Professional Documents
Culture Documents
Book Chapter 3
Book Chapter 3
1. INTRODUCTION
Initially, the prime objective behind designing a wireless system for public
was obtaining a good coverage area for voice communication. This objective
was successfully achieved by the introduction of high powered wireless
transmitters and receivers. However, this technique had two inherent
problems:
1. The absence of large spectrum capacity was the major problem behind
supporting all wireless users under the same coverage area. Historically, the
Bell systems in New York City were capable to support only 12
simultaneous calls over 1000 sq. miles [11] when they implemented the
experimental service. Let us determine the number of wireless channels
required to introduce this system for New York City.
Example 3.1
Assume:
6 M people in the city
25 % penetration rate of wireless service
50 m Erlang traffic/user during the busy hour
30 KHz bandwidth of any one-way channel
2. The scheme was not capable to offer mobility among the users once they
move out of the single coverage area of the terminal. The reason behind it
lies in the limited transmission range of the hand-held, mobile terminals. The
power of radio waves emitted by the mobiles decreases with inverse squared
distance, even in the empty space. A portable battery powered terminal can
support wireless links that are only few miles from the TRX/RCV at the
best. So city wide coverage of both way communications is not possible.
The advent of cellular concept was the first major breakthrough to deal with
this spectral scarcity, while providing the users a freedom of being mobile.
In order to cope up with the limited transmission range of the mobile
devices, the concept of a single, high power transmitter was replaced by a
large number of low power transmitters and receivers. These transmitters
and receivers are scattered over the entire coverage area, each covering only
a small zone, termed cell. This chapter deals with the underlying
architectural and operational concepts of the cellular networks with a focus
on the widely deployed GSM (Global System for Mobile communications).
GSM is the second generation mobile system (2G), based on digital cellular
technology. The first generation wireless systems like, North American
AMPS, were an analog cellular system that used analog mode of wireless
communications. Most of the analog mode systems in the world have been
replaced by 2G digital technology today. The prime objective of 2G system
is to provide reliable wireless voice service to user, thus most of the system
parameters are optimized for voice communications only in the 2G system.
Spectrum: During 1950s and early 1960s United States and other developed
countries started working on the design of their cellular network. AT&T
proposed the cellular network concept to FCC in 1968, but commercial
technology was not ready before late 1970s. In 1983 FCC first allocated 40
MHz frequency for cellular radio system in USA. Thus the first generation
analog cellular system started at different parts of the world as a local
experimental system without any global co-ordination. The first generation
wireless systems like, North American AMPS, were an analog cellular
system that used analog mode of wireless communications. Different
spectrum, channel and modulation techniques are used at different parts of
the world. Table~1 provides an overview of these different first generation
systems.
Today most of the second generation systems are GSM (Global System for
Mobile communications); hence, we will consider GSM as typical cellular
system to illustrate the concept of Cellular working. This GSM system has
considerable impact on the implementation of the wireless Internet as circuit
switched GSM voice network will migrate to GPRS data network to provide
early version of wireless internet services. This chapter explains the working
of cellular voice networks and its analysis by assuming the GSM system
architecture. The prime objective of GSM 2G system is to provide reliable
wireless voice service to user, thus most of the system parameters are
optimized in GSM system for voice communications only.
2. Cellular Architecture
A close look into the cellular systems, shown in Figure~1 reveals the
existence of different architectural components (sub-systems) in its internal
domain. The canonical architecture of cellular systems (GSM in particular)
consists of three major parts: the mobile terminal (MT), Base Station
Subsystem (BSS) and the Network and Switching Subsystem (NSS). The
most important component of BSS is Base Transceiver Station (BTS) and
for NSS the Mobile Switching Center (MSC) [24, 19, 32]. Apart from these
three components, the manufacturer specific Operation Sub-System (OSS) is
also an integral part of cellular networks. As shown in Figure~ 1, using a
wireless link, the MTs communicate with the BSS, which in turn contacts
the MSC to set up a connection with other MTs or external networks~[35].
The wireless link is a common resource shared by all the active MTs of a
cell. There are two types of wireless links:
(1) the up-link or forward channel establishes one way wireless connection
from the MT to the BTS,
(2) the down-link or reverse channel establishes a one way connection from
BTS to MT.
2. The Base Station Sub-System (BSS): The MTs communicate directly with
the BSS through the wireless links. A group of BSSs are also connected to a
MSC through wire-lined connection. Thus, the prime role of BSS is to
connect the MTs with the MSC [35]. In most of the cellular systems
(including GSM), the BSS contains two components: the BTS (Base
Transceiver Station) and the BSC (Base Station Controller). Figure~ 2
shows a schematic diagram of the BSS with its different components. The
BTS is responsible for communicating with the MTs through the wireless
radio interface. Hence, it is comprised of antennas for transmission-reception
and signal processing capability. Typically BTS for GSM is capable of
maintaining 3-5 radio careers, carrying 20-40 simultaneous communications
[24]. In GSM standards, each radio carrier has 200 KHz bandwidth. This
bandwidth is split into 8 slots, and each slot can support single one way
communication. Thus effectively, GSM uses 25 KHz bandwidth for single
one way voice communication. As a part of the BTS, the GSM architecture
also includes a TRAU (Transcoder or Rate Adapter Unit) for speech
encoding, decoding and adaptation of data rate. The 25 KHz for single one
way voice communication is very limited bandwidth for traditional digital
voice channel rate of 6Kbps. So, in cellular system, traditional 64Kbps PCM
voice is further compressed to lower rate voice codes to fit into the 25 KHz
spectrum. This function is called speech coding and TRAU implements this
function. There are different speech coding standards that can be used in
GSM systems. BSC, the second component of the BSS takes care of the
radio interface management, allocation and release of radio channels and the
hand off management. The BSC is responsible to connect multiple (typically
l-10 for GSM) BTSs to a single MSC. GSM specifications also provide an
interface, called ``Abis'' interface between the BSC and MSC.
to get service from a foreign MSC. The information of the mobile terminal
(MT) relevant to the service provisioning, is stored in the HLR (Home
Location Register).This is completely independent of the MT's current
location. The HLR also needs to contain some information regarding the
MT's current location. It is completely devoid of any switching capability,
and acts as storage of thousands of subscriber information. The other
important database included in GSM is the VLR (Visiting Location
Register). It is linked to one or more MSCs and temporarily stores the
subscription information for the set of subscribers under the coverage area of
those MSCs. It also contains the precise location information of the MTs.
Besides these basic components NSS also contains a gateway switch, termed
as GMSC (Gateway MSC). During the call set-up for a GSM user, the call is
first routed to this GSMC. It is responsible for fetching of relevant location
information and routing of the incoming calls. Naturally, all GMSC needs to
have specific interface with the external network and the SS7 signaling
network for communicating with other NSS components.
If you notice the Figure~ 4 of GSM Protocol Structure, you will find that
RRM function is distributed between Base Station, BSC and MSC, where as
MSC controls all MM function. As in ISDN, Link Layer protocol LAPDm
terminates at the BSC. The A-interface communication is based on SS7
Signaling connection Control Part (SCCP) and Message Transfer Part
(MTP). Adopting the complete functionality of SS7 signaling from BSC
provides considerable signaling capability to the system, as it can handle
both signaling and message transaction functions.
3. Cell Layout
The cell layout of a cellular network is determined by the planning process
of the cells. Generally, a geometric map of the area to be covered is taken
and based on the demography of the different areas; the coverage area is
partitioned into different classes like down-town, urban, suburban, rural etc.
The traffic intensity at each area is defined to estimate the amount of
resources required for that area. Usually a radio designer use a radio network
design tools for planning to cover the area with grid, triangular or hexagonal
cells. The size of these cells is defined by the designer based on the radio
parameters assumed in the design. Based on these grid or hexagonal cells,
the potential cell sites are developed. Normally, this process in instantiated
at the known cell-site locations, so that, the existing facilities of the service
provider can be utilized in the design. The area covered by each type of
polygon used is different. As shown in Figure~ 7, the area covered by a
hexagonal polygon is greater than the other two polygons. Normally a
hexagonal polygon is chosen in the design. This reduces the number of cell-
sites for a given coverage area.
Solution:
There are two type of grids
High density Grid: G (i, j ) for i = 500........600 and j = 450....550
Low density Grid: G (i, j ) for i = 1.....499,601........1000 and
j = 1.....449,551....1000
Number of subscriber in High density grid = 0.1X 10 X 10 = 10
Number of subscriber in low density grid 0.001X 10 X 10 = 0.1
Each point (i, j ) has a weight (10) or (0.1)
Use any clustering algorithm to create the cell from the grid data using the
following constraints
1. In a cell all grids should be adjacent
2. The total number of subscribers in a cell ≤ 1000 or the maximum
distance from the centroid of the cell to the boundary of a grid is
≤ 1000
If we like to determine the distance from the center(0, 0) to a cell (u=i, v=j),
then,
D= (i 2
+ j 2 + ij )
= (i + j )2 − ij
In the cellular system, the same frequency can not be used in the adjacent
cells, as there will be co-channel interference. The hexagonal cell structure
actually creates a cluster of 7 cells. To eliminate the co-channel interference
the frequencies allocated to each cell will be different.
(
D 2 = 3R 2 i 2 + j 2 + ij )
Area of the outer cluster of radius D that surrounds the cluster of hexagonal
will be:
(
Aout = KD 2 = K .3R 2 i 2 + j 2 + ij )
Area of the cell at the center:
A = KR 2
The number of cells in the outer hexagon is 3N, where N is the number of
cells in a cluster. Hence,
Aout = 3N . A
Aout
= 3N
A
3KR 2 (i 2 + j 2 + ij )
= 3N
KR 2
N = (i 2 + j 2 + ij )
But
(i 2
+ j 2 + ij ) =
D2
3R 2
D2
N=
3R 2
D
= 3N
R
For hexagonal cell N = 7, then
D
= 4.6
R
D
This ratio is called channel reused ratio.
R
Example 3.4: The wireless system uses mobile terminal with 500 mw power
capacity and antenna gain of 3dB. The cell-site receiver sensitivity is
60dBm. The coverage are of the network is 20 KM square. Find the number
of hexagonal cell site required to cover the area. If the cell site antennas are
omni directional, what will be the reuse factor in this case using free space
propagation model and signal to noise separation of 12 dB. Determine the
minimum number of GSM frequencies required to build the coverage.
Solution
2.3 GSM-voice
The second generation systems are designed to provide more system
capacity to the wireless spectrum and enhance the voice quality to close to
land-line voice quality. The use of voice decoding plays a major role in the
design and improving the voice capacity and quality of the cellular system.
To explain the cellular voice signal processing function we use the high
level functional scheme to generate the voice frames for the GSM system as
shown in Figure~ 10.
In GSM, the encoded voice samples are then protected by channel coding.
There are different channel coding schemes available. The errors in the 50
class-1a bits are protected by block polynomial coding, which takes
Figure-12: Different types of voice bits in GSM
additional 3 priority bits also. On the receiving end, if the error is detected
then the whole 260 bits are ignored. The class-1b 132 bits are followed by 4
trail bits. Thus, including the parity and trail bits, the entire length of the
class-1 block becomes 189 bits. These 189 bits are convolution coded with
R=1/2 code of the constant length 5. Thus the total class-1 channel coded
frame length is 378 bits. These 378 bits are concatenated with 78 class-2
bits, and thus a channel coded GSM frame of voice is created with 456 bits
456.10 −3
at every 20 msec. The data rate of the GSM spectrum is = 22.8
20
Kbps. Figure~ 11 shows the schematic overview of this mechanism.
The wireless channel encounters burst of errors due to fading and shadowing
as mentioned in Chapter-2. To protect against this burst error, interleaving is
applied. Interleaving breaks these 456 bits into 8 groups called D1-D8 of 57
bits each. A 40 msec segment of speech data is interleaved with a distance of
8 to combat errors in multipath fading. The GSM interleaving duration is 40
msec and the interleaving distance is 8. The frame length is theoretically
40
= 5 msec. The actual frame length of GSM system is 4.615 msec. In each
8
frame 57.2 = 114 bits of user data for speech transmission is transmitted. This
scheme of forming the 114 bits interleaved frame is shown in Figure~12.
Frame Structure
Total GSM spectrum = 25 MHz,
Total number of GSM channels supported on this spectrum = 124
⎢ 25.10 6 ⎥
Bandwidth per channel = ⎢ ⎥ = 200 KHz
⎣ 124 ⎦
Example 3.5: The GSM data rate is 270.833 Kbps. What is the single bit
duration in GSM link? During the GSM time slot of 0.577 msec, a burst of
148 bits are transmitted. What is the length in bits of effective difference
between time slot time and burst time? This is called guard time.
Control Channels: These channels are used for signaling and control
functions of the system. The information content transferred through these
channels are very sensitive to channel error rate. In GSM system, the total
amount of bits transferred per frame in these channels are same as voice
frame, but the treatment of the bits of these channels are different from voice
channel, as it is shown in Figure- 14. To identify and correct the bit errors,
these channel use more complex set of parity bits and the complete frame is
half rate convolution coded to protect against bit failure.
There is another burst type that is used by the Mobile station called Random
Access Burst (RAB) to register with the network so that it can communicate
with network without prior assignment of signaling channel by the network.
This burst mode has only 88 bits of data consisting of 41 synchronization
bits and 36 encrypted data bits. The front trail is extended to 8 bits
Figure~16 shows the format of these different burst types.
Example 3.7: Find the extended Guard time of the Random Access Burst
Mode. Why this extended Guard Time is required.
Example 3.8: The Uplink and Downlink of a GSM system uses slot zero of
multi frame for control channel and broadcast channel with the following
pattern.
Uplink: 4D-2R-8A-23R-8D-2R-4D
Downlink:F-S-4B-4C-F-S-8C-F-S-8D-F-S-8D-F-S-8A-I
where : D=Dedicated Control Channel, R=Random Access Channel, A=
Associated Control Channel, F=Frequency broadcast channel, S=
synchronization channel, B= broadcast control channel, C= Common control
channel, I=idle. Determine the channel speeds in kbps for each channel type.
MS-1 and MS-2 at a distance d1 and d 2 from the base station. The two
adjacent slots are allocated to these two stations. If the base station slot time
started at τ , the two signals will arrive at the base station as follows:
2d 1
MS-1 signal will arrive at base station at time τ + and end at time
c
2d 1
τ +∆+
c
2d 2
MS-2 signal will arrive at base station at time τ + ∆ +
c
2d 2 2d 1
if < , there will be time when two signals will collide at the base
c c
station.
To synchronize the signals from different mobiles within the short guard
time of GSM system, the concept of Timing Advance is used. Timing
Advance is the mechanism to adjust the transmission time from the mobile
based on its propagation delay from the base station. Once the dedicated
connection is established with a mobile station, BTS continuously measures
the time offset between its own burst schedule and the burst reception
schedule of the mobile station. Based on these measurements, BTS can
determine the required Time Advance of the mobile station. BTS then sends
this Time Advance recommendation by using the SACCH at the rate of 2 per
second. The Timing Advance can take value between 0 to 233 micro second.
The actual time advance is n bit period where the value of n can be from 0 to
63. This value of time Advance allows GSM to operate within 35 Km of
radius. If the coverage is required more than 35 KM, the GSM guard time is
can be extended by using only alternate burst for traffic transfer. At initial
assignment or at handover between two cells which are not synchronized,
both mobile station and base station does not know the Timing Advance for
valid communication. In that situation, mobile station sends an access burst
with null Timing Advance. Base station receives this burst and that includes
double the propagation time. From this base station computes the Timing
Advance and transfers this using signaling channel. From these point on-
words, mobile station can start the normal burst for communication.
Figure~18 A shows this signaling scheme for initial Time advance set-up
From that point on-words, the S and BTS continuously exchange messages
by using the channels like PTCCH/U or PTCCH/D or piggy backing on
power control messages or using ACK/NACK messages to maintain the
Time advance information accurate.
Assume there is only one location Area (LA) in a system with one MSC.
MSC receives 100K calls in BH and 50% of those calls are terminating
Mobile Calls. There are n cells in the system and all these cells are
connected to this MSC. Assume in our example the value of n=100. We are
interested to estimate the number of paging message created by this MSC
during BH.
100 X 10 3 X 0.5
Average number of calls per cell = = 500
100
Though the mobile that is receiving the terminating call will be at one
particular cell at that time, in this case, MSC does not know the location of
the mobile. So MSC can not page only the particular cell where mobile is
currently located. It will broadcast the page message to all the cells. Only
one of the cell will reply to this paging message. MSC then only knows the
location of the mobile.
The basic cellular architecture with major entities for location management
system, like, base station, MSC, HLR, VLR is described in Section~arch.
On the arrival of a call for a mobile terminal, the system initiates a search for
the target mobile. This search mechanism is called terminal paging, the
usual mechanism of which involves the broadcast of a page message from
the MSC via the base stations serving the set of cells where the mobile
terminal is likely to be present. The base stations broadcast the paging
request over one or more designated forward control channels called the
paging channels. The number and designation of the paging channels vary
between systems. All the mobile terminals listen to the page message and
only the target sends a response message back over a reverse control
channel. Once this is known, the network establishes the connection to
the Mobile using the cell-site antenna of that cell. Thus Location Area and
Paging is important concept for terminating a Mobile Call.
The challenge of the network designer is to find the optimum size of the
location area. There are two signaling function that are interrelated in this
process, namely the location management messages and paging messages.
The location messages are generated continuously whenever a mobile
crosses the location area boundary. This happens irrespective of whether the
mobile is in session or idle. So if the size of the location area is small.
the number of location tracking messages will higher, where as with large
location area sizes, the number of location tracking messages will be small.
On the other hand, the paging message is generated when there is a
terminating mobile call. For small location area, there are fewer cells in the
location area and number of paging message will be few. But if the location
area size is large, many cells will be part of the location area, and the number
of paging message will be very high. The dynamics of this trade-off
is shown in the Figure~{\Location Area} where in x-axis, the number of
cells per location area. The location area planning use two important
network data set, namely
1. Adjacent cell crossing data during BH: This is a nXn matrix with
non zero entries only for adjacent cells.
2. Busy hour terminating call data per cell: This is a n dimensional
vector.
In addition the network planner will need the cost of paging and cost of
location update message to determine optimal paging area. The optimization
can be done by using Graph coloring technique.
Example 3.9: A MSC has 100 cells. 50% of busy hour calls are terminating.
If the busy hour calling rate of the switch is 10K and it is uniformly
distributed over all the cells, find the total paging channel capacity of a cell,
in case of one location area and in case of 100 location area.
Assume each paging require 456 bits
Most paging algorithms proceed with a high reliance factor on the latest
update information. In the case of zone-based update, a blanket polling is
done over the last reported LA. The target's existence in one of the
constituent cells is guaranteed by the protocol. For the dynamic update
schemes, the last known position of the mobile terminal and its
neighborhood are considered to be the most probable position -- the
probability decreasing in an omni-directional way with increasing distance.
This is the underlying assumption for the popular cluster paging [36] and
selective paging [1, 3, 23]. The directional bias in user movement has mostly
been taken care of by associating a number of states for each cell under a
Markov model [7, 9]. Using user profiles either by querying the mobile
terminal or by retrieving from the billing database has also been considered
[40]. Profile-based paging on optimal LeZi-Update is also investigated. This
paging strategy initially uses the concept of PPM (prediction by partial
match) style blending mechanism to compute the residence probabilities of
the mobile user in deferent cells. It then polls the cells in decreasing order of
residence probabilities. Some recent paging strategies have been proposed
for multi-system location management. In such a heterogeneous system,
there exists both inter-system and intra-system paging. The overhead and
cost of inter-system paging can be effectively reduced by using the concept
of boundary location register [4]. Profile based active and idle paging
requests have also been recently proposed to minimize the paging cost [34]
in multi-system cellular networks.
5. Radio Interference
Interference: The major problem behind the performance improvement of
the cellular systems is interference [42]. Interference can occur from a
different mobile in the same or neighboring cell, other base stations
operating in the same frequency or any non-cellular system operating in the
same frequency domain. While interference in control channel results in call
blocking, it affects the performance of the voice channels by introducing un-
wanted cross talks. The greater noise and increased number of base stations
make the interference very severe in the dense urban (city) areas. This
interference is broadly classified into two types:
1. co-channel interference
2. adjacent channel interference
S S
= nc
I
∑I
i =1
i
Now, if d i is the distance of the ith interferer, the received power at the
mobile is approximately proportional to d i− m , for 2 ≤ m ≤ 4 , m is known as
path-loss exponent. It has been shown in [42] that for homogeneous base
stations and path loss experiment,
m
⎛d ⎞
S
=
r −m
⎜ ⎟
=⎝ ⎠ =
r ( 3N )
n
n0
I i0 i0
∑d
i =1
i
−m
S
The above equation provides a relation between and N . However, it must
I
be noted that this equation is based on the hexagonal cellular geometry only,
with cellular equidistant interfering cells.
the decrease in signal strength is not arising from temporary fading, thereby
assuring that the mobile is actually moving far away from the coverage area
of the serving base stations. The running average of signal strength thus
needs to be estimated for avoiding un-wanted hand offs. Intuitively, the time
span needed to decide whether a hand off is actually necessary is dependent
on the movement speed of the mobile. The time over which a call is
maintained without hand off is known as dwell time [41]. This dwell time is
dependent on the time varying effects of radio propagation, interference,
channel fading and distance between mobile and the base station.
Unfortunately, the variance of dwell time is quiet un-predictable. While
large and less populated coverage areas have random dwell time
concentrated around its mean, dense city areas possess dwell time widely
varying from its mean. Broadly, the hand off mechanisms of cellular
networks can be classified into two distinct types: system assisted hand off
and mobile assisted hand off.
7.2 System Initiated Hand Off: In the first generation cellular systems, the
hand off mechanism was almost entirely performed by the system [39, 42].
The base stations used to continuously monitor and measure the signal
strengths. Estimating the signal strength of every mobile it used to determine
the relative location of the mobile under its own coverage area. Moreover, a
spare locator receiver in each base station was used to monitor the signal
strengths of the mobiles in its neighboring cells which have high probability
of hand off. The entire process is controlled and managed by the MSC,
which decides whether a hand off is actually necessary or not.
7.3 Mobile Initiated Hand Off: The hand off decision in second generation
cellular systems, which use digital TDMA technology (e.g. GSM), is mobile
assisted [35, 39, 42]. Every mobile continuously measures the signal
strengths of the base stations and reports these measurements to its serving
base station. When the mobile obtains a higher signal strength from a
different base station, than its serving base station, for a certain period of
time, the hand off is initiated. This mechanism improves the performance
and latency of the hand off, since the MSC no longer needs to constantly
monitor the signal strengths. This mobile initiated hand off is suited for
micro cellular environments which require frequent hand offs. The GSM
mobile initiated hand-off messaging sequence is shown in Figure~\(GSM
HO Procedure}. The Mobile station is connected to BTS-1, but it is
continuously monitoring the BCCH of the BTS-1 and its neighboring BTSs.
It sends the RSSI report to BTS-1 based on these measurements using
SACCH channel of the TCH it is using. Base station, on getting the RSSI
measurements, decide the Hand-off trigger point and request a Hand-off
initiation to BSC and MSC. MSC based on RSSI measurement, decides the
BTS that will receive this call after HO, and send a HO request to BSC and
BTS-2. The free TCH is reserved for this call at the BTS-2. BSC and BTS-2
acknowledge this request and bridge the connection to the existing call. BSC
at the same time initiate the Hand-off command to BTS-1 by using the
SACCH. BTS-1, on receiving the Hand-off Command, tune the RF
frequency to the new channel of BTS-2, and send the Hand-off completion
message to BTS-2 using the SACCH of the TCH allocated from BTS-2. The
BTS sends this message to BSC and MSC to cut through the bridged
connection. At this stage the voice packets are received from both antenna to
the system. MSC finally sends the Release HO Channel
message to BTS-1 through BSC. BTS-1 send this message to Mobile using
SACCH of the TCH for BTS-1. Mobile terminal removes the connection to
TCH from BTS-1. Now the voice packets are received from BTS-2 antenna
only. BTS-1 also send the Release HO channel confirmation message to
BSC and MSC to free up the TCH allocated in BTS for the call. This Hand-
off procedure also will work for the case when the BTS-2 is located to a
different BSC controlled by the same MSC. Figure~\{Hand-off Switching
Points} shows the different switching points possible in the hand-off. When
the Mobile station moves from the coverage area of one MSC to another
MSC more complex messaging is required to complete the hand-off. This is
explained in next section.
7.4 Inter-System Hand Off: Apart from these two basic types of hand offs,
a different scenario arises when a mobile moves away from one system to
another, controlled by a different MSC. Such a hand off is termed as inter
system hand off [42, 33]. An MSC realizes an inter-system hand off when it
finds the mobile's signal to be very weak, but can not find another cell within
its coverage area to transfer the on-going call. Figure~\{Inter System HO}
shows the messaging for this case. The concept of Anchor MSC is used in
this case. Anchor MSC is the MSC that remains as a fixed connection point
of the call during the complete call session. With the concept of Anchor
MSC, the call can move over large areas with multiple MSCs and still
maintain its connection valid for the network. Figure~\{Anchor MSC}
shows how the call leg from one MSC to another MSC can be changed
without effecting the end to end connectivity. As shown in Figure~\{Inter
System HO}, The old BSC sends Hand-off required message to old MSC.
old MSC transform this message to MAP format and send to Anchor MSC.
Anchor MSC sends the Hand-off perform message to New MSC. New MSC
sends the Hand-off request message to New BSC. On reverse direction New
BSC sends the Acknowledgement back to New MSC, which in turn sends
the Hand-off Perform Acknowledgement message to Anchor MSC. Anchor
MSC sends this to old MSC. Old MSC now sends the Hand-off Command to
Old BSC. The new BSC will receive HO Complete from its BTS and sends
this message to New MSC. New MSC send the End Signal Result to Anchor
MSC which will transfer that to old MSC. Old MS will send the clear
command to old BSC and the channel will be released in the same sequence
as we have seen in intra system hand-off.
7.5 Prioritizing Hand Offs and its Challenges: Generally, from the user
perspective, the maintenance of an on-going session is more important than a
new session arrival. In order to improve the quality of service (QoS) during
the hand off, various research proposals are provided to give the hand off
calls more priority over any incoming voice calls [43]. One way to prioritize
the hand off calls is to reserve a fraction of total available channels
exclusively for hand off requests from the on-going sessions. This scheme is
known as guard channel concept [43]. However, this scheme lacks from low
traffic utilization. Different dynamic channel assignment strategies are
proposed to optimize the number of guard channels by using demand based
frequency allocation. Another way to deal with hand off sessions is queuing
of hand off requests [47]. The queuing of on-going sessions decrease the
session blocking probability. Since, there is a significant difference between
the hand off request time and session blocking time, it is wise to queue the
hand off requests and provide the system some time to process the queued
requests.
Challenges in hand off often arise due to the wide variety of speeds between
different users. While the users in high speed vehicles cross the cell
boundaries in a few seconds, the pedestrians are often confined within a
single cell. The problem is solved by introducing the concept of co-located
``large'' and ``small'' cells [29]. Different power levels and different antennas
are used to manage these two distinct types of cells. This concept is
popularly known as umbrella cell [29], where the large coverage area is
provided for high-speed users and smaller coverage is given to low speed
users. This reduces the number of hand offs for the high-speed users and
also provide good coverage areas for slower pedestrian users. A hand off
from a large umbrella cell to a small micro cell occurs when a high speed
user slows down its speed (getting down from a car).
7.6 Hard and Soft Hand Off: The cellular systems (like GSM) assign
different radio channels for hand off. This is known as hard hand off. On the
other hand, in IS-95 code division multiple access (CDMA), no physical
change in the assigned channel actually occurs. Instead the MSC
simultaneously evaluates the received signal from single user at several
neighboring base stations. It then make a ``soft'' decision to choose a version
of the user's signal to pass at a particular instance [37]. This procedure is
known as soft hand off. A wide variety of research works exist in literature
which propose to improve these soft and hard hand off strategies. The
concept of primary virtual circuit (PVC) and switched virtual circuit (SVC)
is used to improve the hand off latency in mobile wireless ATM networks
[12]. Recent researches have also revealed that end-to-end solutions for
smooth hand offs are required for transmission of streaming multimedia in
wireless networks. These include integration of adaptive channel allocation
strategies and predictive reservation of wireless bandwidth [13] for assuring
stringent QoS guarantee.
8. Location Registration:
Registrations caused by location update schemes have two major categories
in [7], namely, static and dynamic update schemes. The static schemes are
characterized by the fact that there are only certain fixed cells at which a
mobile terminal registers to send an update message. Under the dynamic
schemes, however, a mobile terminal can register in any cell---the decision
is solely based on the user's activity.
8.1 Static Update Schemes: These are also called global schemes in the
sense that the cells at which all or at least a group of mobile terminals
initiate update messaging are set globally for the whole network. Following
are the two most prominent static location update schemes that have been
proposed in the literature:
8.2 Zone based update: The update scheme most widely adopted by the
current cellular system (such as IS-41, IS-95 and GSM) [10, 20, 44]
partitions the service area under an MSC into a number of zones formed by a
non-overlapped grouping of neighboring cells. These zones are often called
location areas (LA) or paging areas (PA). A mobile terminal must update
whenever it crosses an LA boundary. The base stations must broadcast the
LA-ID in addition to the cell-ID to assist the mobile devices in following the
update protocol. Consequently, an LA assignment is globally induced for all
subscribers. The search space for a mobile terminal's location under this
protocol is limited to the set of cells in the current LA. Figure~\{Location
Update Procedure} shows how the location is updated in a GSM system
where Zone based update scheme is used. Mobile station at the time of first
registration gets the list of cells based on location area definition, when
mobile should register to the system. When ever Mobile finds that the new
base station ID on which it is located is one of that list of base stations, it
uses RACH to send a Registration Request message to the base station. Base
station sends this message to its BSC at the same time allocates SDCCH and
communicates that acceptance to Mobile by using AGCH. BSC sends this
information to MSC/VLR. VLR has the record of all home and visiting
customers like IMSI. If this customer's record already exists in the VLR, it
updates the entry with this new location data. It then sends the location
update accepted message to Mobile. If VLR/MSC finds that this is a new
customer, and no location data in its data base, it determines the location of
its HLR from the IMSI that came along with the request. It then sends the
Registration request to the HLR. HLR, using the user IMSI can find out the
location data of the user and from that determines the old MSC/VLR
identity. HLR then sends a message to old MSC/VLR to remove this user
from its data base. Old MSC/VLR removes the location record of the user
from its database and send the Acknowledgement to the HLR. HLR then
sends the Registration Accepted message to new MSC/VLR. The new
MSC/VLR, then starts the registration process by doing Authentication and
ciphering using the SDCCH and allocates the TMSI to the user. In GSM
system, there is another concept of Attach/Detach to track whether a
registered user is attached to the network or not. There is one bit that is kept
to record this information. Once a mobile user is registered to the network,
periodically it sends the Attach message to indicate that it is still alive in the
network. If for certain time duration, attach message is not received by the
base station from a mobile, base station sets the mobile to detach state. This
indicates to the network that the mobile is not alive in this network. This
single bit of information avoids routing of calls to destination system for a
mobile, which is at power-off state. The network can easily route those calls
to announcement and voice mail service without wasting useful network
resources.
8.4 Dynamic Update Schemes: These are also called local schemes as
mobile terminals can make the decision whether to update or not without any
global or design specific knowledge about cell planning. Three major
schemes fall under the dynamic category---named by the kind of threshold
they use to trigger an update:
8.4.1 Distance-based update: Under this scheme provided only in the IS-95
standard [7, 20, 23, 31, 35], the mobile terminal is required to track the (BS
to BS) Euclidean distance from the location of the previous update and
initiates an update if the distance crosses a specified threshold d. Although
the distance would ideally be specified in terms of a unit such as mile or
kilometer, it can also be specified in terms of the node distance metric
defined over a graph that represents the cell geometry. One can think of
these cells effectively forming a dynamic LA centered on the last known
position of the device. Paging can thus be limited to all cells in this dynamic
LA. Implementing a distance-based update, however, calls for some
information about the relative distances of the base stations to be uploaded
onto the mobile device.
8.4.3 Time-based update: Under this scheme [7, 45], the mobile sends
periodic updates to the system. The period or time threshold t can easily be
programmed into the mobile using a hardware or software timer. While this
makes it a truly local and attractive solution for implementation, one has to
accommodate the cost due to redundant updates made by devices that are not
mobile. For paging, the search space for the target device can be limited by
all possible cells reachable by the user within the elapsed time from the last
known cell.
8.5 Hybrid Schemes: Several hybrid schemes, too, have been proposed in
the literature. For example, a dynamic variant of the zone-based update
scheme proposed in [53] allows different LA assignments for different
mobile terminals based on individual call arrival and mobility patterns. This
alleviates the localization problem of the registration traffic to some extent,
although at the cost of choosing, maintaining and uploading a wide range of
LA maps to mobile devices. In [27], the dynamism has been taken further by
optimizing on the signaling costs that reflects the user's direction of
movement and regional cell characteristics.
9. Cellular Traffic
Traffic intensity is the measurement of traffic generated by an user during
the busy hour. There are two types of traffic measured in cellular systems:
9.1 Cell Traffic Analysis: The design of a cellular system depends upon the
accurate estimation and forecast of the traffic generated in a cell. The main
parameters in this estimate are:
3. Average traffic intensity of the user during the BH and Peak hour.
4. Percentage of active users in a cell during BH and Peak hour.
Busy Hour (BH): The cellular traffic is a random process; hence for
performing any engineering estimate, a reference time period is required to
measure the random process. Traditionally, telephone companies use the BH
traffic as the reference traffic and the busiest hour as the reference time-
period. This busiest hour is determined by a measurement methods of 60
consecutive days in the busy season of the year as suggested by the Bell
System of USA or 15 consecutive days of the busy-season of the year as
recommended by the ITU. In any case, the determination of the BH fixes the
measurement time and average traffic during this measurements are called
BH-traffic. Peak BH-traffic can be 3 highest days' average as in case of ITU
or 10 highest days' average as recommended by Bell Systems as 10 HDBH
(10 High Day Busy Hour) traffic. In addition if EVE (Extreme Value
Engineering) is used, similar statistical parameters can be determined by
using extreme value statistical method. In that case, the concept of BH is no
longer valid. The arrival rate and the holding time, as described in the
previous discussion are random variables. In most of the engineering
analysis, the arrival process of calls or control messages are considered as
Poisson process. The measurement of the holding time of the voice
conversation has confirmed that the random distribution of the holding times
of voice calls can be approximated by the negative exponential distribution.
1
Thus, if λ and µ = ( T is the holding time) represents the arrival and
T
departure rate of the voice calls, then
Different standard bodies like ITU or IETF or organization like Bell System
defined these parameters to design the network. Most of the wireless
network providers use either Bell System recommended GOS parameters
provided in the document LSSGR or use ITU recommendations.
Following are few important GOS specifications from LSSGR and ITU
documents that are useful for the design of wireless network.
Example 3.12 In a cell, the average arrival rate is λ = 0.1 voice calls per
1
second and the average holding time is = 100 second. Determine the
µ
blocking probability of the GSM system if only one GSM channel is used
for voice traffic. If you like to restrict the blocking probability to 1%, how
many GSM channels are required.
The traffic channels in a cell can be used at full rate or at half rate. As the
physical resource is provided at full rate, with half-rate user, more customers
can be potentially supported in the system, than the full-rate.
Example 3.13 In a cellular system, in a cell, only one TRX is used. Out of 8
available time slots (channels), 7 channels are used for voice traffic and 1
is used for control channel. Both the full and half rates are used by the user
for voice traffic. If he probability of the half rate user is γ what is the
blocking probability of the system, with arrival rate λ and holding
1
time .
µ
Solution:
Arrival rate of half-rate user = γλ
Arrival rate of the full-rate user (1 − γ )λ
The states of the birth and death process is represented by (i, j ) , where i and
j respectively represents the number of half and full rate users in the
system.
The Figure-XXX shows the birth and death process of the system for the
state (i, j ) . At state (i, j ) following events can occur to make transition to
other 4 neighboring states
1. A half rate call arrived at state (i, j ) will take the system to state
(i + 1, j ) . The rate of this transition is = γλ .
2. A full rate call arrived at state (i, j ) will take the system to state
(i, j + 1) . The rate of this transition is (1 − γ )λ .
3. A half rate call departed from the state (i, j ) will take the system to
state (i − 1, j ) . The rate of this transition is iµ .
4. A full rate call departed from the state (i, j ) will take the system to
state (i, j − 1) . The rate of this transition is jµ
Similar transitions will occur to bring the system from the neighboring
states to state (i, j ) . By using the birth-death Markov process, we derive the
following steady state balance equation for probability of states.
1 ⎛ γλ ⎞ 1 ⎡ (1 − γ )λ ⎤
i j
p(i, j ) = ⎜⎜ ⎟⎟ ⎢ p(0,0)
i! ⎝ µ ⎠ j! ⎣ µ ⎥⎦
−1
⎡ N 1 ⎛ (1 − γ )λ ⎞ j 2 N − 2 j 1 ⎛ γλ ⎞ i ⎤
p(0,0 ) = ⎢∑ ⎜⎜ ⎟⎟ ∑ ⎜⎜ ⎟⎟ ⎥
⎢⎣ j =0 j! ⎝ µ ⎠ i =0 i! ⎝ µ ⎠ ⎥⎦
The half-rate blocking ( BHR ) occurs when the full-rate and half-rate has used
all the half-rate time slots. However, in addition, the full-rate blocking ( BFR )
occurs when only one half-rate slot is free in the system, i.e.,
N
B HR = ∑ p (2 N − 2 j , j )
j =0
Similarly
N −1
B FR = ∑ p(2 N − 1 − 2 j , j ) + B HR
j =0
9.2 Engineering Guard Channel for HO: A cell handles two types of
traffic, the new originating/terminating calls of a cell and the calls that are
handed-off from the neighboring cells to a cell. The requirements of these
two calls are different. The call that is handed -off from the neighboring
cells to a cell is an existing call. Due to resource limitations, if this type of
call is blocked, that will cause the disconnection of the existing call. On the
other hand, if a new originating or terminating call is blocked in a cell, this
will cause the network busy signal to the user. It was noticed that customers
are more annoyed when an existing call is disconnected than getting the
network busy signal. To accommodate this condition, normally, the hand-off
calls are given higher priority over the newly originating calls in a cell
during the resource blocking. This is achieved by providing a set of
resources reserved for the hand-off calls in the resource pool of the cell. This
is called the guard channel. Figure~XXX: HO Guard Channel shows that in
the cell out total N resources, the newly originating/terminating calls can
only use M resources where M < N. But hand-off calls can use all N
resources, thus N-M resources are reserved for hand-off calls.
(λ H + λO )i
p(i ) = p(0) for 0≤i≤M
i! µi
and
(λ H + λO )M λ H i − M
p(i ) = p(0) for M <i≤ N
i! µ
i
−1
⎡ M (λ + λ )i N
(λ + λO )M λ H i − M ⎤
p(0 ) = ⎢∑ H i O + ∑ H ⎥
⎣⎢ i =0 i! µ i = M +1 i! µ i ⎥⎦
10.2 Changing Frequency Plan: This is another technique that can provide
relief to capacity constraints of some cells. The original frequency plan is
changed by its new traffic characteristics, and also new channel allocation
strategies. The Changing frequency plan is often associated with other
capacity growth measures. This is required to increase the utilization of the
spectrum.
Example: In a GSM system, a OMNI cell is using one TRX. 7 channels are
used for traffic and 1 channel for control traffic. Due to increase in
traffic, company planned to use 1200, 3 directional antennas to create a 3-
sectored cell. Because, the sectorization increased the control traffic,
estimates showed that 2 channels out of 8 channels of TRX are required for
control traffic. Assume that GOS used in the design is 1\% blocking. All
users are full-rate users. What is the capacity increased due to this
sectorization ?
Example: The current OMNI cell uses one channel for control traffic. The
current hand-off rate is λ and s % of control channel traffic is due to hand-
off traffic. The cell is changed to 3-sectored cell. If the movement of the user
is uniform in all directions, what will be the increase of hand-off traffic ?
Solution: Assume that on each face of the hexagonal cell $\alpha$ calls are
handed off to the neighboring cell. Also, α calls are received by that
cell from its neighboring cell. Total hand-off messages in BH
= 6(α + α ) = 12α .
Solution:
25 MHz GSM system has 124 channels.
Case-1:OMNI Cell
The cluster reuse for N=12
124
Number of channels/cell = ≈ 10
12
Total traffic channels = 10(8 − 1) = 70
70
A
Traffic capacity with 1 % blocking 0.01 = 70 −1
Ai
70!! ∑
i =0 i!
The Traffic Capacity A= 56.1 Erlang
Case-2: 3-sectored
124
Number of channels/cell = = 31
4
Total traffic channels = 31(8 − 2) = 186
Traffic capacity with 1 % blocking A ≈ 165 Erlang
165
Capacity Improvement = ≈3
56.1
10.4 Cell Tearing: In this technique, the cell coverage area is spitted into
two areas as shown in Figure~\ref{tiering}. The zone covered by the smaller
hexagon in the cell is served by channels that transmit signals at a lower
power. In this case, the channels allocated into a cell are divided into two
groups: (1) the channels that handle traffic of the smaller cell at lower power
level and (2) the channels that handle traffic of the outer regions at a higher
power level. because of the reduction of power in the smaller cell and the
larger separation between the small cells, the reuse pattern of the smaller
cells can be much less than the reuse pattern of the original (outer) cells. A
reuse pattern of N=3 is possible to be achieved in this cell tiering concept,
thus the outer cell might be served at reuse pattern of N=7 and the inner
cell at N=3. If the inner cell is reduced to R/2, the coverage area of the
th
1
inner cell will be of the total coverage area.
4
Let, ρ represents the uniform traffic intensity in the cell coverage area.
Also, let, AL and AS represents the areas of the larger and smaller cell
respectively.
Thus,
traffic in larger cell = ( AL − AS )ρ
traffic in smaller cell = AS ρ
⎡ γ
+
(1 − γ )⎤C = K + K
⎢ ⎥ L S
⎣ NS NL ⎦
(K + K S )N S N L − N S C
γ = L
C (N L − N S )
C NS NL
Equivalent reuse factor = =
⎛ γ (1 − γ ) ⎞⎟ γN L + (1 − γ )N S
C ⎜⎜ +
⎝ NS N L ⎟⎠
(K L + K S )N S N L − N S C
Fraction of channels assigned to small cell =
(N L − N S )
The one complexity of this scheme is frequent hand-off within a cell, as
mobile moves from smaller cells to the outer parts of the cells. This
increases control traffic and complexity of hand-off. Also, because the
splitting of channels the traffic efficiency decreases. One possible solution to
improve this traffic efficiency is to consider the channels of the outer cell as
an overflow traffic group for the channels of the inner cell. If λ1 , λ 2 , n1 and
n 2 represent the arrival rates and number of channels in the inner and outer
cells as shown in Figure XXXX, then the overall blocking of the system can
be determined by using the Equivalent random theory of Wilkinson.
1
Assume is the average holding time of the channels in both inner and
µ
outer cells and are equal in both cases.
λ1
Traffic offered in the inner cell A1 =
µ
λ
Traffic offered in the outer cell A2 = 2
µ
The average blocking of the inner cell traffic, if n1 channels are provided
A1n1
b1 = n1 −1
A1i
n1!∑
i =0 i!
The mean traffic over flow from the inner cell to outer cell channels
= m1 = b1 A1
The variance of the overflow traffic from inner cell to outer channels
⎡ A1 ⎤
= v1 = m1 ⎢1 − m1 + ⎥
⎣ n1 + 1 − A1 + m1 ⎦
The mean and variance of the outer cell Poisson traffic
= m2 = A2
= v 2 = A2
The total traffic offered to the outer cell channels is represented by mean
(M ) and Variance (V ) as follows. Z is called peaked ness factor and for
Poisson traffic it is equal to 1. This is a good indicator of the traffic
characteristic. If it is less than 1, the traffic is called smooth traffic and the
resources required to handle smooth traffic is less than the Poisson traffic.
On the other hand, resources required for peaked traffic is more than Poisson
traffic.
M = m1 + m2
V = v1 + v 2
V
Z=
M
The Equivalent Random theory provides the technique to determine the
number of channels required to provide the GoS, where the offered traffic is
not Poisson (thus Eralag Equations are not valid). This finds out the mean
and variance of the hypothetical Poisson traffic (AHypoth ) that is offered to a
hypothetical channel group (N Hypoth ) . Find N Hypoth by equating these mean and
variance to the mean and variance of the offered traffic on the outer cell
channel.
AHypoth = V + 3Z (Z − 1)
⎛ M +Z ⎞
N Hypoth = AHypoth ⎜ − M − 1⎟
⎝ M + Z −1 ⎠
NTotal
AHypoth
b=
n1 −1 i
AHypoth
N Total !∑
i =0 i!
The total channels required on the outer cell is then given by the following
equation:
n2 = N Total − N Hypoth
Micro Cell: The heterogeneous traffic demand on the cellular coverage area
has forced the cellular providers to innovate more diverse method of cellular
coverage design. One of the very popular concept is the deployment of
micro cell at the traffic Hot Spot or cold spot.
Hot Spot Micro Cell: In this application, within a macro cell coverage area,
the cellular providers identify the Hot Spots of traffic. To handle the Hot
Spot traffic, cellular providers introduce Micro Cell with much lower
antenna height and power of the transmission. This is very much like cell
Tearing, the only difference is the micro cell location can be at any location
of the cell coverage area.
Figure-XXX shows the location of the Micro Cell area within a Macro Cell
coverage area. Note that the signal strength on certain part of the micro cell
coverage area facing the antenna of the macro cell can be higher. Thus the
Directed retry technique is used to lock to micro cell even when the macro
cell signal strength is higher than the micro cell.
Directed Retry: This is the method to underlay micro cells within a macro
cell and assign traffic to the micro cell. Within a coverage area as the power
of the macro cell is generally higher than the micro cell, mobile generally
tunes to the macro cell, even though the mobile within the coverage range of
the micro cell. The macro cell in that case sends the list of micro cells that
are closed to the mobile. Mobile finds out the strongest micro cell signal and
tunes to that micro cell. This is called directed retry.
Directed Hand-down (DHD): In this case, the mobile finds the signal
strength of the macro cell much better than the micro cell, though the mobile
is within the coverage area of the micro cell. Macro cell accepts the call and
set up the connection. Then within five seconds, it hand-over the call to
micro cell.
BER Hand up: In this case, if the micro cell finds that the BER of the call is
not satisfactory, and there are spare channels available in the macro cell, it
hand-up the call to the macro cell. This ensures the voice quality.
\begin{table}[!httb]
\caption{\footnotesize{}}
\label{active}
\begin{center}
\begin{footnotesize}
\begin{tabular}{||c|c|c|c||} \hline \hline
Cell & M & D & E \\ \hline
A & $40$ & $80$ & $120$ \\ \hline
B & $10$ & $200$ & $50$ \\ \hline
C & $100$ & $20$ & $120$ \\ \hline \hline
\end{tabular}
\end{footnotesize}
\end{center}
\vspace{-0.1in}
\end{table}
On the other hand in dynamic channel allocation (DCA) strategy [5, 14, 15],
the channels are not permanently assigned to a particular cell. During a call
set-up, upon request of a channel from the base station, the MSC allocates
any free channel available in the originating cell's interference region. The
allocation procedure takes into account the probability of blocking in near
future, channel frequency and reuse distance. Since a wide number of
channels are now available to the cells, dynamic channel allocation scheme
reduces the possibility of channel blocking and increases the channel
utilization and system capacity. However, this is achieved at the cost of
increased computational complexity and storage of the system.
A plethora of variations of these two basic channel allocation strategies exist
in literature. The concept of channel ordering and channel reassignment [16]
was proposed to achieve a good channel usage. In another approach the base
stations are allowed to borrow a channel from its neighboring cell, if it has
no channels available to use. This scheme, known as channel borrowing [18]
also aids in load balancing in cellular systems [17]. However, it has been
shown that the channel borrowing scheme leads to performance degradation
and bottle-necks in high traffic load conditions. In order to tackle this
situation, hybrid channel assignment [26, 21] strategy is also proposed. In
this scheme, a set of channels assigned to each cells are divided into two
groups. While the first group of channels is kept for the cell's own use only,
the second group of cells is lent to the neighboring cells, as and when
required. The ratio of these two groups of cells is determined a priori and the
optimality of the ratio is dependent on the traffic load. A wide variation of
dynamic channel allocation strategies exist, which include various
combinations of permanent channel assignment, channel borrowing, shared
channel-pools, channel ordering and channel reassignments [16].
Indeed, the performance of these channel assignment strategies are measured
in terms of channel blocking probability and/or worst-case number of
channels required to accommodate a specific number of calls [25].
References