezentuje koncepcje ćwiczeń laboratoryjnych dla celów
dydaktycznych w zakresie symulacji wykorzystujących technologię LTE, planowania sieci
wykorzystujących technologię WiMAX oraz sieci SON. Opracowane ćwiczenia laboratoryjne
odnoszą się bezpośrednio do zagadnień, które będą opisywane na nowo-stworzonym
przedmiocie bazującym na tematyce nowoczesnych technologii bezprzewodowych. Praca
zawiera wprowadzenie teoretyczne, opisy zadań oraz instrukcje do wykorzystywanych
narzędzi programistycznych podczas każdego z przeprowadzonych ćwiczeń. Narzędzia
programistyczne zostały wybrane po badaniach zestawu narzędzi dostępnych na rynku
oprogramowania. Opracowane ćwiczenia laboratoryjne łączą wybrane narzędzia z
wymaganiami badanych zagadnień dla wybranego obszaru badań.
Jarosław Medwid Date of birth: 15.06.1987r.
Curriculum Vitae Education:
10.2010 – 09.2011 Warsaw University of Technology,
Faculty of Electronics and Information Technology,
Electrical and Computer Engineering, M.Sc.
10.2006 – 09.2010 Warsaw University of Technology,
Faculty of Electronics and Information Technology,
Electrical and Computer Engineering, B.Sc.
09.2003 – 06.2006 Liceum Ogólnokształcące im.B.Prusa w Skierniewicach
Work experience:
10.2011 – actually Nokia Siemens Networks, Senior Software Testing Engineer
11.2009 – 09.2011 Psiloc, Mobile Software Solutions, Quality Assurance Specialist
09.2009 – 11.2009 Telekomunikacja Polska S.A., Technical Service Department,
Practices
07.2008 – 10.2008 Zatra S.A., Sales and Marketing Specialist
Skills:
Knowledge in the area of Network management and planning (WiMAX and WiFI
Technologies), Routing protocols, Internet protocols
Experience in mobile software development on platforms Android, iOS, Windows
Phone, Symbian, Maemo, Java, Web solutions
Experience over the testing, integration and verification areas
Programming languages basic knowledge: Python, C++, C, Assembler, Visual Basic,
HTML/XML/CSS
Basic knowledge of SQL databases
Languages:
English – fluently
Deutsch – intermediate
………………………….
Signature of the student
Sincere thanks for Supervisor
Mirosław Słomiński, Associate Professor
for help in elaboration
Master of Science Thesis
Official thanks to IS-Wireless
We would like to thank the staff and the President of IS-Wireless (brand of Innovative
Solutions) creators of LTE PHY LAB, for helping during laboratory scenario research and
granting us a trial license for their tool. The tool is a simulator of LTE physical layer in
Matlab and the IS-Wireless has acquired the status of the Mathworks partner program
connections. Due to the fact that it is a professional tool, it has the greatest potential of all
used. For this reason, we increase its share in our laboratories. As many as four of the eight
laboratories use this tool. With this tool, students can observe, and most importantly, change
what you normally see only in books, namely, the physical signal of LTE. Can thus learn the
foundation of LTE, namely OFDMA and SC-FDMA. Technologies that are now the basis for
most of the major radio technologies.
Their help and suggestions have proved as important as the license itself. Through these
consultations, the scenarios correspond to the real demands and are a great educational
material. LTE PHY LAB certainly would be a great help in conducting theoretical lecture,
which could lead to support the theory of real examples, with the simulation in real-time
mode. In this case, the lecturer can present the relevant features and technologies, in different
cases, and conducts theoretical lecture more interactive, confronting theory with practical
examples in various cases.
Working with IS-Wireless is a great example of the western model of education, where the
company is actively involved in creating educational programs. Specialist with the IS-
Wireless gave us a clear and concrete suggestions on what we should put focus on and
answered all our questions, with excellent knowledge of the topic, market and customer
needs.
Especially we would like to thank CEO Dr. Sławomir Pietrzyk for giving us this opportunity
and Mr. Marcin Dryjański for help and support during development of this work.
7
Table of Contents 1. Introduction .......................................................................................................................... 12
1.1 Work objectives .............................................................................................................. 14 1.2 Complementarity ............................................................................................................ 15 1.3 Structure of the work ...................................................................................................... 15
2. Analysis of the available software tools utilized further in the laboratory experiments ...... 17 2.1 Preface for newly-formed teaching course ..................................................................... 17
2.2 Software tool selection ................................................................................................... 17 2.2.1 LTE simulation utilizing selected method .............................................................. 17 2.2.2 WiMAX Networks planning utilizing selected method .......................................... 19
2.2.3 Self-Organizing Networks ....................................................................................... 20 3. Laboratory experiments organization ................................................................................... 22
3.1 Laboratory experiments rules ......................................................................................... 22 4. Laboratory no 1 – investigations of the downlink physical channels of the LTE
Technology with utilization of the LTE PHY Lab Matlab tool. .............................................. 24
4.1 Selected issues of LTE Technology ............................................................................... 32 4.1.1 LTE Technology introduction ................................................................................. 32 4.1.2 Frame structures ...................................................................................................... 32
4.1.3 LTE downlink channels and signals types .............................................................. 36 4.2 LTE PHY Lab tool instruction ....................................................................................... 43 4.3 Summary and conclusions .............................................................................................. 44
5. Laboratory no 2 – investigations of the uplink physical channels of the LTE Technology
with utilization of the LTE PHY Lab Matlab tool. .................................................................. 46 5.1 Selected issues of LTE Technology ............................................................................... 56
5.1.1 LTE uplink channels and signals types ................................................................... 56
5.2 Summary and conclusions .............................................................................................. 59 6. Laboratory no 3 – investigations of the WiMAX Technology with use of the
WiMAXProjekt tool ................................................................................................................. 60 6.1 Selected issues of WiMAX Technology ........................................................................ 63
6.1.1 Duplexing techniques .............................................................................................. 63 6.1.2 Adaptive modulation ............................................................................................... 63
6.1.3 Overbooking ............................................................................................................ 63 6.2 WiMAXProjekt tool instruction ..................................................................................... 64
6.3 Summary and conclusions .............................................................................................. 69 7. Laboratory no 4 – investigations of the SON with use of the PKSA Planner tool .............. 71
7.1 Selected issues of SON .................................................................................................. 77 7.1.1 Self-Organizing Networks introduction .................................................................. 77 7.1.2 Primary and additional paths ................................................................................... 77
7.1.3 Methods of reconfiguration ..................................................................................... 78 7.1.4 Important definitions ............................................................................................... 79
7.2 PKSA Planner tool instruction ....................................................................................... 79 7.3 Summary and conclusions .............................................................................................. 81
8. Conclusions .......................................................................................................................... 82
9. References ............................................................................................................................ 84 9.3 CD contents .................................................................................................................... 85
9.4 Appendix A .................................................................................................................... 85
8
Figures list: Fig. 1 eNB Transmitter block scheme involved in the downlink investigations[38] ............... 25 Fig. 2 Sample downlink subframe ............................................................................................ 30 Fig. 3 Sample downlink subframe – 3D view of the previous scatterplot ............................... 30 Fig. 4 Sample downlink subframe 0 presenting way of scatterplots description expected in the
students’ reports ....................................................................................................................... 31 Fig. 5 Sample downlink frame with overall view on each subframe ...................................... 31 Fig. 6 Frame type 1, timing and symbol allocations shown for FDD with normal cyclic prefix
(CP) [13] ................................................................................................................................... 33 Fig. 7 Frame type 2 – special fields are shown in subframes 1 and 6. Guard period separates
the Downlink and Uplink. This TDD example represents a 5ms switch point. A 10ms switch
point would not have the special fields in subframe 6. [13]..................................................... 33 Fig. 8 Relationship between a slot, symbols and Resource Blocks. N(dl/rb) is the symbol used
to indicate the maximum number of downlink Resource Blocks for a given bandwidth. [35] 34 Fig. 9 Resource grid scheme [14] ............................................................................................. 35 Fig. 10 LTE Reference Symbols distribution among the Reference Elements [14] ................ 36 Fig. 11 Map of Downlink frame using FDD and normal CP shows the relative location of the
various physical channels. Frames in systems using extended CP or TDD would be slightly
different. [35] ........................................................................................................................... 37
Fig. 12 Primary and Secondary Synchronization Signals allocations [13] .............................. 39 Fig. 13 Mapping of downlink transport and physical channels cooperation [13] .................... 40
Fig. 14 LTE downlink frame map (10ms length, Δf=15 kHz, normal CP) [37] ...................... 41 Fig. 15 Mapping of uplink logical and transport channels cooperation [13] ........................... 42
Fig. 16 3D view toggle inside the figure window .................................................................... 44 Fig. 17 UE Transmitter block scheme involved in the uplink investigations[38] .................... 47
Fig. 18 Sample uplink subframe .............................................................................................. 52 Fig. 19 Sample uplink subframe – 3D view of the previous scatterplot .................................. 53 Fig. 20 Sample uplink subframe with SRS presence ............................................................... 53
Fig. 21 Sample uplink subframe with PRACH presence ......................................................... 54 Fig. 22 Sample uplink subframe with PUSCH in format 3 presence ....................................... 54 Fig. 23 Sample uplink frame consisting of all subframes ........................................................ 55
Fig. 24 Map of Uplink subframe withNormal Cyclic Prefix [35] ............................................ 56 Fig. 25 Random access preamble structure [37] ...................................................................... 57 Fig. 26 Mapping of uplink transport and physical channels cooperation [13] ......................... 58
Fig. 27 Mapping of uplink logical and transport channels cooperation [37] ........................... 58
Fig. 28 Application main view ................................................................................................. 64
Fig. 29 Single terminal addition ............................................................................................... 65 Fig. 30 Hardware and radio parameters selection .................................................................... 66
Fig. 31 Primary localization of the terminals [2] ..................................................................... 67 Fig. 32 Manual optimization of the terminals localizations [2] ............................................... 67 Fig. 33 View of the modulation range for two 90 degrees antennas and 4 client terminals [2]
.................................................................................................................................................. 68 Fig. 34 Terrain cross-section points geographic coordinates [2] ............................................. 68
Fig. 35 Checking LOS condition and terrain cross-section view ............................................. 69 Fig. 36 Sample network topology model ................................................................................. 75 Fig. 37 Link-based method failure reconfiguration scenario ................................................... 78
Fig. 38 End-to-end method failure reconfiguration scenario ................................................... 78 Fig. 39 PKSA Planner visual window ...................................................................................... 80
9
Tables list: Tab. 1 Coordinates of particular network units ........................................................................ 61 Tab. 2 Downlink and uplink configurations including overbooking factor ............................. 62 Tab. 3 Initial data table with Primary Paths and Secondary Paths dedicated to the sample
model from Figure 1 ................................................................................................................. 72
Tab. 4 Primary Paths configuration table ................................................................................. 73 Tab. 5 Secondary Paths configuration table using end-to-end method .................................... 74
10
Abbreviations:
E-UTRAN – Evolved UMTS Terrestial Radio Access Network
OFDM – Orthogonal Frequency Division Multiplexing
OFDMA – Orthogonal Frequency Division Multiple Access
FDMA – Frequency Division Multiple Access
SC – Single Carrier
SC-FDMA – Single Carrier Multiple Access
MIMO – Multiple Input Multiple Output
SISO – Single Input Single Output
RF – Radio Frequency
SAE – System Architecture Evolution
UE – User Equipment
eNB – eNodeB
MME – Mobility Management Entity
SGW – Serving Gateway
PGW – PDN Gateway
PCRF – Policy and Charging Rules Function
RNC – Radio Network Controllers
CP – Cyclic Prefix
DwPTS – Downlink Pilot Time Slot
GP – Guard Period
UpPTS – Uplink Pilot Time Slot
PBCH – Physical Broadcast Channel
PCFICH – Physical Control Format Indicator Channel
PDCCH – Physical Downlink Control Channel
PHICH – Physical Hybrid ARQ Indicator Channel
PDSCH – Physical Downlink Shared Channel
PMCH – Physical Multicast Channel
PUCCH – Physical Uplink Control Channel
PUSCH – Physical Uplink Shared Channel
PRACH – Physical Random Access Channel
BCH – Broadcast Channel
DL-SCH – Downlink Shared Channel
PCH – Paging Channel
MCH – Multicast Channel
UL-SCH – Uplink Shared Channel
RACH – Random Access Channel
BCCH – Broadcast Control Channel
PCCH – Paging Control Channel
CCCH – Common Control Channel
MCCH – Multicast Control Channel
DCCH – Dedicated Control Channel
DTCH – Dedicated Traffic Channel
MTCH – Multicast Traffic Channel
PHY – Physical layer
MAC – Medium Access Control
RLC – Radio Link Control
PDCP – Packet Data Convergence Protocol
11
RRC – Radio Resource Control
NAS – Non-Access Stratum
WiMAX – Worldwide Interoperability for Microwave Access
Wi-Fi – trademark of Wi-Fi Alliance
WMN – Wireless Mesh Network
IEEE – Institute of Electrical and Electronics Engineers
3G – Third Generation of Cellular Wireless Standards
4G – Fourth Generation of Cellular Wireless Standards
HSPA – High-Speed Packet Access
LTE – Long Term Evolution
WAN – Wide Area Network
LAN – Local Area Network
SS – Subscriber Station
BS – Base Station
BTS – Base Terminal Station
AP – Access Point
TDD – Time Division Duplex
FDD – Frequency Division Duplex
SNR – Signal to Noise Ratio
AMSL – Above Mean Sea Level
DWDM – Dense Wavelength Division Multiplexing
UWDM – Ultra Dense Wavelength Division Multiplexing
QoS – Quality of Service
SLA – Service Level Agreement
LOS – Line-of-sight
NLOS – Non-line-of-sight
SON – Self-Organizing Network
SHN – Self-Healing Network
CR – Cognitive Radio
UGS – Unsolicited Grant Services
CG – Continuous Grant
rtPS – Real–Time Polling Services
ErtPS – Extended Real–Time Polling Service
nrtPS – Non–Real–Time Polling Services
BE – Best Effort
MRTR – Minimum Reserved Traffic Rate
MSTR – Sustained Maximum Traffic Rate
ML – Maximum Latency
TJ – Tolerated Jitter
TP – Traffic Priority
R / TP – Request / Transmission Policy
MAC – Media Access Control address
MAC-PDU – MAC Protocol Data Unit
OEC – Office of Electronic Communications
VLAN – Virtual LAN
VPN – Virtual Private Network
IP – Internet Protocol
VoIP – Voice over Internet Protocol
QPSK – Quadrature Phase-Shift Keying
QAM – Quadrature Amplitude Modulation
12
1. Introduction
Mobile wireless Internet access is very perspective branch, which is one of the main
development directions in telecommunication. The idea is to provide as high as possible
transmission quality to portable devices for convenience of Internet usage everywhere.
High-Speed Packet Access (HSPA) technology as a current standard in cell networks can be
provided as an example of modern mobile systems. Offered throughput depends on the
release and region where it is implemented. In Polish cell networks like Orange, T-Mobile or
Plus, HSPA provides throughput at the level of 7.2 Mbit/s, but there are also known releases
with 21.6 Mbit/s of theoretical throughput. This solution is still evolving and now under the
name of HSPA+ can provides multiplied throughput of HSPA dependently on the release.
Mobile Worldwide Interoperability for Microwave Access (mobile WiMAX) standard IEEE
802.16e [34] is a mobile edition of WiMAX IEEE 802.11d. It allows for usage in movement.
As an example of this edition, South Korean network under name WiBro can be given. Base
station of this standard offers an aggregate data throughput at the level of 30 to 50 Mbit/s per
carrier and covering radius of 1–5 km. It allows for portable internet usage in mobility for
moving devices up to 120 km/h.
Long Term Evolution (LTE) Technology is actually bringing the highest amount of
investments by huge, worldwide operators like T-Mobile, Orange or Vodafone. It is
understandable taking under consideration the level of service offered by this technology [34].
Technology is very efficient in mobile usage as it improved the handover mechanism which
now allows for better handling this issue and stay connected even inside moving car or train.
Along progressive introduction of information society development assumptions, aims will be
gradually filling. Technological awareness is increasing together with each new generation. It
is visible in growing amount of high level of education staff in IT sector at the academic level.
It is only a matter of time when things will happen.
In this year sales of the smartphones and tablets exceeded the amount of ‘typical’ phones sale
[18]. That indicates the proper way of telecommunication development and underline
demands for mobile solutions. Actually not only the business market want to be constantly
connected to the Internet to receive e-mails and communicate with offices, consumer market
has shown that demands for mobile solutions refers also to this social area. Nowadays, people
doesn’t want only to receive e-mails, they also want to transfer some file, listen to Internet
radio, watch live relation from football match, what requires large amounts of data to be
transmitted and thus higher throughput from the operators.
Moreover, people want to use Internet in the places where in a few years ago they only could
dream about, mountains, beaches and so on, are now waiting for the Internet users. That
forced operators to extend network coverage outside typical Internet regions usage.
Constant development of the Internet services raises new challenges for mobile network
operators. Influence of the social services like Facebook or Twitter has great impact on the
mobile market, because millions of people are using them and everyone wants to be ‘in
touch’. This led to the moment that operators are offering free Internet access in the mobile
phones for usage with selected services, mostly social one since it doesn’t require high
13
amount of throughput. But there are also services like Skype or YouTube which demand high
speed Internet connection. Operators need to extend their networks and invest in the modern
wireless technologies which met the requirements of modern Internet services.
It is necessary to underline that actual throughput of the modern 3G and 4G technologies is
allowing to use even High-Definition television (HDTV) in mobility. This is a part of the
telecommunication market which is expected to be developing rapidly in the next few years,
so also investments of the operators in video technologies transmissions are obvious to
forecast. Lots of services have their mobile versions including video materials which are so
desirable by end users of mobile devices. There is also visible the trend of Internet Protocol
Television (IPTV) [40] intensified interest. People simply want to bring to their mobile
devices entertainment and information.
Constant development
All mobile systems are understood as development stages moving towards 4G solutions
including usage in mobility. Mobile WiMAX, so as LTE are known as ‘pre 4G’, because they
allow for mobile usage, but they are not fulfilling all requirements of 4G standard. It is
expected that by the end of 2011 standard called LTE Advanced will be released ([17], [18]).
At the moment that standard is submitted as a candidate to 4G systems, because it introduces
enhancements to the LTE standard which are aimed to fulfill all 4G requirements.
WiMAX Forum is also going to introduce their second release WiMAX 2 aimed to fulfill
requirements of 4G specification [39]. The standard known as IEEE 802.16m is planned to be
ready by the end of 2011. Despite the fact that actual release of Mobile WiMAX has been
defeated by the LTE, it is still being developed in some countries. Implementation of WiMAX
is good for some regions and it is even better than LTE from the point of implementation
costs. WiMAX brings more coverage on single Base Terminal Station (BTS), so it requires
less units than LTE to cover particular region. That is why many sources doesn’t define
WiMAX as a competitor of LTE because both technologies are dedicated for different part of
the telecommunication market. However, WiMAX 2 is planned to raise the stationary
throughput up to 1 Gb/s and portable up to 100 Mb/s. New release is going to use Orthogonal
Frequency Division Multiplexing (OFDM) and Multiple Input Multiple Output (MIMO)
technologies and will be backward compatible with previous generation of devices utilizing
WiMAX in the first release. First implementations of WiMAX confirmed the specification’s
data defining dowlink rate at 120 Mb/s and uplink at 60 Mb/s. BTS tests confirmed range of
about 70 km2.
Simultaneously with the final release of WiMAX 2, LTE is planned to be widely spreading all
over the world. Basing on first implementations and responses from the telecommunication
market, more and more operators are becoming certain that they need to implement LTE.
There is apprehension that WiMAX 2 will be released too late to compete with LTE, simply
because when operators decide to invest in the LTE which is planned, as the name said, long
term solution, it will be very hard to turn them into the WiMAX 2 direction.
Despite the fact of 4G technologies development operators are still investing into HSPA and
HSPA+ technologies. For most of nowadays typical users speeds offered by 3G HSPA are
affordable and they fulfilling their demands. It is conscious movement of operators because
implementation of the 4G technologies within the country is a long time and very expensive
process. Until most of the country will be covered by the 4G network signal, operators are
14
trying to increase signal quality of 3G. Comparing to 4G implementation process is cheap in
case of 3G and it assures incomes in the next 3-5 years. Simultaneously operators will be
investing into 4G backbone creation inside countries and at the moment when it will be ready
4G competition of the consumer market will grow rapidly.
Moreover, as it was said during Mobile World Congress in Barcelona 2011[41], also HSPA is
still planned to be improved to double actual downlink throughput to the level of 84 Mb/s.
Such improvements like sophisticated encoding techniques with multiple subcarriers are
planned to bring mentioned efficiency increment.
1.1 Work objectives
Presented Master of Science Thesis is aimed for elaboration of laboratory experiments for
teaching purposes in the area of simulations utilizing LTE Technology, WiMAX Network
planning and Self-Organizing Networks (SON). Laboratories concepts cover issues connected
directly with the concepts described on the newly-formed course based on the modern
wireless technologies like WiMAX, LTE and issues of Self-Organizing Networks, Cognitive
Networks, etc.
First objective referred to the selection of the proper area of investigations of particular
technologies during the laboratory experiments. This choice was essential because it
determined the way of student’s learning process. Elaborated laboratory experiments put the
highest focus on the LTE Technology, because actually it is the most desirable technology in
the telecommunication market. In the next order of importance WiMAX Technology is being
investigated as for the last few years it was the main competitor in the ‘battle of 4G
technologies’. Despite the fact that most of the market turns into the LTE, WiMAX is still
being developed and it is still attractive technology for some solutions. The last laboratory
experiment subject concerns SON.
In my opinion conducted selections are logical taking under consideration telecommunication
market trends and to demands for particular technologies. From the development support of
mentioned areas selected subject are also up to date.
Second main goal of the project refers to the selection of the software tools which could be
utilized during laboratory experiments. There was a need to examine each of tools and to find
the best one which will fit to the investigated laboratory experiments subjects.
Third general aim was to combine selected software tool with the demands of the examined
subject for particular investigation area. Along with that, there was also need to design the
way of execution the lab. Planned laboratory tasks constitute an internal part of the new
subject or group of subjects dedicated to the modern wireless technologies. Designed thesis
includes also creation of instruction sets for each particular laboratory exercise. Structure of
instructions consists of two parts – theoretical and practical. The first one contains all
necessary theory knowledge that students will be required to get to known before each
laboratory session. This part includes also the user guide for the tools used on the exercises.
The second part of instruction determines the set of practical tasks, steps explaining the way
of working and tips necessary to make familiar with the utilized tools.
15
1.2 Complementarity
Designed thesis is complementary to [15]. It includes elaborated laboratory exercises for
newly-formed course concerning modern wireless technologies.
There are planned eight laboratory sessions which will cover related content with utilization
of the different tools and checking different abilities.
There are planned:
Four laboratory sessions concerning LTE simulations,
Two laboratory sessions concerning WiMAX Network planning,
One laboratory session concerning Self-Organizing Networks,
One laboratory session concerning Cognitive Radio.
Selection of the tools issue is described in the section 2.3.
Laboratory sessions schedule:
1. Investigation of the LTE Technology simulation – Generation of uplink transmission
frames – with usage of the LTE PHY Lab tool.
2. Investigation of the LTE Technology simulation – Simulation of the influence of the
transmit-receive mismatches on the received signal – with usage of the LTE PHY Lab
tool.
3. Investigation of the LTE Technology simulation – Generation of PDSCH symbols –
with usage of the LTE PHY Lab tool.
4. Investigation of the LTE Technology simulation – Generation of downlink
transmission frames – with usage of the LTE PHY Lab tool.
5. Investigation of the WiMAX Network planning with usage of the WiMAXProjekt –
part 1.
6. Investigation of the WiMAX Network planning with usage of the WiMAXProjekt –
part 2.
7. Investigation of the Self-Organizing Networks with usage of the PKSA Planner tool.
8. Investigation of the Cognitive Radio.
1.3 Structure of the work
Thesis consists of the several sections including both practical and theoretical work. In the
Chapter 1 there are presented objectives of the thesis with introduction explaining the reason
of selection such topic for investigations.
Chapter 2 refers to the investigations of the available tools which can be utilized during
particular laboratory experiments. This section includes brief descriptions of each particular
tool.
Chapter 3 refers to the description of laboratory experiments sessions organization and rules.
Chapters 4, 5, 6, 7 are dedicated to the particular laboratory experiments. Each chapter
includes description of the laboratory tasks and overall schedule of the tasks. There are also
theoretical introductions of essential knowledge which students are obliged to know before
the laboratory. Each chapter has also included instruction of the tool utilized in the particular
16
experiment. At the end of each chapter there is summary of the abilities which can be gained
by the students and overall conclusions.
Conclusions referring to whole work are located in the Chapter 8.
Chapter 9 is dedicated to the references and additional notes.
17
2. Analysis of the available software tools utilized further in the laboratory experiments
First objective of the thesis refers to the investigation of the available software tools covering
the area of the LTE, WiMAX technologies and SON method. This section presents
descriptions of the tools fulfilling demands for teaching purposes.
2.1 Preface for newly-formed teaching course
Elaborated laboratory experiments concepts will cover issues connected directly with the
concepts described on the newly-formed course based on the modern wireless technologies
like WiMAX, LTE and issues of SON, Cognitive Networks. During course students will learn
the fundamentals and more specialized matters of mentioned technologies and methods.
2.2 Software tool selection
This section is referring to the selection of the software tools which was taken under
consideration to be the part of the laboratory experiments conducted within the newly-formed
course.
2.2.1 LTE simulation utilizing selected method
In the Master of Science Thesis investigations referring to LTE Technology the LTE PHY
Lab Tool will be utilized, regarding WiMAX Technology the WiMAXProjekt will be utilized.
However, there are also other tools like LTE Suite or WiMAX PHY Lab available. The main
problem with the selection of the simulation tools is its hard availability due to their high cost.
The alternative is the free or low cost Matlab equivalents, but their quality and accuracy are
really low comparing to the commercial ones.
In the area of SON students will be using the PKSA Planner tool [10].
A. LTE PHY Lab
LTE PHY Lab tool is a Matlab toolbox allowing for investigations of the LTE physical layer
[17]. Structure of this tool allows to utilize it by professionals during each stage of LTE
software or hardware development since research and prototype processes to simulation of the
fully designed system.
LTE PHY Lab is implemented according to TS 36.211-870, TS 36.212-870 and TS 36.213-
870 specifications.
It provides ability to simulate downlink and uplink chains of the LTE PHY layer. Users gain
possibility to set essential simulation parameters of modulation, OFDMA, SC-FDMA or
MIMO and observe deeply the resource mapping. It allows for creation a complete models of
eNodeB (eNB) and User Equipment (UE).
18
It is worth to underline that LTE PHY Lab tool structure is very granular what allows for high
flexibility of simulations. Such customization allows to investigate the role of every single
component block inside designed experiment. It is very beneficial especially in the education.
The problem with LTE PHY Lab tool is that it is not freeware.
B. LTE Suite
LteSuite is compliant to the 3GPP Release-8 LTE standard specification [29]. It provides
ability to simulate the LTE L1/L2 layers with utilization of MIMO and OFDMA.
LTE Suite is divided into 4 standalone applications:
o LTE Grid
Basic component allowing to generate LTE resource grid using appropriate setting of the
simulation parameters. Users gain possibility to manage parameters like Cell id, transmission
bandwidth or number of antenna ports.
o LTE Wave
Separate component allowing to simulate and observe LTE waveforms. User gain possibility
to see how particular signal processing techniques is resulting on the final plots. It is possible
to observe such effects like filtering or PAPR clipping. Basing on the provided observations,
user can analyze the LTE waveforms in the form of spectral analysis, EVM measurements or
channel estimation accuracy.
o LTE Link
This component of the LTE Suite is a toolbox for Matlab allowing for investigations of the
downlink transmission in the LTE L1 layer. Toolbox provides ability to use during
simulations such techniques like SISO, spatial multiplexing, HARQ control or channel coding
and decoding.
o LTE System
This component of the LTE Suite is a toolbox for Matlab allowing for investigations of the
UE simulations. It provides feedback mechanism, link-adaptation and multi-user scheduling.
The problem with LTE Suite is that it is not freeware. Only feature limited version is available
for free. For full one, user has to purchase the product.
C. Matlab tools (option)
Other Matlab tools connected with issue of LTE planning, taken from the [33].
19
2.2.2 WiMAX Networks planning utilizing selected method
A. WiMAX PHY Lab
WiMAX PHY Lab tool is a Matlab toolbox allowing for investigations of the mobile WiMAX
physical layer [17]. Structure of this tool allows to utilize it by professionals during each stage
of WiMAX software or hardware development since research and prototype processes to
simulation of the fully designed system.
WiMAX PHY Lab is implemented according to IEEE 802.16e-2005 (and 802.16d-2004
where necessary) and WiMAX Forum Mobile System Profile Specification Release 1.5.
It provides ability to simulate downlink and uplink chains of the WiMAX PHY layer. Users
gain possibility to set essential simulation parameters of modulation, OFDMA or MIMO and
observe deeply the resource mapping. It allows for creation a complete models of Base
Stations (BS) and Mobile Stations (MS).
It is worth to underline that WiMAX PHY Lab tool structure is very granular what allows for
high flexibility of simulations. Such customization allows to investigate the role of every
single component block inside designed experiment. It is very beneficial especially in the
education.
The problem with WiMAX PHY Lab tool is that it is not freeware.
B. WiMAX Projekt
It is a tool used for assistance with planning wireless nomadic networks in standard IEEE
802.16 [2]. This tool makes easier to select the location of BTS station and proper sector
adjustment. It is collaborating with widely used tools –Google Earth. Thanks to that it offers
useful features as:
Altitude maps with terrain cross-section
Iterative Covering Algorithm which helps with positioning BTS stations
Possibility for selection specified sets of network parameters and features as types of
antennas, transmitters capacities, height of objects positions, others
Allows for cells size calculation for different modulations
By realization of some different running examples I familiarized with this tool and its
features. Optimization of the network using this tool may be really profitable. After
determination the final concepts, assumptions and data for my project I will use this tool to
optimize it.
C. PTP Link Planner
Motorola’s PTP Link Planner is allowing to create and configure point-to-point network links
[30]. It allows to simulate behavior of the network under particularly set parameters like
geographical location, distances between stations, antenna height, transmitting power. Users
gain possibility to change parameters of simulations and to optimize performance of their
designed networks basing on the observations of simulations. It is also quite intelligent what
20
allows for better optimization of the designed networks. Tool is very intuitive what facilitates
its usability.
D. Radio Mobile
Radio Mobile is a freeware tool which is allowing to predict the performance of a radio
system [31]. Basing on the digital terrain elevation and environmental data, application is able
to automatize path selection between an emitter and receiver of the network inside terrain
model. User gain possibility to observe 3D, stereoscopic and animation views of the planned
terrain. Moreover, obtained results can be merged with map, satellite photo or military ADRG
for better detailed view of the terrain.
Huge advantage of this tool is the fact that it is freeware.
E. WLAN Link Planner
Simple tool which could be utilized in case of WLAN planning [32].
F. Matlab tools (option)
Other Matlab tools connected with issue of WiMAX planning, taken from the [19].
2.2.3 Self-Organizing Networks
A. PKSA Planner
During laboratory session concerning the Self-Organizing Networks students will be using the
PKSA Planner tool [10]. It allows for investigation of the network topology, checking the
availability of the network resources, creation of the basic and additional configurations for
plans 1+1, 1:1, 1:N, handling failure scenarios and network reconfiguration process,
optimization of required resources and analysis of reconfiguration process performance.
Application allows also for visualization of the planned network topology, also with the
algorithmic way of configuration the basic and additional paths for methods End-to-end and
Link-based.
B. Motorola’s SON
Motorola’s SON is a tool which allows for planning and optimizing SON parameters of the
LTE network [30]. Taking under such parameters like network coverage, capacity, cell size,
topology, frequency allocation and bandwidth user can observe network behavior. It is
possible to observe problems like interferences, which can be faced by parameters
optimization. It is also possible to face other problems like weak signal strength or high
network traffic in some locations.
21
Such optimizations facilitate network implementation what is connected with minimization of
the operation costs of running a network. Conducting network planning and parameters
optimization by simulations decrease possibility for bad implementation of the real network.
C. Matlab tools (option)
Other Matlab tools connected with issue of SON, taken from the [33].
22
3. Laboratory experiments organization
On the beginning of the laboratory experiment students will get familiar with the main
functions which will be investigated during it. Before the lab students are obliged to get to
known the theoretical instruction which explains the concept of necessary area of
examinations on LTE and WiMAX Technologies and Self-Organizing Networks.
Regarding LTE laboratory students get the basic function for generation of the downlink and
uplink transmissions which they need to extend by putting an additional blocks with necessary
data. Students have to base on their theoretical knowledge and on the list of additional
functions which they can use for investigations of the topic.
Each task has its own basic Matlab example for students’ investigations.
Materials and guides given for the students and laboratory supervisors:
1. Full, detailed sample scenario for particular tasks. The scenarios will be also prepared and
resolved by the laboratory supervisors to compare the results.
2. Detailed user guide instruction of the LTE PHY Lab Tool for Matlab including description
of all input and output parameters and propositions for their settings. User guide instruction
will be based on the tool’s documentation and experience with simulations with its usage.
3. Detailed user guide instruction of the WiMAXProjekt tool including description of the
particular functions necessary during laboratory experiment investigations. User guide
instruction will be based on the tool’s documentation and experience with simulations with its
usage.
4. Detailed user guide instruction of the PKSA Planner for Matlab including description of all
input and output parameters and propositions for their settings. User guide instruction will be
based on the tool’s documentation and experience with simulations with its usage.
5. Theoretical instructions including all necessary knowledge for the laboratory experiment
investigations.
3.1 Laboratory experiments rules
1. Students should expect that each laboratory experiment laboratory supervisor can order
them to answer 1 or 2 short questions as the preliminary test. Students’ answers will be
evaluated accordingly to the scoring proposals for particular laboratory experiment.
2. Each laboratory session is planned to last 3 hours, but for the extreme situations, there
should be reserved 1 more hour. There can occur situation when simulation applications can
operate too slowly to let students finish their reports in the defined time. Such situation can
occur especially in case of the WiMAXProjekt which is not so optimized in the operation
speed area.
3. Students can create two person teams, but they are not obliged to do so.
4. Each student’s team has to prepare laboratory report including:
results of simulations with clear explanation and descriptions of its particular
elements
necessary comments describing the way to achieve team’s results
23
summary of each part of simulation with description of achieved aim
answers for the questions asked in the laboratory experiment
conclusions summarizing and comparing results, advantages and disadvantages of
particular method, solution, etc. will be recognized as an additional contribution and
evaluated with additional points
24
4. Laboratory no 1 – investigations of the downlink physical channels of the LTE Technology with utilization of the LTE PHY Lab Matlab tool.
Laboratory number 1 refers to the investigations of the downlink physical channel of the LTE
Technology with utilization of the LTE PHY Lab Matlab tool. During laboratory session
students will get possibility to observe how LTE network operates during downlink
transmission taking under consideration the structure of the LTE radio frame and particular
subframes. Students will be able to see the role of the particular LTE channels and signals and
principles of the OFDMA operation.
Investigations cover the analysis of four main areas:
1. Data allocations for downlink model of LTE.
2. Radio frame and subframe.
3. Radio frame channels and signals.
4. OFDMA.
Basic settings code for downlink analysis: %Input parameters and data txDLSCH = randint(1,300,2); %input data block of 300 bits txBCH = randint(1,24,2); %input bits for BCH (always 24) txDCI = struct('data',
{randint(1,26,2),randint(1,12,2),randint(1,14,2)},... 'PDCCHformat', {0, 0, 0}, ... 'nRNTI', {12, 0, 133}); %input info for DCI (3 DCIs) txHI = randint(1,8,2); %input bits for HI (indicators) mimoSetting = [1 0 1 0 1 0 0 0 1]; %MIMO setting (here SISO) modOrder = 4; %modulation order (QPSK – 4 symbols) numSubframe = 0; %subframe number sizeFFT = 256; %FFT size (corresponding to BW 3MHz) numPDCCH = 3; %3 OFDMA symbols allocated for Control region numsPRB = [2 3 7]; %Resource allocation for data: PRB number 2, 3 and 7 nF = 0; %frame number N_cell_ID = 123; %physical cell ID trBlkSize = 600; %transport block size RVidx = 0; %redundancy version index
%Processing – calling the transmitter function txOFDMSymbols = LTEDLPhyTransmitter(txDLSCH, txBCH, ... txDCI,txHI,mimoSetting, modOrder, numSubframe, sizeFFT, ... numPDCCH, numsPRB, N_cell_ID, nF, trBlkSize, RVidx);
%Plotting the spectrogram spectrogram(ifft(fftshift(fft(txOFDMSymbols))),200,100,1024); %We need to perform fftshift operation to shift the subcarrier zero into
the center of the picture
Presented settings code for downlink analysis is only for help purposes and for more
advanced students who would like to simulate something exceeding the laboratory exercises
program. Students are encouraged to use the particular elements from presented code for their
simulations in the following tasks. Codes dedicated for the particular laboratory tasks are
provided under each of them.
25
Task 1:
First task refers to the investigations of the data allocations for downlink model in LTE
transmission.
Fig. 1 eNB Transmitter block scheme involved in the downlink investigations[38]
Students are encouraged to try to combine eNB Transmiter block scheme on Fig.13 with
simulation observations and to conclude dependence of particular scheme blocks, channels
and signals onto each other. Students have to differentiate physical from transport and control
channels and to clearly understand the role of particular elements.
This simulation example helps students for better understanding of the downlink model
transmissions in LTE Technology.
Students should focus on the operation of PDCCH and their data blocks which are influencing
whole transmission. Second important issue is to observe changes in the downlink
transmission map resources made by changing PRBs number and their data blocks.
Observations of resource map behavior are essential in this laboratory experiment. Basing on
them, it is possible to forecast the occurrence of particular resource elements and resource
blocks in particular locations inside the resource map. Elements like RSs can be then easily
located what makes whole operation more understandable for the person who is going to learn
operation principles of the whole technology. Moreover, some elements which are appearing
only in the defined way or situation are now more predictable. As an example can be taken P-
SS, S-SS and PBCH which are appearing only in some subframes. In this way in is more
26
comfortable for students to learn the role of particular elements in the whole downlink
transmission operation.
In the second task more focus has been directed into investigations of the role of particular
channels during downlink transmission. In this area of examinations students should put their
attention to the role of particular parameters of the simulation data. Such parameters like
selected channel, antennas number and input byte stream vector of user data are the most
essential during such simulations.
LTE PHY Lab as Matlab application brings large amount of Matlab’s facilitations during
simulations. For example 3D manipulation which changes the vision angle on the simulated
resulting plots offers more accessible data during investigations. This feature is most useful in
the case when we need to differentiate some particular resource element from the other.
Basing on the observations done over the tool, this feature makes simulations more
comfortable and results are becoming more understandable.
Another feature which is really important facilitation is a well-developed support ‘help’ inside
the application. It brings the clean, comprehensive description of particular functions given
for the user in the intelligent way. Particular commands come with bright and wide
specification including default data which can be utilized during the simulations. Each
parameter of the data is provided with clear explanation of its role. Moreover, it has
description of the way of its proper utilization inside particular functions. Such facilitation is
very important for the students who would desire instant explanations of particular functions.
This function also allows to perform testing of new functionalities more easily.
Students are asked to indicate particular elements of the system, to differentiate them and to
show their way of understanding roles of them. Their knowledge will be examined basing on
the practical and real simulation cases performed during the laboratory experiment. Important
issue concerns the ability to combine logical thinking with analysis of the whole system.
Basic settings code for downlink data allocations analysis: function lab3_1_DL_Data_Allocations %DL transmission %inputDataBlock = struct of data bytes to be placed into radio frame %(must be size(10,x)) where x is not restricted. %Each row is transmitted over different %subframe on the PRBs corresponding to the numsPRB %values inputDataBlock = struct('data', {[1:15], [1:15], [1:15], [1:31], [1:31],... [1:31], [1:56], [1:56], [1:15], [1:56]}); %numPDCCH = vector of number of the PDCCH Symbols per subframe of %length(10) (value = 1,2 or 3) numPDCCH = [2 2 3 3 3 2 2 2 3 3]; %numsPRB = matrix of PRB numbers where the data is mapped on, must be in %ascending order size(10, x), where 1<x<max num PRB.For %this version of the simulator all vectors must be the %same size numsPRB = struct('PRB',{[0 1 2], [3], [5 6], [7 8 9], [9 10],... [11 12 13], [11 14 15], [16 17 18], [19 20 21], [22 23 24]}); %modOrder = vector of modulation orders per subframe, length(10), %(values: 4 for QPSK, 16 for 16QAM, 64 for 64QAM) modOrder = [16 16 16 16 16 16 16 16 16 16]; %sizeFFT = number corresponding to the fft size (related to the system % BW), (values: 256, 512)
27
sizeFFT = 512; outputSamples = LTELinkLevelSimulateDL(inputDataBlock,... numPDCCH,numsPRB, modOrder, sizeFFT); end
Presented code allows for simulation of the downlink radio frame allocation of the user data.
Simulation is presenting each subframes from 0 to 9 and after that the whole frame. User have
to remember that available FFT sizes are 256 and 512 which corresponds to the 3 and 5 MHz
bandwidth channels and 15 and 25 Resource Blocks (RBs) respectively. User must not exceed
those limits in the configuration code. The simulation shows spectrogram (also in 3D view).
Users can manipulate the 3D view to observe simulation from other perspectives.
Laboratory experiment code file is lab3_1_DL_Data_Allocations.m
1. Investigation of the simulation data:
a) Build the input data block (inputDataBlock variable).
b) Select proper number and format of Physical Downlink Control Channel (numPDCCH
variable). Remember that proper structure creating the frame has includes 10 subframes.
c) Build proper structure and format of allocation PRB (numsPRB variable).
d) Try to change modulation for each block of the allocation structure PRB (modOrder
variable).
e) Try to change FFT sizes (sizeFFT variable).
2.Run the simulation, observe the results and comment them:
a) Observe how look each particular subframe, remember that switching between following
subframes can be done using ‘space’ key.
b) Observe how look full allocations of the subframes in the whole frame for particular
simulation.
c) Manipulate the 3D plots to observe their appearance from different perspectives.
d) Investigate the allocation of the particular blocks in the frames in each of previous points.
e) Comment the influence of particular initial data parameters on simulation results.
3. Repeat simulations three times for different sets of data, comment the results and
conclude your observations. Describe the connections between particular elements of
simulations and influences between each other.
4. Answer the questions:
a) How inputDataBlock structures are influencing the resulting plots? Which elements are
influenced by it and how they are being changed?
b) How numsPRB influence on the resulting plots? Which elements influence on them and
how they change their look?
c) Save simulation figures presenting mapping of characteristic subframes 0, 6 and two
subframes selected by you. Clearly mark on the picture each element (if any):
RS,
P-SS – in which subframes it can be seen?
S-SS – in which subframes it can be seen?
PBCH – in which subframes it can be seen?
OFDMA symbols with control region (PDCCH, PHICH, PCFICH),
PRB – specify the numbers of them,
Specify bandwidth,
28
Specify the number of OFDMA symbols.
Describe the role of the particular elements. Each figure with necessary description has
to be placed in the laboratory exercise report.
d) What is presented on the last DL Radio Frame simulation figure? Describe particular parts
of it.
Task 2:
Second task refers to the physical downlink channels investigations for downlink model in
LTE transmission.
Basic settings code for downlink physical channels analysis: function lab3_2_DL_Channels % channel = choice of the particular channel to be plotted/allocated: % 1 - RS, 2 - PSS, 3 - SSS, 4 - PBCH, 5 - PCFICH, 6 - PHICH, % 7 - PDCCH, 8 - PDSCH channel = 1; % numAntennas = number of antennas in the system numAntennas = 1; % txBytes = the input byte stream vector of user data txBytes = randint(1,100,63); %modOrder = vector of modulation orders per subframe, length(10), %(values: 4 for QPSK, 16 for 16QAM, 64 for 64QAM) modOrder = 4; % numSubframe = the number of the subframe in the LTE radio frame (0-9) numSubframe = 1; %sizeFFT = number corresponding to the fft size (related to the system % BW), (values: 256, 512) sizeFFT = 256; %numPDCCH = vector of number of the PDCCH Symbols per subframe of %length(10) (value = 1,2 or 3) numPDCCH = 2; %numsPRB = matrix of PRB numbers where the data is mapped on, must be in %ascending order size(10, x), where 1<x<max num PRB.For %this version of the simulator all vectors must be the %same size numsPRB = [2 3 4]; whitebg('k') txOFDMSymbolsRS = LTEDLPhyTransmitterCA(channel, numAntennas,... txBytes, modOrder, numSubframe, sizeFFT, numPDCCH,
numsPRB); spectrogram(txOFDMSymbolsRS,256,128,1024,3840000), title('Selected
channel for 1 antenna'); pause(); end
Presented code allows for simulation of the downlink physical channels like RS, P-SS, S-SS,
PBCH, PCFICH, PHICH, PDCCH, PDSCH. The simulation shows scatterplot, spectrogram
(also in 3D view) and time frequency allocation (also in 3D view). Users can manipulate the
3D view to observe simulation from other perspectives. During laboratory experiments
investigations students should analysis only scatterplots and spectrograms, without
investigations of time frequency allocations.
Laboratory experiment code file is lab3_2_DL_ Channels.m
1. Investigation of the simulation data:
a) Select investigated channel.
29
b) Investigate how particular channel looks like for different subframe (numSubframe
variable).
b) Select randomly the bytes for downlink transmission (txBytes).
b) Select proper number and format of Physical Downlink Control Channel (numPDCCH
variable).
c) Build proper structure of allocation PRB (numsPRB variable).
d) Try to change modulation (modOrder variable).
e) Try to change FFT sizes (sizeFFT variable).
2. Run the simulation, observe the results and comment them:
a) Observe the channels: RS, PSS, SSS, PBCH, PCFICH, PHICH, PDCCH, PDSCH on the
scatterplot, spectrogram in 3D and in time-frequency allocation in 3D.
b) Manipulate the 3D plots to observe their appearance from different perspectives.
c) Investigate the allocation of the particular blocks in the frames in each of previous points.
d) Comment the influence of particular initial data parameters on simulation results.
3. Repeat simulations three times for different sets of data, comment the results and
conclude your observations. Describe the connections between particular elements of
simulations and influences between each other.
4. Answer the questions:
a) Does any channel looks different in some particular subframe number? Describe the
differences and explain why.
b) Describe how selected modulation influences the resulting channel mappings.
c) Describe the role of each physical uplink channels in each possible mode. Select four
simulation figures presenting mapping of physical downlink channels and save them. Clearly
mark on the picture each selected physical channel (from set: RS, PSS, SSS, PBCH, PCFICH,
PHICH, PDCCH, PDSCH) Resource Blocks and elements:
Specify bandwidth,
Specify the number of OFDMA symbols.
Describe the role of the particular elements. Each figure with necessary description has
to be placed in the laboratory exercise report. Use the sample scatterplots to get to
know the scheme showing the way to describe the way of reporting the laboratory
experiment results.
30
Sample scatterplots can be seen below:
On the first scatterplots we can find sample downlink frame which is the result of the
simulation. During the experiments students will be dealing with such matter of
investigations. It is necessary for them to differentiate particular REs, RBs, etc. and to
indicate their function in the transmission process.
Fig. 2 Sample downlink subframe
In the second scatterplot it is visible the same result of simulation but the angle of the vision
has been changed from 2D to 3D. Such view facilitates the examination of the received results
and moreover it facilitates way of understanding the whole transmission process.
Fig. 3 Sample downlink subframe – 3D view of the previous scatterplot
31
Using own knowledge and tutorial notes students should mark particular channels in the way
presented on the figure 16. Each element on the scheme has to be indicated and briefly
described. Students should also describe features and roles of them. The most essential part is
to combine received results with gained knowledge and to describe relationships and
influences between particular elements.
Fig. 4 Sample downlink subframe 0 presenting way of scatterplots description expected in the students’ reports
At the end of the simulation students will get full downlink frame constructed from the
previously obtained subframes. Important and desirable ability is connected with matching
results obtained for particular subframe with the general observations of the final full frame.
Conclusions concerning influence of particular subframes on the full frame are the most
essential at this point.
Fig. 5 Sample downlink frame with overall view on each subframe
32
4.1 Selected issues of LTE Technology
In this section there are presented essential issues of the LTE Technology with which students
have to be familiar before the laboratory session. This introduction is common for laboratory
sessions 3 and 4.
4.1.1 LTE Technology introduction
Following theoretical introduction states that students know the basics of the LTE Technology
and it is not required to quote them. Moreover it is a supplement to [15] LTE theoretical
introduction as each thesis is an internal part of the course and they are mutually
complementary.
Presented introduction includes the most essential information concerning issues examined
during the laboratory exercises. For more information students should refer to the mentioned
sources.
4.1.2 Frame structures
LTE systems have characteristic kind of frames and subframe structures that have been
defined to manage the synchronization of the whole system and exchange of different types of
information. In both downlink and uplink transmissions, dependently on the duplex mode
TDD or FDD there are two LTE frame structures, which are utilized accordingly to the
services and their priorities which are being introduced in the operating networks, i.e. VoIP
services will rather introduce FDD mode due to the fact that they better operate in that mode.
LTE introduces two types of frame structures:
Type 1 – utilized in the systems operating in the FDD mode,
Type 2 – utilized in the systems operating in the TDD mode.
LTE frame structure of Type 1
LTE frame structure of Type 1 is utilized in systems operating in the FDD mode. Each frame
consists of 10 subframes of 1 ms each resulting in total of overall 10 ms frame length. Each
subframe is created by two 0.5 ms slots, what means that in whole frame we have 20 slots.
Each slot consists of 6 or 7 OFDM symbols depending on the type of selected CP, 6 when
extended and 7 when normal(short) CP is being introduced. The basic unit dedicated for time
counting in LTE is Sample Time (Ts) which defines the amount of time allocated for each
OFDM sample. Ts is defined as Ts=1/(15000*2048) second or near 32.6 nanoseconds.
33
Fig. 6 Frame type 1, timing and symbol allocations shown for FDD with normal cyclic prefix (CP) [13]
LTE frame structure of Type 2
LTE frame structure of Type 2 is utilized in systems operating in the TDD mode. Each frame
consists of 2 half frames of 5 ms consisting of 5 subframes of 1 ms. Each subframe, just like
in the LTE Type 1 frame, is divided into two slots of 0.5 ms each. In this subframe type it is
essential that at least one half frame includes a special subframe carrying three fields of
switch information:
DwPTS – Downlink Pilot Time Slot,
GP – Guard Period,
UpPTS – Uplink Pilot Time Slot.
Second type of LTE frame can have two switching time, at 5 ms and at 10 ms. In the first case
switching information occurs in both half frames, firstly in the subframe one and secondly in
the subframe six. In the second case switching information occurs only in the subframe one.
For the downlink transmission LTE reserves subframes 0 and 5 and DwPTS. Uplink
transmission reserves UpPTS and the subframe following it. Other subframes can be utilized
in both downlink and uplink transmission modes. Special subframes can be configured
individually in the terms of length, however the length of them all have to be equal 1 ms in
total.
Fig. 7 Frame type 2 – special fields are shown in subframes 1 and 6. Guard period separates the Downlink and Uplink.
This TDD example represents a 5ms switch point. A 10ms switch point would not have the special fields in subframe
6. [13]
34
Resource Elements, Resource Block
LTE introduces also different units referring to the both time and frequency aspects apart
from the time-domain viewpoint. Resource Element (RE) is defined as one symbol in time
versus one subcarrier in the frequency and it is known as the smallest structure in the LTE
PHY notation system. Resource Elements are further aggregated into Resource Blocks (RB).
Dependently on the selected CP the number of symbols in RB is changing. Typically, for
normal (short) CP the RB contains 7 symbols. But in case of extreme delay spread or
multimedia broadcast modes usage the extended CP is being used causing that RB contains
only 6 symbols.
There are two types of Resource Blocks selected accordingly to selected CP:
6 symbols by 12 subcarriers for extended (long) CP,
7 symbols by 12 subcarriers for normal (short) CP.
Resource Elements and Resource Block structure containing 7 symbols by 12 subcarriers
(normal CP) is presented on the Figure 20.
Fig. 8 Relationship between a slot, symbols and Resource Blocks. N(dl/rb) is the symbol used to indicate the maximum
number of downlink Resource Blocks for a given bandwidth. [35]
Transmitted downlink signal consists of downlink Resource Blocks for a duration of the
6 or 7 OFDM symbols (accordingly to the selected CP). If normal CP is utilized then one slot
can be defined as a RB consisting of 7 symbols by 12 subcarriers including 84 RE per RB.
Frame which consists of 20 slots corresponds to 1680 RE of 20 slots by 84 REs each. Such
configuration is presented on the Figure 21 containing resource grid. It is necessary to
underline that MIMO utilizes separate resource grids for each transmitting antenna.
35
Fig. 9 Resource grid scheme [14]
Reference Signals
LTE introduces a concept of special Reference Signals (RS) interspersed among REs and
transmitted every sixth subcarrier. Accordingly to the utilized CP the RSs are transmitted
differently. In case of normal CP, RSs are transmitted during the first and fifth OFDM
symbols of each slot. While extended CP is used, RSs occupies the first and fourth OFDM
symbols. Further, RSs are distributed over the time and frequency. On the subcarriers bearing
the RSs the channel response can be computed directly, while the rest of subcarriers need
interpolation for channel response estimation.
36
Fig. 10 LTE Reference Symbols distribution among the Reference Elements [14]
4.1.3 LTE downlink channels and signals types
In order to keep the data transmission arrangement LTE utilizes channels and signals.
Different kinds of channels allows for communication with higher layers within LTE
protocol. Channels are also facilitating segregation of the different types of data. LTE
standard describes exact positions in the frame of physical signals and channels in terms of
subcarriers and symbols.
There are three main categories of channels in LTE:
Physical channels acting as transmission channels carrying user data and control
messages.
Transport channels offering information transfer to the Medium Access Control
(MAC) and higher order layers.
Logical channels providing services for MAC layer.
Downlink Physical channels
Downlink Physical Channel refers to the RE carrying information originating from higher
layers and its interfaces.
37
Fig. 11 Map of Downlink frame using FDD and normal CP shows the relative location of the various physical
channels. Frames in systems using extended CP or TDD would be slightly different. [35]
Physical Downlink Shared Channel (PDSCH)
Physical Downlink Shared Channel is responsible for carrying downlink user data. The
specified number of RBs is being associated via OFDMA with particular users defining
user data rate. Physically, PDSCH is a RB of 1 ms length and 180 kHz width. LTE
terminal basing on the Channel Quality Indicator (CQI) information is allocating the
resources within the eNB base station. The shared channel PDSCH is time shared with the
control channel PDCCH in the first timeslot of each subframe. It is allocated in the second
timeslot for which the subframe does not transmit broadcast (PBCH), Primary
Synchronization (PSS) or Secondary Synchronization (SSS). PDSCH is desired for high
data rates. It can operate with QPSK, 16-QAM, and 64-QAM modulation modes. PDSCH
exclusively uses spatial multiplexing. In the PDSCH channel RSs are allocated regularly
enabling channel estimation and minimizing overhead.
Physical Broadcast Channel (PBCH)
Physical Broadcast Channel is utilized to send cell-specific system identification and
access control parameters, like Random Access (RACH) parameters, every 4th frame (40
ms) using QPSK modulation. PBCH structure is independent of the actually utilized
system bandwidth because it is always provided with 1.08 MHz bandwidth. In case with
1.4 MHz system bandwidth, there are no RBs on either side of the PBCH in the frequency
domain in use, so the meet the spectrum mask requirements only 6 RBs are used
effectively.
Physical Control Format Indicator Channel (PCFICH)
Physical Control Format Indicator Channel is indicating the num ber of OFDM symbols
reserved for control information in PDCCH in a subframe. For each subframe PCFICH can
indicate them from 1 to 3. Dynamic signaling offered by PCFICH is beneficial due to the
fact that system can support two different modes of user data, when large number of low
data rate users and when higher data rates are used by fewer active users to provide
sufficiently low signaling overhead. PCFICH utilizes QPSK modulation mode.
38
Physical Downlink Control Channel (PDCCH)
Physical Downlink Control Channel is allocating both uplink and downlink resource
scheduling. PDCCH utilizes QPSK modulation mode. PDCCH maps Downlink Control
Information (DCI) having different formats and depending on its size it is transmitted in
one or more Control Channel Elements (CCEs). They refers to 9 RE groups consisting of 4
RE each. PDCCH having shared information (PDSCH) often is being referred to as the
downlink assignment. During providing downlink resource allocation information related
to the Primary Synchronization (PSS) to the downlink assignment gets information
concerning:
RB allocation
Downlink user data modulation and coding scheme
HARQ process number
Power control commands for PUCCH
Physical Multicast Channel (PMCH)
Physical Multicast Channel is providing multimedia broadcast information. Multicast
information can be sent to multiple wireless devices simultaneously. PMCH can operate
using QPSK, 16-QAM, or 64-QAM modulation modes.
Physical Hybrid ARQ Indicator Channel (PHICH)
Physical Hybrid ARQ Indicator Channel indicates in downlink whether an uplink packet
was correctly received using ACK/NACKs acknowledgment indicators. If packet was not
received then PHICH inquires for packet retransmission. Necessary information are
received from PDCCH. ACK/NACKs are implemented inside HARQ mechanism.
Downlink Physical Signals
Reference Signal (RS)
Reference Signal in downlink is used for channel estimation by wireless devices. RS
allows to determine the Channel Impulse Response (CIR).
RSs are generated as the symbol-by-symbol product of a two-dimensional orthogonal
sequence and a two-dimensional pseudo-random sequence. LTE specification determines
510 sequences of RSs since there are 3 different two-dimensional orthogonal sequences
and 170 available two-dimensional sequences for the Pseudorandom Number (PRN).
In case of normal CP, RSs are transmitted during the first and fifth OFDM symbols of each
slot. While extended CP is used, RSs occupies the first and fourth OFDM symbols.
Further, RS’ are distributed over the time and frequency.
There are three types of downlink RSs defined:
Cell-specific RSs utilizing non-multimedia broadcast Multicast Service Single
Frequency Network (MBSFN) transmission
MBSFN RSs utilizing MBSFN transmission
UE-specific RSs
39
Cell-specific Reference Signals
Cell-specific Reference Signals occurrence refers to the cells which are supporting the non-
MBSFN transmissions in the downlink subframes. Cell-specific RSs can be used also for
transmissions utilizing MBSFN, in such case only two first OFDM symbols of the
subframe can be utilized. All of the cell-specific RSs for transmission utilize ports from 0
to 3 of one or several antennas.
MBSFN Reference Signals
MBSFN Reference Signals occurrence refers to the cells which are suporting MBSFN
transmission. MBSFN RSs for transmission utilize port 4 of the antenna.
UE Specified Reference Signals UE Specific Reference Signals are utilized during downlink transmission of PDSCH.
During PDSCH demodulation UE gets specific RSs answer, if it confirms it to be valid
then UE receives information. UE is being informed constantly about the occurrence of
specific RSs by higher layers of the system transmission. UE specific RSs are utilizing port
5 of the antenna.
Primary and Secondary Synchronization Signal (PSS and SSS)
Primary Synchronization Signal is utilized in cell search and within it operates for timing
and frequency acquisition. More precisely, it keeps slot timing synchronization and brings
a part of the cell ID. It operates using one of the three available Zadoff-Chu sequences.
Secondary Synchronization Signal is also utilized in cell search where it is providing frame
timing synchronization and the remainder of the cell ID. It operates using BPSK
modulation and two 31-binary sequences.
PSS and SSS synchronization signals took 6 RBs and are allocated on 62 from 72 reserved
subcarriers. They occur on the 0 and 10 slots where PSS are located on 6th symbol and
SSS on the 5th one. They occupy 1.08 MHz of frequency bandwidth.
Fig. 12 Primary and Secondary Synchronization Signals allocations [13]
40
Downlink Transport Channels
Broadcast Channel (BCH)
Downlink Broadcast Channel is allowing the devices accessing to the system to enable
them by broadcasting parameters of the system. It is also used for operators identification.
Downlink Shared Channel (DL-SCH)
Downlink Shared Channel took part in the point to point downlink connections where it is
carrying the user data or highrt order level information submitted for particular user, UE or
multiple devices. For transmissions involving one UE, DL-SCH is able to use physical
layer retransmission and dynamic link adaptation which are increasing the quality and
reliability of the transmission.
Paging Channel (PCH)
Paging Channel is informing the device operating in the downlink direction to change its
state from the idle mode to the connected state. Thanks to PCH it is possible to initiate
downlink transmission.
Multicast Channel (MCH)
Multicast Channel is transferring multicast service content to the UE in the downlink
direction.
Mapping of downlink transport and physical channels cooperation
To illustrate the cooperation connections between transport and physical channels in the
downlink direction it is necessary to present few links. The first informs that the PCH is
mapped to the PDSCH. The second link refers to the information that BCH is mapped to the
PBCH, but it is worth to remember that only parts of the broadcasted parameters are on BCH
while the actual System Information Blocks (SIBs) are then on DL-SCH. The DL-SCH is
mapped to the PDSCH and MCH is mapped to the PMCH.
Fig. 13 Mapping of downlink transport and physical channels cooperation [13]
LTE Downlink Map
The map of the LTE downlink frame is providing visible and understandable two dimensional
resource allocation map. Resources are dynamically allocated basing on the user’s data
profile. Map allows for reasonable understanding of LTE PHY layer system operation. It is
possible to differentiate particular channels, resource elements, resource blocks and so on.
Looking on the resource map from the left hand side, it is visible that at the beginning of each
subframe there are located the downlink control channels managing the transmission in the
41
downlink direction. It is also visible the number of assigned RE for the PDCCH channel. Such
information are delivered by the control format indicator channel PCFICH.
At the beginning of TS1 or the second timeslot on the first subframe one can see the broadcast
channel PBCH. This allows UE to get base station state information.
Map diagram is showing also how and when primary and secondary synchronization channels
(P-SCH and S-SCH) are carrying PSS and SSS respectively. It is visible on the latter symbols
of TS0 and TS10 occupying 1.08 MHz bandwidth at the center of the transmission band.
Using monitoring of the downlink signal of the 1.08 MHz bandwidth for the 5 ms UE is able
to get synchronized with the base station.
Fig. 14 LTE downlink frame map (10ms length, Δf=15 kHz, normal CP) [37]
Investigation of such downlink map is crucial during the laboratory exercises concerning LTE
PHY layer.
42
Downlink Logical Channels
Downlink Control and Traffic channels:
Broadcast Control Channel (BCCH)
Broadcast Control Channel is taking part in the operation of accessing to the system by
broadcasting information with parameters required to perform such operation.
Paging Control Channel (PCCH)
Paging Control Channel is allowing the device to enable to the network by sending the
paging information. In this way such device is being attached to the Paging Channel
servicing whole operation.
Common Control Channel (CCCH)
Common Control Channel is enabling the downlink transfer of the control information
between the network and the UE when there is no RRC connection between them. It is
mapped to the DL-SCH in the transport channels.
Dedicated Control Channel (DCCH)
Dedicated Control Channel operates as a point to point carrier of control information
between the UE and the network in the downlink direction. It is mapped to the DL-SCH in
the transport channels.
Dedicated Traffic Channel (DTCH)
Dedicated Traffic Channel operates as a point to point carrier of all user’s data in the
downlink direction. It is mapped to the DL-SCH in the transport channels.
Multicast Control Channel (MCCH)
Multicast Control Channel operates as a point to multipoint carrier of the multicast control
information between the network and UE in the downlink direction (it is worth to compare
it with the Multimedia Broadcast Multicast Service MBMS part of the WCDMA, because
their operations are similar).
Multicast Traffic Channel (MTCH)
Multicast Traffic Channel operates as a point to multipoint carrier of the multicast data in
the downlink direction.
Mapping of downlink logical and transport channels cooperation
Fig. 15 Mapping of uplink logical and transport channels cooperation [13]
43
Accordingly to the previous mapping of downlink physical and transport channels
cooperation LTE adds next layer of logical channels.
4.2 LTE PHY Lab tool instruction
This instruction is common for laboratory sessions 3 and 4 as they refer to the same
simulation tool.
LTE PHY Lab tool is a Matlab Toolbox implementation of the 3GPP Release 8 EUTRA
physical layer. It is able to simulate behavior of the LTE system network at every stages of
implementation of software, hardware, researching and development. Tool is very granular
what makes it universal and able to meet the requirements of precise measurements of LTE
network environment.
Usage During laboratory students will receive files dedicated to Matlab containing the laboratory
exercises basic source codes. Students are obliged to follow the tool usage instruction.
1. Please make sure if the hardware key is inserted into the USB port. Simulation will
not start without it.
2. Start Matlab
3. Specify the direction path of the LTE PHY Lab in the Matlab’s navigation line.
4. Please write the command ‘LTEpaths’ into the Matlab’s console.
5. Open Matlab file dedicated for the particular laboratory exercise.
6. Follow instruction of the particular laboratory.
Help
Students are allowed and encouraged to use the configuration examples for investigated
functions. To call them it is necessary to put ‘help’ connected with the name of the function
inside Matlab’s command line, so such quote should looks like ‘help function_name’.
Materials and configurations gathered from help function should be adapted to the needs and
requirements of the particular laboratory.
3D view toggle
User can switch between 2D and 3D view using toggle marked on the picture below. 3D view
can be rotated by movements of the mouse.
44
Fig. 16 3D view toggle inside the figure window
Fully detailed user guide instruction provided by Innovative Solutions can be found in the
Appendix A. It includes description of each function used during the laboratory experiments
as well as the step by step instruction of tool usage.
4.3 Summary and conclusions
Laboratory number 1 concerning investigation of the downlink physical channel allow
students to gain practical abilities and knowledge concerning structures of LTE downlink
frames and subframes.
Structure of the laboratory session requires from students not only technical knowledge but
also force to use logical thinking. Students are asked to observe the results of simulations for
different sets of data and multiple parameters options during each step of the laboratory. It
allows for practical understanding of the whole operation and to observe changes made by
particular adjustments.
45
The main objective of the laboratory session is to combine gained LTE knowledge with the
results of the simulation and to match received information. Basing on the consideration
under examined matter students are required to bring conclusions concerning performed
operations, results of the adjustments and influence of particular simulation parameters on the
results.
Described laboratory session is quite complicated and requires good understanding of
particular elements of LTE downlink frame starting from resource elements and resource
blocks, their locations inside the frame slot, finishing on the physical and logical channels and
signals.
By understanding this particular laboratory, student gain also possibility to extend knowledge
about principles of LTE OFDMA system operation. Hence OFDMA is a base of many
broadband radio access systems, it may be said that student learn universal knowledge which
may be used in investigations of other systems.
Experience gained during the laboratory session is combining knowledge concerning LTE
principles of operation with logical thinking. Such profile of experience is appreciated by
future employers and actually it is the most desirable. Candidates are asked not only about the
particular definitions or to describe some techniques, they are also asked to design something
basing on own knowledge what refers to combining it with practical abilities.
46
5. Laboratory no 2 – investigations of the uplink physical channels of the LTE Technology with utilization of the LTE PHY Lab Matlab tool.
Laboratory number 2 refers to the investigations of the uplink physical channel of the LTE
Technology with utilization of the LTE PHY Lab Matlab tool. During laboratory session
students will get possibility to observe how LTE network operates during uplink transmission
taking under consideration the structure of the LTE radio frame and particular subframes.
Students will be able to see the role of the particular LTE channels and signals and principles
of the SC-FDMA operation.
Investigations cover the analysis of four main areas:
1. Data allocations for uplink model of LTE.
2. Radio frame and subframe.
3. Radio frame channels and signals.
4. SC-FDMA.
Basic settings code for uplink analysis: %Input parameters and data txULSCH = -1; %we use the PUCCH so ULSCH is empty txCQI = -1; %we use the PUCCH format 1a so CQI is empty txHI = [1 0]; %Input bits for HI txRI = -1; %we use the PUCCH format 1a so RI is empty isHI_RI = 1; %we transmit only HI this time modOrder = -1; %we use PUCCH so we do not modulate the PUSCH data numSubframe = 0; %subframe number sizeFFT = 128; %FFT size (128 corresponds to BW 1.4MHz) RIV = [0 1]; %we use PUCCH but something must be inside RIV isSRS = 0; %we do not use SRS here so we put 0 isPRACH = 0; %we do not use PRACH here so we put 0 isPUSCH = 0; %this is the switch between PUCCH and PUSCH (if 0 then PUCCH) PUCCHformat = 2; %PUCCH format (2 corresponds to format 1a) N_cell_ID = 1; %physical cell ID nRNTI = 2; %UE ID trBlkSize = 0; %we do not use PUSCH so no transport block RVidx = 0; %we do not use PUSCH so no redundancy version
%Processing – calling the transmitter function txSCFDMASymbols=LTEULPhyTransmitter(txULSCH, txCQI, txHI, txRI, isHI_RI,... modOrder, numSubframe, sizeFFT, RIV, isSRS, isPRACH, isPUSCH,PUCCHformat,
N_cell_ID, nRNTI, trBlkSize, RVidx);
%Plotting the spectrogram spectrogram(ifft(fftshift(fft(txSCFDMASymbols))),200,100,1024); %We need to perform fftshift operation to shift the subcarrier zero into
the center of the picture
Presented settings code for uplink analysis is only for help purposes and for more advanced
students who would like to simulate something exceeding the laboratory exercises program.
Students are encouraged to use the particular elements from presented code for their
simulations in the following tasks. Codes dedicated for the particular laboratory tasks are
47
provided under each of them. The simulation shows spectrogram (also in 3D view). Users can
manipulate the 3D view to observe simulation from other perspectives.
Laboratory experiment code file is lab4_1_UL_ Data_Allocations.m
Task 1:
First task refers to the investigations of the data allocations for uplink model in LTE
transmission.
Fig. 17 UE Transmitter block scheme involved in the uplink investigations[38]
Students are encouraged to try to combine UE Transmiter block scheme on Fig.14 with
simulation observations and to conclude dependence of particular scheme blocks, channels
and signals onto each other. Students have to differentiate physical from transport and control
channels and to clearly understand the role of particular elements.
This simulation example helps students for better understanding of the uplink model
transmissions in LTE Technology.
In the uplink case students should focus on the operation of four basic data blocks PUSH,
PRACH, SRS and RIV matrix. Format of each of them is really essential during whole
simulation, they have the biggest influence on the resulting plots of the whole transmission
operation. Effects made by changes of their environment can be easily found on the uplink
resource maps visible during the simulation operation. It is worth to underline that parameters
format in this point should be provided really carefully.
48
Observations of resource map behavior are the most essential task during this laboratory
experiment. Basing on them, it is possible to forecast the occurrence of particular resource
elements and resource blocks in particular locations inside the resource map. It is necessary to
run simulations starting from small changes of the format of particular input data blocks and
then move to the more general adaptation of the simulation parameters. In this way students
can practice they logical way of thinking and the ability for matching facts with performed
actions. Such model of operation is very beneficial for the students because it allows to
combine practical abilities with knowledge of particular elements in the whole uplink
transmission operation.
In the second task more focus has been directed into investigations of the role of particular
channels during uplink transmissions. Students should put their attention to the role of
particular parameters of the simulation data, but with special precision in putting format of
particular data blocks.
During investigations over uplink transmission operations it is necessary to follow the
connections of influences between particular channels, signals and so on. It is fundamental
aim of this laboratory exercise, because it allows students to combine practical results with
general knowledge of the whole operation of the transmission. It facilitates the way of
understanding it and makes it more applicable in the reality.
Students are asked to indicate particular elements of the system, to differentiate them and to
show their way of understanding roles of them. Their knowledge will be examined basing on
the practical and real simulation cases performed during the laboratory experiment. Important
issue concerns the ability to combine logical thinking with analysis of the whole system.
Basic settings code for uplink data allocations analysis: function lab4_1_UL_Data_Allocations
%UL transmission %inputDataBlock = struct of data bytes to be placed into radio frame %(must be size(10,x)) where x is not restricted. %Each row is transmitted over different %subframe on the PRBs corresponding to the numsPRB %values inputDataBlock = struct('data', {[1:16], [1:16], [1:40], [1:40],... [1:28], [1:28], [1:28], [1:28], [1:28], [1:28]}); %isSRS = vector of information per subframe, if in this subframe there %is no SRS in this subframe at the last SCFDMA symbol - 0; or %there is one - 1; isSRS = [1 1 1 1 0 0 0 0 1 0]; %isPRACH = vector of information per subframe, is it PRACH subframe = 1, %or normal subframe = 0; isPRACH = [0 1 1 0 1 0 0 1 0 1]; %isPUSCH = vector of information per subframe, is PUSCH allocated - 1, %or PUCCH - 0; isPUSCH = [0 0 1 0 1 0 1 0 1 1]; %PUCCHformat = vector of information per subframe - only for isPUSCH = 0 %i.e. if there is PUCCH allocated - the format of the %PUCCH - [0 1 2 3 4 5] respectively to PUCCH format %[1 1a 1b 2 2a 2b] PUCCHformat = [0 0 1 0 2 0 3 0 4 5]; %RIV = matrix of RIV, each row correspond to RIV for one subframe, i.e. %RIV = [startblock numberConsecutivePRBs]; RIV = [1 2; 21 2; 1 3; 1 2; 1 2; 1 2; 3 2; 1 2; 21 2; 2 2];
49
%modOrder = vector of modulation orders per subframe, length(10), %(values: 4 for QPSK, 16 for 16QAM, 64 for 64QAM) modOrder = [4 4 4 4 4 4 4 4 4 4]; %sizeFFT = number corresponding to the fft size (related to the system %BW), (values: 128, 256, 512, 1024, 2048) sizeFFT = 512; %outputSamples = output complex samples of the downlink radio frame outputSamples = LTELinkLevelSimulateUL(inputDataBlock, isSRS, ... isPRACH, isPUSCH, PUCCHformat, RIV, modOrder, sizeFFT); end
Presented code allows for simulation of the downlink radio frame allocation of the user data.
Simulation is presenting each subframes from 0 to 9 and after that the whole frame. User have
to remember that available FFT sizes are 256 and 512 which corresponds to the 3 and 5 MHz
bandwidth channels and 15 and 25 Resource Blocks (RBs) respectively. User must not exceed
those limits in the configuration code.
1. Investigation of the simulation data:
a) Build the input data block (inputDataBlock variable).
b) Select proper number and format of Physical Random Access Channel (PRACH)
(isPRACH variable).
c) Select proper number and format of Physical Uplink Shared Channel (PUSCH) (isPUSCH
variable).
d) Select proper number and format of Physical Uplink Control Channel (PUCCH) (isPUCCH
variable).
e) Select proper number and format of SRS (isSRS variable).
f) Build proper structure and format of PUSCH allocation by setting RIV (RIV variable)
which consists of two variables startPRB and num_of_allocated_PRBs.
g) Try to change modulation for each block of the allocation structure (modOrder variable)
h) Try to change FFT sizes (sizeFFT variable).
2.Run the simulation, observe the results and comment them:
a) Observe how look each particular subframe.
b) Observe how look full allocations of the subframes in the whole frame for particular
simulation.
c) Manipulate the 3D plots to observe their appearance from different perspectives.
d) Investigate the allocation of the particular blocks in the frames in each of previous points.
e) Comment the influence of particular initial data parameters on simulation results.
3. Repeat simulations three times for different sets of data, comment the results and
conclude your observations. Describe the connections between particular elements of
simulations and influences between each other.
4. Answer the questions:
a) How inputDataBlock structures are influencing the resulting plots? Which elements are
influenced by it and how they are being changed?
b) How RIV matrix influence on the resulting plots? Which elements influence on them and
how they change their look?
c) Select four simulation figures presenting mapping of subframes and save them. Clearly
mark on the picture each element (if any):
SRS,
50
PRACH,
PUSH – describe the three (out of five possible) different formats of it,
RIV matrix – mark whole matrix consisting of number of consecutive PRBs,
Specify bandwidth,
Specify the number of OFDMA symbols,
Describe the role of the particular elements. Each figure with necessary description has
to be placed in the laboratory exercise report.
d) What is presented on the last UL Radio Frame simulation figure? Describe particular parts
of it.
Task 2:
Second task refers to the physical uplink channels investigations for uplink model in LTE
transmission.
Basic settings code for uplink physical channels analysis: function lab4_2_UL_Channels %mode = choice of the particular channel to be plotted/allocated: % 1 - DRS (if isPUSCH = 0, PUCCH format = 2 or 4 - DRS for PUCCH, % else if isPUSCH = 1 - DRS for PUSCH) % 2 - PUCCH/PUSCH (if isPUSCH = 0, PUCCH format = 2 or 4 - PUCCH, % else if isPUSCH = 1 - PUSCH) % 3 - SRS (isSRS must be 1) mode = 1 %UL transmission %txBytes = the input byte stream vector of user data or paging txBytes = randint(1,100,63); %modOrder = modulation order (4, 16 or 64) modOrder = 4; %numSubframe = the number of the subframe in the LTE radio frame (0-9) numSubframe = 1; %sizeFFT = the fft size (256 or 512) sizeFFT = 256; whitebg('w'); %RIV = RIV for one subframe, i.e. RIV = [startblock numberConsecutivePRBs]; RIV = [1 2]; %isSRS = information for a subframe, if in this subframe there %is no SRS in this the subframe at the last SCFDMA symbol - 0; or %there is one - 1; isSRS = 0; %isPRACH = information for a subframe, is it PRACH subframe = 1, %or normal subframe = 0; isPRACH = 0; %isPUSCH = information for a subframe, is PUSCH allocated - 1, %or PUCCH - 0; isPUSCH = 1; %PUCCHformat = information for a subframe - only for isPUSCH = 0 %i.e. if there is PUCCH allocated - the format of the %PUCCH - [0 1 2 3 4 5] respectively to PUCCH format [1 1a %1b 2 2a 2b] PUCCHformat = -1; whitebg('k'); %txSCFDMASymbols = vector of samples of the 14 SCFDMA symbols on the
subframe txSCFDMASymbols = LTEULPhyTransmitterCA(mode, txBytes, modOrder,... numSubframe, sizeFFT, RIV, isSRS, isPRACH, isPUSCH, PUCCHformat); spectrogram(txSCFDMASymbols,256,128,1024,3840000), title('Selected channel
mode spectrogram');
51
pause(); end
Presented code allows for simulation of the uplink physical channels like PRACH, DRS for
PUCCH format 1, PUCCH format 1, DRS for PUCCH format 2, PUCCH format 2, DRS for
PUSCH, PUSCH, SRS. The simulation shows scatterplot, spectrogram (also in 3D view) and
time frequency allocation (also in 3D view). Users can manipulate the 3D view to observe
simulation from other perspectives. During laboratory experiments investigations students
should analysis only scatterplots and spectrograms, without investigations of time frequency
allocations.
Laboratory experiment code file is lab4_2_UL_ Channels.m
1. Investigation of the simulation data:
a) Select randomly the bytes for uplink transmission (txBytes).
b) Select proper number and format of Physical Random Access Channel (PRACH)
(isPRACH variable).
c) Select proper number and format of Physical Uplink Shared Channel (PUSCH) (isPUSCH
variable).
d) Select proper number and format of Physical Uplink Control Channel (PUCCH) (isPUCCH
variable).
e) Select proper number and format of SRS (isSRS variable).
f) Build proper structure and format of PUSCH allocation by setting RIV (RIV variable)
which consists of two variables startPRB and num_of_allocated_PRBs.
g) Investigate different subframes by changing variable numSubframe.
h) Try to change modulation (modOrder variable).
i) Try to change FFT sizes (sizeFFT variable).
2. Run the simulation, observe the results and comment them
a) Observe the channels: PRACH, DRS for PUCCH format 1, PUCCH format 1, DRS for
PUCCH format 2, PUCCH format 2, DRS for PUSCH, PUSCH, SRS on the scatterplot,
spectrogram in 3D and in time-frequency allocation in 3D.
b) Manipulate the 3D plots to observe their appearance from different perspectives.
c) Investigate the allocation of the particular blocks in the frames in each of previous points.
d) Comment the influence of particular initial data parameters on simulation results.
3. Repeat simulations three times for different sets of data, comment the results and
conclude your observations. Describe the connections between particular elements of
simulations and influences between each other.
4. Answer the questions:
a) Does any channel looks different in some particular subframe number? Describe the
differences and explain why.
b) Describe how selected modulation influences the resulting channel mappings.
c) Describe the role of each physical uplink channels in each possible mode. Select four
simulation figures presenting mapping of physical uplink channels and save them. Clearly
mark on the picture each selected physical channel (from the set: PRACH, DRS for PUCCH
format 1, PUCCH format 1, DRS for PUCCH format 2, PUCCH format 2, DRS for PUSCH,
PUSCH, SRS) Resource Blocks and characteristic elements:
First and second subframes,
52
Guard bands,
Hopping from one BW edge to another,
Specify bandwidth,
Specify the number of OFDMA symbols.
Describe the role of the particular elements. Each figure with necessary description has
to be placed in the laboratory exercise report. Use the sample scatterplots to get to
know the scheme showing the way to describe the way of reporting the laboratory
experiment results.
Sample scatterplots can be seen on the pictures below.
On the first pictures there are also visible marked lines which describing the frame structure.
Students are asked to prepare their scheme comments in such way. In presented case the
numbers are:
1- Guard bands.
2- Hopping from one BW edge to another.
3- Second subframe slot.
4- First subframe slot.
Fig. 18 Sample uplink subframe
53
In the second scatterplot it is visible the same result of simulation but the angle of the vision
has been changed from 2D to 3D. Such view facilitates the examination of the received results
and moreover it facilitates way of understanding the whole transmission process.
Fig. 19 Sample uplink subframe – 3D view of the previous scatterplot
In the below scatterplots there are visible presence of particular elements of LTE uplink
channel simulation. Students can see how look sample SRS, PRACH, PUSCH presence. Last
scatterplot is presenting the overall view on the uplink frame consisting of all subframes.
Fig. 20 Sample uplink subframe with SRS presence
54
Students are obliged to provide some reasonable conclusions informing why particular
element occurred in this location in the obtained form. Students should indicate what
parameters influenced this element and how it influenced the resulting form of received on the
simulation resulting plot.
Fig. 21 Sample uplink subframe with PRACH presence
Students are asked to indicate the locations of particular channels. Each element on the
scheme has to be indicated and briefly described. Students should also describe features and
roles of them. The most essential part is to combine received results with gained knowledge
and to describe relationships and influences between particular elements.
Fig. 22 Sample uplink subframe with PUSCH in format 3 presence
55
At the end of the simulation students will get full uplink frame constructed from the
previously obtained subframes. Important and desirable ability is connected with matching
results obtained for particular subframe with the general observations of the final full frame.
Conclusions concerning influence of particular subframes on the full frame are the most
essential at this point.
Fig. 23 Sample uplink frame consisting of all subframes
56
5.1 Selected issues of LTE Technology
In this section there are presented essential issues of the LTE Technology with which students
have to be familiar before the laboratory session. This introduction is common for laboratory
sessions 3 and 4.
5.1.1 LTE uplink channels and signals types
Uplink Physical Channels
Fig. 24 Map of Uplink subframe withNormal Cyclic Prefix [35]
Physical Uplink Control Channel (PUCCH)
Physical Uplink Control Channel is responsible for sending uplink control information like
Channel Quality Indication (CQI). It cooperates with the HARQ mechanism also with
support to scheduling its requests on the way of the transmission communication. Its
transmission is never simultaneously with PUSCH one.
Physical Uplink Shared Channel (PUSCH)
Physical Uplink Shared Channel is responsible for carrying uplink user data. It has similar
functionality as downlink equivalent but in the uplink direction. Scheduling is based here
on the subframe basis and allocates subcarriers in units of RBs on particular subframe.
Physical Random Access Channel (PRACH)
Physical Random Access Channel is responsible for controlling UE request with usage of
the Random Access Preamble and managing attempts of the random access transmissions
to the LTE network.
Uplink Physical Signals
Random Access Preamble (RAP)
Random Access Preamble is responsible for the coordination and transport of random
requests from UE to the service. When UE attempts to access to the LTE network then
57
RAP transmits access requests in the bursts form. If request is successful then random
access response is received from eNB base terminal station.
Fig. 25 Random access preamble structure [37]
Structure of random access preamble consists of CP, preamble and a guard time (there is
no signal transmission during it). Zadhoff-Chu sequences are the fundamentals of the RAP
operation and they are transmitter by the base station for random access allocated in the
form of 72 continuous subcarriers blocks. In case of the FDD applications only 64
preamble sequences per cell are possible.
UE higher order layer decide about some transmission parameters that are being selected
like the exact frequency used for random access preamble transmission. They are also
responsible for the selection of the preamble sequence format and choice of the available
random access channels. Moreover, they play the role during transmission by setting the
initial transmission power or step size of power ramp. Higher order layers of UE are also
responsible for choice of the maximum number of connection retries.
Uplink Reference Signal (UL RS)
UL Reference Signal operates in two patterns, the demodulation RS and sounding RS. In
both of them Constant Amplitude Zero Autocorrelation (CAZAC and also Zadhoff-Chu)
sequences are being utilized. The demodulation RS is transmitted with the same size as the
assigned resource in the fourth SC-FDMA symbol. Sounding RS are being used for the
frequency dependent scheduling facilitation.
Uplink Transport Channels
Uplink Shared Channel (UL-SCH)
Uplink Shared Channel took part in the uplink connections where it is carrying the user
data information and control information. It operates similarly to the DL-SCH channel. It
is also capable to use dynamic link adaptation and retransmissions which are increasing the
quality and reliability of the transmission.
Random Access Channel (RACH)
Random Access Channel took part in the paging process by answering the PCH attempts to
change the state of the device accessing to the network. With cooperation with the UL-
SCH it is initiating the attempted change of the state referring to the data requirements of
the UE. It does not cooperate with higher order layers data or user data transmission.
Mapping of uplink transport and physical channels cooperation
To illustrate the cooperation connections between transport and physical channels in the
uplink direction it is necessary to present two links. The first informs that the RACH is
58
carried by PRACH. The second informs that the UL-SCH is carried by the PUSCH
channel.
Fig. 26 Mapping of uplink transport and physical channels cooperation [13]
Uplink Logical Channels
Uplink Control and Traffic channels:
Common Control Channel (CCCH)
Common Control Channel is enabling the downlink transfer of the control information
between the network and the UE when there is no RRC connection between them. It is
mapped to the UL-SCH in the transport channels. It is mapped to the UL-SCH in the
transport channels. It has similar functionality as downlink equivalent but in the uplink
direction.
Dedicated Control Channel (DCCH)
Dedicated Control Channel operates as a point to point carrier of control information
between the UE and the network in the downlink direction. It is mapped to the UL-SCH in
the transport channels. It is mapped to the UL-SCH in the transport channels. It has similar
functionality as downlink equivalent but in the uplink direction.
Dedicated Traffic Channel (DTCH)
Dedicated Traffic Channel operates as a point to point carrier of all user’s data in the
downlink direction. It is mapped to the UL-SCH in the transport channels. It has similar
functionality as downlink equivalent but in the uplink direction.
Mapping of uplink logical and transport channels cooperation
Fig. 27 Mapping of uplink logical and transport channels cooperation [37]
Accordingly to the previous mapping of uplink physical and transport channels cooperation
LTE adds next layer of logical channels.
59
5.2 Summary and conclusions
Laboratory session number 3 is similar in principles to laboratory session number 3, it is
dealing with investigation of the uplink physical channel. It allows students to gain practical
abilities and knowledge concerning structures of LTE uplink frames and subframes.
Structure of the laboratory session remains the same, so it requires from students not only
technical knowledge but also force to use logical thinking. By understanding this particular
laboratory, student gain also possibility to extend knowledge about principles of LTE SC
FDMA system operation.
Described laboratory session is quite complicated and requires good understanding of
particular elements of LTE uplink frame starting from resource elements and resource blocks,
their locations inside the frame slot, finishing on the physical and logical channels and
signals.
60
6. Laboratory no 3 – investigations of the WiMAX Technology with use of the WiMAXProjekt tool
This laboratory is the continuation of the Investigation of the WiMAX Network planning with
usage of the WiMAXProjekt – part 1 laboratory experiment provided by [15]. The main goal
of this laboratory experiment is to investigate how application reconfigures the primarily
selected sectors covering the examined areas after selection of the particular units downlink
and uplink throughput demands and overbooking parameters for selected services. During
investigation students will be basing on the results, comments and conclusions obtained on
the previous laboratory.
Investigations cover the analysis of areas:
Propagation,
Interference,
Specification of air interference,
Properties of BS and SS, including antennas,
Downlink and uplink throughput demands,
Overbooking parameter,
Services,
Traffic,
Predicted results,
Analysis of performance of wireless network.
Task 1:
1. For the previously selected area of the investigation students are now obliged to use
the throughput demands settings for each of the localizations from the provided list.
a) Individually associate the following service names to each of the localizations from the list:
-Wireless Internet Access for Office
-Hotspot
-Office with VoIP service (up to 25 units)
-Office with VoIP service (50 units)
Note that those services has their own specificity and different demand for access.
b) Set throughput demands for downlink and uplink for each particular localization on the list
c) Simulate the process of distribution the sectors covering the examined areas
d) Observe how the sector areas changed comparing to the previously selected ones
e) Consider and modify throughput settings to fulfill the network demands.
f) Try to optimize allocation of the sectors by yourself by deleting or adding sectors manually.
g) Take under consideration the maximal throughput per sector for selected hardware (i.e.
BTS) and comment the results
Sample simulation data set:
Use following table to perform tasks written in the instruction. Otherwise you can use your
own selected area (i.e. city, district) and create 2 BTS and 10 localizations for which you will
distribute particular services. Divide given available throughput into two BTS’s. Presented
tables are already filled with an sample data.
61
Network services demands:
2 BTS’s,
8 Offices,
2 Hotspots,
In 2 Offices (out of 8) there are VoIP services with 50 units per each,
In 4 Offices there are VoIP services with up to 25 units per each.
Network specification:
WiMAX Technology,
STM-1 (155,5 Mbit/s throughput available),
4 available 7 MHz adjacent channels,
QPSK, 16QAM, 64QAM modulations allowable,
Hardware freedom (any supplier),
Antennas 360°, 180°, 90°, 60° available (any from list inside WiMAXProjekt),
BTS #1 height 100m, BTS #2 height 60m.
Tab. 1 Coordinates of particular network units
Nr Service type Latitude Longitude
1 BTS #1 20.170720E 51.971434N
2 BTS #2 20.152687E 51.938750N
3 Office #1 + VoIP (50 units) 20.141425E 51.956771N
4 Office #2 20.141403E 51.958358N
5 Office #3 + VoIP (25 units) 20.150447E 51.953631N
6 Hotspot #1 20.147014E 51.958147N
7 Office #4 20.144804E 51.960229N
8 Office #5 + VoIP (1 unit) 20.144997E 51.958981N
9 Office #6 + VoIP (50 units) 20.149312E 51.963706N
10 Office #7 + VoIP (10 units) 20.155125E 51.975591N
11 Hotspot #2 20.148012E 51.975637N
12 Office #8 + VoIP (20 units) 20.149091E 51.941627N
Consider allocation of the downlink and uplink throughputs for particular network locations.
In the next step include also overbooking factor in your investigations. What do you think
about assignment of the throughput for particular services? What did you decided for such
selections? Did you allocate all of the available resources? Comment and explain your
choices.
62
Tab. 2 Downlink and uplink configurations including overbooking factor
Nr Service type Downlink Uplink Overbooking
factor
1 BTS #1 55,52 Mbit/s 20,00 Mbit/s -
2 BTS #2 40,00 Mbit/s 40,00
Mbit/s
-
3 Office #1 + VoIP (50 units) – BTS #2 10,00 Mbit/s 10,00
Mbit/s
1
4 Office #2 – BTS #1 5,00 Mbit/s 3,50 Mbit/s 4
5 Office #3 + VoIP (25 units) – BTS #2 5,00 Mbit/s 5,00 Mbit/s 1
6 Hotspot #1 – BTS #1 2,75 Mbit/s 2,00 Mbit/s 4
7 Office #4 – BTS #1 5,00 Mbit/s 3,50 Mbit/s 4
8 Office #5 + VoIP (1 unit) – BTS #1 5,00 Mbit/s 4,00 Mbit/s 4
9 Office #6 + VoIP (50 units) – BTS #2 10,00 Mbit/s 10,00
Mbit/s
1
10 Office #7 + VoIP (10 units) – BTS #1 5,00 Mbit/s 5,00 Mbit/s 4
11 Hotspot #2 – BTS #1 2,75 Mbit/s 2,00 Mbit/s 4
12 Office #8 + VoIP (20 units) – BTS #2 5,00 Mbit/s 5,00 Mbit/s 1
Investigate demands of the first scenario from the instruction set. How are you going to
redistribute and allocate throughputs in this case? What facts influenced your selections?
Comment and explain your choices. Remember to fulfill the new table with assignment of
new data.
Repeat task 3 for second scenario case. Remember to fulfill the new table with assignment of
new data.
Repeat task 4 for third scenario case. Remember to fulfill the new table with assignment of
new data.
Task 2:
1. Again, for the previously selected area of the investigation students are now obliged to
use also overbooking parameter for each of the localizations from the provided list.
a) First scenario – typical network appliance for office working hours (8-16), where offices
are strongly using Internet and VoIP telephony.
b) Second scenario – after working hours (16:30-7:30), where most of offices are not
working, so their band can be allocated for other users. Otherwise situation is in case of
hotspots where number of users are increasing after office working hours.
c) Third scenario – holiday event – offices are not working at all, there is being organized
mass event in one of the hotspots localizations.
d) Perform all of the scenarios simulations. Consider and modify overbooking and throughput
settings to fulfill the changing network environment.
e) Try to optimize allocation of the sectors by yourself by deleting or adding sectors
manually.
f) Observe resulting allocations of the sectors, comment them and conclude what is the most
optimal setting in each particular scenario.
2.Comments and results:
a) Lab is adjusted to focus on the student’s thoughts, comments and justifications for
particularly selected settings.
63
b) Results are presented as maps with changing sectors of network coverage for particular
scenarios of the simulations.
6.1 Selected issues of WiMAX Technology Following theoretical introduction states that students know the basics of the WiMAX
Technology and it is not required to quote them. Moreover it is a supplement to [15] WiMAX
theoretical introduction.
6.1.1 Duplexing techniques
Duplexing means two way data flow. Equipment operating in duplex mode transmits signals
in both downlink and uplink. Duplex mode differs from half-duplex mode which transmits
signals in alternating way, firstly in one then in second direction.
WiMAX standard can utilize following duplexing modes:
Time Division Duplex – TDD:
In TDD method transmission is served with time division. Single frequency channel is
assigned to both the transmitter and the receiver. Both the uplink (UL) and downlink
(DL) traffic use the same frequency but at different times.
Frequency Division Duplex – FDD:
In FDD method transmission is served with frequency division. Distinct frequency
channel is assigned to both the transmitter and the receiver. At any particular instant in
time uplink (UL) traffic uses the ‘first’ frequency that is different from the ‘second’
frequency used by the downlink (DL) traffic.
6.1.2 Adaptive modulation
WiMAX has ability for dynamically signal modulation adaptation accordingly to the current
conditions of the network. System adjusts the signal modulation and coding scheme on the
basis of Signal to Noise ratio (SNR) condition of the radio link. When the radio link quality is
high the highest modulation scheme and light coding is used giving the system more capacity.
During a signal fade or long signal path the WiMAX system can shift to a lower order
modulation scheme with heavier coding to maintain the connection quality and link stability.
6.1.3 Overbooking
Network planning includes consideration concerning relation between effective usage of
bandwidth and real bandwidth capacity. Assurance of as high as possible effective usage of
bandwidth taking under consideration overall available bandwidth capacity is important,
because it allows for proper dimensioning the network. For this purpose overbooking factor
was introduced. It define ratio between real capacity and effective usage of bandwidth.
Selection of the proper compromise between should take under consideration also parameter
of maximum possible network load with which network is still capable to operate properly.
Network should be designed in such way that it would never exceed parameter of maximum
possible network load, thereby network is planned optimal, because it will always operate
properly.
64
6.2 WiMAXProjekt tool instruction
WiMAXProjekt is an application designed to support the designing stage of the network
project. Main aim of the application is to locate base stations on the required area in the way
fulfilling the defined conditions. For fully detailed instruction guide students can refer to the
source [2].
Criteria under which application has to locate base stations are:
radio parameters,
network hardware equipment,
geographic topology of the required area.
WiMAXProjekt is a kind of plugin to Google Earth application having access to the Google
Maps, reliable maps of the world. Thanks to that fact the executed measurements are very
close to the real conditions.
Below, on the figure 5 it is presented the main view of the WiMAXProjekt application menu.
Fig. 28 Application main view
From the application main view user have the access to all functions of the application:
1. Loading localizations:
-adding single or multiple terminals,
-adding poles or masts.
Parameters:
-Name,
-Type,
-Throughput – Uplink/Downlink,
-Overbooking,
-Coordinates.
65
Figure 6 depicts the way of inputting the parameters of particular element of the network like
some receiver. It is possible to set the name and type of the element, as well as the available
throughput dedicated for this point and overbooking parameter setting. This window is also
showing the geographical coordinates of the created network element.
Fig. 29 Single terminal addition
2. Designing the base terminal station localizations:
-hardware selection,
-defining the radio parameters of the base station,
-defining the heights of each terminal.
Parameters:
-Number of sectors per station,
-Channel numbers,
-Radio frequency,
-Mast height,
-BTS Fider losses,
-Terminal Fider losses,
-BTS selection with parameters FDD/TDD,
-Antennas selection with parameters Accuracy, Gain, Power,
-Modulation.
66
Figure 7 is presenting the window of the network BTS construction where it is possible to set
all necessary access parameters.
Fig. 30 Hardware and radio parameters selection
3. Project optimization:
-terminal localizations adjustments,
-selection of the best localizations,
-addition of the necessary additional antennas.
67
Figure 9 is presenting the window of resulting placement of the BTS transmission sectors
performed after the primary simulation.
Fig. 31 Primary localization of the terminals [2]
On the figure 9 it is visible the way of manual adjustments of the particular sectors. After
primary selection of the sectors, user can adapt more precisely sector placement to network
requirements.
Fig. 32 Manual optimization of the terminals localizations [2]
68
Figure 10 is presenting the function showing the ranges of the network coverage available in
case of using particular modulation.
Fig. 33 View of the modulation range for two 90 degrees antennas and 4 client terminals [2]
4. Terrain cross-section:
-view of the terrain cross-section,
-checking the Line-of-sight (LOS) parameter fulfillment.
Figure 11 is presenting the setting window for the function allowing to measure LOS
condition between two particular points of the network. It is possible to select coordinates
manually or using the indication from the map.
Fig. 34 Terrain cross-section points geographic coordinates [2]
69
Figure 12 presents the resulting plot of the LOS condition checking function. It is briefly
showing the Fresnel’s area and obstacles which can interfere the transmission between two
points.
Fig. 35 Checking LOS condition and terrain cross-section view
5. Localizations view:
-terminals view,
-base terminal stations view.
6.3 Summary and conclusions
Laboratory number 3 concerning investigation of the WiMAX Technology allow students to
gain practical abilities and knowledge concerning it operation principles.
This laboratory session requires from the students logical thinking and reactance for the
changing environment of the network. It is focusing on the practical abilities which represent
good network administrator and planner.
Exercise is not complex but it requires good understanding of the WiMAX Technology, ways
of reacting for some problems and the demands for particular services. This experiment
requires from students ability to face the real problem by themselves. Issues raised in this area
are real problems which are encountered by the network administrators.
Students can visualize how changes which they made react in the real network environment.
In this way students may i.e. learn how particular access parameters of BTS are influencing
the operation of the whole network. Students may learn flexibility which is very desirable
ability in the administrator position.
Important issue in this experiment refers to the customization of the access parameters for
particular network services. Students have to learn characteristics of demands of particular
70
services and ability to meet those requirements and simultaneously not to influence badly on
overall operation of the network in the different network scenarios.
Experiment includes also planning issues which gain practical glance of the concept of BTS
sector deployment. Students are asked to use their imagination for proper selection of the
coverage area accordingly to the demands of the combination of services, type of users and
overall network resources.
Those kinds of features which may be gained during this laboratory can be very beneficial
during their future professional work as network administrators and planners. Such experience
is appreciated by future employers.
Despite the fact that LTE overtake most of the market on which WiMAX was trying to
succeed, it is still modern and forward looking technology. It can be confirmed by the fact
that the new release of WiMAX 2 is on the way to release to the market on the beginning of
2012. Fundamentals of operations remains similar so knowledge over WiMAX Technology
can be very desirable in the nearest future.
71
7. Laboratory no 4 – investigations of the SON with use of the PKSA Planner tool
During laboratory number 4 students will have to investigate the routing reconfiguration
process for given set of properties of the examined network. There will be two tasks for each
student. First task will be done without usage of the computer, only by filling the laboratory
cards distributed at the beginning of the laboratory. Second task will be done with usage of
the PKSA Planner tool and will be turning the results obtained in the first task to the
application. The main object of the laboratory experiment is to obtain similar results in both
tasks.
Investigations cover the analysis of areas:
network topology,
checking the availability of the network resources,
handling failure scenarios,
network reconfiguration process,
optimization of required resources,
analysis of reconfiguration process performance.
On the beginning of the laboratory session each student will receive the cards with auxiliary
tables including initial data with Primary and Secondary Paths (PP and SP) traces and
configuration tables. In case of Secondary Paths configuration table includes link-based and
end-to-end methods. The proper way of PP and SP selection is more widely described in [16].
72
Tab. 3 Initial data table with Primary Paths and Secondary Paths dedicated to the sample model from Figure 1
No. Trace
PP SP
1 1-2 1-8-2
2 1-6 1-8-6
3 1-6-5 1-8-5
4 1-8 1-6-8
5 1-8-5 1-6-5
6 2-3 2-8-3
7 2-1-6 2-8-6
8 2-8 2-3-8
9 2-8-7 2-3-7
10 3-4 3-7-4
11 3-2-1 3-8-1
12 3-7 3-4-7
13 3-7-5 3-4-5
14 4-3-8 4-7-8
15 4-5 4-7-5
16 4-5-6 4-7-8-6
17 4-7 4-5-7
18 5-6 5-8-6
19 5-6-1 5-8-1
20 5-7 5-4-7
21 5-8 5-6-8
22 6-8 6-1-8
23 6-8-2 6-1-2
24 7-8 7-5-6
Primary Paths configuration table number 2 should be filled on the diagonal, where should be
placed weight factor from metric (assume it is equal 1) for each link injured by failure of the
particular primary link. If such failure causes more than one damage to links then all of their
weight factors have to be summed up inside the diagonal cell of that particular primary link.
In example if the first primary link [1-2] (first column on the left of the Tab.2) has been
damaged then three links (1-2), (2-1-6) and (3-2-1) are damaged (first column on the right of
the Tab.2). In such case we have to put 1+1+1 (because each link have weight factor equal 1
and we have to add them inside the cell) into the first cell of the Tab.2 diagonal. It is
necessary to perform such operation for all rows of the table. At the end, we can summarize
resources in the last row by addition of all diagonal values inside this row and put the result in
the last cell on the right.
73
Tab. 4 Primary Paths configuration table
Link 1-
2
1-
6
1-
8
2-
3
2-
8
3-
4
3-
7
3-
8
4-
5
4-
7
5-
6
5-
7
5-
8
6-8 7-8 Damage
links
1-2 3 (1-2)
(2-1-6)
(3-2-1)
1-6 4 (1-6)
(1-6-5)
(2-1-6)
(5-6-1)
1-8 2 (1-8)
(1-8-3)
2-3 2 (2-3)
(3-2-1)
2-8 3 (2-8)
(2-8-7)
(6-8-2)
3-4 2 (3-4)
(4-3-8)
3-7 2 (3-7)
(3-7-5)
3-8 3 (3-8)
(1-8-3)
(4-3-8)
4-5 2 (4-5)
(4-5-6)
4-7 1 (4-7)
5-6 4 (5-6)
(4-5-6)
(1-6-5)
(5-6-1)
5-7 2 (5-7)
(3-7-5)
5-8 1 (5-8)
6-8 2 (6-8)
(6-8-2)
7-8 2 (7-8)
(2-8-7)
Resources
sum
3 4 2 2 3 2 2 3 2 1 4 2 1 2 2 33
Next step is to fill the Secondary Paths configuration tables for two methods: end-to-end
(Tab.3) and link-based (Tab.4). To do so we need to take a look on the network topology
model and consider the way of rerouting the traffic for particular links failure scenarios.
Again, we need to put and add inside the table cells weight factors for each of the alternative
link selected by the particular reconfiguration method (end-to-end or link-based). Using
example of primary link [1-2] failure we need to reroute links (1-2), (2-1-6) and (3-2-1).
Looking on the network topology model we can figure out that link (1-2) can be substituted
by trace (1-8) and (2-8). In such way we need to put weight factors inside the primary link [1-
2] row under proper alternative links (columns), in this case under (1-8) and (2-8). Then we
do the same with damaged link (2-1-6) which can be rerouted using (2-8), (6-8). We put
weight factors under proper columns and add them together if inside the same row we use the
same alternative link twice, like in case of (2-8). It is necessary to perform this operation for
each particular row of the tables for particular methods.
74
Tab. 5 Secondary Paths configuration table using end-to-end method
Link 1-
2
1-6 1-8 2-3 2-8 3-4 3-7 3-8 4-5 4-7 5-
6
5-
7
5-8 6-8 7-8 Damage
links
1-2 1+1 1+1 1 1 (1-2)
(2-1-6)
(3-2-1)
1-6 1+1+1 1 1+1 1+1 (1-6)
(1-6-5)
(2-1-6)
(5-6-1)
1-8 1 1 1 1 (1-8)
(1-8-3)
2-3 1 1 1+1 (2-3)
(3-2-1)
2-8 1 1 1+1 1 1 (2-8)
(2-8-7)
(6-8-2)
3-4 1 1+1 1 (3-4)
(4-3-8)
3-7 1+1 1 1 (3-7)
(3-7-5)
3-8 1 1+1 1 1 1 (3-8)
(1-8-3)
(4-3-8)
4-5 1+1 1 1 1 (4-5)
(4-5-6)
4-7 1 1 (4-7)
5-6 1+1 1 1+1+1 1+1 1 (5-6)
(4-5-6)
(1-6-5)
(5-6-1)
5-7 1 1+1 1 (5-7)
(3-7-5)
5-8 1 1 (5-8)
6-8 1 1+1 1 (6-8)
(6-8-2)
7-8 1 1+1 1 (7-8)
(2-8-7)
Plan
1+1
4 4 9 6 4 3 4 5 4 8 1 2 5 8 4 71
Plan
1:1
2 3 7 4 3 2 3 4 3 7 1 2 3 6 3 53
Plan
1:N
1 2 3 2 2 2 2 2 2 2 1 1 3 2 1 28
Three last rows are summarizing resources needed for particular protection plan. In case of
the plan 1+1 we need to sum all resources in the columns for all rows of the table and put the
result inside the same column in the plan 1+1 row. It is necessary to perform this operation for
all columns. In the last cell on the right of plan 1+1 row we put the value of the sum of
resources needed for this particular protection plan.
In case of 1:1 there is necessity to delete from the table all weight factors placed for the link
which has already selected alternative path, like in case of doubled link (2-1-6) in the first two
rows (in second row it is underlined). Later, we perform the same operation like for the plan
1+1, but with reduced weight factors amount. In link-based method we do not delete doubled
links, as it is impossible.
75
In the last protection plan 1:N there are selected maximums of the cell value inside particular
column. Such value is then put inside the row of the plan 1:N and summarized in the last cell
on the right.
Summarized values of the weight factors represent required network resources for proper
operation of the particular network protection plans. In case of failure of some primary link,
all the traffic can be rerouted using alternative links allowing whole network to operate stable
after its element damage.
Task 1:
First task refers to the calculations and observations done by student on the specially prepared
laboratory experiment cards. The cards will be distributed randomly and each student will
receive different set of problems.
Laboratory experiment cards include:
1. Network topology presented on the scheme, like an example below:
Fig. 36 Sample network topology model
Presented network topology consists of 7 nodes. Each path between two particular nodes has
its own distance which can be named as a cost of the connection between them. Basing on this
topology model the routing process can be proceeded and routing table can be created.
2. Table of distance (cost) coefficients for primary paths and additional (backup) paths
3. Table of resources located on each link between nodes
4. Method of reconfiguration:
a) End-to-end
b) Link-based
76
5. Protection plans (each of them is described in the section 4.1.4):
a) 1+1
b) 1:1
c) 1:N
6. Failure scenarios
The main point of the task is to reroute all the flow using the rest of available resources.
Student will get information between which nodes the link failure occurred.
7. Reconfiguration table
Specially prepared card which facilitates proceeding of the whole reconfiguration operation.
Student tasks:
1. For given set of initial data perform the routing reconfiguration process.
2. Check which reconfiguration scenario is the best and requires the smallest amount of
resources.
3. Calculate:
a) The sum of cost (distances)
b) Operating and unoccupied resources
c) Protection flow rate for the most optimal failure solution scenario
d) Redundancy rate for the most optimal failure solution scenario
Task 2:
Second task refers to performance all task included in the laboratory first task with usage of
the PKSA Planner tool. Tool allows for more deep investigation of the failure scenarios
solving process. Student can also perform quicker and wider investigation of the failure case,
because by changing the initial parameters he can quickly simulate both methods of
reconfiguration and calculate reconfiguration costs for each of protection plans. Student will
be also asked to observe some behaviors of routing reconfiguration process and to comment
them.
Student tasks:
1. Prepare file projectData.xml containing:
a) Nodes coordinate
b) Set of link connection between particular nodes
c) Distances assigned to particular links
d) Available resources at particular links
2. Perform simulation by entering in the Matlab command line the ‘projectPKSA’
phrase
3. Investigate the resulting file
a) Check if your nodes are located properly
b) Check if resources are distributed properly
c) Observe the sum of costs for particular failure scenario
d) Observe the sum of operating and unoccupied resources in the scenario
e) Observe the protection flow rate
f) Observe results for both end-to-end and link-based methods of reconfiguration
4. Investigate the graphical menu of the application
a) Observe results for both end-to-end and link-based methods of reconfiguration
b) Try to simulate few failure scenarios
5. Compare results obtained by individual calculations with those returned by the PKSA
Planner.
a) Comment comparison of the results
77
b) Answer which reconfiguration method is better and why, justify your answer
c) Which protection plan is better and why, justify your answer
7.1 Selected issues of SON
In this section there are presented essential issues of the SON with which students have to be
familiar before the laboratory session.
7.1.1 Self-Organizing Networks introduction
Self-organizing means that mesh networks doesn’t require manual configuration including
designing all routing settings. All traffic is allocated automatically, so such system doesn’t
require administrator at all. Moreover, it facilitates reconstruction of the network like adding
some new nodes, because there won’t be necessity to configure anything. The network will
discover new node automatically and incorporate it into the existing system. Such attributes
allows for naming network as ‘reliable’, because it strongly increase immunity for network
breakdowns.
SON minimizes the operation costs of running a network by reducing and eliminating manual
configuration of network operational parameters at the time of network planning, network
deployment, network operations and network optimization. Instead of those routines there are
implemented automatic algorithms which reconfigures network and turn it back to the optimal
operation state.
7.1.2 Primary and additional paths
Primary path defines the routing links which connects particular nodes when network is
operating in the optimal mode without any failures and connection problems. Primary paths
are being selected basing on the distances between particular network nodes, the smallest one
is of course the better because it decrease time needed for transmission.
Additional (secondary, backup) paths define the routing links which connects particular nodes
in case of particular failure scenarios. Dependently on the network size there are number of
failure scenarios defining the number of additional paths. Alternative paths are also being
selected basing on the distances between particular network nodes, but taking under
consideration that there are nodes which are cut out from the reconfiguration process.
78
7.1.3 Methods of reconfiguration
Link-based reconfiguration:
Link-based method in case of failure of particular link is omitting it during the reconfiguration
process, however, in opposite to end-to-end method, nodes which were connected using this
link can be used in the newly reconfigured network.
Fig. 37 Link-based method failure reconfiguration scenario
Specificities:
- Operation is more simple.
- In case of one link failure only two nodes are participating in the reconfiguration process.
- Higher traffic load on the links which overtakes the traffic from damaged link, it require
higher resources availability.
- Resources are unequally redistributed over the network.
End-to-end reconfiguration:
End-to-end method in case of failure of particular link in reconfiguration process is totally
cutting out nodes which were connected by this link. Whole traffic is rerouted using different
paths without participation of the failure affected nodes.
Fig. 38 End-to-end method failure reconfiguration scenario
Specificities:
- Reconfiguration operation is more complex.
- More distracted reconfiguration process due to the fact that more nodes need to
participate in it.
- Resources are more uniformly redistributed.
79
7.1.4 Important definitions
Protection plans
1+1:
Transmission flows parallel on both primary and alternative paths.
1:1:
Transmission flows on primary path and in case of failure all traffic is redirected to the
alternative paths.
1:N:
The most pessimistic scenario which assumes maximum number of failures and
prepare more alternative paths. It is the most resource demanding scenario.
Network resources
Network resources define the capacity for the traffic which can be handled by particular links
between network nodes. If the particular link is not able to handle the reconfigured traffic then
other link has to help it. If after failure of some link the network has not enough resources
then it becomes overloaded and there will occur problems with traffic flow.
Protection flow rate
Protection flow rate defines how much traffic can be handled using particular protection
scenario with particular amount of network resources.
7.2 PKSA Planner tool instruction
PKSA Planner is an application designed for measurements of the network resources used in
the designing stage of the network project [9].
Primary functions:
Calculations of the necessary resources in the primary and secondary routing
configurations.
Operates on configuration plans 1+1, 1:1 and 1:N.
Utilizes End-to-end and Link-based path calculation algorithm methods.
Visualization of the designed network topology.
Visualization of the primary and secondary path configuration for algorithm methods
End-to-end and Link-based.
Configuration:
Before launch of the application the content of the PKSA Planner directory have to be placed
into Matlab ‘work’ directory (i.e. C:/Program Files(x86)/Matlab/R2010b/work/).
All necessary data for the calculations are located in the projectData.xml file. It includes node,
link and path allocations provided by user. Data file can be edited to change the network data
accordingly to the user demands. Users have to remember that the order of the nodes, links
and paths is important and cannot be changed. The order of the particular node using attribute
’num’ doesn’t have to be kept, but users have to use all numbers from the interval from 1 to
max ‘num’. Paths are one-directional with direction assumed by the order of listing nodes
source and destination.
80
Usage:
1.Put data to projectData.xml file.
2.Launch the application from Matlab command line putting ‘projectPKSA’
Results:
Visual window presenting designed network topology, resources in particular
configuration plans, primary and secondary paths for particular algorithm method.
Fig. 39 PKSA Planner visual window
Detailed results of simulation are being saved in the file ‘results.txt’ located in the
application directory.
Navigation:
Arrow UP/DOWN – selection of the path or link dependently on the particular method
(selected link is being ‘highlighted’).
Arrow LEFT/RIGHT – change method between End-to-end to Link-based.
81
7.3 Summary and conclusions
Laboratory number 4 concerning investigation of the SON allow students to gain practical
abilities and knowledge concerning SON’s operation principles.
This laboratory session requires from the students to check results which they obtain using
manual method of estimations with results provided by software tool. Such combination of
the manual, practical skills with theoretical knowledge is very beneficial for the student as it
learn logical way of thinking. Students are asked to observe the results of simulations for
different sets of data and multiple parameters options during each step of the laboratory.
Moreover, practical utilization of the theoretical knowledge allows for practical understanding
of the whole operation and to observe changes made by particular adjustments.
Observation of the simulation give student practical glance on the concept of routing process
and its reconfiguration operation flow. Students are able to visualize the operation of the
reconfiguration process and the failure scenarios. Investigations of this area allow students to
learn knowledge concerning methods of dealing with connection link failure scenarios.
Basing on the obtained results of resources demands in particular situations students may
better understand the ways of resource management. Manual calculations help them to
understand how particular change in the system influences the operation of the whole
network.
Described laboratory session allows to observe fundamentals of SON operations. It is very
universal knowledge taking under consideration that SON’s are very desirable in modern
implementations of networks. This technique is very forward looking what can be confirmed
by the fact that it is used in LTE and LTE Advanced.
82
8. Conclusions
Elaborated laboratory experiments all together with ones of [15] allows performing advanced
investigations in the matter of wireless technologies of LTE, WiMAX and Self-Organizing
method of network reconfiguration. Laboratory sessions are mentioned to be internal part of
the newly-formed course based on the modern wireless technologies.
First aim of the thesis was to select proper area of investigations of particular technologies
later undertaken inside laboratory experiments. Selection of investigated matters determine
the way of student’s learning process so the decision was to focus on the modern and forward
looking technologies. For the same reason selection of particular area of investigation inside
those technologies was made to allow student to gain some universal knowledge and practical
abilities which can be used in the future, also in the next generations of the technologies.
Selections were made upon considerations of telecommunication market trends, demands for
particular technologies and the direction in which modern technologies architecture is going
to. Decisions seem to be reasonable taking under consideration investigated areas.
Second main task of the project was selection of the software tools later utilized during
laboratory experiments. Choice of the tools adjusted to particular experiment demands was
not so obvious as there are several tools on the market which investigate areas undertaken in
thesis. There were made lots of effort to gain and examine all of the tools. First decision factor
in this issue was proper adjustment to the examined matter. Of course each tool must be
designed in the way that is friendly for the users with lower knowledge than professionals.
The way of investigations over the laboratory examined area also must fit to the educational
purpose, simply because it is essential to allow students to gain some practical knowledge
which could be used by them in the future.
The last main objective was to combine selected software tools with the demands of the
examined subject for particular investigation area. Designed Master of Science Thesis
includes four elaborated laboratory experiments with theoretical instruction sets of
investigated matters and user guides of each examined tools.
Laboratory sessions are assumed to be student friendly and are supposed to lead to the
cooperation with the external market of the future employers. Firstly, the laboratories will be
proceeded in a way demanding students to use their theoretical knowledge to turn it into the
practical abilities. Secondly, during laboratory sessions students will be utilizing both
academic and professional tools. It allows students to gain lots of experience in usage of such
tools and to have a close view on the investigated technologies. Thanks to that it is possible to
have a bright touch with fundamentals examined technologies. Such knowledge is much more
beneficial than typical book type one because after graduation students are able to start
working on such tools and investigated issues without time-consuming trainings.
More practical knowledge gained during the studies will result in the education advance level
of the better, more experienced graduated student and future employee, who will be capable
to deal with practical problems from the beginning of his career. Result of such operation will
be beneficial for both labor market and universities teaching level.
83
From the University and Faculty point of view it is worth to mention that granularity of the
LTE PHY Lab tool allows for further, more advanced investigations over LTE Technology
that can be undertaken during next semesters of the subject realizations. It is also possible to
use it in the realization of the another one subject dedicated to only LTE Technology focused
in the more deep analysis of it.
84
9. References
[1] Jarosław Medwid , Reliable Broadband Access Network Project of Wireless Mesh
Network type for Skierniewice City and selected local Communes, B.Sc. Dissertation written
under Professor M. Słomiński supervision, IT-WUT, September 2010
[2] Łukasz Kiliszek , WiMAXProjekt: IEEE 802.16 Nomadic Wireless Networks Designing
supporting tool , in Polish, M.Sc. Dissertation written under M. Słomiński supervision, IT-
WUT, 2006
[3] Maciej Wais, Automatic Radio Planner: 802.16d WiMAX Networks Designing Supporting
tool , in Polish, B.Sc. Dissertation written under M. Słomiński supervision, IT-WUT
[4] Łukasz Kołodziejek, Analysis of transmission channels availability for wireless networks
of point-multipoint type, in Polish, M.Sc. Dissertation written under M. Słomiński
supervision, IT-WUT
[5] William Stallings, Wireless Communications and Networks, Prentice Hall, New Jersey,
2002
[6] Jeffrey Andrews, Arunabha Ghosh, Rias Muhamed, Fundamentals of Wimax, Prentice
Hall 2007
[7] Joseph Mitola III, Cognitive Radio: An Integrated Agent Architecture for Software
Defined Radio, Ph.D. Thesis, Royal Institute of Technology (KTH) Stockholm, Sweden, 8
May, 2000
[8] Lars Berlemann and Stefan Mangold, Cognitive Radio for Dynamic Spectrum Access,
John Wiley & Sons Ltd, United Kingdom, 2009
[9] Łukasz Dobrodziej, Jakub Maćkowiak, PKSA Planner tool, PKSA course project written
under M. Słomiński supervisory, IT-WUT, 2009
[10] Mirosław Słomiński, Ph.D., ATM-BISDN Networks Designing and Configuration, in
Polish, PKSA course teaching materials, IT-WUT, 2009
[11] Samuel C.Yang, OFDMA System Analysis and Design, Artech House, 2010, book
[12] Harri Holma, Antti Toskala, LTE for UMTS – OFDMA and SC-FDMA Based Radio
Access, John Wiley & Sons Ltd, United Kingdom, 2009
[13] Hyung G. Myung, Towards 4G – Technical overview of LTE and WiMAX, WCNC,
Australia, 2010, whitepaper
[14] Jim Zyren, Overview of the 3GPP Long Term Evolution Physical Layer, 2007,
whitepaper
[15] Maciej Lewandowski, Elaboration of the laboratory experiments for teaching purposes
in the area of WiMAX networks planning, LTE, Cognitive Networks, M.Sc. Dissertation
written under M. Słomiński supervision, IT-WUT, to be submitted in February 2012
[16] Bartosz Kluzek, Implementation of algorithm of planning transmission resources in ATM
networks accordingly to different SLA classes of realized telecommunication services , in
Polish, B.Sc. Dissertation written under M. Słomiński supervision, IT-WUT
[17] www.Wimax.com
[18] http://www.lte-4g.info/
[19] http://www.wi-fi.org
[20] http://www.ieee.org/
[21] http://is-wireless.com
[22] www.alvarion.com
[23] http://wikipedia.org
[24] http://www.uke.gov.pl
[25] http://www.inter-comp.pl/
[26] http://www.wimax.biz.pl
85
[27] http://www.tktelekom.pl/carrier
[28] http://www.freewimaxinfo.com/wimax-architecture.html
[29] http://www.ltesuite.com
[30] http://www.motorola.com
[31] http://www.cplus.org/rmw/
[32] http://huizen.deds.nl/~pa0hoo/helix_wifi/linkbudgetcalc/wlan_budgetcalc.html
[33] http://www.mathworks.com/
[34] http://www.3gpp.org
[35] http://www.anritsu.com
[36] http://www.catapult.com
[37] http://www.jdsu.com/ProductLiterature/LTE_PHY_Layer_Measurement_Guide.pdf
[38] http://is-wireless.com
[39] www.wimaxforum.org
[40] http://www.iptv-forum.com/
[41] http://www.mobileworldcongress.com/
9.3 CD contents
M.Sc. Thesis placed in file M.Sc. 2011 – Medwid Jarosław.pdf
Designing support tools placed in folder Tools
Manuals for tools
Laboratory experiments source codes
9.4 Appendix A
Manual of LTE PHY Lab Tool is located in the folder Tools/LTE PHY Lab Tool on
the CD